A flaw or misconfiguration in hardware or software. A vulnerability can often be exploited to gain unauthorized access to a computer system or otherwise render it open to attack. Mitigated through software updates or configuration changes. Compare risk and threat.