throbber

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n
`
`
`
`ITU-T
`
`TELECOMMUNICATION
`STANDARDIZATION SECTOR
`OF ITU
`
`X.1521
`
`(03/2016)
`
`SERIES X: DATA NETWORKS, OPEN SYSTEM
`COMMUNICATIONS AND SECURITY
`
`Cybersecurity information exchange – Vulnerability/state
`exchange
`
`
`
`Common vulnerability scoring system 3.0
`
`Recommendation ITU-T X.1521
`
`
`
`
`
`WIZ, Inc. EXHIBIT - 1106
`WIZ, Inc. v. Orca Security LTD.
`
`

`

`
`
`ITU-T X-SERIES RECOMMENDATIONS
`
`DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY
`
`
`
`PUBLIC DATA NETWORKS
`OPEN SYSTEMS INTERCONNECTION
`INTERWORKING BETWEEN NETWORKS
`MESSAGE HANDLING SYSTEMS
`DIRECTORY
`OSI NETWORKING AND SYSTEM ASPECTS
`OSI MANAGEMENT
`SECURITY
`OSI APPLICATIONS
`OPEN DISTRIBUTED PROCESSING
`INFORMATION AND NETWORK SECURITY
`General security aspects
`Network security
`Security management
`Telebiometrics
`SECURE APPLICATIONS AND SERVICES
`Multicast security
`Home network security
`Mobile security
`Web security
`Security protocols
`Peer-to-peer security
`Networked ID security
`IPTV security
`CYBERSPACE SECURITY
`Cybersecurity
`Countering spam
`Identity management
`SECURE APPLICATIONS AND SERVICES
`Emergency communications
`Ubiquitous sensor network security
`PKI related Recommendations
`CYBERSECURITY INFORMATION EXCHANGE
`Overview of cybersecurity
`Vulnerability/state exchange
`Event/incident/heuristics exchange
`Exchange of policies
`Heuristics and information request
`Identification and discovery
`Assured exchange
`CLOUD COMPUTING SECURITY
`Overview of cloud computing security
`Cloud computing security design
`Cloud computing security best practices and guidelines
`Cloud computing security implementation
`Other cloud computing security
`
`
`For further details, please refer to the list of ITU-T Recommendations.
`
`
`
`
`
`
`X.1–X.199
`X.200–X.299
`X.300–X.399
`X.400–X.499
`X.500–X.599
`X.600–X.699
`X.700–X.799
`X.800–X.849
`X.850–X.899
`X.900–X.999
`
`X.1000–X.1029
`X.1030–X.1049
`X.1050–X.1069
`X.1080–X.1099
`
`X.1100–X.1109
`X.1110–X.1119
`X.1120–X.1139
`X.1140–X.1149
`X.1150–X.1159
`X.1160–X.1169
`X.1170–X.1179
`X.1180–X.1199
`
`X.1200–X.1229
`X.1230–X.1249
`X.1250–X.1279
`
`X.1300–X.1309
`X.1310–X.1339
`X.1340–X.1349
`
`X.1500–X.1519
`X.1520–X.1539
`X.1540–X.1549
`X.1550–X.1559
`X.1560–X.1569
`X.1570–X.1579
`X.1580–X.1589
`
`X.1600–X.1601
`X.1602–X.1639
`X.1640–X.1659
`X.1660–X.1679
`X.1680–X.1699
`
`
`

`

`Recommendation ITU-T X.1521
`
`
`
`Common vulnerability scoring system 3.0
`
`Summary
`
`Recommendation ITU-T X.1521 on the common vulnerability scoring system (CVSS) provides an
`open framework for communicating the characteristics and impacts of information and communication
`technologies (ICT) vulnerabilities in the commercial or open source software used in communications
`networks, end user devices, or any of the other types of ICT capable of running software. The goal of
`the Recommendation is to enable ICT managers, vulnerability bulletin providers, security vendors,
`application vendors and researchers to speak from a common language of scoring ICT vulnerabilities.
`
`History
`
`Edition Recommendation Approval
`
`Study Group
`
`Unique ID*
`
`1.0
`
`2.0
`
`
`
`ITU-T X.1521
`
`2011-04-20
`
`ITU-T X.1521
`
`2016-03-23
`
`17
`
`17
`
`11.1002/1000/11062
`
`11.1002/1000/12614
`
`Keywords
`
`Common vulnerability scoring system, CVSS, CYBEX, , metrics.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`* To access the Recommendation, type the URL http://handle.itu.int/ in the address field of your web
`browser, followed by the Recommendation's unique ID. For example, http://handle.itu.int/11.1002/1000/1
`1830-en.
`
`
`
`
`
`Rec. ITU-T X.1521 (03/2016)
`
`i
`
`

