NVD - Vulnerability Metrics (2024)

The Common Vulnerability Scoring System (CVSS) is a method used to supply a qualitative measure of severity. CVSS is not a measure of risk. CVSS v2.0 and CVSS v3.x consist of three metric groups: Base, Temporal, and Environmental. The Base metrics result in a numerical score ranging from 0 to 10, which can then be modified by assessing the Temporal and Environmental metrics. A CVSS assessment is also represented as a vector string, a compressed textual representation of the values used to derive the score. Thus, CVSS is well suited as a standard measurement system for industries, organizations, and governments that need accurate and consistent vulnerability severity scores. Two common uses of CVSS are calculating the severity of vulnerabilities discovered on one's systems and as a factor in prioritization of vulnerability remediation activities. The National Vulnerability Database (NVD) provides CVSS assessments for all publishedCVE records.

The NVD supports Common Vulnerability Scoring System (CVSS) v2.0 and v3.x standards. However, per the NVD CVSS v2.0 Retirementannouncement, we no longer provide CVSS v2.0 assessments for newly published CVE records.The NVD provides CVSS assessments of Base metrics the innate characteristics of each vulnerability. The NVD does not currently provide assessments for Temporal metrics (metrics that change over time due to events external to the vulnerability) or Environmental metrics (metrics customized to reflect the impact of the vulnerability to a particular organization). However, the NVD does supply a CVSS calculator for both CVSS v2.0 and v3.x to allow you to add temporal and environmental data.

The CVSS specifications are owned and managed by FIRST.Org, Inc. (FIRST), a US-based non-profit organization, whose mission is to help computer security incident response teams across the world. The official CVSS documentation can be found at https://www.first.org/cvss/.

NVD CVSS Calculators

NVD CVSS v2.0 Calculator

NVD CVSS v3.x Calculator

Qualitative Severity Ratings

NVD notates qualitative severity ratings of "Low", "Medium", and "High" for CVSS v2.0 base score ranges in addition to the severity ratings for CVSS v3.x as they are defined in the CVSS v3.x specifications.

CVSS v2.0 Ratings

CVSS v3.x Ratings

Severity

Severity Score Range

Severity

Severity Score Range

None* 0.0
Low 0.0-3.9 Low 0.1-3.9
Medium 4.0-6.9 Medium 4.0-6.9
High 7.0-10.0 High 7.0-8.9
Critical 9.0-10.0

*Note: The CVSS specification allows for the application of vector strings that result in a 0.0 severity score. However, the NVD does not assess CVSS vector strings that have no impacts. Per the CVE Program's definition of a vulnerability, there should not be a CVE record counted that does not cause an impact to confidentiality, integrity, or availability.

NVD Specific CVSS Information

Incomplete Data

With some vulnerabilities, all of the information needed to assess CVSS vector strings may not be available. This typically happens when a vendor or maintainer announces a vulnerability but declines to provide certain details. In such situations, NVD analysts assign CVSS metric values using a worst case scenario approach. Thus, if a published vulnerability provides no details about the vulnerability, NVD analysts will assess that vulnerability as a 10.0 (the highest rating).

Collaboration with Industry

NVD staff are willing to work with the security community regarding CVSS assessment results. If you wish to contribute additional information or request amendments regarding NVD assessed CVSS vector strings, please send email to nvd@nist.gov. We actively work with users that provide us feedback.

Legacy CVSS Information

As of July 13th, 2022, the NVD no longer generates Vector Strings, Qualitative Severity Ratings, or Severity Scores for CVSS v2.0. Existing CVSS v2.0 information will remain in the database but the NVD will no longer actively populate CVSS v2.0 vector strings for newCVEs. This change comes as CISA policies that rely on NVD data fully transition away from CVSS v2.0. NVD analysts will continue to use the reference information provided with the CVE and any publicly available information at the time of analysis to associate Reference Tags, CVSS v3.1, CWE, and CPE Applicability statements.

The NVD began supporting the CVSS v3.1 guidance on September 10th, 2019. The NVD will not be offering CVSS v3.0 and v3.1 vector strings for the same CVE. All new and re-analyzed CVE assessments will be done using the CVSS v3.1 guidance.

Vector strings for the CVE vulnerabilities published between to 11/10/2005 and 11/30/2006 have been upgraded from CVSS version 1.0 data. CVSS v1.0 metrics did not contain the granularity of CVSS v2.0 and so they are marked as "Version 2.0 upgrade from v1.0" within NVD. While these are approximations, they are expected to be reasonably accurate CVSS v2.0 representations.

Vector strings provided for the 13,000 CVE vulnerabilities published prior to 11/9/2005 are approximated from only partially available CVSS metric data. In particular, the following CVSS metrics are only partially available for these vulnerabilities and NVD assumes certain values based on an approximation algorithm: Access Complexity, Authentication, Confidentiality Impact of 'partial', Integrity Impact of 'partial', Availability Impact of 'partial', and the impact biases.

