Visible to the public Vulnerability Severity Scoring and Bounties: Why the Disconnect?

TitleVulnerability Severity Scoring and Bounties: Why the Disconnect?
Publication TypeConference Paper
Year of Publication2016
AuthorsMunaiah, Nuthan, Meneely, Andrew
Conference NameProceedings of the 2Nd International Workshop on Software Analytics
Date PublishedNovember 2016
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4395-4
Keywordsbounty, composability, Human Behavior, Metrics, pubcrawl, relational database security, Resiliency, severity, Vulnerability
Abstract

The Common Vulnerability Scoring System (CVSS) is the de facto standard for vulnerability severity measurement today and is crucial in the analytics driving software fortification. Required by the U.S. National Vulnerability Database, over 75,000 vulnerabilities have been scored using CVSS. We compare how the CVSS correlates with another, closely-related measure of security impact: bounties. Recent economic studies of vulnerability disclosure processes show a clear relationship between black market value and bounty payments. We analyzed the CVSS scores and bounty awarded for 703 vulnerabilities across 24 products. We found a weak (Spearmanas I = 0.34) correlation between CVSS scores and bounties, with CVSS being more likely to underestimate bounty. We believe such a negative result is a cause for concern. We investigated why these measurements were so discordant by (a) analyzing the individual questions of CVSS with respect to bounties and (b) conducting a qualitative study to find the similarities and differences between CVSS and the publicly-available criteria for awarding bounties. Among our findings were that the bounty criteria were more explicit about code execution and privilege escalation whereas CVSS makes no explicit mention of those. We also found that bounty valuations are evaluated solely by project maintainers, whereas CVSS has little provenance in practice.

URLhttps://dl.acm.org/doi/10.1145/2989238.2989239
DOI10.1145/2989238.2989239
Citation Keymunaiah_vulnerability_2016