Overview
VulnTrack supports three industry-standard vulnerability assessment frameworks:- DREAD: Risk scoring for prioritization (1-10 scale)
- STRIDE: Threat modeling categorization (boolean flags)
- CVSS: Common Vulnerability Scoring System (0-10 scale)
DREAD Scoring
DREAD is a risk assessment framework that produces a numeric score based on five factors.DREAD Score Structure
Calculating DREAD Score
The total DREAD score is the average of the five components:Setting DREAD Scores
DREAD scores can be set when creating or updating vulnerabilities:DREAD Interpretation
| Score Range | Risk Level | Action |
|---|---|---|
| 8.0 - 10.0 | Critical | Fix immediately |
| 6.0 - 7.9 | High | Fix in current sprint |
| 4.0 - 5.9 | Medium | Schedule for next release |
| 2.0 - 3.9 | Low | Fix when convenient |
| 0.0 - 1.9 | Minimal | Consider as enhancement |
STRIDE Threat Modeling
STRIDE is a threat classification framework that categorizes security threats into six types.STRIDE Structure
STRIDE Categories
Spoofing
Spoofing
Threat: Impersonating a user, process, or system.Examples:
- Session hijacking
- Authentication bypass
- Token theft
Tampering
Tampering
Threat: Modifying data or code.Examples:
- SQL injection
- Parameter manipulation
- Code injection
Repudiation
Repudiation
Threat: Performing actions without accountability.Examples:
- Missing audit logs
- Unsigned transactions
- Anonymous operations
Information Disclosure
Information Disclosure
Threat: Exposing sensitive information.Examples:
- Data leaks
- Verbose error messages
- Insecure storage
Denial of Service
Denial of Service
Threat: Degrading or denying service.Examples:
- Resource exhaustion
- Rate limit bypass
- Crash exploitation
Elevation of Privilege
Elevation of Privilege
Threat: Gaining unauthorized privileges.Examples:
- Privilege escalation
- Authorization bypass
- Role manipulation
Setting STRIDE Flags
CVSS Integration
CVSS (Common Vulnerability Scoring System) scores are automatically imported when creating vulnerabilities from CVE data.CVSS Score Range
| Score | Severity | Color |
|---|---|---|
| 9.0 - 10.0 | Critical | Red |
| 7.0 - 8.9 | High | Orange |
| 4.0 - 6.9 | Medium | Yellow |
| 0.1 - 3.9 | Low | Blue |
| 0.0 | None | Gray |
CVSS to DREAD Mapping
When importing CVEs, VulnTrack automatically derives DREAD scores from CVSS vectors.mapCvssToDread
Converts a CVSS v3.1 vector string to a DREAD score.Mapping Logic
- Exploitability
- Reproducibility
- Discoverability
- Affected Users
- Damage
Maps from: Attack Vector (AV)
CVE Import with Scoring
When importing CVEs, scores are automatically calculated:KEV Enhancement
If a CVE is listed in CISA’s Known Exploited Vulnerabilities catalog:Updating Scores
Scores can be updated after creation:Scoring in Queries
Scores are included when fetching vulnerabilities:Scoring Best Practices
When to Use Each Framework
Design Phase - Use STRIDE
During architecture and design, use STRIDE to identify potential threat vectors.
Discovery Phase - Use CVSS
When vulnerabilities are discovered (via scanning, CVE, bug reports), record the CVSS score for industry-standard severity.
Combined Scoring Example
Next Steps
Vulnerabilities
Create and manage vulnerabilities with scoring
Reports
Generate reports with scoring analytics