Skip to main content

Vulnerability

Also known as: Weakness, Susceptibility

A weakness in an asset, control, or process that a threat could exploit to cause loss. In FAIR, the probability that a threat event becomes a loss event when an attempt is made.

Written by Askara Solutions editorial team · Updated

Vulnerability is the half of the equation that controls can actually move. The frequency of attempted attacks is largely outside the organisation's control; the probability that an attempt succeeds is shaped almost entirely by the controls in place. That is why most security spend ends up reducing vulnerability rather than chasing threat actors, and why the FAIR decomposition makes vulnerability a separate factor in the loss-event-frequency calculation.

The word is overloaded in everyday use. In a technical-engineering context, a vulnerability is a specific weakness in software or configuration, often with a CVE identifier and a CVSS score attached. In a risk-analysis context, vulnerability is the broader susceptibility of an asset or control to a threat action, expressed as a probability between zero and one and informed by the realistic capability of the threat actor. The two senses meet in practice: a hardening decision that closes a CVE feeds into a lower vulnerability estimate, which in turn lowers loss event frequency in the affected scenarios.

The discipline of estimating vulnerability is where many risk programmes thin out. The temptation is to default to "we have controls, so vulnerability is low" without testing the assumption. A more honest approach calibrates against incident history, red-team exercises, and the realistic threat capability rather than the design intent of the controls. The Risk Investigation Agent maintains the vulnerability estimates alongside the controls that drive them, so a change in the control regime is reflected in the analysis rather than reasoned about separately.

Related terms

  • Threat

    Anything with the potential to cause loss to an asset by exploiting a vulnerability, characterised by the actor's motivation, capability, and frequency of attempted action.

  • Threat Event Frequency

    The expected number of times per year that a threat actor will attempt the action that could lead to a loss event, before any consideration of whether the attempt succeeds.

  • Loss Event Frequency

    The expected number of times per year that a threat actor's action will succeed and produce a loss, calculated as Threat Event Frequency multiplied by Vulnerability (the probability of success).

  • Risk Assessment

    The structured process of identifying threats, estimating likelihood and impact, and producing a defensible record of which risks the organisation accepts, treats, or transfers.