{"id":25199,"date":"2022-08-31T20:19:33","date_gmt":"2022-08-31T20:19:33","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=25199"},"modified":"2022-08-31T20:19:35","modified_gmt":"2022-08-31T20:19:35","slug":"cvss-scores-can-be-misleading","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/cvss-scores-can-be-misleading\/","title":{"rendered":"CVSS Vulnerability Scores Can Be Misleading: Security Researchers"},"content":{"rendered":"\n<p><a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\">Vulnerability management systems<\/a> based on the Common Vulnerability Scoring System (CVSS) v2 scoring system may be misguided, as a new report found that roughly half of the most critical vulnerabilities may be scored incorrectly.<\/p>\n\n\n\n<p>&#8220;Looking at the past 10 years, in the same midyear period, we see that on average, 51.5 percent of all known 10.0 scored vulnerabilities are unspecified,&#8221; Flashpoint noted in its <a href=\"https:\/\/flashpoint.io\/resources\/report\/state-of-vulnerability-intelligence-2022-midyear\/\" target=\"_blank\" rel=\"noreferrer noopener\">mid-year 2022 Report<\/a>. &#8220;This means organizations could be prioritizing hundreds of issues that may not actually be 10.0\u2014further highlighting that base CVSS scores alone should not drive vulnerability management processes.&#8221;<\/p>\n\n\n\n<p>Flashpoint analyzed 11,860 vulnerabilities in the first six months of 2022 and found that the CVE\/NVD services failed to report and detail 27.3% of them. This lack of detail can also explain why some scores may be too high as a precaution.<\/p>\n\n\n\n<p>\u201cTo make better risk decisions, you need comprehensive vulnerability intelligence,&#8221; the report said, adding that security teams can maximize resources and reduce their immediate workload by 82 percent by first focusing on actionable, high severity vulnerabilities.<\/p>\n\n\n\n<p>See the <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\">Best Patch Management Systems<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Why Inaccurate CVSS Scores are a Big Problem<\/strong><\/h2>\n\n\n\n<p>It\u2019s hard to navigate with the wrong map. The most critical vulnerabilities are the ones that require immediate action. If the CVSS model misleads security teams, they will likely focus on the wrong tasks and miss the real emergencies.<\/p>\n\n\n\n<p>Many security vendors have built-in features to monitor the vulnerability disclosure landscape and prioritize actions automatically according to specific parameters, including severity scores. And compliance schemes rely on these scores to require immediate remediation, which forces organizations to prioritize all vulnerabilities with a score exceeding a certain threshold.<\/p>\n\n\n\n<p>It\u2019s not a new issue, though, and many security experts have been <a href=\"https:\/\/www.balbix.com\/blog\/dont-be-misled-by-cvss-scores\/\" target=\"_blank\" rel=\"noreferrer noopener\">noting shortcomings<\/a> in the CVSS system for years, especially when it\u2019s used for ICS <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-conduct-a-vulnerability-assessment-steps-toward-better-cybersecurity\/\">vulnerability assessments<\/a> and patch management.<\/p>\n\n\n\n<p>Indeed, the severity of a vulnerability does not necessarily match the actual risk for an organization. It might give an idea of what issues could occur with a specific flaw, but it does not say whether it\u2019s a \u201cdiscovered-in-the-wild\u201d vulnerability, which means one used in attacks before it was discovered &#8211; and thus a top priority for security teams.<\/p>\n\n\n\n<p>It should be noted that it does not mean the CVSS score lacks value, but it\u2019s essential to assess the impact of a vulnerability in the context of an organization. What can happen if the <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-ngfw\/\">firewall<\/a> fails? Is the vulnerability easy to exploit? Can the vulnerability cause a massive downtime or data breach?<\/p>\n\n\n\n<p>The score is just an indicator and can\u2019t replace proper <a href=\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/\">risk management<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Make Actionable Severity Vulnerabilities the Top Priority<\/strong><\/h2>\n\n\n\n<p>Wrong prioritization can have a huge impact on security teams, but Flashpoint believes they could dramatically reduce their immediate workload by first focusing on actionable severity vulnerabilities.<\/p>\n\n\n\n<p>Rather than reading uncontextualized scores at face value, teams should prioritize the business need to reduce their backlog of tickets that constantly grows with daily security updates.<\/p>\n\n\n\n<p>While remediation is often required for the most severe security holes first, <a href=\"https:\/\/www.esecurityplanet.com\/applications\/bug-bounty-program-guide\/\">bug bounty programs<\/a> and regular <a href=\"https:\/\/www.esecurityplanet.com\/networks\/best-penetration-testing\/\">pen-tests<\/a> can increase the effectiveness of vulnerability management.