Lord777
Professional
- Messages
- 2,579
- Reaction score
- 1,492
- Points
- 113
Bringing together more than 650 organizations from more than 100 countries, FIRST released the new Common Vulnerability Scoring System 4.0 standard eight years after CVSS v3.0 (and 18 years after CVSS version 1 in February 2005).
CVSS 4.0 was introduced back in June during the 35th annual conference in Montreal as a kind of game-changer in the cyber sector and an attempt to eliminate ambiguity in assessing the severity of subsequent problems.
The updated standard offers a more precise granularity of basic indicators for consumers, eliminates ambiguity in evaluating subsequent levels, and improves the effectiveness of evaluating environmental-specific safety requirements, as well as compensating control measures.
The latest version of the standard adds several additional metrics for vulnerability assessment, including security (S), automation (A), security (R), value density (V), response effort (RE), and vendor urgency (U).
A key improvement of CVSS v4. 0 is also its additional applicability to OT/ICS/IoT, with security metrics and values added to both additional metric groups and environmental metric groups.
The Common Vulnerability Scoring System standard provides a way to determine the main characteristics of a security vulnerability and issues a numerical rating that reflects the technical severity of the vulnerability to inform and provide recommendations.
The idea, according to FIRST, is to reinforce the concept that CVSS is not just a baseline metric, but a qualitative severity rating (such as low, medium, high, and critical).
The basic CVSS assessment should be supplemented with environmental analysis and attributes that may change over time (threat metrics) to help organizations properly prioritize vulnerability management processes and ensure protection against cyber attacks.
Thus, a new nomenclature is presented for calculating CVSS scores using a combination of Base (CVSS-B), Base + Threat (CVSS-BT), Base + Environmental (CVSS-BE), and Base + Threat + Environmental (CVSS-BTE).
The latest release marks a significant step forward with additional features that are critical for teams that need to use threat analytics and environmental metrics for accurate assessment.
CVSS 4.0 was introduced back in June during the 35th annual conference in Montreal as a kind of game-changer in the cyber sector and an attempt to eliminate ambiguity in assessing the severity of subsequent problems.
The updated standard offers a more precise granularity of basic indicators for consumers, eliminates ambiguity in evaluating subsequent levels, and improves the effectiveness of evaluating environmental-specific safety requirements, as well as compensating control measures.
The latest version of the standard adds several additional metrics for vulnerability assessment, including security (S), automation (A), security (R), value density (V), response effort (RE), and vendor urgency (U).
A key improvement of CVSS v4. 0 is also its additional applicability to OT/ICS/IoT, with security metrics and values added to both additional metric groups and environmental metric groups.
The Common Vulnerability Scoring System standard provides a way to determine the main characteristics of a security vulnerability and issues a numerical rating that reflects the technical severity of the vulnerability to inform and provide recommendations.
The idea, according to FIRST, is to reinforce the concept that CVSS is not just a baseline metric, but a qualitative severity rating (such as low, medium, high, and critical).
The basic CVSS assessment should be supplemented with environmental analysis and attributes that may change over time (threat metrics) to help organizations properly prioritize vulnerability management processes and ensure protection against cyber attacks.
Thus, a new nomenclature is presented for calculating CVSS scores using a combination of Base (CVSS-B), Base + Threat (CVSS-BT), Base + Environmental (CVSS-BE), and Base + Threat + Environmental (CVSS-BTE).
The latest release marks a significant step forward with additional features that are critical for teams that need to use threat analytics and environmental metrics for accurate assessment.