孕早期吃什么好| 一年四季穿棉衣是什么生肖| 子宫内膜病变有什么症状| 荷尔蒙爆棚是什么意思| 阴道变黑是什么原因| 射频消融是什么手术| 肌肉痉挛吃什么药| 深圳居住证有什么用| 肺炎后遗症有什么症状| 风水宝地是什么生肖| 南京有什么山| 1882年属什么生肖| 嘴唇肿是什么原因| 菜鸟裹裹是什么快递| 猫叫是什么意思| 牙疼吃什么水果| 女人吃桑葚有什么好处| 欺凌是什么意思| 什么情况下会感染hpv病毒| 熊喜欢吃什么食物| 眷属是什么意思| 尿血吃什么药最好| 嘴唇上火吃什么药| 肺气肿吃什么食物好| 花枝招展是什么意思| 什么的嗓音| 娇嫩的意思是什么| 浑身没力气是什么原因| t和p是什么意思| 抹茶是什么| 腺体肠化是什么意思| 恙虫是什么虫| 什么样的房子风水好| 参透是什么意思| 上火牙齿痛吃什么药| 乌黑对什么| 杰字五行属什么| 什么星座黑化最吓人| 后期是什么意思啊| 部队政委是什么级别| 什么名字好听| 1314代表什么意思| 迷妹是什么意思| 官杀旺是什么意思| 智齿发炎吃什么| 属猴的幸运色是什么颜色| 痰多是什么原因引起的| 槟榔为什么那么贵| 科颜氏属于什么档次| 分泌物是褐色是什么原因| 陈惠敏和陈慧琳什么关系| 缠头是什么意思| 水克什么| 杠杆炒股是什么意思| 格物穷理是什么意思| 什么首什么胸| 冰箱什么牌子好| 孟夏是什么意思| 一个立一个羽读什么| 什么私语| 黑眼圈是什么病| 黄体生成素高是什么原因| 剑锋金命五行缺什么| 嘴巴很臭是什么原因引起的| 梦见狼是什么意思| 什么有成什么| 宫腔镜检查后需要注意什么| 社恐的人适合什么工作| 猫的眼睛晚上为什么会发光| 打狂犬疫苗挂什么科| 介怀是什么意思| 为什么会得甲状腺| 长目飞耳是什么动物| 无极调光是什么意思| 一什么春雷| 荷花和睡莲有什么区别| 扁桃体发炎是什么症状| 牵牛花是什么颜色| 停经吃什么能来月经| 甲钴胺是什么药| 什么叫散瞳| 鸟字旁的字和什么有关| 心室预激是什么意思| 旻字五行属什么| 社保指什么| 凌霄什么意思| ua是什么牌子| 八月底什么星座| 生忌是什么意思| 大林木命忌讳什么颜色| 985什么意思| 钮钴禄什么意思| 什么地移入| 牛皮糖是什么意思| 12月13日是什么日子| 绿色的大便是什么原因| 头疼恶心是什么症状| 这是什么表情包| 剁椒鱼头是什么鱼头| 学位证是什么| 市法院院长是什么级别| 腱鞘炎是什么病| 尿路感染去医院挂什么科| cheblo空调是什么牌子| na医学上是什么意思| 粉蒸肉用什么肉好吃| poppy是什么意思| 什么是禅定| 脸色发青是什么原因引起的| 明前茶什么意思| 冬枣是什么季节的水果| 守护者是什么意思| 理工男是什么意思啊| camus是什么酒| 吃什么补精养肾| china的形容词是什么| 空调买什么牌子好| 海龟汤什么意思| 霉菌性阴道炎用什么洗液好| 霜和乳有什么区别| 内疚是什么意思| 甘蔗什么时候成熟| 脚底板痒是什么原因| 7月28日什么星座| spiderking是什么牌子| 名媛是什么| 乳头刺痛什么原因| 广州有什么好吃的| 艾灸是什么东西| 诟病是什么意思| 嗓子发炎吃什么消炎药| 风加具念什么| 吃什么对肝最好| 中性粒细胞是指什么| 丁克是什么| 