`

`
`
`FOREWORD
`
`The International Telecommunication Union (ITU) is the United Nations specialized agency in the
`field of telecommunications, information and communication technologies (ICTs). The ITU
`Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is
`responsible for studying technical, operating and tariff questions and issuing Recommendations on
`them with a view to standardizing telecommunications on a worldwide basis.
`
`The World Telecommunication Standardization Assembly (WTSA), which meets every four years,
`establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations
`on these topics.
`
`The approval of ITU-T Recommendations is covered by the procedure laid down in WTSA
`Resolution 1.
`
`In some areas of information technology which fall within ITU-T's purview, the necessary standards
`are prepared on a collaborative basis with ISO and IEC.
`
`
`
`
`
`
`
`NOTE
`
`In this Recommendation, the expression "Administration" is used for conciseness to indicate both a
`telecommunication administration and a recognized operating agency.
`
`Compliance with this Recommendation is voluntary. However, the Recommendation may contain
`certain mandatory provisions (to ensure, e.g., interoperability or applicability) and compliance with
`the Recommendation is achieved when all of these mandatory provisions are met. The words "shall"
`or some other obligatory language such as "must" and the negative equivalents are used to express
`requirements. The use of such words does not suggest that compliance with the Recommendation is
`required of any party.
`
`
`
`
`
`
`
`INTELLECTUAL PROPERTY RIGHTS
`
`ITU draws attention to the possibility that the practice or implementation of this Recommendation
`may involve the use of a claimed Intellectual Property Right. ITU takes no position concerning the
`evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU
`members or others outside of the Recommendation development process.
`
`As of the date of approval of this Recommendation, ITU had not received notice of intellectual
`property, protected by patents, which may be required to implement this Recommendation. However,
`implementers are cautioned that this may not represent the latest information and are therefore
`strongly urged to consult the TSB patent database at http://www.itu.int/ITU-T/ipr/.
`
`
`
`
`
` ITU 2016
`
`All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior
`written permission of ITU.
`
`ii
`
`Rec. ITU-T X.1521 (03/2016)
`
`

`

`
`
`Table of Contents
`
`
`
`1
`
`2
`
`3
`
`4
`
`5
`
`6
`
`Scope .............................................................................................................................
`
`References .....................................................................................................................
`
`Definitions ....................................................................................................................
`
`3.1
`
`3.2
`
`Terms defined elsewhere ................................................................................
`
`Terms defined in this Recommendation .........................................................
`
`Abbreviations and acronyms ........................................................................................
`
`Conventions ..................................................................................................................
`
`About common vulnerability scoring system ...............................................................
`
`6.1
`
`6.2
`
`6.3
`
`6.4
`
`6.5
`
`6.6
`
`6.7
`
`6.8
`
`Introduction ....................................................................................................
`
`Base metrics ....................................................................................................
`
`Temporal metrics ............................................................................................
`
`Environmental metrics ....................................................................................
`
`Qualitative severity rating scale .....................................................................
`
`Vector string ...................................................................................................
`
`CVSS v3.0 XML schema definition ...............................................................
`
`CVSS v3.0 equations ......................................................................................
`
`Appendix I – CVSS v3.0 user guide ........................................................................................
`
`I.1
`
`I.2
`
`I.3
`
`I.4
`
`I.5
`
`Introduction ....................................................................................................
`
`Changes in CVSS v3.0 ...................................................................................
`
`Scoring guide ..................................................................................................
`
`Glossary of terms ............................................................................................
`
`Scoring rubric .................................................................................................
`
`Appendix II – Resources and links ..........................................................................................
`
`Bibliography.............................................................................................................................
`
`
`
`Page
`
`1
`
`1
`
`1
`
`1
`
`1
`
`2
`
`3
`
`3
`
`3
`
`5
`
`10
`
`12
`
`14
`
`14
`
`16
`
`16
`
`19
`
`19
`
`19
`
`23
`
`25
`
`26
`
`29
`
`30
`
`
`
`
`
`Rec. ITU-T X.1521 (03/2016)
`
`iii
`
`

