CVSS v3.1 Base Score Calculator
Use this calculator to estimate a vulnerability's base severity score from its CVSS metrics. This is useful when triaging a newly published CVE.
Severity: --
Vector: --
Note: This computes the Base Score only (not Temporal or Environmental adjustments).
What Is a CVE Calculator?
A CVE calculator helps security teams quickly estimate how dangerous a vulnerability is. In most real workflows, that means calculating or validating a CVSS score for a CVE (Common Vulnerabilities and Exposures) entry. The result gives you a standardized severity value from 0.0 to 10.0, which helps with patch prioritization and risk communication.
When a new vulnerability drops, teams often ask: “Do we patch this now, next sprint, or during normal maintenance?” A CVE/CVSS calculator turns scattered technical details into a consistent risk signal you can use in dashboards, tickets, and executive updates.
CVE vs CVSS: Quick Clarification
- CVE is the identifier (for example, CVE-2025-12345).
- CVSS is the scoring system used to measure severity and exploitability.
- A “CVE calculator” usually means a calculator for the CVSS metrics associated with that CVE.
How This Calculator Works
This page calculates the CVSS v3.1 Base Score using the official base metrics:
Exploitability Metrics
- Attack Vector (AV): How remote the attacker can be.
- Attack Complexity (AC): How hard the attack conditions are.
- Privileges Required (PR): Access needed before exploitation.
- User Interaction (UI): Whether a user must do something.
Impact Metrics
- Confidentiality (C): Potential exposure of sensitive data.
- Integrity (I): Potential for unauthorized changes.
- Availability (A): Potential service disruption.
- Scope (S): Whether compromise crosses trust boundaries.
Interpreting the Result
After calculation, you get a numeric score and a severity band:
- 0.0: None
- 0.1–3.9: Low
- 4.0–6.9: Medium
- 7.0–8.9: High
- 9.0–10.0: Critical
You also get a vector string such as CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, which is easy to copy into reports and ticketing systems.
Practical Use in Vulnerability Management
1) Intake and Triaging
When an internal scan or external advisory references a new CVE, use this calculator to verify assumptions and normalize scoring across analysts.
2) Prioritization
Use CVSS as one input in a broader risk model. Combine it with asset criticality, exploit maturity, internet exposure, and whether compensating controls exist.
3) Communication
Scores and vector strings provide concise language for technical and non-technical stakeholders. Instead of saying “seems bad,” you can say “CVSS 9.8 Critical, network exploitable, no user interaction.”
Important Limitations
- Base score does not reflect your exact environment.
- Some medium CVEs are urgent if exposed on critical systems.
- Some high CVEs may be low practical risk if controls block exploitation.
- You should also track exploitation intelligence (for example, active exploitation in the wild).
Best Practice Workflow
- Calculate or verify CVSS base score.
- Check if affected assets are present in your environment.
- Add context: business impact, exposure, exploit availability, patch complexity.
- Set SLA and remediation owner.
- Retest and close with evidence.
Final Thoughts
A CVE calculator is simple but powerful. It gives teams a shared framework for discussing security risk and deciding what to fix first. Use the score to start the conversation, then layer in real-world context for stronger decisions.