Risk Scoring Matrix (CVSS)

Vulnerability Scoring Methodology & Business Risk Framework

Comprehensive breakdown of CVSS v3.1 and v4.0 metrics. This reference guide is designed to help maritime technical officers and DPA/CSOs interpret technical severity into operational business risk.

Intelligence Level: Strategic
CategoryOptionDangerDetailed Interpretation
Exploitability Metrics
Attack Vector (AV)Network (N)🔴 HighRemote: Exploitable via the Internet/Outside.
Adjacent (A)🟠 MedNearby: Limited to local Wi-Fi/Bluetooth range.
Local (L)🟡 LowOn-Site: Requires shell/local OS access.
Physical (P)🟢 LowTouch: Must have physical hardware access.
Complexity (AC)Low (L)🔴 HighEasy: No specialized timing or conditions needed.
High (H)🟢 LowHard: Must bypass ASLR/DEP or win a race.
Privileges (PR)None (N)🔴 HighPublic: No account required to exploit.
Low (L)🟠 MedStandard: Requires basic user login.
High (H)🟢 LowAdmin: Requires root/admin credentials.
Interaction (UI)None (N)🔴 HighSilent: No human action needed to trigger.
Required (R)🟡 LowPhish: Victim must click or execute a file.
Impact Metrics
Scope (S)Changed (C)🔴 HighViral: Can spread and impact other systems/OS.
Unchanged (U)🟢 LowContained: Damage limited to target application.
Confidentiality (C)High (H)VARFull data breach; all information exposed.
Low (L)VARPartial leak; some information exposed.
None (N)VARNo data exposure.
Integrity (I)High (H)VARFull control; attacker can modify any data.
Low (L)VARMinor changes; limited modification.
None (N)VARNo data modification possible.
Availability (A)High (H)VARTotal outage; system is unusable.
Low (L)VARDegraded; system is slow or unstable.
None (N)VARNo impact to system uptime.
CategoryOptionDangerv4.0 Specification & Business Logic
Base: Exploitability & Requirements
Attack Vector (AV)Network🔴 HighRemote exploitation across the internet.
Adjacent🟠 MedLocal network/Bluetooth range.
Local🟡 LowLocal terminal or user session.
Physical🟢 LowPhysical hardware tampering required.
Complexity (AC)Low🔴 HighReliable attack; no security bypass needed.
High🟢 LowRequires bypassing advanced protections.
Attack Req. (AT)None🔴 HighWorks on standard/default configurations.
Present🟢 LowRequires rare/specific system states.
Interaction (UI)None🔴 HighZero-click; fully automated.
Passive🟠 MedUser merely views content (visits a page).
Active🟡 LowUser must perform a specific action.
Impact: Vulnerable System (The Target App / "Inner Circle")
V-Confid (VC)H / L / NVARPasswords: Can the attacker read the app's internal passwords/data?
V-Integ (VI)H / L / NVARSettings: Can the attacker change the app's internal settings?
V-Avail (VA)H / L / NVARCrash: Can the attacker make the app freeze or crash?
Impact: Subsequent Systems (Infrastructure / "Blast Radius")
S-Confid (SC)H / L / NVARServer Breach: Can they read files on the Windows/Cloud DB behind the app?
S-Integ (SI)H / L / NVARWipe: Can they delete the server hard drive or modify the OS?
S-Avail (SA)H / L / NVAROutage: Can they shut down the entire network or host hardware?
Supplemental Metrics
Safety (S)Present🔴 HighLife-Safety: Potential for physical injury.
Negligible🟢 LowNo physical risk to humans.
Automatable (AU)Yes🔴 HighWormable: Can spread automatically like a virus.
No🟢 LowRequires manual effort per target.
Recovery (R)Automatic🟢 LowSystem self-heals or reboots.
User🟠 MedRequires manual intervention to restore.
Irrecoverable🔴 HighBricked: Hardware must be replaced.

What does "VAR" mean?

VAR (Variable) means the danger depends on your choice:

  • 🔴 High (H): Total loss of control/security.
  • 🟠 Low (L): Partial exposure or damage.
  • 🟢 None (N): No impact to this category.

Inner Circle vs. Blast Radius

Vulnerable System: Damage strictly inside the software containing the bug.
Subsequent System: The damage to everything else connected (OS, Network, Database).

Color Logic Context

🟡 Yellow: Technically "Low" but high risk because phishing (Interaction) and local access are common paths.
🟢 Green: "Physical" is the safest because it requires a person to touch the device.

Scroll to Top