Container security is meant to give teams clarity. Yet most security teams recognise the opposite experience. You scan a container image and receive a list so long that it feels impossible to act on. When everything looks urgent, nothing feels actionable. And when all you see is volume, you lose track of what truly puts your services at risk.
This is the central challenge of container security today. Scanners show what is broken. They rarely show what is important.
This article explores a real world case where one container image produced one hundred forty five findings ; yet only one deserved immediate attention. It illustrates why severity alone is not enough and how context, reachability and exploit probability can change the entire remediation strategy. Platforms such as ScanDog bring this intelligence into modern DevSecOps workflows.
The Real World Scenario: When Scanners Create Noise Instead of Clarity
When the nginx:stable-bookworm-perl container image was scanned using Trivy, the results reflected what many teams see daily:
- 145 total findings
- 13 HIGH severity vulnerabilities
- 2 CRITICAL vulnerabilities
- 1 P0 finding
On paper, nothing about this list indicates where to begin. Traditional scanners treat all unpatched vulnerabilities as static risk, leaving teams to make difficult prioritisation decisions with minimal context.
The surprising reality came later. Among the dozens of HIGH and CRITICAL findings, a single LOW severity CVE , CVE-2023-44487 , posed the only immediate threat. ScanDog’s prioritisation engine flagged it instantly because of its active exploitation and high probability of attack.
This is the gap intelligent prioritisation fills.
Understanding the Real Risk: CVE-2023-44487 and the HTTP/2 Rapid Reset Attack
CVE-2023-44487 represents a flaw in the HTTP/2 protocol that enables massive distributed denial of service attacks using minimal resources. Attackers abuse HTTP/2 stream multiplexing to open and immediately reset connections at scale, overwhelming servers in seconds.
Why traditional severity ratings miss the point
CVSS classifies the vulnerability as High with a score of 7.5.
But CVSS is a technical metric, not a risk metric. It does not consider:
- Active exploitation by attackers
- Availability of weaponised exploit code
- Advisories from major cloud providers
- Business impact of service downtime
- Ease of execution by low skill actors
What the real world data shows
EPSS, the Exploit Prediction Scoring System, gives CVE-2023-44487 a probability of 94.42 percent for exploitation within thirty days.
Its percentile ranking: 99.98.
In other words, it is more likely to be exploited than almost every other known CVE. That is why ScanDog elevates it to P0 priority, regardless of its nominal severity.
Why Container Security Cannot Rely Solely on Scanners
The lesson is simple. Scanners generate valuable detection data, but they do not provide insight. They cannot understand:
- Which vulnerabilities are actually exploitable
- Which paths attackers are most likely to use
- What your business impact would be
- Which services face real exposure
This leads to misaligned priorities, delayed remediation and unnecessary engineering workload.
ScanDog supports teams by layering intelligence on top of scanner output, transforming raw findings into a clear, ranked list based on real threat signals.
How ScanDog Transforms Container Security
Traditional workflow:
Scanner → 145 Findings → Manual Triage → Guesswork → Delayed Response
ScanDog workflow:
Scanner → 145 Findings → Intelligent Prioritization → 1 P0 Finding → Immediate Action
This shift turns vulnerability management from reactive guesswork into a structured, intelligence driven practice.
The Four Pillars of Intelligent Prioritisation
Exploit intelligence
ScanDog monitors exploit availability, real world attack campaigns and weaponisation signals.
If attackers are actively using a vulnerability, it moves to the top of the queue.
Threat context
EPSS probability, percentile ranking and attacker behaviour patterns determine urgency.
This provides a more accurate picture than CVSS alone.
Business impact
Criticality of services, potential downtime and blast radius shape the prioritisation score.
Environmental factors
Exposure, authentication requirements and network pathways determine whether a vulnerability could actually be exploited in your environment.
Together, these factors reduce noise and elevate the handful of findings that truly matter for container security.
Measurable Impact for Security Teams
Organisations that move from volume based approaches to intelligence based prioritisation consistently report:
- Eighty seven percent less time spent triaging
- Three times faster remediation cycles
- Sixty two percent fewer incidents caused by known vulnerabilities
- Ninety five percent improvement in MTTR for P0 issues
These gains come from clarity, not from scanning more frequently.
What This Means for Your Container Security Strategy
Container security is about more than producing lists of vulnerabilities. It is about understanding which issues meaningfully threaten your organisation.
If you are still relying solely on scanner severity, consider asking
- How many vulnerabilities are actively exploited today?
- Which ones could bring down a critical service?
- Do we know our P0 issues at any moment?
Modern attackers focus on vulnerabilities with low complexity and high impact, not necessarily those with the highest severity labels.
A LOW severity CVE under active exploitation is more dangerous than a CRITICAL CVE with no weaponised exploit.
A More Intelligent Path Forward
The case of CVE-2023-44487 shows what is at stake. Without intelligent prioritisation, the vulnerability would have been buried among dozens of other issues. With contextual analysis, it became the single highest priority with immediate action.
Platforms such as ScanDog help teams make this shift by providing:
- Automated EPSS scoring
- Priority classification from P0 to P4
- Continuous monitoring of exploit availability
- Integration with existing scanners
- Clear remediation workflows inside engineering tools
Container security cannot be solved by scanning alone. It depends on intelligent prioritisation, meaningful context and the ability to act quickly when it matters most.
ScanDog is an AI-powered Application Security Posture Management (ASPM) platform that helps development teams build secure software faster. With advanced vulnerability prioritization, reachability analysis, and AI-assisted remediation, ScanDog cuts through the noise of false positives to focus on what truly matters.


