Fact-checked by Grok 2 weeks ago

Common Vulnerability Scoring System

The Common Vulnerability Scoring System (CVSS) is an open, standardized framework for assessing and communicating the principal characteristics and severity of software in a consistent, numerical manner. Developed and maintained by the Forum of Incident Response and Teams (FIRST), it produces scores ranging from 0.0 (no severity) to 10.0 (maximum severity), enabling professionals, vendors, and organizations to prioritize remediation efforts based on impact and exploitability. Unlike assessments, CVSS focuses solely on severity without considering broader contextual factors like asset value or threat landscape. CVSS originated from a initiative by the U.S. National Infrastructure Advisory Council (NIAC) between 2003 and 2004, with the initial version (v1.0) released in June 2005 to address the need for a common language in vulnerability reporting. Subsequent iterations have refined its methodology: v2.0 launched in 2007 with updated temporal and environmental metrics; v3.0 arrived in June 2015, introducing as a key concept to better model chained exploits; v3.1 followed in June 2019 for minor clarifications and improved consistency; and the current v4.0 was published on November 1, 2023, emphasizing user interaction requirements and subsequent system impacts. These evolutions reflect ongoing collaboration among industry, government, and academic stakeholders through the CVSS (SIG), ensuring adaptability to emerging threats. In its latest iteration (v4.0), CVSS organizes metrics into four groups: Base Metrics, which capture intrinsic vulnerability qualities such as attack vector (e.g., network, adjacent, local, physical), attack complexity, privileges required, user interaction, and impacts on confidentiality, integrity, and availability for both vulnerable and subsequent systems; Threat Metrics, assessing exploit maturity (e.g., unreported, proof-of-concept, actively exploited); Environmental Metrics, allowing customization for organizational security requirements and modified base factors; and Supplemental Metrics, providing non-scoring context like safety impact or recoverability. The core Base Score is derived through a vector string representation (e.g., CVSS:4.0/AV:N/AC:L/...), using mathematical formulas involving exploitability and impact subscores, which are then adjusted by threat and environmental factors to yield temporal and environmental scores. Qualitative severity ratings translate these numerical values into actionable categories: None (0.0), Low (0.1–3.9), Medium (4.0–6.9), High (7.0–8.9), and Critical (9.0–10.0). Widely adopted by entities like the (NVD) and vulnerability disclosure platforms, CVSS facilitates global interoperability in cybersecurity but requires users to supplement scores with site-specific risk analysis for comprehensive decision-making. Calculators and vector parsers, available from FIRST and NIST, support practical implementation, while ongoing updates address limitations such as evolving attack surfaces in and environments.

Overview

Purpose and Framework

The Common Vulnerability Scoring System (CVSS) is an open, vendor-agnostic framework developed by the Forum of Incident Response and Security Teams (FIRST) to communicate the principal characteristics and severity of software vulnerabilities in a standardized manner. It enables consistent assessment across organizations, facilitating prioritization of remediation efforts by providing a numerical score that reflects a vulnerability's potential impact and exploitability. CVSS produces scores on a scale from 0 to 10, where 0 indicates no severity and 10 represents the maximum severity. These numerical scores are mapped to qualitative severity ratings for easier interpretation: None (0.0), Low (0.1–3.9), Medium (4.0–6.9), High (7.0–8.9), and Critical (9.0–10.0). In its current version (v4.0, released November 1, 2023), the framework organizes into four metric groups. The group captures the intrinsic qualities of a that do not change over time, such as its exploitability and direct impact on affected systems. The Threat group addresses factors that evolve, including the maturity of exploitation techniques and the availability of patches. The Environmental group incorporates organization-specific modifiers, like the asset's importance or existing mitigations, to tailor the score to a particular context. The Supplemental group provides additional non-scoring information for context. The first public specification of CVSS, version 1.0, was released in February 2005, following initial research by a . It has since been maintained and updated by the CVSS (SIG) under FIRST to adapt to evolving security needs.

Score Interpretation

The Common Vulnerability Scoring System (CVSS) provides a numerical score ranging from 0.0 to 10.0, which is interpreted into qualitative severity levels to communicate the potential impact of a . These levels are defined as follows: 0.0 indicates None severity, 0.1–3.9 indicates Low, 4.0–6.9 indicates Medium, 7.0–8.9 indicates High, and 9.0–10.0 indicates Critical. The use of these qualitative ratings is optional but widely adopted to standardize severity communication across organizations. In vulnerability management, CVSS scores facilitate prioritization of remediation efforts, such as applying patches or mitigating risks, by allowing organizations to focus on higher-severity issues first. For instance, the (NVD), maintained by NIST, assigns CVSS Base scores to (CVEs) during vulnerability assessments, enabling consistent risk evaluation and alerting. These scores are also integrated into vulnerability scanners and management tools, where they inform automated and workflows. CVSS scores measure intrinsic severity based on vulnerability characteristics but do not constitute a complete risk assessment, as they exclude factors like the likelihood of exploitation or organizational context in isolation. Users must supplement scores with additional analyses, such as Threat and Environmental metrics, to derive actionable risk insights. Practical examples of score interpretation include enterprise policies that mandate immediate action for vulnerabilities scoring 7.0 or higher, such as a Base Score of 7.5 for a remotely exploitable flaw allowing unauthorized access, which might trigger urgent patching or system isolation. Regulatory standards like PCI DSS require remediation of vulnerabilities with scores of 4.0 or greater to ensure compliance. In alerts and reports, scores are often presented alongside vector strings for transparency, helping security teams quickly assess and respond to threats.

Historical Development

Origins and Initial Release

The Common Vulnerability Scoring System (CVSS) originated from efforts to address the fragmentation in vulnerability severity assessments during the early , when multiple incompatible scoring systems hindered effective communication among security stakeholders. Commissioned by the National Infrastructure Advisory Council (NIAC) in July 2003, the project sought to create an open, vendor-agnostic standard that would enable consistent evaluation of software vulnerabilities, facilitating better prioritization of patches, incident response, and accountability across vendors and organizations. This initiative responded directly to the lack of in existing systems, which often led to inconsistent reporting and varying interpretations of threat levels, ultimately impeding coordinated cybersecurity efforts. The initial specification for CVSS was developed by a under the NIAC Vulnerability Disclosure , with primary authorship from members of the (CERT/CC) and contributions from industry leaders including Cisco Systems, , , Internet Security Systems, and others such as eBay, , , and . Key pioneers involved in the design included David Ahmad, Gerhard Eschelbeck, Sasha Romanosky, Mike Schiffman, and Andrew Wright, who focused on establishing a universal framework to promote a common language for vulnerability severity. Although the National Institute of Standards and Technology (NIST) played a more prominent role in subsequent refinements, the foundational work emphasized simplicity, flexibility, and comprehensiveness to encourage broad adoption. The development process lacked extensive initially, which later contributed to identified limitations. CVSS version 1.0 was released in February 2005, introducing basic metrics for assessing characteristics and producing a numerical score to standardize severity communication. Initially developed under NIAC, CVSS has been maintained by the Forum of Incident Response and Teams (FIRST.org) since 2005, when NIAC selected FIRST as its custodian. In 2005, shortly after v1.0's release, NIAC selected FIRST to serve as the ongoing custodian for CVSS development and maintenance. The system aimed to improve global but saw limited adoption due to inaccuracies and inconsistencies in scoring that emerged during early use. These shortcomings prompted rapid iteration, with work on beginning in 2005 to enhance accuracy and address real-world application issues through broader collaboration and testing.

