CVSS v4 Equivalence Set EQ5
Here we describe an example decision model for an analyst assessing the CVSS v4 equivalence set EQ5.
Analyst Units of Work
Analyst Unit of Work
The unit of work for an Analyst is a single vulnerability report.
Analysts are usually tasked with assessing the CVSS score for an individual vulnerability report.
Analyst Decision Outcomes
The analyst's decision is to choose the appropriate level for CVSS v4 EQ5.
Equivalence Set 5 (cvss:EQ5:1.0.0)
E with 3 levels specified in Table 28
Value | Definition |
---|---|
Low (L) | 2: E:U |
Medium (M) | 1: E:P |
High (H) | 0: E:A |
Equivalence Set 5 (cvss:EQ5:1.0.0) JSON Example
{
"namespace": "cvss",
"key": "EQ5",
"version": "1.0.0",
"name": "Equivalence Set 5",
"description": "E with 3 levels specified in Table 28",
"schemaVersion": "2.0.0",
"values": [
{
"key": "L",
"name": "Low",
"description": "2: E:U"
},
{
"key": "M",
"name": "Medium",
"description": "1: E:P"
},
{
"key": "H",
"name": "High",
"description": "0: E:A"
}
]
}
Analyst Decision Points
Exploit Maturity (without Not Defined) (cvss:E_NoX:2.0.0)
This metric measures the likelihood of the vulnerability being attacked, and is based on the current state of exploit techniques, exploit code availability, or active, “in-the-wild” exploitation. This version does not include the Not Defined (X) option.
Value | Definition |
---|---|
Unreported (U) | Based on available threat intelligence each of the following must apply: No knowledge of publicly available proof-of-concept exploit code No knowledge of reported attempts to exploit this vulnerability No knowledge of publicly available solutions used to simplify attempts to exploit the vulnerability (i.e., neither the “POC” nor “Attacked” values apply) |
Proof-of-Concept (P) | Based on available threat intelligence each of the following must apply: Proof-of-concept exploit code is publicly available No knowledge of reported attempts to exploit this vulnerability No knowledge of publicly available solutions used to simplify attempts to exploit the vulnerability (i.e., the “Attacked” value does not apply) |
Attacked (A) | Based on available threat intelligence either of the following must apply: Attacks targeting this vulnerability (attempted or successful) have been reported Solutions to simplify attempts to exploit the vulnerability are publicly or privately available (such as exploit toolkits) |
Exploit Maturity (without Not Defined) (cvss:E_NoX:2.0.0) JSON Example
{
"namespace": "cvss",
"key": "E_NoX",
"version": "2.0.0",
"name": "Exploit Maturity (without Not Defined)",
"description": "This metric measures the likelihood of the vulnerability being attacked, and is based on the current state of exploit techniques, exploit code availability, or active, “in-the-wild” exploitation. This version does not include the Not Defined (X) option.",
"schemaVersion": "2.0.0",
"values": [
{
"key": "U",
"name": "Unreported",
"description": "Based on available threat intelligence each of the following must apply: No knowledge of publicly available proof-of-concept exploit code No knowledge of reported attempts to exploit this vulnerability No knowledge of publicly available solutions used to simplify attempts to exploit the vulnerability (i.e., neither the “POC” nor “Attacked” values apply)"
},
{
"key": "P",
"name": "Proof-of-Concept",
"description": "Based on available threat intelligence each of the following must apply: Proof-of-concept exploit code is publicly available No knowledge of reported attempts to exploit this vulnerability No knowledge of publicly available solutions used to simplify attempts to exploit the vulnerability (i.e., the “Attacked” value does not apply)"
},
{
"key": "A",
"name": "Attacked",
"description": "Based on available threat intelligence either of the following must apply: Attacks targeting this vulnerability (attempted or successful) have been reported Solutions to simplify attempts to exploit the vulnerability are publicly or privately available (such as exploit toolkits)"
}
]
}
Analyst Decision Model
Below we provide an example deployer prioritization policy that maps the decision points just listed to the outcomes described above.
Decision Model Visualization
The following diagram shows the decision model for the EQ5 decision.
---
title: CVSS v4 Equivalence Set 5 Decision Table (cvss:DT_CVSS_EQ5:1.0.0)
---
graph LR
n1(( ))
subgraph s1["cvss:E_NoX:2.0.0"]
U_L0([U])
P_L0([P])
A_L0([A])
end
subgraph s2["cvss:EQ5:1.0.0"]
U_L_L1([L])
P_M_L1([M])
A_H_L1([H])
end
n1 --- U_L0
n1 --- P_L0
n1 --- A_L0
U_L0 --- U_L_L1
P_L0 --- P_M_L1
A_L0 --- A_H_L1
Table of Values
The table below shows the values for the decision model. Each row of the table corresponds to a path through the decision model diagram above.
Row | Exploit Maturity (without Not Defined) v2.0.0 (cvss) | Equivalence Set 5 v1.0.0 (cvss) |
---|---|---|
0 | unreported | low |
1 | proof-of-concept | medium |
2 | attacked | high |