CVSS 4.0 Explained: What Changed, New Metrics, and How to Use the New Scoring System
CVSS (Common Vulnerability Scoring System) is the most widely used framework for communicating vulnerability severity, appearing in NVD entries, vendor security advisories, and vulnerability management dashboards used by security teams worldwide. Version 4.0, released by FIRST in November 2023, is the most significant revision since CVSS 3.0 in 2015. It is not backward-compatible with CVSS 3.1 scores for the same CVE, and it introduces new metrics that change how severity is calculated and communicated.
For vulnerability management practitioners, CVSS 4.0 matters because it attempts to fix several well-documented weaknesses in CVSS 3.1: the imprecise Scope metric, the rarely-used Temporal group, and the absence of metrics for safety impact and automated exploitation risk. Whether CVSS 4.0 delivers meaningful improvement in prioritization quality depends on whether practitioners apply it correctly and whether vulnerability databases and tools adopt it consistently. This guide covers every change in detail.
What Changed from CVSS 3.1 to CVSS 4.0
CVSS 4.0 introduces changes across every metric group. Understanding which changes are structural versus cosmetic is essential for teams evaluating whether and how to transition.
Base metric changes:
| Metric | CVSS 3.1 | CVSS 4.0 | Change |
|---|---|---|---|
| Attack Vector | AV: N/A/L/P | AV: N/A/L/P | Unchanged |
| Attack Complexity | AC: L/H | AC: L/H | Scope clarified |
| Attack Requirements | (did not exist) | AT: N/P | New metric |
| Privileges Required | PR: N/L/H | PR: N/L/H | Unchanged |
| User Interaction | UI: N/R | UI: N/P/A | Now three values |
| Scope | S: U/C | (removed) | Replaced by dual impact |
| Confidentiality Impact | C: N/L/H | VC + SC | Split into two |
| Integrity Impact | I: N/L/H | VI + SI | Split into two |
| Availability Impact | A: N/L/H | VA + SA | Split into two |
The most structurally significant changes are:
Attack Requirements (AT): A new base metric that captures prerequisites for exploitation beyond the attack vector. AT:N (None) means no special conditions are required; AT:P (Present) means that specific deployment configuration, race condition, or other prerequisite must be present. This separates general attack feasibility (captured by Attack Complexity) from environmental prerequisites, providing more precise scoring for vulnerabilities that require specific configurations to exploit.
User Interaction (UI) expansion: CVSS 3.1 had only two values: None and Required. CVSS 4.0 expands to three: None, Passive (the victim performs a routine action like opening a file or visiting a page, without specific social engineering), and Active (the victim must take a non-routine action that would typically require social engineering). This distinction matters for phishing-delivered exploits versus drive-by exploits.
Scope metric removal: The binary Scope: Unchanged/Changed metric from CVSS 3.1 is replaced by the dual-impact model (Vulnerable System + Subsequent System impact), which provides six CIA metrics instead of three and eliminates the ambiguity in how Scope was applied.
Metric group changes:
- Temporal group renamed to Threat group, reduced from three metrics (Exploit Code Maturity, Remediation Level, Report Confidence) to one metric (Exploit Maturity: E:A/P/U)
- New Supplemental metric group added (Safety, Automatable, Recovery, Value Density, Vulnerability Response Effort, Provider Urgency)
- Supplemental metrics do NOT modify the CVSS score; they provide additional context for consumers
Nomenclature changes:
- CVSS 4.0 defines four official score types: CVSS-B (Base only), CVSS-BT (Base + Threat), CVSS-BE (Base + Environmental), and CVSS-BTE (Base + Threat + Environmental)
- Users are encouraged to report which score type they are publishing alongside the score value
New Base Metrics: Attack Requirements and Revised User Interaction
The two most practically impactful Base metric changes in CVSS 4.0 are the addition of Attack Requirements and the expansion of User Interaction from two to three values.
Attack Requirements (AT):
AT distinguishes between two types of conditions that affect exploitability beyond the attack vector:
-
AT:N (None): No specific conditions beyond the attack vector are required. The vulnerability is exploitable against any target running the vulnerable software from the specified attack vector. Most network-accessible vulnerabilities without specific configuration requirements are AT:N.
-
AT:P (Present): Specific conditions must exist for exploitation to succeed. Examples include: a specific non-default configuration option that exposes the vulnerability, a race condition that requires the target system to be in a specific transient state, or a deployment pattern (such as running behind a load balancer with session stickiness) that enables the attack.
The scoring impact of AT is significant: AT:P reduces the Base score compared to AT:N for the same vulnerability, reflecting the reduced practical exploitability when prerequisites must be present.