Evolution Across Versions

The Common Vulnerability Scoring System (CVSS) has evolved through several versions since its initial formalization, with each iteration driven by feedback from stakeholders, including the CVSS (SIG) for versions from v3.0 onward, challenges in widespread adoption, and the shifting landscape of cybersecurity threats, including the rise of , (IoT) devices, and vulnerabilities. CVSS was released in June 2007, marking a significant advancement by introducing temporal and environmental metric groups alongside the base metrics, which expanded the system's applicability beyond intrinsic characteristics to include time-dependent factors and organizational context. This version addressed early limitations in by providing a more dynamic framework, enabling users to adjust scores based on remediation status and deployment-specific impacts, thereby improving prioritization in diverse IT environments. In June 2015, CVSS version 3.0 was launched to refine the base metrics for greater accuracy in evaluating contemporary threats, such as those in virtualized and cloud-based systems, responding to identified inconsistencies in v2.0 scoring practices observed after years of global adoption. The update emphasized clearer definitions and a revised qualitative severity scale, driven by the need to better reflect the evolving complexity of attacks while maintaining where possible. CVSS version 3.1 followed in June 2019 as a minor revision, focusing on clarifications and consistency enhancements without introducing new metrics or altering the core scoring formulas, primarily to resolve ambiguities in metric interpretations like and that had arisen from user feedback. This iteration streamlined guidance on assumptions for scoring, such as attacker knowledge levels, to promote more defensible and uniform application across organizations. The most recent major update, CVSS version 4.0, was released on November 1, 2023, representing a comprehensive overhaul motivated by SIG on prior versions' shortcomings in handling nuanced impacts, needs, and emerging risks in (OT) and industrial control systems (). It introduced simplified threat metrics, enhanced impact subscores for vulnerable and subsequent systems, and a new supplemental metric group to better support automated analysis and safety considerations in modern threat landscapes like attacks.

Core Concepts

Metric Categories

The Common Vulnerability Scoring System (CVSS) organizes its assessment into four metric groups in version 4.0: , , Environmental, and Supplemental. These groups capture different aspects of a 's severity, enabling a structured evaluation that balances universal characteristics with contextual factors. The group forms the foundation by focusing on inherent properties of the vulnerability, while the and Environmental groups allow for adjustments based on evolving conditions and organizational specifics, respectively. Previous versions, such as v3.1, used Temporal Metrics instead of Metrics and did not include Supplemental Metrics. Base Metrics represent the fixed, intrinsic qualities of a vulnerability that remain constant over time and across different environments. They assess core attributes such as how easily the vulnerability can be exploited and the potential impact on affected systems, assuming a worst-case scenario without mitigations. This group produces the Base Score, a mandatory numerical value ranging from 0 to 10 that serves as the universal severity indicator for the vulnerability. For instance, subscores may evaluate exploitability through factors like , attack complexity, privileges required, and user interaction, and impact through effects on , , or for both the vulnerable system and subsequent systems. Threat Metrics address time-dependent factors that can alter the vulnerability's severity as conditions evolve, such as the availability of exploit code or remediation efforts. These metrics modify the Score to generate a refined score, reflecting adjustments for real-world developments like the maturity of public exploits or the status of official fixes. By incorporating these elements, the group provides a dynamic view of that decreases as defenses improve, though it remains independent of specific user environments. An example includes assessing the level of exploit maturity, which influences how readily an attack can be carried out. Environmental Metrics enable customization of the severity assessment to fit an organization's unique context, such as the value of affected assets or existing . They adjust the Base or Threat-refined Score to yield an Environmental Score, prioritizing impacts based on local requirements for , , or . This group allows users to modify base assumptions, for example, by accounting for potential or the effectiveness of deployed safeguards. As a result, it tailors the overall score to reflect enterprise-specific risk rather than generic scenarios. Supplemental Metrics provide additional non-scoring context, such as safety impact or recoverability, to aid in without directly affecting the numerical scores. The Base Metrics are mandatory and conceptually consistent across CVSS versions, providing a stable core for comparisons, while , Environmental, and Supplemental Metrics are optional enhancements that increase the system's without altering the foundational . These groups interrelate hierarchically: the Base Score is refined by Metrics and further adjusted by Environmental Metrics, allowing for layered refinements. CVSS metrics function as qualitative inputs that are quantified through standardized formulas, and scores are shared via compact vector strings—such as "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"—that encode all selected values for reproducibility and analysis.

General Scoring Principles

The Common Vulnerability Scoring System (CVSS) employs a structured to aggregate metrics into numerical scores, ensuring a standardized of severity. At its core, the scoring process begins with the Base Score, which captures the intrinsic characteristics of a that remain constant over time and across users. This foundational score is then optionally refined by metrics to account for evolving threat factors, such as the maturity of available exploits, and by Environmental metrics to incorporate organization-specific contexts, like asset importance or controls. A key feature of CVSS is its vector string notation, which provides a compact, machine-readable representation of the metric values used in scoring. For instance, a vector like "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" encodes each metric's value (e.g., AV for set to ) in a delimited format, facilitating easy sharing, reproduction, and verification of assessments across stakeholders. This notation ensures that the full assessment details accompany the score, promoting transparency and in . CVSS metrics are primarily expressed in qualitative terms—such as "High," "Low," or "None"—which are systematically mapped to underlying numerical values as defined in the official specification documents. This conversion allows for quantitative score computation while maintaining accessibility for analysts without deep mathematical expertise, as the qualitative labels guide selections based on descriptive criteria. The resulting scores range from 0.0 to 10.0, with qualitative severity ratings (e.g., Low for 0.1-3.9, Critical for 9.0-10.0) providing interpretive bands. To uphold consistency, CVSS is designed for : identical inputs will always yield the same score, regardless of the assessor, through deterministic aggregation rules outlined in the . This vendor-agnostic approach, supported by detailed guidance documents, enables non-experts to produce reliable evaluations while minimizing subjectivity. Over successive versions, these principles have been iteratively refined for greater precision—such as enhancing definitions and methods—yet the logic of combining categories into layered scores has remained persistent, ensuring and broad adoption.

Version 2.0

Base Metrics

The Base Metrics in CVSS form the foundation of the scoring , reflecting the inherent characteristics of a that remain constant over time and across different environments. These metrics are divided into two primary subscores: Exploitability, which evaluates the ease and feasibility of exploiting the vulnerability, and , which assesses the potential consequences on the affected 's , , and . The Base Score is then derived by combining these subscores, providing a numerical value from 0 to 10 that indicates severity without considering temporal or environmental factors. In .0, the of is implicitly limited to a single affected , without an explicit metric for cross-system propagation.

Access Vector (AV)

The Access Vector metric measures the remoteness required to exploit the , determining how distant an attacker must be from the vulnerable component. It uses three qualitative values: (L), which requires physical or logical proximity such as shell (base value 0.395); Adjacent Network (A), which necessitates presence on the same local network segment like a (base value 0.646); and (N), allowing remote exploitation over the or other networks (base value 1.0). A Network access vector increases the Exploitability subscore, reflecting greater risk due to broader attacker reach.

Access Complexity (AC)

Access Complexity evaluates the conditions or barriers an attacker must overcome to exploit the successfully, such as specific configurations or timing. The qualitative values are High (H), indicating specialized circumstances like rare race conditions (base value 0.35); Medium (M), involving somewhat uncommon setups like non-default configurations (base value 0.61); and Low (L), where no special conditions are needed and exploitation is straightforward (base value 0.71). Lower complexity values yield higher Exploitability scores, emphasizing that are easier to trigger.

Authentication (AU)

The Authentication metric assesses the number of authentication mechanisms or instances an attacker must bypass to exploit the vulnerability. It includes None (N), requiring no credentials (base value 0.704); (S), needing one instance like a username-password pair (base value 0.56); and Multiple (M), demanding two or more authentications (base value 0.45). Vulnerabilities requiring no authentication contribute to higher Exploitability, as they lower the barrier for unauthorized access.

