|

Risky Tech Ranking

Methodology

The Risky Tech Ranking (RTR) is derived using a three step process:

  1. Collect all vulnerabilities in the National Institute of Standards and Technologies (NIST) National Vulnerability Database (NVD) and all vendors in NIST’s Common Platform Enumeration (CPE) dictionary.
  2. Map vulnerabilities to vendors using NIST enrichment when available, defaulting to an AI model when it is not available.
  3. Score vendors by adding up all their vulnerabilities weighted by their exploitability.

This page provides information on how each step is carried out.

Step 1: Identify Vendors and Vulnerabilities

Vendors

We primarily score vendors that appear in NIST's Official CPE Dictionary. In order to maintain fidelity with the National Vulnerability Database, we score some additional vendors. We do not replace names appearing in the CPE dictionary with the name of the legal entity that “owns” the vendor. This means the following:

Collect all vulnerabilities in the National Institute of Standards and Technologies (NIST) National Vulnerability Database (NVD) and all vendors in NIST’s Common Platform Enumeration (CPE) dictionary.

  1. “Facebook” and “Whatsapp” are distinct vendors in the RTR, even though both are products owned by Meta.
  2. For an example where this is not true, “Google” is a vendor responsible for multiple individual products, like Chrome, Android, and so on.

NIST offers a channel (cpe_dictionary@nist.gov) whereby vendors can request changes to the CPE dictionary. After all calculations are complete, we map CPE strings to names that are better formatted for presentation on the website.

Vulnerabilities

We source vulnerabilities in NIST’s National Vulnerability Database for various reasons:

  1. The database was created to track vulnerabilities in a standardized way.
  2. It is widely used in industry and academia.
  3. Vendors can easily verify and challenge the accuracy of the information as most mainstream vendors are CVE Numbering Authorities that are solely responsible for issuing vulnerabilities in their products.

These factors are not true of proprietary vulnerability databases.

Step 2: Map Vulnerabilities to Vendors

The NVD contains partial mapping of CVE IDs to CPE vendors, which is known as enrichment and maintained by NIST. However, this is incomplete, in part due to the enrichment crisis that started in February 2024.

To map CVE IDs to vendors, we use the following hierarchy:

  1. We use NIST’s enrichment where available.
  2. If there is no NIST enrichment, we use third-party enrichment where available.
  3. If there is no NIST or third-party enrichment, we use an AI system to map the remaining CVE IDs to vendors.

Step 3: Score Vendors

Our final step is to assign a Vendor Score to vendors that takes into account all the vulnerabilities that we identified in Step 2.

To account for risk, each vulnerability is weighted by its Coalition Exploit Scoring System (Coalition ESS) score, which is based on the probability of exploitation. This means high-risk vulnerabilities contribute more to the aggregate score than low-risk vulnerabilities.

To calculate Vendor Score, we sum the Coalition ESS scores of all vulnerabilities affecting that vendor in a time period. The formula is mathematically equivalent to:

Vendor Score = (Number of Vulnerabilities) x (Average Coalition ESS Score)

Examples for Intuition
  • A vendor was associated with 3 vulnerabilities in 2024 with Coalition ESS scores 0.2, 0.3 and 0.5. The vendor’s 2024 VRR Vendor Score would be 1 (=0.2+0.3+0.5).
  • Vendor A is associated with 20 vulnerabilities both with an average Coalition ESS score of 0.25, and Vendor B is associated with 10 vulnerabilities with an average Coalition ESS score of 0.5. Both vendors would have the same Vendor Score.

Interpretation

The vendor score aggregates the Coalition ESS score of vulnerabilities impacting all products associated with a particular vendor. This formula has a number of implications:

Reproduction

Coalition ESS scores in the Risky Tech Ranking are based on data pulled from NIST's NVD on April 1, 2025. In order to reproduce our ranking, we recommend using the following resources:

Please note, this file contains one row per vulnerability record from the NVD. It contains the following columns:

The Risky Tech Ranking is based on publicly available data and is intended for general, informational purposes only, and not as legal, professional, or consulting advice; use of the Risky Tech Ranking is solely at your own risk. The Risky Tech Ranking is a list of unaffiliated third-party technology providers ranked by a methodology based on Coalition’s Exploit Scoring System (Coalition ESS), which is powered by generative AI, machine learning, and an underlying algorithm that provides assessment of all publicly disclosed vulnerabilities and evaluates a technology vendor's risk based on the exploitability of reported vulnerabilities over a set time period. Coalition disclaims all warranties, express or implied. Risky Tech Ranking results may vary or fluctuate based on factors outside of Coalition's control.

Coalition’s and for additional information.