Replies: 1 comment
-
|
I'd like to add an important concern about the data quality of CVSS 4.0 scores sourced from GHSA, which is directly relevant to the example cited here. It includes |
Beta Was this translation helpful? Give feedback.
-
|
I'd like to add an important concern about the data quality of CVSS 4.0 scores sourced from GHSA, which is directly relevant to the example cited here. It includes |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Description
Summary
Add an option (e.g., a CLI flag or config) so Trivy can use CVSS 4.0 (when present) to determine the vulnerability Severity (Critical / High / Medium / Low), instead of always using CVSS 3.x (or the current logic).
Problem
Trivy already returns CVSS v4 score and vector in the scan response (#7968), but the Severity label is still derived from CVSS 3.x (or a single score from the chosen source). When a CVE has both CVSS 3.x and 4.0 in NVD, we only see the 3.x-driven severity.
Example
github.com/cloudflare/circl):So the same CVE is scored once as Critical and once as Low, depending on which CVSS version you use. We want to base our gates and reporting on the 4.0 score (Low), but Trivy has no option to use CVSS 4.0 for severity, so we have to treat it as Critical or add it to
.trivyignore. That’s the problem: a single CVE has two legitimate scores, and we cannot tell Trivy to use the 4.0 one for the Severity field..trivyignoreas a workaroundProposed solution
Introduce a way to prefer CVSS 4.0 for severity when it exists, for example:
--vuln-cvss-version 4(orprefer-v4), so severity is derived from CVSS 4.0 when available, otherwise fall back to current behavior.trivy.yaml) with the same semantics.When the option is not set, keep current behavior (no breaking change).
Why this matters
.trivyignore), which is opaque and hard to maintain.References
Target
Container Image
Scanner
Vulnerability
Beta Was this translation helpful? Give feedback.
All reactions