Vicky's PageVicky's Page
Vivian
Recipe
Tools
English
Semester 3
Vivian
Recipe
Tools
English
Semester 3
  • Main Pages

    • Basic
    • General
    • Block Chain
  • CyberDefense Pro - 1.0 Introduction

    • 1.1 Introduction to TestOut CyberDefense Pro
  • CyberDefense Pro - 2.0 Vulnerability Response, Handling, and Management

    • 2.1 Regulations and Standards
    • 2.2 Risk Management
    • 2.3 Security Controls
    • 2.4 Attack Surfaces
    • 2.5 Patch Management
    • 2.6 Security Testing
  • CyberDefense Pro - 3.0 Threat Intelligence and Threat Hunting

    • 3.1 Threat Actors
    • 3.2 Threat Intelligence
    • 3.3 Threat Hunting
    • 3.4 Honeypots
  • CyberDefense Pro - 4.0 System and Network Architecture

    • 2.1 Regulations and Standards
    • 4.2 Network Architecture
    • Section 4.3 Identity and Access Management (IAM)
    • 4.4 Data Protection
    • 4.5 Logging
  • CyberDefense Pro - 5.0 Vulnerability Assessments

    • 5.1 Reconnaissance
    • 2.1 Regulations and Standards
    • 5.3 Enumeration
    • 5.4 Vulnerability Assessments
    • 5.5 Vulnerability Scoring Systems
    • 5.6 Classifying Vulnerability Information
  • CyberDefense Pro - 6.0 Network Security

    • 2.1 Regulations and Standards
    • 6.2 Wireless Security
    • 6.3 Web Server Security
    • 2.1 Regulations and Standards
    • 6.5 Sniffing
    • 6.6 Authentication Attacks
    • 6.7 Cloud Security
    • 6.8 Email Security
    • 2.1 Regulations and Standards
    • 6.10 Industrial Computer Systems
  • CyberDefense Pro - 7.0 Host-Based Attacks

    • 7.1 Device Security
    • 7.2 Unauthorized Changes
    • 27.3 Malware
    • 7.4 Command and Control
    • 2.1 Regulations and Standards
    • 7.6 Scripting and Programming
    • 2.1 Regulations and Standards
  • CyberDefense Pro - 8.0 Security Management

    • 8.1 Security Information and Event Management (SIEM)
    • 8.2 Security Orchestration, Automation, and Response (SOAR)
    • 8.3 Exploring Abnormal Activity
  • CyberDefense Pro - 9.0 Post-Attack

    • 9.1 Containment
    • 2.1 Regulations and Standards
    • 9.3 Post-Incident Activities
  • A.0 CompTIA CySA+ CS0-003 - Practice Exams

    • A.1 Prepare for CompTIA CySA+ Certification
    • A.2 CompTIA CySA+ CS0-003 Domain Review (20 Questions)
    • A.3 CompTIA CySA+ CS0-003 Practice Exams (All Questions)
  • B.0 TestOut CyberDefense Pro - Practice Exams

    • Section B.1 Prepare for TestOut CyberDefense Pro Certification
    • B.2 TestOut CyberDefense Pro Exam Domain Review
  • Glossary

    • Glossary
  • CYB400

    • Chapter 01
    • Chapter 02
    • Chapter 03
    • Chapter 04
    • Project 01
  • CYB402

    • lab
    • essay
  • CYB406

    • lab 01
    • lab 02
    • lab 03
    • lab 04
    • lab 05
    • lab 06
  • CYB300 Automobility Cybersecurity Engineering Standards

    • Schedule
    • Tara PPT
    • MidTerm Notes
    • Questions
  • ISO 21434

    • Introduction
    • Forward
    • Introduction
    • Content
  • CYB302 Automobility Cybersecurity

    • Week 01
    • Week 02
    • Week 03
    • Week 04
    • Chapter 5 - AUTOSAR Embedded Security in Vehicles
    • Chapter 6
    • Chapter 7
    • Chapter 8
    • How to Write
    • Review 5
  • CYB304 Project Management For Cybersecurity In Automobility

