CINXE.COM
CVSS v2 History
<!doctype html><html lang="en" class="web tlp-clear" data-studio-config="eyJ4aHJDcmVkZW50aWFscyI6ZmFsc2UsInhockhlYWRlcnMiOnt9fQo="><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8" /><title>CVSS v2 History</title> <meta property="og:title" content="CVSS v2 History" /> <meta property="og:type" content="website" /> <meta property="og:image" content="https://www.first.org/cvss/identity/cvssv4.png" /> <meta property="og:url" content="https://www.first.org/cvss/v2/history" /> <meta property="og:site_name" content="FIRST — Forum of Incident Response and Security Teams" /> <meta property="fb:profile_id" content="296983660669109" /> <meta property="twitter:card" content="summary_large_image" /> <meta property="twitter:site" content="@FIRSTdotOrg" /> <meta property="twitter:image" content="https://www.first.org/cvss/identity/cvssv4.png" /><meta name="viewport" content="initial-scale=1,maximum-scale=1.0,user-scalable=no" /><link rel="icon" type="image/png" href="/1st.png" /><link rel="apple-touch-icon" sizes="128x128" href="/favicon.png" /><link rel="stylesheet" type="text/css" href="/_/web.css?20241031194005" /></head><body><header><div id="header" data-studio="CU52CV1W8g"><div id="c3" data-studio="Yu8FjCC11g"><div id="topbar"> <div class="sites right"> <ul> <li><a href="https://support.first.org" class="kb-datalist"><img src="/_/img/icon-portal_support.svg" alt="FIRST Support" title="FIRST Support" /></a></li> <li><a href="https://portal.first.org" class="button"><span class="no-tiny">Member </span>Portal</a></li> </ul> </div> <div class="first-logo"> <p><a href="/"><img src="/_/img/first-org-simple-negative.svg" alt="FIRST.Org" title="FIRST" /></a></p> </div> <div class="nav"> <ul class="navbar"><li><a href="/about">About FIRST</a><ul><li><a href="/about/mission">Mission Statement</a></li><li><a href="/about/history">History</a></li><li><a href="/about/sdg">Sustainable Development Goals</a></li><li><a href="/about/organization">Organization</a><ul><li><a href="/about/organization/directors">Board of Directors</a></li><li><a>Operations Team</a><ul><li><a href="/about/organization/ccb">Community & Capacity Building</a></li><li><a href="/about/organization/events">Event Office</a></li><li><a href="/about/organization/executive-director">Executive Director</a></li><li><a href="/about/organization/infrastructure">Infrastructure</a></li><li><a href="/about/organization/secretariat">Secretariat</a></li></ul></li><li><a href="/about/organization/committees">Committees</a><ul><li><a href="/about/organization/committees/compensation-committee">Compensation Committee</a></li><li><a href="/about/organization/committees/conference-program-committee">Conference Program Committee</a></li><li><a href="/about/organization/committees/membership-committee">Membership Committee</a></li><li><a href="/about/organization/committees/rules-committee">Rules Committee</a></li><li><a href="/about/organization/committees/standards">Standards Committee</a></li></ul></li><li><a href="/events/agm">Annual General Meeting</a></li><li><a href="/about/organization/reports">Annual Reports and Tax Filings</a></li></ul></li><li><a href="/about/policies">FIRST Policies</a><ul><li><a href="/about/policies/anti-corruption">Anti-Corruption Policy</a></li><li><a href="/about/policies/antitrust">Antitrust Policy</a></li><li><a href="/about/policies/bylaws">Bylaws</a></li><li><a href="/about/policies/board-duties">Board duties</a></li><li><a href="/about/bugs">Bug Bounty Program</a></li><li><a href="/about/policies/code-of-conduct">Code of Conduct</a></li><li><a href="/about/policies/conflict-policy">Conflict of Interest Policy</a></li><li><a href="/about/policies/doc-rec-retention-policy">Document Record Retention and Destruction Policy</a></li><li><a href="/newsroom/policy">FIRST Press Policy</a></li><li><a href="/about/policies/gen-event-reg-refund-policy">General Event Registration Refund Policy</a></li><li><a href="/about/policies/event-site-selection">Guidelines for Site Selection for all FIRST events</a></li><li><a href="/identity">Identity & Logo Usage</a></li><li><a href="/about/policies/mailing-list">Mailing List Policy</a></li><li><a href="/about/policies/media">Media Policy</a></li><li><a href="/about/policies/privacy">Privacy Policy</a></li><li><a href="/about/policies/registration-terms-conditions">Registration Terms & Conditions</a></li><li><a href="/about/policies/terms">Services Terms of Use</a></li><li><a href="/about/policies/standards">Standards Policy</a></li><li><a href="/about/policies/diversity">Statement on Diversity & Inclusion</a></li><li><a href="/about/policies/translation-policy">Translation Policy</a></li><li><a href="/about/policies/travel-policy">Travel Policy</a></li><li><a href="/about/policies/uniform-ipr">Uniform IPR Policy</a></li><li><a href="/about/policies/whistleblower-policy">Whistleblower Protection Policy</a></li></ul></li><li><a href="/about/partners">Partnerships</a><ul><li><a href="/global/partners">Partners</a></li><li><a href="/global/friends">Friends of FIRST</a></li><li><a href="/global/supporters/">FIRST Supporters</a></li><li><a href="/about/sponsors">Sponsors</a></li></ul></li><li><a href="/newsroom">Newsroom</a><ul><li><a href="/newsroom/news">What's New</a></li><li><a href="/newsroom/releases">Press Releases</a></li><li><a href="/newsroom/news/media">In the News</a></li><li><a href="/podcasts">Podcasts</a><ul><li><a href="/newsroom/news/first-impressions/">FIRST Impressions Podcast</a></li><li><a href="/newsroom/news/podcasts/">FIRSTCON Podcast</a></li></ul></li><li><a href="/newsroom/newsletters">Newsletters</a></li><li><a href="/newsroom/policy">FIRST Press Policy</a></li></ul></li><li><a href="/about/procurement">Procurement</a></li><li><a href="/about/jobs/">Jobs</a></li><li><a href="/contact">Contact</a></li></ul></li><li><a href="/members">Membership</a><ul><li><a href="/membership/">Becoming a Member</a><ul><li><a href="/membership/process">Membership Process for Teams</a></li><li><a href="/membership/process-liaisons">Membership Process for Liaisons</a></li><li><a href="/membership/#Fees">Membership Fees</a></li></ul></li><li><a href="/members/teams">FIRST Teams</a></li><li><a href="/members/liaisons">FIRST Liaisons</a></li><li><a href="/members/map">Members around the world</a></li></ul></li><li><a href="/global">Initiatives</a><ul><li><a href="/global/sigs">Special Interest Groups (SIGs)</a><ul><li><a href="/global/sigs/framework">SIGs Framework</a></li><li><a href="/global/sigs/academicsec" class="borderb">Academic Security SIG</a></li><li><a href="/global/sigs/ai-security">AI Security SIG</a></li><li><a href="/global/sigs/automation">Automation SIG</a></li><li><a href="/global/sigs/bigdata">Big Data SIG</a></li><li><a href="/cvss">Common Vulnerability Scoring System (CVSS-SIG)</a><ul><li><a href="/cvss/calculator/4.0">Calculator</a></li><li><a href="/cvss/v4.0/specification-document">Specification Document</a></li><li><a href="/cvss/v4.0/user-guide">User Guide</a></li><li><a href="/cvss/v4.0/examples">Examples</a></li><li><a href="/cvss/v4.0/faq">Frequently Asked Questions</a></li><li><a href="/cvss/v4-0">CVSS v4.0 Documentation & Resources</a><ul><li><a href="/cvss/calculator/4.0">CVSS v4.0 Calculator</a></li><li><a href="/cvss/v4.0/specification-document">CVSS v4.0 Specification Document</a></li><li><a href="/cvss/v4.0/user-guide">CVSS v4.0 User Guide</a></li><li><a href="/cvss/v4.0/examples">CVSS v4.0 Examples</a></li><li><a href="/cvss/v4.0/faq">CVSS v4.0 FAQ</a></li></ul></li><li><a href="/cvss/v3-1">CVSS v3.1 Archive</a><ul><li><a href="/cvss/calculator/3.1">CVSS v3.1 Calculator</a></li><li><a href="/cvss/v3.1/specification-document">CVSS v3.1 Specification Document</a></li><li><a href="/cvss/v3.1/user-guide">CVSS v3.1 User Guide</a></li><li><a href="/cvss/v3.1/examples">CVSS v3.1 Examples</a></li><li><a href="/cvss/v3.1/use-design">CVSS v3.1 Calculator Use & Design</a></li></ul></li><li><a href="/cvss/v3-0">CVSS v3.0 Archive</a><ul><li><a href="/cvss/calculator/3.0">CVSS v3.0 Calculator</a></li><li><a href="/cvss/v3.0/specification-document">CVSS v3.0 Specification Document</a></li><li><a href="/cvss/v3.0/user-guide">CVSS v3.0 User Guide</a></li><li><a href="/cvss/v3.0/examples">CVSS v3.0 Examples</a></li><li><a href="/cvss/v3.0/use-design">CVSS v3.0 Calculator Use & Design</a></li></ul></li><li><a href="/cvss/v2">CVSS v2 Archive</a><ul><li><a href="/cvss/v2/guide">CVSS v2 Complete Documentation</a></li><li><a href="/cvss/v2/history">CVSS v2 History</a></li><li><a href="/cvss/v2/team">CVSS-SIG team</a></li><li><a href="/cvss/v2/meetings">SIG Meetings</a></li><li><a href="/cvss/v2/faq">Frequently Asked Questions</a></li><li><a href="/cvss/v2/adopters">CVSS Adopters</a></li><li><a href="/cvss/v2/links">CVSS Links</a></li></ul></li><li><a href="/cvss/v1">CVSS v1 Archive</a><ul><li><a href="/cvss/v1/intro">Introduction to CVSS</a></li><li><a href="/cvss/v1/faq">Frequently Asked Questions</a></li><li><a href="/cvss/v1/guide">Complete CVSS v1 Guide</a></li></ul></li><li><a href="/cvss/data-representations">JSON & XML Data Representations</a></li><li><a href="/cvss/training">CVSS On-Line Training Course</a></li><li><a href="/cvss/identity">Identity & logo usage</a></li></ul></li><li><a href="/global/sigs/csirt">CSIRT Framework Development SIG</a></li><li><a href="/global/sigs/cyberinsurance">Cyber Insurance SIG</a><ul><li><a href="/global/sigs/cyberinsurance/events">Cyber Insurance SIG Webinars</a></li></ul></li><li><a href="/global/sigs/cti">Cyber Threat Intelligence SIG</a><ul><li><a href="/global/sigs/cti/curriculum/">Curriculum</a><ul><li><a href="/global/sigs/cti/curriculum/introduction">Introduction</a></li><li><a href="/global/sigs/cti/curriculum/cti-introduction">Introduction to CTI as a General topic</a></li><li><a href="/global/sigs/cti/curriculum/methods-methodology">Methods and Methodology</a></li><li><a href="/global/sigs/cti/curriculum/pir">Priority Intelligence Requirement (PIR)</a></li><li><a href="/global/sigs/cti/curriculum/source-evaluation">Source Evaluation and Information Reliability</a></li><li><a href="/global/sigs/cti/curriculum/machine-human">Machine and Human Analysis Techniques (and Intelligence Cycle)</a></li><li><a href="/global/sigs/cti/curriculum/threat-modelling">Threat Modelling</a></li><li><a href="/global/sigs/cti/curriculum/training">Training</a></li><li><a href="/global/sigs/cti/curriculum/standards">Standards</a></li><li><a href="/global/sigs/cti/curriculum/glossary">Glossary</a></li><li><a href="/global/sigs/cti/curriculum/cti-reporting/">Communicating Uncertainties in CTI Reporting</a></li></ul></li><li><a href="/global/sigs/cti/events/">Webinars and Online Training</a></li><li><a href="/global/sigs/cti/cti-program">Building a CTI program and team</a><ul><li><a href="/global/sigs/cti/cti-program/program-stages">Program maturity stages</a><ul><li><a href="/global/sigs/cti/cti-program/stage1">CTI Maturity model - Stage 1</a></li><li><a href="/global/sigs/cti/cti-program/stage2">CTI Maturity model - Stage 2</a></li><li><a href="/global/sigs/cti/cti-program/stage3">CTI Maturity model - Stage 3</a></li></ul></li><li><a href="/global/sigs/cti/cti-program/starter-kit">Program Starter Kit</a></li><li><a href="/global/sigs/cti/cti-program/resources">Resources and supporting materials</a></li></ul></li></ul></li><li><a href="/global/sigs/digital-safety">Digital Safety SIG</a></li><li><a href="/global/sigs/dns">DNS Abuse SIG</a><ul><li><a href="/global/sigs/dns/policies">Code of Conduct & Other Policies</a></li><li><a href="/global/sigs/dns/dns-abuse-examples">Examples of DNS Abuse</a></li></ul></li><li><a href="/global/sigs/ethics">Ethics SIG</a><ul><li><a href="/global/sigs/ethics/ethics-first">Ethics for Incident Response Teams</a></li></ul></li><li><a href="/epss/">Exploit Prediction Scoring System (EPSS)</a><ul><li><a href="/epss/model">The EPSS Model</a></li><li><a href="/epss/data_stats">Data and Statistics</a></li><li><a href="/epss/user-guide">User Guide</a></li><li><a href="/epss/research">EPSS Research and Presentations</a></li><li><a href="/epss/faq">Frequently Asked Questions</a></li><li><a href="/epss/who_is_using">Who is using EPSS?