Types of Security Vulnerabilities

Types of Security Vulnerabilities


  1. Unpatched Software: Unpatched vulnerabilities allow attackers to run malicious code by exploiting known security bugs that haven't been fixed. Attackers will probe your environment for unpatched systems and attack them directly or indirectly.
  2. Misconfiguration: System misconfigurations, such as assets running unnecessary services or having vulnerable settings (e.g., unchanged defaults), can be exploited by attackers to breach your network. They will look for systems with these weaknesses and attack them directly or indirectly.
  3. Weak Credentials: Attackers may use dictionary or brute force attacks to guess weak passwords, gaining access to systems in your network. Ensuring strong, complex passwords can mitigate this risk.
  4. Phishing, Web, & Ransomware: Phishing involves attackers tricking users into executing malicious code, compromising systems, accounts, or sessions. Attackers send links or malicious attachments via email or other messaging systems, often accompanied by enticing text or images.
  5. Trust Relationship: Attackers exploit trust configurations that simplify access between systems (e.g., mounted drives, remote services) to propagate across your network. Once they gain access to one system, they can breach others that implicitly trust the compromised system.
  6. Compromised Credentials: Attackers use compromised credentials to gain unauthorized access to systems. They may intercept and extract passwords from unencrypted or poorly encrypted communications or exploit password reuse across different systems.
  7. Malicious Insider: Employees or vendors with access to critical systems may exploit their access to steal, destroy, or impair information. This is particularly concerning for privileged users and critical systems.
  8. Missing/Poor Encryption: Attackers can intercept communications between systems and steal information if encryption is missing or poor. They can extract critical data, impersonate either side, and inject false information into the communication.
  9. Zero-Days & Unknown Methods: Zero-days are vulnerabilities known to attackers but not yet reported to the vendor, meaning no fix is available. Attackers will probe your environment for systems that can be compromised by these exploits and attack them directly or indirectly.

To view or add a comment, sign in

More articles by iSecServ

Others also viewed

Explore content categories