CVSS v4.0 Specification Document (2024)

This page updates with each release of the CVSS standard. It is currently CVSS version 4.0, released on November 1, 2023. If you wish to use a specific version of the Specification Document, use:

CVSS v4.0 Specification Document (1)

Also available in PDF format.

Document Version: 1.2

The Common Vulnerability Scoring System (CVSS) is an open framework forcommunicating the characteristics and severity of software vulnerabilities. CVSSconsists of four metric groups: Base, Threat, Environmental, and Supplemental.The Base group represents the intrinsic qualities of a vulnerability that areconstant over time and across user environments, the Threat group reflects thecharacteristics of a vulnerability that change over time, and the Environmentalgroup represents the characteristics of a vulnerability that are unique to auser's environment. Base metric values are combined with default values thatassume the highest severity for Threat and Environmental metrics to produce ascore ranging from 0 to 10. To further refine a resulting severity score, Threatand Environmental metrics can then be amended based on applicable threatintelligence and environmental considerations. Supplemental metrics do notmodify the final score, and are used as additional insight into thecharacteristics of a vulnerability. A CVSS vector string consists of acompressed textual representation of the values used to derive the score. Thisdocument provides the official specification for CVSS version 4.0.

The most current CVSS resources can be found at https://www.first.org/cvss/

CVSS is owned and managed by FIRST.Org, Inc. (FIRST), a US-based non-profitorganization, whose mission is to help computer security incident response teamsacross the world. FIRST reserves the right to update CVSS and this documentperiodically at its sole discretion. While FIRST owns all rights and interest inCVSS, it licenses it to the public freely for use, subject to the conditionsbelow. Membership in FIRST is not required to use or implement CVSS. FIRST does,however, require that any individual or entity using CVSS give properattribution, where applicable, that CVSS is owned by FIRST and used bypermission. Further, FIRST requires as a condition of use that any individual orentity which publishes CVSS data conforms to the guidelines described in thisdocument and provides both the score and the vector string so others canunderstand how the score was derived.

The Common Vulnerability Scoring System (CVSS) captures the principal technicalcharacteristics of software, hardware and firmware vulnerabilities. Its outputsinclude numerical scores indicating the severity of a vulnerability relative toother vulnerabilities.

CVSS is composed of four metric groups: Base, Threat, Environmental, andSupplemental. The Base Score reflects the severity of a vulnerability accordingto its intrinsic characteristics which are constant over time and assumes thereasonable worst-case impact across different deployed environments. The ThreatMetrics adjust the severity of a vulnerability based on factors, such as theavailability of proof-of-concept code or active exploitation. The EnvironmentalMetrics further refine the resulting severity score to a specific computingenvironment. They consider factors such as the presence of mitigations in thatenvironment and the criticality attributes of the vulnerable system. Finally,the Supplemental Metrics describe and measure additional extrinsic attributes ofa vulnerability, intended to add context.

Base Metrics, and optionally Supplemental Metrics, are provided by theorganization maintaining the vulnerable system, or a third party assessment ontheir behalf. Threat and Environmental information is available to only the endconsumer. Consumers of CVSS should enrich the Base metrics with Threat andEnvironmental metric values specific to their use of the vulnerable system toproduce a score that provides a more comprehensive input to risk assessmentspecific to their organization. Consumers may use CVSS information as input toan organizational vulnerability management process that also considers factorsthat are not part of CVSS in order to rank the threats to their technologyinfrastructure and make informed remediation decisions. Such factors mayinclude, but are not limited to: regulatory requirements, number of customersimpacted, monetary losses due to a breach, life or property threatened, orreputational impacts of a potential exploited vulnerability. These factors areoutside the scope of CVSS.

The benefits of CVSS include the provisioning of a standardized vendor andplatform agnostic vulnerability scoring methodology. It is an open framework,providing transparency to the individual characteristics and methodology used toderive a score.

Metrics

CVSS is composed of four metric groups: Base, Threat, Environmental, andSupplemental, each consisting of a set of metrics, as shown in Figure 1.

CVSS v4.0 Specification Document (2)

Figure 1: CVSS Metric Groups

The Base metric group represents the intrinsic characteristics of avulnerability that are constant over time and across user environments. It iscomposed of two sets of metrics: the Exploitability metrics and the Impactmetrics.

The Exploitability metrics reflect the ease and technical means by which thevulnerability can be exploited. That is, they represent characteristics of the“thing that is vulnerable”, which we refer to formally as the “vulnerablesystem”. The Impact metrics reflect the direct consequence of a successfulexploit, and represent the consequence to the “things that suffer the impact”,which may include impact on the vulnerable system and/or the downstream impacton what is formally called the “subsequent system(s)”.

While the vulnerable system is typically a software application, operatingsystem, module, driver, etc. (or possibly a hardware device), the subsequentsystem could be any of those examples but also includes human safety. Thispotential for measuring the impact of a vulnerability other than the vulnerablesystem, was a key feature introduced with CVSS v3.0. This property (formerlyknown as “Scope”), is captured by the separation of impacts to the vulnerablesystem and to subsequent systems, discussed later.

The Threat metric group reflects the characteristics of a vulnerability relatedto threat that may change over time but not necessarily across userenvironments. For example, confirmation that the vulnerability has neither beenexploited nor has any proof-of-concept exploit code or instructions publiclyavailable will lower the resulting CVSS score. The values found in this metricgroup may change over time.

The Environmental metric group represents the characteristics of a vulnerabilitythat are relevant and unique to a particular consumers’ environment.Considerations include the presence of security controls which may mitigate someor all consequences of a successful attack, and the relative importance of avulnerable system within a technology infrastructure.

The Supplemental metric group includes metrics that provide context as well asdescribe and measure additional extrinsic attributes of a vulnerability. Theresponse to each metric within the Supplemental metric group is to be determinedby the CVSS consumer, allowing the usage of an end-user risk analysis system toapply locally significant severity to the metrics and values. No metric will,within its specification, have any impact on the final CVSS score (e.g.CVSS-BTE). Consumer organizations may then assign importance and/or effectiveimpact of each metric, or set/combination of metrics, giving them more, less, orabsolutely no effect on the categorization, prioritization, and assessment ofthe vulnerability. Metrics and values will simply convey additional extrinsiccharacteristics of the vulnerability itself.

Each of these metrics are discussed in further detail below. The User Guidecontains scoring rubrics for the Base Metrics that may be useful when scoring.

Assessment

When the Base metrics are assigned values by an analyst, the Base metricsassessment results in a score ranging from 0.0 to 10.0.

The Base metrics assessment can then be further refined by assessing the Threatand Environmental metrics in order to more accurately reflect the relativeseverity posed by a vulnerability to a user’s environment at a specific point intime. Assessment of the Threat and Environmental metrics is not required, but ishighly recommended for more meaningful results.

Generally, the Base metrics are specified by vulnerability bulletin analysts,product vendors, or application vendors because they typically possess the mostaccurate information about the characteristics of a vulnerability. The Threatand Environmental metrics are specified by consumer organizations because theyare best able to assess the potential impact of a vulnerability within their owncomputing environment, at a given point in time.

Assessing CVSS metrics also produces a vector string, a textual representationof the metric values used to derive a quantitative score and qualitative ratingfor the vulnerability. This vector string is a specifically formatted textstring that contains each value assigned to each metric, and should be displayedwith the vulnerability score.

The scoring assessment and vector string are explained further below.

Note that all metrics should be assessed under the assumption that the attackerhas perfect knowledge of the vulnerability. That is, the analyst need notconsider the means by which the vulnerability was identified. In addition, it islikely that many different types of individuals will be assessingvulnerabilities (e.g., software vendors, vulnerability bulletin analysts,security product vendors), however, note that CVSS assessment is intended to beagnostic to the individual and their organization.

Nomenclature

Numerical CVSS Scores have very different meanings based on the metrics used tocalculate them. Regarding prioritization, the usefulness of a numerical CVSSscore is directly proportional to the CVSS metrics leveraged to generate thatscore. Therefore, numerical CVSS scores should be labeled using nomenclaturethat communicates the metrics used in its generation.

CVSS NomenclatureCVSS Metrics Used
CVSS-BBase metrics
CVSS-BEBase and Environmental metrics
CVSS-BTBase and Threat metrics
CVSS-BTEBase, Threat, Environmental metrics

Additional Notes:

  • This nomenclature should be used wherever a numerical CVSS value isdisplayed or communicated.

  • The application of Environmental and Threat metrics is the responsibility ofthe CVSS consumer. Assessment providers such as product maintainers andother public/private entities such as the National Vulnerability Database(NVD) typically provide only the Base Scores enumerated as CVSS-B.

  • The inclusion of the “E” in the nomenclature is appropriate if anyEnvironmental metrics are used to generate the resulting score.

  • The inclusion of the “T” in the nomenclature is appropriate if any Threatmetrics are used to generate the resulting score.

  • In CVSS v4.0, Base, Threat, and Environmental metric values are alwaysconsidered in the calculation of the final score. The absence of explicitThreat and/or Environmental metric selections will still result in acomplete score using default (“Not Defined”) values. This nomenclature makesit explicit and clear about which metric groups were considered in thenumerical CVSS score provided.

