Attack Complexity (MAC)
This metric describes the conditions beyond the attacker's control that must exist in order to exploit the vulnerability.
Such conditions may require the presence of certain system/protocol configuration settings or computational exceptions, as well as time requirements or any other uncontrollable (by the attacker) events' presence for the attack to be successful.
Last updated