Confidentiality, Integrity, and Availability Impacts (C/I/A)

The Impact subscore is determined by three metrics aligned with the CIA triad: (C), (I), and (A). Each uses the same qualitative values—None (N, base value 0.0), indicating no effect; Partial (P, base value 0.275), representing limited compromise such as partial data exposure or reduced performance; and Complete (C, base value 0.660), signifying total loss like full disclosure or system shutdown. For , Partial might involve access to sensitive but not all data, while Complete allows unrestricted exposure of all resources. impacts range from minor modifications in Partial cases to arbitrary alterations in Complete ones. effects include degraded service in Partial scenarios versus complete denial in Complete ones. These values collectively quantify the vulnerability's potential harm. The following table summarizes the base metric values:
MetricValueDescriptionBase Score
Access Vector (AV)Local (L)Local access required0.395
Adjacent Network (A)Same network segment0.646
Network (N)Remote over network1.0
Access Complexity (AC)High (H)Specialized conditions0.35
Medium (M)Some specialized access0.61
Low (L)No special conditions0.71
Authentication (AU)Multiple (M)Two or more instances0.45
Single (S)One instance required0.56
None (N)No authentication0.704
Confidentiality/Integrity/Availability (C/I/A)None (N)No impact0.0
Partial (P)Limited impact0.275
Complete (C)Total impact0.660

Base Score Calculation

The Base Score is computed in three steps using the base values from the metrics above. First, the Exploitability subscore is calculated as: \text{Exploitability} = 20 \times \text{AV} \times \text{AC} \times \text{AU} This is not rounded at this stage but contributes directly to the final score. Next, the Impact subscore is derived as: \text{Impact} = 10.41 \times (1 - (1 - \text{C}) \times (1 - \text{I}) \times (1 - \text{A})) The value is capped at 10.0. Finally, the Base Score is obtained by: \text{Base Score} = \text{round to 1 [decimal](/page/Decimal)} \left( \left( (0.6 \times \text{[Impact](/page/Impact)}) + (0.4 \times \text{Exploitability}) - 1.5 \right) \times f(\text{[Impact](/page/Impact)}) \right) where f(\text{[Impact](/page/Impact)}) = 0 if Impact = 0, and f(\text{[Impact](/page/Impact)}) = 1.176 otherwise. The result is constrained between 0 and 10, with rounding applied to one decimal place. This weighted combination emphasizes impact while adjusting for exploitability, ensuring the score reflects both feasibility and consequences.

Temporal and Environmental Metrics

In the Common Vulnerability Scoring System (CVSS) , temporal metrics adjust the score to account for factors that evolve over time, such as the maturity of available exploits and the availability of fixes, providing a more dynamic assessment of a vulnerability's severity as new information emerges. These metrics are optional but recommended for ongoing evaluations, as they reflect changes in exploitability and remediation status that can influence prioritization in security operations. The temporal metric group consists of three components: Exploit Code Maturity (E), Remediation Level (RL), and Report Confidence (RC). Exploit Code Maturity measures the current state of available exploit techniques or code, ranging from Unproven (no known exploits, factor 0.85) to High (reliable exploits in the wild, factor 1.00), with intermediate values for Proof-of-Concept (0.90) and Functional (0.95) exploits; a Not Defined value defaults to 1.00. Remediation Level assesses the availability and quality of fixes, from (a complete solution, factor 0.87) to Unavailable (no fix exists, factor 1.00), including Temporary Fix (0.90) and (0.95); Not Defined also defaults to 1.00. Report Confidence evaluates the credibility of the vulnerability report, from Unconfirmed (doubts about existence, factor 0.90) to Confirmed (fully verified, factor 1.00), with Uncorroborated (0.95) in between; Not Defined defaults to 1.00. The temporal score is calculated using the formula: if the base score is 0, then Temporal Score = 0; otherwise, Temporal Score = round_to_1_decimal(Base Score × × × ), where rounding is to one decimal place and the result is bounded between 0 and 10, never exceeding the base score or falling below approximately one-third of it. This adjustment typically lowers the score as exploits mature or fixes become available but cannot increase it beyond the base. For example, a base score of 7.5 with a Functional exploit (0.95), Official Fix (0.87), and Confirmed report (1.00) yields a temporal score of round_to_1_decimal(7.5 × 0.95 × 0.87 × 1.00) = 6.2, reflecting reduced urgency due to remediation. Environmental metrics further customize the score to the specific deployment context of an , incorporating asset criticality and broader to tailor severity to individual environments. These metrics modify the (or temporal) by adjusting based on asset values and adding factors for systemic and collateral effects. They are particularly useful for enterprises evaluating vulnerabilities across diverse systems, where a high score might be amplified or diminished based on local configurations. The environmental group includes Potential (CDP), Target Distribution (TD), and modified (CR), (IR), and (AR) requirements. Potential estimates secondary harm beyond the vulnerable component, such as physical damage or , with values None (0), Low (0.1), Low-Medium (0.3), Medium-High (0.4), High (0.5), and Not Defined (0). Target Distribution gauges the vulnerability's prevalence in the environment, from None (0) to High (1.00, affects a large proportion of systems), with Low (0.25) and Medium (0.75) in between; Not Defined defaults to 1.00. The modified impact metrics override base impacts using asset-specific multipliers: Low priority (0.5), Medium (1.0), High (1.51), or Not Defined (1.0) for each of , , and , allowing analysts to weight effects on critical assets higher. To compute the environmental score, first derive the Modified Impact subscore as min{10, 10.41 × [1 - (1 - Confidentiality Impact × CR) × (1 - Integrity Impact × IR) × (1 - Availability Impact × AR)]}, using the base impacts adjusted by the requirement multipliers. Then, calculate an Adjusted Base Score by substituting this Modified Impact into the base score formula in place of the original impact. The Adjusted Temporal Score follows by applying temporal factors to this Adjusted Base if temporal metrics are used. Finally, the Environmental Score = round_to_1_decimal([Adjusted Temporal + (10 - Adjusted Temporal) × CDP] × TD), ensuring it ranges from 0 to 10 and does not exceed the temporal score. For instance, if an Adjusted Temporal is 6.0, CDP is Low-Medium (0.3), and TD is High (1.00), the score becomes round_to_1_decimal([6.0 + (10 - 6.0) × 0.3] × 1.00) = 7.2, increasing severity due to widespread targets and collateral risks.
Temporal MetricValues and Factors
Exploit Code Maturity (E)Unproven (0.85), Proof-of-Concept (0.90), Functional (0.95), High (1.00), Not Defined (1.00)
Remediation Level (RL)Official Fix (0.87), Temporary Fix (0.90), Workaround (0.95), Unavailable (1.00), Not Defined (1.00)
Report Confidence (RC)Unconfirmed (0.90), Uncorroborated (0.95), Confirmed (1.00), Not Defined (1.00)
Environmental MetricValues and Factors
Collateral Damage Potential (CDP)None (0), Low (0.1), Low-Medium (0.3), Medium-High (0.4), High (0.5), Not Defined (0)
Target Distribution (TD)None (0), Low (0.25), Medium (0.75), High (1.00), Not Defined (1.00)
Confidentiality/Integrity/Availability Requirements (CR/IR/AR)Low (0.5), Medium (1.0), High (1.51), Not Defined (1.0)