Exploitability Metrics

As previously mentioned, the Exploitability metrics reflect the characteristicsof the “thing that is vulnerable”, which we refer to formally as thevulnerable system. Therefore, each of the Exploitability metrics listed belowshould be assessed relative to the vulnerable system, and reflect the propertiesof the vulnerability that lead to a successful attack.

When assessing Base metrics, it should be assumed that the attacker has advancedknowledge of the target system, including general configuration and defaultdefense mechanisms (e.g., built-in firewalls, rate limits, traffic policing).For example, exploiting a vulnerability that results in repeatable,deterministic success should still be considered a Low value for AttackComplexity, independent of the attacker's knowledge or capabilities.Furthermore, target-specific attack mitigation (e.g., custom firewall filters,access lists) should instead be reflected in the Environmental metric scoringgroup.

Specific configurations should not impact any attribute contributing to the CVSSBase metric assessment , i.e., if a specific configuration is required for anattack to succeed, the vulnerable system should be assessed assuming it is inthat configuration.

Attack Vector (AV)

This metric reflects the context by which vulnerability exploitation ispossible. This metric value (and consequently the resulting severity) will belarger the more remote (logically, and physically) an attacker can be in orderto exploit the vulnerable system. The assumption is that the number of potentialattackers for a vulnerability that could be exploited from across a network islarger than the number of potential attackers that could exploit a vulnerabilityrequiring physical access to a device, and therefore warrants a greaterseverity. The list of possible values is presented in Table 1.

Table 1: Attack Vector

Metric ValueDescription
Network (N)The vulnerable system is bound to the network stack and the set of possible attackers extends beyond the other options listed below, up to and including the entire Internet. Such a vulnerability is often termed “remotely exploitable” and can be thought of as an attack being exploitable at the protocol level one or more network hops away (e.g., across one or more routers). An example of a network attack is an attacker causing a denial of service (DoS) by sending a specially crafted TCP packet across a wide area network (e.g., CVE-2004-0230).
Adjacent (A)The vulnerable system is bound to a protocol stack, but the attack is limited at the protocol level to a logically adjacent topology. This can mean an attack must be launched from the same shared proximity (e.g., Bluetooth, NFC, or IEEE 802.11) or logical network (e.g., local IP subnet), or from within a secure or otherwise limited administrative domain (e.g., MPLS, secure VPN within an administrative network zone). One example of an Adjacent attack would be an ARP (IPv4) or neighbor discovery (IPv6) flood leading to a denial of service on the local LAN segment (e.g., CVE-2013-6014).
Local (L)The vulnerable system is not bound to the network stack and the attacker’s path is via read/write/execute capabilities. Either: the attacker exploits the vulnerability by accessing the target system locally (e.g., keyboard, console), or through terminal emulation (e.g., SSH); or the attacker relies on User Interaction by another person to perform actions required to exploit the vulnerability (e.g., using social engineering techniques to trick a legitimate user into opening a malicious document).
Physical (P)The attack requires the attacker to physically touch or manipulate the vulnerable system. Physical interaction may be brief (e.g., evil maid attack1) or persistent. An example of such an attack is a cold boot attack in which an attacker gains access to disk encryption keys after physically accessing the target system. Other examples include peripheral attacks via FireWire/USB Direct Memory Access (DMA).

Assessment Guidance: When deciding between Network and Adjacent, if an attackcan be launched over a wide area network or from outside the logically adjacentadministrative network domain, use Network.

Attack Complexity (AC)

This metric captures measurable actions that must be taken by the attacker toactively evade or circumvent existing built-in security-enhancing conditionsin order to obtain a working exploit. These are conditions whose primary purposeis to increase security and/or increase exploit engineering complexity. Avulnerability exploitable without a target-specific variable has a lowercomplexity than a vulnerability that would require non-trivial customization.This metric is meant to capture security mechanisms utilized by the vulnerablesystem, and does not relate to the amount of time or attempts it would take foran attacker to succeed, e.g. a race condition. If the attacker does not takeaction to overcome these conditions, the attack will always fail.

The evasion or satisfaction of authentication mechanisms or requisites isincluded in the Privileges Required assessment and is not considered here asa factor of relevance for Attack Complexity.

Table 2: Attack Complexity

Metric ValueDescription
Low (L)The attacker must take no measurable action to exploit the vulnerability. The attack requires no target-specific circumvention to exploit the vulnerability. An attacker can expect repeatable success against the vulnerable system.
High (H)The successful attack depends on the evasion or circumvention of security-enhancing techniques in place that would otherwise hinder the attack. These include: Evasion of exploit mitigation techniques. The attacker must have additional methods available to bypass security measures in place. For example, circumvention of address space randomization (ASLR) or data execution prevention (DEP) must be performed for the attack to be successful. Obtaining target-specific secrets. The attacker must gather some target-specific secret before the attack can be successful. A secret is any piece of information that cannot be obtained through any amount of reconnaissance. To obtain the secret the attacker must perform additional attacks or break otherwise secure measures (e.g. knowledge of a secret key may be needed to break a crypto channel). This operation must be performed for each attacked target.

As described in Section 2.1, detailed knowledge of the vulnerable system isoutside the scope of Attack Complexity. Refer to that section for additionalguidance when scoring Attack Complexity when target-specific attack mitigationis present.

Attack Requirements (AT)

This metric captures the prerequisite deployment and execution conditions orvariables of the vulnerable system that enable the attack. These differ fromsecurity-enhancing techniques/technologies (ref Attack Complexity) as theprimary purpose of these conditions is not to explicitly mitigate attacks,but rather, emerge naturally as a consequence of the deployment and execution ofthe vulnerable system. If the attacker does not take action to overcome theseconditions, the attack may succeed only occasionally or not succeed at all.

Table 3: Attack Requirements

Metric ValueDescription
None (N)The successful attack does not depend on the deployment and execution conditions of the vulnerable system. The attacker can expect to be able to reach the vulnerability and execute the exploit under all or most instances of the vulnerability.
Present (P)The successful attack depends on the presence of specific deployment and execution conditions of the vulnerable system that enable the attack. These include: A race condition must be won to successfully exploit the vulnerability. The successfulness of the attack is conditioned on execution conditions that are not under full control of the attacker. The attack may need to be launched multiple times against a single target before being successful. Network injection. The attacker must inject themselves into the logical network path between the target and the resource requested by the victim (e.g. vulnerabilities requiring an on-path attacker).

Privileges Required (PR)

This metric describes the level of privileges an attacker must possess priorto successfully exploiting the vulnerability. The method by which the attackerobtains privileged credentials prior to the attack (e.g., free trial accounts),is outside the scope of this metric. Generally, self-service provisionedaccounts do not constitute a privilege requirement if the attacker can grantthemselves privileges as part of the attack.

The resulting score is greatest if no privileges are required. The list ofpossible values is presented in Table 4.

Table 4: Privileges Required

Metric ValueDescription
None (N)The attacker is unauthenticated prior to attack, and therefore does not require any access to settings or files of the vulnerable system to carry out an attack.
Low (L)The attacker requires privileges that provide basic capabilities that are typically limited to settings and resources owned by a single low-privileged user. Alternatively, an attacker with Low privileges has the ability to access only non-sensitive resources.
High (H)The attacker requires privileges that provide significant (e.g., administrative) control over the vulnerable system allowing full access to the vulnerable system’s settings and files.

Assessment Guidance: Privileges Required is usually None for hard-codedcredential vulnerabilities or vulnerabilities requiring social engineering(e.g., reflected cross-site scripting, cross-site request forgery, or fileparsing vulnerability in a PDF reader). Default credentials that have not beenchanged or are not unique across each environment should be treated similarly tohard-coded credentials.

User Interaction (UI)

This metric captures the requirement for a human user, other than the attacker,to participate in the successful compromise of the vulnerable system. Thismetric determines whether the vulnerability can be exploited solely at the willof the attacker, or whether a separate user (or user-initiated process) mustparticipate in some manner. The resulting score is greatest when no userinteraction is required. The list of possible values is presented in Table 5.

Table 5: User Interaction

Metric ValueDescription
None (N)The vulnerable system can be exploited without interaction from any human user, other than the attacker. Examples include: a remote attacker is able to send packets to a target system a locally authenticated attacker executes code to elevate privileges
Passive (P)Successful exploitation of this vulnerability requires limited interaction by the targeted user with the vulnerable system and the attacker’s payload. These interactions would be considered involuntary and do not require that the user actively subvert protections built into the vulnerable system. Examples include: utilizing a website that has been modified to display malicious content when the page is rendered (most stored XSS or CSRF) running an application that calls a malicious binary that has been planted on the system using an application which generates traffic over an untrusted or compromised network (vulnerabilities requiring an on-path attacker)
Active (A)Successful exploitation of this vulnerability requires a targeted user to perform specific, conscious interactions with the vulnerable system and the attacker’s payload, or the user’s interactions would actively subvert protection mechanisms which would lead to exploitation of the vulnerability. Examples include: importing a file into a vulnerable system in a specific manner placing files into a specific directory prior to executing code submitting a specific string into a web application (e.g. reflected or self XSS) dismiss or accept prompts or security warnings prior to taking an action (e.g. opening/editing a file, connecting a device).

