CVSS v4.0
CVSS v4.0 is the fourth major version of the Common Vulnerability Scoring System, published by FIRST in November 2023. It introduces significant changes to the scoring model including more granular base metrics, new supplemental score groups, and improved handling of OT/ICS and IoT vulnerability contexts — areas directly relevant to CRA-covered products.
CVSS v4.0 is the fourth major version of the Common Vulnerability Scoring System, published by FIRST in November 2023. It introduces significant changes to the scoring model including more granular base metrics, new supplemental score groups, and improved handling of OT/ICS and IoT vulnerability contexts — areas directly relevant to CRA-covered products.
CVD & Vulnerability ManagementWhat Is CVSS v4.0?
CVSS v4.0 is the latest major release of the Common Vulnerability Scoring System, the industry-standard framework for communicating the characteristics and severity of software vulnerabilities. Published by FIRST in November 2023, CVSS v4.0 significantly revises the metric structure of its predecessor (v3.1), which had been in use since 2019. Key structural changes include: renaming and redefining several base metrics; introducing new 'supplemental' metrics for additional context (such as Safety and Automatable); separating 'threat' (exploitation status) into its own dedicated metric group; and restructuring the temporal metrics. The result is a more expressive and contextually accurate scoring system.
Key Changes in CVSS v4.0 Relevant to CRA Products
Several CVSS v4.0 changes are particularly relevant to manufacturers of CRA-covered products:
- Safety (S) supplemental metric: CVSS v4.0 introduces a Safety metric indicating whether exploitation of the vulnerability could have physical safety consequences. This is directly relevant for Important Class products used in safety-critical contexts (medical devices, industrial controllers, automotive systems).
- Automatable (AU) metric: Indicates whether the vulnerability can be exploited at scale without human interaction — a key factor for IoT products that may be targeted by automated botnets.
- Improved OT/ICS context: v4.0 provides clearer guidance for scoring vulnerabilities in operational technology and industrial control systems contexts.
- Threat metrics separate from base: The new structure cleanly separates 'what this vulnerability can do' (base) from 'whether it is being actively exploited' (threat) — cleaner than v3.1's temporal metrics.
CVSS v4.0 Score Nomenclature
CVSS v4.0 uses a new naming convention for combined scores to avoid confusion with v3.x:
- CVSS-B: Base score only — the theoretical maximum severity.
- CVSS-BT: Base + Threat metrics — accounts for exploitation status.
- CVSS-BE: Base + Environmental metrics — accounts for deployment context (compensating controls, impact on specific system).
- CVSS-BTE: Base + Threat + Environmental — the most complete, contextualised score.
For CRA vulnerability advisories, manufacturers should use at minimum CVSS-BT (including threat status) when publishing CSAF advisories, as this communicates exploitation status to users. When the manufacturer has information about typical deployment environments (e.g., the product is typically deployed behind a firewall), using CVSS-BE to provide an adjusted score helps users with their own risk assessments.
Adopting CVSS v4.0 in PSIRT and Advisory Processes
CVSS v4.0 and v3.1 will coexist for several years during the transition period. CSAF (Common Security Advisory Framework) supports both versions. NVD is progressively adding v4.0 scores to new CVE entries while maintaining v3.1 scores for backwards compatibility. For manufacturers:
- Existing advisories: No immediate need to re-score historical advisories in v4.0.
- New advisories: Consider publishing both v3.1 and v4.0 scores during the transition to support tools not yet updated for v4.0.
- PSIRT scoring guidelines: Update internal scoring guidelines to incorporate v4.0 supplemental metrics, particularly Safety and Automatable, for product categories where these are relevant.
- Training: PSIRT team members should complete FIRST's CVSS v4.0 training to understand the scoring differences, particularly for the restructured attack complexity and privilege requirements metrics.
CVD Portal makes CVSS v4.0 compliance straightforward.
Public CVD submission portal, acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation. Free forever for EU manufacturers.
Start your free portalFrequently asked
Should manufacturers switch to CVSS v4.0 immediately for CRA compliance?+
The CRA does not mandate a specific CVSS version. CVSS v3.1 remains fully adequate for CRA compliance. CVSS v4.0 provides meaningful improvements for IoT and OT product manufacturers through its supplemental metrics, so manufacturers of these product types should plan adoption. During the transition period, publishing both v3.1 and v4.0 scores in CSAF advisories is the recommended approach to maintain compatibility with tools that have not yet updated to v4.0.
How do CVSS v3.1 and v4.0 scores compare numerically?+
CVSS v4.0 scores are not directly comparable to v3.1 scores — they use different formulas and metric structures. A vulnerability that scores 9.8 in v3.1 may score differently in v4.0 depending on the new metric values. When transitioning, manufacturers should re-evaluate their existing vulnerability inventory rather than assuming numeric equivalence. FIRST provides a CVSS v4.0 calculator at first.org/cvss/v4-0 for score verification.
What is the 'Safety' supplemental metric in CVSS v4.0?+
The Safety (S) supplemental metric in CVSS v4.0 indicates the potential physical safety impact of exploiting a vulnerability. Values are: Negligible (no physical safety impact) and Present (potential physical harm to humans). This metric does not affect the numeric base score but provides critical context for manufacturers and users of safety-critical products. For CRA-covered products deployed in safety-relevant contexts — medical devices, industrial machinery, vehicles — reporting this metric in advisories provides important information for users conducting their own risk assessments.
Related terms
Browse the full CRA Compliance Checklist
See how CVSS v4.0 fits into your complete CRA compliance programme.