Ora

What is CVSS and VPR?

Published in Vulnerability Management 6 mins read

CVSS and VPR are two distinct but related frameworks used in cybersecurity to assess and prioritize software vulnerabilities, with CVSS focusing on severity and VPR on risk-based prioritization.

Understanding CVSS: Common Vulnerability Scoring System

The Common Vulnerability Scoring System (CVSS) is an open industry standard designed to provide a qualitative measurement of a software vulnerability's characteristics and impacts. It generates a numerical score representing the severity of a vulnerability, ranging from 0.0 (low severity) to 10.0 (critical severity).

How CVSS Works

CVSS scores are calculated using a formula that considers various metrics grouped into three categories:

  1. Base Metrics: Represent the intrinsic qualities of a vulnerability that are constant over time and across user environments. These include:

    • Attack Vector (AV): How a vulnerability can be exploited (e.g., Network, Adjacent, Local, Physical).
    • Attack Complexity (AC): The difficulty of exploiting the vulnerability (e.g., Low, High).
    • Privileges Required (PR): The level of privileges an attacker needs (e.g., None, Low, High).
    • User Interaction (UI): Whether user interaction is required for exploitation (e.g., None, Required).
    • Scope (S): Whether the vulnerability can affect resources beyond its authorization scope (e.g., Unchanged, Changed).
    • Confidentiality Impact (C): Impact on the confidentiality of data (e.g., None, Low, High).
    • Integrity Impact (I): Impact on the integrity of data (e.g., None, Low, High).
    • Availability Impact (A): Impact on the availability of the affected system (e.g., None, Low, High).
  2. Temporal Metrics: Reflect the evolving characteristics of a vulnerability over time. These change as exploit code becomes available, patches are released, or workarounds are discovered.

    • Exploit Code Maturity (E): The current state of exploit techniques (e.g., Not Defined, Unproven, Proof of Concept, Functional, High).
    • Remediation Level (RL): The availability of a fix (e.g., Not Defined, Official Fix, Temporary Fix, Workaround, Unavailable).
    • Report Confidence (RC): The degree of confidence in the existence of the vulnerability (e.g., Not Defined, Unknown, Reasonable, Confirmed).
  3. Environmental Metrics: Allow organizations to tailor the CVSS score to their specific environment by considering factors like the importance of the affected assets.

    • Confidentiality Requirement (CR): The importance of confidentiality to the organization.
    • Integrity Requirement (IR): The importance of integrity to the organization.
    • Availability Requirement (AR): The importance of availability to the organization.
    • Modified Base Metrics: Allow administrators to adjust base metrics based on their specific environment.

CVSS scores are often published by organizations like the National Vulnerability Database (NVD) based on the FIRST.org standard.

Limitations of CVSS:
While CVSS provides a consistent way to describe vulnerability severity, it primarily measures severity, not risk. A high CVSS score doesn't automatically mean it's the most urgent threat to a specific organization, as it doesn't account for real-world exploitability, asset criticality, or active threat intelligence.

Understanding VPR: Vulnerability Priority Rating

The Vulnerability Priority Rating (VPR) is a dynamic, data-driven rating system that measures the true risk of a vulnerability to an organization, enabling better prioritization of remediation efforts. Unlike CVSS, which is largely static and focuses on intrinsic severity, VPR provides a real-time assessment of how likely a vulnerability is to be exploited in the wild and its potential impact within a specific context.

How VPR Works

VPR scores are typically calculated by vulnerability management platforms (like Tenable's VPR) using a proprietary algorithm that goes beyond the basic CVSS score. It leverages the CVSS base impact score – which is a combination of confidentiality, integrity, and availability impact metrics – and integrates it with a multitude of other external and real-world factors.

These external aspects are crucial for determining actual risk and include:

  • Age of the vulnerability: Newer vulnerabilities might be more actively targeted.
  • Product coverage: How widespread the affected product is and its usage in the environment.
  • External threat events: Real-time exploit intelligence, the existence of exploit kits, observed attacks, and known attacker interest.
  • Threat sources: Information from dark web activity, social media discussions, and other intelligence feeds.
  • Prevalence of the vulnerability: How commonly it's seen in different environments.

By combining the inherent impact metrics from CVSS with these dynamic threat intelligence factors, VPR generates a much more accurate and actionable prioritization score.

Benefits of VPR:
VPR helps security teams focus on the vulnerabilities that pose the most immediate and significant risk to their organization, rather than simply patching everything with a high CVSS score. This leads to more efficient resource allocation and a stronger security posture.

CVSS vs. VPR: A Comparative Look

Understanding the distinction between CVSS and VPR is crucial for effective vulnerability management.

Feature Common Vulnerability Scoring System (CVSS) Vulnerability Priority Rating (VPR)
What it measures Vulnerability severity (intrinsic characteristics) Vulnerability risk (likelihood of exploitation + impact)
Focus Technical characteristics, impact on data/system (confidentiality, integrity, availability) Real-world threat intelligence, exploitability, asset context, and severity
Scoring basis Standardized formula using Base, Temporal, Environmental metrics Proprietary algorithm combining CVSS base impact with dynamic external factors
Dynamic? Base score is static; Temporal and Environmental components can change but require manual input/context Highly dynamic; continuously updated with new threat intelligence
Primary Use Consistent, objective assessment of a vulnerability's severity Prioritizing remediation efforts based on actual risk to an organization
Perspective Vendor/public-facing (how severe is this flaw?) Organization-specific (how much does this flaw matter to me right now?)

Practical Implications and Insights

Organizations often find that relying solely on CVSS scores for prioritization can be inefficient. For instance:

  • A vulnerability with a CVSS score of 9.8 might appear critical, but if there's no known exploit, it affects an obscure system not used by the organization, or if a patch is readily available and widely deployed, its immediate risk (VPR) might be lower than a CVSS 7.0 vulnerability with active exploits and no patch, affecting a critical internal system.
  • VPR helps bridge the gap between technical severity and business risk. It allows security teams to answer questions like: "Which of our high-severity vulnerabilities are currently being actively exploited in the wild?" or "Which vulnerabilities in our environment are most likely to be targeted by threat actors given current trends?"

By integrating both CVSS and VPR into their vulnerability management program, organizations can achieve a more nuanced and effective approach:

  • Initial Assessment: Use CVSS to get a standardized understanding of the vulnerability's inherent severity.
  • Prioritization: Apply VPR to layer in real-world threat context and organizational specific factors to determine which vulnerabilities truly demand immediate attention.
  • Resource Allocation: Direct security teams and development resources to address the highest-risk vulnerabilities first, optimizing remediation efforts.