    • Unit 1 Introduction
    • Unit 1 Frameworks
    • Unit 1 Methodologies
    • Unit 1 Standards
    • Unit 1 Reqirements
    • Unit 2 Scheduling
    • Unit 2 Scheduling 2
    • Unit 2 Trends
    • Unit 2 Risk
    • Unit 2 Project Monitoring & Controlling
    • Unit 2 Budgeting
    • Unit 2 Closure
  • Project Manager

    • Resource
    • Gantt Charts
    • Intrduction
    • First Things
    • Project Plan
    • Project Schedule
    • Agile
    • Resource
  • CYB306 Cyber-Physical Vehicle System Security

    • Chapter 1
    • Chapter 2
    • Chapter 3
    • Chapter 4
    • Chapter 5
    • Chapter 6 - Infrastructure for Transportation Cyber-Physical Systems
    • Chapter 7
    • Chapter 8
    • Chapter 9
    • Chapter 10
    • Chapter 11
    • Case 3
    • Case 4
    • Discussion 4
    • Discussion 5
  • CYB308 Cybersecurity System Audits

    • Week 01
    • Week 02
    • Week 03
    • Week 04
    • Week 05
    • C 4
    • C 5
    • C 5 Business Resilience
    • C 6
    • C 6-2
    • Review
    • Questions
  • CYB308 TextBook

    • CHAPTER 1 Becoming a CISA
    • CHAPTER 2 IT Governance and Management
    • CHAPTER 3 The Audit Process
    • CHAPTER 4 IT Life Cycle Management
    • Input Controls
    • CHAPTER 5 IT Service Management and Continuity
    • Business Resilience
    • CHAPTER 6 Information Asset Protection
    • Encryption
    • Appendix A
    • Appendix B
    • Appendix C

Section 5.5 Vulnerability Scoring Systems

As you study this section, answer the following questions:

  • Why is it helpful to use tools based on known vulnerability databases?
  • What are five helpful government-sponsored resources?
  • What is the value of a CVSS score to a cybersecurity specialist?
  • How is a CVSS score calculated?
  • Which CVSS tools are available to evaluate potential vulnerabilities on your network?

Key terms for this section include the following:

Term Definition
Common Vulnerability Scoring System (CVSS)A system that categorizes vulnerabilities by threat level.
CVSS calculatorA calculator for determining the risk level of vulnerabilities based on base, temporal, and environmental metrics.
Cybersecurity and Infrastructure Security Agency (CISA)A large government-sponsored organization that provides many resources for cybersecurity.
National Vulnerability Database (NVD)A government-sponsored, detailed database of known vulnerabilities.
Full disclosureA public, vendor-neutral forum for the discussion of vulnerabilities and threats that often has the newest information. It also has tools, papers, news, and events related to vulnerabilities and threats.

This section helps you prepare for the following certification exam objectives:

Exam Objective
CompTIA CySA+ CS0-0031.4 Compare and contrast threat-intelligence and threat-hunting concepts
  • Collection methods and sources
    • Open source
      • Blogs/forums
      • Government bulletins
  • Threat intelligence sharing
    • Vulnerability management

2.2 Given a scenario, analyze output from vulnerability assessment tools

  • Tools
    • Vulnerability scanners
      • Nessus
      • OpenVAS

2.3 Given a scenario, analyze data to prioritize vulnerabilities

  • Common Vulnerability Scoring System (CVSS) interpretation
    • Attack vectors
    • Attack complexity
    • Privileges required
    • User interaction
    • Scope
    • Impact
      • Confidentiality
      • Integrity
      • Availability
  • Exploitability/weaponization
  • Asset value
  • Zero-day

4.1 Explain the importance of vulnerability management reporting and communication

  • Vulnerability management reporting
    • Vulnerabilities
    • Risk score

5.5.1 Vulnerability Scoring Systems

Click one of the buttons to take you to that part of the video.

