TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

CVSS v3 Creates New Challenges For Developers (2018)

26 pointsby Yuval_Haleviover 5 years ago

3 comments

rtempaccount1over 5 years ago
In general, I&#x27;m not a fan of vulnerability quantification efforts like CVSS.<p>The reason is that they provide the appearance of repeatability and objectivity when, in reality, many of the assessments used are subjective and opinion based.<p>A simple &quot;critical&quot;, &quot;high&quot;, &quot;medium&quot;, &quot;low&quot; will generally provide enough actionable information without pretending to be something it&#x27;s not.<p>For examples of the weaknesses of CVSS, you only have to look at the software that uses it like Vulnerability scanners.<p>In many cases they have different ratings for the same issue and also have ratings which are nonsensical<p>here&#x27;s one example.<p>Telnet (totally unencrypted protocol) CVSS v2 5.8 <a href="https:&#x2F;&#x2F;www.tenable.com&#x2F;plugins&#x2F;nessus&#x2F;42263" rel="nofollow">https:&#x2F;&#x2F;www.tenable.com&#x2F;plugins&#x2F;nessus&#x2F;42263</a><p>SSL Self signed cert CVSS v2 6.4 <a href="https:&#x2F;&#x2F;www.tenable.com&#x2F;plugins&#x2F;nessus&#x2F;57582" rel="nofollow">https:&#x2F;&#x2F;www.tenable.com&#x2F;plugins&#x2F;nessus&#x2F;57582</a><p>So using an unencrypted protocol is worse than an encrypted one with a self-signed cert. (and before anyone says &quot;ah that could be because people mis-place trust in the cert&quot;, that&#x27;s not a factor in CVSS calcs) yet the unencrypted protocol scores lower.
评论 #20910093 未加载
评论 #20910108 未加载
评论 #20911911 未加载
评论 #20910888 未加载
orfover 5 years ago
Once upon a time I wrote a CVSS 2&#x2F;3 library for Python[1] (more have appeared now, this[2] looks nicer).<p>CVSS is really complex and seemingly arbitrary. Take a look at this (rather horrible) code to calculate a CVSS score from another library[3]. Yes, the code is disgusting, but even if you abstract it away nicely it boils down to: do some maths with some arbitrary numbers[4], then perform a bunch of conditions, and you (hopefully) get 3 numbers spat out.<p>I don&#x27;t like it. There are bugs in the &#x27;official&#x27; calculator around floating point numbers, the spec had several typos in the calculations (one being an extraneous negative symbol!) and the naming system for the components is needlessly complex.<p>There are surely simpler, less magical ways to score, compare and rate vulnerabilities?<p>1. <a href="https:&#x2F;&#x2F;github.com&#x2F;ctxis&#x2F;cvsslib" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;ctxis&#x2F;cvsslib</a><p>2. <a href="https:&#x2F;&#x2F;github.com&#x2F;skontar&#x2F;cvss" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;skontar&#x2F;cvss</a><p>3. <a href="https:&#x2F;&#x2F;github.com&#x2F;toolswatch&#x2F;pycvss3&#x2F;blob&#x2F;master&#x2F;lib&#x2F;pycvss3.py#L32" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;toolswatch&#x2F;pycvss3&#x2F;blob&#x2F;master&#x2F;lib&#x2F;pycvss...</a><p>4. <a href="https:&#x2F;&#x2F;www.first.org&#x2F;cvss&#x2F;specification-document#7-1-Base-Metrics-Equations" rel="nofollow">https:&#x2F;&#x2F;www.first.org&#x2F;cvss&#x2F;specification-document#7-1-Base-M...</a>
tptacekover 5 years ago
I don&#x27;t know any real software security person who takes CVSS seriously. It&#x27;s mostly a Ouija Board you use to rationalize setting finding severities where you want them (high if you&#x27;re on offense, low if you&#x27;re on defense).<p>The other useful function of CVSS is to flag people you shouldn&#x27;t take seriously in the industry. So, for instance, Kevin Mitnick runs a &quot;zero-day vulnerability brokerage&quot; that only accepts zero-days past a threshold CVSS. That&#x27;s a pretty decent clue about the legitimacy of the service.<p>Don&#x27;t waste time with CVSS.