</a></li><li><a href="/epss/epss_tools">Open-source EPSS Tools</a></li><li><a href="/epss/api">API</a></li><li><a href="/epss/papers">Related Exploit Research</a></li><li><a>Blog</a><ul><li><a href="/epss/articles/prob_percentile_bins">Understanding EPSS Probabilities and Percentiles</a></li><li><a href="/epss/articles/log4shell">Log4Shell Use Case</a></li><li><a href="/epss/articles/estimating_old_cvss">Estimating CVSS v3 Scores for 100,000 Older Vulnerabilities</a></li></ul></li><li><a href="/epss/partners">Data Partners</a></li></ul></li><li><a href="/global/sigs/msr/">FIRST Multi-Stakeholder Ransomware SIG</a></li><li><a href="/global/sigs/hfs/">Human Factors in Security SIG</a></li><li><a href="/global/sigs/ics">Industrial Control Systems SIG (ICS-SIG)</a></li><li><a href="/global/sigs/iep">Information Exchange Policy SIG (IEP-SIG)</a></li><li><a href="/global/sigs/information-sharing">Information Sharing SIG</a><ul><li><a href="/global/sigs/information-sharing/misp">Malware Information Sharing Platform</a></li></ul></li><li><a href="/global/sigs/le">Law Enforcement SIG</a></li><li><a href="/global/sigs/malware">Malware Analysis SIG</a><ul><li><a href="/global/sigs/malware/ma-framework">Malware Analysis Framework</a></li><li><a href="/global/sigs/malware/ma-framework/malwaretools">Malware Analysis Tools</a></li></ul></li><li><a href="/global/sigs/metrics">Metrics SIG</a><ul><li><a href="/global/sigs/metrics/events">Metrics SIG Webinars</a></li></ul></li><li><a href="/global/sigs/netsec/">NETSEC SIG</a></li><li><a href="/global/sigs/passive-dns">Passive DNS Exchange</a></li><li><a href="/global/sigs/policy">Policy SIG</a></li><li><a href="/global/sigs/psirt">PSIRT SIG</a></li><li><a href="/global/sigs/red-team">Red Team SIG</a></li><li><a href="/global/sigs/cpg">Retail and Consumer Packaged Goods (CPG) SIG</a></li><li><a href="/global/sigs/ctf">Security Lounge SIG</a></li><li><a href="/global/sigs/tic/">Threat Intel Coalition SIG</a><ul><li><a href="/global/sigs/tic/membership-rules">Membership Requirements and Veto Rules</a></li></ul></li><li><a href="/global/sigs/tlp">Traffic Light Protocol (TLP-SIG)</a></li><li><a href="/global/sigs/transport">Transportation and Mobility SIG</a></li><li><a href="/global/sigs/vulnerability-coordination">Vulnerability Coordination</a><ul><li><a href="/global/sigs/vulnerability-coordination/multiparty">Multi-Party Vulnerability Coordination and Disclosure</a></li><li><a href="/global/sigs/vulnerability-coordination/multiparty/guidelines">Guidelines and Practices for Multi-Party Vulnerability Coordination and Disclosure</a></li></ul></li><li><a href="/global/sigs/vrdx">Vulnerability Reporting and Data eXchange SIG (VRDX-SIG)</a><ul><li><a href="/global/sigs/vrdx/vdb-catalog">Vulnerability Database Catalog</a></li></ul></li><li><a href="/global/sigs/wof">Women of FIRST</a></li></ul></li><li><a href="/global/governance">Internet Governance</a></li><li><a href="/global/irt-database">IR Database</a></li><li><a href="/global/fellowship">Fellowship Program</a><ul><li><a href="https://portal.first.org/fellowship">Application Form</a></li></ul></li><li><a href="/global/mentorship">Mentorship Program</a></li><li><a href="/hof">IR Hall of Fame</a><ul><li><a href="/hof/inductees">Hall of Fame Inductees</a></li></ul></li><li><a href="/global/victim-notification">Victim Notification</a></li><li><a href="/volunteers/">Volunteers at FIRST</a><ul><li><a href="/volunteers/list">FIRST Volunteers</a></li><li><a href="/volunteers/participation">Volunteer Contribution Record</a></li></ul></li><li><a href="#new">Previous Activities</a><ul><li><a href="/global/practices">Best Practices Contest</a></li></ul></li></ul></li><li><a href="/standards">Standards & Publications</a><ul><li><a href="/standards">Standards</a><ul><li><a href="/cvss">Common Vulnerability Scoring System (CVSS-SIG)</a></li><li><a href="/tlp">Traffic Light Protocol (TLP)</a><ul><li><a href="/tlp/use-cases">TLP Use Cases</a></li></ul></li><li><a href="/standards/frameworks/">Service Frameworks</a><ul><li><a href="/standards/frameworks/csirts">CSIRT Services Framework</a></li><li><a href="/standards/frameworks/psirts">PSIRT Services Framework</a></li></ul></li><li><a href="/iep">Information Exchange Policy (IEP)</a><ul><li><a href="/iep/iep_framework_2_0">IEP 2.0 Framework</a></li><li><a href="/iep/iep-json-2_0">IEP 2.0 JSON Specification</a></li><li><a href="/iep/iep-polices">Standard IEP Policies</a><ul><li><a href="https://www.first.org/iep/2.0/first-tlp-iep.iepj">IEP TLP Policy File</a></li><li><a href="https://www.first.org/iep/2.0/first-unknown-iep.iepj">IEP Unknown Policy File</a></li></ul></li><li><a href="/iep/iep_v1_0">IEP 1.0 Archive</a></li></ul></li><li><a href="/global/sigs/passive-dns">Passive DNS Exchange</a></li><li><a href="/epss">Exploit Prediction Scoring System (EPSS)</a></li></ul></li><li><a href="/resources/papers">Publications</a></li></ul></li><li><a href="/events">Events</a></li><li><a href="/education">Education</a><ul><li><a href="/education/first-training">FIRST Training</a><ul><li><a href="/education/trainings">Training Courses</a></li><li><a href="/education/trainers">FIRST Trainers</a></li></ul></li></ul></li><li><a href="/blog">Blog</a></li></ul> </div> </div> <div id="home-buttons"> <p><a href="/join" data-title="Join"><img alt="Join" src="/_/img/icon-join.svg"><span class="tt-join">Join<span>Details about FIRST membership and joining as a full member or liaison.</span></span></a> <a href="/learn" data-title="Learn"><img alt="Learn" src="/_/img/icon-learn.svg"><span class="tt-learn">Learn<span>Training and workshop opportunities, and details about the FIRST learning platform.</span></span></a> <a href="/participate" data-title="Participate"><img alt="Participate" src="/_/img/icon-participate.svg"><span class="tt-participate">Participate<span>Read about upcoming events, SIGs, and know what is going on.</span></span></a></p> </div></div></div></header><div id="body" data-studio="CU52CV1W8g"><div id="c1" data-studio="Yu8FjCC11g" class="h2labels data-preview toc-h1 toc-h2 toc-h3"><h1 id="CVSS-SIG-Version-2-History">CVSS-SIG Version 2 History</h1> <p>Gavin Reid Cisco Systems, Inc.</p> <p>Peter Mell, Karen Scarfone National Institute of Standards and Technology</p> <p>Page last updated: Tue Jun 13 15:13:34 PDT 2007</p> <h2 id="Introduction">Introduction</h2> <p>This document will attempt to interpret the history and rationale behind changes made in the Common Vulnerability Scoring System (CVSS) from version 1 to version 2 (referred to as CVSS v1 and v2 in this document.) This document contains multiple appendices that provide a historic record of the stages and subsequent rationale that led to the developed standard; however, it is not intended as a CVSS user guide. For detailed how-to information, please see the <a href="/cvss/v2/guide">complete CVSS Guide</a>.</p> <p>The Forum of Incident Response and Security Teams (FIRST) sponsors and supports the Common Vulnerability Scoring System-Special Interest Group (CVSS-SIG), a diverse group of security professionals that has a keen interest in security vulnerabilities and use CVSS in its daily work. Many group members have implemented the scoring system for varying production uses within their organizations. Their experiences have helped shape the proposed direction for CVSS, while providing continued leadership for support and training.</p> <h2 id="CVSS">CVSS</h2> <p>The initial CVSS v1 design was not subjected to mass peer review across multiple organizations or industries. After production use, feedback from CVSS-SIG and others indicated there were significant issues with the initial draft of CVSS. To help address these, and increase the accuracy of CVSS, the CVSS-SIG began scoring vulnerabilities and comparing scores examining inconsistencies and authoring amendments to fix them. When the CVSS-SIG reached consensus around a particular problem or potential enhancement, it voted to approve, discard, or send the amendment back to committee for further discussion and work. The last round of voting ended June 1, 2007. For detailed information on the changes see Appendix A.</p> <p>The lengthy research work into all the corner cases and mainstream scoring issues has generated much discussion among the various participants in the CVSS-SIG. It is important to note that the CVSS-SIG retroactively scored old vulnerabilities alongside new ones an exercise that has proven beneficial because the actual significance of the vulnerabilities had been determined, which allowed the new v2 score to be compared against the impact of the real world vulnerabilities and the v1 score. In addition, the SIG scored all vulnerabilities in the NIST database to understand and compare against v1 to ensure the fidelity of the scoring increased and potentially to make changes where issues were found.</p> <h2 id="Conclusion">Conclusion</h2> <p>The CVSS-SIG team began meeting and working on CVSS v2 in April 2005 and will continue its effort up to the June 2007 release. The team has generated a large body of documentation including meeting minutes, draft versions, and other documents, some of which is available at <a href="https://www.first.org/cvss">https://www.first.org/cvss</a>. For detailed information on the CVSS v2 vector definitions see Appendix B or go to the National Institute of Standards and Technology (NIST) website <a href="http://nvd.nist.gov/cvss.cfm?vectorinfov2">http://nvd.nist.gov/cvss.cfm?vectorinfov2</a>.</p> <p>This documentation and CVSS v2 represents the selfless work of the CVSS-SIG, with a special acknowledgment to Peter Mell and the NIST team for their work and guidance. NIST provided a group of statisticians that reviewed calculations to help reduce inconsistencies with the current formulas including rounding, lack of diversity of scores, multiplicative equations issues, high score scarcity problems, and many-to-one scoring issues. For example, using the current formulas the vulnerabilities tend to group together in a few places. For details on the initial work by Peter Mell and Karen Scarfone see [insert link or reference to the NIST CVSS paper formula].</p> <p>The CVSS-SIG has been working with the formulas attempting to get a better spread while increasing the accuracy of the scores. Testing and refining the formulas based on the painstaking work of the CVSS-SIG generated multiple potential scoring formulas. The development of the formulas, documentation of the draft attempts, and the subsequent rationale behind the changes is available in Appendices C through M. The documentation is not intended for CVSS scoring or an explanation of use; rather, it has been provided only to reveal the process whereby the new formula was created, tested, and finalized. The CVSS-SIG team developed the formulas from extensive real world testing conducted in 2006-2007, and it will announce the availability of CVSS v2 and the new features and formulas at <a href="https://www.first.org/cvss">https://www.first.org/cvss</a>.</p> <h2 id="Appendix-A-Accepted-Proposals-for-Change-to-CVSS-v1">Appendix A: Accepted Proposals for Change to CVSS v1</h2> <p>This appendix documents the major changes made from CVSS v1 to CVSS v2. While developing CVSS v2, the CVSS-SIG discussed how to address the deficiencies in v1 and created a separate proposal for each major change to CVSS v1 that was desired. The CVSS-SIG then voted on each proposal. This appendix contains copies of all the proposals that were approved, and briefly references the proposal that was dropped.