CVSS (Common Vulnerability Scoring System) is an international standard for measuring the severity of security vulnerabilities in software and systems.
Table of Contents
CVSS uses vendor-neutral criteria and a standardized scoring methodology to express vulnerability severity in a consistent, quantitative way.
By relying on objective metrics rather than vendor-specific interpretations, CVSS enables organizations to compare vulnerabilities across products, environments, and industries using a common language.
The purpose of CVSS is to help organizations consistently assess, compare, and prioritize vulnerabilities based on severity. CVSS scores provide a structured input into vulnerability management and risk-based remediation decisions.
Each vulnerability is assigned a numerical score ranging from 0.0 to 10.0, which is also mapped to qualitative severity levels:
Because of its standardized approach, CVSS is widely used by security teams, vendors, incident responders, and vulnerability databases as a primary reference for remediation prioritization.
CVSS is maintained by the CVSS Special Interest Group (CVSS-SIG) under FIRST (Forum of Incident Response and Security Teams). FIRST is an international cybersecurity organization focused on improving incident response and vulnerability coordination worldwide.
Since its introduction, CVSS has undergone multiple revisions to reflect changes in technology and threat landscapes. The most recent major update was announced in July 2023, with CVSS v4.0 officially released in November 2023, marking a significant evolution in how vulnerability severity is evaluated.
FIRST describes CVSS as a framework designed to provide “a standardized approach for assessing the severity of vulnerabilities and helping organizations prioritize response efforts.”
— FIRST (Forum of Incident Response and Security Teams)
CVSS v4.0 is the latest major version of the CVSS framework, designed to address structural limitations in earlier versions. It improves scoring accuracy, reduces ambiguity, and expands applicability beyond traditional IT environments.
Most notably, CVSS v4.0 introduces clearer metric separation, greater scoring granularity, and explicit support for Operational Technology (OT), Industrial Control Systems (ICS), and IoT environments, reflecting how modern organizations actually operate.
CVSS v4.0 is composed of four metric groups that evaluate vulnerability severity from different perspectives. These groups can be combined to calculate scores aligned to specific use cases.
The four metric groups are:
Each group serves a distinct purpose within vulnerability assessment and response workflows.
Base Metrics measure the inherent severity of a vulnerability, independent of external conditions. They evaluate both how difficult a vulnerability is to exploit and the potential impact if exploitation occurs.
Base Metrics are typically assessed by the product vendor and, once defined, remain stable over time. In CVSS v4.0, Base Metrics have been refined to improve clarity and granularity, enabling more precise severity scoring.
Threat Metrics evaluate how actively a vulnerability is being exploited in real-world conditions. This metric group focuses on whether exploit code exists and whether exploitation has been observed in the wild.
Because threat activity changes over time, Threat Metrics are inherently dynamic and are generally assessed by vulnerability consumers using threat intelligence and operational context.
Key considerations include:
Environmental Metrics tailor vulnerability severity to an organization’s specific environment. They account for how critical the affected system is to confidentiality, integrity, and availability within a given organization.
As a result, Environmental Metric scores may differ significantly between organizations depending on system role, business impact, and operational constraints.
Supplemental Metrics provide additional contextual information to support vulnerability response decisions. While they do not influence CVSS score calculations, they offer valuable insight for remediation planning.
Examples of factors captured by Supplemental Metrics include:
These metrics help organizations move from severity assessment to practical response planning.
CVSS v4.0 supports multiple score types based on different combinations of metric groups. This allows organizations to assess vulnerability severity from baseline, environmental, and real-time threat perspectives.
The primary CVSS score types include:
For example, organizations assessing vulnerability severity within their own environment typically rely on CVSS-BE, while those incorporating active threat intelligence use CVSS-BTE.
CVSS v4.0 was developed to address well-documented challenges in CVSS v3.1. Over time, CVSS v3.1 became increasingly misaligned with modern systems and threat conditions.
FIRST identified several key issues, including:
Challenges of CVSS v3.1 as published by FIRST, summarized and translated for clarity.
The updates introduced in CVSS v4.0 make vulnerability scoring more precise, actionable, and relevant. Each change directly targets a limitation identified in previous versions.
Key improvements include:
FIRST notes that CVSS v4.0 was designed to “better reflect real-world exploitation conditions and modern system architectures.”
The most significant enhancement in CVSS v4.0 is its explicit inclusion of Operational Technology (OT) environments. This is the first CVSS version to formally account for vulnerabilities that may have physical safety implications.
As digital transformation continues to blur the line between IT and OT, vulnerabilities in industrial systems can directly impact production, safety, and human life. CVSS v4.0 reflects this reality by incorporating safety-aware metrics and downstream impact considerations.
To use CVSS v4.0 effectively, organizations must adapt vulnerability management practices to account for both IT and OT realities. While CVSS v4.0 improves visibility, response challenges remain—particularly in OT environments.
Key differences include:
Without personnel who understand both IT and OT contexts, organizations may struggle to act on vulnerability insights alone.
OT asset visibility and exploit prevention are essential when traditional patching is not practical. Organizations must first understand what OT assets they own before they can manage associated vulnerabilities.
Effective OT vulnerability risk reduction typically involves:
These controls help prevent exploitation and reduce risk even when vulnerabilities cannot be remediated through patching.
Trend Vision One™ offers a Cyber Risk Exposure Management (CREM) solution that goes beyond basic CVSS scoring to help organizations understand, prioritize, and reduce risk across their entire attack surface. It combines vulnerability severity scoring with real-time threat intelligence and contextual risk analysis, enabling security teams to make faster, smarter decisions.
This approach integrates key capabilities such as Attack Surface Management, Vulnerability Management, and Security Posture Assessment across IT, OT, cloud, and hybrid environments. It’s not just about identifying vulnerabilities—it’s about turning insights into actionable steps that strengthen resilience and minimize exposure.
With Cyber Risk Exposure Management, you can:
CVSS stands for Common Vulnerability Scoring System. It is a standardized framework used to measure the severity of security vulnerabilities in software and systems. CVSS provides numerical scores that help organizations compare vulnerabilities consistently and prioritize remediation efforts.
A CVSS score is a numerical value that represents the severity of a vulnerability. Scores range from 0.0 to 10.0, with higher scores indicating greater risk. These scores are commonly categorized as Low, Medium, High, or Critical.
CVSS scores are used by security teams, vendors, and vulnerability databases worldwide. Organizations rely on them to prioritize patching, guide incident response, and support risk-based vulnerability management decisions across diverse environments.
CVSS v4.0 improves accuracy and applicability compared to CVSS v3.1. It introduces greater scoring granularity, simplifies threat evaluation, and expands coverage to OT, ICS, and IoT environments while reducing scoring ambiguity.
CVSS v4.0 includes four metric groups that assess vulnerability severity from different perspectives. These are Base Metrics, Threat Metrics, Environmental Metrics, and Supplemental Metrics, which together support more context-aware severity scoring.