Register now for better personalized quote!

The Evolution of Scoring Security Vulnerabilities

Apr, 28, 2016 Hi-network.com

The Common Vulnerability Scoring System (CVSS), which is used by many in the industry as a standard way to assessandscore security vulnerabilities, is evolving to a new version known as CVSSv3. These changes addressed someof thechallenges that existed in CVSSv2; CVSSv3 analyzes the scope of a vulnerability andidentifies the privileges an attacker needs to exploit it. The enhancements to CVSS will allow vendors, such as Cisco, to better analyze security vulnerability impact. The changes will also more clearly define the urgency of responding to the vulnerability for our customers.

Cisco will begin to adopt CVSSv3 for assessing security vulnerabilities in the fourth quarter of calendar year 2016 (Q4CY16).

Background

CVSS is the industry-open standard designed to convey the common attributes of vulnerabilities in computer hardware and software systems. Cisco uses it to provide a score for each vulnerability in security advisories. CVSS was developed as a cooperative effort between the National Infrastructure Advisory Council and a number of security industry vendors and research organizations, including Cisco. The Forum of Incident Response and Security Teams (FIRST) has been designated as the custodian of CVSS to promote its adoption globally. This new version was under development for 3 years, and Cisco was a contributor to the standard.

Effects of Introducing CVSSv3

The following study reviews the difference in scores when a vulnerability is assessed using CVSSv2 vs. CVSSv3. The stakeholders at FIRST have done a great job in this new versionof thestandard addressing someof thechallenges faced with its predecessor (CVSSv2).
As more organizations begin to adopt this new standard in their processes for evaluating vulnerabilities, there will be some visible changes in disclosure trends overall. The most notable is an increase in the total number of higher-rated vulnerabilities. This increase occurs because the metrics changes in the new system. As the threat landscape evolves, there are more cases where an increased sense of urgency is needed in customers' responses.

Study Details

This study analyzed the difference between CVSS version 2 and version 3 scores. This study uses CVSSv2 and CVSSv3 scores provided by the National Vulnerability Database (NVD). A total of 745 vulnerabilities were analyzed, and each vulnerability is identified by a Common Vulnerabilities and Exposures (CVE) identifier. All the vulnerabilities were disclosed in 2016.

The goal was to identify the percentage of vulnerabilities that had a score increase or decrease, based on the two versionsof theprotocol (CVSSv2 vs. CVSSv3).

CVSSv3 Qualitative Severity Rating Scale and the Cisco Security Impact Rating

Cisco adopted a Security Impact Rating (SIR) in 2015, which uses basically the same scale as the new CVSSv3 qualitative severity rating scale. This scale is described in Table 1:

Table 1. SIR and CVSSv3 Qualitative Severity Rating Scale

 

Note:Cisco reserves the right to deviate from this simple mapping on an exception basis in the event that there are additional factors not properly captured in the CVSS score.

Results

The CVSSv2 and CVSSv3 scores were analyzed for 745 vulnerabilities. These vulnerabilities were disclosed from January 2016 through April 2016. The scores used were provided by the National Institute of Standards and Technology (NIST) in NVD. The average CVSSv2 and CVSSv3 base scores of all vulnerabilities were calculated and compared, as shown below:

 

n= 745 vulnerabilities (CVEs)
ai= either CVSSv2 or CVSSv3 base scores

The CVSSv2 average score (CVSSv2AVG) was6.7and the CVSSv3 average score (CVSSv3AVG) was7.4, as illustrated in Figure 1.

Figure 1. Average CVSSv2 and CVSSv3 Scores

 

Table 2 shows the number of vulnerabilities that changed. When CVSSv3 was used, the rating for the CVSS base score changed for many vulnerabilities as follows:

  • Medium to high or critical
  • Low to medium
  • High or critical to medium
  • Medium to low

 

Table 2. Number of Vulnerabilities with Severity Scale Changes

 

Score Increase from Medium to High or Critical

There were144vulnerabilities for which ratingsincreasedfrom medium to high or critical. That represents19.33 percentof all studied vulnerabilities, and38 percent of the 380medium-scaled vulnerabilities (under CVSSv2 scores). The average base score of these vulnerabilities was6.1with CVSSv2, with an increase to an average base score of8.2when the vulnerabilities were scored with CVSSv3, as shown in Figure 2:

Figure 2. Average Score of Vulnerabilities That Increased from Medium to High or Critical

 

Score Increase from Low to Medium

There were35vulnerabilities for which ratingsincreasedfrom low to medium. That represents only4.7 percentof all studied vulnerabilities, and88 percent of the 40low-scaled vulnerabilities (under CVSSv2 scores). The average base score of these vulnerabilities was3.0with CVSSv2, with an increase to an average base score of5.5when the vulnerabilities were scored with CVSSv3, as shown in Figure 3:

Figure 3. Average Score of Vulnerabilities That Increased from Low to Medium

 

