πŸ•ΆοΈ
VICEINTELPRO
GitHub: HorrorClause
  • In Tenebris Videmus
  • 🚩CTFs
    • πŸ’ΎHack the Box
      • 🏫Academy
        • Command Injection Assessment
        • XSS Assessment
        • Web Attacks Assessment
    • Try Hack Me
      • In Progress
  • πŸ“–Documents
  • πŸ‘¨β€πŸ«HOW-TOs
    • Obisidian How-To
    • Setup Mandiant FLARE VM
  • πŸ“‘Security Fundamentals
    • Security Controls
      • Physical Security
      • Endpoint Security
      • Email Security
      • Network Security
      • AAA Controls
    • Networking 101
      • OSI Model
      • Network Fundamentals
      • Network Devices
      • Network Tools
      • Protocols and Ports
    • πŸ‘¨β€πŸ’ΌManagement Principles
      • Risk
      • Policies and Procedures
      • Compliance and Frameworks
      • Change and Patch Management
  • πŸ›‘οΈSecurity Concepts
    • ⚠️Risk Assessment Models
      • DREAD Risk Assessment Model
      • STRIDE Threat Model
      • Common Vulnerability Scoring System (CVSS)
    • Pentesting
      • Common Terms
      • AV Identification-Evasion
      • Introduction to Payloads
      • Automating Payloads & Delivery with Metasploit
      • Shells Jack Us In, Payloads Deliver Us Shells
      • Web Shells
      • Pentesting Overview
      • Penetration Testing Process
    • πŸ›Vulnerability Assessment
      • Common Vulnerabilities and Exposures (CVE)
      • Common Vulnerability Scoring System (CVSS)
      • Assessment Standards
      • Vulnerability Assessment
      • Vulnerability Scanning
      • Reporting
      • 🎯Nessus
        • Getting Started with Nessus
        • Nessus Scan
        • Working with Nessus Scan Output
        • Advanced Settings
        • Scanning Issues
      • 🦴OpenVAS (Greenbone)
        • Getting Started with OpenVAS
        • OpenVAS
        • Exporting Results
    • Passwords
      • Password Managers
      • Password Policies
      • Password Security Fundamentals
    • Frameworks
    • GRC
    • Logon Types
    • What is Dev-Null ?
  • βš”οΈOffensive Security
    • OSINT
      • OSINT - Websites
      • Google Dorks
    • πŸ”«Attacking Common Services
      • The Concept of Attacks
      • Interacting with Common Services
      • Finding Sensitive Information
      • Attacking DNS
      • Attacking Email Services
      • Attacking FTP
      • Attacking RDP
      • Attacking SMB
      • Attacking SQL Databases
      • Cheat Sheet - Attacking Common Services
      • Service Misconfigurations
    • πŸ”ͺAttacking Web Apps with Ffuf
      • Web Fuzzing
      • Directory Fuzzing
      • Page Fuzzing
      • Recursive Fuzzing
      • DNS Records
      • Sub-domain Fuzzing
      • Vhost Fuzzing
      • Filtering Results
      • Parameter Fuzzing - GET
      • Parameter Fuzzing - POST
      • Value Fuzzing
    • ☁️Cloud
      • AWS
        • AWS S3 Buckets
    • πŸ’‰Command Injection
      • Command Injection Cheat Sheet
      • Intro to Command Injections
      • Detection
      • Injecting Commands
      • Other Injection Operators
      • Identifying Filters
      • Bypassing Space Filters
      • Bypassing Other Blacklisted Characters
      • Bypassing Blacklisted Commands
      • Advanced Command Obfuscation
      • Evasion Tools
      • Command Injection Prevention
    • Containers
      • Docker
    • ❌Cross-Site Scripting (XSS)
      • Introduction to XSS
      • Stored XSS
      • Reflected XSS
      • DOM XSS
      • XSS Discovery
      • Defacing
      • Phishing
      • Session Hijacking
      • XSS Prevention
    • Directory Busting
      • DirB
      • DirBuster
      • Ffuf
      • Gobuster
    • πŸ…°οΈDNS
      • DNSRecon
      • Fierce
    • File Inclusion
      • Local File Inclusion Cheatsheet
      • Intro to File Inclusion
      • Local File Inclusion (LFI)
      • Basic Bypass
      • PHP Filters
      • PHP Wrappers
      • Remote File Inclusion (RFI)
      • LFI and File Uploads
      • Log Poisoning
      • Automated Scanning
      • File Inclusion Prevention
    • File Transfers
      • Transferring Files
      • File Transfer - Quick Commands
      • Living off the Land
      • Windows File Transfer Methods
      • Linux File Transfer Methods
      • Catching Files over HTTP(S)
      • Transferring Files with Code
      • Miscellaneous File Transfer Methods
      • Protected File Transfers
      • Mounting Encrypted VHD Drives
      • Mounting VHD in Kali
      • File Transfer Detection
    • File Upload Attacks
      • File Upload Cheatsheet
      • Absent Validation
      • Upload Exploitation
      • Client-Side Validation
      • Blacklist Filters
      • Whitelist Filters
      • Type Filters
      • Limited File Uploads
      • Other Upload Attacks
      • Preventing File Upload Vulnerabilities
    • πŸ‘£Footprinting
      • Linux Remote Management Protocols
      • Windows Remote Management Protocols
      • Enumeration
        • Enumeration Methodology
        • πŸ–₯️Host Based
          • Quick Commands
          • DNS
          • FTP
          • IMAP-POP3
          • IPMI
          • MSSQL
          • MySQL
          • NFS
          • Oracle TNS
          • SMB
  • Powershell
    • Powershell CheatSheet
  • Python
    • Map
    • Anonymous Functions
    • Recursion
      • ZipMap
      • Nested Sum
      • Recursion on a Tree
      • Count Nested Levels
      • Longest Word
    • Function Transformations
      • More Transformations
      • Why Transform?
    • Closures
    • Currying
    • Decorators
    • Sum Types
    • Enums
    • Match
    • Regex
  • Kusto (KQL)
    • SQL and KQL Comparison
    • Using the Where and Sort Operators
    • KQL Queries
  • HTML
  • Insecure File Uploads
Powered by GitBook
On this page
  • CVSS Metrics and Scoring Components
  • 1. Base Score (Mandatory) – The Core Characteristics of the Vulnerability
  • 2. Temporal Score (Optional) – The Changing Nature of Threats
  • 3. Environmental Score (Optional) – The Impact on a Specific Organization
  • CVSS Score Calculation Example
  • Why CVSS Matters
  • Key Features of CVSS v3.1:
  1. Security Concepts
  2. Risk Assessment Models

