3

I'm having difficulty to rate a CVSS for an Identity Provider. Imagine you have a vulnerability where you can bypass an authentication mechanism.

How would you rate :

  • Confidentiality (C)
  • Integrity (I)
  • Availability (A)

as you don't with which system it will be connected?

The scope is changing, but I can't just assume the worst scenario. It will just raise the score unnecessarily.


Edit: For adding clarity, let's says you can bypass easily the second factor, but you still need the login/password.

I would rate this : https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:N (I set C/I/A to None as this is the question here).

As you need to know the login/password for a user, I set Privileges Required (PR) to High, but this could also be Low as he's not admin of the IdP but only act as a standard user.

Alternatively, an attacker with Low privileges may have the ability to cause an impact only to non-sensitive resources.

Kantium
  • 133
  • 4
  • You have to provide more details about the vulnerability to rate it. Also interesting for you: [Mastering CVSS](https://learning.first.org/courses/course-v1:FIRST+CVSSv3+2017/about) – Nurullah Mar 19 '20 at 19:17
  • @Nurullah Ok, good advice, I will add some info or example – Kantium Mar 20 '20 at 21:08

1 Answers1

1

I'm not a super expert on CVSS calculation, but I'll post an answer and see if I get corrections in comments.

I think you evaluate the impact on the affected component component itself, regardless of what else is connected to / relying on it (that's what the "Scope" CVSS metric is for).

From the CVSSv3.1 spec:

2.3.Impact Metrics

The Impact metrics capture the effects of a successfully exploited vulnerability on the component that suffers the worst outcome that is most directly and predictably associated with the attack. Analysts should constrain impacts to a reasonable, final outcome which they are confident an attacker is able to achieve.

Let's take a look at the Impact Metric definitions according to the NVD CVSSv3 Calculator.


Confidentiality Impact (C)

This metric measures the impact to the confidentiality of the information resources managed by a software component due to a successfully exploited vulnerability. Confidentiality refers to limiting information access and disclosure to only authorized users, as well as preventing access by, or disclosure to, unauthorized ones.

If this vulnerability allows you to gain unauthorized information from the identity provider component? Then this is certainly yes.

If not, then it really comes down to whether it's a "predictable reasonable final outcome" that Service Provider (SP) / Relying Party (RP) is going to have a confidentiality issue due to a failure of the IdP's authentication.

Kinda unclear to me also.


Integrity Impact (I)

This metric measures the impact to integrity of a successfully exploited vulnerability. Integrity refers to the trustworthiness and veracity of information.

If this vulnerability lets you bypass the authentication mechanism, then information from the identity provider is no longer trustworthy. Almost certainly High (I:H).


Availability Impact (A)

This metric measures the impact to the availability of the impacted component resulting from a successfully exploited vulnerability. While the Confidentiality and Integrity impact metrics apply to the loss of confidentiality or integrity of data (e.g., information, files) used by the impacted component, this metric refers to the loss of availability of the impacted component itself, such as a networked service (e.g., web, database, email). Since availability refers to the accessibility of information resources, attacks that consume network bandwidth, processor cycles, or disk space all impact the availability of an impacted component.

Can this vulnerability be used to crash the identity provider, or otherwise cause it to be unavailable for legitimate users? Will it predictably cause availability issues in the SPs / RPs that rely on it?


In the end, I'm not sure that I have answered your question at all haha.

Mike Ounsworth
  • 57,707
  • 21
  • 150
  • 207
  • Your answer does make really more sense to me in fact. Availability and Confidentiality (for the IdP) seems indeed not impacted (rated none). But the trustworthiness of the component is a really good point. – Kantium Mar 20 '20 at 21:17