How to cvss score
Content on WhatAnswers is provided "as is" for informational purposes. While we strive for accuracy, we make no guarantees. Content is AI-assisted and should not be used as professional advice.
Last updated: April 4, 2026
Key Facts
- CVSS scores range from 0.0 (low severity) to 10.0 (critical severity).
- The current version is CVSS v3.1, with v4.0 released in late 2023.
- Key metrics include Attack Vector, Attack Complexity, Privileges Required, User Interaction, Scope, Confidentiality, Integrity, and Availability.
- Scores are divided into severity ratings: None (0.0), Low (0.1-3.9), Medium (4.0-6.9), High (7.0-8.9), and Critical (9.0-10.0).
- It's a standardized framework used by security professionals to prioritize vulnerability remediation.
What is the CVSS Score?
The Common Vulnerability Scoring System (CVSS) is an open industry standard for assessing the severity of computer system security vulnerabilities. It provides a standardized way to capture the main characteristics of a vulnerability and produce a numerical score reflecting its severity. This score helps organizations prioritize their vulnerability management efforts, ensuring that the most critical issues are addressed first.
How is a CVSS Score Calculated?
The calculation of a CVSS score involves a set of metrics that describe the characteristics of a vulnerability. These metrics are grouped into three distinct metric groups: Base, Temporal, and Environmental. Each metric is assigned a value, and these values are plugged into a formula to derive the final score.
Base Metrics
The Base metric group represents the intrinsic qualities of a vulnerability that are constant over time and across user environments. These metrics provide the foundational score.
- Attack Vector (AV): Describes how a vulnerability can be exploited. Options include Network (N), Adjacent (A), Local (L), and Physical (P). A Network attack vector is the most severe.
- Attack Complexity (AC): Describes the conditions beyond the attacker's control that must exist to exploit the vulnerability. It can be Low (L) or High (H). Lower complexity means higher severity.
- Privileges Required (PR): Describes the level of privileges an attacker must possess before successfully exploiting the vulnerability. Options include None (N), Low (L), and High (H). No privileges required is the most severe.
- User Interaction (UI): Describes whether a user must participate in the exploitation of a vulnerability. Options include None (N) or Required (R). No user interaction required is more severe.
- Scope (S): Describes whether the vulnerability in one component can affect resources in a different security scope. Options include Unchanged (U) and Changed (C). A changed scope indicates a broader impact and higher severity.
- Confidentiality Impact (C): Measures the impact on the confidentiality of data processed by the system. Options are None (N), Low (L), and High (H).
- Integrity Impact (I): Measures the impact on the integrity of data processed by the system. Options are None (N), Low (L), and High (H).
- Availability Impact (A): Measures the impact on the availability of the affected component. Options are None (N), Low (L), and High (H).
Temporal Metrics
The Temporal metric group represents characteristics of a vulnerability that change over time but not within a specific user's environment. These metrics can adjust the Base score.
- Exploit Code Maturity (E): Assesses the likelihood of the vulnerability being exploited in the wild. Options include Proof-of-Concept (P), Functional (F), High (H), and Not Defined (ND). Higher maturity leads to a higher score.
- Remediation Level (RL): Describes the level of recommended remediation available for the vulnerability. Options include Official Fix (O), Temporary Fix (T), Workaround (W), and Unavailable (U). A higher remediation level (e.g., Official Fix) reduces the score.
- Report Confidence (RC): Assesses the degree of confidence in the existence of the vulnerability and the credibility of the technical details. Options include Unknown (U), Reasonable (R), and Confirmed (C). Higher confidence can increase the score.
Environmental Metrics
The Environmental metric group represents characteristics of a vulnerability that are relevant and unique to a particular user's environment. These metrics allow for customization of the score based on specific organizational needs and asset criticality.
- Security Requirements (CR, IR, AR): These metrics allow organizations to adjust the score based on the importance of Confidentiality, Integrity, and Availability for the affected asset within their environment. Options are Low (L), Medium (M), and High (H).
- Modified Base Metrics: Organizations can also modify Base metrics (e.g., Attack Vector, Privileges Required) to reflect their specific environment.
CVSS Score Ranges and Severity Levels
The final CVSS score ranges from 0.0 to 10.0 and is categorized into severity levels:
- None: 0.0
- Low: 0.1 - 3.9
- Medium: 4.0 - 6.9
- High: 7.0 - 8.9
- Critical: 9.0 - 10.0
Understanding these levels is crucial for prioritizing responses to security threats.
Why is CVSS Important?
CVSS provides a consistent and objective method for rating vulnerability severity. This standardization is vital for:
- Prioritization: Helps security teams focus on the most critical vulnerabilities first.
- Communication: Facilitates clear communication about vulnerability risks among different teams and stakeholders.
- Risk Management: Supports informed decision-making in risk management strategies.
- Benchmarking: Allows for consistent tracking and comparison of security posture over time.
CVSS Versions
The FIRST (Forum of Incident Response and Security Teams) organization manages the CVSS standard. The most widely used version is CVSS v3.1, which was released in 2019. In November 2023, FIRST released CVSS v4.0, introducing new metrics and improving the scoring system for better accuracy and clarity in assessing modern threats.
In summary, the CVSS score is an essential tool in cybersecurity for quantifying and communicating the severity of vulnerabilities, enabling effective risk management and timely remediation.
More How To in Daily Life
Also in Daily Life
More "How To" Questions
Trending on WhatAnswers
Browse by Topic
Browse by Question Type
Sources
- FIRST.Org - CVSSfair-use
- Common Vulnerability Scoring System - WikipediaCC-BY-SA-4.0
Missing an answer?
Suggest a question and we'll generate an answer for it.