<\/p>\n\n\n\n<p>For example, depending on the <a href=\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-software\/\">network segmentation<\/a>, the same vulnerability can be either an absolute disaster or a medium-severity issue.<\/p>\n\n\n\n<p>Flashpoint notes that vulnerabilities in the actionable, high severity category have three characteristics: they are remotely exploitable, have a public exploit, and have a viable solution, like a patch or upgrade. For this midyear period, 2,081 vulnerabilities hit this &#8220;sweet spot,&#8221; the researchers noted (see image below).<\/p>\n\n\n\n<p>&#8220;These vulnerabilities should be at the top of the list for triaging, as they pose the most risk, yet are the quickest to remediate,&#8221; the report said. &#8220;Once those issues are addressed, security teams can then examine the remainder, using a risk-based approach that prioritizes at-risk assets based on business need, rather than uncontextualized base CVSS scores. As such, using these three points of metadata can be incredibly helpful for security teams to quickly reduce the most risk in their environment, resulting in better outcomes compared to top-down patching. Simple queries against a complete data set gives more power and flexibility for your team.&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"983\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/08\/actionable-critical-vulnerabilities-1024x983.jpg\" alt=\"\" class=\"wp-image-25201\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/actionable-critical-vulnerabilities-1024x983.jpg 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/actionable-critical-vulnerabilities-300x288.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/actionable-critical-vulnerabilities-768x737.jpg 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/actionable-critical-vulnerabilities-150x144.jpg 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/actionable-critical-vulnerabilities-696x668.jpg 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/actionable-critical-vulnerabilities-1068x1025.jpg 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/actionable-critical-vulnerabilities.jpg 1373w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>&#8216;Discovered-in-the-Wild&#8217; Discrepancy Noted<\/strong><\/h2>\n\n\n\n<p>The report also highlights a discrepancy of 85 percent concerning \u201cdiscovered-in-the-wild\u201d vulnerabilities reported in 2022 H1 compared to other resources such as Google\u2019s Project Zero, showing that exploitation occurs more often outside of <a href=\"https:\/\/www.esecurityplanet.com\/threats\/advanced-persistent-threat\/\">Advanced Persistent Threat (APT)<\/a> attacks.<\/p>\n\n\n\n<p>The first half of 2022, Flashpoint aggregated 37 discovered-in-the-wild vulnerabilities, compared to Project Zero\u2019s 20.<\/p>\n\n\n\n<p>&#8220;But examining all known discovered-in-the-wild vulnerabilities, Flashpoint\u2019s research teams collected 311 vulnerabilities with this classification\u2014versus Project Zero tracking 221,&#8221; the researchers said. &#8220;These statements are not meant to downplay Project Zero\u2019s effectiveness or efforts. Instead, it shows that there are vulnerabilities within this classification that fall outside of Project Zero\u2019s scope. And although they have not been observed to be used by APTs in their attacks, having knowledge of these issues can greatly benefit private sector organizations as they affect commonly-used software and developing technologies such as the blockchain. Ultimately, it communicates that an organization was exploited by a malicious third-party, regardless of being designated an APT or not.&#8221;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What Does All This Mean for Patch Management?<\/strong><\/h2>\n\n\n\n<p>It\u2019s unlikely your organization relies solely on abstract scores to make decisions, but if that\u2019s the case, you should definitely revise your strategy.<\/p>\n\n\n\n<p>Aggressive patch management can be rewarding despite the known inconveniences, as vulnerability disclosures usually inspire tons of public POCs (proofs of concept) that can be used by various attackers outside of APT groups.<\/p>\n\n\n\n<p>Remediation can be a struggle for technical teams. It\u2019s not exactly like pushing the \u201cupdate button,\u201d and the process can even take weeks or months.<\/p>\n\n\n\n<p>While compliance may sometimes point in the wrong direction and give a false sense of security, outdated software is a major risk for organizations and quite often the root cause of massive attacks.