</p> <h3 id="Proposal-0">Proposal 0</h3> <p><strong>Proposal 0: Additional access complexity granularity to base scoring<br /> Release Date: 01/03/06<br /> Status: Approved by CVSS SIG</strong></p> <p><strong>Description</strong></p> <p>Case to add additional granularity into AccessComplexity. We would add an additional medium field to help better describe the complexity needed to use a particular exploit.</p> <p><strong>Formula Change</strong></p> <p>Current CVSS 1.0: (case AccessComplexity of high: 0.8, low: 1.0)</p> <p>Would change to the following (case AccessComplexity of high: 0.6, medium: 0.8, low: 1.0)</p> <p><strong>Documentation Change</strong></p> <p>Current CVSS 1.0:</p> <p>High: Specialized access conditions exist; for example, the system is exploitable during specific windows of time (a race condition), the system is exploitable under specific circumstances (non-default configurations), or the system is exploitable with victim interaction (vulnerability exploitable only if user opens e-mail)</p> <p>Low: Specialized access conditions or extenuating circumstances do not exist; the system is always exploitable</p> <p><strong>Approved Change</strong></p> <p>High: in most configurations, the attacker must already have high privileges; or, must control or spoof additional systems besides the target system (e.g. DNS); or, the attack can only be opportunistic, i.e. the attacker can not directly trigger the vulnerability; depends on social engineering methods that would be easily detected by knowledgeable people; or, the affected configuration is deemed to be very rare in practice; or, the race condition window is very narrow; or, depends on the presence of other vulnerabilities.</p> <p>Medium: the attacking party is limited to a group of systems or users at some level of authorization, possibly untrusted; there is a requirement for some information gathering before a successful attack can be launched; the affected functionality is not always used; or requires a small amount of social engineering that might occasionally fool cautious users (e.g. phishing attacks that modify the status bar to show a false link, having to be on someones buddy list before sending an IM exploit).</p> <p>Low: the affected product typically requires access to a wide range of systems and users, possibly anonymous and untrusted (e.g. Internet-facing web or mail server); the affected configuration is default or ubiquitous; the attack can be performed manually in one or two steps that require little skill or additional information gathering; the race condition is a lazy one, i.e. it is technically a race but easily winnable (as is the case with many symlink vulns)</p> <h3 id="Proposal-1">Proposal 1</h3> <p><strong>Proposal 1<br /> Release Date: 3/31/06<br /> Status: Approved by CVSS SIG</strong></p> <p>Move the impact bias metric from the base metric group to the environmental metric group. In its new form within the environmental section, it would enable end users to declare which CIA attribute is most important to them in the context of a particular vulnerability.</p> <p><strong>Rationale</strong></p> <ul> <li>1Which CIA metric is of most importance usually depends on the end user environment and their use of the software. For example, encryption software is suggested by CVSS v1.0 as a good candidate for a confidentiality bias. However, some organizations may prefer an integrity bias if the integrity of the data being passed is more important than the confidentiality. Just because youre encrypting data doesnt mean that you dont care more about integrity (or even availability for that matter). It all depends on the type of data being transmitted and thus this metric fits better within the environmental scoring.</li> <li>It is difficult to accurately determine this metric for the vast majority of software packages and thus it unnecessarily complicates the standard.</li> <li>It is difficult to get analysts to consistently assign this metric and thus it promotes score inconsistency between organizations.</li> </ul> <p>See section 7.5 of the NIST CVSS paper for more discussion of this proposal and for details on how it affected NISTs overall scoring efforts.</p> <h3 id="Proposal-2">Proposal 2</h3> <p><strong>Proposal 2<br /> Release Date: 4/4/06<br /> Status: Approved by CVSS SIG</strong></p> <p>Explicitly add to the CVSS standard that vulnerabilities that give root level access should be CIA of all complete and vulnerabilities that give user level access to the OS or general access to an application should be CIA of partial. Make it clear in the standard that we are not just rating what access the vulnerability directly gives the attacker but what access it also indirectly gives the attacker. Thus an integrity violation that allows one to modify an OS password file would be labeled CIA of all complete. Also, we should mention that following this property means that in most cases integrity violations would enable one to cause availability problems and thus setting Integrity to partial should usually imply a setting of partial or complete for availability.</p> <p>The documentation should make clear that the indirect benefits should not take into account any interaction with other vulnerabilities that are simultaneously present.</p> <p><strong>Example</strong></p> <p>A PHP application, by design, allows a special user to upload files. However, due to a vulnerability (issue 1), it allows the user to upload files with the .php extension, which are then executed from the web server. A separate issue 2 in the application allows an unauthenticated attacker to change their userID to arbitrary user IDs by means of a cookie. Due to the combination of these 2 issues, a remote attacker could execute arbitrary PHP code; but issue 1 alone requires authentication and special privileges, and issue 2 alone does not allow arbitrary code.</p> <p><strong>Rationale</strong></p> <p>This is commonly done by all who do large amounts of CVSS scoring but since it isnt in the standard, it causes confusion for newcomers and possibly causes unnecessary criticism of the standard by those not in the community.</p> <h3 id="Proposal-3">Proposal 3</h3> <p><strong>Proposal 3: Rewording of Access Complexity<br /> Release Date: 4/4/06<br /> Status: Approved by CVSS SIG</strong></p> <p>Reword the access complexity definition to make it clear that the metric is dealing with how easy it is to execute an attack once exploit code exists as opposed to measuring how hard it is to write exploit code.</p> <p><strong>Rationale</strong>- It is difficult for analysts to determine how hard it is to write exploit code and thus this metric could be set unreliably. For example, the current standard implies that all race conditions result in attacks that are difficult to launch but this is not always the case.</p> <ul> <li>From the NIST CVSS paper: Measuring the difficulty of writing exploit code within this metric is problematic when used in conjunction with CVSS temporal scoring. In calculating the CVSS base score, setting access complexity from Low to High drops a score by 20%. When calculating the temporal score, there is a metric called Exploitability, which has four options: unproven an exploit exists, proof of concept code available, functional exploit available, and exploit incorporated into major worm or virus. Once a functional exploit is available, it no longer matters whether or not it was difficult to write the exploit. Thus, in the temporal scoring one should ideally ignore or undo the effects of the exploit code-writing element of the access complexity metric whenever a proof of concept exploit is publicly available. Instead, the temporal exploitability metric can only further reduce the CVSS score due to the way the temporal score equation is constructed. This means that a vulnerability exploited by a major worm that was difficult to write will have a lower score in the CVSS temporal scoring than a vulnerability exploited by a major worm that was easy to write. However, when a major worm is released, the impact on computer systems has nothing to do with how much effort it took the virus writer to create the worm.</li> </ul> <h3 id="Proposal-4">Proposal 4</h3> <p><strong>Proposal 4: Modify Target Distribution Environmental Metric<br /> Status: Discarded by CVSS SIG</strong></p> <p>Change target distribution environmental metric to none/low/low-medium/medium-high/high from none/low/medium/high.</p> <h3 id="Proposal-5">Proposal 5</h3> <p><strong>Proposal 5: Additional Granularity for Access Vector<br /> Release Date: 4/12/06<br /> Status: Approved by CVSS SIG</strong></p> <p>Add a new option to the access vector metric for vulnerabilities that are accessible only over a local network and rename existing metrics appropriately. The new option is called Local network accessible (sometimes referred to as adjacent in the CVSS SIG email list discussions).</p> <p>A vulnerability that is adjacently exploitable will have a lower score than a remotely exploitable vulnerability, and a higher score than a locally exploitable vulnerability.</p> <p><strong>Revised Access Vector Metric Definitions</strong></p> <ul> <li>Requires local access: The attacker must have physical access to the hardware the vulnerable software is running on, or a local shell account on the machine. The vulnerable software does not accept packets from the network stack. Examples of these would include peripherals attacks such as Firewire/USB DMA attacks, as well as local privilege escalations such as sudo privilege escalation.</li> <li>Local Network accessible: The attacker must have access to the broadcast or collision domain that the vulnerable software is running on, or physical proximity to the hardware the vulnerable software is running on. Examples of local networks include: local IP subnet, Bluetooth, 802.11, and local Ethernet segment.</li> <li>Network accessible: The vulnerable software is bound to the network stack, and the attacker does not require local network access. An example of a network accessible attack is a RPC buffer overflow.</li> </ul> <h3 id="Proposal-6">Proposal 6</h3> <p><strong>Proposal 6: Modification to Collateral Damage Potential<br /> Release Date: 8/24/06<br /> Status: Approved by CVSS SIG</strong></p> <p><strong>1.3.1 Collateral Damage Potential</strong> This metric measures the potential for a loss of life or physical assets through damage or theft of property or equipment. The metric may also measure economic loss of productivity or revenue.</p> <p><strong>1.3.1.1 Collateral Damage Potential Scoring Evaluation</strong> None: There is no potential for loss of life, physical asset, productivity or revenue</p> <p>Low: A successful exploit of this vulnerability may result in light physical or property damage. Or, there may be slight loss of revenue or productivity to the organization.</p> <p>Low-Medium: A successful exploit of this vulnerability may result in moderate physical or property damage. Or, there may be moderate loss of revenue or productivity to the organization.</p> <p>Medium-High: A successful exploit of this vulnerability may result in significant physical or property damage or loss. Or, there may be significant loss of productivity or revenue.</p> <p>High: A successful exploit of this vulnerability may result in catastrophic physical or property damage and loss. The range of effect may be over a wide area. Or, there may be catastrophic loss of productivity or revenue</p> <h3 id="Proposal-7">Proposal 7</h3> <p><strong>Proposal 7: Modification of Access Vector and Authentication Metrics<br /> Release Date: 4/25/06<br /> Status: Approved by CVSS SIG</strong></p> <p>Authentication Metric</p> <ul> <li>Requires no authentication</li> <li>Requires a single instance of authentication</li> <li>Requires multiple instances of authentication</li> </ul> <p>The authentication metric measures what level of authentication/authorization is needed prior to launching the attack. The exact type of authentication is not being measured (e.g., we dont care for this metric whether or not an application authenticates using OS credentials or its own private scheme).