Thought Leadership & Blogs

What is the CVS system and how does it work?

Written by Heather Buker | Aug 11, 2022

What is a Common Vulnerability Scoring System?

The Common Vulnerability Scoring System (CVSS) is a standardized method used to assess and rate the severity of security vulnerabilities. It provides a way to objectively measure and compare the impact of vulnerabilities across different systems and environments. By analyzing various factors such as exploitability, access requirements, and potential impact, the CVSS assigns a numerical score to each vulnerability, enabling security teams to prioritize and address them effectively.

Benefits of using a CVS

The Common Vulnerability Scoring System (CVSS) provides numerous benefits for organizations when it comes to managing security vulnerabilities effectively. Here are some key advantages of using a CVS:

1. Prioritizing Vulnerability Remediation: CVS enables organizations to prioritize the remediation of vulnerabilities based on their severity. By considering the impact a vulnerability can have on a network environment, IT teams can allocate resources and address the most critical vulnerabilities first. This helps organizations mitigate potential risks more effectively and minimize the chances of a security breach.

2. Consistent and Objective Scoring: CVS offers a standardized and objective method for scoring vulnerabilities. It uses a set of metrics, including the severity of the vulnerability and its impact on the network environment, to assign a numerical score. This allows security teams to compare vulnerabilities and make informed decisions based on the severity ratings.

3. Efficient Resource Allocation: By ranking vulnerabilities based on their potential impact, CVS helps IT teams allocate their limited resources more efficiently. This ensures that the most critical vulnerabilities receive immediate attention and remediation efforts are focused where they are needed the most.

4. Industry Standard: CVS is widely recognized as an industry standard for assessing the severity of security vulnerabilities. Its widespread adoption ensures that organizations can communicate and share vulnerability information effectively, both internally and externally, enabling better collaboration and information exchange among security professionals.

In conclusion, the use of the Common Vulnerability Scoring System (CVS) offers organizations several benefits, including the ability to prioritize vulnerability remediation based on severity and impact, consistent and objective scoring, efficient resource allocation, and adherence to an industry standard. By leveraging CVS, organizations can enhance their overall security posture and reduce the chances of falling prey to potential security threats.

Understanding the metrics used in CVS

Common Vulnerability Scoring System (CVS) utilizes a variety of metrics to assess the severity of security vulnerabilities. These metrics help organizations prioritize remediation efforts and allocate resources effectively. One important metric is the base score, which takes into account the technical details of a vulnerability such as attack complexity and the level of access required. Another metric is the temporal score, which considers factors such as the availability of exploit code or a recent increase in attacks targeting the vulnerability. Additionally, the environmental score takes into consideration the specific characteristics of an organization's network environment. By understanding these metrics, organizations can gain insight into the severity of vulnerabilities and make informed decisions about prioritizing their remediation efforts.

Base Scores

The Base Scores in the Common Vulnerability Scoring System (CVSS) are generated to provide a standardized measure of the severity of security vulnerabilities. These scores are calculated based on two sets of metrics: Exploitability metrics and Impact metrics.

The Exploitability metrics evaluate the likelihood of a successful exploit on a vulnerable component. These metrics include Attack Vector, which assesses the type of network access needed for an attacker; Attack Complexity, which measures the level of difficulty for an attacker to exploit the vulnerability; Privileges Required, which determines the access level needed by an attacker; and User Interaction, which evaluates whether user interaction is necessary for the exploit.

The Impact metrics, on the other hand, measure the potential harm that can result from a successful exploit. Confidentiality Impact evaluates the impact on the confidentiality of the vulnerable asset; Integrity Impact assesses the impact on integrity; and Availability Impact gauges the impact on the availability of the affected system.

These metrics collectively determine the exploitability and impact of vulnerabilities. By assigning numerical values to each metric, the Base Scores can be calculated. The higher the Base Score, the greater the severity of the vulnerability.