投资什么好| 睾丸痒是什么原因| 温碧泉属于什么档次| 为什么医生说直肠炎不用吃药| 稚嫩是什么意思| 胸下面是什么部位| 天庭饱满是什么意思| 粘假牙用什么胶| 阴虚火旺吃什么药| 什么情况不能献血| 角化型脚气用什么药| 切洋葱为什么会流泪| 系统性红斑狼疮挂什么科| 夜不能寐是什么意思| 1997年属牛是什么命| 什么面好吃| 鸿五行属什么| 夏天煲什么汤好| 谝是什么意思| 毛囊炎吃什么药最有效| 发烧41度是什么概念| 被舔下面什么感觉| 流感为什么晚上会比白天严重| 老舍被誉为什么称号| 偏光和非偏光有什么区别| 范仲淹是什么朝代的| 梦见自己鼻子流血是什么预兆| 九九重阳节是什么意思| 巳时五行属什么| 5月31号什么星座| 猫咪不能吃什么| 海狗是什么| hla医学上是什么意思| 尿道痒男吃什么消炎药| 甲子年是什么意思| 胎先露是什么意思| 尿路感染是什么原因造成的| 小孩风寒感冒吃什么药| 天年是什么意思| 咸鸭蛋不能和什么一起吃| 日加华读什么| 刚怀孕有什么症状| 贫血看什么科| 吃什么能阻止性早熟| 倒置是什么意思| 县级市市长什么级别| 南京为什么叫金陵| gtp是什么意思| 真狗是什么意思| 米黄配什么颜色好看| 小儿急性喉炎吃什么药| 2028年是什么年| cdfl是什么意思| 碳14是检查什么的| 使节是什么意思| 拔牙前需要做什么检查| t1是什么意思| 梦见和妈妈吵架是什么意思| 宝宝发烧拉肚子是什么原因| 看到壁虎是什么征兆| 十二生肖各代表什么花| 男人为什么会遗精| 蓝牙耳机什么样的好| 蛋白粉什么时候喝| 胆囊壁结晶是什么意思| a型血的人容易得什么病| 蛐蛐是什么意思| 女性得乙肝有什么症状| 复合是什么意思| 什么主食含糖量低| 精忠报国是什么生肖| 乳腺是什么| 5月20日什么星座| 减肥什么时候喝牛奶| 7月14什么星座| 跖疣是什么原因引起的| gpi是什么意思| 县公安局长什么级别| 月经来头疼是什么原因引起的| 手凉是什么原因| 顶臂长是什么意思| 低血压有什么症状| 血糖30多有什么危险| 定心丸什么意思| 胃不好吃什么养胃水果| 庚戌五行属什么| 体制内是什么意思| 宫颈萎缩意味着什么| 龟头炎挂什么科| 宇宙的中心是什么| 金蝉吃什么| 婴儿第一次发烧叫什么| 一段奶粉和二段奶粉有什么区别| 便秘和腹泻交替出现是什么意思| 锌补多了有什么症状| 清洁度1度是什么意思| 铜钱草能治什么病| 毫无违和感什么意思| 感染艾滋病有什么症状| 任意门是什么意思| 介入科主要看什么病| 意大利面是用什么做的| 碱性磷酸酶偏高是什么原因| 黄埔军校现在叫什么| 失眠缺什么维生素| 水疗是什么意思| 肩膀疼应该挂什么科| 尿酸高吃什么| 武装部部长是什么级别| 斐乐手表属于什么档次| 下面有异味用什么药| 268是什么意思| 6代表什么| 淀粉酶测定是查什么| 肺结节看什么科| 什么东西可以解酒| 唯我独尊是什么生肖| 火加良念什么| 冰清玉洁是什么意思| 血压高降不下来是什么原因| 弧度是什么意思| barry是什么意思| 牛尾炖什么最好| 什么是友谊| 这个字叫什么| 1929年属什么| 过氧化氢一个加号什么意思| 头上的旋有什么说法| 腿发热是什么原因引起的| 百度Jump to content