Impact Metrics

The Impact metrics capture the effects of a successfully exploitedvulnerability. Analysts should constrain impacts to a reasonable, final outcomewhich they are confident an attacker is able to achieve.

Only an increase in access, privileges gained, or other negative outcome as aresult of successful exploitation should be considered when assessing the Impactmetrics of a vulnerability. For example, consider a vulnerability that requiresread-only permissions prior to being able to exploit the vulnerability. Aftersuccessful exploitation, the attacker maintains the same level of read access,and gains write access. In this case, only the Integrity impact metric should bescored, and the Confidentiality and Availability Impact metrics should be set asNone.

Note that when scoring a delta change in impact, the final impact should beused. For example, if an attacker starts with partial access to restrictedinformation (Confidentiality Low) and successful exploitation of thevulnerability results in complete loss in confidentiality (ConfidentialityHigh), then the resultant CVSS Base metric value should reference the “end game”Impact metric value (Confidentiality High).

When identifying values for the impact metrics, assessment providers need toaccount for impacts both to the Vulnerable System and impacts outside of theVulnerable System. These impacts are established by two sets of impact metrics:“Vulnerable System impact” and “Subsequent System impact”. When establishingthe boundaries for the Vulnerable System metric values, assessment providersshould use the conceptual model of a system of interest.

Formally, a system of interest for scoring a vulnerability is defined as the setof computing logic that executes in an environment with a coherent function andset of security policies. The vulnerability exists in one or more components ofsuch a system. A technology product or a solution that serves a purpose orfunction from a consumer's perspective is considered a system (e.g., a server,workstation, containerized service, etc.).

When a system provides its functionality solely to another system, or it isdesigned to be exclusively used by another system, then together they areconsidered as the system of interest for scoring. For example, a database usedsolely by a smart speaker is considered a part of that smart speaker system.Both the database and the smart speaker it serves would be considered thevulnerable system if a vulnerability in that database leads to the malfunctionof the smart speaker. When a vulnerability does not have impact outside of thevulnerable system assessment providers should leave the subsequent system impactmetrics as NONE (N).

All impacts, if any, that occur outside of the vulnerable system should bereflected in the subsequent system impact set. When assessed in theenvironmental metric group only, the subsequent system impact may, in additionto the logical systems defined for System of Interest, also include impacts tohumans. This human impact option in the environmental metric group is explainedfurther in Safety (S), below.

Confidentiality (VC/SC)

This metric measures the impact to the confidentiality of the informationmanaged by the system due to a successfully exploited vulnerability.Confidentiality refers to limiting information access and disclosure to onlyauthorized users, as well as preventing access by, or disclosure to,unauthorized ones. The resulting score is greatest when the loss to the systemis highest. The list of possible values is presented in Table 6 (for theVulnerable System) and Table 7 (when there is a Subsequent System impacted).

Table 6: Confidentiality Impact to the Vulnerable System (VC)

Metric ValueDescription
High (H)There is a total loss of confidentiality, resulting in all information within the Vulnerable System being divulged to the attacker. Alternatively, access to only some restricted information is obtained, but the disclosed information presents a direct, serious impact. For example, an attacker steals the administrator's password, or private encryption keys of a web server.
Low (L)There is some loss of confidentiality. Access to some restricted information is obtained, but the attacker does not have control over what information is obtained, or the amount or kind of loss is limited. The information disclosure does not cause a direct, serious loss to the Vulnerable System.
None (N)There is no loss of confidentiality within the Vulnerable System.

Table 7: Confidentiality Impact to the Subsequent System (SC)

Metric ValueDescription
High (H)There is a total loss of confidentiality, resulting in all resources within the Subsequent System being divulged to the attacker. Alternatively, access to only some restricted information is obtained, but the disclosed information presents a direct, serious impact. For example, an attacker steals the administrator's password, or private encryption keys of a web server.
Low (L)There is some loss of confidentiality. Access to some restricted information is obtained, but the attacker does not have control over what information is obtained, or the amount or kind of loss is limited. The information disclosure does not cause a direct, serious loss to the Subsequent System.
None (N)There is no loss of confidentiality within the Subsequent System or all confidentiality impact is constrained to the Vulnerable System.

Integrity (VI/SI)

This metric measures the impact to integrity of a successfully exploitedvulnerability. Integrity refers to the trustworthiness and veracity ofinformation. Integrity of a system is impacted when an attacker causesunauthorized modification of system data. Integrity is also impacted when asystem user can repudiate critical actions taken in the context of the system(e.g. due to insufficient logging).

The resulting score is greatest when the consequence to the system is highest.The list of possible values is presented in Table 8 (for the Vulnerable System)and Table 9 (when there is a Subsequent System impacted).

Table 8: Integrity Impact to the Vulnerable System (VI)

Metric ValueDescription
High (H)There is a total loss of integrity, or a complete loss of protection. For example, the attacker is able to modify any/all files protected by the Vulnerable System. Alternatively, only some files can be modified, but malicious modification would present a direct, serious consequence to the Vulnerable System.
Low (L)Modification of data is possible, but the attacker does not have control over the consequence of a modification, or the amount of modification is limited. The data modification does not have a direct, serious impact to the Vulnerable System.
None (N)There is no loss of integrity within the Vulnerable System.

Table 9: Integrity Impact to the Subsequent System (SI)

Metric ValueDescription
High (H)There is a total loss of integrity, or a complete loss of protection. For example, the attacker is able to modify any/all files protected by the Subsequent System. Alternatively, only some files can be modified, but malicious modification would present a direct, serious consequence to the Subsequent System.
Low (L)Modification of data is possible, but the attacker does not have control over the consequence of a modification, or the amount of modification is limited. The data modification does not have a direct, serious impact to the Subsequent System.
None (N)There is no loss of integrity within the Subsequent System or all integrity impact is constrained to the Vulnerable System.

Availability (VA/SA)

This metric measures the impact to the availability of the impacted systemresulting from a successfully exploited vulnerability. While the Confidentialityand Integrity impact metrics apply to the loss of confidentiality or integrityof data (e.g., information, files) used by the system, this metric refers tothe loss of availability of the impacted system itself, such as a networkedservice (e.g., web, database, email). Since availability refers to theaccessibility of information resources, attacks that consume network bandwidth,processor cycles, or disk space all impact the availability of a system. Theresulting score is greatest when the consequence to the system is highest. Thelist of possible values is presented in Table 10 (for the Vulnerable System) andTable 11 (when there is a Subsequent System impacted).

Table 10: Availability Impact to the Vulnerable System (VA)

Metric ValueDescription
High (H)There is a total loss of availability, resulting in the attacker being able to fully deny access to resources in the Vulnerable System; this loss is either sustained (while the attacker continues to deliver the attack) or persistent (the condition persists even after the attack has completed). Alternatively, the attacker has the ability to deny some availability, but the loss of availability presents a direct, serious consequence to the Vulnerable System (e.g., the attacker cannot disrupt existing connections, but can prevent new connections; the attacker can repeatedly exploit a vulnerability that, in each instance of a successful attack, leaks a only small amount of memory, but after repeated exploitation causes a service to become completely unavailable).
Low (L)Performance is reduced or there are interruptions in resource availability. Even if repeated exploitation of the vulnerability is possible, the attacker does not have the ability to completely deny service to legitimate users. The resources in the Vulnerable System are either partially available all of the time, or fully available only some of the time, but overall there is no direct, serious consequence to the Vulnerable System.
None (N)There is no impact to availability within the Vulnerable System.

Table 11: Availability Impact to the Subsequent System (SA)

Metric ValueDescription
High (H)There is a total loss of availability, resulting in the attacker being able to fully deny access to resources in the Subsequent System; this loss is either sustained (while the attacker continues to deliver the attack) or persistent (the condition persists even after the attack has completed). Alternatively, the attacker has the ability to deny some availability, but the loss of availability presents a direct, serious consequence to the Subsequent System (e.g., the attacker cannot disrupt existing connections, but can prevent new connections; the attacker can repeatedly exploit a vulnerability that, in each instance of a successful attack, leaks a only small amount of memory, but after repeated exploitation causes a service to become completely unavailable).
Low (L)Performance is reduced or there are interruptions in resource availability. Even if repeated exploitation of the vulnerability is possible, the attacker does not have the ability to completely deny service to legitimate users. The resources in the Subsequent System are either partially available all of the time, or fully available only some of the time, but overall there is no direct, serious consequence to the Subsequent System.
None (N)There is no impact to availability within the Subsequent System or all availability impact is constrained to the Vulnerable System.

The Threat metrics measure the current state of exploit techniques or codeavailability for a vulnerability.

