Base Metrics ?

Exploitability Metrics
Attack Vector (AV):
Attack Vector (AV):
Attack Vector (AV):
Attack Vector (AV):
Attack Vector (AV):
Attack Complexity (AC):
Attack Complexity (AC):
Attack Complexity (AC):
Attack Complexity (AC):
Attack Complexity (AC):
Attack Requirements (AT):
Attack Requirements (AT):
Attack Requirements (AT):
Attack Requirements (AT):
Attack Requirements (AT):
Privileges Required (PR):
Privileges Required (PR):
Privileges Required (PR):
Privileges Required (PR):
Privileges Required (PR):
User Interaction (UI):
User Interaction (UI):
User Interaction (UI):
User Interaction (UI):
User Interaction (UI):
Vulnerable System Impact Metrics
Confidentiality (VC):
Confidentiality (VC):
Confidentiality (VC):
Confidentiality (VC):
Confidentiality (VC):
Integrity (VI):
Integrity (VI):
Integrity (VI):
Integrity (VI):
Integrity (VI):
Availability (VA):
Availability (VA):
Availability (VA):
Availability (VA):
Availability (VA):
Subsequent System Impact Metrics
Confidentiality (SC):
Confidentiality (SC):
Confidentiality (SC):
Confidentiality (SC):
Confidentiality (SC):
Integrity (SI):
Integrity (SI):
Integrity (SI):
Integrity (SI):
Integrity (SI):
Availability (SA):
Availability (SA):
Availability (SA):
Availability (SA):
Availability (SA):

Supplemental Metrics ?

Safety (S):
Safety (S):
Safety (S):
Safety (S):
Safety (S):
Automatable (AU):
Automatable (AU):
Automatable (AU):
Automatable (AU):
Automatable (AU):
Recovery (R):
Recovery (R):
Recovery (R):
Recovery (R):
Recovery (R):
Value Density (V):
Value Density (V):
Value Density (V):
Value Density (V):
Value Density (V):
Vulnerability Response Effort (RE):
Vulnerability Response Effort (RE):
Vulnerability Response Effort (RE):
Vulnerability Response Effort (RE):
Vulnerability Response Effort (RE):
Provider Urgency (U):
Provider Urgency (U):
Provider Urgency (U):
Provider Urgency (U):
Provider Urgency (U):

Environmental (Modified Base Metrics) ?

Exploitability Metrics
Attack Vector (MAV):
Attack Vector (MAV):
Attack Vector (MAV):
Attack Vector (MAV):
Attack Vector (MAV):
Attack Complexity (MAC):
Attack Complexity (MAC):
Attack Complexity (MAC):
Attack Complexity (MAC):
Attack Complexity (MAC):
Attack Requirements (MAT):
Attack Requirements (MAT):
Attack Requirements (MAT):
Attack Requirements (MAT):
Attack Requirements (MAT):
Privileges Required (MPR):
Privileges Required (MPR):
Privileges Required (MPR):
Privileges Required (MPR):
Privileges Required (MPR):
User Interaction (MUI):
User Interaction (MUI):
User Interaction (MUI):
User Interaction (MUI):
User Interaction (MUI):
Vulnerable System Impact Metrics
Confidentiality (MVC):
Confidentiality (MVC):
Confidentiality (MVC):
Confidentiality (MVC):
Confidentiality (MVC):
Integrity (MVI):
Integrity (MVI):
Integrity (MVI):
Integrity (MVI):
Integrity (MVI):
Availability (MVA):
Availability (MVA):
Availability (MVA):
Availability (MVA):
Availability (MVA):
Subsequent System Impact Metrics
Confidentiality (MSC):
Confidentiality (MSC):
Confidentiality (MSC):
Confidentiality (MSC):
Confidentiality (MSC):
Integrity (MSI):
Integrity (MSI):
Integrity (MSI):
Integrity (MSI):
Integrity (MSI):
Availability (MSA):
Availability (MSA):
Availability (MSA):
Availability (MSA):
Availability (MSA):

Environmental (Security Requirements) ?

Confidentiality Requirements (CR):
Confidentiality Requirements (CR):
Confidentiality Requirements (CR):
Confidentiality Requirements (CR):
Confidentiality Requirements (CR):
Integrity Requirements (IR):
Integrity Requirements (IR):
Integrity Requirements (IR):
Integrity Requirements (IR):
Integrity Requirements (IR):
Availability Requirements (AR):
Availability Requirements (AR):
Availability Requirements (AR):
Availability Requirements (AR):
Availability Requirements (AR):

Threat Metrics ?

Exploit Maturity (E):
Exploit Maturity (E):
Exploit Maturity (E):
Exploit Maturity (E):
Exploit Maturity (E):