CVSS v4 Equivalence Set EQ4
Here we describe an example decision model for an analyst assessing the CVSS v4 equivalence set EQ4.
Analyst Units of Work
Analyst Unit of Work
The unit of work for an Analyst is a single vulnerability report.
Analysts are usually tasked with assessing the CVSS score for an individual vulnerability report.
Analyst Decision Outcomes
The analyst's decision is to choose the appropriate level for CVSS v4 EQ4.
Equivalence Set 4 (cvss:EQ4:1.0.0)
SC/SI/SA with 3 levels specified in Table 27
Value | Definition |
---|---|
Low (L) | 2: not (MSI:S or MSA:S) and not (SC:H or SI:H or SA:H) |
Medium (M) | 1: not (MSI:S or MSA:S) and (SC:H or SI:H or SA:H) |
High (H) | 0: MSI:S or MSA:S |
Equivalence Set 4 (cvss:EQ4:1.0.0) JSON Example
{
"namespace": "cvss",
"key": "EQ4",
"version": "1.0.0",
"name": "Equivalence Set 4",
"description": "SC/SI/SA with 3 levels specified in Table 27",
"schemaVersion": "2.0.0",
"values": [
{
"key": "L",
"name": "Low",
"description": "2: not (MSI:S or MSA:S) and not (SC:H or SI:H or SA:H)"
},
{
"key": "M",
"name": "Medium",
"description": "1: not (MSI:S or MSA:S) and (SC:H or SI:H or SA:H)"
},
{
"key": "H",
"name": "High",
"description": "0: MSI:S or MSA:S"
}
]
}
Analyst Decision Points
Confidentiality Impact to the Subsequent System (cvss:SC:1.0.0)
This metric measures the impact to the confidentiality of the information managed by the system due to a successfully exploited vulnerability. Confidentiality refers to limiting information access and disclosure to only authorized users, as well as preventing access by, or disclosure to, unauthorized ones. The resulting score is greatest when the loss to the system is highest.
Value | Definition |
---|---|
Negligible (N) | There is no loss of confidentiality within the Subsequent System or all confidentiality impact is constrained to the Vulnerable System. |
Low (L) | There is some loss of confidentiality. Access to some restricted information is obtained, but the attacker does not have control over what information is obtained, or the amount or kind of loss is limited. The information disclosure does not cause a direct, serious loss to the Subsequent System. |
High (H) | There is a total loss of confidentiality, resulting in all resources within the Subsequent System being divulged to the attacker. Alternatively, access to only some restricted information is obtained, but the disclosed information presents a direct, serious impact. |
Confidentiality Impact to the Subsequent System (cvss:SC:1.0.0) JSON Example
{
"namespace": "cvss",
"key": "SC",
"version": "1.0.0",
"name": "Confidentiality Impact to the Subsequent System",
"description": "This metric measures the impact to the confidentiality of the information managed by the system due to a successfully exploited vulnerability. Confidentiality refers to limiting information access and disclosure to only authorized users, as well as preventing access by, or disclosure to, unauthorized ones. The resulting score is greatest when the loss to the system is highest.",
"schemaVersion": "2.0.0",
"values": [
{
"key": "N",
"name": "Negligible",
"description": "There is no loss of confidentiality within the Subsequent System or all confidentiality impact is constrained to the Vulnerable System."
},
{
"key": "L",
"name": "Low",
"description": "There is some loss of confidentiality. Access to some restricted information is obtained, but the attacker does not have control over what information is obtained, or the amount or kind of loss is limited. The information disclosure does not cause a direct, serious loss to the Subsequent System."
},
{
"key": "H",
"name": "High",
"description": "There is a total loss of confidentiality, resulting in all resources within the Subsequent System being divulged to the attacker. Alternatively, access to only some restricted information is obtained, but the disclosed information presents a direct, serious impact."
}
]
}
Modified Integrity Impact to the Subsequent System (without Not Defined) (cvss:MSI_NoX:1.0.1)
This metric measures the impact to integrity of a successfully exploited vulnerability. Integrity refers to the trustworthiness and veracity of information. Integrity of a system is impacted when an attacker causes unauthorized modification of system data. Integrity is also impacted when a system user can repudiate critical actions taken in the context of the system (e.g. due to insufficient logging). The resulting score is greatest when the consequence to the system is highest. This version does not include the Not Defined (X) option.