Exploit Maturity (E)

This metric measures the likelihood of the vulnerability being attacked, and isbased on the current state of exploit techniques, exploit code availability, oractive, “in-the-wild” exploitation. Public availability of easy-to-use exploitcode or exploitation instructions increases the number of potential attackers byincluding those who are unskilled. Initially, real-world exploitation may onlybe theoretical. Publication of proof-of-concept exploit code, functional exploitcode, or sufficient technical details necessary to exploit the vulnerability mayfollow. Furthermore, the available exploit code or instructions may progressfrom a proof-of-concept demonstration to exploit code that is successful inexploiting the vulnerability consistently. In severe cases, it may be deliveredas the payload of a network-based worm or virus or other automated attack tools.

It is the responsibility of the CVSS consumer to populate the values of ExploitMaturity (E) based on information regarding the availability of exploitationcode/processes and the state of exploitation techniques. This information willbe referred to as “threat intelligence” throughout this document.

Operational Recommendation: Threat intelligence sources that provide ExploitMaturity information for all vulnerabilities should be preferred over those withonly partial coverage. Also, it is recommended to use multiple sources of threatintelligence as many are not comprehensive. This information should be updatedas frequently as possible and its application to CVSS assessment should beautomated.

The list of possible values is presented in Table 12. The more easily avulnerability can be exploited, the higher the vulnerability score.

Table 12: Exploit Maturity

Metric ValueDescription
Not Defined (X)Reliable threat intelligence is not available to determine Exploit Maturity characteristics. This is the default value and is equivalent to Attacked (A) for the purposes of the calculation of the score by assuming the worst case.
Attacked (A)Based on available threat intelligence either of the following must apply: Attacks targeting this vulnerability (attempted or successful) have been reported Solutions to simplify attempts to exploit the vulnerability are publicly or privately available (such as exploit toolkits)
Proof-of-Concept (P)Based on available threat intelligence each of the following must apply: Proof-of-concept exploit code is publicly available No knowledge of reported attempts to exploit this vulnerability No knowledge of publicly available solutions used to simplify attempts to exploit the vulnerability (i.e., the “Attacked” value does not apply)
Unreported (U)Based on available threat intelligence each of the following must apply: No knowledge of publicly available proof-of-concept exploit code No knowledge of reported attempts to exploit this vulnerability No knowledge of publicly available solutions used to simplify attempts to exploit the vulnerability (i.e., neither the “POC” nor “Attacked” values apply)

These metrics enable the consumer analyst to customize the resulting scoredepending on the importance of the affected IT asset to a user’s organization,measured in terms of complementary/alternative security controls in place,Confidentiality, Integrity, and Availability. The metrics are the modifiedequivalent of Base metrics and are assigned values based on the system placementwithin organizational infrastructure.

Confidentiality, Integrity, and Availability Requirements (CR, IR, AR)

These metrics enable the consumer to customize the assessment depending on theimportance of the affected IT asset to the analyst’s organization, measured interms of Confidentiality, Integrity, and Availability. That is, if an IT assetsupports a business function for which Availability is most important, theanalyst can assign a greater value to Availability metrics relative toConfidentiality and Integrity. Each Security Requirement has three possiblevalues: Low, Medium, or High, or the default value of Not Defined (X).

The full effect on the environmental score is determined by the correspondingModified Base Impact metrics. Following the concept of assuming “reasonableworst case”, in absence of explicit values, these metrics are set to the defaultvalue of Not Defined (X), which is equivalent to the metric value of High (H).

The list of possible values is presented in Table 13. For brevity, the sametable is used for all three metrics. The lower the Security Requirement, thelower the score (recall that High is considered the default).

Table 13: Security Requirements

Metric ValueDescription
Not Defined (X)This is the default value. Assigning this value indicates there is insufficient information to choose one of the other values. This has the same effect as assigning High as the worst case.
High (H)Loss of [Confidentiality | Integrity | Availability] is likely to have a catastrophic adverse effect on the organization or individuals associated with the organization (e.g., employees, customers).
Medium (M)Loss of [Confidentiality | Integrity | Availability] is likely to have a serious adverse effect on the organization or individuals associated with the organization (e.g., employees, customers).
Low (L)Loss of [Confidentiality | Integrity | Availability] is likely to have only a limited adverse effect on the organization or individuals associated with the organization (e.g., employees, customers).

Modified Base Metrics

These metrics enable the consumer analyst to override individual Base metricvalues based on specific characteristics of a user’s environment.Characteristics that affect Exploitability or Impact can be reflected via anappropriately modified Environmental metric value.

The full effect on the resulting score is determined by the corresponding Basemetrics as follows

  • if the Modified Base Metric is Not Defined (X), the calculation of the scorewill use the value of the original Base Metrics

  • If the Modified Base Metric value is defined, then for the purpose of thecalculation of the metric, the Base Metric value will be replaced by theModified Base Metric value.

Example: If a provider sets the Base Metric Privileges Required to Low (PR:L)and an analyst overrides Modified Privileges Required to High (MPR:H), then theresulting score will be calculated as if the Base Metric Privileges Requires wasset to High. Similarly, if a provider sets the Base Metric Attack Vector toNetwork (AV:N) and an analyst sets Modified Attack Vector to Physical (MAV:P),then the resulting score will be calculated as if the Base Attack Vector was setto Physical.

A special case to this rule applies to the Modified Subsequent System Integrity(MSI) and the Modified Subsequent System Availability (MSA) which can be set toan additional special value of Safety (S) which is not included in the BaseSubsequent System impact metrics. In this particular case, the special valuewill be directly used for the calculation of the score as explained in thesection 4.2.1 below.

The intent of these metrics are to define the mitigations and compensatingcontrols that are in place for a given environment. It is acceptable to use themodified metrics to represent situations that increase the resulting score. Hereare some examples:

Example 1: The default configuration of a component may require high privilegesto access a particular function. However, in the consumer analyst’s environment,administrative privileges might be granted by default without authenticating theuser. The analyst can set Privileges Required to High and Modified PrivilegesRequired to None to reflect this more serious condition in their particularenvironment.

Example 2: The default configuration for a vulnerable system may be to run alistening service with administrator privileges, for which a compromise mightgrant an attacker Confidentiality, Integrity, and Availability impacts that areall High. Yet, in the consumer analyst’s environment, that same Internet servicemight be running with reduced privileges; in that case, the ModifiedConfidentiality, Modified Integrity, and Modified Availability might each be setto Low.

Example 3: Systems and appliances located in an isolated network with no accessto or from the Internet are not able to be attacked through the Wide AreaNetwork (WAN). All vulnerabilities found on those systems may have the AttackVector (AV) values of “Network” reduced to “Adjacent”.

For brevity, only the names of the Modified Base metrics are mentioned. EachModified Environmental metric has the same values as its corresponding Basemetric, plus values of Not Defined and Safety. Not Defined is the default anduses the metric value of the associated Base metric.

4.2.1 Modified Base Metrics and Safety

When a system may have safety implications as a matter of how or where it isdeployed, it is possible that exploiting a vulnerability within that system mayhave safety impact(s) which can be represented in the Environmental Metricsgroup.

If the exploitation of a technical vulnerability (with impact to either theavailability or integrity of the vulnerable system) has the potential to impacthuman safety, the modified subsequent system impact of Safety (s) should be used(i.e., MSI:S/MSA/S).

The Safety metric value measures the impact regarding the Safety of a humanactor or participant that can be predictably injured as a result of thevulnerability being exploited. Unlike other impact metric values, Safety canonly be associated with the Subsequent System impact set and should beconsidered in addition to the N/L/H impact values for Availability and Integritymetrics.

Note: If Safety is applicable, it should be explicitly assigned even if, and inaddition to, impact values of H are already supplied for Availability andIntegrity metrics.

Safety impact is applicable when it is predictable that an exploitedvulnerability may result in injuries categorized as Marginal or worse using theIEC 61508 definitions outlined in the chart below.

Table 14: IEC 61508 Definitions

CategoryDefinition
CatastrophicMultiple loss of life
CriticalLoss of a single life
MarginalMajor injuries to one or more persons
NegligibleMinor injuries at worst

Note: Safety metric values are leveraged in both the Supplemental Metric Group(provided by the assessment providers) and the Environmental Metric Group(provided by the consumer analyst). The list of possible values is presentedbelow.

Table 15: Modified Base Metrics

Modified Base MetricCorresponding Values
Modified Attack Vector (MAV)The same values as the corresponding Base Metric (see Base Metrics, above) as well as Not Defined (the default). Note: For MSC, MSI, and MSA, the lowest metric value is “Negligible” (N), not “None” (N).
Modified Attack Complexity (MAC)
Modified Attack Requirements (MAT)
Modified Privileges Required (MPR)
Modified User Interaction (MUI)
Modified Vulnerable System Confidentiality (MVC)
Modified Vulnerable System Integrity (MVI)
Modified Vulnerable System Availability (MVA)
Modified Subsequent System Confidentiality (MSC)
Modified Subsequent System Integrity (MSI)There is also a highest severity level, Safety (S), in addition to the same values as the corresponding Base Metric (High, Medium, Low). The value Not Defined (X) is the default value.
Modified Subsequent System Availability (MSA)

A new, optional metric group called the Supplemental metric group provides newmetrics that describe and measure additional extrinsic attributes of avulnerability. While the assessment of Supplemental metrics is provisioned bythe provider, the usage and response plan of each metric within the Supplementalmetric group is determined by the consumer. This contextual information may beemployed differently in each consumer’s environment. No metric will have anyimpact on the final calculated CVSS score (e.g. CVSS-BTE). Organizations maythen assign importance and/or effective impact of each metric, orset/combination of metrics, giving them more, less, or absolutely no effect onthe final risk analysis. Metrics and values will simply convey additionalextrinsic characteristics of the vulnerability itself.

