The vulnerability requires an attacker to be logged into the system (such as at a command line or via a desktop session or web interface).
Quote from the CVSS specification
Vulnerabilities with this tag were given a CVSS rating as part of the requirement to be included into the National Vulnerability Database. You can learn more about what the individual scores mean in the CVSS specification document.