- Resource: VulnerabilityReport
- Vulnerability
- Details
- CVSSv3
- AttackVector
- AttackComplexity
- PrivilegesRequired
- UserInteraction
- Scope
- Impact
- Reference
- Item
- Methods
Resource: VulnerabilityReport
This API resource represents the vulnerability report for a specified Compute Engine virtual machine (VM) instance at a given point in time.
For more information, see Vulnerability reports.
| JSON representation | 
|---|
| {
  "name": string,
  "vulnerabilities": [
    {
      object ( | 
| Fields | |
|---|---|
| name | 
 Output only. The  Format:  | 
| vulnerabilities[] | 
 Output only. List of vulnerabilities affecting the VM. | 
| updateTime | 
 Output only. The timestamp for when the last vulnerability report was generated for the VM. Uses RFC 3339, where generated output will always be Z-normalized and uses 0, 3, 6 or 9 fractional digits. Offsets other than "Z" are also accepted. Examples:  | 
Vulnerability
A vulnerability affecting the VM instance.
| JSON representation | 
|---|
| { "details": { object ( | 
| Fields | |
|---|---|
| details | 
 Contains metadata as per the upstream feed of the operating system and NVD. | 
| installedInventoryItemIds[] | 
 Corresponds to the  | 
| availableInventoryItemIds[] | 
 Corresponds to the  | 
| createTime | 
 The timestamp for when the vulnerability was first detected. Uses RFC 3339, where generated output will always be Z-normalized and uses 0, 3, 6 or 9 fractional digits. Offsets other than "Z" are also accepted. Examples:  | 
| updateTime | 
 The timestamp for when the vulnerability was last modified. Uses RFC 3339, where generated output will always be Z-normalized and uses 0, 3, 6 or 9 fractional digits. Offsets other than "Z" are also accepted. Examples:  | 
| items[] | 
 List of items affected by the vulnerability. | 
Details
Contains metadata information for the vulnerability. This information is collected from the upstream feed of the operating system.
| JSON representation | 
|---|
| { "cve": string, "cvssV2Score": number, "cvssV3": { object ( | 
| Fields | |
|---|---|
| cve | 
 The CVE of the vulnerability. CVE cannot be empty and the combination of <cve, classification> should be unique across vulnerabilities for a VM. | 
| cvssV2Score | 
 The CVSS V2 score of this vulnerability. CVSS V2 score is on a scale of 0 - 10 where 0 indicates low severity and 10 indicates high severity. | 
| cvssV3 | 
 The full description of the CVSSv3 for this vulnerability from NVD. | 
| severity | 
 Assigned severity/impact ranking from the distro. | 
| description | 
 The note or description describing the vulnerability from the distro. | 
| references[] | 
 Corresponds to the references attached to the  | 
CVSSv3
Common Vulnerability Scoring System version 3. For details, see https://www.first.org/cvss/specification-document
| JSON representation | 
|---|
| { "baseScore": number, "exploitabilityScore": number, "impactScore": number, "attackVector": enum ( | 
| Fields | |
|---|---|
| baseScore | 
 The base score is a function of the base metric scores. https://www.first.org/cvss/specification-document#Base-Metrics | 
| exploitabilityScore | 
 The Exploitability sub-score equation is derived from the Base Exploitability metrics. https://www.first.org/cvss/specification-document#2-1-Exploitability-Metrics | 
| impactScore | 
 The Impact sub-score equation is derived from the Base Impact metrics. | 
| attackVector | 
 This metric reflects the context by which vulnerability exploitation is possible. | 
| attackComplexity | 
 This metric describes the conditions beyond the attacker's control that must exist in order to exploit the vulnerability. | 
| privilegesRequired | 
 This metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability. | 
| userInteraction | 
 This metric captures the requirement for a human user, other than the attacker, to participate in the successful compromise of the vulnerable component. | 
| scope | 
 The Scope metric captures whether a vulnerability in one vulnerable component impacts resources in components beyond its security scope. | 
| confidentialityImpact | 
 This metric measures the impact to the confidentiality of the information resources managed by a software component due to a successfully exploited vulnerability. | 
| integrityImpact | 
 This metric measures the impact to integrity of a successfully exploited vulnerability. | 
| availabilityImpact | 
 This metric measures the impact to the availability of the impacted component resulting from a successfully exploited vulnerability. | 
AttackVector
This metric reflects the context by which vulnerability exploitation is possible.