[隋文静韩聪]经历风雨 葱桶组合的“金桥之旅”

From Wikipedia, the free encyclopedia
Common Vulnerability Scoring System
AbbreviationCVSS
StatusActive
First publishedFebruary 2005 (2005-02)
Latest version4.0
OrganizationForum of Incident Response and Security Teams
DomainInformation security
Websitewww.first.org/cvss/
百度 桂林市旅游发展委员会对视频中所涉及的问题展开一系列调查后初步认定,该旅游团涉嫌不合理低价游,涉事旅行社和导游将被从严从重处理。

The Common Vulnerability Scoring System (CVSS) is an open framework for rating the severity of security vulnerabilities in computing systems. Scores are calculated based on a formula with several metrics that approximate ease and impact of an exploit. It assigns scores ranging from 0 to 10, with 10 indicating the most severe. While many use only the CVSS Base score for determining severity, temporal and environmental scores also exist, to factor in availability of mitigations and how widespread vulnerable systems are within an organization, respectively.[1]

The current version of CVSS (CVSSv4.0) was released in November 2023.[2]

CVSS is not intended to be used as a method for patch management prioritization, but is used like that regardless.[3] A more effective approach is to integrate CVSS with predictive models like the Exploit Prediction Scoring System (EPSS), which helps prioritize remediation efforts based on the likelihood of real-world exploitation.[4]

History

[edit]

Research by the National Infrastructure Advisory Council (NIAC) in 2003/2004 led to the launch of CVSS version 1 (CVSSv1) in February 2005,[5] with the goal of being "designed to provide open and universally standard severity ratings of software vulnerabilities". This initial draft had not been subject to peer review or review by other organizations. In April 2005, NIAC selected the Forum of Incident Response and Security Teams (FIRST) to become the custodian of CVSS for future development.[6][7]

Feedback from vendors using CVSSv1 in production suggested there were "significant issues with the initial draft of CVSS". Work on CVSS version 2 (CVSSv2) began in April 2005 with the final specification being launched in June 2007.[8]

Further feedback resulted in work beginning on CVSS version 3[9] in 2012, ending with CVSSv3.0 being released in June 2015.[10][5]

Terminology

[edit]

The CVSS assessment measures three areas of concern:

  1. base metrics for qualities intrinsic to a vulnerability,
  2. temporal metrics for characteristics that evolve over the lifetime of vulnerability, and
  3. environmental metrics for vulnerabilities that depend on a particular implementation or environment.

A numerical score is generated for each of these metric groups. A vector string (or simply "vector" in CVSSv2) represents the values of all the metrics as a block of text.

Version 2

[edit]

Complete documentation for CVSSv2 is available from FIRST.[11] A summary is provided below.

Base metrics

[edit]

Access Vector

[edit]

The access vector (AV) shows how a vulnerability may be exploited.

Value Description Score
Local (L) The attacker must either have physical access to the vulnerable system (e.g. firewire attacks) or a local account (e.g. a privilege escalation attack). 0.395
Adjacent Network (A) The attacker must have access to the broadcast or collision domain of the vulnerable system (e.g. ARP spoofing, Bluetooth attacks). 0.646
Network (N) The vulnerable interface is working at layer 3 or above of the OSI Network stack. These types of vulnerabilities are often described as remotely exploitable (e.g. a remote buffer overflow in a network service) 1.0

Access Complexity

[edit]

The access complexity (AC) metric describes how easy or difficult it is to exploit the discovered vulnerability.

Value Description Score
High (H) Specialised conditions exist, such as a race condition with a narrow window, or a requirement for social engineering methods that would be readily noticed by knowledgeable people. 0.35
Medium (M) There are some additional requirements for the attack, such as a limit on the origin of the attack, or a requirement for the vulnerable system to be running with an uncommon, non-default configuration. 0.61
Low (L) There are no special conditions for exploiting the vulnerability, such as when the system is available to large numbers of users, or the vulnerable configuration is ubiquitous. 0.71

Authentication

[edit]

The authentication (Au) metric describes the number of times that an attacker must authenticate to a target to exploit it. It does not include (for example) authentication to a network in order to gain access. For locally exploitable vulnerabilities, this value should only be set to Single or Multiple if further authentication is required after initial access.

Value Description Score
Multiple (M) Exploitation of the vulnerability requires that the attacker authenticate two or more times, even if the same credentials are used each time. 0.45
Single (S) The attacker must authenticate once in order to exploit the vulnerability. 0.56
None (N) There is no requirement for the attacker to authenticate. 0.704

Impact metrics

[edit]

Confidentiality

[edit]

The confidentiality (C) metric describes the impact on the confidentiality of data processed by the system.

Value Description Score
None (N) There is no impact on the confidentiality of the system. 0.0
Partial (P) There is considerable disclosure of information, but the scope of the loss is constrained such that not all of the data is available. 0.275
Complete (C) There is total information disclosure, providing access to any / all data on the system. Alternatively, access to only some restricted information is obtained, but the disclosed information presents a direct, serious impact. 0.660

Integrity

[edit]

The Integrity (I) metric describes the impact on the integrity of the exploited system.

