Overview
The Common Vulnerability Scoring System (CVSS) is an industry-standard framework for assessing the severity of security vulnerabilities. VulnTrack implements CVSS v3.1, which provides a standardized method to capture the principal characteristics of a vulnerability and produce a numerical score reflecting its severity.CVSS Score Range
CVSS scores range from 0.0 to 10.0, with higher scores indicating greater severity:| Score Range | Severity |
|---|---|
| 0.0 | None |
| 0.1 - 3.9 | Low |
| 4.0 - 6.9 | Medium |
| 7.0 - 8.9 | High |
| 9.0 - 10.0 | Critical |
CVSS Vector String
VulnTrack stores CVSS scores using the standard vector string format:Base Metric Groups
CVSS v3.1 consists of three metric groups. VulnTrack primarily focuses on Base Metrics, which represent the intrinsic characteristics of a vulnerability that are constant over time and across user environments.Exploitability Metrics
These metrics capture how easily a vulnerability can be exploited.Attack Vector (AV)
Attack Vector (AV)
This metric describes the context by which vulnerability exploitation is possible.
The vulnerability is exploitable remotely over a network. The attacker does not require access to the local network or physical proximity.Example: A SQL injection vulnerability in a public web application
The vulnerability requires access to the local network (e.g., LAN, Bluetooth).Example: An ARP spoofing attack on a local network
The attacker must have local access to the system or requires local execution.Example: A privilege escalation vulnerability requiring shell access
The attacker requires physical access to the device.Example: A vulnerability in a hardware security module
Attack Complexity (AC)
Attack Complexity (AC)
This metric describes the conditions beyond the attacker’s control that must exist to exploit the vulnerability.
No special conditions exist. The attacker can expect repeatable success.Example: A buffer overflow with a publicly available exploit
Successful exploitation depends on conditions beyond the attacker’s control (e.g., race condition, information gathering).Example: A timing-based side-channel attack requiring precise conditions
Privileges Required (PR)
Privileges Required (PR)
This metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability.
The attacker requires no authentication or privileges.Example: Unauthenticated remote code execution
The attacker requires basic user privileges.Example: An authenticated user can read other users’ data
The attacker requires significant privileges (e.g., administrator).Example: A vulnerability requiring admin access to exploit
User Interaction (UI)
User Interaction (UI)
This metric captures whether exploitation requires user participation.
The vulnerability can be exploited without any user interaction.Example: A worm that spreads automatically
Exploitation requires a user to perform some action.Example: A phishing attack requiring the user to click a malicious link
Scope (S)
This metric captures whether exploitation of the vulnerability affects resources beyond its security scope.The exploited vulnerability can only affect resources managed by the same security authority.
The exploited vulnerability can affect resources beyond the authorization scope.Example: A VM escape vulnerability allowing access to the host system
Impact Metrics
These metrics capture the direct impact of a successful exploit on the CIA triad.Confidentiality Impact (C)
Confidentiality Impact (C)
Integrity Impact (I)
Integrity Impact (I)
Availability Impact (A)
Availability Impact (A)
Data Storage
In VulnTrack’s database schema, CVSS data is stored in theVulnerability model:
Example: Calculating a CVSS Score
Consider a remote code execution vulnerability in a web application:- AV:N - Exploitable remotely over the internet
- AC:L - Easy to exploit with public exploits available
- PR:N - No authentication required
- UI:N - No user interaction needed
- S:U - Impact limited to the vulnerable component
- C:H/I:H/A:H - Complete compromise of confidentiality, integrity, and availability
Best Practices
Use Standard Vectors
Always store the complete CVSS vector string to ensure reproducibility and transparency in scoring decisions.
Consider Context
While CVSS provides objective severity, always consider your specific environment and risk tolerance.
Regular Updates
Review CVSS scores when new information about a vulnerability becomes available.
Combine Frameworks
Use CVSS alongside DREAD and STRIDE for comprehensive risk assessment.