<\/p>\n\n\n\n<p>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-scanning-tools\/\">Best Vulnerability Scanner Tools<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6f1a11afda-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6f1a11afda\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6f1a11afda\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6f1a11afda\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6f1a11afda\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6f1a11afda\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6f1a11afda\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Vulnerability management systems based on the Common Vulnerability Scoring System (CVSS) v2 scoring system may be misguided, as a new report found that roughly half of the most critical vulnerabilities may be scored incorrectly. &#8220;Looking at the past 10 years, in the same midyear period, we see that on average, 51.5 percent of all known [&hellip;]<\/p>\n","protected":false},"author":267,"featured_media":25201,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[2369,3790,3414,730,4218,22929,5277],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[31788,382,31782,379],"class_list":["post-25199","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-cloud-security","tag-cybersecurity","tag-network-security","tag-security","tag-vulnerabilities","tag-vulnerability-management","tag-web-security","b2b_audience-awareness-and-consideration","b2b_product-advanced-persistent-threats","b2b_product-application-security-vulnerability-management","b2b_product-threat-intelligence","b2b_product-threats-and-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CVSS Vulnerability Scores Can Be Misleading: Security Researchers | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Security teams shouldn&#039;t rely on vulnerability scores alone to prioritize patches. Additional factors could reduce workload dramatically.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/cvss-scores-can-be-misleading\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CVSS Vulnerability Scores Can Be Misleading: Security Researchers | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Security teams shouldn&#039;t rely on vulnerability scores alone to prioritize patches. Additional factors could reduce workload dramatically.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/cvss-scores-can-be-misleading\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-31T20:19:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-31T20:19:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/actionable-critical-vulnerabilities.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1373\" \/>\n\t<meta property=\"og:image:height\" content=\"1318\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Julien Maury\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Julien Maury\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/cvss-scores-can-be-misleading\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/cvss-scores-can-be-misleading\/\"},\"author\":{\"name\":\"Julien Maury\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a\"},\"headline\":\"CVSS Vulnerability Scores Can Be Misleading: Security Researchers\",\"datePublished\":\"2022-08-31T20:19:33+00:00\",\"dateModified\":\"2022-08-31T20:19:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/cvss-scores-can-be-misleading\/\"},\"wordCount\":986,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/cvss-scores-can-be-misleading\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/actionable-critical-vulnerabilities.jpg\",\"keywords\":[\"cloud security\",\"cybersecurity\",\"network security\",\"security\",\"vulnerabilities\",\"Vulnerability Management\",\"Web security\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/cvss-scores-can-be-misleading\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/cvss-scores-can-be-misleading\/\",\"name\":\"CVSS Vulnerability Scores Can Be Misleading: Security Researchers | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/cvss-scores-can-be-misleading\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/cvss-scores-can-be-misleading\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/actionable-critical-vulnerabilities.jpg\",\"datePublished\":\"2022-08-31T20:19:33+00:00\",\"dateModified\":\"2022-08-31T20:19:35+00:00\",\"description\":\"Security teams shouldn't rely on vulnerability scores alone to prioritize patches. Additional factors could reduce workload dramatically.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/cvss-scores-can-be-misleading\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/cvss-scores-can-be-misleading\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/cvss-scores-can-be-misleading\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/actionable-critical-vulnerabilities.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/actionable-critical-vulnerabilities.jpg\",\"width\":1373,\"height\":1318},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/cvss-scores-can-be-misleading\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CVSS Vulnerability Scores Can Be Misleading: Security Researchers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a\",\"name\":\"Julien Maury\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp\",\"caption\":\"Julien Maury\"},\"description\":\"eSecurity Planet contributor Julien Maury writes about penetration testing, code security, open source security and more. He is a backend developer, a mentor and a technical writer who enjoys sharing his knowledge and learning new concepts.