How it typically works?
- Assessment: the vulnerability’s characteristics are analyzed based on defined metrics.
- Scoring with metrics:
- Base metrics measure fundamental qualities of the vulnerability, such as ease of exploitation or impact on confidentiality, integrity, and availability.
- Temporal metrics account for factors that change over time, such as exploit code availability.
- Environmental metrics adapt the score to the specific environment, considering business impact and compensating controls.
- Calculation: the metrics generate a numerical score between 0 (none) and 10 (critical).
- Publication: the CVSS score is shared through NVD or vendor advisories.
- Prioritization: organizations use the score to rank vulnerabilities and decide patching schedules.
Common techniques
- Base metric evaluation: analyzing attack vector (local, adjacent, network), attack complexity, required privileges, and user interaction.
- Temporal metric adjustment: factoring exploit maturity or availability of remediation.
- Environmental tuning: organizations adapt the score to reflect local business priorities.
- Severity categories:
- None (0.0)