Scope

CVSS 3.0 permits us to capture metrics for a vulnerability in a component, which also impacts resources beyond its means. Scope refers to what parts of the vulnerable component are affected by the vulnerability or what associations are impacted by exploiting the vulnerability. The scope is segregated by authorization authorities. A vulnerability might affect components within the same authorization authority or within different authorization authorities. For example, a vulnerability in a virtual machine allowing the attacker to modify files in the base (host) system would include two systems in scope, while a vulnerability in Microsoft Word, allowing the attacker to modify system host files, would come under single authorization authority:

Parameter

Description

Unchanged

An exploited vulnerability would affect only the resources managed by the affected component

Changed

An exploited vulnerability may impact resources beyond the boundary of the vulnerable component

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.220.187.178