Value | Definition |
---|---|
Negligible (N) | There is negligible loss of integrity within the Subsequent System or all integrity impact is constrained to the Vulnerable System. |
Low (L) | Modification of data is possible, but the attacker does not have control over the consequence of a modification, or the amount of modification is limited. The data modification does not have a direct, serious impact to the Subsequent System. |
High (H) | There is a total loss of integrity, or a complete loss of protection. For example, the attacker is able to modify any/all files protected by the Subsequent System. Alternatively, only some files can be modified, but malicious modification would present a direct, serious consequence to the Subsequent System. |
Safety (S) | The Safety metric value measures the impact regarding the Safety of a human actor or participant that can be predictably injured as a result of the vulnerability being exploited. |
Modified Integrity Impact to the Subsequent System (without Not Defined) (cvss:MSI_NoX:1.0.1) JSON Example
{
"namespace": "cvss",
"key": "MSI_NoX",
"version": "1.0.1",
"name": "Modified Integrity Impact to the Subsequent System (without Not Defined)",
"description": "This metric measures the impact to integrity of a successfully exploited vulnerability. Integrity refers to the trustworthiness and veracity of information. Integrity of a system is impacted when an attacker causes unauthorized modification of system data. Integrity is also impacted when a system user can repudiate critical actions taken in the context of the system (e.g. due to insufficient logging). The resulting score is greatest when the consequence to the system is highest. This version does not include the Not Defined (X) option.",
"schemaVersion": "2.0.0",
"values": [
{
"key": "N",
"name": "Negligible",
"description": "There is negligible loss of integrity within the Subsequent System or all integrity impact is constrained to the Vulnerable System."
},
{
"key": "L",
"name": "Low",
"description": "Modification of data is possible, but the attacker does not have control over the consequence of a modification, or the amount of modification is limited. The data modification does not have a direct, serious impact to the Subsequent System."
},
{
"key": "H",
"name": "High",
"description": "There is a total loss of integrity, or a complete loss of protection. For example, the attacker is able to modify any/all files protected by the Subsequent System. Alternatively, only some files can be modified, but malicious modification would present a direct, serious consequence to the Subsequent System."
},
{
"key": "S",
"name": "Safety",
"description": "The Safety metric value measures the impact regarding the Safety of a human actor or participant that can be predictably injured as a result of the vulnerability being exploited."
}
]
}
Modified Availability Impact to the Subsequent System (without Not Defined) (cvss:MSA_NoX:1.0.1)
This metric measures the impact on availability a successful exploit of the vulnerability will have on the Subsequent System. This version does not include the Not Defined (X) option.
Value | Definition |
---|---|
Negligible (N) | There is negligible impact to availability within the Subsequent System or all availability impact is constrained to the Vulnerable System. |
Low (L) | Performance is reduced or there are interruptions in resource availability. Even if repeated exploitation of the vulnerability is possible, the attacker does not have the ability to completely deny service to legitimate users. |
High (H) | There is a total loss of availability, resulting in the attacker being able to fully deny access to resources in the Subsequent System; this loss is either sustained (while the attacker continues to deliver the attack) or persistent (the condition persists even after the attack has completed). |
Safety (S) | The Safety metric value measures the impact regarding the Safety of a human actor or participant that can be predictably injured as a result of the vulnerability being exploited. |
Modified Availability Impact to the Subsequent System (without Not Defined) (cvss:MSA_NoX:1.0.1) JSON Example
{
"namespace": "cvss",
"key": "MSA_NoX",
"version": "1.0.1",
"name": "Modified Availability Impact to the Subsequent System (without Not Defined)",
"description": "This metric measures the impact on availability a successful exploit of the vulnerability will have on the Subsequent System. This version does not include the Not Defined (X) option.",
"schemaVersion": "2.0.0",
"values": [
{
"key": "N",
"name": "Negligible",
"description": "There is negligible impact to availability within the Subsequent System or all availability impact is constrained to the Vulnerable System."
