The vulnerable component is bound to the network stack, but the attack is
limited at the protocol level to a logically adjacent topology.
Local
The vulnerable component is not bound to the network stack and the
attacker's path is via read/write/execute capabilities.
Network
The vulnerable component is bound to the network stack and the set of
possible attackers extends beyond the other options listed below, up to
and including the entire Internet.
Physical
The attack requires the attacker to physically touch or manipulate the
vulnerable component.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-12 UTC."],[[["\u003cp\u003eThis webpage details the \u003ccode\u003eAttackVector\u003c/code\u003e enum within the \u003ccode\u003eGoogle.Cloud.OsConfig.V1\u003c/code\u003e namespace, used to define how a vulnerability can be exploited.\u003c/p\u003e\n"],["\u003cp\u003eThe latest version available for the AttackVector documentation is 2.4.0, with prior versions back to 1.3.0 also available for review.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eAttackVector\u003c/code\u003e enum defines five possible values: \u003ccode\u003eAdjacent\u003c/code\u003e, \u003ccode\u003eLocal\u003c/code\u003e, \u003ccode\u003eNetwork\u003c/code\u003e, \u003ccode\u003ePhysical\u003c/code\u003e, and \u003ccode\u003eUnspecified\u003c/code\u003e, each specifying a different context of vulnerability exploitation.\u003c/p\u003e\n"],["\u003cp\u003eThe provided content gives a description for each attack vector, for example, \u003ccode\u003eNetwork\u003c/code\u003e means that the vulnerable component is bound to the network stack and the possible attackers extend up to and including the entire internet.\u003c/p\u003e\n"],["\u003cp\u003eEach version can be accessed through its own unique link, for example, \u003ccode\u003e2.3.0\u003c/code\u003e is \u003ccode\u003e/dotnet/docs/reference/Google.Cloud.OsConfig.V1/2.3.0/Google.Cloud.OsConfig.V1.CVSSv3.Types.AttackVector\u003c/code\u003e.\u003c/p\u003e\n"]]],[],null,[]]