Where AT:P is commonly applied:
- PHP deserialization vulnerabilities that are only exploitable when specific unserialize() functions are called with attacker-controlled input through a particular code path
- Race condition vulnerabilities in multi-threaded applications
- Vulnerabilities in optional modules or plugins that are not enabled by default
- Vulnerabilities that require a specific database schema or application data state
User Interaction (UI) three-value expansion:
-
UI:N (None): No user action is required. The attacker can exploit the vulnerability purely through their own actions. Remote code execution via an unauthenticated network service is UI:N.
-
UI:P (Passive): The victim must perform a routine action that they would naturally do during normal system use, without any social engineering. A victim opening a malicious file they received through normal email flows, viewing an attacker-crafted image, or browsing to a page that loads attacker-controlled content is UI:P. The key distinction is that the victim does not need to take any action they would not normally take.
-
UI:A (Active): The victim must be convinced to take a non-routine action through social engineering. Clicking a link in a phishing email that they would not normally click, executing a file, or granting elevated permissions is UI:A. This explicitly models the social engineering component required for many drive-by and phishing-delivered exploits.
The practical implication: many CVEs that scored UI:R in CVSS 3.1 will now score either UI:P or UI:A in CVSS 4.0, and the distinction affects how organizations should prioritize based on their threat model and user population.
Briefings like this, every morning before 9am.
Threat intel, active CVEs, and campaign alerts, distilled for practitioners. 50,000+ subscribers. No noise.
The Threat Metric Group: Replacing Temporal with a Single Exploit Maturity Metric
The CVSS 3.1 Temporal group contained three metrics: Exploit Code Maturity (E), Remediation Level (RL), and Report Confidence (RC). In practice, Remediation Level and Report Confidence were almost never set in published vulnerability data because they required active maintenance and were quickly outdated. CVSS 4.0 addresses this by:
- Renaming the group from Temporal to Threat to reflect its actual purpose: capturing current real-world threat activity
- Reducing the group to a single metric: Exploit Maturity (E)
- Dropping Remediation Level and Report Confidence entirely
Exploit Maturity (E) values in CVSS 4.0:
-
E:U (Unreported): No evidence of exploitation. No public proof-of-concept and no reports of active exploitation. This is the default value when no threat intelligence is available.
-
E:P (Proof-of-Concept): Proof-of-concept code is publicly available but active exploitation in the wild has not been reported. This value applies when a functional exploit exists that demonstrates the vulnerability but has not been operationalized by attackers.
-
E:A (Attacked): The vulnerability is being actively exploited in the wild. This value applies when credible threat intelligence sources (CISA KEV, GreyNoise, vendor incident reports, threat intelligence feeds) report active exploitation.
How Exploit Maturity affects scoring:
A CVSS 4.0 CVSS-B score uses the default E:U assumption. Setting E:A elevates the effective CVSS-BT score. The mathematical relationship is: a Critical CVSS-B vulnerability (9.0-10.0) with E:A scores at or near the same level; the same vulnerability with E:P scores slightly lower to reflect the theoretical versus realized threat. This scoring incentive is aligned with operational priority: known-exploited vulnerabilities should score highest.
Operationalizing Exploit Maturity:
Organizations can automate Exploit Maturity assignment by integrating threat intelligence sources with their vulnerability management pipeline:
- CISA Known Exploited Vulnerabilities (KEV) catalog: CVEs in KEV should be assigned E:A
- GreyNoise: Mass scanning activity for specific CVEs indicates E:A or E:P depending on context
- ExploitDB / Metasploit module availability: functional public exploits warrant E:P or E:A
- Vendor security advisories that note "exploited in the wild" warrant E:A
Automatic E:A assignment for all CVEs in CISA KEV and E:P for CVEs with Metasploit modules is a practical starting point that can be implemented with publicly available data sources.
Supplemental Metrics: Safety, Automatable, and What They Mean for Prioritization
The Supplemental metric group is CVSS 4.0's most novel addition. Unlike all other CVSS metric groups, Supplemental metrics do NOT affect the CVSS score. They provide contextual information that consumers can use to understand the vulnerability's characteristics beyond severity.
The six Supplemental metrics are:
Safety (S: N/P): Whether exploitation could affect physical safety. S:N means no physical safety impact. S:P (Present) means exploitation could directly or indirectly result in physical harm. This applies to vulnerabilities in industrial control systems (ICS), medical devices, automotive systems, and other cyber-physical environments where software compromise has physical consequences. CVSS 4.0 added Safety explicitly because the growth of OT/ICS and IoT systems has made physical safety impact a necessary dimension of vulnerability risk communication.
