Software Secure Workload
Activity Configure

CVSS V2 Attributes Based Filters

Inventory filters can be created using access vectors and access complexities to identify vulnerable hosts. The following operations are supported in the filter:

  • =: Returns hosts with packages affected by vulnerabilities matching the filter.

  • : Returns hosts with packages not affected by vulnerabilities matching the filter.

Access Vector

Access vector reflects how the vulnerability is exploited. The farther the attacker can get from the vulnerable system, the higher the base score. The table below lists different access vectors with their access requirements:

Value

Type of access

LOCAL

Physical or local (shell).

ADJACENT_NETWORK

Broadcast or collision.

NETWORK

Remotely exploitable.

Access Complexity

This metric measures the complexity in exploiting a vulnerability once the attacker is able to access the target system. The base score is inversely proportional to the access complexity. The different types of access complexities are as follows:

Value

Description

HIGH

Specialized access conditions exist.

MEDIUM

Access conditions are somewhat specialized.

LOW

Specialized access conditions do not exist.