</p> <p>A single instance of authentication involves one requirement for an attacker to prove their identity. This metric does not gauge the strength or diversity of the authentication step (password and two-factor authentication are both a single instance of authentication), only that an attacker is asked to prove identity before an exploit may occur. Vulnerabilities that require an attacker to be logged in to a system (such as at a command-line or via a desktop session or web interface) represent a single instance of authentication.</p> <p>Multiple instances of authentication are, therefore, two or more requirements for an attacker to prove identity. If an attacker must pass more than one request for authentication, such as authenticating to an operating system login as well as provide credentials to access an application hosted on that system, then multiple instances of authentication have been required. Again, note that the strength or diversity of authentication is not measured -- even if the credentials are identical for each instance of authentication, or if the second set of credentials is commonly saved (such as in an e-mail client).</p> <p>Because authentication instances are measured as those required before launching an attack, the metric should be applied at the earliest stage from which an attacker can exploit the vulnerability. For example, if a mail server offers commands pre- and post- authentication that are vulnerable, the metric should score as No Authentication, because the attacker can launch the exploit before credentials are required; if the vulnerable commands are only available post-authentication, then it should be scored as a Single Instance. Also, if the vulnerability exists in an authentication scheme itself (e.g. PAM; default user account) or anonymous service (e.g. public FTP server), it may be necessary to score as No Authentication if the attacker can exploit the issue without supplying credentials.</p> <h3 id="Proposal-8">Proposal 8</h3> <p><strong>Proposal 8: Direct and Indirect Impact of Exploitation<br /> Release Date: 6/16/06<br /> Status: Approved by CVSS SIG</strong></p> <p>Our multi-organization scoring comparison effort has revealed that the scoring of vulnerabilities that potentially have an impact on secondary hosts that access exploited servers, such as cross site scripting (XSS) vulnerabilities, is the cause of a large source of CVSS scoring discrepancies between multiple IT security organizations. For example, some analysts score XSS vulnerabilities with respect to the direct impact on the service, and some score them with respect to the indirect impact on an end user of the service.</p> <p>In order to make scoring consistent and to focus scoring on the software that is directly vulnerable, the CVSS documentation should be updated to reflect that vulnerabilities should always be scored with respect to the impact on the vulnerable service. For the majority of cases CIA will be scored Confidentiality None, Integrity Partial, and Availability None.</p> <h3 id="Proposal-9">Proposal 9</h3> <p><strong>Proposal 9: Assumptions for Application Privileges<br /> Release Date: 8/24/06<br /> Status: Approved by CVSS SIG</strong></p> <p>Our multi-organization scoring comparison effort has revealed that a major source of scoring discrepancies is different assumptions made by analysts as to the privileges under which various applications, such as Web servers and Web browsers, are run. For example, the scores for exploiting a Web server will be quite different if the Web server is assumed to run with root-level or user-level privileges.</p> <p>To make scoring more consistent, the CVSS documentation should be updated to indicate that vulnerabilities should be scored based on the privileges that are most often used (sometimes referred to as most probably) for the application. This does not necessarily reflect the best practice for the application, especially for client applications, which are often run with root-level privileges. If it is not clear what privileges are most often used for an application, analysts should assume the default configuration.</p> <h3 id="Proposal-10">Proposal 10</h3> <p><strong>Proposal 10: Handling Multiple Exploitation Methods<br /> Release Date: 8/24/06<br /> Status: Approved by CVSS SIG</strong></p> <p>Our multi-organization scoring comparison effort has revealed that some scoring discrepancies are due to analysts taking different approaches to handling cases where there is more than one way to exploit a particular vulnerability. For example, a vulnerability could be exploited using a low-complexity method to gain user-level access, and exploited using a high-complexity method to gain root access.</p> <p>To make scoring more consistent, the CVSS documentation should be updated to indicate that analysts should generate a score for each approach to exploitation and then assign the vulnerability the highest of the scores. If the highest score is shared by multiple approaches, then analysts should compare those approaches and select the one that is most likely to be used.</p> <p><strong>Current Text</strong></p> <p>The authors recognize that many other metrics could be included in CVSS. They also realize that no one scoring system will fit everyones need perfectly. The particular constituent metrics used in CVSS were identified as the best compromise between completeness, ease-of-use and accuracy. They represent the cumulative experience of the authors as well as extensive testing of real-world vulnerabilities in end-user environments.</p> <p><strong>Proposed Text</strong></p> <p>The authors recognize that many other metrics could be included in CVSS. They also realize that no one scoring system will fit everyones need perfectly. The particular constituent metrics used in CVSS were identified as the best compromise between completeness, ease-of-use and accuracy. They represent the cumulative experience of the authors as well as extensive testing of real-world vulnerabilities in end-user environments. It is important to note that CVSS scoring on the impact of a vulnerability that has multiple exploitation methods the scorer chooses the exploit that has the most impact the scorer should not choose the most like or easiest to exploit but go with the worst case scenario for given exploit.</p> <h3 id="Proposal-11">Proposal 11</h3> <p><strong>Proposal 11: Clarification to the Approved Proposal #1 on Impact Bias Release Date: 9/21/06<br /> Status: Approved by CVSS SIG<br /> Applicability: Environmental Section</strong></p> <p>Cast the impact bias within the environmental section (as required by the approved proposal #1) using the following group of three metrics:<br /> System Confidentiality Requirement: Low, Medium, or High System Integrity Requirement: Low, Medium, or High System Availability Requirement: Low, Medium, or High</p> <p>The idea is that a vulnerability can be rated with CIA impact levels (in the base section) and an affected system can be labeled with CIA requirements (in the environmental section) in such a way that they can be directly compared. Then the environmental score can accurately reflect the true impact of particular vulnerability types on particular systems. The resultant CVSS vector could then clearly show the relationships.</p> <p><strong>Example</strong></p> <p>A base CIA of Complete, None, None applied to an environment with CIA requirements of High, Low, Low would bias the environmental score to be higher because the vulnerability affects confidentiality and the system has high confidentiality requirements.</p> <p>A base CIA of None, Complete, None applied to an environment with CIA requirements of High, Low, Low would bias the environmental score to be lower because the vulnerability affects Integrity but the system is primarily concerned with confidentiality.</p> <h3 id="Proposal-12">Proposal 12</h3> <p><strong>Proposal 12<br /> Release Date: 11/1/06<br /> Status: Approved by CVSS SIG</strong></p> <p>The impact and difficulty sub-equations should be combined together using a simple weighting of .6 for impact and .4 for difficulty. This is roughly how the weightings were assigned in CVSS v1 (.572 and .428).</p> <p>Here is how we came up with the relative weightings for the impact and difficulty metrics in CVSS v1:</p> <ul> <li>Possible range for CIA is<br /> (10.0 <em> (1.0 + 1.0 + 1.0)/3) = 10.0<br /> (10.0 </em> (0.0 + 0.0 + 0.0)/3) = 0.0<br /> Size of range = 10.0</li> <li>Possible range for AAA is<br /> (10.0 <em> 1.0 </em> 1.0 <em> 1.0) = 10.0<br /> (10.0 </em> 0.7 <em> 0.6 </em> 0.6) = 2.52<br /> Size of range = 7.48</li> </ul> <p>7.48/(7.48 + 10.0) = 42.79%<br /> 10.0/(7.48 + 10.0) = 57.21%</p> <h2 id="Appendix-B-CVSS-v2-Vector-Definitions">Appendix B: CVSS v2 Vector Definitions</h2> <p><strong>CVSS v2 Vector Definitions</strong></p> <p>Every application or service that uses the Common Vulnerability Scoring System (CVSS) should provide not only the CVSS score, but also a vector describing the components from which the score was calculated. This provides users of the score confidence in its correctness and provides insight into the nature of the vulnerability.</p> <p>CVSS vectors always include base metrics and may contain temporal metrics. See the CVSS standards guide for detailed descriptions of CVSS metrics and their possible values.</p> <p><strong>CVSS Base Vectors</strong></p> <p>CVSS vectors containing only base metrics take the following form:<br /> (AV:[L,A,N]/AC:[H,M,L]/Au:[N,S,M]/C:[N,P,C]/I:[N,P,C]/A:[N,P,C])</p> <p>The letters within brackets represent possible values of a CVSS metric. Exactly one option must be chosen for each set of brackets. Letters not within brackets are mandatory and must be included in order to create a valid CVSS vector. Each letter or pair of letters is an abbreviation for a metric or metric value within CVSS. These abbreviations are defined below.