In conclusion, the Base Scores in CVSS provide a comprehensive assessment of vulnerability severity. By considering both exploitability and impact metrics, organizations and security teams can effectively prioritize their remediation efforts.

Temporal Score

The Temporal Score is an essential aspect of the Common Vulnerability Scoring System (CVSS), used to assess the current status of a vulnerability. It measures dynamic characteristics of a vulnerability, such as the availability of patches or workarounds, and provides additional context to the Base Score.

One of the main purposes of the Temporal Score is to reflect the decreasing or increasing severity of a vulnerability over time. For example, if a vulnerability has a readily available patch, the Temporal Score will be lower, indicating a lower risk. On the other hand, if there are no patches or effective workarounds, the Temporal Score will be higher, indicating a higher risk.

To calculate the Temporal Score, several metrics are considered. Exploit Code Maturity measures the maturity level of any known exploit code available in the wild. A higher maturity level suggests a higher risk. Remediation Level evaluates the availability and effectiveness of any security measures, such as patches or workarounds, to mitigate the vulnerability. Report Confidence assesses the level of confidence in the accuracy and completeness of the vulnerability report.

By factoring in these Temporal metrics, the CVSS generates a comprehensive Temporal Score that reflects the current status of a vulnerability. This score provides security teams and organizations with valuable information to prioritize remediation efforts and address the most critical vulnerabilities promptly.

Environmental Score

The Environmental Score plays a crucial role in measuring the impact of vulnerabilities in specific environments. It takes into account various factors that contribute to the overall risk of a vulnerability. These factors include collateral damage potential, target distribution, confidentiality requirement, integrity requirement, and availability requirement.

Collateral damage potential refers to the potential harm that could be caused by exploiting the vulnerability. This metric assesses the extent to which other systems and resources may be affected if the vulnerability is successfully exploited.

Target distribution evaluates the likelihood of an attacker being able to access the vulnerable component. It considers the number of systems or assets within the environment that are vulnerable to the exploit.

Confidentiality requirement assesses the sensitivity of the information that is at risk if the vulnerability is exploited. It takes into account the level of confidentiality needed to protect the information.

Integrity requirement evaluates the importance of maintaining the integrity of the assets within the environment. It considers the potential impact on the reliability and accuracy of the information if the vulnerability is exploited.

Availability requirement measures the importance of ensuring continuous access to the assets within the environment. It considers the potential disruption or denial of service that could occur if the vulnerability is exploited.

By considering these metrics, the Environmental Score provides an estimation of the overall impact and severity of a vulnerability in a specific environment. It helps security teams prioritize their efforts and allocate resources effectively to mitigate the risks posed by vulnerabilities.

Report Confidence

Report Confidence is a crucial metric within the Common Vulnerability Scoring System (CVSS) that assesses the level of confidence in the existence of a vulnerability and the credibility of its technical details. It provides a valuable indicator for security teams and ensures that vulnerability reports are accurately evaluated.

The values associated with Report Confidence range from "Confirmed" to "Unknown." A "Confirmed" value is assigned when the vulnerability has been acknowledged and confirmed by the affected vendor or a reliable source. This signifies a high level of confidence in the existence of the vulnerability and the accuracy of its technical details.

On the other hand, a value of "Unknown" is assigned when the cause or impacts of the vulnerability are uncertain or conflicting. This indicates low or limited confidence in the vulnerability report. It may mean that the report lacks sufficient evidence or is based on unreliable sources.

The various values in between these extremes reflect different levels of confidence and credibility, allowing for a more nuanced assessment. These values help security teams prioritize and allocate limited resources effectively.

In conclusion, the Report Confidence metric in CVSS plays a crucial role in assessing the level of confidence in the existence of a vulnerability and the credibility of its technical details. It helps security teams make informed decisions based on the reliability of vulnerability reports.

Numerical Score & Metric Values

The Numerical Score and Metric Values are essential components of the Common Vulnerability Scoring System (CVSS), a standardized framework for assessing the severity and impact of security vulnerabilities. These values play a crucial role in determining the overall vulnerability score and aiding security teams in prioritizing remediation efforts.