`

`
`
`Introduction
`
`The common vulnerability scoring system (CVSS) is an open framework for communicating the
`characteristics and severity of software vulnerabilities. CVSS consists of three metric groups: base,
`temporal, and environmental. The base group represents the intrinsic qualities of a vulnerability, the
`temporal group reflects the characteristics of a vulnerability that change over time, and the
`environmental group represents the characteristics of a vulnerability that are unique to a user's
`environment. The base metrics produce a score ranging from 0 to 10, which can then be modified by
`scoring the temporal and environmental metrics. A CVSS score is also represented as a vector string,
`a compressed textual representation of the values used to derive the score. This Recommendation
`provides the official specification for CVSS v3.0.
`
`CVSS v3.0 represents radical improvements over CVSS v2.0 and is not backward compatible with
`it. During the use of CVSS v2.0, several limitations of that specification came to light. Some of them
`are: scoring vulnerabilities in virtual environment, representing ''indirect'' vulnerabilities like cross
`site scripting, lack of ability to capture interdependencies between applications within the same
`system and capturing actions of a user other than attacker. More information of v3.0 improvements
`is given in Appendix I, clause 2.
`
`While working to address these limitations, CVSS working group realised that it is not possible to
`maintain backward compatibility with the CVSS v2.0. While acknowledging that lack of
`compatibility will cause some issues with existing systems that use and process CVSS v2.0, it is our
`belief that version 3.0 brings sufficient value that would compensate for the inconvenience. We are
`strongly advising users and vendors that are currently producing and processing CVSS v2.0 to migrate
`to CVSS v3.0.
`
`While the CVSS v2.0 specification will continue to be available for historic purposes it will cease to
`be in force. Implementers of tools and processes are strongly encouraged to adopt the CVSS v3.0
`specification while keeping support for v2.0 in order to process existing vulnerabilities already scored
`with the v2.0 specification.
`
`
`
`iv
`
`Rec. ITU-T X.1521 (03/2016)
`
`

`

`Recommendation ITU-T X.1521
`
`
`
`Common vulnerability scoring system 3.0
`
`1
`
`Scope
`
`This Recommendation provides a standardized approach for communicating the characteristics and
`impacts of ICT vulnerabilities using temporal and environmental metrics that apply contextual
`information to more accurately reflect the risk to each user's unique environment.
`
`This Recommendation is technically equivalent and compatible with the "Common Vulnerability
`Scoring System (CVSS) version 3", 10 June 2015 which can be found at the website
`http://www.first.org/cvss
`
`2
`
`References
`
`The following ITU-T Recommendations and other references contain provisions which, through
`reference in this text, constitute provisions of this Recommendation. At the time of publication, the
`editions indicated were valid. All Recommendations and other references are subject to revision;
`users of this Recommendation are therefore encouraged to investigate the possibility of applying the
`most recent edition of the Recommendations and other references listed below. A list of the currently
`valid ITU-T Recommendations is regularly published. The reference to a document within this
`Recommendation does not give it, as a stand-alone document, the status of a Recommendation.
`
`None.
`
`3
`
`Definitions
`
`3.1
`
`Terms defined elsewhere
`
`This Recommendation uses the following term defined elsewhere:
`
`vulnerability [b-ITU-T X.1500]: Any weakness that could be exploited to violate a system
`3.1.1
`or the information it contains.
`
`3.2
`
`Terms defined in this Recommendation
`
`This Recommendation defines the following terms:
`
`access: A subject's ability to view, modify, or communicate with an object. Access enables
`3.2.1
`the flow of information between the subject and the object.
`
`3.2.2
`
`availability: The reliable and timely access to data and resources by authorized individuals.
`
`confidentiality: A security principle that works to ensure that information is not disclosed to
`3.2.3
`unauthorized subjects.
`
`integrity: A security principle that makes sure that information and systems are not modified
`3.2.4
`maliciously or accidentally.
`
`3.2.5
`
`risk: The relative impact that an exploited vulnerability would have to a user's environment.
`
`3.2.6
`
`threat: The likelihood or frequency of a harmful event occurring.
`
`
`
`
`
`Rec. ITU-T X.1521 (03/2016)
`
`1
`
`