Versions 3.0 and 3.1

Key Changes from

Version 3.0 of the Common Vulnerability Scoring System (CVSS) introduced several structural and modifications compared to to enhance accuracy and reduce subjectivity in vulnerability assessments. Notably, the Access from , which evaluated the ease of exploitation across multiple dimensions, was removed and replaced by two distinct base metrics: Attack (AC) and User Interaction (UI). Attack assesses the conditions or actions beyond the attacker's control that must align for successful exploitation, simplified to a binary choice of Low or High to minimize subjective interpretations. User Interaction captures whether a security-aware user must participate in the attack, such as clicking a malicious link, with values of None or Required, thereby addressing social engineering elements more explicitly. Additionally, the metric in , which measured the need for successful authentication attempts, was eliminated and supplanted by , a new base metric evaluating the level of privileges an attacker needs before exploitation—None, Low, or High. This shift better reflects modern scenarios involving and varying access controls. A pivotal was the (S) metric, which determines whether a vulnerability's impact extends beyond the vulnerable component's security authority (Unchanged or Changed), enabling more precise scoring of cross-system effects like those in virtualized or environments. Impact metrics underwent refinement to provide greater granularity, particularly through separate subscores for the vulnerable system and any subsequent systems affected when is Changed. The (C), (I), and (A) impacts, previously categorized as None, Partial, or Complete in , were adjusted to None, Low, or High, with calculations that first assess direct impacts on the vulnerable component and then propagate to subsequent ones if applicable. These changes, along with the inclusion of Physical as an explicit option in the (AV) metric—expanding from Network, Adjacent, and Local in —aimed to improve for diverse attack surfaces, including and physical access. The overarching rationale for these updates was to better accommodate contemporary vulnerabilities, such as those in web applications and cloud infrastructures, where version 2.0's metrics often led to inconsistent or inaccurate scores due to ambiguities in and . By streamlining options and introducing , CVSS v3.0 reduced scorer subjectivity and enhanced the system's applicability to chained exploits and indirect impacts. Version 3.1, released as a minor revision, focused on clarifications without altering metrics or values, emphasizing consistent application. It refined the Attack Vector descriptions, particularly for Adjacent network scenarios involving trusted but logically separated environments like VPNs, and provided more detailed examples for Scope to distinguish security authorities clearly. While no temporal metrics were deprecated, the specification stressed their optional use for simplicity in base scoring, and introduced guidance on generating multiple base scores for vulnerabilities affecting varied platforms. These tweaks further promoted usability and alignment with real-world deployments.

Metric Specifications

In CVSS versions 3.0 and 3.1, metrics are organized into three main groups—Base, Temporal, and Environmental—that provide a structured assessment of severity. The metrics reflect the inherent properties of the , independent of time or , while the Temporal metrics account for characteristics of the landscape and remediation status. Environmental metrics allow customization based on organizational . These metrics are represented in a vector string format, such as CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, where metrics are mandatory and others are optional.

Base Metrics

The Base group consists of Exploitability and Impact subgroups, with numerical weights assigned to each metric value to contribute to subscore calculations. Version 3.1 includes clarifications on metric application but no changes to values or structure from v3.0.

Exploitability Metrics

These metrics assess the ease of exploiting the .
MetricAbbreviationValues and WeightsDescription
AVN (): 0.85
A (Adjacent): 0.62
L (Local): 0.55
P (Physical): 0.20
The proximity required for the attacker to the vulnerable component, ranging from remote network to direct physical interaction.
Attack ComplexityACL (Low): 0.77
H (High): 0.44
The conditions or difficulties an attacker must overcome, such as race conditions or specific configurations, beyond those captured by other metrics.
Privileges RequiredPRN (None): 0.85
L (Low): 0.62 (Unchanged Scope) / 0.68 (Changed Scope)
H (High): 0.27 (Unchanged) / 0.50 (Changed)
The level of privileges an attacker needs, such as unauthenticated or administrative rights, to exploit the .
User InteractionUIN (None): 0.85
R (Required): 0.62
Whether a victim must participate, such as clicking a malicious link.

Impact Metrics

These evaluate the consequences of successful exploitation on (C), (I), and (A), modulated by (S).
MetricAbbreviationValues and WeightsDescription
SU (Unchanged): 0 (multiplier)
C (Changed): 1.08 (multiplier)
Determines if the vulnerability impacts components beyond its security scope (Unchanged or Changed).
CN (None): 0
L (Low): 0.22
H (High): 0.56
The impact on confidentiality, from no loss to total exposure of sensitive data.
IN (None): 0
L (Low): 0.22
H (High): 0.56
The impact on data integrity, ranging from minor modifications to complete attacker control.
AN (None): 0
L (Low): 0.22
H (High): 0.56
The impact on system availability, from performance degradation to denial of service.

Threat Metrics

The group, also known as Temporal metrics, includes three metrics to reflect real-world status, remediation, and , with weights that adjust the overall score.
MetricAbbreviationValues and WeightsDescription
Exploit Code MaturityEX (Not Defined): 1.0
H (High): 1.0
F (Functional): 0.97
P (Proof-of-Concept): 0.94
U (Unproven): 0.91
The current state of exploit availability, from widespread attacks to theoretical without public exploits.
Remediation LevelRLX (Not Defined): 1.0
U (Unavailable): 1.0
W (Workaround): 0.97
T (Temporary Fix): 0.96
O (Official Fix): 0.95
Availability and ease of measures.
Report ConfidenceRCX (Not Defined): 1.0
C (Confirmed): 1.0
R (Reasonable): 0.96
U (Unknown): 0.92
The degree of certainty in the description.

Environmental Metrics

These metrics modify the Base metrics to incorporate organizational priorities, using the same value sets as Base where applicable, plus X (Not Defined).
  • Confidentiality/Integrity/Availability Requirements (CR/IR/AR): Values are H (High): 1.5, M (Medium): 1.0, L (Low): 0.5, X (Not Defined, defaults to M). These adjust the corresponding impact metrics by scaling C/I/A to MC/MI/ if requirements are specified.
  • Modified Base Metrics: Include (Modified Attack Vector), MAC, MPR, MUI, (Modified Scope), with values mirroring Base (e.g., MAV:N=0.85) to reflect deployment-specific conditions.

Score Calculations

The Base Score in CVSS v3.1 uses the same formulas as v3.0, with clarifications for consistent application. The Impact Subscore (ISS) is calculated as $1 - [(1 - C) \times (1 - I) \times (1 - A)], where C, I, A are the numerical values (0, 0.22, 0.56). The Impact score is then $6.42 \times \mathrm{ISS} for Unchanged Scope (S:U) or $7.52 \times (\mathrm{ISS} - 0.029) - 3.25 \times (\mathrm{ISS} - 0.02)^{13} for Changed Scope (S:C), capped at 6.0 if ISS ≤ 1 but adjusted for propagation. The Exploitability subscore is $8.22 \times \mathrm{AV} \times \mathrm{AC} \times \mathrm{PR} \times \mathrm{UI}, using Scope-adjusted PR weights. The Base Score is \mathrm{roundup}(\min(\mathrm{Impact} + \mathrm{Exploitability}, 10)) for S:U or \mathrm{roundup}(\min(1.08 \times (\mathrm{Impact} + \mathrm{Exploitability}), 10)) for S:C; 0 if Impact ≤ 0. The Temporal Score modifies the Base Score as \mathrm{roundup}(\mathrm{Base} \times \mathrm{E} \times \mathrm{RL} \times \mathrm{RC}), decreasing as exploits mature or fixes become available. The Environmental Score applies modifications: Modified ISS (MISS) = \min\{1 - [(1 - \mathrm{CR} \times \mathrm{MC}) \times (1 - \mathrm{IR} \times \mathrm{MI}) \times (1 - \mathrm{AR} \times \mathrm{MA})], 0.915\}, then Modified Impact using the same formula as Base but with MISS and MS. Modified Exploitability = $8.22 \times \mathrm{MAV} \times \mathrm{MAC} \times \mathrm{MPR} \times \mathrm{MUI}. Environmental Score = \mathrm{roundup}(\mathrm{roundup}(\min(\mathrm{Modified\ Impact} + \mathrm{Modified\ Exploitability}, 10)) \times \mathrm{E} \times \mathrm{RL} \times \mathrm{RC}) for MS:U or with 1.08 multiplier for MS:C; 0 if Modified Impact ≤ 0. As an illustration, consider a remote information disclosure with vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N. Exploitability = $8.22 \times 0.85 \times 0.77 \times 0.85 \times 0.85 \approx 3.9, ISS = $1 - (1-0.56)(1-0)(1-0) = 0.56, = $6.42 \times 0.56 \approx 3.6 (S:U), Score = \mathrm{roundup}(\min(3.6 + 3.9, 10)) = 8.

