Severity Levels
Atlassian security advisories include a severity level. This severity level is based on our self-calculated CVSS score for each specific vulnerability. CVSS is an industry standard vulnerability metric. You can learn more about CVSS at FIRST.org web site.
CVSS scores are mapped into the following severity ratings:
- Critical
- High
- Medium
- Low
An approximate mapping guideline is as follows:
CVSS score range | Severity in advisory |
---|---|
0 – 2.9 | Low |
3 – 5.9 | Medium |
6.0 – 7.9 | High |
8.0 – 10.0 | Critical |
Below is a summary of the factors which illustrate types of vulnerabilities usually resulting in a specific severity level. Please keep in mind that this rating does not take into account details of your installation.
Severity Level: Critical
Vulnerabilities that score in the critical range usually have the following characteristics:
- Exploitation of the vulnerability results in root-level compromise of servers or infrastructure devices.
- The information required in order to exploit the vulnerability, such as example code, is widely available to attackers.
- Exploitation is usually straightforward, in the sense that the attacker does not need any special authentication credentials or knowledge about individual victims, and does not need to persuade a target user, for example via social engineering, into performing any special functions.
For critical vulnerabilities, is advised that you patch or upgrade as soon as possible, unless you have other mitigating measures in place. For example, if your installation is not accessible from the Internet, this may be a mitigating factor.
Severity Level: High
Vulnerabilities that score in the high range usually have the following characteristics:
- The vulnerability is difficult to exploit.
- Exploitation does not result in elevated privileges.
- Exploitation does not result in a significant data loss.
Severity Level: Medium
Vulnerabilities that score in the medium range usually have the following characteristics:
- Denial of service vulnerabilities that are difficult to set up.
- Exploits that require an attacker to reside on the same local network as the victim.
- Vulnerabilities that affect only nonstandard configurations or obscure applications.
- Vulnerabilities that require the attacker to manipulate individual victims via social engineering tactics.
- Vulnerabilities where exploitation provides only very limited access.
Severity Level: Low
Vulnerabilities in the low range typically have very little impact on an organisation's business. Exploitation of such vulnerabilities usually requires local or physical system access.
Further reading
See Atlassian Support Offerings for more support-related information.