The CVSS vector for the IKE vulnerability shown in Figure 5.22 is CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N. Breaking this down piece by piece gives us the following:
AV:N indicates that an attacker may exploit the vulnerability remotely over a network. This is the most serious value for this metric.
AC:L indicates that exploiting the vulnerability does not require any specialized conditions. This is the most serious value for this metric.
PR:N indicates that attackers do not need any authenticated privileges. This is the most serious value for this metric.
UI:N indicates that no user interaction is necessary to exploit the vulnerability.
S:U indicates ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month, and much more.