The vulnerable component is bound to the network stack, but the attack is
limited at the protocol level to a logically adjacent topology.
Local
The vulnerable component is not bound to the network stack and the
attacker's path is via read/write/execute capabilities.
Network
The vulnerable component is bound to the network stack and the set of
possible attackers extends beyond the other options listed below, up to
and including the entire Internet.
Physical
The attack requires the attacker to physically touch or manipulate the
vulnerable component.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-07 UTC."],[[["\u003cp\u003eThe webpage provides documentation for the \u003ccode\u003eAttackVector\u003c/code\u003e enumeration within the \u003ccode\u003eGoogle.Cloud.SecurityCenter.V1\u003c/code\u003e namespace, detailing various versions, with the most recent being 3.24.0.\u003c/p\u003e\n"],["\u003cp\u003eThis \u003ccode\u003eAttackVector\u003c/code\u003e enum describes the context in which a vulnerability can be exploited, categorized into \u003ccode\u003eAdjacent\u003c/code\u003e, \u003ccode\u003eLocal\u003c/code\u003e, \u003ccode\u003eNetwork\u003c/code\u003e, \u003ccode\u003ePhysical\u003c/code\u003e, and \u003ccode\u003eUnspecified\u003c/code\u003e types.\u003c/p\u003e\n"],["\u003cp\u003eThe documentation lists a range of versions for \u003ccode\u003eGoogle.Cloud.SecurityCenter.V1\u003c/code\u003e, spanning from 2.2.0 to the latest version 3.24.0, indicating a history of updates and releases.\u003c/p\u003e\n"],["\u003cp\u003eEach \u003ccode\u003eAttackVector\u003c/code\u003e type has a specific description, clarifying whether the vulnerable component is network-bound, requires physical access, or has other constraints on exploitation.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eGoogle.Cloud.SecurityCenter.V1.dll\u003c/code\u003e assembly contains the code definition of the AttackVector types.\u003c/p\u003e\n"]]],[],null,[]]