Interactive CVSS 3.1 Base Score Calculator
Use this calculator to generate a CVSS v3.1 Base Score, severity level, and vector string for a vulnerability assessment.
Impact: 0.00
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
What is a CVSS 3.1 calculator?
A CVSS 3.1 calculator helps security teams score the severity of software vulnerabilities using the Common Vulnerability Scoring System standard. The score ranges from 0.0 to 10.0 and provides a consistent way to compare risk across CVEs, applications, and infrastructure.
In practical vulnerability management, CVSS is often one of the first signals used for triage. It does not replace business context, but it gives a common language for engineering, security operations, and leadership.
How this CVSS v3.1 calculator works
This page calculates the Base Score from the eight required base metrics: AV, AC, PR, UI, S, C, I, and A. It then returns:
- The numerical base score (0.0 to 10.0)
- The severity rating (None, Low, Medium, High, Critical)
- The CVSS vector string (for documentation and reporting)
- Exploitability and Impact subscores
The formula and rounding behavior follow the CVSS v3.1 specification, including the scope-dependent weighting of Privileges Required and “round up to one decimal” logic.
CVSS v3.1 base metrics explained
Exploitability metrics
- Attack Vector (AV): Network vulnerabilities are usually more dangerous than physical-only flaws because they are easier to reach at scale.
- Attack Complexity (AC): “Low” means exploitation is straightforward; “High” means extra conditions are needed.
- Privileges Required (PR): If no account is needed, the vulnerability is typically more severe.
- User Interaction (UI): Requiring a victim click or action usually lowers exploitability.
Impact metrics
- Scope (S): “Changed” means the exploited component can impact resources outside its original security authority.
- Confidentiality (C): Measures data exposure risk.
- Integrity (I): Measures unauthorized modification risk.
- Availability (A): Measures service disruption risk.
How to use this tool in a real workflow
- Collect technical details from advisory, PoC, and system architecture.
- Select each base metric carefully based on verified behavior.
- Record the generated vector in your ticket or scanner notes.
- Combine CVSS score with asset criticality and exploit intel.
- Set remediation SLA based on both technical severity and business impact.
Example scoring scenario
Suppose a remote code execution flaw can be exploited over the network with no privileges and no user interaction. If compromise can fully impact confidentiality, integrity, and availability, the vector may look like:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
That produces a very high score and should be prioritized quickly, especially on internet-facing systems.
Common mistakes to avoid
- Using environmental assumptions in base metrics.
- Overstating scope changes when impact actually stays in one trust boundary.
- Scoring from headlines rather than validated technical behavior.
- Treating CVSS as the only prioritization signal.
Final notes
CVSS 3.1 is best used as a repeatable baseline. For strong risk decisions, pair it with threat intelligence, exploit maturity, asset exposure, compensating controls, and operational constraints. This calculator gives you a fast, clear starting point for that process.