The Numerical Score ranges from 0 to 10 and provides a quick assessment of the vulnerability's severity level. A higher score indicates a more critical vulnerability, posing a greater risk to the affected system or network. This score is calculated based on various metric values that reflect the inherent characteristics of the vulnerability.

The Metric Values used in the CVSS calculation include the exploitability subscore, impact sub-score, and potential for loss. The exploitability subscore measures the ease with which an attacker can exploit the vulnerability, considering factors such as attack complexity and required user interaction. The impact sub-score evaluates the potential consequences of successful exploitation, such as loss of confidentiality or integrity. The potential for loss metric assesses the potential impact on the affected system or organization.

By considering these metric values and calculating the Numerical Score, security teams can better understand the severity of security vulnerabilities and make informed decisions regarding remediation efforts. This standardized approach allows for consistent assessment and prioritization of vulnerabilities across different systems and environments.

Vulnerability Scoring Criteria and Severity Levels

Vulnerability Scoring Criteria and Severity Levels serve as crucial tools in evaluating and understanding the potential risks and impact of security vulnerabilities. The Common Vulnerability Scoring System (CVSS) provides a standardized framework for assessing the severity level of vulnerabilities based on various metrics.

The Numerical Score, ranging from 0 to 10, offers a quick assessment of the vulnerability's severity. A higher score means a more critical vulnerability and a greater risk to the affected system or network. This score is calculated by considering metric values that reflect the inherent characteristics of the vulnerability.

The Metric Values used in the CVSS calculation include the exploitability subscore, impact sub-score, and potential for loss. The exploitability subscore measures the ease with which an attacker can exploit the vulnerability, taking into account factors like attack complexity and required user interaction. The impact sub-score evaluates the potential consequences of a successful exploitation, such as loss of confidentiality or integrity. The potential for loss metric assesses the potential impact on the affected system or organization.

By utilizing these vulnerability scoring criteria and severity levels, organizations can prioritize their security efforts and allocate resources effectively to address the most critical vulnerabilities. It allows security teams to focus on mitigating vulnerabilities that pose the greatest risk, ensuring the overall security and integrity of their systems and networks.

Attack Vector & Complexity

In the Common Vulnerability Scoring System (CVSS), the concepts of Attack Vector and Complexity play a crucial role in assessing the severity of security vulnerabilities.

Attack Vector refers to the different ways an attacker can gain access to a system or network in order to exploit a vulnerability. CVSS defines four possible values for Attack Vector:

1. Network: In this scenario, the attacker can exploit the vulnerability remotely, without any prior access to the targeted system. This typically involves utilizing network-based communication channels to launch attacks, such as through the internet.

2. Adjacent: Here, the attacker must have access to a network that is adjacent to the vulnerable system. This means they are able to exploit the vulnerability by connecting directly to the target's network, such as through a local network connection or a wireless connection in close proximity.

3. Local: In this case, the attacker requires physical or logical access to the targeted system. They may need to be physically present or have limited access privileges to exploit the vulnerability. This could include scenarios where the attacker gains access through an authorized user account.

4. Physical: This value is assigned when the attacker must have direct physical contact with the vulnerable component in order to exploit the vulnerability. For example, this could involve physical tampering or bypassing security measures on hardware devices.

Attack Complexity, on the other hand, signifies the level of difficulty involved in exploiting the vulnerability. CVSS defines two possible values for Attack Complexity:

1. Low: This indicates that exploiting the vulnerability is relatively straightforward and does not require specialized skills or knowledge. It suggests that the attacker can easily automate the attack or use widely available tools.

2. High: This value suggests that exploiting the vulnerability is significantly more challenging. It may require advanced technical skills, specialized knowledge, or complex steps to successfully exploit the vulnerability.

By considering the values assigned to Attack Vector and Complexity, the CVSS base metrics can gauge the severity of security vulnerabilities more accurately, helping security teams prioritize and address them effectively.

