CVSS V2 Attributes Based Filters
Inventory filters can be created using access vectors and access complexities to identify vulnerable hosts. The following operations are supported in the filter:
-
=: Returns hosts with packages affected by vulnerabilities matching the filter.
-
≠: Returns hosts with packages not affected by vulnerabilities matching the filter.
Access Vector
Access vector reflects how the vulnerability is exploited. The farther the attacker can get from the vulnerable system, the higher the base score. The table below lists different access vectors with their access requirements:
Value |
Type of access |
---|---|
LOCAL |
Physical or local (shell). |
ADJACENT_NETWORK |
Broadcast or collision. |
NETWORK |
Remotely exploitable. |
Access Complexity
This metric measures the complexity in exploiting a vulnerability once the attacker is able to access the target system. The base score is inversely proportional to the access complexity. The different types of access complexities are as follows:
Value |
Description |
---|---|
HIGH |
Specialized access conditions exist. |
MEDIUM |
Access conditions are somewhat specialized. |
LOW |
Specialized access conditions do not exist. |