Incident Response

FIRST Releases CVSS 4.0 Vuln Scoring Standard

The CVSS vulnerability scoring standard is refreshed to provide more data and remove ambiguities in rating the severity of downstream issues.

The CVSS vulnerability scoring standard is refreshed to provide more data and remove ambiguities in rating the severity of downstream issues.

The Forum of Incident Response and Security Teams (FIRST) on Monday pushed out a refresh of its CVSS vulnerability scoring standard as part of an attempt to provide more data and remove ambiguities in rating the severity of downstream issues.

The updated standard, used by organizations to rate the severity of known software flaws, offers finer granularity in base metrics for consumers, removes downstream scoring ambiguity and simplifies threat metrics, FIRST said.

The non-profit collective, which includes more than 650 organizations from more than 100 countries, said several supplemental metrics for vulnerability assessment were added to flag bugs that may be Automatable (wormable), Recovery (resilience), Value Density, Vulnerability Response Effort and Provider Urgency. 

“A key enhancement to CVSS v4.0 is also the additional applicability to OT/ICS/IoT, with Safety metrics and values added to both the Supplemental and Environmental metric groups,” the group said.

The CVSS standard provides a way to capture the principal characteristics of a security vulnerability and produces a numerical score reflecting [a vulnerability’s] technical severity to inform and provide guidance to businesses, service providers, government, and the public.

The numerical score can be represented as a qualitative severity rating (such as low, medium, high, and critical) to help organizations properly assess and prioritize their vulnerability management processes and prepare defenses against cyber-attacks.

“This latest release marks a significant step forward with added capabilities crucial for teams with the importance of using threat intelligence and environmental metrics for accurate scoring at its core,” the group said.

Related: CVSS Scores Often Misleading for ICS Vulnerabilities

Advertisement. Scroll to continue reading.

Related: FIRST Announces CVSS Version 3.1

Related: TLP 2.0 Brings Wording Improvements, Label Changes

Related Content

Cloud Security

VMware flaw carries a CVSS severity-score of 9.8/10 and can be exploited to bypass login restrictions when authenticating on certain ports.

Cloud Security

Cisco warns that unauthenticated, remote attackers can log into devices using root account, which has default, static credentials that cannot be changed or deleted.

Application Security

Two critical-severity authentication bypass vulnerabilities in WordPress plugins with tens of thousands of installations.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version