</p> <p>Example 1: (AV:L/AC:H/Au:N/C:N/I:P/A:C)<br /> Example 2: (AV:A/AC:L/Au:M/C:C/I:N/A:P)</p> <p>Metric: AV = AccessVector (Related exploit range)<br /> Possible Values: L = Local access, A = Adjacent network, N = Network</p> <p>Metric: AC = AccessComplexity (Required attack complexity)<br /> Possible Values: H = High, M = Medium, L = Low</p> <p>Metric: Au = Authentication (Level of authentication needed to exploit)<br /> Possible Values: N= None required, S= Requires single instance, M= Requires multiple instances</p> <p>Metric: C = ConfImpact (Confidentiality impact)<br /> Possible Values: N = None, P = Partial, C = Complete</p> <p>Metric: I = IntegImpact (Integrity impact)<br /> Possible Values: N = None, P = Partial, C = Complete</p> <p>Metric: A = AvailImpact (Availability impact)<br /> Possible Values: N = None, P = Partial, C = Complete</p> <p><strong>CVSS Temporal Vectors</strong></p> <p>CVSS vectors containing temporal metrics are formed by appending the temporal metrics to the base vector. The temporal metrics appended to the base vector take the following form:<br /> /E:[U,P,F,H]/RL:[O,T,W,U]/RC:[N,U,C]</p> <p>Example 1: (AV:L/AC:H/Au:N/C:N/I:P/A:C/E:P/RL:O/RC:C)<br /> Example 2: (AV:LN/AC:L/Au:M/C:C/I:N/A:P/E:F/RL:T/RC:U)</p> <p>Metric: E = Exploitability (Availability of exploit)<br /> Possible Values: U = Unproven, P = Proof-of-concept, F = Functional, W = Widespread</p> <p>Metric: RL = RemediationLevel (Type of fix available)<br /> Possible Values: O = Official-fix, T = Temporary-fix, W = Workaround, U = Unavailable</p> <p>Metric: RC = ReportConfidence (Level of verification that the vulnerability exists)<br /> Possible Values: N = Not confirmed, U = Uncorroborated, C = Confirmed</p> <p><strong>CVSS Environmental Vectors</strong></p> <p>CVSS vectors containing environmental metrics are formed by appending the environmental metrics to the temporal vector. The environmental metrics appended to the temporal vector take the following form:<br /> /CD[N,L,LM,MH,H]:/TD:[N,L,M,H]/CR:[L,M,H]/IR:[L,M,H]/AR:[L,M,H]</p> <p>Example 1: (AV:L/AC:H/Au:N/C:N/I:P/A:C/E:P/RL:O/RC:C/CD:L/TD:M/CR:L/IR:L/AR:H)<br /> Example 2: (AV:LN/AC:L/Au:M/C:C/I:N/A:P/E:F/RL:T/RC:U/CD:MH/TD:H/CR:M/IR:L/AR:M)</p> <p>Metric: CD = Collateral Damage Potential (Organization specific potential for loss)<br /> Possible Values: N = None, L = Low, LM = Low-Medium, MH = Medium-High, H = High</p> <p>Metric: TD = Target Distribution (Percentage of vulnerable systems)<br /> Possible Values: N = None (0%), L = Low (1-25%), M = Medium (26-75%), H = High (76-100%)</p> <p>Metric: CR = System Confidentiality Requirement (draft proposal)<br /> Possible Values: L = Low, M = Medium, H = High</p> <p>Metric: IR = System Integrity Requirement (draft proposal)<br /> Possible Values: L = Low, M = Medium, H = High</p> <p>Metric: AR = System Availability Requirement (draft proposal)<br /> Possible Values: L = Low, M = Medium, H = High</p> <p><strong>CVSS Vectors and CVSS Compatible Products</strong></p> <p>CVSS compatible products may provide their users access to the NVD CVSS v2 calculator by creating a hyperlink that includes the CVSS vector and, optionally, the vulnerability name. This works for both base and temporal vectors. The hyperlinks should take one of the following forms.</p> <p>Example base vector hyperlinks to CVSS calculator (with and without vulnerability name):</p> <ul> <li><a href="http://nvd.nist.gov/cvss.cfm?version=2&vector=(AV:L/AC:H/Au:N/C:N/I:P/A:C">http://nvd.nist.gov/cvss.cfm?version=2&vector=(AV:L/AC:H/Au:N/C:N/I:P/A:C</a>)</li> <li><a href="http://nvd.nist.gov/cvss.cfm?version=2&name=example&vector=(AV:A/AC:L/Au:M/C:C/I:N/A:P">http://nvd.nist.gov/cvss.cfm?version=2&name=example&vector=(AV:A/AC:L/Au:M/C:C/I:N/A:P</a>)</li> </ul> <p>Example temporal vector hyperlinks to CVSS calculator (with and without vulnerability name):</p> <ul> <li><a href="http://nvd.nist.gov/cvss.cfm?version=2&vector=(AV:L/AC:H/Au:N/C:N/I:P/A:C/E:P/RL:O/RC:C">http://nvd.nist.gov/cvss.cfm?version=2&vector=(AV:L/AC:H/Au:N/C:N/I:P/A:C/E:P/RL:O/RC:C</a>)</li> <li><a href="http://nvd.nist.gov/cvss.cfm?version=2&name=example&vector=(AV:A/AC:L/Au:M/C:C/I:N/A:P/E:F/RL:T/RC:U">http://nvd.nist.gov/cvss.cfm?version=2&name=example&vector=(AV:A/AC:L/Au:M/C:C/I:N/A:P/E:F/RL:T/RC:U</a>)</li> </ul> <h2 id="Appendix-C-Impact-and-Difficulty-Sub-equation-Ordering-Scoring-Rules">Appendix C: Impact and Difficulty Sub-equation Ordering Scoring Rules</h2> <p>In CVSS v1, the equation for the base score was composed of several metrics. In CVSS v2, these metrics were divided into two groups impact and difficulty and the base equation was split into two sub-equations, one for each metric group. For each sub-equation, the CVSS-SIG analyzed the relative severity of each possible combination of metrics and developed a set of verbal rules that described the results of the analysis, such as vectors with a certain combination of metrics being scored higher than vectors with another combination of metrics. This appendix lists the verbal rules for each sub-equation.</p> <h3 id="Impact-Sub-Equation-Ordering-Scoring-Rules">Impact Sub-Equation Ordering/Scoring Rules</h3> <p>Impact Sub-Equation Vector: (C:[N,P,C]/I:[ N,P,C]/A:[N,P,C])<br /> CVSS v2 vector information: <a href="http://nvd.nist.gov/cvss.cfm?vectorinfov2">nvd.nist.gov/cvss.cfm?vectorinfov2</a>.</p> <p>Rule 1: Unless this rule is superseded by another rule, the CIA ordering should follow the ordering implicit within CVSS v1.</p> <p><strong>Rule 1 Rationale:</strong> CVSS v1 has worked well in general and so the implicit orderings should be followed except within specific areas we target for improvement.</p> <p><strong>Rule 2:</strong> CIA vectors with one Complete component must be rated higher than those without any Complete components (except for the vector that has 3 Partial components).</p> <p><strong>Rule 2 Rationale:</strong> The purpose of this rule is to raise the importance of Complete components as compared to Partial components. This rule is necessary based on Steve Christeys analysis of CVE vulnerabilities where he discovered that vulnerabilities with a single Complete component were of significant severity qualitatively but the CVSS v1 score was very low (e.g., 2.3). The reason to exclude the vector that has 3 Partial components from this rule is that (C:P/I:P/A:P) represents a significant incursion (obtaining user level OS access or admin application access) and we dont want to force this vector to a lower score than it has in CVSS v1.</p> <p><strong>Rule 3:</strong> Confidentiality and Integrity violations have somewhat more impact than availability violations.</p> <p><strong>Rule 3 Rationale:</strong> This was highlighted as a need in the NIST CVSS paper (see excerpt below). The CVSS SIG discussed this and the consensus appeared to be that C and I should be given more weight than A. Note that the NIST CVSS paper also argued that I should be given more weight than C but we never achieved consensus on that within the SIG.</p> <p>Integrity should be given more weight than availability because violations of integrity allow violations of availability. Alternately, it could be required that availability always be set at least as high as integrity. If an attacker can make arbitrary changes to a system, then changes could be made to negatively impact availability. For example, if one can delete the data (an integrity violation) then the data can be made unavailable (an availability violation). Additionally, exploitation of integrity has greater impact because it is often difficult to notice the violation, difficult to determine what was changed, and difficult to recover the data to a clean state. This is not true with exploitation of availability.</p> <p>Confidentiality should be given more weight than availability because many violations of confidentiality are non-recoverable (once the data is stolen it cannot be taken back), while violations of availability are usually easily recoverable. Also, the exploitation of availability is typically noticed very quickly, but violations of confidentiality are hard to detect.</p> <p><strong>Rule 4:</strong> Vectors with 2 Complete components must be rated higher than those with no Complete components.</p> <p><strong>Rule 4 Rationale:</strong> A vector with 2 Completecomponents almost has complete control over a computer and thus should be rated higher than even a vector with 3 Partials.</p> <p><strong>Rule 5:</strong> (C:C/I:C/A:C) and (C:P/I:P/A:P) vulnerabilities should be rated closer together than in CVSS v1.</p> <p><strong>Rule 5 Rationale:</strong> (C:C/I:C/A:C) and (C:P/I:P/A:P) vectors represent one gaining an admin OS account and a user level OS account respectively. It is often difficult or even impossible for an analyst to distinguish which level of access is provided by a vulnerability because it often depends on how the vulnerable application was installed (e.g., one can optionally install software as root/admin or as a user). Thus, both vectors should score high and be fairly close to each other (e.g., separated by no more than 2).</p> <p>NIST CVSS paper in discussion of sources of error: One source of error is the decision where an analyst must decide whether a vulnerability gives root level access to an operating system or user level access. This is not always clear from the advisory and it may depend on how a system administrator installs the software. This ambiguity may have increased the significance of the spike at score 7, as the analysts appear to have avoided claiming that a vulnerability gives root access unless it is clear that this is the case.</p> <p>Difficulty Sub-Equation Ordering/Scoring Rules<br /> Difficulty Sub-Equation Vector: (AV:[N,LN,L]/AC:[L,M,H]/Au:[N,S,M])<br /> CVSS v2 vector information: <a href="http://nvd.nist.gov/cvss.cfm?vectorinfov2">http://nvd.nist.gov/cvss.cfm?vectorinfov2</a></p> <p><strong>Rule 1:</strong> Unless this rule is superseded by another rule, the AAA ordering should follow the ordering implicit within CVSS v1.</p> <p><strong>Rule 1 rationale:</strong> CVSS v1 has worked well in general and so the implicit orderings should be followed except within specific areas we target for improvement.</p> <p><strong>Rule 2:</strong> If two vectors have the same AV and Au metrics, the relative difference in difficulty is greater when comparing AC:M to AC:H than it is when comparing AC:L to AC:M.</p> <p><strong>Rule 2 rationale:</strong> AC:L allows attacks to be performed essentially at will (ignoring all other metrics). AC:M also allows attacks to be performed fairly easily, but against fewer targets or with greater risk of detection, so AC:M is a minor increase in difficulty from a vulnerability with AC:L. AC:H vulnerabilities are generally very difficult to exploit, making them generally unattractive targets, so AC:H is a major increase in difficulty from a vulnerability with AC:M. In CVSS v1, going from AC:L to AC:M caused a 20% drop in score, and going from AC:M to AC:H caused a 25% drop in score. We assert that the difference should be greater than 20% versus 25%.</p> <p><strong>Rule 3:</strong> If two vectors have the same AV and AC metrics, the relative difference in difficulty is roughly equal when comparing Au:N to Au:S and when comparing Au:S to Au:M.</p> <p><strong>Rule 3 rationale:</strong> Au:N allows attacks to be performed essentially at will (ignoring all other metrics). Au:S requires attackers to guess, sniff, or otherwise determine a password or other authentication mechanism (most often, a password). Au:M requires attackers to guess two or more authentication mechanisms (most often, passwords), which in some case will be identical (e.g., same password for OS and application level access). So in some cases, Au:M will be much more difficult than Au:S, while in other cases Au:M will not be substantially more difficult (simply authenticating a second time using the same credentials). In CVSS v1, going from Au:N to Au:S caused a 20% drop in score, and going from Au:S to Au:M caused a 25% drop in score. We assert that the drops should be roughly equal.</p> <p><strong>Rule 4:</strong> The presence of the metric AC:H in a vulnerability should cause a greater reduction in the score than the presence of the metric Au:M.</p> <p><strong>Rule 4 rationale:</strong> A vulnerability with AC:H is always extremely difficult to exploit. A vulnerability with Au:M is sometimes extremely difficult to exploit (e.g., determining multiple types of authentication credentials), and sometimes relatively easy to exploit (e.g., guessing or sniffing one password and using it for two sets of authentications). Therefore, the presence of Au:M should not reduce a score as much as the presence of AC:H. In CVSS v1, AC:H and Au:M each caused a 40% drop in score.</p> <p><strong>Rule 5:</strong> The presence of the metric Au:S in a vulnerability should cause a somewhat greater reduction in the score than the presence of the metric AC:M.</p> <p><strong>Rule 5 rationale:</strong> A vulnerability with Au:S requires attackers to guess, sniff, or otherwise determine a password or other authentication mechanism (most often, a password). A vulnerability with AC:M generally allows attacks to be performed fairly easily at will. We assert that on average it is somewhat more likely for an attacker to succeed against AC:M compared to Au:S. In CVSS v1, AC:M and Au:S each caused a 20% drop in score.