What is the Common Vulnerability Scoring System (CVSS)? (2024)

The Common Vulnerability Scoring System (CVSS) is a standardized framework for measuring information systems’ severity of security flaws. It assigns each vulnerability a score between 0 and 10, with higher scores meaning more severe issues. This system helps organizations decide which security threats need attention first based on their potential impact.

How does CVSS Scoring Work?

CVSS scoring assigns a number from 0 to 10 based on three main factors: Base, Temporal, and Environmental metrics. The Base score shows the inherent characteristics of a vulnerability. The Temporal score considers how those characteristics may change over time. The Environmental score evaluates how the vulnerability could affect a specific environment.

CVSS ScoreQualitative Rating
0.0None
0.1 – 3.9Low
4.0 – 6.9Medium
7.0 – 8.9High
9.0 – 10.0Critical

A score of 0 means the vulnerability has minimal severity, while a score of 10 represents the most severe issues. This scoring helps organizations prioritize their responses to different security threats.

How is a CVSS score calculated?

A CVSS score is based on three sets of metrics: Base, Temporal, and Environmental. Each of these has its own scoring elements.

What is the Common Vulnerability Scoring System (CVSS)? (1)

CVSS Base Metrics

The Base Metrics are the core components used to determine how severe a security vulnerability is. They focus on the vulnerability’s characteristics, regardless of whether it has been exploited or mitigated. These metrics include Exploitability, Scope, and Impact.

Exploitability: This metric assesses how easily a vulnerability is exploited. It is broken down into four sub-components:

  • Attack Vector: Measures how an attack can be executed, with higher scores for remote attacks versus those requiring physical access.
  • Attack Complexity: Evaluate the difficulty of executing the attack, with lower scores for easier vulnerabilities to exploit.
  • Privileges Required: This indicator indicates the level of access needed to exploit the vulnerability, with higher scores for attacks requiring fewer privileges.
  • User Interaction: Considers whether the attacker needs to involve a user in the exploit, with autonomous attacks scoring higher.

Scope: This metric assesses whether the vulnerability can affect other components beyond the initial target. The score will be higher if the vulnerability can propagate, such as compromising an entire system through a single application flaw.

Impact: This metric evaluates the potential consequences of a successful exploit, focusing on three areas:

  • Confidentiality: Measures the extent of data exposure.
  • Integrity: Assesses the ability of the attacker to modify data.
  • Availability: Evaluate the potential disruption to system access and functionality.

While CVSS-based Base Metrics provide a crucial starting point for understanding a vulnerability’s severity, they have limitations. They do not account for Temporal Metrics, which change over time, or Environmental Metrics, which reflect an organization’s specific context, such as existing security controls and asset criticality.

Organizations must consider these additional factors to fully assess and prioritize vulnerabilities, which can significantly alter the perceived risk and required response.

CVSS Temporal Metrics

CVSS Temporal Metrics evaluate the changing nature of a vulnerability over time. These metrics assess a vulnerability’s current exploitability and the availability of remediating controls, such as patches. Key subcomponents of Temporal Metrics include:

  • Exploit Code Maturity: A vulnerability is less threatening until a method to exploit it becomes available. As exploit code matures and becomes more widespread, its associated score increases, reflecting the heightened risk.
  • Remediation Level: A vulnerability may not initially have a patch or workaround. As temporary fixes or official patches are released, the vulnerability score decreases, indicating reduced risk.
  • Report Confidence: This measures how well a vulnerability is validated, ensuring it is both real and exploitable—higher confidence results in a higher score.

CVSS Environmental Metrics

CVSS Environmental Metrics allow organizations to adjust the Base CVSS score based on their specific Security Requirements and modifications of Base Metrics.

  • Security Requirements: These metrics consider the criticality of the affected asset. Mission-critical systems, like a database containing all customer data, receive higher scores than less critical assets, such as a non-privileged user’s workstation.
  • Modified Base Metrics: Organizations can modify Base CVSS Metrics based on existing mitigations. For instance, “air gapping” a server—disconnecting it from external networks—lowers the Attack Vector score since remote exploitation is no longer possible.