Value Description Score
None (N) There is no impact on the integrity of the system. 0.0
Partial (P) Modification of some data or system files is possible, but the scope of the modification is limited. 0.275
Complete (C) There is total loss of integrity; the attacker can modify any files or information on the target system. 0.660

Availability

[edit]

The availability (A) metric describes the impact on the availability of the target system. Attacks that consume network bandwidth, processor cycles, memory, or any other resources affect the availability of a system.

Value Description Score
None (N) There is no impact on the availability of the system. 0.0
Partial (P) There is reduced performance or loss of some functionality. 0.275
Complete (C) There is total loss of availability of the attacked resource. 0.660

Calculations

[edit]

These six metrics are used to calculate the exploitability and impact sub-scores of the vulnerability. These sub-scores are used to calculate the overall base score.

The metrics are concatenated to produce the CVSS Vector for the vulnerability.

Example

[edit]

A buffer overflow vulnerability affects web server software that allows a remote user to gain partial control of the system, including the ability to cause it to shut down:

Metric Value Description
Attack Vector Network The vulnerability may be accessed from any network that can access the target system — typically the whole of the internet.
Attack Complexity Low There are no special requirements for access.
Authentication None There is no requirement for authentication in order to exploit the vulnerability.
Confidentiality Partial The attacker can read some files and data on the system.
Integrity Partial The attacker can alter some files and data on the system.
Availability Complete The attacker can cause the system and web service to become unavailable / unresponsive by shutting the system down.

This would give an exploitability sub-score of 10, and an impact sub-score of 8.5, giving an overall base score of 9.0. The vector for the base score in this case would be AV:N/AC:L/Au:N/C:P/I:P/A:C. The score and vector are normally presented together to allow the recipient to fully understand the nature of the vulnerability and to calculate their own environmental score if necessary.

Temporal metrics

[edit]

The value of temporal metrics change over the lifetime of the vulnerability, as exploits are developed, disclosed and automated and as mitigations and fixes are made available.

Exploitability

[edit]

The exploitability (E) metric describes the current state of exploitation techniques or automated exploitation code.

Value Description Score
Unproven (U) No exploit code is available, or the exploit is theoretical. 0.85
Proof-of-concept (P) Proof-of-concept exploit code or demonstration attacks are available, but not practical for widespread use. Not functional against all instances of the vulnerability. 0.9
Functional (F) Functional exploit code is available, and works in most situations where the vulnerability is present. 0.95
High (H) The vulnerability can be exploited by automated code, including mobile code (such as a worm or virus). 1.0
Not Defined (ND) This is a signal to ignore this score. 1.0

Remediation Level

[edit]

The remediation level (RL) of a vulnerability allows the temporal score of a vulnerability to decrease as mitigations and official fixes are made available.

Value Description Score
Official Fix (O) A complete vendor solution is available — either a patch or an upgrade. 0.87
Temporary Fix (T) There is an official but temporary fix / mitigation available from the vendor. 0.90
Workaround (W) There is an unofficial, non-vendor solution or mitigation available — perhaps developed or suggested by users of the affected product or another third party. 0.95
Unavailable (U) There is no solution available, or it is impossible to apply a suggested solution. This is the usual initial state of the remediation level when a vulnerability is identified. 1.0
Not Defined (ND) This is a signal to ignore this score. 1.0

Report Confidence

[edit]

The report confidence (RC) of a vulnerability measures the level of confidence in the existence of the vulnerability and also the credibility of the technical details of the vulnerability.

Value Description Score
Unconfirmed (UC) A single unconfirmed source, or multiple conflicting sources. Rumored vulnerability. 0.9
Uncorroborated (UR) Multiple sources that broadly agree — there may be a level of remaining uncertainty about the vulnerability 0.95
Confirmed (C) Acknowledged and confirmed by the vendor or manufacturer of the affected product. 1.0
Not Defined (ND) This is a signal to ignore this score. 1.0

Calculations

[edit]

These three metrics are used in conjunction with the base score that has already been calculated to produce the temporal score for the vulnerability with its associated vector.

The formula used to calculate the temporal score is:

Example
[edit]

To continue with the example above, if the vendor were first informed of the vulnerability by a posting of proof-of-concept code to a mailing list, the initial temporal score would be calculated using the values shown below:

Metric Value Description
Exploitability Proof-of-concept Proof-of concept, non-automated code is provided to show basic exploit functionality.
Remediation Level Unavailable The vendor has not yet had the opportunity to provide a mitigation or fix.
Report Confidence Unconfirmed There has been a single report of the vulnerability.