Vulnerability Scoring Systems 00:00-00:37 In this lesson, I'm going to talk about vulnerability scoring systems. In the United States, the Department of Homeland Security has a color-coded advisory system that categorizes the danger of potential threats to citizens. This system gives security professionals direction by telling them how quickly to act and which efforts to make to keep the country safe. There's a similar scoring system in place for IT security threats to organizations and businesses. It's called the Common Vulnerability Scoring System, or CVSS. Instead of colors, this system uses numbers to rank IT vulnerabilities.

CVSS Calculator 00:37-01:01 A CVSS calculator can determine a vulnerability's severity level based on three metrics: base, temporal, and environmental metrics. Base metrics describe a vulnerability's unique characteristics. Temporal metrics describe its changeable attributes, and environmental metrics describe vulnerabilities that are only present in certain environments or implementations.

Government Resources 01:01-01:23 This scoring system creates a way for you to prioritize vulnerabilities that you might discover on your network. It also gives you credibility when you present your remediation plan of action, as these are internationally recognized scores. Through the Department of Homeland Security, the US government sponsors five valuable resources for security analysts. Let's go through them one by one.

Common Vulnerabilities and Exposures 01:23-01:55 The first one is Common Vulnerabilities and Exposures, or CVE. This is a list of standardized identifiers for known software vulnerabilities and exposures. CVE is free to use and publicly available at cve.mitre.org. There are currently 94 CVE numbering authorities from 16 countries, which provides a good evaluation baseline for you. It also provides standardization, which allows data exchange for cybersecurity automation and aids professionals as they determine the best assessment tools to use.

National Vulnerability Database 01:55-02:36 The CVE list also supplies the National Vulnerability Database. The National Vulnerability Database, or NVD, was originally created in 2000. You can find it at nvd.nist.gov. The NVD list includes more specific information for each entry than the CVE list, such as fix information, severity scores, and impact ratings. This list is searchable by product name or version number, vendor, operating system, impact, severity, and related exploit range. This detailed database adds breadth to your research. The variety of ways to find results on the site makes searches very efficient.

Cybersecurity and Infrastructure Security Agency 02:36-03:10 The third resource is the Cybersecurity and Infrastructure Security Agency, or CISA. You can access it at us-cert.gov. This government site provides information exchange, training and exercises, risk and vulnerability assessments, data synthesis and analysis, operational planning and coordination, watch operations, and incident response and recovery resources. This site is valuable because it belongs to a large governmental organization with many resources committed to helping you with cybersecurity.

Common Weakness Enumeration 03:10-03:47 The fourth resource is Common Weakness Enumeration, or CWE. You can find it at cwe.mitre.org. CWE is a community-developed list of common software security weaknesses. The community strives to create commonality in software security weakness descriptions. This creates a reference for identifying, mitigating, and preventing vulnerabilities. It also provides a standardized way to evaluate assessment tools. This site combines diverse ideas and perspectives from professionals, academics, and government sources to create a unified cybersecurity standard.

Common Attack Pattern Enumeration and Classification 03:47-04:18 The fifth government-sponsored resource is Common Attack Pattern Enumeration and Classification, or CAPEC. You can find it at capec.mitre.org. It's a dictionary of known cyberattack patterns used by hackers. You can search the list by attack mechanism, attack domain, key terms, and CAPEC ID number. You can browse through the list to see common attacks and their specific patterns. There are other helpful resources available besides the ones sponsored by the Department of Homeland Security. I want to talk about two of them.

Japanese Vulnerability Notes 04:18-04:43 The first is from a non-profit organization in Japan called JPCERT or JVN, which stands for Japanese Vulnerability Notes. This organization is dedicated to helping cybersecurity professionals protect their organizations from attack. It offers detailed information on vulnerabilities, including affected products, possible impacts, solutions, vendor statements, and reference documents.

