A successful attack cannot be accomplished at will, but requires the
attacker to invest in some measurable amount of effort in preparation or
execution against the
vulnerable component before a successful attack can be expected. For
example, a successful attack may depend on an attacker overcoming any of the
following conditions:
- The attacker must gather knowledge about the environment in which the
vulnerable target/component exists. For example, a requirement to collect
details on target configuration settings, sequence numbers, or shared
secrets.
- The attacker must prepare the target environment to improve exploit
reliability. For example, repeated exploitation to win a race condition, or
overcoming advanced exploit mitigation techniques.
- The attacker must inject themselves into the logical network path between
the target and the resource requested by the victim in order to read and/or
modify network communications (e.g., a man in the middle attack).
Quote from the CVSS specification.
Vulnerabilities with this tag were given a CVSS rating as part of the requirement to be included into the National Vulnerability Database. You can learn more about what the individual scores mean in the CVSS specification document.