By considering both Temporal and Environmental Metrics, organizations can achieve a more tailored and accurate assessment of a vulnerability’s actual risk to their specific environment.

History of the CVSS

CVSS has been crucial to assessing vulnerabilities since 2003/2004 when it was introduced by the National Infrastructure Advisory Council (NIAC). Since 2005, it’s been managed by the Forum of Incident Response and Security Teams (FIRST). The latest version, CVSS v4.0, was released in 2023 to improve scoring accuracy and address user feedback.

Despite its importance, CVSS has faced criticism. Some argue it oversimplifies the complex nature of vulnerabilities, especially in earlier versions. Even with improvements in v4.0, the system can still overwhelm security teams with high-severity vulnerabilities that may not be the most urgent.

Organizations now complement CVSS with additional metrics and systems, such as the Exploit Prediction Scoring System (EPSS) and Risk-Based Vulnerability Management (RBVM). EPSS predicts the likelihood of exploiting a vulnerability, while RBVM considers business impact, asset criticality, and existing security controls. These methods offer a more tailored approach to vulnerability prioritization.

CVSS vs. CVE

The main difference between CVSS and CVE lies in their roles. CVE (Common Vulnerability Enumeration) gives unique identifiers to specific security vulnerabilities, making them easier to track. CVSS (Common Vulnerability Scoring System) provides a score that shows how severe each CVE is. For example, the Heartbleed vulnerability (CVE-2014-0160) has a CVSS score 7.5, indicating high severity.

CVSS Limitations

The Common Vulnerability Scoring System (CVSS) has several limitations that organizations need to consider:

  • Limited Context: CVSS scores don’t account for the specific risks to your organization. They tell you if a vulnerability is dangerous, but not if it’s dangerous to you.
    • Example: Suppose two organizations—a financial institution and a small retail store—face the same vulnerability. CVSS might rate it as severe, but for the retailer, the risk might be minimal due to fewer sensitive assets, whereas for the financial institution, it could be critical due to the high value of their data.
  • Subjectivity: CVSS scores can vary depending on the context, leading to inconsistencies.
    • Example: A vulnerability in a widely used software might receive a high CVSS score based on its potential impact. However, the risk might be lower if a company has strong security operation controls. Yet, another organization with weaker controls might find the same vulnerability far more threatening, leading to different assessments.
  • Limited Scope: CVSS doesn’t fully consider the importance of specific assets or existing controls.
    • Example: CVSS might score a vulnerability in an out-of-date software as low because it’s not internet-facing. However, if that software version is critical to a company’s operations, the low score underestimates the risk, missing the asset’s importance.
  • Complexity: The system requires a deep understanding of scoring factors. Understanding how to calculate and interpret CVSS scores requires familiarity with several factors, such as attack vectors, complexity, and impact.
    • Example: This complexity can lead to misinterpretations or misuse of scores for organizations without dedicated security expertise.
  • Potential for Oversights: Relying solely on CVSS scores can lead to missed opportunities to address the most pressing threats.
    • Example: If an organization relies solely on CVSS scores, it might overlook threats that don’t score highly but are significant in their specific context—like vulnerabilities in internal systems that an insider could exploit.

    Organizations should adopt a risk-based vulnerability management approach incorporating CVSS Base Scores and Temporal and Environmental factors to address these limitations. This tailored approach requires understanding the organization’s risks, including business criticality, existing controls, and the current threat landscape.

What is the Common Vulnerability Scoring System (CVSS)? (2024)

FAQs

What is the Common Vulnerability Scoring System (CVSS)? ›

The Common Vulnerability Scoring System (CVSS) is a free and open industry standard for assessing the severity of computer system security vulnerabilities. CVSS attempts to assign severity scores to vulnerabilities, allowing responders to prioritize responses and resources according to threat.

