TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

A closer look at CVSS scores

50 pointsby mrcsdalmost 3 years ago

5 comments

lmeyerovalmost 3 years ago
I&#x27;m curious how you&#x27;d account to factors like `npm audit` failing on probably most javascript repos out there on reasonably high CVSS settings due to including items like <a href="https:&#x2F;&#x2F;nvd.nist.gov&#x2F;vuln&#x2F;detail&#x2F;CVE-2021-3807" rel="nofollow">https:&#x2F;&#x2F;nvd.nist.gov&#x2F;vuln&#x2F;detail&#x2F;CVE-2021-3807</a> ? And particularly, how to fix that, or Working As Intended?
评论 #31817327 未加载
jacques_chesteralmost 3 years ago
I&#x27;m the author and would be happy to answer questions to the best of my ability.
评论 #31813710 未加载
altharazalmost 3 years ago
Very great article.<p>At the moment IMHO the major issue comes from that people use only the Basic Score of the CVSS 3.1, issued by the NVD.<p>Indeed, if you also take the Temporal Score (with CTI feeds for example), and if you add the Environmental Score, then you can have very good results to help prioritizing the vulnerabilities on your assets and reflect the real threat.<p>I would also like, however, to see the CVSS4 with a &quot;cost to patch&quot; component: in OT environments, CISO like to use the SSVC because it’s the easiest way to say &quot;wait&quot; instead of &quot;patch now&quot;. But since SSVC is not really recognized by all auditors, it generates conflicts. Bringing a component in the CVSS to reflect the cost of remediation on very complex devices, where deploying a KB requires to stop a full factory, could help getting the same results (aka &quot;don’t patch now and wait&quot;) but with a more respected scoring system.<p>From my perspective, that’s the only missing component for a good CVSS system :).
评论 #31819800 未加载
andy_pppalmost 3 years ago
I built a CVSS2 calculator amongst other things; I came to the conclusion that they are trying to turn an art (how problematic an issue is) into a pure science and they keep realising they need ever more parameters. I’m glad they have tried but would rather trust a pen tester to help me rank issues within my organisation than attempt to use a one size fits all formula that doesn’t account for my specific situation perfectly.
BeefWellingtonalmost 3 years ago
&quot;People misapply CVSS&quot; is the crux of the post and all the criticisms (even the ones labeled as something else).<p>The other criticisms section starts with the &quot;You&#x27;re doing it wrong&quot; commentary and then moves on to discuss two other groups saying what boils down to &quot;You&#x27;re doing it wrong and the metric is bad because it encourages you to do it wrong&quot;, which as a way of demonstrating diversity of opinion is entertaining at least.<p>CVSSv3.1 as a metric is not designed to have a uniform distribution of possible values from 0.1 -&gt; 10.0 and it should not generally be a goal to develop a scoring system that does. It is designed solely to answer the questions of &quot;which issue is more severe&quot; when comparing different issues and to then help direct and prioritize fix work. It is not perfect at this but it is superior to other systems out there, especially when taking the pure severity of a given vulnerability in isolation.<p>I do get that people really do try to sell the idea that it&#x27;s an infallible metric and that it means something substantially more than it does. It also gets confused often as &quot;X is riskier because its score is higher&quot;, which is obviously wrong. If you have an authentication-related product, it&#x27;s obviously more damaging to discover certain categories of information leakage than it may be to find cross-site scripting issues in general.<p>I think it is correct for a change in scope to have a much more outsized impact on the final score, something the author seems to sort of presume is wrong (referring to it as the &quot;villain&quot; at one point) without really explaining why they believe it is wrong. A scope change essentially means lateral movement to other systems rather than the compromise of a single piece of software.<p>Could a better metric be designed? Sure. I&#x27;d like to see some additional degrees of user interaction being accounted for, as just one example. The concept of vectors being Network, Adjacent, Local, or Physical could use some more fleshing out for the modern age, for another.<p>Does that mean alternative approaches are better? Not in my experience. All the alternatives I&#x27;ve experienced basically boil down to &quot;we made our own system, don&#x27;t publish the calculations, and lots more stuff is critical impact and risk&quot; whenever you get reports. I&#x27;ve literally had third-party pentest teams try to sell me that an Info Exposure that was showing server IPs in a log was a High, because they used their own metric.<p>I&#x27;d argue that for what it is intended to do, CVSSv3.1 does a good enough job and that&#x27;s why so many people have accepted it as a standard.