`

`
`
`4
`
`Abbreviations and acronyms
`
`This Recommendation uses the following abbreviations and acronyms:
`
`A
`
`AC
`
`AR
`
`Availability Impact
`
`Attack Complexity
`
`Availability Requirement
`
`ARP
`
`Address Resolution Protocol
`
`AV
`
`C
`
`CIA
`
`CPU
`
`CR
`
`CVE
`
`Attack Vector
`
`Confidentiality Impact
`
`Confidentiality, Integrity and Availability
`
`Central Processing Unit
`
`Confidentiality Requirement
`
`Common Vulnerability Exposure
`
`CVSS
`
`Common Vulnerability Scoring System
`
`CWE
`
`Common Weakness Enumeration
`
`DMA
`
`Direct Memory Access
`
`DNS
`
`Domain Name System
`
`DOM
`
`Document Object Model
`
`DoS
`
`Denial-of-Service
`
`E
`
`I
`
`Exploit code maturity
`
`Integrity impact
`
`ICT
`
`Information and Communication Technologies
`
`ID
`
`IP
`
`IR
`
`ISC
`
`IT
`
`LAN
`
`MA
`
`Identifier
`
`Internet Protocol
`
`Integrity Requirement
`
`Impact Sub Score
`
`Information Technology
`
`Local Area Network
`
`Modified Availability
`
`MAC
`
`Modified Attack Complexity
`
`MAV
`
`Modified Attack Vector
`
`MC
`
`MI
`
`Modified Confidentiality impact
`
`Modified Integrity
`
`MPR
`
`Modified Privileges Required
`
`MS
`
`MUI
`
`Modified Scope
`
`Modified User Interaction
`
`NIST
`
`National Institute of Standards
`
`OS
`
`Operating System
`
`2
`
`Rec. ITU-T X.1521 (03/2016)
`
`

`

`OSI
`
`Open Systems Interconnection
`
`PCI DSS Payment Card Industry Data Security Standard
`
`
`
`PR
`
`RC
`
`RL
`
`Privileges Required
`
`Report Confidence
`
`Remediation Level
`
`RPC
`
`Remote Procedure Call
`
`S
`
`Scope
`
`SCAP
`
`Security Content Automation Protocol
`
`SQL
`
`TCP
`
`UI
`
`USB
`
`VM
`
`XSS
`
`Structured Query Language
`
`Transmission Control Protocol
`
`User Interaction
`
`Universal Serial Bus
`
`Virtual Machine
`
`Cross Site Scripting
`
`5
`
`Conventions
`
`None.
`
`6
`
`About common vulnerability scoring system
`
`The common vulnerability scoring system (CVSS) is an open framework for communicating the
`characteristics and severity of software vulnerabilities. CVSS consists of three metric groups: Base,
`Temporal, and Environmental. The Base group represents the intrinsic qualities of a vulnerability, the
`Temporal group reflects the characteristics of a vulnerability that change over time, and the
`Environmental group represents the characteristics of a vulnerability that are unique to a user's
`environment. The Base metrics produce a score ranging from 0 to 10, which can then be modified by
`scoring the Temporal and Environmental metrics. A CVSS score is also represented as a vector string,
`a compressed textual representation of the values used to derive the score. This Recommendation
`provides the official specification for CVSS v3.0.
`
`6.1
`
`Introduction
`
`Software, hardware and firmware vulnerabilities pose a critical risk to any organization operating a
`computer network, and can be difficult to categorize and mitigate. The common vulnerability scoring
`system (CVSS) provides a way to capture the principal characteristics of a vulnerability, and produce
`a numerical score reflecting its severity, as well as a textual representation of that score. The
`numerical score can then be translated into a qualitative representation (such as low, medium, high
`and critical) to help organizations properly assess and prioritize their vulnerability management
`processes.
`
`In short, CVSS affords three important benefits. First, it provides standardized vulnerability scores.
`When an organization uses a common algorithm for scoring vulnerabilities across all IT platforms, it
`can leverage a single vulnerability management policy defining the maximum allowable time to
`validate and remediate a given vulnerability. Next, it provides an open framework. Users may be
`confused when a vulnerability is assigned an arbitrary score by a third party. With CVSS, the
`individual characteristics used to derive a score are transparent. Finally, CVSS enables prioritized
`risk. When the environmental score is computed, the vulnerability becomes contextual to each
`
`
`
`
`
`Rec. ITU-T X.1521 (03/2016)
`
`3
`
`