This would give a temporal score of 7.3, with a temporal vector of E:P/RL:U/RC:UC (or a full vector of AV:N/AC:L/Au:N/C:P/I:P/A:C/E:P/RL:U/RC:UC).

If the vendor then confirms the vulnerability, then the score rises to 8.1, with a temporal vector of E:P/RL:U/RC:C

A temporary fix from the vendor would reduce the score back to 7.3 (E:P/RL:T/RC:C), while an official fix would reduce it further to 7.0 (E:P/RL:O/RC:C). As it is not possible to be confident that every affected system has been fixed or patched, the temporal score cannot reduce below a certain level based on the vendor's actions, and may increase if an automated exploit for the vulnerability is developed.

Environmental metrics

[edit]

The environmental metrics use the base and current temporal score to assess the severity of a vulnerability in the context of the way that the vulnerable product or software is deployed. This measure is calculated subjectively, typically by affected parties.

Collateral Damage Potential

[edit]

The collateral damage potential (CDP) metric measures the potential loss or impact on either physical assets such as equipment (and lives), or the financial impact upon the affected organisation if the vulnerability is exploited.

Value Description Score
None (N) No potential for loss of property, revenue or productivity 0
Low (L) Slight damage to assets, or minor loss of revenue or productivity 0.1
Low-Medium (LM) Moderate damage or loss 0.3
Medium-High (MH) Significant damage or loss 0.4
High (H) Catastrophic damage or loss 0.5
Not Defined (ND) This is a signal to ignore this score. 0

Target Distribution

[edit]

The target distribution (TD) metric measures the proportion of vulnerable systems in the environment.

Value Description Score
None (N) No target systems exist, or they only exist in laboratory settings 0
Low (L) 1–25% of systems at risk 0.25
Medium (M) 26–75% of systems at risk 0.75
High (H) 76–100% of systems at risk 1.0
Not Defined (ND) This is a signal to ignore this score. 1.0

Impact Subscore Modifier

[edit]

Three further metrics assess the specific security requirements for confidentiality (CR), integrity (IR) and availability (AR), allowing the environmental score to be fine-tuned according to the users' environment.

Value Description Score
Low (L) Loss of (confidentiality / integrity / availability) is likely to have only a limited effect on the organisation. 0.5
Medium (M) Loss of (confidentiality / integrity / availability) is likely to have a serious effect on the organisation. 1.0
High (H) Loss of (confidentiality / integrity / availability) is likely to have a catastrophic effect on the organisation. 1.51
Not Defined (ND) This is a signal to ignore this score. 1.0

Calculations

[edit]

The five environmental metrics are used in conjunction with the previously assessed base and temporal metrics to calculate the environmental score and to produce the associated environmental vector.

Example
[edit]

If the aforementioned vulnerable web server were used by a bank to provide online banking services, and a temporary fix was available from the vendor, then the environmental score could be assessed as:

Metric Value Description
Collateral Damage Potential Medium-High This value would depend on what information the attacker is able to access if a vulnerable system is exploited. In this case I am assuming that some personal banking information is available, therefore there is a significant reputational impact on the bank.
Target Distribution High All of the bank's web servers run the vulnerable software.
Confidentiality Requirement High Customers expect their banking information to be confidential.
Integrity Requirement High Financial and personal information should not be changeable without authorization.
Availability Requirement Low Unavailability of online banking services is likely to be an inconvenience for customers, but not catastrophic.

This would give an environmental score of 8.2, and an environmental vector of CDP:MH/TD:H/CR:H/IR:H/AR:L. This score is within the range 7.0-10.0, and therefore constitutes a critical vulnerability in the context of the affected bank's business.

Criticism of Version 2

[edit]

Several vendors and organizations expressed dissatisfaction with CVSSv2.

Risk Based Security, which manages the Open Source Vulnerability Database, and the Open Security Foundation jointly published a public letter to FIRST regarding the shortcomings and failures of CVSSv2.[12] The authors cited a lack of granularity in several metrics, which results in CVSS vectors and scores that do not properly distinguish vulnerabilities of different type and risk profiles. The CVSS scoring system was also noted as requiring too much knowledge of the exact impact of the vulnerability.

