Vulnerability

A vulnerability is a weakness that could be exploited or triggered by a threat source in internal controls, procedures for systems security, an information system, or implementation. A weakness is synonymous with deficiency and may result in security or privacy risks or both.

In cybersecurity terms, a vulnerability is a security exposure that exists in an operating system, in system software, or in an application software component. Each vulnerability can potentially compromise the system or network if exploited.

There are multiple publicly accessible databases of vulnerabilities, sometimes based on the version numbers of software. <a href="https://cve.mitre.org/" id="">Common Vulnerabilities and Exposures</a> (CVE) is a common means of enumerating publicly known information security vulnerabilities operated by The MITRE Corporation.

CVE identifiers assign each vulnerability with a unique name/number, The Common Vulnerability Scoring System (CVSS) is an open industry standard owned and managed by FIRST.Org, Inc. (FIRST), a US-based non-profit organization.

CVSS 3.1 identifies the severity of a vulnerability based on the following metrics:

Base metrics

  • Access vector (what access is required: local, adjacent network, network, physical)
  • Access complexity (how easy or hard it is to exploit)
  • Privileges required (what level of privileges an attacker requires before exploiting the vulnerability successfully)
  • User interaction (whether the attacker requires a separate user or user-initiated process to exploit the vulnerability)

Impact metrics

  • Scope (whether a vulnerability in one component impacts resources beyond its security scope)
  • Confidentiality (is the confidentiality of data impacted)</li><li>Integrity (what is the impact on the integrity of the system)
  • Availability (will the system remain fully functional, experience reduced performance or capabilities, or become unavailable)

A flaw may be the result of poor design or implementation mistakes, and results in unintended functionality. There are also temporal metrics (exploit code maturity, remediation level, and report confidence) and environmental metrics (modified base metrics and confidentiality requirement, integrity requirement, and availability requirement).

The Common Weakness Enumeration (CWE) is a list of software and hardware weaknesses that have security ramifications. Weakness severity is scored using Common Weakness Scoring System (CWSS™) and Common Weakness Risk Analysis Framework (CWRAF™)</a> and are based on base findings, attack surface, and environmental metrics. An attacker may exploit vulnerabilities, weaknesses, or user errors individually or combine them to carry out an attack. These metrics help incident response teams and cybersecurity professionals determine the threat level of a vulnerability and how to best address it.