CVSS v4.0 (EN)
CVSS v4.0 (EN)
1) Purpose 1) Purpose
The Base metric group represents the intrinsic qualities of a The purpose of the Threat metric group is to adjust the
vulnerability that are constant over time. It is composed of two severity of a vulnerability based on factors such as the
sets of metrics: the Exploitability metrics and the Impact availability of proof-of-concept code or active exploitation. This
metrics. The Exploitability metrics reflect the ease and technical group captures vulnerability characteristics related to a threat,
means by which the vulnerability can be exploited, while the which may change over time.
Impact metrics reflect the direct consequences of a successful For example, it can capture information such as whether the
exploit. The Base metrics help determine the initial severity vulnerability has been exploited or if there is any proof-of-
score for a vulnerability. In CVSS v3.1, the base metric group concept exploit available. The values found in this metric group
consisted of four main metrics: Attack Vector (AV), Attack may change over time, reflecting the evolving threat landscape.
Complexity (AC), Privileges Required (PR), and User
Interaction (UI). CVSS 4.0 introduced a metric called the Attack 2) Impact on Score
Requirements (AT) to increase the granularity of the scoring The Threat metric group impacts the final CVSS score by
system adjusting the severity of a vulnerability based on the threat
landscape. The absence of explicit Threat metric selections will
2) Impact on Score still result in a score, but the inclusion of the “T” in the
The Base metrics produce a score ranging from 0 to 10, nomenclature is appropriate if any Threat metrics are used to
which can then be modified by scoring the Threat and adjust the score
Environmental metrics. The Base score only reflects the
technical severity of a vulnerability when considered in 3) Usage
isolation. It's important to note that the Base score is only the The Threat metric group is used to refine the severity score
starting point for building a full picture of the risk associated of a vulnerability based on applicable threat intelligence. It is
with a vulnerability. used in combination with the Base metric group, which
represents the intrinsic qualities of a vulnerability that are
3) Usage constant over time, and the Environmental metric group, which
The Base metric group is used to assess the fundamental represents the characteristics of a vulnerability that are unique to
qualities of a vulnerability that maintain their constancy over a specific computing environment.
time. It is used to evaluate the severity of vulnerabilities and their
impact on organizations without considering temporal or 4) Calculation
environmental factors The Threat Metrics in the Common Vulnerability Scoring
System (CVSS) version 4.0 adjust the severity of a vulnerability
4) Calculation based on factors such as the availability of proof-of-concept
The Base Metrics are divided into Exploitability Metrics and code or active exploitation. These metrics reflect the
Impact Metrics. When these Base Metrics are assigned values characteristics of a vulnerability related to threat that may
by an analyst, they result in a score ranging from 0.0 to 10.0. change over time.
The CVSS v4.0 calculator, which is a reference In CVSS v4.0, the Threat Metrics replaced the Temporal
implementation of the CVSS standard, can be used for Metrics from previous versions, resulting in clearer and
generating scores based on the values of these metrics. The simplified metrics. The Remediation Level (RL) and Report
calculator applies the formula specified in the CVSS version 4.0 Confidence (RC) metrics, which were part of the Temporal
standard to produce the Base Score Metrics in previous versions, have been removed in CVSS v4.0.
5) Prioritizing vulnerabilities The values assigned to the Threat Metrics are used in the
Base metrics represent the intrinsic qualities of a calculation of the final score, along with the Base and
vulnerability that are constant over time and across user Environmental Metrics. If explicit Threat Metric values are not
environments. They include exploitability metrics (such as provided, default values that assume the highest severity are
Attack Vector, Attack Complexity, Attack Requirement, used.
Privileges Required, and User Interaction) and vulnerable
system impact metrics (such as Confidentiality, Integrity, and
Read more: Boosty
The CVSS v4.0 calculator, which is a reference Base Score of a vulnerability to reflect the impact within a
implementation of the CVSS standard, can be used for specific organizational context. These metrics account for the
generating scores based on the values of these metrics. The protection goals of the affected system and the presence of
calculator applies the formula specified in the CVSS version 4.0 security controls that mitigate vulnerability.
standard to produce the final score, which includes the Threat
Metrics. The Environmental Metrics are calculated by first
determining the Modified Base Metrics, which are the Base
5) Prioritizing vulnerabilities Metrics adjusted for the presence of mitigations or compensating
Threat metrics, previously known as Temporal Metrics, controls. The Security Requirements are used to indicate the
adjust the severity of a vulnerability based on factors such as the importance of the affected IT asset to the organization, which
availability of proof-of-concept code or active exploitation. can amplify or reduce the severity based on the asset's criticality.
These metrics reflect the characteristics of a vulnerability that The Collateral Damage Potential metric reflects the potential for
change over time, such as whether the vulnerability has been non-direct damage to the environment or entities beyond the IT
exploited or if any proof-of-concept exploit exists. The values in asset.
this metric group may change over time, and they help in real-
time vulnerability assessment. By considering the likelihood of The final Environmental Score is derived by combining the
exploitation and the potential impact of a successful attack, Modified Base Metrics with the Security Requirements and
CVSS v4.0 aims to offer a more holistic and accurate assessment Collateral Damage Potential, using a formula specified in the
of vulnerabilities. CVSS v4.0 Specification Document. This score provides a more
tailored assessment of the vulnerability's severity within the
C. Environmental Metrics specific environment of the organization
The Environmental Metrics allow organizations to 5) Prioritizing vulnerabilities
customize the CVSS scores based on their specific environment. Environmental metrics further refine the resulting severity
They include: score to a specific computing environment. They consider
• Modified Base metrics factors such as the presence of mitigations in that environment
and the criticality of the systems. These metrics are specified by
• Collateral Damage Potential (CDP) users and can lead to a disconnect between the score and the
actual risk in the real world due to their subjective nature.
• Security Requirement metrics: Confidentiality However, they are crucial in providing a more precise
Requirement of the vulnerable system (CR), Integrity assessment of vulnerabilities in a specific environment, thus
Requirement of the vulnerable system (IR), and enhancing vulnerability prioritization and risk management.
Availability Requirement of the vulnerable system (AR)
D. Supplemental Metrics
1) Purpose
The Environmental Metric Group in CVSS v4.0 represents The Supplemental Metrics provide additional context and
the characteristics of a vulnerability that are unique to a user's describe aspects of a vulnerability that are outside the core
environment. It allows organizations to adjust the Base Score of CVSS standard. They include:
a vulnerability to reflect its impact within their specific context. • Automatable (A)
This group accounts for the presence of security controls that
may mitigate some or all consequences of a vulnerability and the • Value Density (VD)
relative importance of a vulnerable system within a technology
infrastructure. • Recovery (R)