Score Decrease from High or Critical to Medium

There were12vulnerabilities for which ratingsdecreasedfrom high or critical to medium. That represents only1.61 percentof all studied vulnerabilities, and4 percent of the 325high-scaled or critical-scaled vulnerabilities (under CVSSv2). The average base score of these vulnerabilities was7.2with CVSSv2, with a decrease to an average base score of6.2when the vulnerabilities were scored with CVSSv3, as shown in Figure 4:

Figure 4. Average Score of Vulnerabilities That Decreased from High or Critical to Medium

 

Score Decrease from Medium to Low

There were7vulnerabilities for which scoresdecreasedfrom medium to low. That represents only0.94 percentof all studied vulnerabilities, and2 percent of the 380medium-scaled vulnerabilities (under CVSSv2 scores). The average base score of these vulnerabilities was4.3with CVSSv2, with a decrease to an average base score of3.6when the vulnerabilities were scored with CVSSv3, as shown in Figure 5:

Figure 5. Average Score of Vulnerabilities That Decreased from Medium to Low

 

Types of Vulnerabilities

The types of vulnerabilities that had score increases or decreases were also interesting. In this study, I analyzed the Common Weakness Enumeration (CWE) identifiers assigned by NIST for each vulnerability. CWE is a standard maintained by MITRE that describes the software weaknesses of security vulnerabilities.

CWE IDs for Vulnerabilities That Changed from Medium to High or Critical

The most common weaknesses (CWE IDs) for the 144 vulnerabilities that changed from medium to high or critical werebuffer errors and permissions, privileges, and access controls. Table 3 provides the details of the distribution of CWE types and the number of vulnerabilities with these weaknesses:

Table 3. Most Common CWE IDs for Vulnerabilities That Changed from Medium to High or Critical

 

Figure 6 illustrates the distribution of CWE IDs for vulnerabilities that changed from medium to high or critical:

Figure 6. Distribution of CWE IDs for Vulnerabilities That Changed from Medium to High or Critical

 

CWE IDs for Vulnerabilities That Changed from Low to Medium

The most common weaknesses (CWE IDs) for the 35 vulnerabilities that changed from low to medium werecross-site scripting (XSS)and information leak/disclosure. Table 4 provides the details of the distribution of CWE types and the number of vulnerabilities with these weaknesses:

Table 4. Most Common CWE IDs for Vulnerabilities That Changed from Low to Medium

 

Figure 7 illustrates the distribution of CWE IDs for vulnerabilities that changed from low to medium:

Figure 7. Distribution of CWE IDs for Vulnerabilities That Changed from Low to Medium

CWE IDs for Vulnerabilities That Changed from High or Critical to Medium

The most common weaknesses (CWE IDs) for the 12 vulnerabilities that changed from high or critical to medium wereresource management errorsandinput validation. Table 5 provides the details of the distribution of CWE types and the number of vulnerabilities with these weaknesses:

Table 5. Most Common CWE IDs for Vulnerabilities That Changed from High or Critical to Medium

 

Figure 8 illustrates the distribution of CWE IDs for vulnerabilities that changed from high or critical to medium:

 

Figure 8. Distribution of CWE IDs for Vulnerabilities That Changed from Low to Medium

 

CWE IDs for Vulnerabilities That Changed from Medium to Low

The most common weakness (CWE ID) for the seven vulnerabilities that changed from medium to low wasinformation leak/disclosure. Table 6 provides the details of the distribution of CWE types and the number of vulnerabilities with these weaknesses:

Table 6. Most Common CWE IDs for Vulnerabilities That Changed from Medium to Low

 

Figure 9 illustrates the distribution of CWE IDs for vulnerabilities that changed from medium to low:

Figure 9. Distribution of CWE IDs for Vulnerabilities That Changed from Medium to Low

 

Raw Data

I have uploaded all the raw data used in this study to GitHub at the following link/repository:

https://github.com/santosomar/CVSSv2VsCVSSv3

 

Conclusion

The CVSS enhancements mean that we will see more vulnerabilities being rated as high or critical throughout the security industry. You may ask yourself, was the industry analyzing and scoring the risk of vulnerabilities incorrectly or are we inflating the scores now? The answer lies in the fact that threats to security are evolving and advancing all the time. Threat types that were once a potential inconvenience could now have a greater impact on an organization. Our assessments of such threats and the appropriate level of response also needed to evolve.

The stakeholders at FIRST have done a great job in this new CVSS version to address some of the challenges we faced with its predecessor (CVSSv2). The new enhancements allow incident response, IT security, and cyber security teams to analyze the impact of security vulnerabilities to determine the urgency of response.

Cisco PSIRT will continue to adapt to enable our customers to assess and mitigate any risks in their networks quickly. Our mission is to do the right thing quickly, and to keep our customers protected.


tag-icon Hot Tags : psirt vulnerability risk CVSS Cisco Security Vulnerability Policy cvssv3 product security incident response team

Copyright © 2014-2024 Hi-Network.com | HAILIAN TECHNOLOGY CO., LIMITED | All Rights Reserved.