Attack complexity
The attack complexity metric lists all conditions and prerequisites beyond the attacker's control but required in order to successfully exploit the vulnerability. For example, it might be possible that a particular vulnerability could only be exploited if a particular version of the application was deployed on a certain OS platform with some custom settings. If all these conditions were met, then only the vulnerability exploitation could be possible. For some other vulnerabilities, it might be possible to exploit it irrespective of the application version and the type of base operating system. Thus, the conditions and prerequisites add up to the attack complexity and vary from one vulnerability to the other:
|
Parameter ... |
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access