The vulnerable component is bound to the network stack, but the attack is
limited at the protocol level to a logically adjacent topology.
Local
The vulnerable component is not bound to the network stack and the
attacker's path is via read/write/execute capabilities.
Network
The vulnerable component is bound to the network stack and the set of
possible attackers extends beyond the other options listed below, up to
and including the entire Internet.
Physical
The attack requires the attacker to physically touch or manipulate the
vulnerable component.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-07 UTC."],[[["\u003cp\u003eThe content details the \u003ccode\u003eCvssv3.Types.AttackVector\u003c/code\u003e enum, a part of the Security Command Center v2 API.\u003c/p\u003e\n"],["\u003cp\u003eIt outlines the context of vulnerability exploitation, covering how an attack is possible, by defining various attack vectors.\u003c/p\u003e\n"],["\u003cp\u003eThe enum is in the \u003ccode\u003eGoogle.Cloud.SecurityCenter.V2\u003c/code\u003e namespace within the \u003ccode\u003eGoogle.Cloud.SecurityCenter.V2.dll\u003c/code\u003e assembly.\u003c/p\u003e\n"],["\u003cp\u003eThere are five fields defining different types of attack vectors: \u003ccode\u003eAdjacent\u003c/code\u003e, \u003ccode\u003eLocal\u003c/code\u003e, \u003ccode\u003eNetwork\u003c/code\u003e, \u003ccode\u003ePhysical\u003c/code\u003e, and \u003ccode\u003eUnspecified\u003c/code\u003e, with each being described in their potential access and/or vulnerability context.\u003c/p\u003e\n"]]],[],null,["# Security Command Center v2 API - Enum Cvssv3.Types.AttackVector (1.2.0)\n\nVersion latestkeyboard_arrow_down\n\n- [1.2.0 (latest)](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V2/latest/Google.Cloud.SecurityCenter.V2.Cvssv3.Types.AttackVector)\n- [1.1.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V2/1.1.0/Google.Cloud.SecurityCenter.V2.Cvssv3.Types.AttackVector)\n- [1.0.0](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V2/1.0.0/Google.Cloud.SecurityCenter.V2.Cvssv3.Types.AttackVector) \n\n public enum Cvssv3.Types.AttackVector\n\nReference documentation and code samples for the Security Command Center v2 API enum Cvssv3.Types.AttackVector.\n\nThis metric reflects the context by which vulnerability exploitation is\npossible.\n\nNamespace\n---------\n\n[Google.Cloud.SecurityCenter.V2](/dotnet/docs/reference/Google.Cloud.SecurityCenter.V2/latest/Google.Cloud.SecurityCenter.V2)\n\nAssembly\n--------\n\nGoogle.Cloud.SecurityCenter.V2.dll"]]