: Public Class
Created: |
01.03.2023 12:17:05 |
Modified: |
01.03.2023 13:33:31 |
|
Project: |
|
Author: |
Matthias Bergler |
Version: |
1.0 |
Phase: |
1.0 |
Status: |
Proposed |
Complexity: |
Easy |
Difficulty: |
|
Priority: |
|
Multiplicity: |
|
Advanced: |
|
UUID: |
{EC786978-80DF-406d-A0AC-3121AC5CE371} |
Appears In: |
Security |
To rate information technology security vulnerabilities, the CVSS maintained by the forum of incident response and security teams (FIRST) can be used. Within the base metrics group, the exploitability metrics (cf. Reference [<u>1</u>], 7.1) can be used to rate attack feasibility. Other CVSS metrics (e.g. impact metrics) are covered by aspects of this document, e.g. damage scenarios and impact assessment.<br/>The exploitability metrics are:<br/>— attack vector;<br/>— attack complexity;<br/>— privileges required; and<br/>— user interaction.<br/>Evaluation of the CVSS metrics yields numerical values for each metric according within a pre-defined range. The overall exploitability value can be calculated on the basis of a simple formula:<br/><i>E </i>= 8,22 × <i>V </i>× <i>C </i>× <i>P </i>× <i>U</i><br/>where <br/>- E is the exploitability value;<br/>- V is the numerical value associated to the attack vector, ranging from 0,2 to 0,85;<br/>- C is the numerical value associated with the attack complexity, ranging from 0,44 to 0,77;<br/>- P is the numerical value associated with the privilieges required, ranging from 0,27 to 0,85; and<br/>- U is the numerical value associated with user interaction, ranging from 0,62 to 0,85.<br/><br/>[1] FORUM OF INCIDENT RESPONSE AND SECURITY TEAMS (FIRST). Common Vulnerability Scoring System (CVSS), <i>Common Vulnerability Scoring System v3.1: Specification Document, </i>[online]. Available at: <u>https:// www .first .org/ cvss/ v3 .1/ specification -document</u><br/><br/><br/><br/><br/>
- Attributes
- Associations From
- Other Links
Attribute |
Public String calculationFormula
|
Details:
Alias: |
|
Initial: |
|
Stereotype: |
|
Ordered: |
|
Range: |
Range:0 to 1 |
Transient: |
False |
Derived: |
False |
IsID: |
False |
Notes:
|
Score system used, e.g., CVSS, company intern, etc. <br/>CVSS based-approach is used as default<br/><br/>
|
|
Public AttackFeasibilityRating value
|
Details:
Alias: |
|
Initial: |
|
Stereotype: |
|
Ordered: |
|
Range: |
|
Transient: |
False |
Derived: |
False |
IsID: |
False |
Notes:
|
Mapping based on the following table as recommended in ISO 21434 G3:<br/><br/>Attack feasibility rating | CVSS exploitability value<br/><br/>High | 2,96 - 3,89<br/>Medium | 2,00 -2,95<br/>Low | 1,06 - 1,99<br/>Very Low | 0,12 - 1,05<br/><br/><br/><br/><br/>
|
|
Element |
Source Role |
Target Role |
Attack
Class
|
Name:
|
Name:
|
 Details:
|
Object |
Type |
Connection |
Direction |
Notes |
TraceableSpecification |
Class |
Generalization |
To |
|