},
{
"key": "L",
"name": "Low",
"description": "Performance is reduced or there are interruptions in resource availability. Even if repeated exploitation of the vulnerability is possible, the attacker does not have the ability to completely deny service to legitimate users."
},
{
"key": "H",
"name": "High",
"description": "There is a total loss of availability, resulting in the attacker being able to fully deny access to resources in the Subsequent System; this loss is either sustained (while the attacker continues to deliver the attack) or persistent (the condition persists even after the attack has completed)."
},
{
"key": "S",
"name": "Safety",
"description": "The Safety metric value measures the impact regarding the Safety of a human actor or participant that can be predictably injured as a result of the vulnerability being exploited."
}
]
}
Analyst Decision Model
Below we provide an example deployer prioritization policy that maps the decision points just listed to the outcomes described above.
Decision Model Visualization
The following diagram shows the decision model for the EQ4 decision.
---
title: CVSS v4 Equivalence Set 4 Decision Table (cvss:DT_CVSS4_EQ4:1.0.0)
---
graph LR
n1(( ))
subgraph s1["cvss:SC:1.0.0"]
N_L0([N])
L_L0([L])
H_L0([H])
end
subgraph s2["cvss:MSI_NoX:1.0.1"]
N_N_L1([N])
L_N_L1([N])
N_L_L1([L])
H_N_L1([N])
L_L_L1([L])
N_H_L1([H])
H_L_L1([L])
L_H_L1([H])
N_S_L1([S])
H_H_L1([H])
L_S_L1([S])
H_S_L1([S])
end
subgraph s3["cvss:MSA_NoX:1.0.1"]
N_N_N_L2([N])
L_N_N_L2([N])
N_L_N_L2([N])
N_N_L_L2([L])
H_N_N_L2([N])
L_L_N_L2([N])
N_H_N_L2([N])
L_N_L_L2([L])
N_L_L_L2([L])
N_N_H_L2([H])
H_L_N_L2([N])
L_H_N_L2([N])
N_S_N_L2([N])
H_N_L_L2([L])
L_L_L_L2([L])
N_H_L_L2([L])
L_N_H_L2([H])
N_L_H_L2([H])
N_N_S_L2([S])
H_H_N_L2([N])
L_S_N_L2([N])
H_L_L_L2([L])
L_H_L_L2([L])
N_S_L_L2([L])
H_N_H_L2([H])
L_L_H_L2([H])
N_H_H_L2([H])
L_N_S_L2([S])
N_L_S_L2([S])
H_S_N_L2([N])
H_H_L_L2([L])
L_S_L_L2([L])
H_L_H_L2([H])
L_H_H_L2([H])
N_S_H_L2([H])
H_N_S_L2([S])
L_L_S_L2([S])
N_H_S_L2([S])
H_S_L_L2([L])
H_H_H_L2([H])
L_S_H_L2([H])
H_L_S_L2([S])
L_H_S_L2([S])
N_S_S_L2([S])
H_S_H_L2([H])
H_H_S_L2([S])
L_S_S_L2([S])
H_S_S_L2([S])
end
subgraph s4["cvss:EQ4:1.0.0"]
N_N_N_L_L3([L])
L_N_N_L_L3([L])
N_L_N_L_L3([L])
N_N_L_L_L3([L])
H_N_N_M_L3([M])
L_L_N_L_L3([L])
N_H_N_M_L3([M])
L_N_L_L_L3([L])
N_L_L_L_L3([L])
N_N_H_M_L3([M])
H_L_N_M_L3([M])
L_H_N_M_L3([M])
N_S_N_H_L3([H])
H_N_L_M_L3([M])
L_L_L_L_L3([L])
N_H_L_M_L3([M])
L_N_H_M_L3([M])
N_L_H_M_L3([M])
N_N_S_H_L3([H])
H_H_N_M_L3([M])
L_S_N_H_L3([H])
H_L_L_M_L3([M])