Automatable (AU: N/Y): Whether the full attack chain, from initial access through successful exploitation, can be automated at scale without human interaction per target. AU:Y (Yes) means the vulnerability can be incorporated into automated attack tools and used in mass exploitation campaigns. AU:N means automation is not feasible for some step in the attack chain. This metric directly maps to weaponization risk: AU:Y vulnerabilities are candidates for rapid mass exploitation and merit faster response timelines.
Recovery (R: A/U/I): Whether a victim system automatically recovers to a functional state after exploitation. R:A (Automatic) means the system recovers without operator intervention (transient denial of service). R:U (User) means recovery requires manual action but is achievable. R:I (Irrecoverable) means the system cannot be restored to a fully functional state without replacement or reimaging (ransomware, destructive malware, persistent firmware compromise).
Value Density (V: D/C): Whether the vulnerable deployment pattern is diffuse (many low-value targets, D) or concentrated (few high-value targets, C). A vulnerability in a widely deployed consumer application is V:D; a vulnerability in enterprise financial infrastructure is V:C. This helps consumers understand the economic incentive structure for attackers targeting the vulnerability.
Vulnerability Response Effort (RE: L/M/H): The effort required for a typical organization to remediate the vulnerability. RE:L (Low) means a simple patch is available and deployment is straightforward. RE:H (High) means remediation requires significant operational effort: complex workarounds, re-architecture, or manual remediation steps across many systems.
Provider Urgency (U: Clear/Green/Amber/Red): A qualitative urgency designation that vulnerability providers (vendors, CERTs) can set to communicate their overall assessment of the remediation urgency: Clear (no urgency), Green (low urgency), Amber (moderate urgency), or Red (act immediately). This is equivalent to TLP color codes applied to urgency rather than information sensitivity.
For vulnerability management programs, Automatable and Recovery are the two Supplemental metrics with the most immediate operational value. Combining Automatable:Yes with Exploit Maturity:Attacked and a high Base score identifies the vulnerabilities most likely to cause mass organizational impact in the near term.
CVSS 4.0 Scoring Walkthrough: Applying the System to a Real CVE
To make CVSS 4.0 concrete, here is a step-by-step scoring exercise for CVE-2024-21413, a Microsoft Outlook remote code execution vulnerability that was exploited in the wild and added to CISA KEV.
Vulnerability summary: An attacker can send a specially crafted email containing a link to a UNC path. When the victim previews the email in Outlook, the Preview Pane automatically processes the link, triggering an NTLM credential leak and potential code execution without the victim clicking anything.
Step 1: Base metrics (attack pathway)
- Attack Vector (AV): Network (N) -- exploitation is initiated over the network via email
- Attack Complexity (AC): Low (L) -- no special technical conditions required beyond crafting the email
- Attack Requirements (AT): None (N) -- no special target configuration required; default Outlook installation is affected
- Privileges Required (PR): None (N) -- the attacker does not need any authentication
- User Interaction (UI): Passive (P) -- the victim must preview the email, which is a routine action when checking email; no social engineering required to get the victim to look at email
Step 2: Vulnerable System impact
- Vulnerable System Confidentiality (VC): High (H) -- NTLM credentials are leaked, which is a high-confidentiality impact on the vulnerable system
- Vulnerable System Integrity (VI): High (H) -- code execution is possible
- Vulnerable System Availability (VA): High (H) -- code execution can affect availability
Step 3: Subsequent System impact
- Subsequent System Confidentiality (SC): High (H) -- NTLM credentials can be used to authenticate to other systems (relay attacks)
- Subsequent System Integrity (SI): High (H) -- credential relay enables lateral movement and subsequent system compromise
- Subsequent System Availability (SA): High (H) -- access to subsequent systems can affect their availability
CVSS-B vector and score:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
CVSS-B Score: 9.3 (Critical)
Step 4: Threat metrics
CVE-2024-21413 was added to CISA KEV after active exploitation was observed. Exploit Maturity: Attacked (E:A)
CVSS-BT vector adds: /E:A
CVSS-BT Score: 9.3 (the score does not change significantly from E:A because the base score is already at maximum)
Step 5: Supplemental metrics
- Automatable (AU): Yes (Y) -- the attack chain can be fully automated: generate malicious email, send to target, capture NTLM hash via Responder, relay hash
- Recovery (R): User (U) -- credential rotation is required but systems recover without replacement
- Provider Urgency (U): Red -- Microsoft rated this as critical with active exploitation
This walkthrough illustrates how CVSS 4.0 captures the full propagation risk (Subsequent System impact at High across all three CIA dimensions) that CVSS 3.1's Scope:Changed captured only qualitatively.
