From the course: Vulnerability Management: Assessing the Risks with CVSS v3.1

Unlock the full course today

Join today to access over 24,800 courses taught by industry experts.

User interaction and vulnerability risk

User interaction and vulnerability risk

- [Instructor] User interaction represented by UI and the vector string describes how much help an attacker needs from a human user in order to successfully exploit a vulnerability. User Interaction only has two possible values, none and required. And none is the highest risk. With none, an attacker can successfully exploit a system without any assistance. That means it's more likely than an attack will be successful. If user interaction is required, that means that a successful attack depends on a human user doing something. This may involve social engineering to get a person to click on a link or install something on the system. Because it depends on that extra step this is a lower risk.

Contents