used in CVSS and to determine exploitability score
0.2 Physical (P) attacker must be present physcially 0.55 Local (L) attacker must have physical or logical access 0.62 Adjacent (A) attacker must be connected to the LAN 0.85 Network (N) attack can exploit remotely