Version 4.0

Major Updates and Rationale

The of CVSS 4.0 was driven by the need to address longstanding criticisms of version 3.1, particularly around subjectivity and insufficient for modern threats, following extensive feedback from the CVSS (SIG) and public consultations spanning 2022 and 2023. The SIG incorporated input from security experts who analyzed millions of vectors to refine the , culminating in the official release on November 1, 2023. This iterative process aimed to enhance accuracy, reduce ambiguity in assessments, and better support interoperability across tools while adapting to emerging risks such as compromises. A key structural change was the removal of the Scope metric, which had been criticized for oversimplifying cross-system impacts in version 3.1. Instead, version 4.0 explicitly distinguishes between Vulnerable System Impacts (, , and , abbreviated as VC, VI, VA) and Subsequent System Impacts (SC, SI, SA), allowing for clearer modeling of chaining effects without a binary determination. This update provides a more precise representation of how a might propagate beyond the initially affected component, addressing feedback that the prior approach led to inconsistent scoring in networked or scenarios. To mitigate subjectivity in exploitability assessments, version 4.0 introduced the Attack Requirements (AT) Base metric with values of None (N) or Present (P), capturing environmental prerequisites that must be met for an attack to succeed, separate from the inherent Attack Complexity (AC). Similarly, the User Interaction (UI) metric was refined to include Passive (P) and Active (A) values alongside None (N), offering greater nuance in describing required user involvement and reducing interpretive variability reported in version 3.1 analyses. These changes stem from SIG evaluations showing that v3.1's combined complexity metrics often conflated attacker effort with external conditions, leading to subjective scores. Version 4.0 also expanded support for and specialized contexts through new Supplemental metrics, including (S) with values of Negligible (N) or Present (P) to quantify potential human safety impacts in (IoT) or (OT) environments. Additional Supplemental metrics like Automatable (AU: Yes or No), Recovery (R: Automatable, User, Irrecoverable), Value Density (V: Diffuse or Concentrated), Provider Urgency (U: Red, Amber, Green, Clear), and Vulnerability Response Effort (RE: Low, Moderate, High) enable more granular machine-generated assessments and vector extensions for threat-specific details, facilitating automated tooling in large-scale . The rationale emphasizes adapting to evolving threats, such as those in supply chains, by allowing optional extensions via a new CVSS Extensions Framework without altering core Base scores. Regarding , CVSS v4.0 scores are not directly comparable to those from prior versions due to revised weights and calculation methods, though qualitative severity ratings (e.g., Low, Medium, High, Critical) were aligned using expert-mapped thresholds from v3.1 to maintain continuity in risk communication. This design choice prioritizes improved precision over numerical equivalence, with the SIG recommending parallel scoring during transition periods to aid adoption.

Metric Specifications

In CVSS version 4.0, metrics are organized into four groups—Base, , Environmental, and Supplemental—that provide a structured of severity. The metrics reflect the inherent properties of the , independent of time or , while the metrics (formerly Temporal) account for characteristics of the threat landscape. Environmental metrics allow customization based on organizational , and Supplemental metrics offer additional qualitative information without influencing the numerical score. These metrics are represented in a vector string format, such as CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U, where metrics are mandatory and others are optional.

Base Metrics

The Base group consists of Exploitability and Impact subgroups, with numerical weights assigned to each metric value to contribute to subscore calculations. New in version 4.0, the Attack Requirements (AT) metric addresses conditions beyond the attacker's control that must be met for successful exploitation, and Subsequent System Impacts extend the subgroup to evaluate effects on interconnected systems.

Exploitability Metrics

These metrics assess the ease of exploiting the vulnerability.
MetricAbbreviationValues and WeightsDescription
Attack VectorAVN (Network): 0.97
A (Adjacent): 0.68
L (Local): 0.38
P (Physical): 0.20
The proximity required for the attacker to access the vulnerable component, ranging from remote network access to direct physical interaction.
Attack ComplexityACL (Low): 0.44
H (High): 0.35
The conditions or difficulties an attacker must overcome, such as race conditions or specific configurations, beyond those captured by other metrics.
Attack RequirementsATN (None): 0.85
P (Present): 0.62
External conditions, such as specific software versions or network topologies, that must exist for exploitation to succeed; absent in prior versions.
Privileges RequiredPRN (None): 0.85
L (Low): 0.62
H (High): 0.27
The level of privileges an attacker needs, such as unauthenticated access or administrative rights, to exploit the vulnerability.
User InteractionUIN (None): 0.85
P (Passive): 0.62
A (Active): 0.27
Whether a victim must participate, such as clicking a link (active) or simply receiving content (passive).

Impact Metrics

These evaluate the consequences of successful , divided into Vulnerable System Impacts (direct effects on the targeted system) and Subsequent System Impacts (effects on other systems via ).
SubgroupMetricAbbreviationValues and WeightsDescription
Vulnerable SystemVCN (None): 0
L (Low): 0.22
H (High): 0.56
The impact on of the vulnerable component, from no loss to total exposure of sensitive data.
Vulnerable SystemIntegrityVIN (None): 0
L (Low): 0.22
H (High): 0.56
The impact on data integrity, ranging from minor modifications to complete attacker control.
Vulnerable SystemVAN (None): 0
L (Low): 0.22
H (High): 0.56
The impact on system , from performance degradation to denial of service.
Subsequent SystemSCN (None): 0
L (Low): 0.22
H (High): 0.56
Propagation of impacts to subsequent systems, such as through exploited services.
Subsequent SystemIntegritySIN (None): 0
L (Low): 0.22
H (High): 0.56
Propagation of integrity impacts beyond the vulnerable system.
Subsequent SystemSAN (None): 0
L (Low): 0.22
H (High): 0.56
Propagation of impacts to connected systems; introduced in version 4.0 to address exploit .

Threat Metrics

The Threat group, streamlined from prior versions, includes a single metric to reflect real-world exploitation status, with weights that adjust the overall score downward for immature threats.
  • Exploit Maturity (E): Values include A (Attacked), P (Proof-of-Concept), U (Unreported), and X (Not Defined, defaults to A). This metric captures the current state of exploit availability, from widespread attacks to theoretical vulnerabilities without public exploits. The Threat Score is the Base Score multiplied by the Exploit Maturity multiplier as defined in the specification.

Environmental Metrics

These metrics modify the Base metrics to incorporate organizational priorities and safety considerations, using the same value sets as Base where applicable, plus X (Not Defined) for unspecified cases. They include security requirements that adjust impact based on asset importance.
  • Confidentiality/Integrity/Availability Requirements (CR/IR/AR): Values are H (High), M (Medium), L (Low), X (Not Defined, defaults to H). These determine the Modified Impact metrics: for example, if a requirement is High and the corresponding Base Impact is Low or None, the Modified Impact is set to High; if Medium, it is set to High if Base is Low, otherwise Base; if Low, it remains Base. Similar rules apply to subsequent impacts (SCR/SIR/SAR).
  • Modified Base Metrics: Include abbreviated forms like MAV (Modified Attack Vector) with values mirroring Base (N/A/L/P/X). For impacts, Modified Vulnerable (MVC/MVI/MVA) and Modified Subsequent (MSC/MSI/MSA) use N/L/H/X and weights (0/0.22/0.56).

Supplemental Metrics

These provide non-scoring context for and are not used in score computation but appear in the vector string for completeness. They include (S: N (Negligible)/P (Present)/X (Not Defined), emphasizing potential harm in critical environments), Automatable (AU: Y (Yes)/N (No)/X), (R: A ()/U (User)/I (Irrecoverable)/X), Value Density (V: D (Diffuse)/C (Concentrated)/X), Provider Urgency (U: Red/Amber/Green/Clear/X), and Response Effort (RE: L (Low)/M (Moderate)/H (High)/X), which aid in prioritization without numerical weights.

