From the course: Vulnerability Management: Assessing the Risks with CVSS, CISA KEV, EPSS, and SSVC
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Attack method or vector when determining severity
From the course: Vulnerability Management: Assessing the Risks with CVSS, CISA KEV, EPSS, and SSVC
Attack method or vector when determining severity
- [Instructor] Attack vector is all about how exactly a vulnerability can be exploited, specifically the context of when exploitation is possible. In CVSS version 3.1, there are four possible values for attack vector that can be selected: Network, Adjacent, Local, and Physical. In the CVSS vector string, this is the first key value pair and it's represented as AV followed by a colon and then the identifier for the selected value: N for Network, A for Adjacent, L for Local, or P for Physical. To help visualize this concept, we'll use this network diagram for Red30 that shows our vulnerable system Alpha and the User Workstation Segment of the network. There's also a Server Segment, an IOT Segment, and a Demilitarized Zone, and they're all separated from the Internet by a firewall. An attack vector of Network, that's N in the vector string, means that a vulnerability can be exploited remotely over the network. Depending on the system and environment, the possible attackers could include…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
Intro to determining severity with CVSS1m 49s
-
(Locked)
Making sense of the CVSS Vector String1m 3s
-
(Locked)
Attack method or vector when determining severity2m 33s
-
(Locked)
How attack complexity impacts severity53s
-
(Locked)
How access or privileges required affects severity1m 3s
-
(Locked)
How user interaction affects severity48s
-
(Locked)
Security Scope in CVSS v 3.11m 21s
-
(Locked)
How impacts affect severity3m 4s
-
-
-
-
-
-