The vulnerable component is bound to the network stack, but the attack is
limited at the protocol level to a logically adjacent topology.
Local
The vulnerable component is not bound to the network stack and the
attacker's path is via read/write/execute capabilities.
Network
The vulnerable component is bound to the network stack and the set of
possible attackers extends beyond the other options listed below, up to
and including the entire Internet.
Physical
The attack requires the attacker to physically touch or manipulate the
vulnerable component.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-12 UTC."],[[["\u003cp\u003eThis webpage provides documentation for the \u003ccode\u003eCVSSv3.Types.AttackVector\u003c/code\u003e enum within the Google Cloud OS Config v1 API, which is used to define the context of vulnerability exploitation.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eCVSSv3.Types.AttackVector\u003c/code\u003e enum is part of the \u003ccode\u003eGoogle.Cloud.OsConfig.V1\u003c/code\u003e namespace and is contained within the \u003ccode\u003eGoogle.Cloud.OsConfig.V1.dll\u003c/code\u003e assembly.\u003c/p\u003e\n"],["\u003cp\u003eThere are multiple versions of the documentation available, ranging from version 1.3.0 up to the latest version, 2.4.0, that can be selected.\u003c/p\u003e\n"],["\u003cp\u003eThe enum defines five possible values: \u003ccode\u003eAdjacent\u003c/code\u003e, \u003ccode\u003eLocal\u003c/code\u003e, \u003ccode\u003eNetwork\u003c/code\u003e, \u003ccode\u003ePhysical\u003c/code\u003e, and \u003ccode\u003eUnspecified\u003c/code\u003e, each representing a different context by which a vulnerability could be exploited.\u003c/p\u003e\n"],["\u003cp\u003eEach of the enum field values come with their own description, such as the 'Network' value having the description stating that the vulnerable component is bound to the network stack.\u003c/p\u003e\n"]]],[],null,[]]