ELI5: What are Vulnerability Types?

Every building has weak spots — maybe a window that doesn’t lock, a door with a flimsy hinge, or a fence with a hole in it. Computers have weak spots too, and those are called vulnerabilities. Some happen because someone forgot to change the default settings (like leaving the factory password on a router). Others are mistakes in the software itself, like a bug. And sometimes, the weak spot is actually a person who gets tricked into opening a bad email. Knowing what the weak spots are is the first step to fixing them.

Overview

Vulnerabilities are weaknesses in systems, software, processes, or configurations that can be exploited by threat actors to gain unauthorized access or cause harm. Understanding vulnerability categories helps prioritize security efforts and is fundamental to the Security+ exam. Vulnerabilities exist at every layer — from hardware and firmware to applications and human behavior.

Key Concepts

  • Misconfigurations: Default settings, open ports, unnecessary services, overly permissive access rules — the most common vulnerability type
  • Unpatched software: Known vulnerabilities with available fixes that have not been applied
  • Zero-day vulnerabilities: Flaws unknown to the vendor with no available patch — exploits are highly valued by attackers
  • Default credentials: Factory-set usernames and passwords that are publicly documented and easily exploited
  • Insecure protocols: Using unencrypted protocols (Telnet, FTP, HTTP, SNMPv1/v2) that expose data in transit
  • Weak encryption: Using deprecated algorithms (DES, MD5, SHA-1, RC4) or insufficient key lengths
  • Race conditions: Timing-dependent flaws where concurrent processes can interfere with each other
  • Memory vulnerabilities: Buffer overflows, use-after-free, memory leaks that can be exploited for code execution
  • supply chain risks: Vulnerabilities in vendor software, libraries, or dependencies (e.g., Log4Shell)
  • Human factors: Lack of training, social engineering susceptibility, insider threats
  • Hardware vulnerabilities: Side-channel attacks, firmware flaws (Spectre, Meltdown), end-of-life hardware
  • VM sprawl — uncontrolled proliferation of virtual machines, increasing attack surface and management complexity

Exam Tips

Remember

Misconfigurations are the #1 vulnerability type — more common than code flaws. Zero-day = no patch exists yet. Always check for: default creds, open ports, unpatched software, insecure protocols, excessive permissions.

  • Supply chain vulnerabilities are increasingly important — compromised updates or libraries affect all downstream users
  • Know the difference: vulnerability (weakness) vs. threat (actor/event) vs. risk (likelihood x impact)
  • End-of-life (EOL) systems receive no patches and are inherently vulnerable

Connections

Practice Questions

Scenario

See case-vulnerability-types for a practical DevOps scenario applying these concepts.