Oracle introduced the new metric value of "Partial+" for Confidentiality, Integrity, and Availability, to fill perceived gaps in the description between Partial and Complete in the official CVSS specifications.[13]

Version 3

[edit]

To address some of these criticisms, development of CVSS version 3 was started in 2012. The final specification was named CVSSv3.0 and released in June 2015. In addition to a Specification Document, a User Guide and Examples document were also released.[14]

Several metrics were changed, added, and removed. The numerical formulas were updated to incorporate the new metrics while retaining the existing scoring range of 0-10. Textual severity ratings of None (0), Low (0.1-3.9), Medium (4.0-6.9), High (7.0-8.9), and Critical (9.0-10.0)[15] were defined, similar to the categories NVD defined for CVSSv2 that were not part of that standard.[16]

Changes from Version 2

[edit]

Base metrics

[edit]

In the Base vector, the new metrics User Interaction (UI) and Privileges Required (PR) were added to help distinguish vulnerabilities that required user interaction or user or administrator privileges to be exploited. Previously, these concepts were part of the Access Vector metric of CVSSv2. UI can take the values None or Required; attacks that do not require logging in as a user are considered more severe. PR can take the values None, Low, or High; similarly, attacks requiring fewer privileges are more severe.

The Base vector also saw the introduction of the new Scope (S) metric, which was designed to make clear which vulnerabilities may be exploited and then used to attack other parts of a system or network. These new metrics allow the Base vector to more clearly express the type of vulnerability being evaluated.

The Confidentiality, Integrity, and Availability (C, I, A) metrics were updated to have scores consisting of None, Low, or High, rather than the None, Partial, and Complete of CVSSv2. This allows more flexibility in determining the impact of a vulnerability on CIA metrics.

Access Complexity was renamed Attack Complexity (AC) to make clear that access privileges were moved to a separate metric. This metric now describes how repeatable exploit of this vulnerability may be; AC is High if the attacker requires perfect timing or other circumstances (other than user interaction, which is also a separate metric) which may not be easily duplicated on future attempts.

Attack Vector (AV) saw the inclusion of a new metric value of Physical (P), to describe vulnerabilities that require physical access to the device or system to perform.

Temporal metrics

[edit]

The Temporal metrics were essentially unchanged from CVSSv2.

Environmental metrics

[edit]

The Environmental metrics of CVSSv2 were completely removed and replaced with essentially a second Base score, known as the Modified vector. The Modified Base is intended to reflect differences within an organization or company compared to the world as a whole. New metrics to capture the importance of Confidentiality, Integrity, and Availability to a specific environment were added.

Criticism of Version 3

[edit]

In a blog post in September 2015, the CERT Coordination Center discussed limitations of CVSSv2 and CVSSv3.0 for use in scoring vulnerabilities in emerging technology systems such as the Internet of Things.[17]

Version 3.1

[edit]

A minor update to CVSS was released on June 17, 2019. The goal of CVSSv3.1 was to clarify and improve upon the existing CVSSv3.0 standard without introducing new metrics or metric values, allowing for frictionless adoption of the new standard by both scoring providers and scoring consumers alike. Usability was a prime consideration when making improvements to the CVSS standard. Several changes being made in CVSSv3.1 are to improve the clarity of concepts introduced in CVSSv3.0, and thereby improve the overall ease of use of the standard.

FIRST has used input from industry subject-matter experts to continue to enhance and refine CVSS to be more and more applicable to the vulnerabilities, products, and platforms being developed over the past 15 years and beyond. The primary goal of CVSS is to provide a deterministic and repeatable way to score the severity of a vulnerability across many different constituencies, allowing consumers of CVSS to use this score as input to a larger decision matrix of risk, remediation, and mitigation specific to their particular environment and risk tolerance.

Updates to the CVSSv3.1 specification include clarification of the definitions and explanation of existing base metrics such as Attack Vector, Privileges Required, Scope, and Security Requirements. A new standard method of extending CVSS, called the CVSS Extensions Framework, was also defined, allowing a scoring provider to include additional metrics and metric groups while retaining the official Base, Temporal, and Environmental Metrics. The additional metrics allow industry sectors such as privacy, safety, automotive, healthcare, etc., to score factors that are outside the core CVSS standard. Finally, the CVSS Glossary of Terms has been expanded and refined to cover all terms used throughout the CVSSv3.1 documentation.

