I'm looking at the CVSS v4.0 specification - does anyone have a sound definition of what is a vulnerable system (VC, VI, VA)? Perhaps @kpwn?

I don't understand why, in the VMware Workstation example, the vulnerable system is the guest and the subsequent system is the host - and why, in a web service vulnerability, the underlying OS is usually part of the vulnerable system?

@misc Thanks for reaching out :) You may want to take a look at the section "Impact Metrics" (https://www.first.org/cvss/v4.0/specification-document#Impact-Metrics). Here they state:

"Formally, a system of interest for scoring a vulnerability is defined as the set of computing logic that executes in an environment with a coherent function and set of security policies."

The next paragraph extends this definition:

"When a system provides its functionality solely to another system, or it is designed to be exclusively used by another system, then together they are considered as the system of interest for scoring."

Now, if there is a vulnerability in one of the components of this system, this makes this system the "Vulnerable System". If the vulnerability affects another system, this is called the "Subsequent System".

Regarding the examples:
1. VMware (https://www.first.org/cvss/v4.0/examples#CVE-2020-3947)

"Successful exploitation of this issue may lead to code execution on the host from the guest".

To me, this sounds like the vulnerability is in the guest and allows code execution on the host. The guest machine is a "set of computing logic that executes in an environment with a coherent function and set of security policies", so it's the vulnerable system. The host machine provides its functionality to other systems (other guests) and is therefore the subsequent system (it's not the same system of interest).

2. "in a web service vulnerability, the underlying OS is usually part of the vulnerable system":

I am afraid you need to clarify this. Exactly what vulnerability are you talking about? In my opinion, the underlying OS should indeed be a subsequent system, since it not only provides its functionality to the web application, but usually also allows management access, etc.

CVSS v4.0 Specification Document

FIRST — Forum of Incident Response and Security Teams

@kpwn Thank you for the detailed answer. I have read the definition of FIRST and find it too general and vague.

I find your comment about VMware Workstation and the host having multiple guests helpful. Thank you :)

I am not sure about the Heartbleed and log4j examples. log4j is clearly about executing code on the system (VC, VI, VA as high) and also shutting down the device. If log4j is a component of a web application, this does not automatically mean root/admin rights on the entire device.

Hearbleed mentions that it may have admin credentials or private keys in memory. However, to me that would be an effect on a subsequential system.

@misc @kpwn i already don’t like the again added complexity of more fields etc. thinking about throwing out CVSS score entirely again
@floyd @kpwn I agree, I'm not a fan of more complexity either. Wearing a pentester's hat, I wonder if I should define a CVSS score according to the customer's environment and spend time defining vulnerable and subsequent systems, etc., or if I should use the environment metric group, or if the customer should do this themselves (which they probably won't do anyway). In the end, this will take more time with v4 than before, and is there really a benefit? 🤔
@misc @kpwn we offered cvss and additionally old school “Information to Critical” that is more a “pentester opinion”. But spending the time on cvss 4 doesn’t look like its worth the time. 3.1 was fast/easy enough
@floyd @kpwn We primarily offer our own severity and CVSS as an additional score. Now we have to decide whether to switch to v4 or stick with v3.1 for the time being