Which CVSS metric describes the conditions that are beyond the attacker’s control that must exist to exploit the vulnerability?
A. User interaction
B. Attack vector
C. attack complexity
D. privileges required
Which CVSS metric describes the conditions that are beyond the attacker’s control that must exist to exploit the vulnerability?
A. User interaction
B. Attack vector
C. attack complexity
D. privileges required
Attack complexity – This is a metric that expresses the number of components, software, hardware, or networks, that are beyond the attacker’s control and that must be present in order for a vulnerability to be successfully exploited.