Logo
CVSS Calculations

CVSS: A Global Standard for Vulnerability Assessment

What is CVSS Calculation

CVSS Calculation

An open, comprehensive, and versatile evaluation method for assessing the severity of vulnerabilities was proposed as a project of the US National Infrastructure Advisory Council (NIAC) in October 2004. This method aims to provide a common evaluation method for vulnerabilities in information systems.

The Forum of Incident Response and Security Teams (FIRST) was then selected as the management organization for this methodology, which promoted its adoption and improved its specifications, and released the first version in June 2005. Version 2 was released in June 2007, version 3 in June 2015, and most recently version 3.1 in February 2021.

CVSS Information Illustration
Assessment Methodology

Evaluation Criteria Overview

This assessment methodology evaluates the vulnerability of information systems based on three criteria:

CVSS v2 and v3 Overview

1. Base Metrics

It is a criterion for assessing the characteristics of the vulnerability itself. Evaluation items include:

check iconConfidentiality Impactcheck iconIntegrity Impactcheck iconAvailability Impact

2. Temporal Metrics

A measure of the current severity of a vulnerability. Factors assessed include:

check iconExploitabilitycheck iconRemediation Levelcheck iconReport Confidence

3. Environmental Metrics

This standard assesses vulnerability severity, factoring in the user's environment and key criteria.

check iconConfidentiality Requirementcheck iconIntegrity Requirementcheck iconAvailability Requirement
CVSS Versions

Differences Between CVSS Versions

The Common Vulnerability Scoring System (CVSS) has evolved to provide a standardized method for assessing the severity of software vulnerabilities.

Here's a brief overview of each version:

CVSS Version 2

2007

CVSS Version 3

2015

CVSS Version 3.1

2019

CVSS Version 2 (2007)

Introduced as a framework to evaluate the severity of vulnerabilities, focusing on the intrinsic qualities of a vulnerability.

check icon

Base Metrics

Assessed the inherent characteristics of a vulnerability.

check icon

Temporal Metrics

Considered factors that change over time, such as the availability of exploit code.

check icon

Environmental Metrics

Evaluated the potential impact of a vulnerability within a specific environment.

Summary

This evaluation method makes it possible to quantitatively evaluate and compare the severity of vulnerabilities, and also enables vendors, security experts, administrators, users, and others to discuss vulnerabilities using a common language.

For detailed evaluation methods and evaluation criteria, please refer to the specifications for each version. Understanding and applying the latest evaluation methods will enable you to effectively strengthen the security of your information systems.

This evaluation method makes it possible to quantitatively evaluate and compare the severity of vulnerabilities, and also enables vendors, security experts, administrators, users, and others to discuss vulnerabilities using a common language.

For detailed evaluation methods and evaluation criteria, please refer to the specifications for each version. Understanding and applying the latest evaluation methods will enable you to effectively strengthen the security of your information systems.

Download CVSS Calculation Software
CVSS
What is the OWASP Top 10?

Your Guide to Web Application Security

OWASP (Open Web Application Security Project) is a non-profit foundation focused on improving software security globally. With over 275 chapters worldwide, including OWASP Japan, it drives research, creates guidelines, and develops tools for diagnosing vulnerabilities. The OWASP Top 10 highlights the most critical web security threats, issued every 2–3 years. The latest version, OWASP Top 10 2023, provides a detailed overview of risks and trends.

How the OWASP Top 10 is Rated

  • check iconLikelihood of Exploitability
  • check iconTechnical Impact
  • check iconDetectability

* The OWASP Top 10 evaluates vulnerabilities using a structured risk rating methodology to prioritize the most critical threats.

Learn More About OWASP →
OWASP

If you have any questions or inquiries, please feel free to contact us.

Protect your services with penetration testing by white hat hackers