This is a metric that reflects the proximity of the threat actor to the vulnerable component. The more remote the threat actor is to the component, the higher the severity.
2
New cards
**Attack complexity**
This is a metric that expresses the number of components, software, hardware, or networks, that are beyond the attacker’s control and that must be present for a vulnerability to be successfully exploited.
3
New cards
**Privileges required**
This is a metric that captures the level of access that is required for a successful exploit of the vulnerability.
4
New cards
**User interaction**
This metric expresses the presence or absence of the requirement for user interaction for an exploit to be successful.
5
New cards
**Scope**
This metric expresses whether multiple authorities must be involved in an exploit. This is expressed as whether the initial authority changes to a second authority during the exploit.
6
New cards
**Confidentiality Impact**
This is a metric that measures the impact to confidentiality due to a successfully exploited vulnerability.
7
New cards
**Integrity Impact**
This is a metric that measures the impact to integrity due to a successfully exploited vulnerability.
8
New cards
**Availability Impact**
This is a metric that measures the impact to availability due to a successfully exploited vulnerability.