User Interaction

User Interaction is a concept in the context of the Common Vulnerability Scoring System (CVSS) that refers to the level of interaction required from a user in order for an attacker to exploit a vulnerability. It is an important factor in determining the severity of security vulnerabilities.

CVSS provides three possible options for User Interaction:

1. None: This indicates that no user interaction is required for an attacker to exploit the vulnerability. The attack can be fully automated without any user involvement.

2. Required: In this case, the attacker needs some interaction from the user to exploit the vulnerability. This could involve the user performing specific actions, such as clicking on a malicious link or opening an infected file.

3. Unknown: This option is used when the level of user interaction required is unknown or cannot be determined.

The level of User Interaction impacts the CVSS score and the severity of security vulnerabilities. If no user interaction is required (None), the vulnerability is considered to be more severe as it can be easily exploited without any user action. If user interaction is required (Required), the severity may be lower as it adds an additional layer of complexity for the attacker.

By considering the level of User Interaction along with other CVSS metrics, such as Attack Vector and Attack Complexity, security teams can accurately assess the severity of vulnerabilities and prioritize their remediation efforts.

User Interaction plays a significant role in determining the severity of security vulnerabilities assessed by the CVSS. It provides insights into the level of user involvement required for an attacker to exploit a vulnerability, enabling organizations to prioritize and address these issues effectively.

Privileges Required

The Privileges Required section in the Common Vulnerability Scoring System (CVSS) assesses the level of access an attacker needs in order to exploit a vulnerability. This section provides three possible options for Privileges Required: None, Low, or High.

1. None: This indicates that the attacker does not require any special privileges to exploit the vulnerability. They can execute the attack with minimal access rights or without any authentication. This increases the severity of the vulnerability as it can be exploited by anyone, including external attackers.

2. Low: In this case, the attacker needs some level of access or specific privileges to exploit the vulnerability. This could involve authenticated access or limited permissions. The severity may be slightly lower compared to None as it imposes some restrictions on who can exploit the vulnerability.

3. High: When the Privileges Required are set to High, it means that the attacker needs extensive access rights or elevated privileges to exploit the vulnerability. This could include administrative or root level access. The severity may be lower compared to None or Low as it limits the number of attackers who have the necessary privileges.

The Privileges Required section is an important factor in determining the severity of security vulnerabilities. It is often combined with other CVSS metrics, such as Access Vector and Access Complexity, to accurately assess the impact of vulnerabilities. Additionally, the security requirements can impact the environmental score by reweighting the Modified Base Impact metrics, considering the specific privileges needed in a given user environment.

Scope of impact

The scope of impact refers to the potential consequences that can occur as a result of a successful attack on the affected component. It helps in evaluating the severity and significance of a vulnerability in terms of its potential impact on a system or network.

The Common Vulnerability Scoring System (CVSS) includes impact metrics to assess the scope of impact. These impact metrics consist of three sub-metrics: confidentiality impact, integrity impact, and availability impact.

The confidentiality impact sub-metric measures the potential loss or disclosure of sensitive information if a vulnerability is exploited. It evaluates the impact on the confidentiality of data and can have the following values:

- None: No loss of confidentiality

- Partial: Some sensitive information may be compromised

- Complete: Full disclosure of all sensitive information

The integrity impact sub-metric assesses the potential modification or alteration of data if a vulnerability is exploited. It evaluates the impact on the integrity of data and can have the following values:

- None: No loss of integrity

- Partial: Some data may be modified or tampered with

- Complete: Full modification or destruction of all data

The availability impact sub-metric measures the potential disruption or unavailability of a system or network if a vulnerability is exploited. It evaluates the impact on the availability of resources and can have the following values:

- None: No impact on availability

- Partial: Some resources may be temporarily unavailable

- Complete: Complete unavailability of resources

By considering the values of these impact sub-metrics, the severity of a vulnerability can be determined, and appropriate measures can be taken to mitigate the potential risks and protect the affected component.

