The Forum of Incident Response and Security Teams (FIRST) has unveiled CVSS v4.0, marking a significant update to the Common Vulnerability Scoring System (CVSS) after an eight-year gap since CVSS v3.0. CVSS plays a crucial role in evaluating the security of software vulnerabilities by assigning numerical scores or labels, such as low, medium, high, or critical, based on various factors like exploitability and impact. Higher scores indicate more severe vulnerabilities, aiding organizations in prioritizing responses to security threats. CVSS v4.0 introduces several enhancements, including more precise base metrics, reduced ambiguity in scoring, simplified threat metrics, and a better evaluation of security requirements specific to different environments and the effectiveness of compensating controls. Additionally, it brings in extra metrics that encompass aspects like automatability, recovery, value density, response effort, and provider urgency. Furthermore, CVSS v4.0 broadens its scope to encompass operational technology (OT), industrial control systems (ICS), and the Internet of Things (IoT). It incorporates safety metrics into Supplemental and Environmental metrics. A new nomenclature is introduced, featuring severity ratings such as Base (CVSS-B), Base + Threat (CVSS-BT), Base + Environmental (CVSS-BE), and Base + Threat + Environmental (CVSS-BTE). CVSS v4.0 represents a substantial advancement in the field of cybersecurity, providing a more comprehensive tool for assessing and managing vulnerabilities. This reflects FIRST's dedication to enhancing the cybersecurity landscape. For a detailed list of changes in CVSS v4.0, including improved base metrics and impact measurements, please visit FIRST's website.
Apple researchers have disclosed a critical macOS vulnerability, tracked as CVE-2025-43530, that allows attackers to bypass the Transparency, Consent, and Control (TCC) security fr...
Cybersecurity analysts have recently uncovered two malicious browser extensions hosted on the Chrome Web Store that are covertly collecting conversations from AI platforms such as ...
The CERT Coordination Center (CERT/CC) has disclosed a serious unpatched security vulnerability affecting the TOTOLINK EX200 wireless range extender that could allow an attacker to...