What CVSS 4.0 Means for Vulnerability Prioritization Programs
CVSS 4.0 does not solve the fundamental limitation of CVSS as a prioritization tool: CVSS scores severity, not risk. Risk requires context about your specific environment, asset criticality, compensating controls, and current threat activity, none of which are captured in a CVSS base score. But CVSS 4.0 does provide meaningful improvements in two areas: more precise severity communication and new supplemental context that operationally-focused programs can leverage.
What improves with CVSS 4.0:
The Subsequent System impact model provides a more precise signal about lateral movement and blast radius risk than the binary CVSS 3.1 Scope metric. A vulnerability with SC:H/SI:H/SA:H is a much clearer signal about multi-system risk than Scope:Changed in CVSS 3.1, which could mean anything from "one adjacent service is affected" to "the entire Active Directory forest is at risk."
The Automatable supplemental metric provides the weaponization risk signal that practitioners have historically had to derive from other sources. Combining Automatable:Yes with Exploit Maturity:Attacked directly identifies the vulnerabilities most likely to become mass exploitation events. This combination should trigger immediate escalation regardless of the specific CVSS-B score.
The simplified Threat group (E:A/P/U) is more practical for automation than the three-metric CVSS 3.1 Temporal group. A vulnerability management pipeline that automatically assigns E:A for CISA KEV entries is achievable with publicly available data; automatically and accurately scoring all three CVSS 3.1 Temporal metrics was impractical for most organizations.
What does not change:
CVSS 4.0 base scores alone are still insufficient for operational prioritization. The combination of CVSS-BTE (applying both Threat and Environmental metrics) with EPSS score, asset criticality, and exposure context remains the recommended approach. Organizations that are not applying Environmental metrics (CR, IR, AR requirements) are still producing context-free scores. CVSS 4.0 makes Environmental metrics slightly easier to apply with clearer guidance, but the organizational discipline to collect and maintain asset-level security requirements is still required.
Transition guidance:
- Do not retroactively re-score your vulnerability backlog under CVSS 4.0. The engineering effort is not worth the scoring delta for historical vulnerabilities you have already prioritized.
- For new CVEs, begin consuming CVSS 4.0 scores from NVD and vendor advisories alongside CVSS 3.1 scores. Use the NVD API's
cvssMetricV40field. - Update SLA thresholds carefully. A Critical CVSS 4.0 score does not map 1:1 to a Critical CVSS 3.1 score for the same CVE because the weighting changed.
- Implement automated Exploit Maturity (E:A) assignment for CISA KEV entries and Automatable supplemental metric flagging as the first operational use of CVSS 4.0 data.
The bottom line
CVSS 4.0 is a meaningful improvement over CVSS 3.1 in its precision of severity expression, particularly the dual-impact model replacing Scope and the simplified Threat group replacing the ignored Temporal group. The new Supplemental metrics, especially Automatable and Safety, address real gaps in how vulnerability risk is communicated for IoT, OT, and mass-exploitation scenarios. The transition will take years as NVD, scanner vendors, and organizational processes adapt. The right response is not to wait for full industry adoption but to start consuming CVSS 4.0 data now for new CVEs while understanding that CVSS alone is never sufficient for risk-based prioritization without environmental and threat context applied.
Frequently asked questions
What is the most important change in CVSS 4.0 compared to 3.1?
The most significant structural change is the replacement of the Temporal metric group with the new Threat metric group, which simplifies exploit-related scoring to a single metric (Exploit Maturity) while being more operationally honest about what can be measured at the time of CVE publication. The most impactful new metric is the split of the CVSS 3.1 Scope metric into two separate impact groups: Vulnerable System impact and Subsequent System impact, which provides much more precise expression of whether exploitation affects only the vulnerable component or propagates to adjacent systems. For vulnerability prioritization programs, the new Supplemental metric group's Automatable metric, which indicates whether exploitation can be automated at scale, is practically the most useful addition because it directly informs weaponization risk.
How do I read a CVSS 4.0 vector string?
A CVSS 4.0 vector string begins with the prefix `CVSS:4.0/` followed by metric abbreviation and value pairs separated by forward slashes: `CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H`. The metrics AV (Attack Vector), AC (Attack Complexity), AT (Attack Requirements), PR (Privileges Required), and UI (User Interaction) are Base metrics describing the attack pathway. VC, VI, VA are Vulnerable System Confidentiality, Integrity, and Availability impacts. SC, SI, SA are Subsequent System Confidentiality, Integrity, and Availability impacts. Threat metrics are appended as `/E:A` (Exploit Maturity: Attacked), and Environmental metrics as `/CR:H/IR:H/AR:H` for security requirements. The FIRST online calculator at first.org/cvss/calculator/4.0 renders vector strings interactively.
