Trust but Verify: An Assessment of Vulnerability Tagging Services

Conference Paper (2025)
Author(s)

Szu Chun Huang (TU Delft - Organisation & Governance)

Harm J. Griffioen (TU Delft - Cyber Security)

M.H. van der Horst (TU Delft - Organisation & Governance)

Georgios Smaragdakis (TU Delft - Cyber Security)

Michel Van Van Eeten (TU Delft - Organisation & Governance)

Yury Zhauniarovich (TU Delft - Organisation & Governance)

Research Group
Organisation & Governance
More Info
expand_more
Publication Year
2025
Language
English
Research Group
Organisation & Governance
Pages (from-to)
823-842
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Internet-wide scanning services are widely used for attack surface discovery across organizations and the Internet. Enterprises, government agencies, and researchers rely on these tools to assess risks to Internet-facing infrastructure. However, their reliability and trustworthiness remain largely unexamined. This paper addresses this gap by comparing results from three commercial scanners – Shodan, ONYPHE, and LeakIX – with findings from our independent experiments using verified Nuclei templates, designed to identify specific vulnerabilities through crafted benign requests. We found that the payload based detections of Shodan are mostly confirmed. Yet, Nuclei finds many more vulnerable endpoints, so defenders might face massive underreporting. For Shodan’s banner-based detections, the opposite issue arises: a significant overreporting of false positives. This indicates that banner-based detections are unreliable. Moreover, three commercial services and Nuclei scans exhibit significant discrepancies. Our work has implications for industry users, policymakers, and the many academic researchers who rely on the results provided by these attack surface management services. By highlighting their shortcomings in vulnerability monitoring, this work serves as a call for action to advance and standardize such services to enhance their trustworthiness.

Files

License info not available