My understanding is that estimation of criticality is difficult/impossible without specific use cases yet it is indicated as a SHOULD in the spec:
|
The publication of the list of known Vulnerabilities takes a form of a list of their identification (one or multiple ones) and at least one link to a public resource describing this Vulnerability (at least the affected product and versions, affected configurations and a general description) and RECOMMENDED to include an estimation of severity of the Vulnerability. The Organization MAY include additional information. |