Version 4.0

[edit]

Version 4.0 was officially released in November 2023,[2] and is available at FIRST.[18] Among several clarifications, the most notable changes are the new base metric Attack Requirements which complement the metric Attack Complexity with an assessment what conditions at the target side are needed to exploit a vulnerability. Further, the Impact metrics are split into impact on the vulnerable system itself and impact on subsequent systems (this replaces the Scope metric from prior versions).

The base metrics are now as follows.

  • Attack Vector (AV): Over which (physical) way can you exploit a vulnerability? [N] network, [A] adjacent (i.e., limited to direct connections), [I] interaction (e.g. via SSH or Keyboard), or [P] physical (e.g. manipulate or observe hardware).
  • Attack Complexity (AC): Are there any further counter measures the attacker has to circumvent, and how hard is it to do so? [L] low, or [H] high (e.g. data execution prevention).
  • Attack Requirements (AT): Are there any conditions necessary for an attack which the attacker cannot influence? [N] none, or [P] present (e.g. a race condition must be won, or the system is in a specific state).
  • Privileges Required (PR): Is it required to have any privileges on the target system? [N] none (unauthenticated), [L] low (normal user), or [H] high (administrative access).
  • User Interaction (UI): Does the (legitimate) user of the system need to do anything to make the attack possible? [N] none, [P] passive (e.g. accidentally visiting a malicious website), or [A] active (e.g. executing a malicious office macro).
  • Vulnerable System Confidentiality Impact (VC): [N] none, [L] low, or [H] high.
  • Vulnerable System Integrity Impact (VI): [N] none, [L] low, or [H] high.
  • Vulnerable System Availability Impact (VA): [N] none, [L] low, or [H] high.
  • Subsequent System Confidentiality Impact (SC): [N] none, [L] low, or [H] high.
  • Subsequent System Integrity Impact (SI): [N] none, [L] low, or [H] high.
  • Subsequent System Availability Impact (SA): [N] none, [L] low, or [H] high.

Additionally to these base metrics, there are optional metrics regarding public availability of an exploit, environment specific thread modelling, system recovery, and others.

Example

[edit]

Assume there is an SQL-Injection in an online web shop. The database user of the online shop software only has read access to the database. Further the injection is in a view of the shop which is only visible to registered customers. The CVSS 4.0 base vector is as follows.

  • AV:N as the vulnerability can be triggered over the web
  • AC:L as SQL-Injections can be exploited reliably via scripts (assuming the online shop has no counter measures).
  • AT:N as the attack doesn't depend on specific system conditions
  • PR:L as attackers need to be authenticated as regular user, but no administrative rights are needed
  • UI:N as no other users are involved
  • VC:H as attackers can read all tables in the database
  • VI:N as attackers have no write access
  • VA:L as attackers might execute long queries on the database which temporarily render the database slower or unresponsive
  • SC:N (we have no further information on subsequent systems)
  • SI:N (we have no further information on subsequent systems)
  • SA:L we can expect other systems involved in order management and logistics to be affected by an unresponsive database

This results in the vector AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:L

Adoption

[edit]

Versions of CVSS have been adopted as the primary method for quantifying the severity of vulnerabilities by a wide range of organizations and companies, including:

See also

[edit]