Confidentiality loss

In the realm of cybersecurity, confidentiality loss refers to the potential compromise or disclosure of sensitive information when a vulnerability is exploited. As part of the Common Vulnerability Scoring System (CVSS), confidentiality loss is a crucial aspect that is carefully assessed to determine the overall impact of a successful attack.

CVSS evaluates the impact of a successful attack on the confidentiality of the data housed within the affected component. This assessment takes into account factors such as the type and sensitivity of the compromised information. The resulting impact metrics provide a numerical score to measure the extent of the confidentiality loss.

The potential values for confidentiality in CVSS are categorized as high, low, or none. A high value indicates a total loss of confidentiality, meaning that all sensitive information within the affected component could be fully disclosed to unauthorized parties. This signifies a severe impact that could have significant consequences for individuals or organizations depending on the nature of the compromised data.

Mitigating and addressing vulnerabilities that could lead to confidentiality loss is paramount for maintaining data security. The CVSS enables security teams to prioritize remediation efforts by quantifying and categorizing the level of impact, enabling a more strategic approach to vulnerability management.

Overall, the concept of confidentiality loss within the CVSS emphasizes the importance of safeguarding sensitive information and highlights the potential repercussions of successful attacks on data confidentiality.

Integrity loss

In the context of the Common Vulnerability Scoring System (CVSS), integrity loss refers to the potential for unauthorized modification or deletion of data within the affected component. It evaluates the impact of a successful attack on the integrity of the compromised information.

CVSS considers three potential values for integrity: high, low, and none. A high value indicates a complete loss of integrity, where the compromised data could be significantly modified or deleted. This means that unauthorized parties could manipulate or erase critical information, resulting in severe consequences for individuals or organizations dependent on the integrity of that data.

On the other hand, a low value indicates a partial loss of integrity, where only some specific pieces of information within the affected component could be modified or deleted. Although not as severe as a high value, the unauthorized modification or deletion of specific data can still have significant repercussions.

Lastly, a value of none implies no loss of integrity, indicating that the compromised data remains unmodified and intact. This means that unauthorized parties have not been able to alter or delete any information within the affected component.

Understanding the potential values for integrity loss in CVSS allows security teams to prioritize remediation efforts and take appropriate measures to safeguard against unauthorized modification or deletion of critical data.

Final thoughts

The Common Vulnerability Scoring System (CVSS) is an essential framework that provides organizations with a standardized and objective approach to assess the severity of security vulnerabilities. By analyzing various metrics such as exploitability, impact, and required privileges, CVSS assigns numerical scores to vulnerabilities, allowing security teams to prioritize their efforts effectively.

The benefits of using CVSS are manifold. Organizations can make informed decisions about vulnerability remediation by focusing on the most critical issues that pose the highest risks. The consistent and objective scoring system ensures that vulnerabilities are evaluated uniformly, facilitating better collaboration and information exchange among security professionals.

The three main components of CVSS - Base Metrics, Temporal Metrics, and Environmental Metrics - provide a comprehensive assessment of vulnerability severity. Base Scores consider the inherent characteristics of vulnerabilities, while Temporal Scores account for changing factors over time. Environmental Scores enable organizations to customize the scores based on their specific network environments, providing a more accurate representation of real-world impact.

The Common Vulnerability Scoring System is a valuable tool that equips organizations with the knowledge needed to protect their systems and networks effectively. By understanding and leveraging the various metrics and scores provided by CVSS, security teams can prioritize and address vulnerabilities in a strategic and efficient manner, ultimately bolstering their cybersecurity defenses and safeguarding against potential threats. Staying vigilant and proactive in vulnerability management is vital in today's ever-evolving cybersecurity landscape, and CVSS serves as a critical ally in this ongoing effort to ensure digital security and protect critical assets and data.

Also, read about vulnerability management in Understanding Vulnerability Management. If you'd like to learn more about how 6clicks can help you manage vulnerabilities, please book some time with one of our team members.