What is the CVSS risk model? ›

The CVSS score is a computation of base metrics that reflect how much risk a vulnerability poses to network security. Base metrics include access (ranging from local to remote), access complexity, required authentication, impact on data confidentiality, impact on data integrity, and impact on data availability.

What are CVSS 3.0 severity ratings? ›

CVSS v3 Scoring Severity

Low: 0.1-3.9. Medium: 4.0-6.9. High: 7.0-8.9. Critical: 9.0-10.0.

What range is the Common Vulnerability Scoring System CVSS v3 1 severity ratings? ›

The Base metrics produce a score ranging from 0 to 10, which can then be modified by scoring the Temporal and Environmental metrics. A CVSS score is also represented as a vector string, a compressed textual representation of the values used to derive the score.

What is the CVSS for CVE? ›

What is CVSS score. CVSS stands for Common Vulnerability Scoring System, and it's a numerical score that rates the severity of vulnerabilities on a scale from 0 to 10, with 10 being the most severe. It's often used to rate the severity of the publicly disclosed vulnerabilities listed in the CVE.

What is the CVSS used for? ›

The Common Vulnerability Scoring System (CVSS) is a free and open industry standard for assessing the severity of computer system security vulnerabilities. CVSS attempts to assign severity scores to vulnerabilities, allowing responders to prioritize responses and resources according to threat.

What is common vulnerability scoring system CVSS scoring? ›

CVSS scoring assigns a number from 0 to 10 based on three main factors: Base, Temporal, and Environmental metrics. The Base score shows the inherent characteristics of a vulnerability. The Temporal score considers how those characteristics may change over time.

Is CVSS a threat model? ›

Common Vulnerability Scoring System (CVSS)

It is not a threat modeling methodology but can compliment threat modeling activities. The CVSS provides a common and standardized scoring system within different cyber and cyber-physical platforms.

What are the ranges of CVSS 3? ›

Qualitative Severity Ratings
CVSS v2.0 RatingsCVSS v3.x Ratings
SeveritySeverity Score RangeSeverity Score Range
Low0.0-3.90.1-3.9
Medium4.0-6.94.0-6.9
High7.0-10.07.0-8.9
2 more rows

What is vulnerability severity level? ›

Severity Level: High

Vulnerabilities that score in the high range usually have some of the following characteristics: The vulnerability is difficult to exploit. Exploitation could result in elevated privileges. Exploitation could result in a significant data loss or downtime.

What is the difference between CVSS 2 and 3? ›

Version 2: Does not assess or score situations in which a vulnerability in one application impacted other applications on the same system. Version 3: A new metric, Scope, now accommodates vulnerabilities for which the impacted component is different from the vulnerable component.

What is the vulnerability risk rating? ›

VRR represents the risk posed by a given vulnerability, provided as a numerical score between 0 and 10, to an organization or business. The higher the risk, the higher the VRR. To assign a VRR to an individual vulnerability, Ivanti Neurons identifies the vulnerability's threat factor and determines the base score.

When was CVSS 4 released? ›

CVSS version 4.0 is the next generation of the Common Vulnerability Scoring System standard; released November 1, 2023. CVSS v4. 0 provides increased granularity for Base metrics, a new Supplemental metric group, a different methodology for determining severity and more.

What is a CVSS calculator? ›

CVSS calculators

1 calculator gives a score for each Base, Temporal and Environmental metric. To use the calculator, the end user selects one option from each provided category. For example, the Base score is calculated using metrics such as the following: Attack vector: Network, adjacent, local or physical.

What is the CVSS V3 score? ›

Table 14: Qualitative severity rating scale
RatingCVSS Score
Low0.1 - 3.9
Medium4.0 - 6.9
High7.0 - 8.9
Critical9.0 - 10.0
1 more row

What are examples of CVE? ›

Examples of software weaknesses that might lead to the introduction of vulnerabilities include the following:
  • Buffer overflows.
  • Manipulations of common special elements.
  • Channel and path errors.
  • Handler errors.
  • User interface errors.
  • Authentication errors.
  • Code evaluation and injection.

