ARTICLE AD BOX
Digital Security
Aggregate vulnerability scores don’t show nan full communicative – nan narration betwixt a flaw’s nationalist severity standing and nan circumstantial risks it poses for your institution is much analyzable than it seems

13 Dec 2024 • , 3 min. read

Mention vulnerability and spot guidance to a cybersecurity squad and they each person nan aforesaid dismayed look of fatigue and exhaustion. The CVE database continues to turn astatine a sizeable pace, pinch acold excessively galore of nan known vulnerabilities starting life arsenic zero-days. When Ankur Sand and Syed Islam, 2 diligent cybersecurity professionals from JPMorganChase, took to nan shape astatine Black Hat Europe pinch a position titled “The CVSS Deception: How We’ve Been Misled connected Vulnerability Severity”, nan room was overflowing.
The presenters person analyzed Common Vulnerability Scoring System (CVSS) scores to item really nan symptom constituent of vulnerabilities and patching could perchance beryllium reduced. (Note that while their study focused connected type 3 of nan methodology, alternatively than nan existent type 4, they did mention that from a precocious level they expect a akin conclusion.)
They covered six areas that request further clarity to thief teams make informed decisions connected nan urgency to patch. I americium not going to repetition each six successful this blog post, but location are a mates that stood out.
The hidden risks down CVSS scores
The first 1 is related to nan vulnerability scoring connected effect that is past surgery down into confidentiality, integrity and availability. Each is individually scored and these scores are mixed to supply an aggregated score, which is yet published. If 1 of nan divided categories receives nan maximum people but nan different 2 do not, nan wide severity is reduced. This results successful a imaginable precocious people being lowered – by example, successful their study this typically takes an 8+ down to a 7.5. In 2023 alone, nan squad sighted 2,000 instances wherever this happened.
For organizations pinch a argumentation prioritizing CVSS scores of 8+ successful their patching queues, a 7.5 would not beryllium a privilege – contempt it qualifying arsenic 8+ successful a azygous category. And, wherever nan 1 class is nan astir important successful a circumstantial instance, nan vulnerability whitethorn not person nan urgency and attraction it warrants. While I person each sympathy pinch nan issue, we should besides admit that nan scoring strategy does person to commencement location and to a definite level beryllium applicable to everyone; also, retrieve that it does evolve.
The different rumor they raised that seemed to spark liking pinch nan assemblage is that of dependencies. The presenters highlighted really a vulnerability tin only beryllium exploited nether circumstantial conditions. If a vulnerability pinch a precocious people besides requires X & Y to beryllium exploited and these don’t beryllium successful immoderate environments aliases implementations, past teams whitethorn beryllium rushing to spot erstwhile nan privilege could beryllium lower. The situation present is knowing what assets location are successful granular detail, thing only a well-resourced cybersecurity squad whitethorn achieve.
Unfortunately, galore mini businesses whitethorn beryllium astatine nan different extremity of nan spectrum of being good resourced, pinch small to nary disposable assets to moreover run effectively. And, having an in-depth position connected each nan assets successful play, moreover down to what limitations are wrong each plus whitethorn beryllium a agelong to far. The mention of Log4j makes nan constituent present – galore companies were caught disconnected defender and did not cognize they relied connected package that contained this unfastened root code.
Every institution has their ain unsocial exertion situation pinch varying policies, truthful nary solution will ever beryllium cleanable for everyone. On nan different hand, I’m judge much broad information and evolved standards will thief teams make their ain informed judgements connected vulnerability severity and patching severity according to their ain institution policies. But for smaller companies, I fishy nan symptom of needing to spot based connected nan aggregated people will remain; nan solution is apt champion answered pinch automation wherever possible.
An absorbing perspective connected this taxable whitethorn beryllium nan role of cyber-insurers, immoderate of which already alert companies to nan request to spot systems based connected vulnerability disclosures and patches being publically available. As cyber-insurance policies require much in-depth knowledge of a company’s environment to ascertain nan risk, past insurers whitethorn person nan granular insights needed to prioritize vulnerabilities effectively. This creates a imaginable opportunity for insurers to assistance organizations successful minimizing risk, which yet benefits some nan company’s information posture and nan insurer’s bottommost line.
Discussions connected standards specified arsenic CVSS show conscionable really important it is for these frameworks to support up pinch nan evolving information landscape. The position by nan JPMorganChase squad shed ray connected immoderate cardinal issues and added awesome worth to nan conversation, truthful I applaud them connected a awesome presentation.
Let america support you
up to date
Sign up for our newsletters