The vulnerable component is bound to the network stack, but the attack is
limited at the protocol level to a logically adjacent topology.
Local
The vulnerable component is not bound to the network stack and the
attacker's path is via read/write/execute capabilities.
Network
The vulnerable component is bound to the network stack and the set of
possible attackers extends beyond the other options listed below, up to
and including the entire Internet.
Physical
The attack requires the attacker to physically touch or manipulate the
vulnerable component.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-03-21 UTC."],[[["The page provides a historical overview of the `AttackVector` enum within the `Google.Cloud.SecurityCenter.V1` namespace, spanning multiple versions from 2.2.0 to 3.24.0, with 3.24.0 being the latest."],["The `AttackVector` enum defines different contexts for how a vulnerability can be exploited, including `Adjacent`, `Local`, `Network`, `Physical`, and `Unspecified`."],["Each listed version of `AttackVector` links to specific documentation for that version of the `Google.Cloud.SecurityCenter.V1` library."],["The `AttackVector` enum is defined within the `Google.Cloud.SecurityCenter.V1.Cvssv3.Types` namespace and is part of the `Google.Cloud.SecurityCenter.V1.dll` assembly."],["The content contains the description of each field found in the enum such as `Adjacent` which means that the vulnerable component is limited at the protocol level to a logically adjacent topology."]]],[]]