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jmaury\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CVSS Vulnerability Scores Can Be Misleading: Security Researchers | eSecurity Planet","description":"Security teams shouldn't rely on vulnerability scores alone to prioritize patches. Additional factors could reduce workload dramatically.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/cvss-scores-can-be-misleading\/","og_locale":"en_US","og_type":"article","og_title":"CVSS Vulnerability Scores Can Be Misleading: Security Researchers | eSecurity Planet","og_description":"Security teams shouldn't rely on vulnerability scores alone to prioritize patches. Additional factors could reduce workload dramatically.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/cvss-scores-can-be-misleading\/","og_site_name":"eSecurity Planet","article_published_time":"2022-08-31T20:19:33+00:00","article_modified_time":"2022-08-31T20:19:35+00:00","og_image":[{"width":1373,"height":1318,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/actionable-critical-vulnerabilities.jpg","type":"image\/jpeg"}],"author":"Julien Maury","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Julien Maury","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/cvss-scores-can-be-misleading\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/cvss-scores-can-be-misleading\/"},"author":{"name":"Julien Maury","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a"},"headline":"CVSS Vulnerability Scores Can Be Misleading: Security Researchers","datePublished":"2022-08-31T20:19:33+00:00","dateModified":"2022-08-31T20:19:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/cvss-scores-can-be-misleading\/"},"wordCount":986,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/cvss-scores-can-be-misleading\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/actionable-critical-vulnerabilities.jpg","keywords":["cloud security","cybersecurity","network security","security","vulnerabilities","Vulnerability Management","Web security"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/cvss-scores-can-be-misleading\/","url":"https:\/\/www.esecurityplanet.com\/threats\/cvss-scores-can-be-misleading\/","name":"CVSS Vulnerability Scores Can Be Misleading: Security Researchers | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/cvss-scores-can-be-misleading\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/cvss-scores-can-be-misleading\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/actionable-critical-vulnerabilities.jpg","datePublished":"2022-08-31T20:19:33+00:00","dateModified":"2022-08-31T20:19:35+00:00","description":"Security teams shouldn't rely on vulnerability scores alone to prioritize patches. Additional factors could reduce workload dramatically.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/cvss-scores-can-be-misleading\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/cvss-scores-can-be-misleading\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/cvss-scores-can-be-misleading\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/actionable-critical-vulnerabilities.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/actionable-critical-vulnerabilities.jpg","width":1373,"height":1318},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/cvss-scores-can-be-misleading\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"CVSS Vulnerability Scores Can Be Misleading: Security Researchers"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4723f5dca54d7ee1d8111912ac8b1d4a","name":"Julien Maury","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/JulienMaury-AvatarImg-150x150.webp","caption":"Julien Maury"},"description":"eSecurity Planet contributor Julien Maury writes about penetration testing, code security, open source security and more. He is a backend developer, a mentor and a technical writer who enjoys sharing his knowledge and learning new concepts.","url":"https:\/\/www.esecurityplanet.com\/author\/jmaury\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25199"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/267"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=25199"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25199\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/25201"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=25199"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=25199"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=25199"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=25199"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=25199"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=25199"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}