Attack Vector
An attack vector is the method or pathway that an attacker uses to gain unauthorized access to a system, network, or application. Common examples include social engineering, stolen credentials, and exploiting software vulnerabilities. Understanding attack vectors helps organizations identify where they are most exposed to threats and prioritize their defenses accordingly.
An attack vector refers to the specific pathway, technique, or combination of techniques a threat actor employs to gain unauthorized access to a target system, network, application, endpoint, or cloud environment, typically by exploiting one or more vulnerabilities. Attack vectors may operate at different layers of the technology stack and can be categorized by their point of entry, such as network-based, application-based, or human-targeted (social engineering). In the Common Vulnerability Scoring System (CVSS), 'Attack Vector' is a categorical base metric that classifies the context required for exploitation into discrete values (Network, Adjacent, Local, Physical), rather than representing a numeric score on its own. Identifying and cataloging relevant attack vectors is a foundational step in threat modeling, penetration testing, and risk assessment workflows.
Why it matters
Understanding attack vectors is essential because they represent the concrete pathways through which organizations are breached. Without a clear picture of these pathways, security teams risk spreading resources too thin or focusing on low-probability threats while leaving high-exposure entry points undefended. By systematically identifying and cataloging attack vectors relevant to their environment, organizations can move from reactive incident response to proactive risk reduction, prioritizing controls where they will have the greatest impact on reducing real-world exposure.
Attack vectors are not static; they evolve as technology stacks change and as threat actors develop new techniques. For example, the proliferation of cloud environments and APIs has introduced application-based attack vectors that did not exist in traditional on-premises architectures, while social engineering vectors like phishing continue to be refined. Organizations that fail to revisit their attack vector landscape regularly may find that their defenses are optimized for yesterday's threats rather than today's. This makes ongoing attack vector analysis a core activity in threat modeling, penetration testing, and risk assessment workflows.
Frameworks like CVSS formalize the concept of attack vectors by classifying the context required for exploitation. In CVSS, the Attack Vector metric is a categorical value (Network, Adjacent, Local, or Physical) that describes the proximity a threat actor needs to exploit a vulnerability. This classification directly influences how organizations assess and prioritize vulnerabilities during remediation, making the concept operationally significant well beyond theoretical threat modeling.
Who it's relevant to
Inside Attack Vector
Common questions
Answers to the questions practitioners most commonly ask about Attack Vector.