Determine the likelihood of attack and target accessibility
Adversary Capability Assessment
| Q1 | Q2 | THREAT SCORE |
|---|---|---|
| NO | NO | LOW Manual + Theoretical |
| YES | NO | MEDIUM Automatable + Theoretical |
| NO | YES | HIGH Manual + Active |
| YES | YES | CRITICAL Automatable + Active |
Target Accessibility Assessment
| Q3 | Q4 | EXPOSURE SCORE |
|---|---|---|
| NO | NO | LOW Diffuse Value + Local Access |
| YES | NO | MEDIUM High Value + Local Access |
| NO | YES | HIGH Diffuse Value + Remote Access |
| YES | YES | CRITICAL High Value + Remote Access |
Map your Threat Score (Step 1) and Exposure Score (Step 2) below
| EXPOSURE ↓ THREAT → |
LOW | MEDIUM | HIGH | CRITICAL |
|---|---|---|---|---|
| LOW | LOW | LOW | MEDIUM | MEDIUM |
| MEDIUM | MEDIUM | MEDIUM | HIGH | HIGH |
| HIGH | HIGH | HIGH | HIGH | HIGH |
| CRITICAL | VERY HIGH | VERY HIGH | VERY HIGH | VERY HIGH |
Determine technical impact if exploit is successful
Consequences Assessment
| Q5 | Q6 | IMPACT SCORE |
|---|---|---|
| NO | NO | LOW Partial Control, Contained |
| YES | NO | MEDIUM Total Control, Contained |
| NO | YES | HIGH Partial Control, Scope Expansion |
| YES | YES | CATASTROPHIC Total Control, Scope Expansion |
Combine Exploitability (from Step 3) with Impact Score (Step 4)
| IMPACT ↓ EXPLOITABILITY → |
LOW | MEDIUM | HIGH | VERY HIGH |
|---|---|---|---|---|
| LOW |
OBSERVE
CVSS 0.1-3.9
|
OBSERVE
CVSS 0.1-3.9
|
SCHEDULE
CVSS 4.0-6.9
|
SCHEDULE
CVSS 4.0-6.9
|
| MEDIUM |
SCHEDULE
CVSS 4.0-6.9
|
SCHEDULE
CVSS 4.0-6.9
|
EXPEDITE
CVSS 7.0-8.9
|
EXPEDITE
CVSS 7.0-8.9
|
| HIGH |
EXPEDITE
CVSS 7.0-8.9
|
EXPEDITE
CVSS 7.0-8.9
|
IMMEDIATE
CVSS 9.0-10.0
|
IMMEDIATE
CVSS 9.0-10.0
|
| CATASTROPHIC |
IMMEDIATE
CVSS 9.0-10.0
|
IMMEDIATE
CVSS 9.0-10.0
|
IMMEDIATE
CVSS 9.0-10.0
|
IMMEDIATE
CVSS 9.0-10.0
|
Low Priority • Monitor but no immediate action required
Standard Patch Cycle • Address in next regular maintenance
Next Maintenance Window • Prioritize for upcoming window
Emergency Patch • Deploy fix immediately
Action Levels: The four action levels (OBSERVE, SCHEDULE, EXPEDITE, IMMEDIATE) represent practical remediation timeframes based on the combination of exploitability and impact. This approach simplifies decision-making by focusing on when to act rather than debating numerical scores.
CVSS Score Ranges: The score ranges shown (0.1-3.9, 4.0-6.9, 7.0-8.9, 9.0-10.0) are approximate mappings to CVSS v3.x/v4.0 severity ratings and are provided for reference:
Binary Assessment Approach: This tool uses simple YES/NO questions about key vulnerability characteristics (Automatability, Active Exploitation, Value Density, Attack Vector, Total Control, and Scope) to prevent "score gaming" and focus assessors on objective facts rather than numerical manipulation.
Framework Origin: This binary assessment framework is based on research and practical guidance from CISA's Stakeholder-Specific Vulnerability Categorization (SSVC) framework, which emphasizes decision trees over numerical scoring. The work card format was inspired by Binary Risk Analysis by Ben Sapiro, which pioneered the use of simple binary decision cards for security risk assessment.
For more information about CVSS and vulnerability assessment best practices, visit cvss-associates.com