Score: 0

From Description to Score: Can LLMs Quantify Vulnerabilities?

Published: December 7, 2025 | arXiv ID: 2512.06781v1

By: Sima Jafarikhah , Daniel Thompson , Eva Deans and more

Potential Business Impact:

Computers automatically score computer security risks.

Business Areas:
Natural Language Processing Artificial Intelligence, Data and Analytics, Software

Manual vulnerability scoring, such as assigning Common Vulnerability Scoring System (CVSS) scores, is a resource-intensive process that is often influenced by subjective interpretation. This study investigates the potential of general-purpose large language models (LLMs), namely ChatGPT, Llama, Grok, DeepSeek, and Gemini, to automate this process by analyzing over 31{,}000 recent Common Vulnerabilities and Exposures (CVE) entries. The results show that LLMs substantially outperform the baseline on certain metrics (e.g., \textit{Availability Impact}), while offering more modest gains on others (e.g., \textit{Attack Complexity}). Moreover, model performance varies across both LLM families and individual CVSS metrics, with ChatGPT-5 attaining the highest precision. Our analysis reveals that LLMs tend to misclassify many of the same CVEs, and ensemble-based meta-classifiers only marginally improve performance. Further examination shows that CVE descriptions often lack critical context or contain ambiguous phrasing, which contributes to systematic misclassifications. These findings underscore the importance of enhancing vulnerability descriptions and incorporating richer contextual details to support more reliable automated reasoning and alleviate the growing backlog of CVEs awaiting triage.

Country of Origin
🇺🇸 United States

Page Count
10 pages

Category
Computer Science:
Cryptography and Security