The Severity of Vulnerabilities

I have been looking at how vendors classify vulnerability severity and I keep finding discrepancies between what the vendor says and what the CVSS score suggests.

Take the most recent batch of Microsoft patches. Two of the vulnerabilities rated as Important by Microsoft score above 8.0 on the CVSS v2 scale. By most definitions that is Critical, not Important. Yet Microsoft uses its own rating system that factors in exploitability and does not always align with CVSS.

This matters because enterprise patch management workflows often prioritize by vendor severity. If your WSUS deployment is configured to auto-approve Critical patches but defer Important ones to the next maintenance window, you are leaving high-CVSS vulnerabilities unpatched for days or weeks based on a vendor classification that may not reflect actual risk.

The Microsoft Rating System

Microsoft uses four severity levels: Critical, Important, Moderate, and Low. Their definitions focus on exploitation scenarios rather than raw impact scores. A vulnerability that requires authentication to exploit might be rated Important even if successful exploitation gives the attacker full system control.

I pulled the data from every Microsoft security bulletin in 2006 and compared the vendor severity against NVD CVSS scores. The results are concerning. 23 vulnerabilities rated Important by Microsoft had CVSS base scores above 7.5. Twelve of those scored above 8.5.

Other Vendors

Microsoft is not alone in this. Oracle, Adobe, and Cisco all maintain proprietary severity scales that diverge from CVSS in specific ways. Oracle is particularly opaque - their Critical Patch Updates include a CVSS score but the accompanying text often downplays the risk.

The problem is structural. Vendors have an incentive to minimize the perceived severity of vulnerabilities in their products. CVSS, whatever its flaws, is at least vendor-neutral.

What Should Enterprises Do?

First, do not rely solely on vendor severity for patch prioritization. Use CVSS scores from NVD as an independent data point. Second, build your own severity classification that accounts for your specific environment. Third, track the discrepancies over time. If a vendor consistently under-rates vulnerabilities, factor that into your risk assessment.

I will continue publishing the comparison data as new patch cycles come out. The full spreadsheet for 2006 is available on request.

Read more