Glossary
Vulnerability
A flaw or weakness in software, hardware, or configuration that could be exploited by attackers to compromise systems or data.
Definition
A Vulnerability is a weakness that could allow an attacker to:
- Gain unauthorized access
- Escalate privileges
- Steal data
- Disrupt services
- Execute arbitrary code
Vulnerabilities exist in:
- Software – Bugs in applications or operating systems
- Hardware – Flaws in chips or firmware
- Configuration – Insecure settings (default passwords, open ports)
- Processes – Security gaps in how systems are managed
Vulnerability vs. Exploit
- Vulnerability – The flaw itself (unpatched XSS vulnerability in web app)
- Exploit – The tool or technique used to exploit it (XSS payload that steals cookies)
A vulnerability is worthless to an attacker without an exploit. Conversely, an exploit requires a corresponding vulnerability.
Vulnerability Lifecycle
- Discovery – Researcher or hacker finds a flaw
- Disclosure – Researcher reports to vendor (or publicly)
- Patch Development – Vendor fixes the flaw
- Patch Release – Fix becomes available
- Exploitation – Attackers create tools and begin exploiting
- Patching – Organizations deploy patches
- Remediation – Vulnerability no longer exploitable
The time between disclosure and exploitation is critical. Organizations must patch during this window.
Vulnerability Severity
Severity depends on:
- Exploitability – How easy is it to exploit?
- Impact – What damage would compromise cause?
- Affected Systems – How many systems are vulnerable?
- Threat Context – Are attackers actively exploiting it?
Vulnerability Management
Organizations manage vulnerabilities through:
- Discovery – Scan systems for known vulnerabilities
- Prioritization – Rank by severity and impact
- Remediation – Patch or mitigate
- Verification – Confirm patch effectiveness
- Reporting – Track metrics and progress