Software Secure Workload
Activity Configure

CVSS V3 Attributes Based Filters

Attack vectors, attack complexities, and privilege required to influence the CVSS V3 score can be used in inventory filters. The following operations are supported in the filter:

  • =: Returns hosts with packages affected by vulnerabilities matching the filter.

  • : Returns hosts with packages not affected by vulnerabilities matching the filter.

Attack Vector

This metric reflects the context by which vulnerability exploitation is possible. The farther an attacker can get from the vulnerable component, the higher the base score. The table below lists different attack vectors with their access requirements:

Value

Type of access

LOCAL

Local (keyboard, console) or remote (SSH).

PHYSICAL

Physical access is needed.

ADJACENT_NETWORK

Broadcast or collision.

NETWORK

Remotely exploitable.

Attack Complexity

This metric describes the conditions that must exist in order to exploit the vulnerability. The base score is greatest for least complex attacks. The different types of access complexities are as follows:

Value

Description

HIGH

Significant effort needed in setting up and executing the attack.

LOW

Specialized access conditions do not exist.

Privileges Required

This metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability. The base score is highest when privileges aren’t needed to carry out an attack. The different values of privilege required are as follows:

Value

Privileges required

HIGH

Privileges providing significant control over the vulnerable component.

LOW

Low privileges that grant access to non-sensitive resources.

NONE

Privileges aren’t needed to carry out an attack.