Generated from protobuf enumATTACK_VECTOR_UNSPECIFIED = 0;
ATTACK_VECTOR_NETWORK
Value: 1
The vulnerable component is bound to the network stack and the set of
possible attackers extends beyond the other options listed below, up to
and including the entire Internet.
Generated from protobuf enumATTACK_VECTOR_NETWORK = 1;
ATTACK_VECTOR_ADJACENT
Value: 2
The vulnerable component is bound to the network stack, but the attack is
limited at the protocol level to a logically adjacent topology.
Generated from protobuf enumATTACK_VECTOR_ADJACENT = 2;
ATTACK_VECTOR_LOCAL
Value: 3
The vulnerable component is not bound to the network stack and the
attacker's path is via read/write/execute capabilities.
Generated from protobuf enumATTACK_VECTOR_LOCAL = 3;
ATTACK_VECTOR_PHYSICAL
Value: 4
The attack requires the attacker to physically touch or manipulate the
vulnerable component.
Generated from protobuf enumATTACK_VECTOR_PHYSICAL = 4;
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-09-04 UTC."],[],[],null,["# Google Cloud Security Command Center V1 Client - Class AttackVector (2.2.1)\n\nVersion latestkeyboard_arrow_down\n\n- [2.2.1 (latest)](/php/docs/reference/cloud-security-center/latest/V1.Cvssv3.AttackVector)\n- [2.2.0](/php/docs/reference/cloud-security-center/2.2.0/V1.Cvssv3.AttackVector)\n- [2.1.1](/php/docs/reference/cloud-security-center/2.1.1/V1.Cvssv3.AttackVector)\n- [2.0.4](/php/docs/reference/cloud-security-center/2.0.4/V1.Cvssv3.AttackVector)\n- [1.32.0](/php/docs/reference/cloud-security-center/1.32.0/V1.Cvssv3.AttackVector)\n- [1.31.0](/php/docs/reference/cloud-security-center/1.31.0/V1.Cvssv3.AttackVector)\n- [1.30.0](/php/docs/reference/cloud-security-center/1.30.0/V1.Cvssv3.AttackVector)\n- [1.29.0](/php/docs/reference/cloud-security-center/1.29.0/V1.Cvssv3.AttackVector)\n- [1.28.2](/php/docs/reference/cloud-security-center/1.28.2/V1.Cvssv3.AttackVector)\n- [1.21.0](/php/docs/reference/cloud-security-center/1.21.0/V1.Cvssv3.AttackVector)\n- [1.20.2](/php/docs/reference/cloud-security-center/1.20.2/V1.Cvssv3.AttackVector)\n- [1.19.1](/php/docs/reference/cloud-security-center/1.19.1/V1.Cvssv3.AttackVector)\n- [1.18.0](/php/docs/reference/cloud-security-center/1.18.0/V1.Cvssv3.AttackVector)\n- [1.17.0](/php/docs/reference/cloud-security-center/1.17.0/V1.Cvssv3.AttackVector)\n- [1.16.0](/php/docs/reference/cloud-security-center/1.16.0/V1.Cvssv3.AttackVector)\n- [1.15.1](/php/docs/reference/cloud-security-center/1.15.1/V1.Cvssv3.AttackVector)\n- [1.14.2](/php/docs/reference/cloud-security-center/1.14.2/V1.Cvssv3.AttackVector)\n- [1.13.1](/php/docs/reference/cloud-security-center/1.13.1/V1.Cvssv3.AttackVector) \nReference documentation and code samples for the Google Cloud Security Command Center V1 Client class AttackVector.\n\nThis metric reflects the context by which vulnerability exploitation is\npossible.\n\nProtobuf type `google.cloud.securitycenter.v1.Cvssv3.AttackVector`\n\nNamespace\n---------\n\nGoogle \\\\ Cloud \\\\ SecurityCenter \\\\ V1 \\\\ Cvssv3\n\nMethods\n-------\n\n### static::name\n\n### static::value\n\nConstants\n---------\n\n### ATTACK_VECTOR_UNSPECIFIED\n\n Value: 0\n\nInvalid value.\n\nGenerated from protobuf enum `ATTACK_VECTOR_UNSPECIFIED = 0;`\n\n### ATTACK_VECTOR_NETWORK\n\n Value: 1\n\nThe vulnerable component is bound to the network stack and the set of\npossible attackers extends beyond the other options listed below, up to\nand including the entire Internet.\n\nGenerated from protobuf enum `ATTACK_VECTOR_NETWORK = 1;`\n\n### ATTACK_VECTOR_ADJACENT\n\n Value: 2\n\nThe vulnerable component is bound to the network stack, but the attack is\nlimited at the protocol level to a logically adjacent topology.\n\nGenerated from protobuf enum `ATTACK_VECTOR_ADJACENT = 2;`\n\n### ATTACK_VECTOR_LOCAL\n\n Value: 3\n\nThe vulnerable component is not bound to the network stack and the\nattacker's path is via read/write/execute capabilities.\n\nGenerated from protobuf enum `ATTACK_VECTOR_LOCAL = 3;`\n\n### ATTACK_VECTOR_PHYSICAL\n\n Value: 4\n\nThe attack requires the attacker to physically touch or manipulate the\nvulnerable component.\n\nGenerated from protobuf enum `ATTACK_VECTOR_PHYSICAL = 4;`"]]