A successful attack depends on conditions beyond the attacker's control.
That is, a successful attack cannot be accomplished at will, but requires
the attacker to invest in some measurable amount of effort in preparation
or execution against the vulnerable component before a successful attack
can be expected.
Low
Specialized access conditions or extenuating circumstances do not exist.
An attacker can expect repeatable success when attacking the vulnerable
component.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-07 UTC."],[[["\u003cp\u003eThis document provides reference information for the \u003ccode\u003eCvssv3.Types.AttackComplexity\u003c/code\u003e enum within the Security Command Center v2 API, found in the \u003ccode\u003eGoogle.Cloud.SecurityCenter.V2\u003c/code\u003e namespace.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eCvssv3.Types.AttackComplexity\u003c/code\u003e enum describes the conditions necessary for exploiting a vulnerability that are outside of the attacker's control.\u003c/p\u003e\n"],["\u003cp\u003eThere are three defined fields within this enum: \u003ccode\u003eHigh\u003c/code\u003e, where conditions for attack success are beyond the attacker's control; \u003ccode\u003eLow\u003c/code\u003e, where attackers can expect repeatable success; and \u003ccode\u003eUnspecified\u003c/code\u003e, which represents an invalid value.\u003c/p\u003e\n"],["\u003cp\u003eThe latest version of this document is 1.1.0, and version 1.0.0 is also available.\u003c/p\u003e\n"]]],[],null,["# Security Command Center v2 API - Enum Cvssv3.Types.AttackComplexity (1.2.0)\n\nVersion latestkeyboard_arrow_down\n\n- [1.2.0 (latest)](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V2/latest/Google.Cloud.SecurityCenter.V2.Cvssv3.Types.AttackComplexity)\n- [1.1.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V2/1.1.0/Google.Cloud.SecurityCenter.V2.Cvssv3.Types.AttackComplexity)\n- [1.0.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V2/1.0.0/Google.Cloud.SecurityCenter.V2.Cvssv3.Types.AttackComplexity) \n\n public enum Cvssv3.Types.AttackComplexity\n\nReference documentation and code samples for the Security Command Center v2 API enum Cvssv3.Types.AttackComplexity.\n\nThis metric describes the conditions beyond the attacker's control that\nmust exist in order to exploit the vulnerability.\n\nNamespace\n---------\n\n[Google.Cloud.SecurityCenter.V2](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V2/latest/Google.Cloud.SecurityCenter.V2)\n\nAssembly\n--------\n\nGoogle.Cloud.SecurityCenter.V2.dll"]]