The Common Vulnerability Scoring System (CVSS) serves as the industry standard for assessing the severity of security vulnerabilities. With the introduction of CVSS 4.0, there are significant changes that increase the precision and relevance of these assessments. Compared to CVSS 3.1, the new version brings significant innovations that will have a profound impact on the handling of security threats. This article analyses the differences between versions 3.1 and 4.0, highlights the most important changes and discusses their significance.
The Common Vulnerability Scoring System is a framework for assessing the severity of security vulnerabilities in information systems. It is based on a set of metrics that are divided into three main categories:
This structured approach enables a differentiated assessment of the risks posed by security vulnerabilities and helps organisations to prioritise their responses accordingly.
While the basic structure of the Basic Metrics remains largely unchanged, CVSS 4.0 adds the “Attack Requirements” metric to the category. This innovation evaluates the conditions for a successful attack. In addition to the existing metric “Attack Complexity”, which measures the difficulty of developing a functioning exploit, it now also records whether a vulnerable component must be in a specific state for the attack to be successful. The removal of the “scope” metric, which was often seen as misleading and problematic in the past, and its replacement with a more detailed view of the affected systems, significantly improves the clarity and applicability of the framework.
The conversion of “Temporal Metrics” to “Threat Metrics “ represents a significant change. By focussing on the “Exploit Maturity”, the evaluation is simplified and at the same time the relevance of the score with regard to the actual threat situation is increased.
The extension of the “Environmental Metrics” enables a more precise assessment of the impact on downstream systems, whereby the risk for the primary and other affected systems is better mapped.
A completely new element in CVSS 4.0 are the “Supplemental Metrics”. These provide additional information that have no direct influence on the overall score, but can make a decisive contribution to risk assessment. For example, they enable an assessment of whether automated exploits are feasible or how urgently a manufacturer recommends rectifying a vulnerability, how long it takes to restore the system integrity or how time-consuming incident response management is for an incident that affects the corresponding system. With the introduction of these metrics, FIRST is demonstrating that CVSS is increasingly being used outside of traditional IT systems, for example in industrial control systems and IoT devices.
The update to CVSS 4.0 enables a more precise risk assessment. For developers and IT security teams, this means that security vulnerabilities can now be analysed in greater detail, leading to targeted prioritisation and remediation. The introduction of “Supplemental Metrics” improves communication about security risks, both internally between departments and externally with partners and customers. This promotes a deeper understanding of security threats and supports a more effective risk management strategy. End users benefit indirectly from the improvements, as a more accurate risk assessment leads to faster responses to threats. By prioritising security updates more efficiently, vulnerabilities can be fixed more quickly, which strengthens the protection of personal and business-critical data.
CVSS 4.0 reflects the adaptation to the increasing complexity of cyber-attacks and provides organisations with an advanced risk management toolset.
By simplifying the presentation of results. Unlike previous versions that provided different scores for different aspects of the assessment, CVSS 4.0 strives to reduce complexity and increase clarity by providing a single, comprehensive score at the end of the assessment process. This change aims to simplify decision-making for IT security teams and provide a more direct interpretation of the security posture. Consolidating to one overall score instead of three not only simplifies risk assessment, but also promotes more efficient communication across security risks by making core information more accessible and understandable.
[1] Common Vulnerability Scoring System Version 4.0, FIRST,
https://www.first.org/cvss/v4-0/
[2] CVSS v4.0 Specification Document, FIRST,
https://www.first.org/cvss/v4.0/specification-document
[3] Einstufung von Sicherheitslücken: Der CVSS-4.0-Standard ist da, heise online,
https://www.heise.de/news/Einstufung-von-Sicherheitsluecken-Der-CVSS-4-0-Standard-ist-da-9352555.html
[4] Die wichtigsten Änderungen der neuen Schwachstellenbewertung CVSS 4.0, heise online,
https://www.heise.de/hintergrund/Die-wichtigsten-Aenderungen-der-neuen-Schwachstellenbewertung-CVSS-4-0-9318903.html
[5] Here Comes CVSS v4.0, Dave Dugal (Juniper Networks) & Dale Rich (Black & Veatch),
https://csrc.nist.gov/csrc/media/Presentations/2023/update-on-cvss-4-0/jan-25-2023-ssca-dugal-rich.pdf