Domain 6 Β· Lesson 1 of 5
Vulnerability Assessment & CVSS Scoring
ΔΓ‘nh giΓ‘ Lα» hα»ng & ChαΊ₯m Δiα»m CVSS
Vulnerability Assessment Process
VA vs Penetration Test
CVSS Scoring β Severity Bands & SLAs
| Score Range | Severity | Remediation SLA | Example Action |
|---|---|---|---|
| 0.0 | None | No action required | Informational note |
| 0.1 β 3.9 | Low | 90 days | Fix in next sprint backlog |
| 4.0 β 6.9 | Medium | 30 days | Fix within current quarter |
| 7.0 β 8.9 | High | 7 days | Emergency fix this week |
| 9.0 β 10.0 | Critical | 24β48 hours | Page on-call immediately; incident response |
CVSS Base Score Components
Exploitability Metrics
- Attack Vector (AV): Network / Adjacent / Local / Physical
- Attack Complexity (AC): Low / High
- Privileges Required (PR): None / Low / High
- User Interaction (UI): None / Required
- Scope (S): Unchanged / Changed (can it affect other components?)
CIA Impact Metrics
- Confidentiality (C): None / Low / High
- Integrity (I): None / Low / High
- Availability (A): None / Low / High
Environmental Score
Adjust base score for your context β Platform C processes financial PII, so CIA impact is higher than a static marketing site. Internet-facing endpoints score higher than internal tools.
CVE & Zero-Day Vulnerabilities
CVE β Common Vulnerabilities and Exposures
Standardized identifier for known vulnerabilities. Maintained by MITRE. Format: CVE-YEAR-NUMBER.
Example: CVE-2021-44228 = Log4Shell (CVSS 10.0 Critical). CVE-2022-22965 = Spring4Shell.
Zero-Day Vulnerability
A vulnerability with no CVE yet β no patch exists and the vendor is unaware (or just became aware). Cannot be detected by signature-based scanners (Nessus, govulncheck) because there's no known CVE to match against.
Key Terms
- CVSS Critical = 9.0β10.0 β patch within 24β48 hours. High = 7.0β8.9 = 7 days. Know all five bands.
- VA β Pen Test: VA finds and prioritizes; Pen Test actively exploits to prove impact.
- False positives in VA: verify manually before treating as real β saves engineering time on phantom issues.
- CVSS Environmental Score: adjust base score for your organization context β internet-facing financial data = higher effective score.
- Zero-day: no CVE exists yet β signature-based scanners (Nessus, govulncheck) cannot detect it. Requires threat intelligence and behavioral detection.
govulncheck in CI/CD: Scans all Go module dependencies for known CVEs on every build. Policy: Critical (CVSS 9+) = block merge immediately; High (7β8.9) = fix within 7 days or add WAF compensating rule with CTO sign-off; Medium = fix within 30 days; Low = fix in next sprint.
Log4Shell audit (legacy Platform A Java): Platform A service uses Java β run Log4j dependency audit immediately. If Log4j 1.x or Log4j 2.x < 2.17.1 is detected, this is a Critical CVE requiring emergency remediation. Replace with Logback/SLF4J or upgrade Log4j.
False positive handling: govulncheck may flag CVEs in dependencies that are not in your call graph (Go's reachability analysis helps). Verify each finding with the security team before suppressing β document the justification in a suppression comment with ticket reference.
Practice Quiz
Q1. govulncheck finds a CVE with CVSS base score 9.5 in an Platform C Go dependency. What is the severity classification and the maximum acceptable time before it must be patched?
βΌ Reveal Answer
Q2. VA vs Pen Test β which one actively exploits vulnerabilities to demonstrate real impact?
βΌ Reveal Answer
Q3. What does a CVE identifier represent, and what is CVE-2021-44228?
βΌ Reveal Answer
Q4. A VA scan returns 200 findings. The first engineer says "let's start patching everything." What should happen before remediation begins?
βΌ Reveal Answer
Q5. Why can't signature-based vulnerability scanners (Nessus, govulncheck) detect zero-day vulnerabilities?