Vulnerability Severity Scoring and Bounties: Why the Disconnect?
Title | Vulnerability Severity Scoring and Bounties: Why the Disconnect? |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Munaiah, Nuthan, Meneely, Andrew |
Conference Name | Proceedings of the 2Nd International Workshop on Software Analytics |
Date Published | November 2016 |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-4395-4 |
Keywords | bounty, composability, Human Behavior, Metrics, pubcrawl, relational database security, Resiliency, severity, Vulnerability |
Abstract | The Common Vulnerability Scoring System (CVSS) is the de facto standard for vulnerability severity measurement today and is crucial in the analytics driving software fortification. Required by the U.S. National Vulnerability Database, over 75,000 vulnerabilities have been scored using CVSS. We compare how the CVSS correlates with another, closely-related measure of security impact: bounties. Recent economic studies of vulnerability disclosure processes show a clear relationship between black market value and bounty payments. We analyzed the CVSS scores and bounty awarded for 703 vulnerabilities across 24 products. We found a weak (Spearmanas I = 0.34) correlation between CVSS scores and bounties, with CVSS being more likely to underestimate bounty. We believe such a negative result is a cause for concern. We investigated why these measurements were so discordant by (a) analyzing the individual questions of CVSS with respect to bounties and (b) conducting a qualitative study to find the similarities and differences between CVSS and the publicly-available criteria for awarding bounties. Among our findings were that the bounty criteria were more explicit about code execution and privilege escalation whereas CVSS makes no explicit mention of those. We also found that bounty valuations are evaluated solely by project maintainers, whereas CVSS has little provenance in practice. |
URL | https://dl.acm.org/doi/10.1145/2989238.2989239 |
DOI | 10.1145/2989238.2989239 |
Citation Key | munaiah_vulnerability_2016 |