What is the Common Vulnerability Scoring System (CVSS)?
- Işınsu Unaran
- Jun 10
- 4 min read
In cybersecurity, not all vulnerabilities are created equal. Some weaknesses in a system may pose only minor risks, while others could lead to full-scale breaches or infrastructure disruptions. To make sense of these differences and help organizations prioritize responses, the industry relies on a standardized framework called the Common Vulnerability Scoring System, or CVSS.
CVSS is used to evaluate the severity of software vulnerabilities in a consistent and measurable manner. It assigns a numerical score (from 0.0 to 10.0) based on how easy it is to exploit a given vulnerability and how much damage it could potentially cause. Whether you’re an IT admin scanning patch reports or a security analyst triaging alerts, understanding CVSS helps you make informed decisions quickly.
What is CVSS?
CVSS is a publicly available framework developed and maintained by the Forum of Incident Response and Security Teams (FIRST). It provides a universal language for describing the risk posed by security flaws. CVSS scores are often included in vulnerability databases, such as the National Vulnerability Database (NVD), and are referenced by security tools, patch management systems, and compliance frameworks worldwide.
The main goal of CVSS is to make vulnerability severity more objective. Instead of vague terms like "high risk" or "medium risk," it delivers a score based on concrete technical factors, giving organizations a clearer picture of where to focus resources.
CVSS Scoring Criteria
CVSS scoring is based on three core metric groups:
1. Base Metrics
These reflect the intrinsic characteristics of a vulnerability that do not change based on the environment in which it’s found. The base metrics include:
Attack Vector: How remote or close an attacker must be (e.g., network, adjacent network, local access, or physical access).
Attack Complexity: The level of skill or conditions required to exploit the vulnerability.
Privileges Required: Whether the attacker needs to be authenticated or authorized.
User Interaction: Whether a user needs to do something (like clicking a link) to trigger the vulnerability.
Impact Metrics: The potential effects on confidentiality, integrity, and availability of systems or data.
2. Temporal Metrics
These reflect the characteristics of a vulnerability that may change over time:
Exploitability: Whether an exploit is publicly available.
Remediation Level: Whether a fix or workaround exists.
Report Confidence: How reliable the vulnerability report is.
3. Environmental Metrics
These adjust the score based on the specific environment or context where the vulnerability exists. For example, a vulnerability that affects a non-critical system might be less severe than one affecting a hospital’s patient management database, even if the technical characteristics are the same.

How is CVSS Calculated?
The CVSS scoring formula combines the values from the Base, Temporal, and Environmental metrics into a single number. The most commonly referenced value is the Base Score, which ranges from 0.0 to 10.0. Here’s how the scoring typically breaks down:
0.0 – 3.9: Low severity
4.0 – 6.9: Medium severity
7.0 – 8.9: High severity
9.0 – 10.0: Critical severity
Each metric in the base score contributes mathematically to the final number. For example, if a vulnerability can be exploited over the internet (Attack Vector: Network), requires no authentication (Privileges Required: None), and gives complete control of a system (high impact on Confidentiality, Integrity, and Availability), it would receive a higher score than one that requires physical access and has limited impact.
Tools like the FIRST CVSS Calculator enable users to input specific values and automatically generate a score. These tools are widely used by vulnerability managers and Security Operations Center (SOC) teams.
Example: CVSS Score in Action
Let’s say a new vulnerability is discovered in a popular content management system (CMS). Here's how it might be scored:
Attack Vector – Network: Can be exploited remotely
Attack Complexity – Low: No special conditions needed
Privileges Required – None: Attacker doesn’t need a login
User Interaction – None: Doesn’t require users to click anything
Impact on Confidentiality – High: Attacker gains access to sensitive data
Impact on Integrity – High: Attacker can modify data
Impact on Availability – High: Attacker can take the system offline
Given these metrics, the vulnerability might be assigned a Base Score of 9.8, categorized as Critical. That indicates to security teams that this is a top-priority issue requiring immediate remediation.
Now, let’s say the environment has already segmented the affected system and limited access using strong access controls. The Environmental Metrics might reduce the score slightly for that organization, but the urgency to patch remains clear across most environments.
Why CVSS Matters
The CVSS framework provides a shared language for discussing risk. It helps vendors, security researchers, and defenders align on what needs urgent attention. Without CVSS or a similar standard, every organization would be left to interpret vulnerability risks differently, leading to misaligned priorities and inconsistent security practices.
That said, CVSS is only one part of a broader risk assessment process. A high score doesn’t always mean a vulnerability is critical in your specific environment, and a lower score doesn’t mean it can be ignored. Business context, exposure, asset criticality, and real-world exploitability should also factor into any decision-making process.
Contact DataFlowX today to consult our expert team about your systems' vulnerability level and explore how you can improve your organization's cybersecurity posture.