You are viewing this page in an unauthorized frame window.
This is a potential security issue, you are being redirected to
https://nvd.nist.gov
An official website of the United States government
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock () or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.
Common Vulnerability Scoring System Calculator
CVE-2005-3080
Source: NIST
This page shows the components of a CVSS
assessment and allows you to refine the resulting CVSS score with additional or different metric values.
Please read the CVSS standards guide to fully understand how
to assess vulnerabilities using CVSS and to interpret the resulting scores.
The scores are computed in sequence such that the Base Score is used
to calculate the Temporal Score and the Temporal Score is used to
calculate the Environmental Score.
As of July 13th, 2022, the NVD no longer generates new information for CVSS v2.0.
Existing CVSS v2.0 information will remain in the database but the NVD will no
longer actively populate CVSS v2.0 for new CVEs. This change comes as CISA
policies that rely on NVD data fully transition away from CVSS v2.0. NVD analysts
will continue to use the reference information provided with the CVE and any
publicly available information at the time of analysis to associate Reference
Tags, CVSS v3.1, CWE, and CPE Applicability statements.
Alert
Please fill in all base metrics in order to generate a score!
CVSS Base Score:
NA
Impact Subscore:
NA
Exploitability Subscore:
NA
CVSS Temporal Score:
NA
CVSS Environmental Score:
NA
Modified Impact Subscore:
NA
Overall CVSS Score:
NA
CVSS v2.0 Vector
NA
Base Score Metrics
Exploitability Metrics
Impact Metrics
Temporal Score Metrics
Environmental Score Metrics
General Modifiers
Impact Subscore Modifiers
Base Score Metrics
The base metric group captures the characteristics of a vulnerability that are constant with time and across
user environments. The Access Vector, Access Complexity, and Authentication metrics capture how the
vulnerability is accessed and whether or not extra conditions are required to exploit it. The three impact
metrics measure how a vulnerability, if exploited, will directly affect an IT asset, where the impacts are
independently defined as the degree of loss of confidentiality, integrity, and availability. For example, a
vulnerability could cause a partial loss of integrity and availability, but no loss of confidentiality.
Exploitability Metrics
Access Vector (AV)
This metric reflects how the vulnerability is exploited. The more remote an attacker
can be to attack a host, the greater the vulnerability score.
Local (AV:L)
A vulnerability exploitable with only local access requires the attacker to have either
physical access to the vulnerable system or a local (shell) account. Examples of locally
exploitable vulnerabilities are peripheral attacks such as Firewire/USB DMA attacks, and
local privilege escalations (e.g., sudo).
Adjacent Network (AV:A)
A vulnerability exploitable with adjacent network access requires the attacker to have
access to either the broadcast or collision domain of the vulnerable software. Examples of
local networks include local IP subnet, Bluetooth, IEEE 802.11, and local Ethernet
segment.
Network (AV:N)
A vulnerability exploitable with network access means the vulnerable software is bound to
the network stack and the attacker does not require local network access or local access.
Such a vulnerability is often termed “remotely exploitable”. An example of a network
attack is an RPC buffer overflow.
Access Complexity (AC)
This metric measures the complexity of the attack required to exploit the vulnerability once an attacker
has gained access to the target system. For example, consider a buffer overflow in an Internet service:
once the target system is located, the attacker can launch an exploit at will.
Other vulnerabilities, however, may require additional steps in order to be exploited. For example, a
vulnerability in an email client is only exploited after the user downloads and opens a tainted attachment.
The lower the required complexity, the higher the
vulnerability score.
High (AC:H)
Specialized access conditions exist. For example,
in most configurations, the attacking party must already have elevated privileges or spoof additional systems
in addition to the attacking system (e.g., DNS hijacking).
The attack depends on social engineering methods that would be easily detected by knowledgeable people.
For example, the victim must perform several suspicious or atypical actions.
The vulnerable configuration is seen very rarely in practice.
If a race condition exists, the window is very narrow.
Medium (AC:M)
The access conditions are somewhat specialized; the following are examples:
The attacking party is limited to a group of systems or users at some level of authorization, possibly untrusted.
Some information must be gathered before a successful attack can be launched.
The affected configuration is non-default, and is not commonly configured (e.g., a vulnerability present when a
server performs user account authentication via a specific scheme, but not present for another authentication scheme).
The attack requires a small amount of social engineering that might occasionally fool cautious users (e.g.,
phishing attacks that modify a web browser’s status bar to show a false link, having to be on someone’s “buddy”
list before sending an IM exploit).
Low (AC:L)
Specialized access conditions or extenuating circumstances do not exist. The following are examples:
The affected product typically requires access to a wide range of systems and users, possibly anonymous and
untrusted (e.g., Internet-facing web or mail server).
The affected configuration is default or ubiquitous.
The attack can be performed manually and requires little skill or additional information gathering.
The 'race condition' is a lazy one (i.e., it is technically a race but easily winnable).
Authentication (Au)
This metric measures the number of times an attacker must authenticate to a target in order to exploit a
vulnerability. This metric does not gauge the strength or complexity of the authentication process, only
that an attacker is required to provide credentials before an exploit may occur. The possible values for
this metric are listed in Table 3. The fewer authentication instances that are required, the higher the
vulnerability score.
It is important to note that the Authentication metric is different from Access Vector. Here, authentication
requirements are considered once the system has already been accessed. Specifically, for locally
exploitable vulnerabilities, this metric should only be set to 'single' or 'multiple' if authentication is
needed beyond what is required to log into the system. An example of a locally exploitable vulnerability
that requires authentication is one affecting a database engine listening on a Unix domain socket (or some
other non-network interface). If the user must authenticate as a valid database user in order to exploit the
vulnerability, then this metric should be set to 'single.'
Multiple (Au:M)
Exploiting the vulnerability requires that the attacker authenticate two or more times, even if
the same credentials are used each time. An example is an attacker authenticating