📘Cisco Certified CyberOps Associate (200-201 CBROPS)
The Common Vulnerability Scoring System (CVSS) is a standardized way to measure the severity of security vulnerabilities in software, systems, or networks. Each vulnerability gets a score from 0.0 to 10.0, where 0 = no risk and 10 = critical risk.
CVSS is split into three groups of metrics: Base, Temporal, and Environmental. For the exam, focus is mostly on Base Metrics, which describe the intrinsic characteristics of a vulnerability.
The key CVSS terms you need to know are:
1. Attack Vector (AV)
- Definition: This tells us how an attacker can exploit the vulnerability.
- Options:
- Network (N): The attack can be launched over a network, such as through the internet. Example: Exploiting a web server vulnerability remotely.
- Adjacent (A): The attacker needs to be on the same network segment. Example: Exploiting a Wi-Fi network vulnerability from within the office.
- Local (L): The attacker must have local access to the system. Example: Exploiting a vulnerability by logging in to a server.
- Physical (P): The attacker must physically touch or plug in a device. Example: Exploiting a USB firmware vulnerability.
Key point: The more remote the attacker can be, the higher the risk.
2. Attack Complexity (AC)
- Definition: Describes how hard it is to successfully exploit the vulnerability.
- Options:
- Low (L): Easy to exploit, no special conditions needed. Example: A misconfigured web server allows anyone to access admin functions.
- High (H): Requires special conditions, advanced knowledge, or timing. Example: Exploiting a buffer overflow that only works under specific network traffic conditions.
Key point: Easier exploits increase the severity score.
3. Privileges Required (PR)
- Definition: Tells what level of access the attacker already needs before exploiting the vulnerability.
- Options:
- None (N): The attacker doesn’t need any login or access. Example: Exploiting an open web application.
- Low (L): Requires basic access. Example: Exploiting a user account to gain administrative access.
- High (H): Requires full admin/root access. Example: Exploiting a service as root to take over the system further.
Key point: Vulnerabilities that require no privileges are more severe.
4. User Interaction (UI)
- Definition: Indicates if a human must do something for the attack to succeed.
- Options:
- None (N): No user action needed. Example: Remote code execution on a server that runs automatically.
- Required (R): A user must take some action, like opening a file or clicking a link. Example: Phishing emails that trick employees into opening a malicious attachment.
Key point: No user interaction = higher severity score.
5. Scope (S)
- Definition: Determines whether the vulnerability affects only the targeted system or can affect other connected systems.
- Options:
- Unchanged (U): The impact stays within the vulnerable system. Example: Exploiting a database vulnerability that only affects that database.
- Changed (C): The impact can extend to other systems. Example: Exploiting a web server that then allows attacks on the backend database server.
Key point: Scope change usually increases the risk rating.
6. Confidentiality (C)
- Definition: Measures how much sensitive information can be accessed by exploiting the vulnerability.
- Options:
- None (N): No information is exposed.
- Low (L): Some non-critical information can be accessed. Example: Reading user email addresses.
- High (H): Critical information is exposed. Example: Accessing passwords, encryption keys, or customer PII.
7. Integrity (I)
- Definition: Measures how much the attacker can modify or corrupt data.
- Options:
- None (N): Data cannot be altered.
- Low (L): Limited changes possible. Example: Changing non-critical user settings.
- High (H): Major changes possible. Example: Altering financial records in a database.
8. Availability (A)
- Definition: Measures how much the vulnerability can disrupt system operations.
- Options:
- None (N): No impact on availability.
- Low (L): Minor disruption, temporary downtime. Example: Restarting a service.
- High (H): Major disruption, complete system outage. Example: DoS attack taking down a web server.
Quick CVSS Exam Tip:
Think of CVSS as a formula to measure how bad a vulnerability is, using these questions:
- Can the attacker reach it remotely? (Attack Vector)
- Is it easy or hard to exploit? (Attack Complexity)
- Do they need access already? (Privileges Required)
- Does anyone have to do something? (User Interaction)
- Can it spread beyond the target? (Scope)
- Can they see sensitive data? (Confidentiality)
- Can they change data? (Integrity)
- Can they disrupt services? (Availability)
If you answer these, you can figure out the CVSS score, which helps prioritize fixing the vulnerability.
