What is vulnerability

Last updated: April 1, 2026

Quick Answer: A vulnerability is a weakness or gap in security, defense, or protection that can be exploited to cause harm, damage, or unauthorized access to a person, system, or organization.

Key Facts

Overview

A vulnerability is a weakness or gap in security, defense, or protection that can be exploited to cause harm, damage, or unauthorized access. The concept applies broadly across many domains—physical security, cybersecurity, organizational systems, emotional relationships, and personal well-being. Essentially, a vulnerability is any point where something or someone is exposed to potential harm.

Types of Vulnerabilities

Cybersecurity Vulnerabilities are weaknesses in software, systems, or networks that attackers can exploit. These include unpatched software, weak passwords, poor encryption, unprotected databases, and insecure code. A vulnerability becomes a security incident when someone with malicious intent discovers and exploits it.

Physical Vulnerabilities relate to physical security and include unlocked doors, inadequate lighting, poor surveillance systems, or lack of access control. These allow unauthorized physical access to protected areas or assets.

Organizational Vulnerabilities include gaps in processes, policies, or governance such as poor communication channels, weak oversight, insufficient training, or inadequate financial controls that create opportunities for errors, fraud, or misconduct.

Personal Vulnerabilities can involve emotional openness, trust in relationships, reliance on others, or exposure to social engineering. People may be vulnerable to manipulation, deception, or psychological harm.

Identifying and Assessing Vulnerabilities

Security audits and assessments provide systematic reviews to identify weaknesses. Vulnerability scanning uses automated tools that detect known vulnerabilities in systems. Penetration testing involves controlled attempts to exploit vulnerabilities to understand their impact. Risk assessment evaluates the likelihood and severity of each vulnerability. Stakeholder feedback gathers input from users and employees about gaps they observe.

Addressing Vulnerabilities

Effective vulnerability management involves multiple steps. First, identify and document all known vulnerabilities. Next, prioritize them based on their severity and likelihood of exploitation. Then develop and implement remediation strategies—this might include applying security patches, implementing new policies, improving training, or redesigning systems. Finally, monitor and reassess regularly, as new vulnerabilities constantly emerge in evolving threat landscapes.

Vulnerability in Context

In cybersecurity, the OWASP Top 10 lists the most common and dangerous vulnerabilities in web applications. In organizational contexts, business continuity planning identifies vulnerabilities in supply chains, operations, and disaster response. Being aware of vulnerabilities allows individuals and organizations to develop resilience, implement protective measures, and reduce risk.

Related Questions

What is a security breach?

A security breach occurs when unauthorized individuals gain access to protected information or systems, exploiting a vulnerability. This can result in data theft, system compromise, or loss of confidential information.

What is risk management?

Risk management is the process of identifying, assessing, and mitigating potential threats to an organization or individual. It involves understanding vulnerabilities and implementing controls to reduce likelihood and impact of adverse events.

What is security hardening?

Security hardening is the practice of reducing vulnerabilities and strengthening defenses by removing unnecessary software, applying security patches, implementing strict access controls, and following security best practices.

Sources

  1. Wikipedia - Vulnerability (Computing) CC-BY-SA-4.0
  2. NIST - National Institute of Standards and Technology Public Domain