Vulnerability Types and Misconfiguration

Key Takeaways

  • A vulnerability is a weakness that can be exploited; misconfiguration is one of the most common vulnerability sources.
  • Legacy systems, default settings, weak permissions, missing patches, exposed services, and insecure protocols create practical attack paths.
  • Cloud and container vulnerabilities often come from identity, network, storage, image, and logging configuration errors.
  • Supply chain vulnerabilities include vulnerable dependencies, untrusted packages, compromised updates, and weak vendor controls.
  • The best mitigation depends on the weakness, the exposure, and the business constraints around the affected asset.
Last updated: April 2026

Vulnerability Types and Misconfiguration

Security+ vulnerability questions often hide the answer in the root cause. Do not only name the attack. Identify the weakness that made the attack possible.

Vulnerability typeExampleWhy it mattersTypical mitigation
Missing patchInternet-facing VPN has known RCEKnown exploits may existPatch, isolate, or apply vendor workaround
Default configurationDefault admin password remains enabledEasy unauthorized accessChange defaults, harden baseline
Open permissionsEveryone can write to shared folderTampering and data exposureLeast privilege and access reviews
Insecure protocolTelnet used for admin accessCredentials and commands exposedSSH or secure management plane
Weak encryptionDeprecated cipher enabledConfidentiality or integrity riskDisable weak protocols and ciphers
End-of-life systemVendor no longer provides fixesUnpatched known flaws persistUpgrade, replace, segment, monitor
Unnecessary serviceTest service exposed in productionExtra attack surfaceDisable or restrict service
Exposed management portAdmin interface reachable from internetDirect attack pathVPN, bastion, allow list, MFA

Misconfiguration Patterns

AreaCommon mistakeBetter state
IdentityOverly broad admin rolesLeast privilege, role reviews, just-in-time access
NetworkAny-to-any firewall rulesNarrow source, destination, port, and protocol
StoragePublic read on sensitive object storeBlock public access and explicit policies
LoggingAudit logs disabled or short retentionCentral logging with protected retention
EndpointUsers are local adminsStandard users and privileged elevation workflow
DatabaseDatabase exposed directly to internetPrivate subnet and application-only access
ContainerRuns as root with privileged modeNon-root user, restricted capabilities
CloudLong-lived static access keysWorkload identity, short-lived credentials

Cloud and Container Example

A containerized web app is breached. The image runs as root, includes a vulnerable package, and has an environment variable containing a cloud access key. Three weaknesses exist at once:

FindingTypeMitigation
Vulnerable packageSoftware vulnerabilityRebuild with patched base image
Root containerConfiguration weaknessRun as non-root, drop capabilities
Access key in env varSecret exposureRotate key, move to secret manager or workload identity

The best answer may include multiple controls. The exam often asks for the "best" or "most immediate" control, so consider urgency. If a key is already exposed, rotate it now. Then fix the build and secret handling process.

Supply Chain Weaknesses

WeaknessClueMitigation
Vulnerable dependencySCA report flags library CVEUpdate dependency and test
Typosquatting packagePackage name almost matches popular libraryUse trusted registries and package allow lists
Compromised updateLegitimate vendor channel delivers malicious codeVendor validation, code signing, monitoring
Unpinned dependencyBuild pulls latest unreviewed packagePin versions and use lock files
Unverified artifactBinary source cannot be trustedSignature verification and hashes

Common Traps

TrapBetter exam reasoning
Treat a vulnerability scan as remediationScanning finds issues; remediation changes the risky condition
Patch a system that has no vendor patchesUse compensating controls while replacing or upgrading
Encrypt data but leave public access openEncryption helps, but public exposure is still a configuration failure
Disable logs to improve performanceLogs are required for detection, investigation, and accountability

Quick Drill

Name the weakness and the likely mitigation:

  1. A router still uses the vendor default password: default configuration; change credentials and apply hardening baseline.
  2. A payroll database accepts connections from any internet address: exposed service; restrict network access and require controlled admin path.
  3. A server uses an unsupported operating system: legacy/EOL system; replace or isolate with monitoring until replacement.
  4. A package-lock file is absent and builds pull unreviewed versions: supply chain weakness; pin and review dependencies.
Test Your Knowledge

A production object storage bucket containing internal reports allows anonymous public read access. What is the main weakness?

A
B
C
D
Test Your Knowledge

A vendor no longer releases security patches for a server operating system. Which mitigation is usually best long term?

A
B
C
D
Test Your KnowledgeMulti-Select

Which items are common cloud misconfigurations? Select two.

Select all that apply

Overly permissive IAM role
Public access to sensitive storage
Use of salted password hashes
A tested backup restore