Score Calculations

The Base Score in CVSS v4.0 incorporates revisions to emphasize split impacts between the vulnerable system and subsequent systems, as well as the new Attack Requirements (AT) metric in exploitability assessments. The Exploitability sub-score is the product \mathrm{AV} \times \mathrm{AC} \times \mathrm{AT} \times \mathrm{PR} \times \mathrm{UI}, where each term represents the numerical value assigned to the respective base metric based on its severity level (e.g., AV:N = 0.97, AC:L = 0.44, AT:N = 0.85, PR:N = 0.85, UI:N = 0.85). The Vulnerable Impact Subscore quantifies the potential harm to the directly affected system and is derived from the $1 - (1 - C_v)(1 - I_v)(1 - A_v), where C_v, I_v, and A_v are the numerical impact values for , , and on the vulnerable system (e.g., H = 0.56, L = 0.22, N = 0). Similarly, the Subsequent Impact Subscore addresses chained effects on other systems using $1 - (1 - C_s)(1 - I_s)(1 - A_s), with C_s, I_s, and A_s defined analogously for subsequent , , and impacts. To obtain the final Base Score, the metrics are mapped to one of 189 MacroVectors—coarse representations grouping similar combinations of Base metric values—and a score is interpolated within the MacroVector's range based on the precise metric weights, capped at 10.0. This method ensures consistent and precise scoring. Detailed lookup tables and interpolation rules are in Section 8 of the specification. The Threat Score modifies the Base Score to incorporate exploit maturity, computed as Base Score multiplied by the Exploit Maturity (E) multiplier (e.g., lower for unreported exploits), as per Table 9 in the specification. The Environmental Score tailors the Base or Threat Score to organizational context by using the requirement metrics (CR, IR, AR, SCR, SIR, SAR) to set Modified Impact values according to the adjustment rules, and allowing overrides via Modified Base Metrics (e.g., MAV for adjusted ). The adjusted metrics are then used to recompute the score via the Base Score method. As an illustration of these elements, consider a remote disclosure vulnerability with vector components AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N. The Exploitability sub-score is approximately 0.26 using the product formula, the Vulnerable Impact Subscore is 0.56 (due to high with none for and ), and Subsequent Impact is 0, yielding a Base Score of 5.3 after MacroVector mapping and interpolation (Medium severity). The complete string is CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N, demonstrating how AT:N (none) maintains high exploitability without additional barriers.

Criticisms and Limitations

Version-Specific Critiques

Critiques of the Common Vulnerability Scoring System (CVSS) version 2.0 center on the subjectivity of its Access Complexity metric, which assesses the difficulty of exploiting a vulnerability after initial access but relies heavily on analyst interpretation, leading to inconsistent scores across evaluations. Additionally, the temporal metrics in v2.0, intended to capture time-dependent factors like exploit code maturity, are underused because of their added complexity, with practitioners often defaulting to base scores alone to avoid the burden of ongoing updates. For CVSS versions 3.0 and 3.1, the metric has been criticized for its ambiguity in handling chained exploits, where one vulnerability enables another across system components, as the binary Changed/Unchanged determination fails to adequately capture compounded impacts without clear guidance on inter-vulnerability relationships. The User Interaction metric also undervalues scenarios like attacks, where required user actions (e.g., clicking malicious links) are scored as lowering exploitability despite their prevalence and severe real-world consequences, such as enabling full system compromise through social engineering chains that CVSS evaluates in . Furthermore, these versions exhibit limited applicability to (IoT) environments, as metrics like and do not sufficiently address physical proximity requirements or safety impacts (e.g., human injury from exploited devices), rendering scores less relevant for cyber-physical systems beyond traditional IT. In CVSS v4.0, the expanded metrics introduce greater complexity that may hinder scoring, with refinements like splitting Attack Complexity into separate requirements and introducing finer in User Interaction (None/Passive/Active) increasing the interpretive burden on analysts despite aims for . The new metric, part of the supplemental group, is viewed as too niche, applying primarily to specialized domains like or automotive systems without influencing the core score, thus limiting its broad utility in standard . Early adoption feedback from 2023-2024 highlights concerns over excessive and overreach, particularly with the Automatable metric assuming scalable without sufficient validation, leading to overly prescriptive scores that complicate processes and inconsistent application in diverse environments. Studies underscore these version-specific issues; for instance, analyses of v2.0 revealed widespread inconsistencies in application, while evaluations of v3 errors in 2020-era reviews confirmed persistent in exploit chaining, contributing to unreliable across vulnerability databases.

Broader Challenges and Alternatives

The Common Vulnerability Scoring System (CVSS) faces systemic limitations that restrict its utility as a complete tool. CVSS scores emphasize the intrinsic severity of but do not incorporate the real-world likelihood of , potentially leading organizations to overemphasize theoretical over actively targeted ones. This gap is particularly evident in its failure to consider business context, such as the value of affected assets or existing mitigations, resulting in generic evaluations that may not reflect an organization's specific profile. Additionally, the standardized vector strings used to share CVSS details across stakeholders are susceptible to errors, as professional users often inconsistently evaluate key like and user interaction, undermining reliability. Consequently, CVSS alone does not constitute a full ; it is frequently augmented by complementary systems like the Exploit Prediction Scoring System (EPSS), which uses on CVE and to forecast probability within 30 days, providing a probabilistic layer absent in CVSS. Broader challenges compound these issues, particularly during version transitions and through excessive dependence on CVSS. Shifts between versions, such as from 3.1 to 4.0, introduce score incompatibilities for the same vulnerabilities, with empirical analyses revealing changes of up to about 1 point in some cases, with an average increase of approximately 0.8 points across large datasets of millions of alerts, which disrupts longitudinal tracking and consistent prioritization. Furthermore, adoption of CVSS v4.0 has been slow; as of May 2025, only about 2.4% of CVEs were scored using v4.0, complicating transitions and consistent use across vulnerability databases. Over-reliance on CVSS exacerbates patch fatigue, as teams grapple with a flood of high-severity alerts that often overestimate actual threats, contributing to alert overload, delayed remediation, and resource exhaustion in vulnerability management workflows. To mitigate CVSS's shortcomings, several alternative scoring and prioritization frameworks have emerged, each emphasizing aspects like qualitative judgment, stakeholder needs, or empirical prediction. The model, originating from , simplifies risk evaluation through five qualitative factors—damage potential, reproducibility, exploitability, affected users, and discoverability—offering an accessible but now outdated approach for in . The Risk Rating Methodology adopts a qualitative, customizable structure that calculates risk as likelihood multiplied by , incorporating technical and business factors (e.g., financial damage) to yield low, medium, or high severity ratings tailored to contexts. CISA's Stakeholder-Specific (SSVC) provides a decision-centric framework via a evaluating status, technical , and , categorizing vulnerabilities into prioritized actions (e.g., "Act" for immediate response) to guide government and decisions beyond mere severity scoring. EPSS, detailed earlier, stands out for its data-driven focus on exploit likelihood, enabling more targeted remediation when paired with CVSS. Future directions for CVSS involve iterative improvements driven by the CVSS (SIG) under FIRST, which actively solicits feedback on version 4.0 to address usability and accuracy gaps identified post-release. Ongoing discussions within the SIG and broader cybersecurity community, as of 2025, emphasize the need for further adaptations to emerging threats, such as AI-enhanced attacks, through iterative improvements and potential new supplemental metrics.

