CVSS Calculator

Calculate vulnerability severity scores using the Common Vulnerability Scoring System. Select a version below to begin your assessment.

Configure Metrics

Score updates in real-time

Represent the intrinsic characteristics of a vulnerability that are constant over time and across user environments

Reflects the context by which vulnerability exploitation is possible

The vulnerable system is bound to the network stack and the attacker's path is through OSI layer 3

The vulnerable system is bound to a protocol stack, but attack is limited at protocol level to a logically adjacent topology

The vulnerable system is not bound to the network stack and the attacker's path is via read/write/execute capabilities

The attack requires the attacker to physically touch or manipulate the vulnerable system

Describes the conditions beyond the attacker's control that must exist in order to exploit the vulnerability

Specialized access conditions or extenuating circumstances do not exist

A successful attack depends on conditions beyond the attacker's control

Captures the prerequisite deployment and execution conditions or variables of the vulnerable system

No specialized pre-conditions are necessary for exploitation

Some specialized pre-conditions must be present for exploitation

Describes the level of privileges an attacker must possess before successfully exploiting the vulnerability

The attacker is unauthorized prior to attack

The attacker requires privileges that provide basic user capabilities

The attacker requires privileges that provide significant control over system resources

Captures the requirement for a human user, other than the attacker, to participate in the successful compromise

The vulnerable system can be exploited without interaction from any human user

Successful exploitation requires limited interaction by the targeted user

Successful exploitation requires specific user interaction

Measures the impact to the confidentiality of the information managed by the vulnerable system

There is no loss of confidentiality within the vulnerable system

There is some loss of confidentiality

There is a total loss of confidentiality

Measures the impact to integrity of a successfully exploited vulnerability

There is no loss of integrity within the vulnerable system

Modification of data is possible, but the attacker does not have control

There is a total loss of integrity

Measures the impact to the availability of the vulnerable system

There is no impact to availability within the vulnerable system

Performance is reduced or there are interruptions in resource availability

There is a total loss of availability

Measures the impact to the confidentiality of subsequent systems

There is no impact to confidentiality of subsequent systems

There is some loss of confidentiality in subsequent systems

There is a total loss of confidentiality in subsequent systems

Measures the impact to integrity of subsequent systems

There is no impact to integrity of subsequent systems

Modification of data in subsequent systems is possible

There is a total loss of integrity in subsequent systems

Measures the impact to the availability of subsequent systems

There is no impact to availability of subsequent systems

Performance is reduced or there are interruptions in subsequent systems

There is a total loss of availability in subsequent systems

CVSS v4.0

0.0
None

Vector

CyberPath Quant Logo
Never Miss an Update!
Get the latest updates from CyberPath, including new features, articles, and cybersecurity insights delivered straight to your inbox.
CVSS Score Manager
Loading scores...