Web application security - the fast guide Chapter 3: Vulnerabilities And Threat Models | Page 13
CVSS (cont)
BaseScore = round_to_1_decimal(((0.6*Impact)+(0.4*Exploitability)–
1.5)*f(Impact))
Impact = 10.41*(1-(1-ConfImpact)*(1-IntegImpact)*(1-AvailImpact))
Authentication = case Authentication of
requires multiple instances of authentication: 0.45
requires single instance of authentication: 0.56
requires no authentication: 0.704
f(impact)= 0 if Impact=0, 1.176 otherwise ConfImpact = case ConfidentialityImpact of
none: 0.0
partial: 0.275
complete: 0.660
AccessVector = case AccessVector of requires
local access: 0.395
adjacent network accessible: 0.646
network accessible: 1.0 IntegImpact= case IntegrityImpact of
none: 0.0
partial: 0.275
complete: 0.660
AccessComplexity = case AccessComplexity of
high: 0.35
medium: 0.61
low: 0.71 AvailImpact= case AvailabilityImpact of
none: 0.0
partial: 0.275
complete: 0.660
Exploitability = 20* AccessVector*AccessComplexity*Authentication
2017-05-10
Web Application Security Fast Guide (book slides)
By Dr.Sami Khiami
Slide 13