Chap 5 - Interpreting Vulnerability Scans Flashcards
Which one of the CVSS metrics would contain information about the type of user account an attacker must use to execute an attack?
A. AV
B. C
C. PR
D. AC
PR
The Privileges Required (PR) vector describes whether the attacker needs no user privileges, normal user privileges, or administrative user privileges to conduct the attack. The other vectors described in this question are the Attack Vector (AV), Attack Complexity (AC), and Confidentiality (C) vectors. They would not contain information about user authentication.
CVSS metric: AV
Attack Vector
Measures how the vulnerability can be exploited, such as locally or remotely over a network.
CVSS metric: C
Confidentiality
Assesses the potential impact on data confidentiality if the vulnerability is exploited
CVSS metric: PR
Privileges Required
Describes the level of privileges an attacker must have to exploit the vulnerability
CVSS metric: AC
Attack Complexity
Evaluates the conditions that must exist beyond the attacker’s control to exploit the vulnerability
CVSS metric: I
Integrity
Evaluates the degree of alteration to data integrity an attacker might cause-
CVSS metric: A
Availability
easures the potential disruption or unavailability of the system
CVSS metric: S
Scope
Indicates whether the exploitation of the vulnerability can affect other components outside the original security boundary
CVSS metric: UI
User Interaction
Determines whether exploiting the vulnerability requires action from another user
What are the CVSS metrics?
- Attack Vector (AV): Measures how the vulnerability can be exploited, such as locally or remotely over a network
- Attack Complexity (AC): Evaluates the conditions that must exist beyond the attacker’s control to exploit the vulnerability
- Privileges Required (PR): Describes the level of privileges an attacker must have to exploit the vulnerability
- User Interaction (UI): Determines whether exploiting the vulnerability requires action from another user
- Confidentiality (C): Assesses the potential impact on data confidentiality if the vulnerability is exploited
- Integrity (I): Evaluates the degree of alteration to data integrity an attacker might cause
- Availability (A): Measures the potential disruption or unavailability of the system
- Scope (S): Indicates whether the exploitation of the vulnerability can affect other components outside the original security boundary.
Which one of the following values for the CVSS attack complexity metric would indicate that the specified attack is simplest to exploit?
A. High
B. Medium
C. Low
D. Severe
Low
An access complexity of “low” indicates that exploiting the vulnerability does not require any specialized conditions. A value of “high” indicates that specialized conditions are required. High and low are the only two possible values for this metric.
Which one of the following values for the confidentiality, integrity, or availability CVSS metric would indicate the potential for total compromise of a system?
A. N
B. A
C. H
D. L
H
If any of these measures is marked as H, for High, it indicates the potential for a complete compromise of the system.
N = None
L = Low
A is not used
What is the most recent version of CVSS that is currently available?
A. 1.0
B. 2.0
C. 2.5
D. 3.0
3.0
Version 3.0 of CVSS is currently available and is the version described in this chapter.
in Nov 2023, v4.0 was released
Kevin recently identified a new security vulnerability and computed its CVSS base score as 6.5. Which risk category would this vulnerability fall into?
A. Low
B. Medium
C. High
D. Critical
Explanation
Vulnerabilities that have a CVSS base score between 4.0 and 6.9 fall into the Medium rating category.
Medium
Vulnerabilities that have a CVSS base score between 4.0 and 6.9 fall into the Medium rating category.
CVSS Score Ranges
- 0.0: None
- 0.1–3.9: Low
- 4.0–6.9: Medium
- 7.0–8.9: High
- 9.0–10.0: Critical