Upgrade to Pro — share decks privately, control downloads, hide ads and more …

CVSS - 101

Shrimant More
October 05, 2024
4

CVSS - 101

Shrimant More

October 05, 2024
Tweet

Transcript

  1. The Golden Circle Model Ask Simple Questions What CVSS 3.1

    How This session Why Rate Severity and Chars of Security Vulnerabilites
  2. What is CVSS Versions of CVSS calculators How is severity

    of vulnerability is defined Using CVSS 3.1 calculator Agenda
  3. 2005 The Evolution of CVSS A Timeline Overview CVSS 1.0

    CVSS 2.0 2007 CVSS 3.0 2015 CVSS 3.1 2019 CVSS 4.0 2023 Introduced a common measurement system for vulnerability severity Further refinements included the Scope metric. Improved existing standards Introduced a common measurement system for vulnerability severity Gained widespread adoption, integrated into PCI-DSS.
  4. Metric Value Description Network (N) Attacks that can be done

    over the internet (Remotely Exploitable) Adjacent (A) Required to be connected to a company's VPN for exploiting an issue Local (L) User Interaction by another person to perform actions required to exploit the vulnerability Physical (P) Requires the attacker to physically touch or manipulate the vulnerable component Attack Vector (AV)
  5. Metric Value Description Low (L) No Special Conditions Required (IDORs

    where IDs are easily guessable, XSS) Attack Complexity (AC)
  6. Metric Value Description High (H) Successful attack depends on conditions

    beyond the attacker's control (IDORs with unpredictable IDs)
  7. Metric Value Description None (N) The attacker is unauthorized prior

    to attack, No access required or files of the vulnerable system to carry out an attack. (Self signup available) Low (L) Attacker requires low privileges (Admin invites attacker to their org having Low permissions) High (H) Attacker requires High privileges (Admin invites attacker to their org having High permissions) Privileges Required (PR)
  8. Metric Value Description None (N) The vulnerable system can be

    exploited without interaction from any user (IDOR, BAC) Required (R) Requires a user to take some action before the vulnerability can be exploited (XSS, Open Redirect) User Interaction (UI)
  9. Metric Value Description Unchanged (U) The vulnerable component and the

    impacted component are either the same, or both are managed by the same security authority (IDOR, BAC, Open Redirect, Subdomain Takeover ) Changed (C) The vulnerable component and the impacted component are different and managed by different security authorities. (Stored XSS, Reflected XSS) Scope (S)
  10. Metric Value Description High (H) There is a total loss

    of confidentiality (Information disclosure, IDOR fetches PII details) Low (L) There is some loss of confidentiality (First name, Last name, Email) None (N) There is no loss of confidentiality within the impacted component. Confidentiality (C)
  11. Metric Value Description High (H) There is a total loss

    of integrity (Able to modify all files and details) Low (L) Amount of modification is limited (Able to change First Name, Gender, favourite list) None (N) There is no loss of integrity within the impacted component. Integrity (I)
  12. Metric Value Description High (H) There is a total loss

    of availability, resulting in the attacker being able to fully deny access to resources in the impacted component Low (L) Performance is reduced or there are interruptions in resource availability None (N) There is no impact to availability within the impacted component. Availability (A)
  13. Integrity VS Availability Picture this scenario: You uncover a vulnerability

    that would allow an attacker to delete all files in the web server’s root directory. How would you rate the Availability metric for this vulnerability on the CVSS calculator? High? Low? None?