What is the CVSS threat model? ›

The Common Vulnerability Scoring System (CVSS) is an open framework for communicating the characteristics and severity of software vulnerabilities. CVSS consists of four metric groups: Base, Threat, Environmental, and Supplemental.

What is the CVSS a method of assessing? ›

You can use the Common Vulnerability Scoring System (CVSS) to determine the characteristics and severity of a security vulnerability and to assess its impact on your environment. The CVSS is an open, industry-standard method used to score system vulnerabilities.

What is a risk score model? ›

Risk scores are a way of stratifying a population for targeted screening. They use data from risk factors to calculate an individual's score; a higher score reflects higher risk.

What does the CVE stand for? ›

common vulnerabilities and exposures (CVE)

Top Articles
Topic Modeling: How a statistical method can increase business results
What Is Topic Modeling? A Beginner's Guide
Artem The Gambler
Diario Las Americas Rentas Hialeah
Shs Games 1V1 Lol
Activities and Experiments to Explore Photosynthesis in the Classroom - Project Learning Tree
50 Meowbahh Fun Facts: Net Worth, Age, Birthday, Face Reveal, YouTube Earnings, Girlfriend, Doxxed, Discord, Fanart, TikTok, Instagram, Etc
Words From Cactusi
Waive Upgrade Fee
Boat Jumping Female Otezla Commercial Actress
DIN 41612 - FCI - PDF Catalogs | Technical Documentation
Used Wood Cook Stoves For Sale Craigslist
Nioh 2: Divine Gear [Hands-on Experience]
Transfer Credits Uncc
Hellraiser III [1996] [R] - 5.8.6 | Parents' Guide & Review | Kids-In-Mind.com
Fraction Button On Ti-84 Plus Ce
Titanic Soap2Day
27 Paul Rudd Memes to Get You Through the Week
R&S Auto Lockridge Iowa
Disputes over ESPN, Disney and DirecTV go to the heart of TV's existential problems
2000 Ford F-150 for sale - Scottsdale, AZ - craigslist
Beaufort 72 Hour
Free T33N Leaks
Christmas Days Away
County Cricket Championship, day one - scores, radio commentary & live text
Pixel Combat Unblocked
Rogold Extension
Dubois County Barter Page
Devargasfuneral
The Menu Showtimes Near Amc Classic Pekin 14
Daily Journal Obituary Kankakee
Senior Houses For Sale Near Me
Kvoa Tv Schedule
Samsung 9C8
Jefferson Parish Dump Wall Blvd
Metro Pcs Forest City Iowa
Entry of the Globbots - 20th Century Electro​-​Synthesis, Avant Garde & Experimental Music 02;31,​07 - Volume II, by Various
Anhedönia Last Name Origin
Skyward Marshfield
3 bis 4 Saison-Schlafsack - hier online kaufen bei Outwell
Powerspec G512
Craigslist Antique
Quiktrip Maple And West
Online-Reservierungen - Booqable Vermietungssoftware
Candise Yang Acupuncture
26 Best & Fun Things to Do in Saginaw (MI)
Zipformsonline Plus Login
Dolce Luna Italian Restaurant & Pizzeria
Rocket Bot Royale Unblocked Games 66
Game Like Tales Of Androgyny
Texas Lottery Daily 4 Winning Numbers
Latest Posts
Article information

Author: Kareem Mueller DO

Last Updated:

Views: 6097

Rating: 4.6 / 5 (66 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Kareem Mueller DO

Birthday: 1997-01-04

Address: Apt. 156 12935 Runolfsdottir Mission, Greenfort, MN 74384-6749

Phone: +16704982844747

Job: Corporate Administration Planner

Hobby: Mountain biking, Jewelry making, Stone skipping, Lacemaking, Knife making, Scrapbooking, Letterboxing

Introduction: My name is Kareem Mueller DO, I am a vivacious, super, thoughtful, excited, handsome, beautiful, combative person who loves writing and wants to share my knowledge and understanding with you.