Safety (S)

Like all Supplemental Metrics, providing a value for Safety is completelyoptional. Suppliers and vendors (AKA: scoring providers) may or may not provideSafety as a Supplemental Metric as they see fit.

When a system does have an intended use or fitness of purpose aligned to safety,it is possible that exploiting a vulnerability within that system may haveSafety impact which can be represented in the Supplemental Metrics group. Lackof a Safety metric value being supplied does NOT mean that there may not be anySafety-related impacts. The possible values for the Safety Supplemental Metricare as follows:

Table 16: Safety

Metric ValueDescription
Not Defined (X)The metric has not been evaluated.
Present (P)Consequences of the vulnerability meet definition of IEC 61508 consequence categories of "marginal," "critical," or "catastrophic."
Negligible (N)Consequences of the vulnerability meet definition of IEC 61508 consequence category "negligible."

The Safety supplemental metric value indicates the degree of impact to theSafety of a human actor or participant that can be predictably injured as aresult of the vulnerability being exploited.

Note that Safety metrics are defined in both Environmental and Supplementalcontexts, although the vector string values differ. As a Supplemental metric,and consistent with the above table, Safety can be described with metric valuesof S:X, S:P, or S:N.

The IEC 61508 consequence categories are defined in Table 14 above (as of thiswriting).

Automatable (AU)

The “Automatable” metric captures the answer to the question ”Can an attackerautomate exploitation events for this vulnerability across multiple targets?”based on steps 1-4 of the kill chain2 [Hutchins et al., 2011]. These stepsare reconnaissance, weaponization, delivery, and exploitation. If evaluated, themetric can take the values no or yes:

Table 17: Automatable

Metric ValueDescription
Not Defined (X)The metric has not been evaluated.
No (N)Attackers cannot reliably automate all 4 steps of the kill chain for this vulnerability for some reason. These steps are reconnaissance, weaponization, delivery, and exploitation.
Yes (Y)Attackers can reliably automate all 4 steps of the kill chain. These steps are reconnaissance, weaponization, delivery, and exploitation (e.g., the vulnerability is “wormable”).

Provider Urgency (U)

Many vendors currently provide supplemental severity ratings to consumers viaproduct security advisories. Other vendors publish Qualitative Severity Ratingsfrom the CVSS Specification Document in their advisories.

To facilitate a standardized method to incorporate additional provider-suppliedassessment, an optional “pass-through” Supplemental Metric called ProviderUrgency is available.

Note: While any assessment provider along the product supply chain mayprovide a Provider Urgency rating:

Library Maintainer → OS/Distro Maintainer → Provider 1 … Provider n (PPP)→ Consumer

The Penultimate Product Provider (PPP) is best positioned to provide a directassessment of Provider Urgency.

Table 18: Provider Urgency

Metric ValueDescription
Not Defined (X)The metric has not been evaluated.
RedProvider has assessed the impact of this vulnerability as having the highest urgency.
AmberProvider has assessed the impact of this vulnerability as having a moderate urgency.
GreenProvider has assessed the impact of this vulnerability as having a reduced urgency.
ClearProvider has assessed the impact of this vulnerability as having no urgency (Informational).

Recovery (R)

Recovery describes the resilience of a system to recover services, in terms ofperformance and availability, after an attack has been performed.

Table 19: Recovery

Metric ValueDescription
Not Defined (X)The metric has not been evaluated.
Automatic (A)The system recovers services automatically after an attack has been performed.
User (U)The system requires manual intervention by the user to recover services, after an attack has been performed.
Irrecoverable (I)The system services are irrecoverable by the user, after an attack has been performed.

Value Density (V)

Value Density describes the resources that the attacker will gain control overwith a single exploitation event. It has two possible values, diffuse andconcentrated:

Table 20: Value Density

Metric ValueDescription
Not Defined (X)The metric has not been evaluated.
Diffuse (D)The vulnerable system has limited resources. That is, the resources that the attacker will gain control over with a single exploitation event are relatively small. An example of Diffuse (think: limited) Value Density would be an attack on a single email client vulnerability.
Concentrated (C)The vulnerable system is rich in resources. Heuristically, such systems are often the direct responsibility of “system operators” rather than users. An example of Concentrated (think: broad) Value Density would be an attack on a central email server.

Vulnerability Response Effort (RE)

The intention of the Vulnerability Response Effort metric is to providesupplemental information on how difficult it is for consumers to provide aninitial response to the impact of vulnerabilities for deployed products andservices in their infrastructure. The consumer can then take this additionalinformation on effort required into consideration when applying mitigationsand/or scheduling remediation.

When calculating Vulnerability Response Effort, the effort required to deploythe quickest available response should be considered.

Table 21: Vulnerability Response Effort

Metric ValueDescription
Not Defined (X)The metric has not been evaluated.
Low (L)The effort required to respond to a vulnerability is low/trivial. Examples include: communication on better documentation, configuration workarounds, or guidance from the vendor that does not require an immediate update, upgrade, or replacement by the consuming entity, such as firewall filter configuration.
Moderate (M)The actions required to respond to a vulnerability require some effort on behalf of the consumer and could cause minimal service impact to implement. Examples include: simple remote update, disabling of a subsystem, or a low-touch software upgrade such as a driver update.
High (H)The actions required to respond to a vulnerability are significant and/or difficult, and may possibly lead to an extended, scheduled service impact. This would need to be considered for scheduling purposes including honoring any embargo on deployment of the selected response. Alternatively, response to the vulnerability in the field is not possible remotely. The only resolution to the vulnerability involves physical replacement (e.g. units deployed would have to be recalled for a depot level repair or replacement). Examples include: a highly privileged driver update, microcode or UEFI BIOS updates, or software upgrades requiring careful analysis and understanding of any potential infrastructure impact before implementation. A UEFI BIOS update that impacts Trusted Platform Module (TPM) attestation without impacting disk encryption software such as Bit locker is a good recent example. Irreparable failures such as non-bootable flash subsystems, failed disks or solid-state drives (SSD), bad memory modules, network devices, or other non-recoverable under warranty hardware, should also be scored as having a High effort.

For some purposes it is useful to have a textual representation of the resultingnumeric Base, Threat and Environmental scores. All CVSS scores regardless ofnomenclature can be mapped to the qualitative ratings defined in Table 22.3

Table 22: Qualitative severity rating scale

RatingCVSS Score
None0.0
Low0.1 - 3.9
Medium4.0 - 6.9
High7.0 - 8.9
Critical9.0 - 10.0

As an example, a CVSS Base Score of 5.0 has an associated severity rating ofMedium. The use of these qualitative severity ratings is optional, and there isno requirement to include them when publishing CVSS scores. They are intended tohelp organizations properly assess and prioritize their vulnerability managementprocesses.

The CVSS v4.0 vector string is a text representation of a set of CVSS metrics.It is commonly used to record or transfer CVSS metric information in a conciseand machine-readable form.

The CVSS v4.0 vector string begins with the label “CVSS:” and a numericrepresentation of the current version, “4.0”. Metric information follows in theform of a set of metrics, each preceded by a forward slash, “/”, acting as adelimiter. Each metric is a metric name in abbreviated form, a colon (“:”), andits associated metric value in abbreviated form. The abbreviated forms aredefined earlier in this specification (in parentheses after each metric name andmetric value, case sensitive), and are summarized in the table below.

A vector string must contain metrics in the order shown in Table 23, every otherordering is invalid. All Base metrics must be included in a vector string.Threat, Environmental, and Supplemental metrics are optional, and omittedmetrics are considered to have the value of Not Defined (X). Metrics with avalue of Not Defined can be explicitly included in a vector string if desired.Systems that produce or consume CVSS v4.0 vector strings must do so in thefollowing order and treat unspecified Threat, Environmental and Supplemental asNot Defined. A vector string must not include the same metric more than once.