</p> <p>Rules 2 through 5 collectively rank the AC and Au metrics as follows:</p> <p>AC:L, Au:N (highest score)<br /> AC:M<br /> Au:S<br /> Au:M<br /> AC:H (lowest score)</p> <p>There are gaps of varying sizes between the metrics. For example, the change from Au:N to Au:S (the first to the third line) should have roughly the same reduction in score as the change from Au:S to Au:M (the third to the fourth line).</p> <p><strong>Rule 6:</strong> The AV metrics are of relatively little importance compared to the AC or Au metrics. AV:L and AV:LN are of less importance than AC:M or Au:S.</p> <p><strong>Rule 6 rationale:</strong> Many current attacks (particularly malware-based ones) exploit vulnerabilities that are AV:L or AV:LN. Unless a host is directly accessible via the Internet (which is not true for most hosts), AV:N is really limited to the same pool of attackers as AV:LN or AV:L. In most cases, AV:N, AV:LN and AV:L are not very much different in terms of attack difficulty. Therefore, the AV metrics should have little impact on scoring as compared to the AC or AU metrics. In CVSS v1, the AV metrics have less impact on scoring (a maximum of 30% reduction in score for AV, compared to 40% for AC or Au). We assert that the AV metrics should have much less impact on scoring (less impact than AC:M or Au:S).</p> <h2 id="Appendix-D-CVSS-2-0-Base-Score-Equation">Appendix D: CVSS 2.0 Base Score Equation</h2> <p>During the development of CVSS v2, several versions of the equations and metric values were developed, reviewed, and analyzed by the CVSS-SIG. Appendices D through M document the work-in-progress drafts of the equations and metric values in chronological order. This appendix contains the first draft of the CVSS v2 base score equation.</p> <h3 id="CVSS-v2-Base-Score-Equation">CVSS v2 Base Score Equation</h3> <p>Base Score Equation =<br /> (.6<em>(10.41</em>(1-(1-ConfImpact)<em>(1-IntegImpact)</em>(1-AvailImpact))) +<br /> .4<em>(20</em>AccessComplexity<em>Authentication-AccessVector</em>10+.06))<em>f(x)</em> </p> <p>f(x)= 0 if ConfImpact=IntegImpact=AvailImpact=0<br /> 1 otherwise</p> <p>ConfImpact = case Confidentiality Impact of</p> <ul> <li>none: 0</li> <li>partial: 0.275</li> <li>complete: 0.660</li> </ul> <p>IntegImpact = case IntegrityImpact of</p> <ul> <li>none: 0</li> <li>partial: 0.275</li> <li>complete: 0.660</li> </ul> <p>AvailImpact = case AvailabilityImpact of</p> <ul> <li>none: 0</li> <li>partial: 0.275</li> <li>complete: 0.660</li> </ul> <p>AccessVector = case AccessVector of</p> <ul> <li>Requires local access: 0.04</li> <li>Local Network accessible: 0.02</li> <li>Network accessible:</li> </ul> <p>AccessComplexity = case AccessComplexity of</p> <ul> <li>high: 0.35</li> <li>medium: 0.61</li> <li>low: 0.71</li> </ul> <p>Authentication = case Authentication of</p> <ul> <li>Requires no authentication: 0.7</li> <li>Requires single instance of authentication: 0.56</li> <li>Requires multiple instances of authentication: 0.45</li> </ul> <h3 id="Correspondence">Correspondence</h3> <p>The following is correspondence from James H. Yen, Statistical Engineering Division, NIST:</p> <p>Following up my previous email, I have tweaked my equation to try to achieve better separation between adjacent scores and to have CCC have a perfect (storm) 10 score.</p> <p>To that end, the model depends on 3 parameters called x.3, x.7, and x10 (so named because in the original equation I had x.3= .3, x.7 = .7, and x10 =10), although x10 will be a function of x.7, so there are really only two parameters.</p> <p>The modified fit goes as follows, using similar notation as before:</p> <p>CC(N)=II(N)=AA(N) = 0<br /> CC(P)=II(P)=AA(P) = x.3<br /> CC(C)=II(C)=AA(C) = x.7</p> <p>Let the fitting function be:</p> <p>V2 = x10 <em> [ 1 - ( 1-CC)</em>(1-II)*(1-AA) ].</p> <p>There is probably a way to optimize the problem numerically, but doing trial and error gives one plausible set of parameters:</p> <p>x.3 = .275<br /> x.7 = .66<br /> x10 =1.041</p> <p>Note that x10 is there to normalize the CCC score to be 10.0</p> <p>These lead to the fit below, which satisfies all criterion except that the scores of 9.21 and 9.54 are still too close together. I can adjust x.3 and x.7 to get a better separation of those but that leads to the scores for PPP and CNN/NCN/NNC being too close, and since those scores are not �rare,� considered that fit to be worse than the one listed here.</p> <table> <thead> <tr> <th>C</th> <th>I</th> <th>A</th> <th>cvs2</th> <th>Fit</th> </tr> </thead> <tbody> <tr> <td>C</td> <td>C</td> <td>C</td> <td>10</td> <td>10</td> </tr> <tr> <td>C</td> <td>C</td> <td>P</td> <td>9.5</td> <td>9.45</td> </tr> <tr> <td>C</td> <td>P</td> <td>C</td> <td>9.5</td> <td>9.45</td> </tr> <tr> <td>P</td> <td>C</td> <td>C</td> <td>9.5</td> <td>9.45</td> </tr> <tr> <td>C</td> <td>C</td> <td>N</td> <td>9</td> <td>9.21</td> </tr> <tr> <td>C</td> <td>N</td> <td>C</td> <td>9</td> <td>9.21</td> </tr> <tr> <td>N</td> <td>C</td> <td>C</td> <td>9</td> <td>9.21</td> </tr> <tr> <td>C</td> <td>P</td> <td>P</td> <td>9</td> <td>9.21</td> </tr> <tr> <td>C</td> <td>P</td> <td>P</td> <td>8.5</td> <td>8.55</td> </tr> <tr> <td>P</td> <td>C</td> <td>P</td> <td>8.5</td> <td>8.55</td> </tr> <tr> <td>P</td> <td>P</td> <td>C</td> <td>8.5</td> <td>8.55</td> </tr> <tr> <td>P</td> <td>P</td> <td>P</td> <td>6.3-6.9</td> <td>6.44</td> </tr> <tr> <td>C</td> <td>P</td> <td>N</td> <td>8</td> <td>7.84</td> </tr> <tr> <td>C</td> <td>N</td> <td>P</td> <td>8</td> <td>7.84</td> </tr> <tr> <td>P</td> <td>C</td> <td>N</td> <td>8</td> <td>7.84</td> </tr> <tr> <td>N</td> <td>C</td> <td>P</td> <td>8</td> <td>7.84</td> </tr> <tr> <td>P</td> <td>N</td> <td>C</td> <td>8</td> <td>7.84</td> </tr> <tr> <td>N</td> <td>P</td> <td>C</td> <td>8</td> <td>7.84</td> </tr> <tr> <td>N</td> <td>C</td> <td>P</td> <td>7</td> <td>6.87</td> </tr> <tr> <td>N</td> <td>C</td> <td>N</td> <td>7</td> <td>6.87</td> </tr> <tr> <td>N</td> <td>N</td> <td>C</td> <td>7</td> <td>6.87</td> </tr> <tr> <td>P</td> <td>P</td> <td>N</td> <td>5</td> <td>4.94</td> </tr> <tr> <td>P</td> <td>N</td> <td>P</td> <td>5</td> <td>4.94</td> </tr> <tr> <td>P</td> <td>P</td> <td>N</td> <td>3</td> <td>2.86</td> </tr> <tr> <td>N</td> <td>P</td> <td>N</td> <td>3</td> <td>2.86</td> </tr> </tbody> </table> <p><br /></p> <h2 id="Appendix-E-CVSS-v2-1-Base-Score-Equation">Appendix E: CVSS v2.1 Base Score Equation</h2> <p>During the development of CVSS v2, several versions of the equations and metric values were developed, reviewed, and analyzed by the CVSS-SIG. Appendices D through M document the work-in-progress drafts of the equations and metric values in chronological order. This appendix contains the second draft of the CVSS v2 base score equation. The only change from the first draft is in the values assigned to the AccessVector metric.</p> <h3 id="CVSS-v2-1-Base-Score-Equation">CVSS v2.1 Base Score Equation</h3> <p>Base Score Equation =<br /> (.6<em>(10.41</em>(1-(1-ConfImpact)<em>(1-IntegImpact)</em>(1-AvailImpact))) +<br /> .4<em>(20</em>AccessComplexity<em>Authentication-AccessVector</em>10+.06))<em>f(x)</em></p> <p>f(x)= 0 if ConfImpact=IntegImpact=AvailImpact=0<br /> 1 otherwise</p> <p>ConfImpact = case ConfidentialityImpact of</p> <ul> <li>none: 0</li> <li>partial: 0.275</li> <li>complete: 0.660</li> </ul> <p>IntegImpact = case IntegrityImpact of</p> <ul> <li>none: 0</li> <li>partial: 0.275</li> <li>complete: 0.660</li> </ul> <p>AvailImpact = case AvailabilityImpact of</p> <ul> <li>none: 0</li> <li>partial: 0.275</li> <li>complete: 0.660</li> </ul> <p>AccessVector = case AccessVector of</p> <ul> <li>Requires local access: 0.3</li> <li>Local Network accessible: 0.15</li> <li>Network accessible: 0</li> </ul> <p>AccessComplexity = case AccessComplexity of</p> <ul> <li>high: 0.35</li> <li>medium: 0.61</li> <li>low: 0.71</li> </ul> <p>Authentication = case Authentication of</p> <ul> <li>Requires no authentication: 0.7</li> <li>Requires single instance of authentication: 0.56</li> <li>Requires multiple instances of authentication: 0.45</li> </ul> <h2 id="Appendix-F-CVSS-v2-2-Base-Score-Equation">Appendix F: CVSS v2.2 Base Score Equation</h2> <p>During the development of CVSS v2, several versions of the equations and metric values were developed, reviewed, and analyzed by the CVSS-SIG. Appendices D through M document the work-in-progress drafts of the equations and metric values in chronological order. This appendix contains the third draft of the CVSS v2 base score equation. The changes from the previous draft are a minor adjustment to the equation itself and changes to the values assigned to the AccessVector, AccessComplexity, and Authentication metrics.</p> <h3 id="CVSS-v2-2-Base-Score-Equation">CVSS v2.2 Base Score Equation</h3> <p>Base Score Equation = (.6<em>(10.41</em>(1-(1-ConfImpact)<em>(1-IntegImpact)</em>(1-AvailImpact))) +<br /> .4<em>(20</em>AccessComplexity<em>Authentication-AccessVector</em>10))<em>f(x)</em></p> <p>f(x)= 0 if ConfImpact=IntegImpact=AvailImpact=0<br /> 1 otherwise</p> <p>ConfImpact = case ConfidentialityImpact of</p> <ul> <li>none: 0</li> <li>partial: 0.275</li> <li>complete: 0.660</li> </ul> <p>IntegImpact = case IntegrityImpact of</p> <ul> <li>none: 0</li> <li>partial: 0.275</li> <li>complete: 0.660</li> </ul> <p>AvailImpact = case AvailabilityImpact of</p> <ul> <li>none: 0</li> <li>partial: 0.275</li> <li>complete: 0.660</li> </ul> <p>AccessVector = case AccessVector of</p> <ul> <li>Requires local access: 0.375</li> <li>Local Network accessible: 0.188</li> <li>Network accessible: 0</li> </ul> <p>AccessComplexity = case AccessComplexity of</p> <ul> <li>high: 0.382</li> <li>medium: 0.61</li> <li>low: 0.71</li> </ul> <p>Authentication = case Authentication of</p> <ul> <li>Requires no authentication: 0.704</li> <li>Requires single instance of authentication: 0.570</li> <li>Requires multiple instances of authentication: 0.491</li> </ul> <h2 id="Appendix-G-CVSS-v2-3-Base-Score-Equation">Appendix G: CVSS v2.3 Base Score Equation</h2> <p>During the development of CVSS v2, several versions of the equations and metric values were developed, reviewed, and analyzed by the CVSS-SIG. Appendices D through M document the work-in-progress drafts of the equations and metric values in chronological order. This appendix contains the fourth draft of the CVSS v2 base score equation. The only change from the previous draft is a minor adjustment to the base score equation.</p> <h3 id="CVSS-v2-3-Base-Score-Equation">CVSS v2.3 Base Score Equation</h3> <p>Base Score Equation =<br /> (.6<em>(10.41</em>(1-(1-ConfImpact)<em>(1-IntegImpact)</em>(1-AvailImpact))) +<br /> .4<em>(20</em>AccessComplexity<em>Authentication-10</em>AccessVector))<em>f(x)</em></p> <p>f(x)= 0 if ConfImpact=IntegImpact=AvailImpact=0<br /> 1 otherwise</p> <p>ConfImpact = case ConfidentialityImpact of</p> <ul> <li>none: 0</li> <li>partial: 0.275</li> <li>complete: 0.660</li> </ul> <p>IntegImpact = case IntegrityImpact of</p> <ul> <li>none: 0</li> <li>partial: 0.275</li> <li>complete: 0.660</li> </ul> <p>AvailImpact = case AvailabilityImpact of</p> <ul> <li>none: 0</li> <li>partial: 0.275</li> <li>complete: 0.660</li> </ul> <p>AccessVector = case AccessVector of</p> <ul> <li>Requires local access: 0.375</li> <li>Local Network accessible: 0.188</li> <li>Network accessible: 0</li> </ul> <p>AccessComplexity = case AccessComplexity of</p> <ul> <li>high: 0.382</li> <li>medium: 0.61</li> <li>low: 0.71</li> </ul> <p>Authentication = case Authentication of</p> <ul> <li>Requires no authentication: 0.704</li> <li>Requires single instance of authentication: 0.570</li> <li>Requires multiple instances of authentication: 0.491</li> </ul> <p></div><div class="default" id="c12" markdown="1"></p> <h2 id="Appendix-H-CVSS-v2-5-Base-Score-Equation">Appendix H: CVSS v2.5 Base Score Equation</h2> <p>During the development of CVSS v2, several versions of the equations and metric values were developed, reviewed, and analyzed by the CVSS-SIG. Appendices D through M document the work-in-progress drafts of the equations and metric values in chronological order. This appendix contains what is believed to be the fifth draft of the CVSS v2 base score equation. No record of CVSS v2.4 has been found, so it appears that a numbering error may have been made when CVSS v2.5 was released. The changes from the previous draft are modifications to the base score equation calculations and changes to the values of the AccessComplexity, Authentication, and AccessVector metric.