Cybersecurity CVSS CVSSv4

What's New in CVSSv4? Exploring the Latest Vulnerability Scoring System

Pallavi Vishwakarma

Member of Technical Staff

Apr 28 2023

4 min reading

What's New in CVSSv4? Exploring the Latest Vulnerability Scoring System
Figure 1

The Common Vulnerability Scoring System (CVSS) is a framework used by cybersecurity professionals to assess the severity of vulnerabilities in software and systems. CVSS provides a score that indicates the severity of a vulnerability, based on several metrics such as the ease of exploitation, impact on confidentiality, integrity, and availability, and the required level of user interaction. In January 2023, the National Institute of Standards and Technology (NIST) released an update on CVSS 4.0, outlining the changes and improvements made to the framework.


CVSS chronology:


CVSS has undergone a number of versions, with each version incorporating new metrics and improvements. The first version of CVSS was released in 2005, followed by CVSS v2 in 2007, which introduced several new metrics such as Access Vector, Access Complexity, and Authentication. In 2015, CVSS v3 was released, which addressed some of the limitations of previous versions and introduced new metrics, such as Attack Vector and Attack Complexity. While CVSS has been an effective tool for vulnerability assessment, it has also faced criticism for some of its shortcomings.


Challenges of v3 and goals of v4


Despite the improvements made in CVSS v3, there were still some limitations that needed to be addressed. One of the key challenges of CVSS v3 was the scoring system was difficult to interpret, leading to confusion among users, with vulnerabilities being assigned a single score without taking into account the specific circumstances required for an attacker to exploit the vulnerability. The goal of CVSS v4 was to address this limitation by introducing new metrics that provide a more comprehensive assessment of vulnerabilities and their potential impact.


What's new in cvssv4?


CVSS is not just the Base Score, now new nomenclature has been adopted:

  • CVSS-B: CVSS Base Score
  • CVSS-BT: CVSS Base + Threat Score
  • CVSS-BE: CVSS Base + Environmental Score
  • CVSS-BTE: CVSS Base + Threat + Environmental Score

In CVSSv4, Temporal metrics has been renamed to Threat in which Remediation Level (RL) and Report Confidence (RC) has been retired and “Exploit code maturity” has been renamed to “Exploit maturity”.


New Base metric: Attack Requirements (AT) is added which Reflects the prerequisite conditions of the vulnerable component that make the attack possible.


In the Base metric: User Interface (UI) new values have been added 

  • Passive (P): Successful exploitation of this vulnerability requires limited interaction by the targeted user with the vulnerable component 
  • Active (A): Successful exploitation of this vulnerability requires a targeted user to perform specific, conscious interactions with the vulnerable component.

Base metric: Scope (S) has been removed and in its place impact metrics have expanded on two sets Vulnerable System (Confidentiality (VC), Integrity (VI), Availability (VA)) and Subsequent Systems (Confidentiality (SC), Integrity (SI), Availability (SA)).


A new metric has been added in Cvssv4: Supplemental metric group: It provides the ability to define new metrics that describe and measure additional extrinsic attributes of a vulnerability. It includes the following:

  • Automable (A): The “Automatable” metric captures the answer to the question ”Can an attacker automate the exploitation of this vulnerability across multiple targets?” based on steps 1-4 of the kill chain: reconnaissance, weaponization, delivery, and exploitation. 

Metric value:

  • No (N): Attackers cannot reliably automate all steps of the kill chain.
  • Yes (Y): Attackers can reliably automate all steps of the kill chain.
  • Recovery (R): This metric describes the resilience of a Component/System to recover services, in terms of performance and availability, after an attack has been performed.

Metric value:

  • Automatic (A): The Component/System recovers automatically after an attack.
  • User (U): The Component/System requires manual intervention by the user to recover services, after an attack.
  • Irrecoverable (I): The Component/System is irrecoverable by the user, after an attack.
  • Value Density (V): Value Density describes the resources that the attacker will gain control over with a single exploitation event. It has two possible values, diffuse and concentrated.

Metric value:

  • Diffuse (D) The system that contains the vulnerable component has limited resources. 
  • Concentrated (C) The system that contains the vulnerable component is rich in resources.
  • Vulnerability Response Effort (RE): Provides supplemental information on how difficult it is for consumers to provide an initial response to the impact of vulnerabilities for deployed products and services in their infrastructure.

Metric value:

  • Low (L) The effort required to respond to a vulnerability is low/trivial.
  • Moderate (M) The actions required to respond to a vulnerability require some effort on behalf of the consumer and could cause minimal service impact to implement.
  • High (H) The actions required to respond to a vulnerability are significant and/or difficult, and may possibly lead to an extended, scheduled service impact.
  • Provider Urgency (U): It facilitates a standardized method to incorporate additional provider-supplied assessment, an optional “pass-through” Supplemental Metric called Provider Urgency has been defined.

Metric value:

  • Red (R) …the highest urgency
  • Amber (A) …a moderate urgency
  • Green (G) …a reduced urgency
  • Clear (C) …low or no urgency (i.e.: Informational)

More focus on OT/Safety: The conventional C/I/A trio of logical impacts no longer accurately describes many vulnerabilities, hence the new Cvssv4 also concentrates outside of this triad. It includes:

  • Consumer-assessed Safety (MSI:S, MSA:S)
  • Provider-assessed Safety through Safety (S) supplemental metric

Final thoughts:


The update on CVSS 4.0 represents a significant improvement to the framework, providing a more accurate and nuanced assessment of the severity of vulnerabilities. The addition of new metrics allows for a more comprehensive assessment of vulnerabilities and their potential impact. With the guidance and best practices provided by NIST, cybersecurity professionals can use CVSS 4.0 effectively to assess vulnerabilities and prioritize remediation efforts.


SecOps Solution is an agent-less Risk-based Vulnerability Management Platform that helps organizations identify, prioritize and remediate security vulnerabilities and misconfigurations in seconds.


To schedule a demo, drop us a note at


View SecOps Solution in action

Sign up for a personalized one-on-one walk-through.