Table 23: Base, Threat and Environmental Vectors

Metric GroupMetric Name (and Abbreviated Form)Possible ValuesMandatory?
BaseAttack Vector (AV)[N,A,L,P]Yes
-Attack Complexity (AC)[L,H]Yes
-Attack Requirements (AT)[N,P]Yes
-Privileges Required (PR)[N,L,H]Yes
-User Interaction (UI)[N,P,A]Yes
-Vulnerable System Confidentiality Impact (VC)[H,L,N]Yes
-Vulnerable System Integrity Impact (VI)[H,L,N]Yes
-Vulnerable System Availability Impact (VA)[H,L,N]Yes
-Subsequent System Confidentiality Impact (SC)[H,L,N]Yes
-Subsequent System Integrity Impact (SI)[H,L,N]Yes
-Subsequent System Availability Impact (SA)[H,L,N]Yes
ThreatExploit Maturity (E)[X,A,P,U]No
EnvironmentalConfidentiality Requirement (CR)[X,H,M,L]No
-Integrity Requirement (IR)[X,H,M,L]No
-Availability Requirement (AR)[X,H,M,L]No
-Modified Attack Vector (MAV)[X,N,A,L,P]No
-Modified Attack Complexity (MAC)[X,L,H]No
-Modified Attack Requirements (MAT)[X,N,P]No
-Modified Privileges Required (MPR)[X,N,L,H]No
-Modified User Interaction (MUI)[X,N,P,A]No
-Modified Vulnerable System Confidentiality (MVC)[X,N,L,H]No
-Modified Vulnerable System Integrity (MVI)[X,N,L,H]No
-Modified Vulnerable System Availability (MVA)[X,N,L,H]No
-Modified Subsequent System Confidentiality (MSC)[X,N,L,H]No
-Modified Subsequent System Integrity (MSI)[X,N,L,H,S]No
-Modified Subsequent System Availability (MSA)[X,N,L,H,S]No
SupplementalSafety (S)[X,N,P]No
-Automatable (AU)[X,N,Y]No
-Recovery (R)[X,A,U,I]No
-Value Density (V)[X,D,C]No
-Vulnerability Response Effort (RE)[X,L,M,H]No
-Provider Urgency (U)[X,Clear,Green,Amber,Red]No

For example, a vulnerability with Base metric values of:

  • Attack Vector: Network

  • Attack Complexity: Low

  • Attack Requirements: None

  • Privileges Required: High

  • User Interaction: None

  • Vulnerable System Confidentiality: Low

  • Vulnerable System Integrity: Low

  • Vulnerable System Availability: None

  • no Subsequent System impact (C/I/A),

  • and no specified Threat or Environmental metrics would produce the followingvector:

    • CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
  • The same example with the addition of Exploit Maturity: Attackedwould produce the following vector:

    • CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:A

The following examples are valid CVSS v4.0 vectors, provided along a shortdescription:

  • CVSS-BT sample vector string

    • CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:P
  • CVSS-BE sample vector string

    • CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:H/SI:H/SA:H/CR:H/IR:H/AR:M/MAV:N/MAC:L/MAT:P/MPR:L/MUI:A/MVC:N/MVI:H/MVA:L/MSC:L/MSI:S/MSA:H
  • CVSS-B with Supplemental sample vector string

    • CVSS:4.0/AV:P/AC:H/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:A/S:P/AU:Y/R:A/V:D/RE:L/U:Red
  • CVSS-BTE with Supplemental sample vector string

    • CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/CR:L/IR:X/AR:L/MAV:A/MAC:H/MAT:N/MPR:N/MUI:P/MVC:X/MVI:N/MVA:H/MSC:N/MSI:L/MSA:S/S:N/AU:N/R:I/V:C/RE:H/U:Green

The following vectors are invalid and are provided along a shortexplanation:

  • “F” is not a valid value for “AV”

    • CVSS:4.0/AV:F/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
  • “E” metric is defined more than once

    • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N/E:A/E:X
  • “ui” is not a valid metric abbreviation

    • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/ui:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
  • CVSS v4.0 prefix is missing

    • AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
  • Mandatory metric “VA” is missing

    • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/SC:N/SI:N/SA:N
  • Fixed ordering is not respected (CVSS-BTE with Supplemental)

    • CVSS:4.0/AC:L/AV:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/CR:L/IR:X/AR:L/RE:H/MAV:A/MAC:H/MAT:N/MPR:N/MUI:P/AT:N/MVC:X/MVI:N/MVA:H/MSC:N/MSI:L/MSA:S/E:U/S:N/AU:N/R:I/V:C/U:Green

The CVSS v4.0 scoring methodologies are described in the sub-sections below.

New Scoring System Development

The scoring system development for CVSS v4.0 consisted of the following broadsteps:

  1. Use metric groups to gather the 15 million CVSS-BTE vectors into 270disjoint equivalence sets under a relation of comparable qualitativeseverity

  2. Solicit experts to compare vectors representing each equivalence set

  3. Use the expert comparison data to calculate an order of vectors from leastsevere to most severe

  4. Solicit expert opinion to decide which equivalence set of vectors p in theordering of vectors represents the boundary between qualitative severityscores to be backwards compatible with qualitative severity score boundariesfrom CVSS v3.x

  5. Compress the equivalence set of vectors in each qualitative severity bininto the number of available scores in that bin (for example, 9.0 to 10.0for critical, 7.0 to 8.9 for high, etc.)

  6. Create a small score modification factor that adjusts the scores of vectorswithin a qualitatively equivalent set of vectors so that a change of anymetric value results in a resulting score change, where possible. The intentis that the score change is not larger than the uncertainty in the rankingof the vector groups as collected from the expert comparison data in step 2.This is further discussed in section 8.2 below.

Additional information about the new approach to scoring calculation developedin CVSS v4.0 can be found in Section 2.5 of the CVSS v4.0 User Guide.

CVSS v4.0 Scoring using MacroVectors and Interpolation

The CVSS v4.0 formula provides a mathematical approximation of all possiblemetric combinations ranked in order of severity where vectors are clustered insets called MacroVectors. A MacroVector is one of the sets of CVSS vectorsthat the expert evaluation process described in section 8.1 (steps 1-3)determined to be of comparable qualitative severity. Each MacroVectorconstitutes an equivalence class4 from such a qualitative perspective.

The score of a MacroVector is defined by a lookup table as defined by thesubject matter expert process mentioned above and is specified in Section 8.3.The score of a vector within each MacroVector is defined by interpolation.

To determine a preliminary set of relevant MacroVectors, The SIG determined thefollowing preliminary metrics subgroups. Additional EQs or levels can bedetermined for a finer resolution.

  • EQ1 → AV/PR/UI with 3 levels specified in Table 24

  • EQ2 → AC/AT with 2 levels specified in Table 25

  • EQ3 → VC/VI/VA with 3 levels specified in Table 26

  • EQ4 → SC/SI/SA with 3 levels specified in Table 27

  • EQ5 → E with 3 levels specified in Table 28

  • EQ6 → VC/VI/VA+CR/CI/CA with 2 levels specified in Table 29

Intuitively, each level of a metric subgroup corresponds to a different severitylevel with zero being the most severe and one or two being the least severe.

Since EQ3 and EQ6 are not independent they must be considered together

  • EQ3+EQ6 → determines 5 levels specified in Table 30

A highest severity vector of a MacroVector is a vector that

  • Satisfies the boolean conditions for membership into a MacroVector

  • No other vector in the MacroVector has a higher severity in at least ametric

The lowest severity vector of a MacroVector is determined in a similar way.

One MacroVector might have more than one highest severity vector and more thanone lowest severity vector. For example the MacroVectors which satisfy EQ1 atlevel 1 shown in Table 24 have as highest severity vectors all vectors with

  • AV:A/PR:N/UI:N or AV:N/PR:L/UI:N or AV:N/PR:N:/UI:P

as they all satisfy the constraints specified in Table 24.

  • (AV:N or PR:N or UI:N) and

    • as we have AV:A/PR:N/UI:N, AV:N/PR:L/UI:N,AV:N/PR:N:/UI:P
  • not (AV:N and PR:N and UI:N) and

    • as we have AV:A/PR:N/UI:N, AV:N/PR:L/UI:N, AV:N/PR:N:/UI:P
  • not AV:P

    • as we have AV:A/PR:N/UI:N, AV:N/PR:L/UI:N, AV:N/PR:N:/UI:P

Table 24: EQ1 - MacroVectors

LevelsConstraintsHighest Severity Vector(s)
0AV:N and PR:N and UI:NAV:N/PR:N/UI:N
1(AV:N or PR:N or UI:N) and not (AV:N and PR:N and UI:N) and not AV:PAV:A/PR:N/UI:N or AV:N/PR:L/UI:N or AV:N/PR:N:/UI:P
2AV:P or not(AV:N or PR:N or UI:N)AV:P/PR:N/UI:N or AV:A/PR:L/UI:P

Table 25: EQ2 - MacroVectors

LevelsConstraintsHighest Severity Vector(s)
0AC:L and AT:NAC:L/AT:N
1not (AC:L and AT:N)AC:L/AT:P or AC:H/AT:N

Table 26: EQ3 - MacroVectors

LevelsConstraintsHighest Severity Vector(s)
0VC:H and VI:HVC:H/VI:H/VA:H
1not (VC:H and VI:H) and (VC:H or VI:H or VA:H)VC:L/VI:H/VA:H or VC:H/VI:L/VA:H
2not (VC:H or VI:H or VA:H)VC:L/VI:L/VA:L

Table 27: EQ4 - MacroVectors

LevelsConstraintsHighest Severity Vector(s)
0MSI:S or MSA:SSC:H/SI:S/SA:S
1not (MSI:S or MSA:S) and (SC:H or SI:H or SA:H)SC:H/SI:H/SA:H
2not (MSI:S or MSA:S) and not (SC:H or SI:H or SA:H)SC:L/SI:L/SA:L

If MSI=X or MSA=X they will default to the corresponding value of SI and SAaccording to the rules of Modified Base Metrics in section 4.2 (See Table 15).So if there are no modified base metrics, the highest value that EQ4 can reachis 1.

