Training Drill

Score the vector, then challenge the decision.

Practice reading CVSS-style clues, spotting disputed-vector traps, and explaining why severity is useful context but not a complete patch, mitigation, or escalation decision.

SkillRead vectors

Practice how attack vector, privileges, user interaction, scope, and impact change severity.

SkillFind caveats

Notice where vendor, CNA, scanner, or local context may disagree about vector values.

SkillDecide safely

Use score as severity context, then add exploitation, exposure, affected status, and owner constraints.

Choose the vector clue and the decision caveat

These synthetic cases are not full calculators. They train the judgment needed before using the CVSS Calculator or writing priority language.

Remote request reaches a vulnerable service without authentication.

Vector clue: Network attack vector and low or no privileges raise severity.

Decision caveat: Validate whether the service is exposed and affected before saying the environment is at urgent risk.

Exploit requires a user to open a crafted file in a desktop client.

Vector clue: User interaction matters and may change exploitability assumptions.

Decision caveat: Pair scoring with phishing exposure, file-handling controls, telemetry, and affected-client inventory.

Exploit requires administrator access to a management console.

Vector clue: High privileges can reduce base exploitability compared with unauthenticated paths.

Decision caveat: Do not dismiss it if administrator access is common, shared, externally reachable, or weakly controlled.

A plugin flaw lets an attacker affect data outside the vulnerable component.

Vector clue: Changed scope may raise severity because impact crosses an authorization boundary.

Decision caveat: Confirm plugin deployment, trust boundary, and reachable path before assigning broad impact.

Issue exposes partial configuration data but does not allow modification or service disruption.

Vector clue: Confidentiality impact may be present while integrity and availability remain low or none.

Decision caveat: Data sensitivity, secrets exposure, and business context can still make the local response important.

Vendor scores the flaw High, scanner reports Critical, and NVD has not published a vector yet.

Vector clue: Source disagreement should be preserved until the vector basis is understood.

Decision caveat: Use the highest concern for triage pacing, but write priority from exposure, exploitation, patch state, and validated impact.

Never stop at the number

Score what the vulnerability is

Use CVSS to describe base technical severity from the vector, not your asset inventory.

Validate what your environment has

Check product, version, feature, reachability, controls, telemetry, owner constraints, and fix path.

Communicate both layers

Say severity separately from local priority so leadership and owners understand why the lane was chosen.

Move from score practice to action

CVSS Calculator

Use the calculator after reading the vector clues and caveats.

Open calculator

Disputed CVSS Guidance

Use the guidance when sources disagree or a score needs safer explanation.

Review disputes

Patch vs Mitigate vs Monitor

Turn severity and local evidence into the right action lane.

Choose lane