Overview
DREAD is a risk assessment framework developed by Microsoft for rating security threats. Unlike CVSS, which focuses on technical characteristics, DREAD provides a more business-oriented view of risk by evaluating five key dimensions. VulnTrack implements DREAD scoring to complement CVSS, giving teams multiple perspectives on vulnerability severity.DREAD Dimensions
Each dimension is scored from 1 to 10, where higher values indicate greater risk:Damage
How severe is the damage if the vulnerability is exploited?
Reproducibility
How easy is it to reproduce the attack?
Exploitability
How much effort is required to launch the attack?
Affected Users
How many users or systems would be impacted?
Discoverability
How easy is it to discover the vulnerability?
Scoring Guide
Damage Potential (D)
Damage Potential (D)
Assesses the extent of damage if the vulnerability is exploited.
Complete system compromise, data destruction, or total unavailability.Example: Remote code execution with root/admin privileges
Significant data leakage, serious service disruption, or partial system compromise.Example: SQL injection allowing access to sensitive customer data
Limited information disclosure or temporary service disruption.Example: Exposure of non-sensitive configuration data
Minimal impact, no sensitive data exposure, negligible disruption.Example: Information leak revealing software version
Reproducibility (R)
Reproducibility (R)
Measures how consistently the vulnerability can be exploited.
The attack can be reproduced every time without special conditions.Example: A buffer overflow with a reliable public exploit
The attack succeeds most of the time with minor variations.Example: A race condition that succeeds 80% of the time
The attack requires specific timing or conditions.Example: A TOCTOU vulnerability requiring precise timing
Exploitation is difficult and unreliable.Example: A complex heap corruption requiring specific memory layout
Exploitability (E)
Exploitability (E)
Evaluates the technical skill and effort required to exploit the vulnerability.
No special tools or skills required. Exploit is automated or publicly available.Example: A default credential vulnerability with known username/password
Requires basic tools and moderate technical knowledge.Example: XSS vulnerability exploitable with standard payloads
Requires specialized tools and significant technical expertise.Example: Binary exploitation requiring custom shellcode
Requires advanced skills, custom tools, or insider knowledge.Example: A sophisticated side-channel attack
Affected Users (A)
Affected Users (A)
Estimates the percentage or number of users impacted by the vulnerability.
The vulnerability affects 100% of users or critical infrastructure.Example: A vulnerability in the authentication system affecting all users
The vulnerability affects 50-99% of users or major functionality.Example: A vulnerability in a commonly used feature
The vulnerability affects 10-50% of users or specific user segments.Example: A vulnerability in an optional module
The vulnerability affects less than 10% of users or rarely used functionality.Example: A vulnerability in a deprecated API endpoint
Discoverability (D)
Discoverability (D)
Assesses how easily an attacker can find the vulnerability.
The vulnerability is publicly known or obvious to any attacker.Example: A CVE with public exploits and scanner signatures
The vulnerability can be found with standard scanning tools.Example: An outdated library version detectable by vulnerability scanners
The vulnerability requires targeted investigation or source code analysis.Example: A logic flaw in business workflow
The vulnerability is obscure and requires deep knowledge of the system.Example: A subtle timing vulnerability in cryptographic implementation
Data Storage
DREAD scores are stored in a dedicated table in VulnTrack’s database:total field represents the average DREAD score:
Automatic CVSS to DREAD Mapping
VulnTrack can automatically generate DREAD scores from CVSS vectors using intelligent mapping:Example: DREAD Assessment
Let’s assess a SQL injection vulnerability:Mapping from CVSS
If you have a CVSS vector for the same vulnerability:When to Use DREAD
Risk Prioritization
Use DREAD when you need to prioritize vulnerabilities based on business impact rather than just technical severity.
Stakeholder Communication
DREAD’s business-friendly dimensions make it easier to explain risk to non-technical stakeholders.
Custom Assessments
When your organization’s specific context (user base, attack surface) matters more than industry standards.
Threat Modeling
DREAD works well alongside STRIDE for comprehensive threat modeling sessions.
Best Practices
- Be Consistent: Establish clear scoring guidelines for your team to ensure consistency across assessments.
- Document Rationale: Always document why you assigned specific scores to each dimension.
- Consider Your Environment: Adjust scores based on your specific deployment, user base, and threat landscape.
- Use with CVSS: Don’t replace CVSS with DREAD—use both frameworks for comprehensive assessment.
- Regular Calibration: Periodically review past DREAD scores with your team to ensure scoring remains consistent.
Related Frameworks
- CVSS Scoring - Industry-standard technical severity scoring
- STRIDE Threats - Threat categorization framework
- Framework Comparison - Compare all three frameworks