1. What This Category Includes
Software vulnerabilities and insecure configurations are two different problems that usually appear together. An attacker exploiting a known CVE on a system that is also poorly segmented, over-permissioned, and exposed to the internet is a much worse outcome than the same CVE on an isolated, hardened host.
Misconfiguration is frequently the multiplier. A vulnerability may exist across hundreds of systems, but the highest-impact cases are where exposure, weak defaults, and over-broad privileges combine to turn a normal defect into a serious compromise path.
Treat vulnerability management and configuration management as the same operational discipline. Separating them too cleanly produces environments where each team thinks the other team has it covered.