NVD - Vulnerability Metrics (2024)

FAQs

What is the NVD database for vulnerabilities? ›

The NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance.

What is the difference between NVD and CVE? ›

CVE – Common Vulnerabilities and Exposures (CVE) is a list of publicly disclosed vulnerabilities and exposures that is maintained by MITRE. NVD – The National Vulnerability Database (NVD) is a database, maintained by NIST, that is fully synchronized with the MITRE CVE list.

What is the difference between NVD and NIST? ›

The NVD serves as the U.S. government repository of publicly disclosed cybersecurity vulnerabilities. NIST maintains the database to enable improved security in both government and commercial applications. At its core, the NVD is a cybersecurity information-sharing platform.

What are CVSS metrics? ›

Defining CVSS Scores

CVSS Scores are a mainstay in most vulnerability management programs as the primary metric by which one vulnerability is compared with another for purposes of prioritization. There are three metric groups that make up every CVSS score – Base, Temporal, and Environmental.

Who maintains the national vulnerability database? ›

The NVD is a comprehensive repository of vulnerability intelligence maintained by the National Institute of Standards and Technology (NIST) in the United States.

What are the two main databases used for storing vulnerability information? ›

Major vulnerability databases such as the ISS X-Force database, Symantec / SecurityFocus BID database, and the Open Source Vulnerability Database (OSVDB) aggregate a broad range of publicly disclosed vulnerabilities, including Common Vulnerabilities and Exposures (CVE).

When would you use the NVD? ›

NVD is a resource that provides detailed information about security vulnerabilities. It includes security updates, descriptions, affected systems, and links to related documentation. You can use this data source to keep your resources updated with the latest patches and repairs.

What is CVE, CWE, and NVD? ›

Published Oct 6, 2023. CVE, CWE, and NVD are all related to computer security and are used to identify and address vulnerabilities in software and hardware systems: 1. CVE (Common Vulnerabilities and Exposures): - CVE is a dictionary of publicly known information security vulnerabilities and exposures.

Does every vulnerability have a CVE? ›

No. This information can already be found in numerous vulnerability websites, databases, and security tool databases. CVE does not have this information because CVE is intended to link these different vulnerability capabilities, not to replace them.

What is replacing NIST? ›

That will change under the DoD's Cybersecurity Maturity Model Certification (CMMC) program, which establishes third-party assessment mechanisms to verify compliance with NIST 800-171. CMMC requirements are expected to start to appear in defense contracts in late 2024.

How often is NVD updated? ›

NVD is updated on an hourly basis on normal United States Government business days.

Why is ISO better than NIST? ›

Certification. ISO 27001 provides globally recognized certification through a third-party audit, which can be costly but improves your organization's reputation as a trustworthy corporation. Such a certificate is not available via the NIST CSF.

What is vulnerability metrics? ›

The Common Vulnerability Scoring System (CVSS) is a method used to supply a qualitative measure of severity. CVSS is not a measure of risk.

How is vulnerability risk score calculated? ›

A vulnerability instance risk score calculates 3 factors; Technical Severity, Threats, and Tags. To calculate the final and business-contextualized risk of a vulnerability instance, Vulcan uses the risk weights you defined.

What is the highest CVE score? ›

Scores range from 0 to 10, with 10 being the most severe. While many use only the CVSS Base score for determining severity, temporal and environmental scores also exist, to factor in availability of mitigations and how widespread vulnerable systems are within an organization, respectively.

What is a vulnerability database? ›

Cyber Warfare

The vulnerability database is the result of an effort to collect information about all known security flaws in software.

What is Neo4j vulnerability? ›

A path traversal vulnerability found in the apoc. export. * procedures of apoc plugins in Neo4j Graph database. The issue allows a malicious actor to potentially break out of the expected directory. The vulnerability is such that files could only be created but not overwritten.

What is the purpose of the CVE database? ›

The mission of the CVE ® Program is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities. There is one CVE Record for each vulnerability in the catalog.

What are two known databases to check for vulnerabilities in components being used? ›

Popular Vulnerability Databases
  • NVD (National Vulnerability Database) The NVD was established in 2005 by the US government. ...
  • OSVDB (Open Source Vulnerability Database)

Top Articles
Latest Posts
Article information

Author: Edwin Metz

Last Updated:

Views: 5801

Rating: 4.8 / 5 (58 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Edwin Metz

Birthday: 1997-04-16

Address: 51593 Leanne Light, Kuphalmouth, DE 50012-5183

Phone: +639107620957

Job: Corporate Banking Technician

Hobby: Reading, scrapbook, role-playing games, Fishing, Fishing, Scuba diving, Beekeeping

Introduction: My name is Edwin Metz, I am a fair, energetic, helpful, brave, outstanding, nice, helpful person who loves writing and wants to share my knowledge and understanding with you.