Full Disclosure 04:43-05:11 The final resource is a mailing list from nmap called Full Disclosure. Not only do they provide a mailing list that often has the newest vulnerabilities listed before they show up on the government-sponsored resources, but the site also provides a vendor-neutral forum for discussing exploitation strategies and vulnerabilities. It's a resource for discovering events that are happening in the cybersecurity community. You can find it at seclists.org/fulldisclosure.

Summary 05:11-05:55 That's it for this lesson. In this lesson, we discussed that a vulnerability scoring system exists to help you evaluate and prioritize the severity level of the vulnerabilities you find. It's critical for security professionals to stay up to date on the most current attack methods. Fortunately, you have several valuable resources that are free for you to access. We introduced you to seven. The first five are sponsored by the United States government. They are CISA, NVD, CVE, CWE, and CAPEC. We also highlighted the Japanese JPCERT or JVN. We finished up by looking at the Full Disclosure vulnerabilities mailing list.

5.5.2 Vulnerability Scoring System Facts

This lesson focuses on vulnerability scoring systems. In the United States, the Department of Homeland Security has a color-coded advisory system that signifies levels of potential threat. This system gives direction on how quickly to act and what efforts to make regarding a threat.

Similarly, a scoring system called the Common Vulnerability Scoring System (CVSS) is in place for IT security threats to organizations and businesses.

This lesson covers the following topics:

  • Common Vulnerability Scoring System (CVSS)
  • CVSS calculator
  • CVSS vector string
  • Benefits of CVSS
  • CVSS tools
  • Government resources
  • Non-government resources

Common Vulnerability Scoring System

Common Vulnerability Scoring System (CVSS) is an industry-standard method for assessing the severity of software vulnerabilities. It provides an objective measure of the risk posed by a given vulnerability, allowing IT teams to prioritize remediation efforts and allocate resources more effectively. It was developed by the Forum of Incident Response and Security Teams (FIRST). The following table compares the severity level and the base score range of CVSS 2.0 and CVSS 3.0.

CVSS 2.0 CVSS 3.0
Severity Base Score Range Severity Base Score Range
--None0.0
Low0.0-3.9Low0.1-3.9
Medium4.0-6.9Medium4.0-6.9
High7.0-10.0High7.0-8.9
--Critical9.0-10.0

CVSS is a vital tool for IT teams to identify, assess, and address potential vulnerabilities, helping to ensure the security of their systems and the data they contain. CVSS is based on the concept of risk. It considers the likelihood of a vulnerability being exploited on a particular system and the potential impact on that system. CVSS is not designed to measure the exploitability of a vulnerability, nor does the scoring take into account the cost of fixing the vulnerability.

CVSS Calculator

A CVSS calculator can determine the risk and severity of a vulnerability. After identifying the threat agent, affected system, impact on the system, and probability of the threat agent accessing the system, the last step is to apply a formula (which varies depending on the identified metrics) to arrive at a CVSS score. A somewhat complicated formula calculates CVSS scores, but the scoring process can be broken down into five steps.

  1. Identify the threat agent. The most common threat agents used in CVSS scoring metrics are unauthenticated, authenticated, and remote unauthenticated users. Keep in mind that each of these threat agents has a separate impact score.
  2. Identify the affected system. This includes identifying the product name and the type of system involved.
  3. Assign a score based on impact. Assign a score based on the impact of exploiting the vulnerability on the affected system. Scoring metrics include confidentiality, integrity, availability, and accountability.
  4. Identify the probability of the threat agent accessing the system. Determine if the threat agent can successfully access the system. This includes evaluating the system's environment and the threat agent's abilities.
  5. Calculate the overall CVSS score. The formula used to calculate the overall CVSS score will vary depending on the scoring metrics identified in previous steps.

