The vulnerable component is bound to the network stack, but the attack is
limited at the protocol level to a logically adjacent topology.
Local
The vulnerable component is not bound to the network stack and the
attacker's path is via read/write/execute capabilities.
Network
The vulnerable component is bound to the network stack and the set of
possible attackers extends beyond the other options listed below, up to
and including the entire Internet.
Physical
The attack requires the attacker to physically touch or manipulate the
vulnerable component.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-03-21 UTC."],[[["This page provides reference documentation for the `Cvssv3.Types.AttackVector` enum within the Google Cloud Security Center v1 API, detailing various attack vector types."],["The latest version of the API documented is 3.24.0, and a comprehensive list of historical versions dating back to 2.2.0 is provided, allowing users to view specific documentation based on their required version."],["The `AttackVector` enum includes five distinct fields: `Adjacent`, `Local`, `Network`, `Physical`, and `Unspecified`, each describing the context of possible vulnerability exploitation."],["Each field in the `AttackVector` enum is defined, clarifying the conditions under which a specific type of attack can occur, such as an attack requiring physical access (`Physical`) versus one that extends to the entire internet (`Network`)."]]],[]]