Table 28: EQ5 - MacroVectors

LevelsConstraintsHighest Severity Vector(s)
0E:AE:A
1E:PE:P
2E:UE:U

If E=X it will default to the worst case (i.e., E=A).

Table 29: EQ6 - MacroVectors

LevelsConstraintsHighest Severity Vector(s)
0(CR:H and VC:H) or (IR:H and VI:H) or (AR:H and VA:H)VC:H/VI:H/VA:H/CR:H/IR:H/AR:H
1not (CR:H and VC:H) and not (IR:H and VI:H) and not (AR:H and VA:H)VC:H/VI:H/VA:H/CR:M/IR:M/AR:M or VC:H/VI:H/VA:L/CR:M/IR:M/AR:H or VC:H/VI:L/VA:H/CR:M/IR:H/AR:M or VC:H/VI:L/VA:L/CR:M/IR:H/AR:H or VC:L/VI:H/VA:H/CR:H/IR:M/AR:M or VC:L/VI:H/VA:L/CR:H/IR:M/AR:H or VC:L/VI:L/VA:H/CR:H/IR:H/AR:M or VC:L/VI:L/VA:L/CR:H/IR:H/AR:H

If CR=X, IR=X or AR=X they will default to the worst case (i.e., CR=H, IR=H andAR=H).

Table 30: Joint EQ3+EQ6 - MacroVectors

LevelsConstraintsHighest Severity Vector(s)
00VC:H and VI:H and [CR:H or IR:H or (AR:H and VA:H)]VC:H/VI:H/VA:H/CR:H/IR:H/AR:H
01VC:H and VI:H and not (CR:H or IR:H) and not (AR:H and VA:H)VC:H/VI:H/VA:H/CR:M/IR:M/AR:M or VC:H/VI:H/VA:L/CR:M/IR:M/AR:H
10not (VC:H and VI:H) and (VC:H or VI:H or VA:H) and [(CR:H and VC:H) or (IR:H and VI:H) or (AR:H and VA:H)]VC:L/VI:H/VA:H/CR:H/IR:H/AR:H or VC:H/VI:L/VA:H/CR:H/IR:H/AR:H
11not (VC:H and VI:H) and (VC:H or VI:H or VA:H) and [not (CR:H and VC:H) and not (IR:H and VI:H) and not (AR:H and VA:H)]VC:H/VI:L/VA:H/CR:M/IR:H/AR:M or VC:H/VI:L/VA:L/CR:M/IR:H/AR:H or VC:L/VI:H/VA:H/CR:H/IR:M/AR:M or VC:L/VI:H/VA:L/CR:H/IR:M/AR:H or VC:L/VI:L/VA:H/CR:H/IR:H/AR:M
20not (VC:H or VI:H or VA:H) and [(CR:H and VC:H) or (IR:H and VI:H) or (AR:H and VA:H)]Cannot exist
21not (VC:H or VI:H or VA:H) and not (CR:H and VC:H) and not (IR:H and VI:H) and not (AR:H and VA:H)VC:L/VI:L/VA:L/CR:H/IR:H/AR:H

Given two vectors the severity distance between them is the number ofconsecutive stepwise changes in individual metrics given Section 2 orderingneeded to transform one vector into the other.

For example a Vector with VC:H/VI:H/VA:H has a severity distance of 3 from avector that contains VC:H/VI:L/VA:N and is otherwise identical

  • VC:H/VI:H/VA:H → VC:H/VI:L/VA:H → VC:H/VI:L/VA:L →VC:H/VI:L/VA:N

The depth of a MacroVector is the maximum severity distance between thehighest severity vector(s) and the lowest severity vector(s) of the MacroVector.

The notion of depth can be better understood by a graphical visualization. Forexample consider EQ3=2 which is defined in Table 26 as all metrics values suchthat not (VC=H or VI=H or VA=H). Figure 2 shows all metric values of VC, VI, andVA in that MacroVector starting from the highest severity vector(VC:L/VI:L/VA:L) to the lowest severity vector (VC:N/VI:N/VA:N).

CVSS v4.0 Specification Document (3)

Figure 2: Vectors included MacroVector with EQ3=2 and everything else fixed.

The highest severity vector of a MacroVector is always assigned the score of theMacroVector from the cvss_lookup.js file within the CVSS v4.0 calculatorreference implementation available on GitHub (see Section 8.3).

A vector within a MacroVector is assigned the score of the highest severityvector in the MacroVector minus the mean proportional distance from theMacroVectors below it.

This is obtained by the following algorithm.

  1. For each of the EQs

    1. The maximal scoring difference is determined as the difference betweenthe current MacroVector and the lower MacroVector

      1. if there is no lower MacroVector the available distance is set toNaN and then ignored in the further calculations
    2. The severity distance of the to-be scored vector from a highest severityvector in the same MacroVector is determined

    3. The proportion of the distance is determined by dividing the severitydistance of the to-be-scored vector by the depth of the MacroVector

    4. The maximal scoring difference is multiplied by the proportion ofdistance

  2. The mean of the above computed proportional distances is computed

  3. The score of the vector is the score of the MacroVector (i.e. the score ofthe highest severity vector) minus the mean distance so computed. This scoreis rounded to one decimal place.

Scores of all MacroVectors

A complete list of all MacroVectors and associated scores can be found in thecvss_lookup.js file within the CVSS v4.0 calculator reference implementationavailable on GitHub:

https://github.com/FIRSTdotorg/cvss-v4-calculator/blob/main/cvss_lookup.js

FIRST sincerely recognizes the contributions of the following CVSS SpecialInterest Group (SIG) members, listed in alphabetical order by last name:

  • Abdulhamid Adebayo, IBM
  • Srividya Ananth, National Institute of Standards and Technology (NIST)
  • Chandan BN, Palo Alto Networks
  • Feng Cao, Oracle
  • Francesco Casotto, Cisco
  • Matthew Coles, Dell Technologies
  • Khushali Dalal, Juniper Networks
  • Giorgio Di Tizio, University of Trento
  • Dave Dugal, Juniper Networks
  • Karan Dwivedi, Google
  • Ben Edwards, Cyentia
  • Troy Fridley, Acuity Brands
  • Jeff Heller, Sandia National Laboratories
  • Adrian Henrick
  • Allen Householder, CERT/CC
  • Miguel Hummel, Citi
  • Fabrice Kah, Schneider Electric
  • Stav Kaufman, Skybox Security
  • Austin Kimbrell, Red Hat
  • Toby Kohlenberg, Intel
  • Jim Kohli, GE Healthcare
  • Stanislav Kontar, Red Hat
  • Milind Kulkarni, Ericsson
  • Arkadeep Kundu, Cisco
  • Nick Leali, Cisco
  • Fábio Olivé Leite, Red Hat
  • Angela Lindberg, SAP
  • Kumar Mangipudi
  • Art Manion, ANALYGENCE Labs
  • Fabio Massacci, University of Trento and Vrije Universiteit Amsterdam
  • Peter Mell, National Institute of Standards and Technology (NIST)
  • Bruce Monroe, Intel
  • Vivek Nair, Microsoft
  • Phillip Nordwall, Dell Technologies
  • Margaux Pagano, Citi
  • Wilfried Pascault, CERT Orange Cyberdefense
  • Francisco Luis de Andres Perez, IriusRisk
  • Diana Prusova, Accenture Security
  • Marián Rehák, Red Hat
  • Dale Rich, Black & Veatch
  • Melinda Rosario
  • Zach Shue, Kiewit
  • Daniel Sommerfeld, Microsoft
  • Jonathan Spring, Cybersecurity and Infrastructure Security Agency (CISA)
  • Janane Suresh, Oracle
  • Masato Tereada
  • Matt Tesauro
  • Lucas Tesson
  • Christopher Turner, National Institute of Standards and Technology (NIST)
  • Laurie Tyzenhaus, CERT/CC
  • Akshat Vaid, Juniper Networks
  • Richard Wilkins, Phoenix Technologies, Inc.

FIRST would also like to thank Grace Staley from CAPS, LLC. for her tirelesswork facilitating the CVSS SIG meetings.

CVSS v4.0 main page - https://www.first.org/cvss/v4-0

The main web page for all CVSS resources, including the most recent version ofthe CVSS standard.

CVSS v4.0 Specification Document -https://www.first.org/cvss/v4-0/specification-document

The latest revision of this document, defining the metrics, formulas,qualitative rating scale and vector string.

CVSS v4.0 User Guide - https://www.first.org/cvss/v4-0/user-guide

A companion to the Specification, the User Guide includes further discussion ofthe CVSS standard including particular use cases, guidelines on scoring, scoringrubrics, and a glossary of the terms used in the Specification and User Guidedocuments.