</p> <h3 id="CVSS-v2-5-Base-Score-Equation">CVSS v2.5 Base Score Equation</h3> <p>Base Score Equation =<br /> (.5<em>(10.41</em>(1-(1-ConfImpact)<em>(1-IntegImpact)</em>(1-AvailImpact))) +<br /> .5<em>(20</em>AccessComplexity<em>Authentication</em>AccessVector))<em>f(x)</em></p> <p>f(x)= 0 if ConfImpact=IntegImpact=AvailImpact=0<br /> 1 otherwise</p> <p>AccessComplexity = case AccessComplexity of</p> <ul> <li>high: 0.35</li> <li>medium: 0.61</li> <li>low: 0.71</li> </ul> <p>Authentication = case Authentication of</p> <ul> <li>Requires no authentication: 0.704</li> <li>Requires single instance of authentication: 0.56</li> <li>Requires multiple instances of authentication: 0.45</li> </ul> <p>AccessVector = case AccessVector of</p> <ul> <li>Requires local access: 0.513</li> <li>Local Network accessible: 0.757</li> <li>Network accessible: 1</li> </ul> <p>ConfImpact = case ConfidentialityImpact of</p> <ul> <li>none: 0</li> <li>partial: 0.275</li> <li>complete: 0.660</li> </ul> <p>IntegImpact = case IntegrityImpact of</p> <ul> <li>none: 0</li> <li>partial: 0.275</li> <li>complete: 0.660</li> </ul> <p>AvailImpact = case AvailabilityImpact of</p> <ul> <li>none: 0</li> <li>partial: 0.275</li> <li>complete: 0.660</li> </ul> <p></div><div class="default" id="c13" markdown="1"></p> <h2 id="Appendix-I-CVSS-v2-6-Base-Score-Equation">Appendix I: CVSS v2.6 Base Score Equation</h2> <p>During the development of CVSS v2, several versions of the equations and metric values were developed, reviewed, and analyzed by the CVSS-SIG. Appendices D through M document the work-in-progress drafts of the equations and metric values in chronological order. This appendix contains the sixth draft of the CVSS v2 base score equation. The changes from the previous draft are modifications to the base score equation calculations and changes to the values of the AccessVector metric.</p> <h3 id="CVSS-v2-6-Base-Score-Equation">CVSS v2.6 Base Score Equation</h3> <p>Base Score Equation =<br /> (.6<em>(10.41</em>(1-(1-ConfImpact)<em>(1-IntegImpact)</em>(1-AvailImpact))) +<br /> .4<em>(20</em>AccessComplexity<em>Authentication</em>AccessVector))<em>f(x)</em></p> <p>f(x)= 0 if ConfImpact=IntegImpact=AvailImpact=0<br /> 1 otherwise</p> <p>AccessComplexity = case AccessComplexity of</p> <ul> <li>high: 0.35</li> <li>medium: 0.61</li> <li>low: 0.71</li> </ul> <p>Authentication = case Authentication of</p> <ul> <li>Requires no authentication: 0.704</li> <li>Requires single instance of authentication: 0.56</li> <li>Requires multiple instances of authentication: 0.45</li> </ul> <p>AccessVector = case AccessVector of</p> <ul> <li>Requires local access: .470</li> <li>Local Network accessible: .735</li> <li>Network accessible: 1</li> </ul> <p>ConfImpact = case ConfidentialityImpact of</p> <ul> <li>none: 0</li> <li>partial: 0.275</li> <li>complete: 0.660</li> </ul> <p>IntegImpact = case IntegrityImpact of</p> <ul> <li>none: 0</li> <li>partial: 0.275</li> <li>complete: 0.660</li> </ul> <p>AvailImpact = case AvailabilityImpact of</p> <ul> <li>none: 0</li> <li>partial: 0.275</li> <li>complete: 0.660</li> </ul> <p></div><div class="default" id="c14" markdown="1"></p> <h2 id="Appendix-J-CVSS-v2-7-Base-Score-Equation">Appendix J: CVSS v2.7 Base Score Equation</h2> <p>During the development of CVSS v2, several versions of the equations and metric values were developed, reviewed, and analyzed by the CVSS-SIG. Appendices D through M document the work-in-progress drafts of the equations and metric values in chronological order. This appendix contains the seventh draft of the CVSS v2 base score equation. The changes from the previous draft are modifications to the base score equation calculations and changes to the values of the AccessVector metric. This appendix also contains an interim draft based on the v2.7 base score equation. It is identical to the draft presented in the first half of this appendix, except for changing one of the values assigned to the AccessVector metric.</p> <h3 id="CVSS-v2-7-Base-Score-Equation">CVSS v2.7 Base Score Equation</h3> <p>Base Score Equation =<br /> ((.6<em>(10.41</em>(1-(1-ConfImpact)<em>(1-IntegImpact)</em>(1-AvailImpact))) +<br /> .4<em>(20</em>AccessComplexity<em>Authentication</em>AccessVector))-1.5)<em>f(x)</em></p> <p>f(x)= 0 if ConfImpact=IntegImpact=AvailImpact=0<br /> 1.176 otherwise</p> <p>AccessComplexity = case AccessComplexity of</p> <ul> <li>high: 0.35</li> <li>medium: 0.61</li> <li>low: 0.71</li> </ul> <p>Authentication = case Authentication of</p> <ul> <li>Requires no authentication: 0.704</li> <li>Requires single instance of authentication: 0.56</li> <li>Requires multiple instances of authentication: 0.45</li> </ul> <p>AccessVector = case AccessVector of</p> <ul> <li>Requires local access: .470</li> <li>Local Network accessible: .646</li> <li>Network accessible: 1</li> </ul> <p>ConfImpact = case ConfidentialityImpact of</p> <ul> <li>none: 0</li> <li>partial: 0.275</li> <li>complete: 0.660</li> </ul> <p>IntegImpact = case IntegrityImpact of</p> <ul> <li>none: 0</li> <li>partial: 0.275</li> <li>complete: 0.660</li> </ul> <p>AvailImpact = case AvailabilityImpact of</p> <ul> <li>none: 0</li> <li>partial: 0.275</li> <li>complete: 0.660</li> </ul> <h3 id="CVSS-v2-7a-Base-Score-Equation">CVSS v2.7a Base Score Equation</h3> <p>Base Score Equation =<br /> ((.6<em>(10.41</em>(1-(1-ConfImpact)<em>(1-IntegImpact)</em>(1-AvailImpact))) +<br /> .4<em>(20</em>AccessComplexity<em>Authentication</em>AccessVector))-1.5)<em>f(x)</em></p> <p>f(x)= 0 if ConfImpact=IntegImpact=AvailImpact=0<br /> 1.176 otherwise</p> <p>AccessComplexity = case AccessComplexity of</p> <ul> <li>high: 0.35</li> <li>medium: 0.61</li> <li>low: 0.71</li> </ul> <p>Authentication = case Authentication of</p> <ul> <li>Requires no authentication: 0.704</li> <li>Requires single instance of authentication: 0.56</li> <li>Requires multiple instances of authentication: 0.45</li> </ul> <p>AccessVector = case AccessVector of</p> <ul> <li>Requires local access: .395 (this was .450 in version 2.7)</li> <li>Local Network accessible: .646</li> <li>Network accessible: 1</li> </ul> <p>ConfImpact = case ConfidentialityImpact of</p> <ul> <li>none: 0</li> <li>partial: 0.275</li> <li>complete: 0.660</li> </ul> <p>IntegImpact = case IntegrityImpact of</p> <ul> <li>none: 0</li> <li>partial: 0.275</li> <li>complete: 0.660</li> </ul> <p>AvailImpact = case AvailabilityImpact of</p> <ul> <li>none: 0</li> <li>partial: 0.275</li> <li>complete: 0.660</li> </ul> <h2 id="Appendix-K-CVSS-v2-8-Environmental-Score-Equation">Appendix K: CVSS v2.8 Environmental Score Equation</h2> <p>During the development of CVSS v2, several versions of the equations and metric values were developed, reviewed, and analyzed by the CVSS-SIG. Appendices D through M document the work-in-progress drafts of the equations and metric values in chronological order. This appendix contains the first draft of the CVSS v2 environmental score equation.</p> <h3 id="CVSS-Environmental-Metric-Formula-v2-0">CVSS Environmental Metric Formula v2.0</h3> <p>Environmental Equation =<br /> ((.6<em>(Max(10.41</em>(1-(1-ConfImpact<em>ConfReq)</em>(1-IntegImpact<em>IntegReq)</em>(1-AvailImpact<em>AvailReq))),10) +<br /> .4</em>(20<em>AccessComplexity</em>Authentication<em>AccessVector))-1.5)</em>f(x)<em><br /> </em>Exploitability <em> RemediationLevel </em> ReportConfidence<br /> *TargetDistribution</p> <p>f(x)= 0 if ConfImpact=IntegImpact=AvailImpact=0<br /> 1.176 otherwise</p> <p>EnvironmentalScore = round_to_1_decimal<br /> ((TemporalScore + ((10 - TemporalScore) <em> CollateralDamagePotential)) </em> TargetDistribution))*</p> <p>CollateralDamagePotential = case CollateralDamagePotential of</p> <ul> <li>none: 0</li> <li>low: 0.1</li> <li>medium: 0.3</li> <li>high: 0.5</li> </ul> <p>TargetDistribution = case TargetDistribution of</p> <ul> <li>none: 0</li> <li>low: 0.25</li> <li>medium: 0.75</li> <li>high: 1.00</li> </ul> <p>ConfReq = case ConfidentialityImpact of</p> <ul> <li>Low: 0</li> <li>Medium: 0.5</li> <li>High: 1.5</li> </ul> <p>IntegReq = case IntegrityImpact of</p> <ul> <li>Low: 0</li> <li>Medium: 0.5</li> <li>High: 1.5</li> </ul> <p>AvailReq = case AvailabilityImpact of</p> <ul> <li>Low: 0</li> <li>Medium: 0.5</li> <li>High: 1.5</li> </ul> <h2 id="Appendix-L-CVSS-v2-8-Score-Equation">Appendix L: CVSS v2.8 Score Equation</h2> <p>During the development of CVSS v2, several versions of the equations and metric values were developed, reviewed, and analyzed by the CVSS-SIG. Appendices D through M document the work-in-progress drafts of the equations and metric values in chronological order. This appendix contains the eighth draft of the CVSS v2 base score equation, the first draft of the CVSS v2 temporal equation, and the second draft of the CVSS v2 environmental score equation. The changes from the previous drafts are the creation of the impact and exploitability sub-equations within the base score equation, and the revision of the environmental score equation (including a reorganization and renaming of its components).</p> <h3 id="CVSS-v2-8-Equations">CVSS v2.8 Equations</h3> <p><strong>CVSS Base Score Equation</strong></p> <p>Base Score = ((.6<em>(10.41</em>(1-(1-ConfImpact)<em>(1-IntegImpact)</em>(1-AvailImpact))) + .4<em>(20</em>AccessComplexity<em>Authentication</em>AccessVector))-1.5)<em>f(x) f(x)= 0 if ConfImpact=IntegImpact=AvailImpact=0 1.176 otherwise Impact Subequation = 10.41</em>(1-(1-ConfImpact)<em>(1-IntegImpact)</em>(1-AvailImpact))<em>f(x)/1.176 Exploitability Subequation = 20</em>AccessComplexity<em>Authentication</em>AccessVector AccessComplexity = case AccessComplexity of high: 0.35 medium: 0.61 low: 0.71 Authentication = case Authentication of Requires no authentication: 0.704 Requires single instance of authentication: 0.56 Requires multiple instances of authentication: 0.45 AccessVector = case AccessVector of Requires local access: .395 (this was .450 in version 2.7) Local Network accessible: .646 Network accessible: 1 ConfImpact = case ConfidentialityImpact of none: 0 partial: 0.275 complete: 0.660 IntegImpact = case IntegrityImpact of none: 0 partial: 0.275 complete: 0.660 AvailImpact = case AvailabilityImpact of none: 0 partial: 0.275 complete: 0.660 <strong>CVSS Temporal Equation</strong></p> <p>TemporalScore = BaseScore <em> Exploitability </em> RemediationLevel * ReportConfidence Exploitability = case Exploitability of unproven: 0.85 proof-of-concept: 0.9 functional: 0.95 high: 1.00 RemediationLevel = case RemediationLevel of official-fix: 0.87 temporary-fix: 0.90 workaround: 0.95 unavailable: 1.00 ReportConfidence = case ReportConfidence of unconfirmed: 0.90 uncorroborated: 0.95 confirmed: 1.00 <strong>CVSS Environmental Equation</strong></p> <p>Environmental Equation = (Impact_Biased_Temporal + ((10 - Impact_Biased_Temporal) <em> CollateralDamagePotential)) </em> TargetDistribution Impact_Biased_Temporal = ((.6<em>(Min(10.41</em>(1-(1-ConfImpact<em>ConfReq)</em>(1-IntegImpact<em>IntegReq)</em>(1-AvailImpact<em>AvailReq))),10) + .4</em>(20<em>AccessComplexity</em>Authentication<em>AccessVector))-1.5)</em>f(x) <em> Exploitability </em> RemediationLevel <em> ReportConfidence f(x)= 0 if ConfImpact=IntegImpact=AvailImpact=0 1.176 otherwise CollateralDamagePotential = case CollateralDamagePotential of none: 0 low: 0.1 medium: 0.3 high: 0.5 TargetDistribution = case TargetDistribution of none: 0 low: 0.25 medium: 0.75 high: 1.00 ConfReq = case ConfidentialityImpact of Low: 0 Medium: 0.5 High: 1.5 IntegReq = case IntegrityImpact of Low: 0 Medium: 0.5 High: 1.5 AvailReq = case AvailabilityImpact of Low: 0 Medium: 0.5 High: 1.5</em></p> <h2 id="Appendix-M-CVSS-v2-9-Score-Equation">Appendix M: CVSS v2.9 Score Equation</h2> <p>During the development of CVSS v2, several versions of the equations and metric values were developed, reviewed, and analyzed by the CVSS-SIG. Appendices D through M document the work-in-progress drafts of the equations and metric values in chronological order. This appendix contains the third draft of the CVSS v2 environmental score equation (the base and temporal score equations are unchanged from the previous draft). The change to the environmental equation is adding another possible value to the CollateralDamagePotential metric.