L_H_L_M_L3([M])
N_S_L_H_L3([H])
H_N_H_M_L3([M])
L_L_H_M_L3([M])
N_H_H_M_L3([M])
L_N_S_H_L3([H])
N_L_S_H_L3([H])
H_S_N_H_L3([H])
H_H_L_M_L3([M])
L_S_L_H_L3([H])
H_L_H_M_L3([M])
L_H_H_M_L3([M])
N_S_H_H_L3([H])
H_N_S_H_L3([H])
L_L_S_H_L3([H])
N_H_S_H_L3([H])
H_S_L_H_L3([H])
H_H_H_M_L3([M])
L_S_H_H_L3([H])
H_L_S_H_L3([H])
L_H_S_H_L3([H])
N_S_S_H_L3([H])
H_S_H_H_L3([H])
H_H_S_H_L3([H])
L_S_S_H_L3([H])
H_S_S_H_L3([H])
end
n1 --- N_L0
n1 --- L_L0
n1 --- H_L0
N_L0 --- N_N_L1
N_N_L1 --- N_N_N_L2
N_N_N_L2 --- N_N_N_L_L3
L_L0 --- L_N_L1
L_N_L1 --- L_N_N_L2
L_N_N_L2 --- L_N_N_L_L3
N_L0 --- N_L_L1
N_L_L1 --- N_L_N_L2
N_L_N_L2 --- N_L_N_L_L3
N_N_L1 --- N_N_L_L2
N_N_L_L2 --- N_N_L_L_L3
H_L0 --- H_N_L1
H_N_L1 --- H_N_N_L2
H_N_N_L2 --- H_N_N_M_L3
L_L0 --- L_L_L1
L_L_L1 --- L_L_N_L2
L_L_N_L2 --- L_L_N_L_L3
N_L0 --- N_H_L1
N_H_L1 --- N_H_N_L2
N_H_N_L2 --- N_H_N_M_L3
L_N_L1 --- L_N_L_L2
L_N_L_L2 --- L_N_L_L_L3
N_L_L1 --- N_L_L_L2
N_L_L_L2 --- N_L_L_L_L3
N_N_L1 --- N_N_H_L2
N_N_H_L2 --- N_N_H_M_L3
H_L0 --- H_L_L1
H_L_L1 --- H_L_N_L2
H_L_N_L2 --- H_L_N_M_L3
L_L0 --- L_H_L1
L_H_L1 --- L_H_N_L2
L_H_N_L2 --- L_H_N_M_L3
N_L0 --- N_S_L1
N_S_L1 --- N_S_N_L2
N_S_N_L2 --- N_S_N_H_L3
H_N_L1 --- H_N_L_L2
H_N_L_L2 --- H_N_L_M_L3
L_L_L1 --- L_L_L_L2
L_L_L_L2 --- L_L_L_L_L3
N_H_L1 --- N_H_L_L2
N_H_L_L2 --- N_H_L_M_L3
L_N_L1 --- L_N_H_L2
L_N_H_L2 --- L_N_H_M_L3
N_L_L1 --- N_L_H_L2
N_L_H_L2 --- N_L_H_M_L3
N_N_L1 --- N_N_S_L2
N_N_S_L2 --- N_N_S_H_L3
H_L0 --- H_H_L1
H_H_L1 --- H_H_N_L2
H_H_N_L2 --- H_H_N_M_L3
L_L0 --- L_S_L1
L_S_L1 --- L_S_N_L2
L_S_N_L2 --- L_S_N_H_L3
H_L_L1 --- H_L_L_L2
H_L_L_L2 --- H_L_L_M_L3
L_H_L1 --- L_H_L_L2
L_H_L_L2 --- L_H_L_M_L3
N_S_L1 --- N_S_L_L2
N_S_L_L2 --- N_S_L_H_L3
H_N_L1 --- H_N_H_L2
H_N_H_L2 --- H_N_H_M_L3
L_L_L1 --- L_L_H_L2
L_L_H_L2 --- L_L_H_M_L3
N_H_L1 --- N_H_H_L2
N_H_H_L2 --- N_H_H_M_L3
L_N_L1 --- L_N_S_L2
L_N_S_L2 --- L_N_S_H_L3
N_L_L1 --- N_L_S_L2
N_L_S_L2 --- N_L_S_H_L3
H_L0 --- H_S_L1
H_S_L1 --- H_S_N_L2
H_S_N_L2 --- H_S_N_H_L3
H_H_L1 --- H_H_L_L2
H_H_L_L2 --- H_H_L_M_L3
L_S_L1 --- L_S_L_L2
L_S_L_L2 --- L_S_L_H_L3
H_L_L1 --- H_L_H_L2
H_L_H_L2 --- H_L_H_M_L3
L_H_L1 --- L_H_H_L2
L_H_H_L2 --- L_H_H_M_L3
N_S_L1 --- N_S_H_L2
N_S_H_L2 --- N_S_H_H_L3
H_N_L1 --- H_N_S_L2
H_N_S_L2 --- H_N_S_H_L3
L_L_L1 --- L_L_S_L2
L_L_S_L2 --- L_L_S_H_L3
N_H_L1 --- N_H_S_L2
N_H_S_L2 --- N_H_S_H_L3
H_S_L1 --- H_S_L_L2
H_S_L_L2 --- H_S_L_H_L3
H_H_L1 --- H_H_H_L2
H_H_H_L2 --- H_H_H_M_L3
L_S_L1 --- L_S_H_L2
L_S_H_L2 --- L_S_H_H_L3
H_L_L1 --- H_L_S_L2
H_L_S_L2 --- H_L_S_H_L3
L_H_L1 --- L_H_S_L2
L_H_S_L2 --- L_H_S_H_L3
