From Description to Score: Can LLMs Quantify Vulnerabilities?
By: Sima Jafarikhah , Daniel Thompson , Eva Deans and more
Potential Business Impact:
Computers automatically score computer security risks.
Manual vulnerability scoring, such as assigning Common Vulnerability Scoring System (CVSS) scores, is a resource-intensive process that is often influenced by subjective interpretation. This study investigates the potential of general-purpose large language models (LLMs), namely ChatGPT, Llama, Grok, DeepSeek, and Gemini, to automate this process by analyzing over 31{,}000 recent Common Vulnerabilities and Exposures (CVE) entries. The results show that LLMs substantially outperform the baseline on certain metrics (e.g., \textit{Availability Impact}), while offering more modest gains on others (e.g., \textit{Attack Complexity}). Moreover, model performance varies across both LLM families and individual CVSS metrics, with ChatGPT-5 attaining the highest precision. Our analysis reveals that LLMs tend to misclassify many of the same CVEs, and ensemble-based meta-classifiers only marginally improve performance. Further examination shows that CVE descriptions often lack critical context or contain ambiguous phrasing, which contributes to systematic misclassifications. These findings underscore the importance of enhancing vulnerability descriptions and incorporating richer contextual details to support more reliable automated reasoning and alleviate the growing backlog of CVEs awaiting triage.
Similar Papers
Can LLMs Classify CVEs? Investigating LLMs Capabilities in Computing CVSS Vectors
Cryptography and Security
Helps computers score software flaws more fairly.
Prompting the Priorities: A First Look at Evaluating LLMs for Vulnerability Triage and Prioritization
Cryptography and Security
Helps computers find computer security risks faster.
Evaluating LLMs for One-Shot Patching of Real and Artificial Vulnerabilities
Cryptography and Security
Fixes computer bugs automatically, better on real ones.