`

`
`
`organization, and helps provide a better understanding of the risk posed by this vulnerability to the
`organization.
`
`This Recommendation describes the official CVSS v3.0 specification.
`
`6.1.1 Metrics
`
`CVSS is composed of three metric groups, Base, Temporal and Environmental, each consisting of a
`set of metrics, as shown in Figure 1.
`
`Figure 1 – CVSS v3.0 metric groups
`
`
`
`The Base metric group represents the intrinsic characteristics of a vulnerability that are constant over
`time and across user environments. It is composed of two sets of metrics: the exploitability metrics
`and the impact metrics.
`
`The exploitability metrics reflect the ease and technical means by which the vulnerability can be
`exploited. That is, they represent characteristics of the thing that is vulnerable, which we refer to
`formally as the vulnerable component. On the other hand, the Impact metrics reflect the direct
`consequence of a successful exploit, and represent the consequence to the thing that suffers the
`impact, which we refer to formally as the impacted component.
`
`While the vulnerable component is typically a software application, module, driver, etc.
`(or possibly even a hardware device), the impacted component could be a software application, a
`hardware device or a network resource. This potential for measuring the impact of a vulnerability
`other than the vulnerable component, is a key feature of CVSS v3.0. This property is captured and
`further discussed by the Scope metric below.
`
`The Temporal metric group reflects the characteristics of a vulnerability that may change over time
`but not across user environments. For example, the presence of a simple-to-use exploit kit would
`increase the CVSS score, while the creation of an official patch would decrease it.
`
`The Environmental metric group represents the characteristics of a vulnerability that are relevant and
`unique to a particular user's environment. These metrics allow the scoring analyst to incorporate
`security controls which may mitigate any consequences, as well as promote or demote the importance
`of a vulnerable system according to her business risk.
`
`Each of these metrics are discussed in further detail below.
`
`4
`
`Rec. ITU-T X.1521 (03/2016)
`
`

`

`
`
`6.1.2 Scoring
`
`When the Base metrics are assigned values by an analyst, the base equation computes a score ranging
`from 0.0 to 10.0 as illustrated in Figure 2.
`
`Figure 2 – CVSS metrics and equations
`
`
`
`Specifically, the base equation is derived from two sub equations: the exploitability sub score
`equation, and the impact sub score equation. The exploitability sub score equation is derived from
`the base exploitability metrics, while the impact sub score equation is derived from the base impact
`metrics.
`
`The Base score can then be refined by scoring the temporal and environmental metrics in order to
`more accurately reflect the risk posed by a vulnerability to a user's environment. However, scoring
`the temporal and environmental metrics is not required.
`
`Generally, the Base and Temporal metrics are specified by vulnerability bulletin analysts, security
`product vendors, or application vendors because they typically possess the most accurate information
`about the characteristics of a vulnerability. On the other hand, the Environmental metrics are specified
`by end-user organizations because they are best able to assess the potential impact of a vulnerability
`within their own computing environment.
`
`Scoring CVSS metrics also produces a vector string, a textual representation of the metric values used
`to score the vulnerability. This vector string is a specifically formatted text string that contains each
`value assigned to each metric, and should always be displayed with the vulnerability score.
`
`The scoring equations and vector string are explained further below.
`
`Note that all metrics should be scored under the assumption that the attacker has already located and
`identified the vulnerability. That is, the analyst need not consider the means by which the vulnerability
`was identified. In addition, it is likely that many different types of individuals will be scoring
`vulnerabilities (e.g., software vendors, vulnerability bulletin analysts, security product vendors, etc.),
`however, note that vulnerability scoring is intended to be agnostic to the individual and their
`organization.
`
`6.2
`
`Base metrics
`
`6.2.1 Exploitability metrics
`
`As mentioned, the exploitability metrics reflect the characteristics of the thing that is vulnerable,
`which we refer to formally as the vulnerable component. Therefore, each of the exploitability metrics
`listed below should be scored relative to the vulnerable component, and reflect the properties of the
`vulnerability that lead to a successful attack.
`
`
`
`
`
`Rec. ITU-T X.1521 (03/2016)
`
`5
`
`