CVSS v4.0 Examples Document - https://www.first.org/cvss/v4-0/examples

Includes scores of public vulnerabilities and explanations of why particularmetric values were chosen.

CVSS v4.0 Calculator - https://www.first.org/cvss/calculator/v4-0

A reference implementation of the CVSS standard that can be used for generatingscores. The underlying code is documented and can be used as part of otherimplementations.

JSON and XML Schemas - https://www.first.org/cvss/data-representations

Data representations for CVSS metrics, scores and vector strings in JSON Schemaand XML Schema Definition (XSD) representations. These can be used to store andtransfer CVSS information in defined JSON and XML formats.

DateVerDescription
2023-11-01v1.0Initial Publication
2023-11-09v1.1Correct impact metric order Corrected reference to Section 2.5 of the User Guide
2024-06-18v1.2Corrected None metric in Section 2.2.3 Table 7
  1. See[https://www.schneier.com/blog/archives/2009/10/evil_maid_attac.html]() fora description of the evil maid attack.

  2. Eric M Hutchins, Michael J Cloppert, and Rohan M Amin. Intelligence-drivencomputer network defense informed by analysis of adversary campaigns andintrusion kill chains. Leading Issues in Information Warfare & SecurityResearch, 1:80, 2011.
    https://www.lockheedmartin.com/content/dam/lockheed-martin/rms/documents/cyber/LM-White-Paper-Intel-Driven-Defense.pdf

  3. Note that this mapping between quantitative and qualitative scores applieswhether just the Base, or all of Base, Threat, and Environmental metricgroups, are assessed.

  4. [https://en.wikipedia.org/wiki/Equivalence_class]()

CVSS v4.0 Specification Document (2024)

FAQs

What are the three 3 components that make up the overall common vulnerability score CVSS )? ›

CVSS scoring assigns a number from 0 to 10 based on three main factors: Base, Temporal, and Environmental metrics. The Base score shows the inherent characteristics of a vulnerability.

What is the maximum CVSS score possible this is one with a possible complete loss of confidentiality integrity and availability? ›

Scores range from 0 to 10, with 10 being the most severe. While many use only the CVSS Base score for determining severity, temporal and environmental scores also exist, to factor in availability of mitigations and how widespread vulnerable systems are within an organization, respectively.

Why does the Common Vulnerability Scoring System (CVSS) use a score range of 0 to 10? ›

Vulnerability metrics

CVSS scores are calculated using a formula consisting of vulnerability-based metrics. A CVSS score is derived from scores in these three metric groups: Base, Temporal and Environmental. Scores range from 0 to 10, with zero representing the least severe and 10 representing the most severe.

What is the threshold for CVSS failure? ›

Scores range from 0 to 10.0, with 4.0 or higher indicating failure to comply with PCI standards. Any asset that contains at least one vulnerability with CVSS score of 4.0 or higher is considered non-compliant. And, if at least one asset is non-compliant, the entire organization is considered to be non-compliant.

What does a higher CVSS score indicate to a security analyst? ›

Higher scores signify greater severity, demanding swifter mitigation strategies. Additionally, CVSS categorizes vulnerabilities into severity levels: Critical (9.0-10.0): Exploitable with devastating consequences.

What is the difference between CVE and CVSS score? ›

Differences between CVSS and CVE

CVSS is the overall score assigned to a vulnerability. CVE is simply a list of all publicly disclosed vulnerabilities that includes the CVE ID, a description, dates, and comments. The CVSS score is not reported in the CVE listing – you must use the NVD to find assigned CVSS scores.

What is a CVSS calculator? ›

Common Vulnerability Scoring System Calculator

The scores are computed in sequence such that the Base Score is used to calculate the Temporal Score and the Temporal Score is used to calculate the Environmental Score.

What is the highest vulnerability severity level? ›

CVSS generates a score from 0 to 10 based on the severity of the vulnerability. A score of 0 means the vulnerability is less significant than the highest vulnerability with a score of 10, if you're only using CVSS.

Why is CVSS bad? ›

CVSS scoring can be inaccurate and misleading due to misuse of metrics. Custom or proprietary scoring systems lack consistency and transparency. DREAD model offers a more context-specific approach to vulnerability scoring.

What privileges are required for CVSS score? ›

Privileges requires falls under three ratings: None (N) – There is no privilege or special access required to conduct the attack. Low (L) – The attacker requires basic, “user” level privileges to leverage the exploit. High (H) – Administrative or similar access privileges are required for successful attack.

What is the timeline for CVSS score remediation? ›

Laws, regulations, standards, or contractual agreements may also dictate a higher priority and shorter timeline than the CVSS score alone indicates. with a CVSS score of 4 or higher must be remediated within 30 days of notification. with scores lower than 4 must be remediated within two to three months.

Who owns CVSS? ›

CVSS is owned and managed by FIRST.Org, Inc. (FIRST), a US-based non-profit organization, whose mission is to help computer security incident response teams across the world.

What is the max CVSS score? ›

The difference in CVSS score is primarily due to the scope metric. It is possible to get a CVSS score of 10.0 only if the scope is changed. At the same time, the highest possible score when the scope is unchanged is 9.8. This is when all impact scores are high and all exploitability metrics are most severe.

Do CVSS scores change over time? ›

Base Metrics do not change over time – they remain the same throughout the lifetime of a vulnerability. Temporal Metrics, on the other hand, change over time as a result of activities conducted by both software vendors and hackers.

What is 9.8 CVSS score? ›

CVSS Score Qualitative Ratings:

Only a minute fraction of those rank CVSS 10.0. Vulnerabilities with a score of 9.8 have high impact scores, exploitability metrics are at maximum severity, and the code is actively dangerous.

What is the range of exploitability scores? ›

We can see that exploitability ranges between 0.12 – 3.89 when Scope is Unchanged and 0.22 – 3.89 when Scope is Changed. Impact ranges between 0 – 5.87 when Scope is Unchanged and -0.22 – 6.05 when Scope is changed. The final step is to compute the base score as a combination of the Exploitability and Impact.

What is the CVSS score of CVE? ›

What is CVSS score. CVSS stands for Common Vulnerability Scoring System, and it's a numerical score that rates the severity of vulnerabilities on a scale from 0 to 10, with 10 being the most severe. It's often used to rate the severity of the publicly disclosed vulnerabilities listed in the CVE.

Top Articles
Dutch Banketstaaf Recipe | Dutch Banket Pastry Recipe
Authentic German Rouladen Recipe
排期 一亩三分地
Lc Auto Sales Irving
Leah4Sci Alkene Reactions
Burkes Outlet Credit Card Sign In
Https Paperlesspay Talx Com Boydgaming
Maria Lima Lietz - Hamburger SV
Champion Our Cause Wow
Shining Time Station (television series)
LensCrafters Review for September 2024 | Best Contact Lens Stores
UK HealthCare EpicCare Link
Poochies Liquor Store
Jocelyne Mirando
Betty Rea Ice Cream
Low-iron glass : making a clear difference
Cookie Clicker The Advanced Method
1977 Elo Hit Wsj Crossword
How Much Is Cvs Sports Physical
Tinyzonetv.to Unblocked
Apple Store Near Me Make Appointment
Dr Bizzaro Bubble Tea Menu
Binny Arcot
Okay Backhouse Mike Lyrics
Walmart Neighborhood Market Gas Price
Interview With Marc Rheinard (Team ToniSport & Awesomatix) From Germany
Ice Quartz Osrs
What Time Does The Moon Rise At My Location
Caribou Criminal Docket 2023
Tamilblasters Movie Download Isaimini
Ktbs Payroll Login
Jeep Graphics Ideas
Aflac Dulles Synergy
Vip Market Vetsource
Lvc Final Exam Schedule
7 Little Words 4/6/23
Ssbbw Coomer
15 Best HDMovie2 Alternatives to Watch Movies in Hindi & Other Indian Languages Online Free Leawo Tutorial Center
Nationsotc.com/Bcbsri
Notifications & Circulars
Sallisaw Bin Store
Re/Max Houses For Sale
Burkes Outlet Credit Card Sign In
Beaufort Mugfaces Last 72 Hours
Alger Grade Ohm
Documentaries About FLDS: Insightful Looks into the Fundamentalist Church
Ten Conservative Principles
Vadoc Gtlvisitme App
Johnnie Robinson Auto Sales
Carter Williamson Jay Ok
Greenville Sc Greyhound
Latest Posts
Article information

Author: The Hon. Margery Christiansen

Last Updated:

Views: 5643

Rating: 5 / 5 (70 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: The Hon. Margery Christiansen

Birthday: 2000-07-07

Address: 5050 Breitenberg Knoll, New Robert, MI 45409

Phone: +2556892639372

Job: Investor Mining Engineer

Hobby: Sketching, Cosplaying, Glassblowing, Genealogy, Crocheting, Archery, Skateboarding

Introduction: My name is The Hon. Margery Christiansen, I am a bright, adorable, precious, inexpensive, gorgeous, comfortable, happy person who loves writing and wants to share my knowledge and understanding with you.