TXOne Networks

Fix the Right CVEs First. Ignore the Noise.

VSAR scores vulnerabilities by operational context, not just CVSS severity

VSAR (Vulnerability Situational Awareness Rating) is TXOne's operational-context vulnerability scoring methodology inside Sennin. It combines CVSS severity with asset exposure, compensating controls, virtual patch coverage, and operational criticality so your team works the 20% of CVEs that actually threaten operations, not the 80% that do not.

Operational-Context Vulnerability Scoring

Every CVSS Critical Is Not an Actual Emergency.

CVSS tells you how bad a vulnerability could be in isolation. VSAR tells you how bad it is on your specific asset, right now.

A critical CVE on an air-gapped system with virtual patch coverage ranks lower than a moderate CVE on a network-facing asset. VSAR captures that difference. It looks at where the asset sits on the network, what protections already shield it, whether a TXOne virtual patch is in place, and how critical the asset is to operations, then produces a prioritized list that reflects actual risk to your operation, not an abstract severity score.

WHAT IT IS

Capability

What is VSAR?

VSAR is the vulnerability scoring methodology at the core of TXOne Sennin. It ingests asset inventory, protocol and network exposure data, compensating control status, virtual patch coverage from TXOne Edge, and operational criticality tagging, then produces an operationally-weighted risk score per CVE per asset. The result is an 80/20 prioritization: the 20% of CVEs that genuinely threaten your operation rise to the top, while the 80% that do not are de-prioritized with explicit evidence of why. VSAR works alongside approval workflows in Sennin so that remediation proposals from the corporate security team are reviewed and approved by the site before anything deploys on the plant floor.

KEY COMPONENTS

Requirements

VSAR Challenges

Key challenges that VSAR addresses.

Patch fatigue and the wrong CVEs getting attention first

Every CVSS Critical Reads as Equal Urgency

CVSS scores a vulnerability's theoretical severity without knowing where it lives. A critical CVE on an isolated PLC and a critical CVE on an internet-facing HMI look identical to CVSS. Your OT team cannot patch both in the same week.

Key Components

Key Components

Core components of the VSAR capability.

Operational-Context Risk Scoring

VSAR combines CVSS severity with five operational factors: network exposure, compensating controls, virtual patch coverage, asset criticality, and threat intelligence relevance. A critical CVE on an air-gapped system with virtual patch coverage can rank lower than a moderate CVE on a network-facing asset.

Key Capabilities

Five-factor operational weighting on top of CVSS
Per-asset scoring, not just per-CVE
Reduces critical backlog to the 20% that matter
Evidence-based de-prioritization for the remaining 80%
Outcomes

Outcomes

80/20

Risk prioritization on what actually matters

PROVEN RESULTS

CISA advisories in the CPS vulnerability landscape
CISA advisories with no patch available
Advisories with no patch AND no mitigation
Cite OT skills and resource gaps

WHY TXONE

Why VSAR for OT Vulnerability Prioritization

CVSS-only scoring was designed for IT environments where patching is possible and context is generic. OT needs an operationally-weighted view.

TXOneOperations-first

CVSS does not know your network, your compensating controls, or your virtual patch coverage. VSAR does, because it reads directly from Edge, Stellar, Element, and Sennin telemetry.

VS
Context That CVSS Cannot Provide

Legacy approach creates operational risk

TXOneOperations-first

When TXOne Edge is already blocking exploitation inline, the CVE is still tracked but its priority drops. Gartner's 2025 CPS Vulnerability analysis explicitly endorses virtual patching for environments that cannot patch directly.

VS
Credit for Virtual Patches and Controls

Legacy approach creates operational risk

TXOneOperations-first

Approval workflows in Sennin mean corporate security proposes and the site approves before anything deploys. Remediation becomes a structured process instead of a friction point.

VS
Built for IT/OT Handoff

Legacy approach creates operational risk

TXOneOperations-first

26% of CISA advisories have no patch, 18% have neither patch nor mitigation. VSAR acknowledges that reality and scores the compensating control coverage instead of pretending patching is always available.

VS
Honest About Unpatchable Systems

Legacy approach creates operational risk

TXOneOperations-first

VSAR correlates endpoint posture, network exposure, protocol inspection, and external scanner data into one operationally-weighted risk score per asset. SIEM integration (Splunk, Microsoft Sentinel) feeds enterprise reporting without rework.

VS
One Score, Every TXOne Signal

Legacy approach creates operational risk

Operations-first security that works with your production environment

NEXT STEP

See How VSAR Scores Your Environment

Schedule a VSAR walkthrough on a representative set of your assets. See how operational context reduces your CVSS critical backlog to the vulnerabilities that genuinely threaten production.