Vulnerabilities such as Spectre (speculative
execution), which many people have deemed safe
for many years, will become prevalent in the
cyberspace. Nevertheless, we believe that, first and
foremost, a modern vulnerability severity
assessment framework should not be rigid and
should take into account many evolving factors.
6 CONCLUSIONS
In this paper, we analysed what we call rock star
vulnerabilities which we identified after a thorough
and rigorous selection procedure. We showed that
despite the level of stardom of those vulnerabilities,
only one of them has the maximum numerical score
in the CVSS. Further analysis showed that there is
not a single metric in the CVSS that capture the real
state of those vulnerabilities. Additionally, we found
that rock star vulnerabilities that have been
discovered after exploitation and vulnerabilities that
were discovered before exploitation are rated
differently with the latter having lower scores than
the former as if the evaluators were reacting to the
amount of damage that the vulnerabilities have
caused in the real world. In conclusion, we believe
that as a community we have failed to propose a
standard that succeeds to capture all the facets of a
vulnerability in order to give it the score it deserves.
We should devise a vulnerability scoring system that
is immune from human emotion and yet can capture
all the facets of a vulnerability.
REFERENCES
Mell, P., Scarfone, K. and Romanosky, S., 2007, June. A
complete guide to the common vulnerability scoring
system version 2.0. In Published by FIRST-Forum of
Incident Response and Security Teams (Vol. 1, p. 23).
FIRST, CVSS (SIG) members, 2015. Common
Vulnerability Scoring System v3.0: Specification
Document. In Published by FIRST. Available at
https://www.first.org/cvss/cvss-v30-specification-
v1.8.pdf [Accessed 27 Sept. 2018].
NVD, 2018. National Vulnerability Database. [online]
Available at https://nvd.nist.gov [Accessed on 29 Sept.
2018].
Lipp, M., Schwarz, M., Gruss, D., Prescher, T., Haas, W.,
Mangard, S., Kocher, P., Genkin, D., Yarom, Y. and
Hamburg, M., 2018. Meltdown. arXiv preprint
arXiv:1801.01207.
Kocher, P., Genkin, D., Gruss, D., Haas, W., Hamburg,
M., Lipp, M., Mangard, S., Prescher, T., Schwarz, M.
and Yarom, Y., 2018. Spectre attacks: Exploiting
speculative execution. arXiv preprint
arXiv:1801.01203.
Vanhoef, M. and Piessens, F., 2016, August. Predicting,
Decrypting, and Abusing WPA2/802.11 Group Keys.
In USENIX Security Symposium (pp. 673-688).
Johnson, P., Lagerstrom, R., Ekstedt, M. and Franke, U.,
2016. Can the Common Vulnerability Scoring System
be Trusted? A Bayesian Analysis. IEEE Transactions on
Dependable and Secure Computing, (1), pp.1-1.
Li, F. and Paxson, V., 2017, October. A large-scale
empirical study of security patches. In Proceedings of
the 2017 ACM SIGSAC Conference on Computer and
Communications Security (pp. 2201-2215). ACM.
Munaiah, N. and Meneely, A., 2016, November.
Vulnerability severity scoring and bounties: Why the
disconnect?. In Proceedings of the 2nd International
Workshop on Software Analytics (pp. 8-14). ACM.
Bozorgi, M., Saul, L.K., Savage, S. and Voelker, G.M.,
2010, July. Beyond heuristics: learning to classify
vulnerabilities and predict exploits. In Proceedings of
the 16th ACM SIGKDD international conference on
Knowledge discovery and data mining (pp. 105-114).
ACM.
Vijayan, J., 2016. The 10 worst vulnerabilities of the last 10
years. [online] Darkreading.com. Available at
https://www.darkreading.com/vulnerabilities---
threats/the-10-worst-vulnerabilities-of-the-last-10-
years/d/d-id/1325425 [Accessed 9 July 2018].
Zdnet.com, 2014. Before Heartbleed: Worst vulnerabilities
ever. [online] Available at
https://www.zdnet.com/pictures/before-heartbleed-
worst-vulnerabilities-ever/ [Accessed 6 June 2018].
Norton.com, 2016. The 8 most famous computer viruses of
all time. [online] Available at
https://uk.norton.com/norton-
blog/2016/02/the_8_most_famousco.html [Accessed 20
June 2018].
Jamaluddin, A., 2017. 10 most destructive computer viruses.
[online] Hongkiat.com. Available at
https://www.hongkiat.com/blog/famous-malicious-
computer-viruses/ [Accessed 20 July 2018].
Wikipedia.org, 2017. Timeline of computer viruses and
worms. [online] Available at
https://en.wikipedia.org/wiki/Timeline_of_computer_vi
ruses_and_worms [Accessed 27 August 2018].
Ward, M., 2017. WannaCry and the malware hall of fame.
[online] BBC News. Available at
https://www.bbc.com/news/technology-39928456
[Accessed 15 Sept. 2018].
Möller, B., Duong, T. and Kotowicz, K., 2014. This
POODLE bites: exploiting the SSL 3.0
fallback. Security Advisory.
Durumeric, Z., Li, F., Kasten, J., Amann, J., Beekman, J.,
Payer, M., Weaver, N., Adrian, D., Paxson, V., Bailey,
M. and Halderman, J.A., 2014, November. The matter
of Heartbleed. In Proceedings of the 2014 conference on
internet measurement conference (pp. 475-488). ACM.
Kaminsky, D., 2008. Black ops 2008: It’s the end of the
cache as we know it. Black Hat USA.