Adoption and Impact

Usage in Vulnerability Management

In vulnerability management, CVSS scores serve as a foundational tool for prioritizing remediation efforts by categorizing vulnerabilities into severity levels such as Low, Medium, High, and Critical, enabling security teams to focus on the most severe threats first. For instance, tools like Nessus leverage CVSS base scores to rank vulnerabilities in scan results, directing patch queues toward High and Critical items (scores of 7.0–10.0) before addressing lower-priority ones. This approach streamlines in large environments, where thousands of vulnerabilities may be identified during scans, ensuring timely mitigation of risks with high exploitability and impact. CVSS is deeply integrated into reporting mechanisms across vulnerability databases and vendor communications, providing standardized severity assessments that facilitate consistent communication. The (NVD), maintained by NIST, incorporates CVSS v3.1 scores for all applicable CVEs since September 2019 and began official support for CVSS v4.0 in June 2024, displaying both vector strings and numerical scores alongside vulnerability details to aid analysts in understanding and reporting risks. Vendor security advisories, such as those from , routinely include CVSS vectors and scores to quantify severity, allowing customers to assess urgency without proprietary interpretations. These integrations ensure that CVSS data is readily available for compliance reporting, incident response documentation, and stakeholder briefings. Best practices in applying CVSS emphasize its use as part of a broader framework rather than in isolation, combining scores with contextual metrics like exploit prediction scoring system (EPSS) probabilities or (CVE) details to refine prioritization based on real-world exploit likelihood and organizational relevance. The FIRST CVSS recommends enriching vulnerability scan results with data to customize environmental metrics, ensuring scores reflect specific deployment contexts. Additionally, since temporal metrics—such as exploit code maturity and remediation levels—evolve over time, practitioners are advised to conduct regular score reviews, potentially quarterly or after major threat intelligence updates, to adjust management strategies dynamically. This holistic approach mitigates the limitations of static base scores and enhances overall efficacy. A prominent illustrating CVSS's role in is the vulnerability (CVE-2021-44228), a remote code execution flaw in Apache Log4j assigned a perfect CVSS v3.1 base score of 10.0 due to its network accessibility, low complexity, and potential for complete system compromise. This maximum severity rating prompted immediate global responses, including emergency directives from the (CISA) urging organizations to patch or mitigate within 24–48 hours, influencing patching efforts across millions of affected systems in sectors like government, finance, and cloud services. The incident underscored CVSS's utility in escalating awareness and coordinating international remediation, though it also highlighted the need for rapid temporal updates as exploits proliferated.

Integration and Tools

The Forum of Incident Response and Security Teams (FIRST) provides an official online for CVSS 4.0, enabling users to input metrics and generate scores along with strings for sharing assessments. The (NVD), maintained by NIST, offers a CVSS v4.0 that parses and refines strings from CVE entries via its , supporting automated for . Vulnerability scanners commonly incorporate CVSS for automated scoring and prioritization. Tenable's Nessus integrates CVSS base scores to highlight high-risk vulnerabilities, combining them with compliance checks and exploit prediction metrics for remediation guidance. Vulnerability Management, Detection, and Response (VMDR) uses CVSS v3.1 and v4.0 metrics to assess and rank vulnerabilities in and on-premises environments, facilitating prioritized patching workflows. Rapid7's InsightVM platform embeds CVSS scoring within its dashboard, allowing users to filter and remediate based on severity vectors derived from NVD data. Programmatic support for CVSS is available through open-source libraries and standardized formats. The package cvss-lib provides utilities for computing CVSS , v3.1, and v4.0 scores from strings, with compatibility for scripting automated assessments in tools. Vulnerability data interchange formats like CycloneDX and OSV include JSON representations of CVSS , enabling consistent serialization and deserialization across ecosystems for tool interoperability. CVSS has been adopted in key compliance standards to standardize vulnerability risk assessment. The Payment Card Industry Data Security Standard (PCI DSS) recognizes CVSS scores for defining requirements, including prioritization thresholds for critical systems. ISO/IEC 27001 recognizes CVSS scores as a tool for in Annex A controls, such as A.12.6 for technical . Transitioning to CVSS v4.0 presents integration challenges, particularly around metric compatibility and score recalibration. Tools like the open-source cvss_converter on assist in mapping CVSS v3.1 to v4.0 equivalents, accounting for changes in metrics such as User Interaction granularity to maintain assessment continuity. compatibility issues arise from v4.0's refined exploitability and impact subscores, requiring updates to parsing logic in existing tools to avoid misaligned severity ratings during . As of November 2025, major platforms like Nessus and VMDR have fully integrated CVSS v4.0 support, enhancing prioritization in and environments.