`

`
`
`6.2.1.1 Attack vector (AV)
`
`This metric reflects the context by which vulnerability exploitation is possible. This metric value
`(and consequently the Base score) will be greater the more remote an attacker is (in terms of logical
`and physical distance) in order to exploit the vulnerable component. The assumption is that the
`number of potential attackers for a vulnerability that could be exploited from across the Internet is
`larger than the number of potential attackers that could exploit a vulnerability requiring physical
`access to a device, and therefore warrants a greater score. The list of possible values is presented in
`Table 1.
`
`Metric value
`
`Description
`
`Table 1 – Attack vector
`
`Network (N)
`
`Adjacent (A)
`
`Local (L)
`
`Physical (P)
`
`A vulnerability exploitable with network access means the vulnerable component is bound
`to the network stack and the attacker's path is through open systems interconnection (OSI)
`layer 3 (the network layer). Such a vulnerability is often termed ''remotely exploitable'' and
`can be thought of as an attack being exploitable one or more network hops away
`(e.g., across layer 3 boundaries from routers). An example of a network attack is an attacker
`causing a denial-of-service (DoS) by sending a specially crafted transmission control
`protocol (TCP) packet from across the public Internet (e.g., CVE-2004-0230).
`
`A vulnerability exploitable with adjacent network access means the vulnerable component
`is bound to the network stack, however the attack is limited to the same shared physical
`(e.g., Bluetooth, IEEE 802.11), or logical (e.g., local Internet protocol (IP) subnet) network,
`and cannot be performed across an OSI layer 3 boundary (e.g., a router). An example of an
`adjacent attack would be an address resolution protocol (ARP) (IPv4) or neighbour
`discovery (IPv6) flood leading to a denial of service on the local area network (LAN)
`segment. See also CVE-2013-6014.
`
`A vulnerability exploitable with local access means that the vulnerable component is not
`bound to the network stack, and the attacker's path is via read/write/execute capabilities. In
`some cases, the attacker may be logged in locally in order to exploit the vulnerability,
`otherwise, he or she may rely on user interaction (UI) to execute a malicious file.
`
`A vulnerability exploitable with physical access requires the attacker to physically touch
`or manipulate the vulnerable component. Physical interaction may be brief (e.g., evil maid
`attack1) or persistent. An example of such an attack is a cold boot attack which allows an
`attacker access to disk encryption keys after gaining physical access to the system, or
`peripheral attacks such as Firewire/universal serial bus (USB) direct memory access
`attacks.
`
`6.2.1.2 Attack complexity (AC)
`
`This metric describes the conditions beyond the attacker's control that must exist in order to exploit
`the vulnerability. As described below, such conditions may require the collection of more information
`about the target, the presence of certain system configuration settings, or computational exceptions.
`Importantly, the assessment of this metric excludes any requirements for user interaction in order to
`exploit the vulnerability (such conditions are captured in the User interaction metric). This metric
`value is largest for the least complex attacks. The list of possible values is presented in Table 2.
`
`
`
`1 See https://www.schneier.com/blog/archives/2009/10/evil_maid_attac.html for a description of the evil maid attack.
`
`6
`
`Rec. ITU-T X.1521 (03/2016)
`
`

