This metric describes the conditions beyond the attacker's
control that must exist in order to exploit the vulnerability.
Specialized access conditions or extenuating
circumstances do not exist. An attacker can
expect repeatable success when attacking the
A successful attack depends on conditions
beyond the attacker's control. That is, a
successful attack cannot be accomplished at
will, but requires the attacker to invest in
some measurable amount of effort in preparation
or execution against the vulnerable component
before a successful attack can be expected.