Attack Complexity (MAC)

This metric describes the conditions beyond the attacker's control that must exist in order to exploit the vulnerability.

Such conditions may require the presence of certain system/protocol configuration settings or computational exceptions, as well as time requirements or any other uncontrollable (by the attacker) events' presence for the attack to be successful.

Last updated