You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/docs/scanner/vulnerability.md
+38-1
Original file line number
Diff line number
Diff line change
@@ -66,7 +66,44 @@ If the data source does not provide a severity, the severity is determined based
66
66
| 7.0-8.9 | High |
67
67
| 9.0-10.0 | Critical |
68
68
69
-
If the CVSS score is also not provided, it falls back to [NVD][nvd], and if NVD does not have severity, it will be UNKNOWN.
69
+
If the CVSS score is also not provided, it falls back to [NVD][nvd].
70
+
71
+
NVD and some vendors may delay severity analysis, while other vendors, such as Red Hat, are able to quickly evaluate and announce the severity of vulnerabilities.
72
+
To avoid marking too many vulnerabilities as "UNKNOWN" severity, Trivy uses severity ratings from other vendors when the NVD information is not yet available.
73
+
The order of preference for vendor severity data can be found [here](https://github.com/aquasecurity/trivy-db/blob/79d0fbd1e246f3c77eef4b9826fe4bf65940b221/pkg/vulnsrc/vulnerability/vulnerability.go#L17-L19).
74
+
75
+
You can reference `SeveritySource` in the [JSON reporting format](../configuration/reporting.md#json) to see from where the severity is taken for a given vulnerability.
76
+
77
+
```shell
78
+
"SeveritySource": "debian",
79
+
```
80
+
81
+
82
+
In addition, you can see all the vendor severity ratings.
83
+
84
+
```json
85
+
"VendorSeverity": {
86
+
"amazon": 2,
87
+
"cbl-mariner": 4,
88
+
"ghsa": 4,
89
+
"nvd": 4,
90
+
"photon": 4,
91
+
"redhat": 2,
92
+
"ubuntu": 2
93
+
}
94
+
```
95
+
96
+
Here is the severity mapping in Trivy:
97
+
98
+
| Number | Severity |
99
+
|:------:|----------|
100
+
| 0 | Unknown |
101
+
| 1 | Low |
102
+
| 2 | Medium |
103
+
| 3 | High |
104
+
| 4 | Critical |
105
+
106
+
If no vendor has a severity, the `UNKNOWN` severity will be used.
70
107
71
108
### Unfixed Vulnerabilities
72
109
The unfixed/unfixable vulnerabilities mean that the patch has not yet been provided on their distribution.
log.Warn("Using severities from other vendors for some vulnerabilities. Read https://aquasecurity.github.io/trivy/latest/docs/scanner/vulnerability/#severity-selection for details.")
0 commit comments