A successful attack depends on conditions beyond the attacker's control.
That is, a successful attack cannot be accomplished at will, but requires
the attacker to invest in some measurable amount of effort in preparation
or execution against the vulnerable component before a successful attack
can be expected.
Low
Specialized access conditions or extenuating circumstances do not exist.
An attacker can expect repeatable success when attacking the vulnerable
component.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-03-21 UTC."],[[["This webpage provides reference documentation for the `AttackComplexity` enum within the Google Cloud Security Command Center v1 API, specifically focusing on the .NET implementation."],["The `AttackComplexity` enum describes the conditions beyond an attacker's control that are necessary to exploit a vulnerability, with potential values including `High`, `Low`, and `Unspecified`."],["The page lists various versions of the API, ranging from version 2.2.0 up to the latest version 3.24.0, with links to each version's documentation, making it easy for users to find the appropriate implementation."],["The `High` complexity indicates that a successful attack requires specific conditions or attacker effort, while the `Low` complexity signifies that an attacker can repeatedly succeed without special requirements."],["The namespace for the attack complexity is `Google.Cloud.SecurityCenter.V1`, which is found in the assembly file `Google.Cloud.SecurityCenter.V1.dll`."]]],[]]