NIST provides a useful Common Vulnerability Scoring System Calculator available at https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator/

CVSS Vector String

A CVSS vector string is a piece of additional information provided alongside a CVSS score to provide more context around the scoring metrics used to calculate the overall CVSS score. The vector string is broken into fields that include the following:

Metric Description
Vulnerability identifierThe vulnerability identifier field contains the identifier used to calculate the overall CVSS score.
ImpactThe impact field provides the overall impact score (determined using the scoring metrics discussed in the previous section) to the affected system due to the exploitation of the vulnerability.
Environmental concernsThe environmental concerns field indicates the risk associated with the vulnerability in the target host environment.
Additional informationThe additional information field provides details about the vulnerability, such as the vendor name, the impact type, and more.

Benefits of CVSS

CVSS provides an objective measure of the risk posed by a given vulnerability, allowing IT teams to prioritize remediation efforts and allocate resources more effectively. It is important to note that CVSS is not a measure of exploitability, so it does not indicate whether or not a vulnerability can be exploited. Instead, it is designed to provide insight into a vulnerability's potential impact in the event it is exploited. CVSS also gives IT teams more granular information about the vulnerabilities in their systems, allowing them to take a more targeted and efficient approach to remediate those vulnerabilities. It is important to note that each vulnerability has its own CVSS score, allowing IT teams to prioritize those vulnerabilities that pose the highest risk.

CVSS Tools

Given the importance of CVSS, many tools are available to help organizations calculate a CVSS score and understand the potential risks associated with a given vulnerability. The following table identifies some common tools used to calculate a CVSS score:

Tool Description
NessusNessus is a widely used vulnerability assessment tool to identify system vulnerabilities. It also enables organizations to gauge the risk associated with those vulnerabilities based on several factors, including the CVSS score.
OpenSCAPOpenSCAP is an open-source scanner used to identify system vulnerabilities. It also provides the ability to calculate a CVSS score based on the vulnerabilities identified in the system.
QualysQualys is another widely used vulnerability assessment tool to identify system vulnerabilities. It also provides the ability to calculate a CVSS score based on the vulnerabilities identified in a system.
OpenVASOpenVAS is an open-source scanner used to identify vulnerabilities in systems. It also provides the ability to calculate a CVSS score based on the vulnerabilities identified in the system.
SecurityScorecardSecurityScorecard is a cloud-based solution that enables organizations to assess and improve their security posture. It also provides the ability to calculate a CVSS score based on the vulnerabilities identified in the system.

Government Resources

The US government, through the Department of Homeland Security, has sponsored five valuable resources for security analysts.

Resources Description
Common Vulnerabilities and Exposures (CVE)The CVE is a list of standardized identifiers for known software vulnerabilities and exposures. It is free to use, and it is publicly available at cve.mitre.org. Facts about the CVE include:
  • There are currently 94 CVE Numbering Authorities from 16 countries providing a baseline for evaluation.
  • CVE identifiers provide standardization that allows data exchange for cybersecurity automation.
  • This CVE list aids in determining the best assessment tools.
  • The CVE list supplies the National Vulnerability Database (NVD).
National Vulnerability DatabaseThe National Vulnerability Database was originally created in 2000. It can be found at nvd.nist.gov. The NVD list includes detailed information for each entry in the CVE list, such as:
  • Fix information.
  • Severity scores.
  • Impact ratings.
The NVD is searchable by:
  • Product name or version number.
  • Vendor.
  • Operating system.
  • Impact.
  • Severity.
  • Related exploit range.
Cybersecurity & Infrastructure Security Agency (CISA)CISA is a government agency tasked to understand and manage risk to the nation's critical infrastructure. Its website is cisa.gov. The government site provides:
  • Information exchange.
  • Training and exercises.
  • Risk and vulnerability assessments.
  • Data synthesis and analysis.
  • Operational planning and coordination.
  • Watch operations.
  • Incident response and recovery.
Common Weakness Enumeration (CWE)CWE is a community-developed list of common software security weaknesses. Its website is cwe.mitre.org. Be aware of the following facts regarding CWE:
  • The CWE site combines the diverse ideas and perspectives of professionals, academics, and government sources to create a unified standard for cybersecurity.
  • The CWE strives to create commonality in the descriptions of security weaknesses of software.
  • The CWE list provides a reference for identification, mitigation, and prevention of vulnerabilities.
  • The list also provides standardization for evaluating assessment tools.
Common Attack Pattern Enumeration & Classification (CAPEC)CAPEC is a dictionary of known patterns of cyber attacks used by hackers. Its website is capec.mitre.org. This list is searchable by:
  • Mechanisms or domains of attack.
  • Key terms.
  • CAPEC ID numbers.
  • Specific patterns of attack.
This resource is valuable because you can browse through it to see common attacks used by hackers.

