393 – Use of software with known vulnerabilities in development
Description
The system uses the version of a software or dependency with known vulnerabilities in pre-productive environments.
Impact
Exploit public vulnerabilities of the components in the affected environments.
Recommendation
- Update the affected software to the versions recommended by the vendor. - Replace deprecated components or components with Zero-Day vulnerabilities.
Threat
Authenticated attacker from the Internet.
Expected Remediation Time
Score 4.0
Default score using CVSS 4.0. It may change depending on the context of the src.
Base 4.0
- Attack vector: N
- Attack complexity: H
- Attack Requirements: N
- Privileges required: L
- User interaction: N
- Confidentiality (VC): L
- Integrity (VI): L
- Availability (VA): L
- Confidentiality (SC): N
- Integrity (SI): N
- Availability (SA): N
Threat 4.0
- Exploit maturity: P