N_S_L1 --- N_S_S_L2
N_S_S_L2 --- N_S_S_H_L3
H_S_L1 --- H_S_H_L2
H_S_H_L2 --- H_S_H_H_L3
H_H_L1 --- H_H_S_L2
H_H_S_L2 --- H_H_S_H_L3
L_S_L1 --- L_S_S_L2
L_S_S_L2 --- L_S_S_H_L3
H_S_L1 --- H_S_S_L2
H_S_S_L2 --- H_S_S_H_L3
Table of Values
The table below shows the values for the decision model. Each row of the table corresponds to a path through the decision model diagram above.
Row | Confidentiality Impact to the Subsequent System v1.0.0 (cvss) | Modified Integrity Impact to the Subsequent System (without Not Defined) v1.0.1 (cvss) | Modified Availability Impact to the Subsequent System (without Not Defined) v1.0.1 (cvss) | Equivalence Set 4 v1.0.0 (cvss) |
---|---|---|---|---|
0 | negligible | negligible | negligible | low |
1 | low | negligible | negligible | low |
2 | negligible | low | negligible | low |
3 | negligible | negligible | low | low |
4 | high | negligible | negligible | medium |
5 | low | low | negligible | low |
6 | negligible | high | negligible | medium |
7 | low | negligible | low | low |
8 | negligible | low | low | low |
9 | negligible | negligible | high | medium |
10 | high | low | negligible | medium |
11 | low | high | negligible | medium |
12 | negligible | safety | negligible | high |
13 | high | negligible | low | medium |
14 | low | low | low | low |
15 | negligible | high | low | medium |
16 | low | negligible | high | medium |
17 | negligible | low | high | medium |
18 | negligible | negligible | safety | high |
19 | high | high | negligible | medium |
20 | low | safety | negligible | high |
21 | high | low | low | medium |
22 | low | high | low | medium |
23 | negligible | safety | low | high |
24 | high | negligible | high | medium |
25 | low | low | high | medium |
26 | negligible | high | high | medium |
27 | low | negligible | safety | high |
28 | negligible | low | safety | high |
29 | high | safety | negligible | high |
30 | high | high | low | medium |
31 | low | safety | low | high |
32 | high | low | high | medium |
33 | low | high | high | medium |
34 | negligible | safety | high | high |
35 | high | negligible | safety | high |
36 | low | low | safety | high |
37 | negligible | high | safety | high |
38 | high | safety | low | high |
39 | high | high | high | medium |
40 | low | safety | high | high |
41 | high | low | safety | high |
42 | low | high | safety | high |
43 | negligible | safety | safety | high |
44 | high | safety | high | high |
45 | high | high | safety | high |
46 | low | safety | safety | high |
47 | high | safety | safety | high |