Non-Government Resources

Two non-government sites also provide valuable information for the ethical hacker.

Resources Description
JPCERTJPCERT is Japan's CERT organization. It provides security alerts and Japanese Vulnerability Notes (JVN). The website is . This site provides detailed information about each vulnerability, including:
  • Affected products.
  • Possible impacts.
  • Solutions.
  • Vendor statements.
  • Reference documents.
Full DisclosureFull Disclosure is a mailing list from nmap. Its website is seclists.org/fulldisclosure/ . Full Disclosure is a public forum to discuss of software vulnerabilities and attack techniques. Full Disclosure:
  • Often shows the newest vulnerabilities before other sources.
  • Gives researchers the right to decide how they will disclose the vulnerabilities they discover.
  • Shows tools, papers, and news regarding security.
  • Is a source of events of interest for the security community.

5.5.3 CVSS Scoring Considerations

This lesson covers the following topics:

  • CVSS scoring considerations
  • Vulnerability score adjustment examples
  • CVSS score calculations
  • CVSS score calculation tools

CVSS Scoring Considerations

Assessing the severity of a vulnerability is a crucial component of vulnerability analysis. It is important to remember that vulnerability scores are not static; they are subject to change based on several factors. When adjusting vulnerability scores, organizations must consider a variety of special considerations, such as the availability of patches, the impact of the vulnerability, and the level of sophistication of the threat actors targeting them. By taking the time to consider these additional factors, organizations can ensure that their vulnerability scores are appropriately adjusted and accurately reflect the actual risk posed by the vulnerability.

Organizations consider several factors to ensure that vulnerability scores are appropriately adjusted. Some of the most common include the following:

Consideration Explanation
Availability of patchesWhen vulnerabilities are associated with a piece of software, one of the most important considerations is whether a patch is available. Organizations should be able to use the CVSS vector to find out how quickly a vendor plans to patch a specific vulnerability. In many cases, vendors will provide this information in their security advisories. However, if no patches are available, this is a significant factor that will influence the severity of the vulnerability. For example, a remote code execution vulnerability in a critical piece of software, such as an operating system, will likely have a CVSS score of 10. If an effective patch is available, an organization may shift the score lower, depending on the complexity of the patch.
Impact of the vulnerabilityConsiderations generally include the potential damage caused by successful exploitation and the effort required to mitigate it. For example, a vulnerability that allows an attacker to gain unauthorized access to a single, low-value system will have a lower score than a vulnerability allowing an attacker to modify or delete data stored in a database.
Level of sophistication of threat actorsSophistication level of threat actors determines the likelihood that an attacker can successfully exploit a vulnerability. Some threat actors are well-funded and highly sophisticated, able to identify and exploit vulnerabilities without difficulty. Others rely solely on weaponized vulnerabilities and toolkits and are, therefore, more limited in their ability to execute a successful attack.
Asset valueAn asset's value may influence a vulnerability's score. Highly valuable assets, like those with far-reaching impacts if breached, may have little tolerance for vulnerabilities, skewing all scores into the high/critical range.
WeaponizationWeaponization assesses the likelihood that an attacker will be able to weaponize a vulnerability to achieve their objectives. This metric considers factors such as the attack vector (AV) and attack complexity (AC) which affect the ease with which an attacker can create a functional exploit. An attacker can easily use weaponized exploits to gain unauthorized access to a system, steal sensitive information, or carry out other malicious activities. Additionally, attackers can easily share weaponized exploits for others to use.
ExploitabilityA vulnerability with high exploitability is more likely to be targeted by an attacker and therefore requires urgent attention. Conversely, a vulnerability with low exploitability may be less urgent as it is less likely to be exploited. The exploitability of a vulnerability depends on many factors, including its attack complexity (AC), the availability of tools and techniques to exploit it (weaponization), and any security measures already in place to defend against the vulnerability. Vulnerability scanning tools and penetration testing can help quantify a vulnerability's exploitability.