Common Vulnerability Scoring System (CVSS)

PreviousSTRIDE Threat ModelNextPentesting

Last updated 4 months ago

The Common Vulnerability Scoring System (CVSS) is a standardized framework used to assess the severity of security vulnerabilities in software and systems. It provides a numerical score (ranging from 0.0 to 10.0) that represents the risk posed by a vulnerability. This helps organizations prioritize their response efforts based on the impact and exploitability of a given vulnerability.


CVSS Metrics and Scoring Components

CVSS consists of three primary metric groups that contribute to the overall score:

1. Base Score (Mandatory) – The Core Characteristics of the Vulnerability

The Base Score represents the intrinsic properties of a vulnerability that remain constant over time. It considers two factors:

  • Exploitability Metrics (How easy is it to exploit?)

    • Attack Vector (AV): Can the attack be done remotely or requires physical access?

    • Attack Complexity (AC): Is the attack easy or requires special conditions?

    • Privileges Required (PR): Does the attacker need admin privileges?

    • User Interaction (UI): Does exploitation require user action?

    • Scope (S): Can the exploit affect other systems beyond the vulnerable component?

  • Impact Metrics (How severe is the impact?)

    • Confidentiality (C): Does it expose sensitive data?

    • Integrity (I): Can data be altered or manipulated?

    • Availability (A): Does it disrupt or shut down services?

πŸ’‘ Base Score Range:

  • Low: 0.1 – 3.9

  • Medium: 4.0 – 6.9

  • High: 7.0 – 8.9

  • Critical: 9.0 – 10.0


2. Temporal Score (Optional) – The Changing Nature of Threats

The Temporal Score adjusts the Base Score based on real-world factors that change over time, such as the availability of patches and exploit techniques.

  • Exploit Code Maturity: Has the exploit been widely used or is it theoretical?

  • Remediation Level: Are patches or workarounds available?

  • Report Confidence: How reliable is the vulnerability report?

πŸ’‘ Temporal scoring helps organizations assess the urgency of response.


3. Environmental Score (Optional) – The Impact on a Specific Organization

The Environmental Score tailors the Base Score based on how a vulnerability affects a particular organization.

  • Modified Base Metrics: Organizations can adjust the impact ratings based on their own environment.

  • Security Requirements: Defines how critical confidentiality, integrity, and availability are to the organization.

πŸ’‘ Environmental scoring helps organizations prioritize vulnerabilities based on their unique infrastructure.


CVSS Score Calculation Example

Let’s say we have a vulnerability that:

  • Can be exploited over the internet (AV: Network)

  • Requires no special privileges (PR: None)

  • Exposes sensitive data (C: High)

  • Has a working exploit available

This could result in a Base Score of 9.8 (Critical). If a patch exists, the Temporal Score might lower it to 8.5 (High). If an organization considers it a minor risk due to compensating controls, the Environmental Score might bring it down to 7.2 (High).


Why CVSS Matters

  • Standardized Scoring: Provides a universal method for evaluating vulnerabilities.

  • Risk-Based Prioritization: Helps organizations focus on critical vulnerabilities first.

  • Supports Patch Management: Helps teams determine whether to patch immediately or mitigate risks.

CVSS is widely used by security teams, vendors, and organizations to assess and prioritize vulnerability management efforts effectively.

Key Features of CVSS v3.1:

  • Base Score: Measures the intrinsic characteristics of a vulnerability that remain constant over time.

    • Exploitability Metrics: Attack Vector, Attack Complexity, Privileges Required, User Interaction.

    • Impact Metrics: Confidentiality, Integrity, Availability.

  • Temporal Score: Accounts for factors that change over time, such as exploit maturity and remediation.

  • Environmental Score: Adjusts the score based on how an organization is impacted, considering security requirements.

πŸ›‘οΈ
⚠️