</p> <h3 id="CVSS-v2-9-Equations">CVSS v2.9 Equations</h3> <p><strong>CVSS Base Score Equation</strong></p> <p>Base Score =<br /> ((.6<em>(10.41</em>(1-(1-ConfImpact)<em>(1-IntegImpact)</em>(1-AvailImpact))) +<br /> .4<em>(20</em>AccessComplexity<em>Authentication</em>AccessVector))-1.5)<em>f(x)</em></p> <p>f(x)= 0 if ConfImpact=IntegImpact=AvailImpact=0<br /> 1.176 otherwise</p> <p>Impact Subequation = 10.41<em>(1-(1-ConfImpact)</em>(1-IntegImpact)<em>(1-AvailImpact))</em>f(x)/1.176*</p> <p>Exploitability Subequation = 20<em>AccessComplexity</em>Authentication*AccessVector</p> <p>AccessComplexity = case AccessComplexity of</p> <ul> <li>high: 0.35</li> <li>medium: 0.61</li> <li>low: 0.71</li> </ul> <p>Authentication = case Authentication of</p> <ul> <li>Requires no authentication: 0.704</li> <li>Requires single instance of authentication: 0.56</li> <li>Requires multiple instances of authentication: 0.45</li> </ul> <p>AccessVector = case AccessVector of</p> <ul> <li>Requires local access: .395 (this was .450 in version 2.7)</li> <li>Local Network accessible: .646</li> <li>Network accessible: 1</li> </ul> <p>ConfImpact = case ConfidentialityImpact of</p> <ul> <li>none: 0</li> <li>partial: 0.275</li> <li>complete: 0.660</li> </ul> <p>IntegImpact = case IntegrityImpact of</p> <ul> <li>none: 0</li> <li>partial: 0.275</li> <li>complete: 0.660</li> </ul> <p>AvailImpact = case AvailabilityImpact of</p> <ul> <li>none: 0</li> <li>partial: 0.275</li> <li>complete: 0.660</li> </ul> <p><strong>CVSS Temporal Equation</strong></p> <p>TemporalScore = BaseScore <em> Exploitability </em> RemediationLevel * ReportConfidence</p> <p>Exploitability = case Exploitability of</p> <ul> <li>unproven: 0.85</li> <li>proof-of-concept: 0.9</li> <li>functional: 0.95</li> <li>high: 1.00</li> </ul> <p>RemediationLevel = case RemediationLevel of</p> <ul> <li>official-fix: 0.87</li> <li>temporary-fix: 0.90</li> <li>workaround: 0.95</li> <li>unavailable: 1.00</li> </ul> <p>ReportConfidence = case ReportConfidence of</p> <ul> <li>unconfirmed: 0.90</li> <li>uncorroborated: 0.95</li> <li>confirmed: 1.00</li> </ul> <p><strong>CVSS Environmental Equation</strong></p> <p>Environmental Equation =<br /> (Impact_Biased_Temporal + ((10 - Impact_Biased_Temporal) <em> CollateralDamagePotential)) </em> TargetDistribution</p> <p>Impact_Biased_Temporal =<br /> ((.6<em>(Min((10.41</em>(1-(1-ConfImpact<em>ConfReq)</em>(1-IntegImpact<em>IntegReq)</em>(1-AvailImpact<em>AvailReq) )),10) +<br /> .4</em>(20<em>AccessComplexity</em>Authentication<em>AccessVector))-1.5)</em>f(x)* </p> <ul> <li>Exploitability <em> RemediationLevel </em> ReportConfidence</li> </ul> <p>f(x)= 0 if ConfImpact=IntegImpact=AvailImpact=0<br /> 1.176 otherwise</p> <p>CollateralDamagePotential = case CollateralDamagePotential of</p> <ul> <li>none: 0</li> <li>low: 0.1</li> <li>low-medium: 0.3</li> <li>medium-high: 0.4</li> <li>high: 0.5</li> </ul> <p>TargetDistribution = case TargetDistribution of</p> <ul> <li>none: 0</li> <li>low: 0.25</li> <li>medium: 0.75</li> <li>high: 1.00</li> </ul> <p>ConfReq = case ConfidentialityImpact of</p> <ul> <li>Low: 0</li> <li>Medium: 0.5</li> <li>High: 1.5</li> </ul> <p>IntegReq = case IntegrityImpact of</p> <ul> <li>Low: 0</li> <li>Medium: 0.5</li> <li>High: 1.5</li> </ul> <p>AvailReq = case AvailabilityImpact of</p> <ul> <li>Low: 0</li> <li>Medium: 0.5</li> <li>High: 1.5*</li> </ul> <h2 id="Appendix-N-Acknowledgments">Appendix N: Acknowledgments</h2> <p>The CVSS-SIG acknowledges the CVSS pioneers, who wrote the original NIAC/CVSS document:</p> <ul> <li> <p><strong>Dave Ahmad</strong><br /> Symantec</p> </li> <li> <p><strong>Gerhard Eschelbeck</strong><br /> Qualys</p> </li> <li> <p><strong>Sasha Romanosky</strong><br /> Carnegie Mellon University</p> </li> <li> <p><strong>Mike Schiffman</strong><br /> Cisco Systems</p> </li> <li> <p><strong>Andrew Wright</strong><br /> Cisco Systems</p> </li> </ul> <p>The entire CVSS-SIG group has helped in the creation of the revised standard and the following are credited for continued effort in bringing the standard forward. The authors apologize for any inadvertent omissions.</p> <ul> <li> <p><strong>Peter Allor</strong><br /> ISS</p> </li> <li> <p><strong>Mike Caudill</strong><br /> Cisco Systems</p> </li> <li> <p><strong>Steven Christey</strong><br /> MITRE</p> </li> <li> <p><strong>Anton Chuvakin</strong><br /> LogLogic</p> </li> <li> <p><strong>Gerhard Eschelbeck</strong><br /> Webroot</p> </li> <li> <p><strong>Seth Hanford</strong><br /> Cisco Systems</p> </li> <li> <p><strong>Luann Johnson</strong><br /> ISS</p> </li> <li> <p><strong>Tim TK Keanini, CTO</strong><br /> nCircle Network Security</p> </li> <li> <p><strong>Art Manion</strong><br /> US-CERT</p> </li> <li> <p><strong>Peter Mell</strong><br /> NIST</p> </li> <li> <p><strong>Gavin Reid</strong><br /> CSIRT Cisco Systems</p> </li> <li> <p><strong>Sasha Romanosky</strong><br /> Carnegie Mellon University</p> </li> <li> <p><strong>Karen Scarfone</strong><br /> NIST</p> </li> <li> <p><strong>Michael Scheck</strong><br /> CSIRT Cisco Systems</p> </li> <li> <p><strong>Robin Sterzer</strong><br /> CSIRT Cisco Systems</p> </li> <li> <p><strong>James H. Yen</strong><br /> Statistical Engineering Division, NIST</p> </li> </ul></div></div><div id="navbar" data-studio="CU52CV1W8g"><div id="c4" data-studio="Yu8FjCC11g"><ul class="navbar"><li><a href="/cvss">Common Vulnerability Scoring System (CVSS-SIG)</a><ul><li><a href="/cvss/calculator/4.0">Calculator</a></li><li><a href="/cvss/v4.0/specification-document">Specification Document</a></li><li><a href="/cvss/v4.0/user-guide">User Guide</a></li><li><a href="/cvss/v4.0/examples">Examples</a></li><li><a href="/cvss/v4.0/faq">Frequently Asked Questions</a></li><li><a href="/cvss/v4-0">CVSS v4.0 Documentation & Resources</a><ul><li><a href="/cvss/calculator/4.0">CVSS v4.0 Calculator</a></li><li><a href="/cvss/v4.0/specification-document">CVSS v4.0 Specification Document</a></li><li><a href="/cvss/v4.0/user-guide">CVSS v4.0 User Guide</a></li><li><a href="/cvss/v4.0/examples">CVSS v4.0 Examples</a></li><li><a href="/cvss/v4.0/faq">CVSS v4.0 FAQ</a></li></ul></li><li><a href="/cvss/v3-1">CVSS v3.1 Archive</a><ul><li><a href="/cvss/calculator/3.1">CVSS v3.1 Calculator</a></li><li><a href="/cvss/v3.1/specification-document">CVSS v3.1 Specification Document</a></li><li><a href="/cvss/v3.1/user-guide">CVSS v3.1 User Guide</a></li><li><a href="/cvss/v3.1/examples">CVSS v3.1 Examples</a></li><li><a href="/cvss/v3.1/use-design">CVSS v3.1 Calculator Use & Design</a></li></ul></li><li><a href="/cvss/v3-0">CVSS v3.0 Archive</a><ul><li><a href="/cvss/calculator/3.0">CVSS v3.0 Calculator</a></li><li><a href="/cvss/v3.0/specification-document">CVSS v3.0 Specification Document</a></li><li><a href="/cvss/v3.0/user-guide">CVSS v3.0 User Guide</a></li><li><a href="/cvss/v3.0/examples">CVSS v3.0 Examples</a></li><li><a href="/cvss/v3.0/use-design">CVSS v3.0 Calculator Use & Design</a></li></ul></li><li><a href="/cvss/v2">CVSS v2 Archive</a><ul><li><a href="/cvss/v2/guide">CVSS v2 Complete Documentation</a></li><li><a href="/cvss/v2/history">CVSS v2 History</a></li><li><a href="/cvss/v2/team">CVSS-SIG team</a></li><li><a href="/cvss/v2/meetings">SIG Meetings</a></li><li><a href="/cvss/v2/faq">Frequently Asked Questions</a></li><li><a href="/cvss/v2/adopters">CVSS Adopters</a></li><li><a href="/cvss/v2/links">CVSS Links</a></li></ul></li><li><a href="/cvss/v1">CVSS v1 Archive</a><ul><li><a href="/cvss/v1/intro">Introduction to CVSS</a></li><li><a href="/cvss/v1/faq">Frequently Asked Questions</a></li><li><a href="/cvss/v1/guide">Complete CVSS v1 Guide</a></li></ul></li><li><a href="/cvss/data-representations">JSON & XML Data Representations</a></li><li><a href="/cvss/training">CVSS On-Line Training Course</a></li><li><a href="/cvss/identity">Identity & logo usage</a></li></ul></li></ul></div></div><div id="sidebar" data-studio="CU52CV1W8g"><div id="c5" data-studio="Yu8FjCC11g"><p><img src="/cvss/img/cvss-sig-first.png" alt="Common Vulnerability Scoring System (CVSS-SIG)" title="Common Vulnerability Scoring System (CVSS-SIG)" /> </p></div><div id="c6" data-studio="Yu8FjCC11g" class="h3labels subbox"><div id="toc"></div> <!-- ### Table of Contents - [Introduction](#c2) - [CVSS](#c3) - [Conclusion](#c4) - [Appendix A: Accepted Proposals for Change to CVSS v1](#c5) - [Appendix B: CVSS v2 Vector Definitions](#c6) - [Appendix C: Impact and Difficulty Sub-equation Ordering Scoring Rules](#c7) - [Appendix D: CVSS 2.0 Base Score Equation](#c8) - [Appendix E: CVSS v2.1 Base Score Equation](#c9) - [Appendix F: CVSS v2.2 Base Score Equation](#c10) - [Appendix G: CVSS v2.3 Base Score Equation](#c11) - [Appendix H: CVSS v2.5 Base Score Equation](#c12) - [Appendix I: CVSS v2.6 Base Score Equation](#c13) - [Appendix J: CVSS v2.7 Base Score Equation](#c14) - [Appendix K: CVSS v2.8 Environmental Score Equation](#c15) - [Appendix L: CVSS v2.8 Score Equation](#c16) - [Appendix M: CVSS v2.9 Score Equation](#c17) - [Appendix N: Acknowledgments ](#c18) --></div></div><footer><div id="footer" data-studio="CU52CV1W8g"><div id="c2" data-studio="Yu8FjCC11g"><div class="content"> <div class="support"> <div class="kbsearch bottom"> <p><a href="https://support.first.org"><img src="/_/img/icon-portal_support.svg" alt="FIRST Support" title="FIRST Support" /></a> <input class="kb-search" type="search" placeholder="Do you need help?"></p> </div> </div> <div id="socialnetworks"><a href="/about/sdg" title="FIRST Supported Sustainable Development Goals (SDG)" class="icon-sdg"></a><a rel="me" href="https://infosec.exchange/@firstdotorg" target="_blank" title="@FIRSTdotOrg@infosec.exchange" class="icon-mastodon"></a><a href="https://twitter.com/FIRSTdotOrg" target="_blank" title="Twitter @FIRSTdotOrg" class="icon-tw"></a><a href="https://www.linkedin.com/company/firstdotorg" target="_blank" title="FIRST.Org at LinkedIn" class="icon-linkedin"></a><a href="https://www.facebook.com/FIRSTdotorg" target="_blank" title="FIRST.Org at Facebook" class="icon-fb"></a><a href="https://github.com/FIRSTdotorg" target="_blank" title="FIRST.Org at Github" class="icon-github"></a><a href="https://www.youtube.com/c/FIRSTdotorg" target="_blank" title="FIRST.Org at Youtube" class="icon-youtube"></a><a href="/podcasts" title="FIRST.Org Podcasts" class="icon-podcast"></a></div> <p><a href="/copyright">Copyright</a> © 2015—2024 by Forum of Incident Response and Security Teams, Inc. All Rights Reserved.</p> </div> <p><span class="tlp"></span></p></div></div></footer><script nonce="YrGKouctMv4cd1pzLL39rw" async="async" src="/_/web.js?20241125212614"></script><script nonce="YrGKouctMv4cd1pzLL39rw" async="async" src="/_/s.js?20241125-212616"></script></body></html>