It is important to note that low exploitability does not mean that a vulnerability is not severe. Analysts must carefully consider all aspects of a vulnerability, including its potential impact, to make informed decisions about remediation.

A *zero-day* vulnerability represents an exploitable vulnerability with no available patch. The lack of an available patch is caused either because the vulnerability is new and a patch is not yet available or because the vulnerability is entirely unknown to the software provider.

These vulnerabilities are highly valuable to attackers. Standard vulnerability scanning techniques cannot detect unknown zero-day exploits because the scanner depends upon a vulnerability database of known vulnerabilities.

Vulnerability Score Adjustments Examples

Consider a hypothetical remote code execution (RCE) vulnerabilisty with a CVSS score of 10. During the risk assessment process, the organization discovers that successfully exploiting the vulnerability requires an attacker to be connected to the same network as the vulnerable application. Further analysis reveals that the vulnerable application only runs on a single, fully air-gapped system. This information would be a justifiable reason to lower the score since the computer is not accessible via the network.

Another example might include a vulnerability marked as "informational" and not designated with a CVSS score, such as vulnerabilities associated with web applications. Further investigation of these vulnerabilities often reveals that the web application is easily exploitable and could result in significant damage.

CVSS Score Calculations

Calculating a CVSS score can quickly become a complex and daunting task. CVSS, or the Common Vulnerability Scoring System, is a framework used to score and rank the severity of IT vulnerabilities, helping organizations better understand and prioritize the threats they face. The scoring system uses a set of metrics that measure a vulnerability's technical, environmental, and temporal characteristics. Knowing how to calculate a CVSS score can be helpful.

The CVSS scoring system consists of several metrics used to calculate a given vulnerability's risk level and grouped into three categories—Impact, Exploitability, and Remediation.

Categories:
  • Impact - The potential damage or harm caused by the vulnerability.
  • Exploitability - The ease and likelihood of exploiting a vulnerability.
  • Remediation - The cost and effort required to fix the vulnerability.
Metrics:
  • Scope - The number of systems and people affected by the vulnerability.
  • Confidentiality - The extent to which data is disclosed.
  • Integrity - The extent to which the system's functionality is changed or impaired.
  • Availability - The extent to which a system is unavailable.
  • Privacy - The extent to which the system's privacy is impacted.
  • Operations - The extent to which the system's security is affected.
  • Other - Any other relevant or important factors.

The 3 metric groups along with their components.

Description

Base metric group - exploitability metrics: attack vector, attack complexity, privileges required, and user interaction; impact metrics: confidentiality impact, integrity impact, and availability impact; scope. Temporal metric group - exploit code maturity, remediation level, and report confidence. Environmental metric group - modified base metrics, confidentiality requirement, integrity requirement, and availability requirement.

CVSS score metrics are grouped into three categories.

CVSS Score Calculation Tools

There are several CVSS score calculators. A few are listed below:

Calculator Name Online Location

Common Vulnerability Scoring System Calculator

https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator/
Common Vulnerability Scoring System Version 3.0 Calculator https://www.first.org/cvss/calculator/3.0

Cisco Security Common Vulnerability Scoring System

https://sec.cloudapps.cisco.com/security/center/cvssCalculator.x
Last Updated:
Prev
5.4 Vulnerability Assessments
Next
5.6 Classifying Vulnerability Information