References

[edit]
  1. ^ "Common Vulnerability Scoring System: Specification Document". FIRST.org. FIRST (Forum of Incident Response and Security Teams). 2019. Retrieved 27 July 2025.{{cite web}}: CS1 maint: url-status (link)
  2. ^ a b "FIRST has officially published the latest version of the Common Vulnerability Scoring System (CVSS v4.0)". FIRST. Archived from the original on 2025-08-06.
  3. ^ Spring, J. M.; Hatleback, E.; Manion, A.; Shick, D. (December 2018). "Towards improving CVSS" (PDF). Carnegie Mellon University Technical Reports.
  4. ^ Jacobs, Jay; Romanosky, Sasha; Suciu, Octavian; Edwards, Benjamin; Sarabi, Armin (2023). "Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions with Community-Driven Insights". arXiv:2302.14172 [cs.CR].
  5. ^ a b Johnson, Pontus; Lagerstrom, Robert; Ekstedt, Mathias; Franke, Ulrik (2025-08-06). "Can the Common Vulnerability Scoring System be Trusted? A Bayesian Analysis". IEEE Transactions on Dependable and Secure Computing. 15 (6): 1002–1015. doi:10.1109/TDSC.2016.2644614. ISSN 1545-5971. S2CID 53287880.
  6. ^ "CVSS v1 Archive". First.org, Inc. Retrieved 2025-08-06.
  7. ^ "NATIONAL INFRASTRUCTURE ADVISORY COUNCIL / MEETING AGENDA / Tuesday, April 12, 2005 / 1:30-4:30 p.m. / National Press Club / Washington, DC" (PDF). Cybersecurity and Infrastructure Security Agency. 2025-08-06. Retrieved 2025-08-06. MITRE and CERT/CC both bring distinct but important value. Based on those proposals, the Working Group strongly suggests that these organizations work under the umbrella provided by Global FIRST for the CVSS.
  8. ^ "CVSS v2 History". First.org, Inc. Retrieved 2025-08-06.
  9. ^ "Announcing the CVSS Special Interest Group for CVSS v3 Development". First.org, Inc. Archived from the original on February 17, 2013. Retrieved March 2, 2013.
  10. ^ "Common Vulnerability Scoring System, V3 Development Update". First.org, Inc. Retrieved November 13, 2015.
  11. ^ "CVSS v2 Complete Documentation". First.org, Inc. Retrieved 2025-08-06.
  12. ^ "CVSS - Shortcomings, Faults and Failures" (PDF). Risk Based Security. 2025-08-06. Archived from the original (PDF) on 2025-08-06. Retrieved 2025-08-06.
  13. ^ "CVSS Scoring System". Oracle. 2025-08-06. Retrieved 2025-08-06.
  14. ^ "CVSS v3,.0 Specification Document". FIRST, Inc. Retrieved 2025-08-06.
  15. ^ "Common Vulnerability Scoring System v3.0: Specification Document (Qualitative Severity Rating Scale)". First.org. Retrieved 2025-08-06.
  16. ^ "NVD Common Vulnerability Scoring System Support v2". National Vulnerability Database. National Institute of Standards and Technology. Retrieved March 2, 2013.
  17. ^ "CVSS and the Internet of Things". CERT Coordination Center. 2025-08-06. Retrieved 2025-08-06.
  18. ^ "CVSS v4.0 User Guide". FIRST — Forum of Incident Response and Security Teams. Retrieved 2025-08-06.
  19. ^ "National Vulnerability Database Home". Nvd.nist.gov. Retrieved 2025-08-06.
  20. ^ "The Open Source Vulnerability Database". OSVDB. Retrieved 2025-08-06.
  21. ^ "Vulnerability Severity Using CVSS". CERT Coordination Center. 2025-08-06. Retrieved 2025-08-06.
[edit]
木瓜和什么不能一起吃 喜欢是什么 12朵玫瑰代表什么意思 帕金森看什么科室 什么叫瑕疵
卖酒需要办理什么证 唐筛检查什么 心肌缺血吃什么中药 什么血型招蚊子叮咬 小麦粉可以做什么吃的
吃什么东西涨奶最快 跖疣念什么字 1946属什么生肖 子宫切除对女人有什么影响 频繁是什么意思
北京属于什么方向 布洛芬缓释胶囊是什么药 清道夫鱼为什么不能吃 音节是指什么 什么是虚无主义
长脸适合什么耳环hcv8jop4ns8r.cn 甲状腺检查挂什么科shenchushe.com 年检是什么意思hcv8jop3ns6r.cn 2005年属什么hcv7jop9ns7r.cn 肠胃消化不好吃什么药hcv9jop4ns7r.cn
吉祥如意是什么意思hcv8jop3ns2r.cn 男人吃什么更持久hcv8jop9ns8r.cn 双侧肾盂分离是什么意思hcv7jop9ns2r.cn 竖心旁与什么有关hcv7jop9ns3r.cn giada是什么牌子hcv7jop9ns1r.cn
cj什么意思hcv8jop5ns4r.cn 血红蛋白偏高是什么原因imcecn.com 尿不出来吃什么药hcv9jop6ns0r.cn 亦木读什么bfb118.com 卡布奇诺是什么咖啡hcv8jop4ns1r.cn
切片什么意思hcv8jop3ns2r.cn 蛋白粉有什么作用hcv8jop7ns9r.cn bmo是什么意思hcv7jop4ns8r.cn 2023年是属什么生肖hcv8jop8ns2r.cn 肝脏彩超能检查出什么inbungee.com
百度