References

  1. [1]
    CVSS v4.0 Specification Document - FIRST.org
    The Common Vulnerability Scoring System (CVSS) is an open framework for communicating the characteristics and severity of software vulnerabilities.Metrics · Exploitability Metrics · Impact Metrics · Exploit Maturity (E)
  2. [2]
    Common Vulnerability Scoring System SIG - FIRST.org
    The Common Vulnerability Scoring System (CVSS) provides a way to capture the principal characteristics of a vulnerability and produce a numerical score ...CVSS v3.1 Specification · CVSS v3.0 User Guide · CVSS v3.0 · CVSS-SIG team
  3. [3]
    Vulnerability Metrics - NVD
    The official CVSS documentation can be found at https://www.first.org/cvss/. NVD CVSS Calculators. NVD CVSS v2.0 Calculator · NVD CVSS v3.x Calculator · NVD ...Common Vulnerability Scoring... · CVSS v3 Calculator · CVSS v4.0 Calculators
  4. [4]
    [PDF] The common vulnerability scoring system (CVSS) and its ... - GovInfo
    CVSS enables IT managers, vulnerability bulletin providers, security vendors, application vendors and researchers to all benefit by adopting this common ...
  5. [5]
    Common Vulnerability Scoring System v1 Archive - FIRST.org
    The CVSS Team have provided a historic record of the first version of CVSS here. These should not be used for scoring or other CVSS related activities and ...
  6. [6]
    CVSS v3.1 Specification Document - FIRST.org
    The Common Vulnerability Scoring System (CVSS) is an open framework for communicating the characteristics and severity of software vulnerabilities.Metrics · Scoring · Exploitability Metrics · Modified Base Metrics
  7. [7]
    CVSS v3.1 User Guide - FIRST.org
    CVSS is an open framework for communicating the characteristics and severity of software vulnerabilities, with Base, Temporal, and Environmental metric groups.
  8. [8]
    [PDF] National Infrastructure Advisory Council Common Vulnerability ...
    The NIAC commissioned this project to propose an open and universal vulnerability scoring system to address and solve these shortcomings, with the ultimate goal ...Missing: origins contributors
  9. [9]
    CVSS v2 History - FIRST.org
    Jun 13, 2007 · This document will attempt to interpret the history and rationale behind changes made in the Common Vulnerability Scoring System (CVSS) from version 1 to ...
  10. [10]
    CVSS Frequently Asked Questions - FIRST.org
    Who developed CVSS? A: CVSS was commissioned by the National Infrastructure Advisory Council (NIAC) tasked in support of the global Vulnerability Disclosure ...Missing: contributors | Show results with:contributors
  11. [11]
    FIRST has officially published the latest version of the Common ...
    Nov 1, 2023 · FIRST has officially published the latest version of the Common Vulnerability Scoring System (CVSS v4. 0) In June 2023, attendees at the 35th ...<|control11|><|separator|>
  12. [12]
    Common Vulnerability Scoring System Version 4.0 - FIRST.org
    CVSS v4.0 is the next generation of the standard, with new nomenclature, new metrics, and enhanced impact assessment. It also has a new supplemental metric ...First cvss faq · CVSS v4.0 Examples · Specification DocumentMissing: evolution | Show results with:evolution
  13. [13]
    CVSS v2 Archive
    Jun 20, 2007 · New version of Common Vulnerability Scoring System released​​ Seville Spain June 20, 2007: Millions of computer users worldwide will enjoy more ...
  14. [14]
    CVSS v2 Complete Documentation - FIRST.org
    CVSS consists of 3 groups: Base, Temporal and Environmental. Each group produces a numeric score ranging from 0 to 10, and a Vector, a compressed textual ...Missing: interpretation | Show results with:interpretation
  15. [15]
    Common Vulnerability Scoring System version 3.0 - FIRST.org
    CVSS version 3.0 was released in June 2015 and was superseded in June 2019 by CVSS version 3.1. You are recommended to use the latest version of CVSS, but ...Missing: evolution | Show results with:evolution
  16. [16]
    CVSS v3.0 User Guide - FIRST.org
    This guide supplements the formal CVSS v3.0 specification document by providing additional information, highlighting relevant changes from v2.0, as well as ...Missing: rationale | Show results with:rationale
  17. [17]
    Common Vulnerability Scoring System Version 3.1 - FIRST.org
    A self-paced on-line training course is available for CVSS v3.1. It explains the standard without assuming any prior CVSS experience.Missing: rationale | Show results with:rationale
  18. [18]
    CVSS v3.0 Specification Document - FIRST.org
    This document describes the official CVSS v3.0 specification. 1.1. Metrics. CVSS is composed of three metric groups, Base, Temporal, and Environmental, each ...Missing: evolution | Show results with:evolution
  19. [19]
    CVSS v4.0 User Guide - FIRST.org
    CVSS is an open framework for communicating software vulnerability characteristics and severity, using Base, Threat, Environmental, and Supplemental metrics.
  20. [20]
    [PDF] cvss-v2-guide.pdf - FIRST.org
    The Common Vulnerability Scoring System (CVSS) provides an open framework for communicating the characteristics and impacts of IT vulnerabilities.
  21. [21]
    CVSS v2.0 Equations - NVD
    CVSS v2.0 Equations. CVSS Base Score Equation. BaseScore = (.6*Impact + ... unconfirmed: 0.90 uncorroborated: 0.95 confirmed: 1.00 not defined 1.00 CVSS ...
  22. [22]
    CVSS v4.0 Specification Document - FIRST.org
    This document provides the official specification for CVSS version 4.0. The most current CVSS resources can be found at https://www.first.org/cvss/. CVSS is ...Metrics · Exploitability Metrics · Impact Metrics · Provider Urgency (U)
  23. [23]
    [PDF] CVSS v4.0 Specification - 2024-06-18 - FIRST.org
    Nov 1, 2023 · This document provides the official specification for CVSS version 4.0. The most current CVSS resources can be found at https://www.first.org/ ...
  24. [24]
    CVSS v4.0 User Guide - FIRST.org
    Nov 1, 2023 · CVSS is an open framework for communicating software vulnerability characteristics and severity, using Base, Threat, Environmental, and ...
  25. [25]
    [PDF] CVSS v4.0 Frequently Asked Questions 2025-03-14 (Updated)
    Privilege Required metrics are grouped with combinations of Attack Vector metrics. (See Table 24 in the CVSS Specification Document). As a result, there was ...
  26. [26]
    CVSS: Ubiquitous and Broken | Digital Threats: Research and Practice
    Feb 15, 2022 · Its first iteration, CVSS v1, was introduced in late 2005 by the National Infrastructure Advisory Council [25, 37]. There were other ...
  27. [27]
  28. [28]
    A critical look at CVSS - Advens
    Finally, CVSS can be criticized for its too great granularity; it is sometimes difficult, if not unnecessary, to differentiate between a score of 5.6 and a ...Missing: inconsistent | Show results with:inconsistent
  29. [29]
    CVSS and the Internet of Things - Software Engineering Institute
    Sep 2, 2015 · Second, CVSS is likely to be much less relevant for IoT or cyber-physical systems (or whatever you want to call them). I see several problems ...Missing: limited applicability<|control11|><|separator|>
  30. [30]
    Does CVSS 4.0 solve the exploitability problem? - Help Net Security
    Jan 31, 2024 · Other criticisms of CVSS 3.0 were just as valid. Due to its focus on cyber threats, physical security risks didn't fit well into the CVSS ...
  31. [31]
    Specific Criticism of CVSS4 - What is not going to be better - scip AG
    Mar 14, 2024 · The Common Vulnerability Scoring System (CVSS) was able to establish itself as a risk metric. The newly released CVSS 4.0 has some problems.
  32. [32]
    What is CVSS? (Common Vulnerability Scoring System) | Tenable®
    May 31, 2025 · Maintained by FIRST, CVSS assigns each vulnerability a score between 0.0 and 10.0, using a combination of exploitability and impact metrics.
  33. [33]
    Shedding Light on CVSS Scoring Inconsistencies: A User-Centric ...
    Finally, we discuss possible reasons for inconsistent evaluations and provide recommendations on improving the consistency of scoring. Report issue for ...Missing: adoption | Show results with:adoption
  34. [34]
  35. [35]
    CVSS 3.1 vs CVSS 4.0: A Look at the Data - Mend.io
    Jan 13, 2025 · We took a look at 18 months of our customer data—that's over 81 million alerts—to see how CVSS scores changed between versions 3.1 and 4.0.
  36. [36]
    The Great CVSS Bake Off: Testing How CVSS v4 Performs Versus v3
    Oct 24, 2023 · The first CVSS version was introduced in 2005 and has since undergone several iterations. Version 4 is actually the fifth version of the CVSS ...
  37. [37]
    Cure Alert Fatigue: How to Tame Your Security Scanner - Cyber Sierra
    " To truly solve alert fatigue, we need to understand what's causing it: Overreliance on CVSS Scores: CVSS scores can be misleading indicators of actual risk.
  38. [38]
  39. [39]
    OWASP Risk Rating Methodology | OWASP Foundation
    ### OWASP Risk Rating Methodology Summary
  40. [40]
    Stakeholder-Specific Vulnerability Categorization (SSVC) | CISA
    ### Summary of Stakeholder-Specific Vulnerability Categorization (SSVC)
  41. [41]
    Understanding CVSS 4.0 and the Future of Vulnerability Scoring
    Oct 30, 2025 · Explore what's new in CVSS 4.0, how it changes vulnerability scoring, and what's next for risk assessment, AI, and data-driven security.<|separator|>
  42. [42]
    CVSS Scores vs. VPR (Tenable Nessus 10.10)
    Tenable uses CVSS scores and a dynamic Tenable-calculated Vulnerability Priority Rating (VPR) to quantify the risk and urgency of a vulnerability.
  43. [43]
    CVSS v4.0 Official Support - NVD
    Jun 27, 2024 · The NVD now supports CVSS v4.0! The Common Vulnerability Scoring System (CVSS) provides a way to capture the principal characteristics of a vulnerability.
  44. [44]
    Severity ratings | Red Hat Customer Portal
    Common Vulnerability Scoring System (CVSS) base scores provide additional guidance about a vulnerability, giving a detailed severity rating by scoring the ...
  45. [45]
    Understanding CVSS Base Scores - Balbix
    Sep 5, 2024 · CVSS base scores range from 0 to 10, with 0 indicating no impact or exploitability and 10 representing the most severe vulnerabilities. This ...
  46. [46]
  47. [47]
    Mitigating Log4Shell and Other Log4j-Related Vulnerabilities | CISA
    Dec 23, 2021 · Log4Shell, disclosed on December 10, 2021, is a remote code execution (RCE) vulnerability affecting Apache's Log4j library, versions 2.0-beta9 to 2.14.1.Mitigating Log4shell And... · Mitigations · Affected Organizations With...
  48. [48]
    Common Vulnerability Scoring System Version 4.0 Calculator
    ... official CVSS v4.0 Specification Document. The Specification is available in the list of links on the left, along with a User Guide providing additional ...
  49. [49]
    CVSS v4 Calculator - NVD
    This page is a CVSS v4 calculator, showing components of a CVSS assessment and allowing score refinement. CVSS is the Common Vulnerability Scoring System.
  50. [50]
    Nessus Vulnerability Scanner: Network Security Solution | Tenable®
    Cut through the noise by highlighting the vulnerabilities that pose the greatest risk, with built-in compliance checks, CVSS and EPSS risk scoring, and easy-to- ...
  51. [51]
    cvss - PyPI
    This Python package contains CVSS v2, v3 and v4 computation utilities and interactive calculator (for v2 and v3 only) compatible with Python 3.
  52. [52]
    Open Source Vulnerability format - GitHub Pages
    This document defines a standard interchange format for describing vulnerabilities in open source packages.
  53. [53]
    Function converting from CVSS 3.1 to CVSS 4.0 - GitHub
    CVSS v4.0 proposes the User Interaction (UI) metric to be more granular. CVSS v3.1 the User Interaction (UI) metric had values None(N) or Required(R).
  54. [54]
    Impact of the transition from the CVSSv3 to CVSSv4 norm
    Jan 30, 2025 · Discover how the shift from CVSSv3.1 to CVSSv4.0 impacts vulnerability scoring, prioritization, and real-world risk assessment at Orange ...