Inconsistent Severity Levels Reported for Same CVE #5757
Replies: 4 comments 4 replies
-
Hello @sanjayengi Created #5762 for this task. Regards, Dmitriy |
Beta Was this translation helpful? Give feedback.
-
Hello @DmitriyLewen, Could you please have a re-look? |
Beta Was this translation helpful? Give feedback.
-
Hello @DmitriyLewen, Regards, |
Beta Was this translation helpful? Give feedback.
-
Amazon database returns ALASs with CVE list. ALAS doesn't include severity for CVEs (only for ALAS). But you found case when ALAS severity for AL2023 != ALAS severity for AL2: We have not seen such cases and we don't have a strict order for parsing ALASs. This case appears to be a bug in Amazon's database. @knqyf263 wdyt? Perhaps we need to keep ALASs instead of CVEs for Amazon advisories or add parse order to remove instability. @sanjayengi to solve this problem you can write small module to set correct severity for CVE-2022-25313 and CVE-2022-23990. |
Beta Was this translation helpful? Give feedback.
-
Description
When scanning an image, Trivy shows different severity levels ("High" or "Critical") for the same CVE, even though the CVSS3 scores from NVD and vendors are consistent across scans. We have tried with multiple scans for more than a week with different trivy versions.
Here are the CVSS3 scores for one such CVE (https://avd.aquasec.com/nvd/2023/cve-2023-37920/)
According to these scores and the CVSS v3.0 rating scale, Trivy should classify this CVE as "Critical". However, in some scans, Trivy classifies it as "High".
I've tested this with three different versions of Trivy and observed the same behavior.
Trivy versions used for the scans:
0.44.0,
0.46.1,
0.47.0
Image: opensearchproject/opensearch:2.6.0
Remark: Looks like this is caused by some database updates in the backend. In our last test, the original severity "Critical" got changed to "High" again after the Trivy database got updated update on 12/7/23, 1:13 PM. This database update information, I have taken from Harbor UI.
Database updated on: 12/7/23, 1:13 PM
Desired Behavior
Trivy should consistently classify the severity level of a CVE based on the CVSS scores.
Actual Behavior
Trivy sometimes shows the severity as "High" and sometimes "Critical" for the same CVE.
Reproduction Steps
1. Scan the image multiple times over a period of few hours (6-8 hours, after the Trivy database is updated) or sometimes it take few days. $ trivy image --severity CRITICAL,HIGH opensearchproject/opensearch:2.6.0 ...
Target
Container Image
Scanner
Vulnerability
Output Format
Table
Mode
Standalone
Debug Output
Operating System
macOS Sonoma (for local test), Harbor Version v2.8.4-ad3e767d (Trivy V0.44.0 & V0.46.1)
Version
Checklist
trivy image --reset
Beta Was this translation helpful? Give feedback.
All reactions