Reflects the context by which vulnerability exploitation is possible.
Describes the conditions beyond the attacker's control that must exist in order to exploit the vulnerability.
The level of privileges an attacker must possess before successfully exploiting the vulnerability.
Whether the vulnerability can be exploited without interaction from an additional user.