| Enums | |
|---|---|
| ATTACK_VECTOR_UNSPECIFIED | Invalid value. | 
| ATTACK_VECTOR_NETWORK | The vulnerable component is bound to the network stack and the set of possible attackers extends beyond the other options listed below, up to and including the entire Internet. | 
| ATTACK_VECTOR_ADJACENT | The vulnerable component is bound to the network stack, but the attack is limited at the protocol level to a logically adjacent topology. | 
| ATTACK_VECTOR_LOCAL | The vulnerable component is not bound to the network stack and the attacker's path is via read/write/execute capabilities. | 
| ATTACK_VECTOR_PHYSICAL | The attack requires the attacker to physically touch or manipulate the vulnerable component. | 
AttackComplexity
This metric describes the conditions beyond the attacker's control that must exist in order to exploit the vulnerability.
| Enums | |
|---|---|
| ATTACK_COMPLEXITY_UNSPECIFIED | Invalid value. | 
| ATTACK_COMPLEXITY_LOW | Specialized access conditions or extenuating circumstances do not exist. An attacker can expect repeatable success when attacking the vulnerable component. | 
| ATTACK_COMPLEXITY_HIGH | A successful attack depends on conditions beyond the attacker's control. That is, a successful attack cannot be accomplished at will, but requires the attacker to invest in some measurable amount of effort in preparation or execution against the vulnerable component before a successful attack can be expected. | 
PrivilegesRequired
This metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability.
| Enums | |
|---|---|
| PRIVILEGES_REQUIRED_UNSPECIFIED | Invalid value. | 
| PRIVILEGES_REQUIRED_NONE | The attacker is unauthorized prior to attack, and therefore does not require any access to settings or files of the vulnerable system to carry out an attack. | 
| PRIVILEGES_REQUIRED_LOW | The attacker requires privileges that provide basic user capabilities that could normally affect only settings and files owned by a user. Alternatively, an attacker with Low privileges has the ability to access only non-sensitive resources. | 
| PRIVILEGES_REQUIRED_HIGH | The attacker requires privileges that provide significant (e.g., administrative) control over the vulnerable component allowing access to component-wide settings and files. | 
UserInteraction
This metric captures the requirement for a human user, other than the attacker, to participate in the successful compromise of the vulnerable component.
| Enums | |
|---|---|
| USER_INTERACTION_UNSPECIFIED | Invalid value. | 
| USER_INTERACTION_NONE | The vulnerable system can be exploited without interaction from any user. | 
| USER_INTERACTION_REQUIRED | Successful exploitation of this vulnerability requires a user to take some action before the vulnerability can be exploited. | 
Scope
The Scope metric captures whether a vulnerability in one vulnerable component impacts resources in components beyond its security scope.
| Enums | |
|---|---|
| SCOPE_UNSPECIFIED | Invalid value. | 
| SCOPE_UNCHANGED | An exploited vulnerability can only affect resources managed by the same security authority. | 
| SCOPE_CHANGED | An exploited vulnerability can affect resources beyond the security scope managed by the security authority of the vulnerable component. | 
Impact
The Impact metrics capture the effects of a successfully exploited vulnerability on the component that suffers the worst outcome that is most directly and predictably associated with the attack.
| Enums | |
|---|---|
| IMPACT_UNSPECIFIED | Invalid value. | 
| IMPACT_HIGH | High impact. | 
| IMPACT_LOW | Low impact. | 
| IMPACT_NONE | No impact. | 
Reference
A reference for this vulnerability.
| JSON representation | 
|---|
| { "url": string, "source": string } | 
| Fields | |
|---|---|
| url | 
 The url of the reference. | 
| source | 
 The source of the reference e.g. NVD. | 
Item
OS inventory item that is affected by a vulnerability or fixed as a result of a vulnerability.
| JSON representation | 
|---|
| { "installedInventoryItemId": string, "availableInventoryItemId": string, "fixedCpeUri": string, "upstreamFix": string } | 
| Fields | |
|---|---|
| installedInventoryItemId | 
 Corresponds to the  | 
| availableInventoryItemId | 
 Corresponds to the  | 
| fixedCpeUri | 
 The recommended CPE URI update that contains a fix for this vulnerability. | 
| upstreamFix | 
 The upstream OS patch, packages or KB that fixes the vulnerability. | 
| Methods | |
|---|---|
| 
 | Gets the vulnerability report for the specified VM instance. | 
| 
 | List vulnerability reports for all VM instances in the specified zone. |