A successful attack depends on conditions beyond the attacker's control.
That is, a successful attack cannot be accomplished at will, but requires
the attacker to invest in some measurable amount of effort in preparation
or execution against the vulnerable component before a successful attack
can be expected.
Low
Specialized access conditions or extenuating circumstances do not exist.
An attacker can expect repeatable success when attacking the vulnerable
component.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-07 UTC."],[[["\u003cp\u003eThis page provides reference documentation for the \u003ccode\u003eCvssv3.Types.AttackComplexity\u003c/code\u003e enum within the Google Cloud Security Center v1 API, specifically for the .NET framework.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eCvssv3.Types.AttackComplexity\u003c/code\u003e enum describes the conditions needed for a successful exploit, including \u003ccode\u003eHigh\u003c/code\u003e (requires attacker effort), \u003ccode\u003eLow\u003c/code\u003e (easily repeatable), and \u003ccode\u003eUnspecified\u003c/code\u003e (invalid).\u003c/p\u003e\n"],["\u003cp\u003eThe page lists links to documentation for multiple versions of the API, ranging from version 2.2.0 up to the latest, version 3.24.0, to navigate through the history of this particular function.\u003c/p\u003e\n"],["\u003cp\u003eThe namespace for this enum is \u003ccode\u003eGoogle.Cloud.SecurityCenter.V1\u003c/code\u003e, and it's located in the \u003ccode\u003eGoogle.Cloud.SecurityCenter.V1.dll\u003c/code\u003e assembly.\u003c/p\u003e\n"]]],[],null,[]]