What is the difference between Vulnerable System impact and Subsequent System impact?
In CVSS 3.1, the Scope metric indicated whether exploitation could affect resources beyond the vulnerable component, but it was a binary distinction with limited precision. CVSS 4.0 replaces Scope with two separate impact groups, each with three CIA metrics. Vulnerable System impact (VC, VI, VA) describes the confidentiality, integrity, and availability impact on the component that contains the vulnerability itself. Subsequent System impact (SC, SI, SA) describes the impact on other systems, services, or users that the vulnerable component can interact with. A vulnerability in a containerized application that can escape the container and affect the host OS would score Vulnerable System impact on the container and Subsequent System impact on the host. This distinction allows CVSS 4.0 to express propagation risk more precisely than the binary Scope change in CVSS 3.1.
Why was the Temporal group renamed to Threat in CVSS 4.0?
The CVSS 3.1 Temporal group contained three metrics: Exploit Code Maturity, Remediation Level, and Report Confidence. FIRST found in practice that Remediation Level and Report Confidence were almost never set by CVE publishers or vulnerability databases, making the Temporal group operationally useless for most consumers. CVSS 4.0 simplifies the group to a single metric called Exploit Maturity (E), which captures whether exploitation is theoretical, proof-of-concept, or actively occurring in the wild. The rename to Threat reflects the intended use: Threat metrics modify the Base score based on current real-world threat intelligence, not the passage of time. The single Exploit Maturity metric is also easier for automated systems to populate from threat intelligence feeds that track exploitation activity, such as CISA KEV or GreyNoise.
Should I update my vulnerability management SLAs to use CVSS 4.0?
CVSS 4.0 base scores are not directly comparable to CVSS 3.1 base scores for the same CVE because the metric structure and weighting changed. Before updating SLAs, re-score a representative sample of your vulnerability backlog under CVSS 4.0 and compare the distribution to your current CVSS 3.1 score distribution. If the distribution shifts significantly, SLA thresholds based on CVSS severity ranges (Critical, High, Medium, Low) may need recalibration. More importantly, CVSS 4.0 is designed to be used with environmental and threat metrics applied; base-only CVSS 4.0 scores are just as context-free as base-only CVSS 3.1 scores. The bigger opportunity is to finally implement Environmental metric customization, which CVSS has supported since version 2.0 but which almost no organization applies in practice.
How do CVSS 4.0 and EPSS work together for prioritization?
CVSS 4.0 measures severity, the potential impact if a vulnerability is exploited. EPSS (Exploit Prediction Scoring System) measures likelihood, the probability that a CVE will be exploited in the wild within 30 days. Used together, they create a two-dimensional prioritization matrix: high-CVSS, high-EPSS vulnerabilities are the highest priority; high-CVSS, low-EPSS vulnerabilities may warrant remediation planning but less urgency; low-CVSS, high-EPSS vulnerabilities may still warrant immediate attention in sensitive environments. FIRST publishes EPSS scores daily at first.org/epss and most commercial vulnerability management platforms now surface EPSS scores alongside CVSS. The CVSS 4.0 Supplemental metric Automatable complements EPSS by indicating whether automated exploitation at scale is feasible, which is a strong signal for weaponization risk independent of current observed exploitation.
When will NVD fully transition to CVSS 4.0 scoring?
As of early 2026, NVD publishes CVSS 4.0 scores alongside CVSS 3.1 scores for newly published CVEs. Retroactively re-scoring the full NVD database under CVSS 4.0 is not planned; historical CVEs will retain their CVSS 3.1 scores as the primary historical record. NVD experienced significant publication backlogs in 2024 that affected all scoring activity, and CVSS 4.0 adoption was one of several factors cited. Many commercial vulnerability intelligence providers (Tenable, Qualys, Rapid7, Vulncheck) have announced or completed CVSS 4.0 integration in their platforms. For organizations building prioritization systems, plan to handle both CVSS 3.1 and CVSS 4.0 scores simultaneously for at least the next three to five years as the industry transition completes.
Sources & references
Free resources
Critical CVE Reference Card 2025–2026
25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.
Ransomware Incident Response Playbook
Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.
Get threat intel before your inbox does.
50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.
Unsubscribe anytime. We never sell your data.

Founder & Cybersecurity Evangelist, Decryption Digest
Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.
The Mythos Brief is free.
AI that finds 27-year-old zero-days. What it means for your security program.
