1. What This Category Includes
This category includes exploitation of software vulnerabilities and abuse of insecure configurations or defaults. In practice, attackers often combine both: a known weakness on a system that is also poorly segmented, over-permissioned, or exposed unnecessarily.
Misconfiguration is frequently the multiplier. A vulnerability may exist on many systems, but the highest impact usually appears where exposure, privileges, and weak defaults turn a normal defect into a serious compromise path.
Defenders should not separate vulnerability management and configuration management too much. Real risk is usually the combination of software weakness, exposure, and operational context.