`

`
`
`Table 2 – Attack complexity
`
`Metric value
`
`Description
`
`Low (L)
`
`Specialized access conditions or extenuating circumstances do not exist. An attacker can
`expect repeatable success against the vulnerable component.
`
`High (H)
`
`A successful attack depends on conditions beyond the attacker's control. That is, a
`successful attack cannot be accomplished at will, but requires the attacker to invest in some
`measurable amount of effort in preparation or execution against the vulnerable component
`before a successful attack can be expected.2 For example, a successful attack may depend
`on an attacker overcoming any of the following conditions:
`• The attacker must conduct target-specific reconnaissance. For example, on target
`configuration settings, sequence numbers, shared secrets, etc.
`• The attacker must prepare the target environment to improve exploit reliability. For
`example, repeated exploitation to win a race condition, or overcoming advanced exploit
`mitigation techniques.
`• The attacker must inject himself or herself into the logical network path between the
`target and the resource requested by the victim in order to read and/or modify network
`communications (e.g., man in the middle attack).
`
`6.2.1.3
`
`Privileges required (PR)
`
`This metric describes the level of privileges an attacker must possess before successfully exploiting
`the vulnerability. This metric is greatest if no privileges are required. The list of possible values is
`presented in Table 3.
`
`Metric value
`
`None (N)
`
`Low (L)
`
`High (H)
`
`Table 3 – Privileges required
`
`Description
`
`The attacker is unauthorized prior to attack, and therefore does not require any access
`to settings or files to carry out an attack.
`
`The attacker is authorized with (i.e., requires) privileges that provide basic user
`capabilities that could normally affect only settings and files owned by a user.
`Alternatively, an attacker with low privileges may have the ability to cause an impact
`only to non-sensitive resources.
`
`The attacker is authorized with (i.e., requires) privileges that provide significant
`(e.g., administrative) control over the vulnerable component that could affect
`component-wide settings and files.
`
`6.2.1.4 User interaction (UI)
`
`This metric captures the requirement for a user, other than the attacker, to participate in the successful
`compromise of the vulnerable component. This metric determines whether the vulnerability can be
`exploited solely at the will of the attacker, or whether a separate user (or user-initiated process) must
`participate in some manner. This metric value is greatest when no user interaction is required. The
`list of possible values is presented in Table 4.
`
`
`
`2 Note that we make no comment regarding the amount of effort required. We simply consider that some amount of
`additional effort must be exerted in order to exploit the vulnerability.
`
`
`
`
`
`Rec. ITU-T X.1521 (03/2016)
`
`7
`
`

`

`
`
`Table 4 – User interaction
`
`Metric value
`
`Description
`
`None (N)
`
`The vulnerable system can be exploited without interaction from any user.
`
`Required (R)
`
`Successful exploitation of this vulnerability requires a user to take some action before
`the vulnerability can be exploited. For example, a successful exploit may only be
`possible during the installation of an application by a system administrator.
`
`6.2.2 Scope (S)
`
`An important property captured by CVSS v3.0 is the ability for a vulnerability in one software
`component to impact resources beyond its means, or privileges. This consequence is represented by
`the metric Authorization scope, or simply Scope.
`
`Formally, Scope refers to the collection of privileges defined by a computing authority
`(e.g., an application, an operating system, or a sandbox environment) when granting access to
`computing resources (e.g., files, central processing unit (CPU), memory, etc.). These privileges are
`assigned based on some method of identification and authorization. In some cases, the authorization
`may be simple or loosely controlled based upon predefined rules or standards. For example, in the
`case of Ethernet traffic sent to a network switch, the switch accepts traffic that arrives on its ports and
`is an authority that controls the traffic flow to other switch ports.
`
`When the vulnerability of a software component governed by one authorization scope is able to affect
`resources governed by another authorization scope, a scope change has occurred.
`
`Intuitively, one may think of a scope change as breaking out of a sandbox, and an example would be
`a vulnerability in a virtual machine that enables an attacker to delete files on the host operating system
`(OS) (perhaps even its own virtual machine (VM)). In this example, there are two separate
`authorization authorities: one that defines and enforces privileges for the virtual machine and its users,
`and the other that defines and enforces privileges for the host system within which the virtual machine
`runs.
`
`A scope change would not occur, for example, with a vulnerability in Microsoft Word that allows an
`attacker to compromise all system files of the host OS, because the same authority enforces privileges
`of the user’s instance of Word, and the host’s system files.
`
`The Base score is greater when a scope change has occurred. The list of possible values is presented
`in Table 5.
`
`Metric value
`
`Unchanged (U)
`
`Changed (C)
`
`Table 5 – Scope
`
`Description
`
`An exploited vulnerability can only affect resources managed by the same authority.
`In this case the vulnerable component and the impacted component are the same.
`
`An exploited vulnerability can affect resources beyond the authorization privileges
`intended by the vulnerable component. In this case the vulnerable component and
`the impacted component are different.
`
`6.2.3
`
`Impact metrics
`
`The Impact metrics refer to the properties of the impacted component. Whether a successfully
`exploited vulnerability affects one or more components, the impact metrics are scored according to
`the component that suffers the worst outcome that is most directly and predictably asso

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket