{"id":1532,"date":"2020-09-25T14:05:00","date_gmt":"2020-09-25T14:05:00","guid":{"rendered":"https:\/\/sectigostore.com\/blog\/?p=1532"},"modified":"2020-11-20T18:31:38","modified_gmt":"2020-11-20T18:31:38","slug":"exploit-vs-vulnerability-whats-the-difference","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/blog\/exploit-vs-vulnerability-whats-the-difference\/","title":{"rendered":"Exploit vs Vulnerability: What\u2019s the Difference?"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">We\u2019ll take an in-depth look at the difference between vulnerabilities and exploits, why they matter, and how you can use that knowledge to keep your website safe<\/h2>\n\n\n\n<p>Ever wonder how a hacker actually hacks? Or are you tired of unrealistic movies that are full of endless lines of code and keyboard clacking without any explanation? Seeing as you most likely googled something along the lines of \u201cexploit vs vulnerability\u201d or \u201cvulnerability vs exploit\u201d to get here, then the answer to those questions is yes.<\/p>\n\n\n\n<p>Exploring what vulnerabilities and exploits are, the differences between them, and how they\u2019re useful to hackers is an excellent way to learn more about how hackers think. More importantly, it can help you better protect yourself and your organization against them.<\/p>\n\n\n\n<p>So, let\u2019s compare and break down an exploit vs a vulnerability to get a better idea of what they are and how they differ.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Exploit vs Vulnerability: A Quick Take<\/h2>\n\n\n\n<p>In a nutshell, a vulnerability is a weakness or opening for hackers to find a way into a website, a system that connects to a website, operating systems, <a href=\"https:\/\/sectigostore.com\/blog\/what-is-owasp-what-are-the-owasp-top-10-vulnerabilities\/\">web applications<\/a>, software, networks, and other IT systems. An exploit is a specific code or attack technique that uses a vulnerability to carry out an attack or gain unauthorized access. The vulnerability is the opening and the exploit is something that uses that opening to execute an attack.<\/p>\n\n\n\n<p>The names are, indeed, apt as hackers look for vulnerabilities to exploit. However, it should be noted that not all vulnerabilities are exploitable. Whether it\u2019s due to a lack of abilities on the hacker\u2019s end or supplemental security tools making it difficult for the hacker to exploit the vulnerability, not all vulnerabilities will be exploited. In fact, <a href=\"https:\/\/weis2019.econinfosec.org\/wp-content\/uploads\/sites\/6\/2019\/05\/WEIS_2019_paper_53.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">a 2019 study<\/a> shows that out of 76,000 vulnerabilities the researchers discovered between 2009 and 2018, only 5.5% had been exploited in the wild.<\/p>\n\n\n\n<p>That&#8217;s the quick answer. Now, let&#8217;s look at the topic of exploit vs vulnerability more in depth.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Exploit vs Vulnerability: A Deeper Dive<\/h2>\n\n\n\n<p>To understand vulnerabilities and exploits, you first need to understand a hacker. Hackers are usually looking to do one of three things:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Receive some type of short-term or long-term financial, social or political gain;<\/li><li>Wreak havoc for personal satisfaction; or<\/li><li>Both of these reasons.<\/li><\/ol>\n\n\n\n<p>A hacker\u2019s mindset and methods are very similar to those used by a home burglar. They often scout their target (to some extent), search for a vulnerability and exploit it. For example, a burglar will look for an unlocked window (vulnerability) and then wait until you are away to enter it (how they exploit it) without your permission. Then from there, they are most likely looking to steal valuable things but there are also intruders who just want to vandalize (like a hacker will do with a website at times).<\/p>\n\n\n\n<p>So, here&#8217;s another way to differentiate exploit vs vulnerability. The big difference between a vulnerability and an exploit is that a vulnerability is a hacker finds an opening in your cyber defenses. An exploit is what occurs if and when they actually take advantage of the vulnerability without your permission. It\u2019s the difference between finding an unguarded entrance to a fort and actually charging through it. But let\u2019s take a few moments to explore each of these terms a little more in depth.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"342\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/exploit-vs-vulnerability-lifecycle-1024x342.png\" alt=\"Exploit vs vulnerability illustrative timeline\" class=\"wp-image-1536 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/exploit-vs-vulnerability-lifecycle-1024x342.png 1024w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/exploit-vs-vulnerability-lifecycle-300x100.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/exploit-vs-vulnerability-lifecycle-560x187.png 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/exploit-vs-vulnerability-lifecycle-940x314.png 940w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/exploit-vs-vulnerability-lifecycle.png 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>This illustration represents the lifecycle of a vulnerability and where a cybercriminal could potentially exploit a vulnerability.<\/figcaption><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">What Are Vulnerabilities?<\/h3>\n\n\n\n<p>As mentioned, a vulnerability is a weak point or channel that hackers <em>could<\/em> use to find a way into your website, operating system, applications, network, or other IT-related systems. (A vulnerability isn\u2019t actually the attack or exploit itself.) Vulnerabilities could be a weakness that exists in your software code. And users can even create some vulnerabilities without even realizing it.<\/p>\n\n\n\n<p>For example, outdated or legacy software or system that you haven\u2019t updated yet could be the target of a hacker. Another example of a vulnerability is when a user creates a weak password or reuses a password that gets compromised in a breach. A vulnerability can also be created by a cyber attack, such as a <a href=\"https:\/\/sectigostore.com\/blog\/what-is-a-phishing-email-5-examples-of-phishing-emails-and-how-to-avoid-them\/\">phishing email<\/a> with a link that tricks or manipulates you into downloading files containing malicious software or code.<\/p>\n\n\n\n<p>How the vulnerability is created doesn\u2019t change the fact that there is a weakness that hackers could potentially exploit. As for what we mean when say \u201cexploited,\u201d see our next section\u2026<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What Is an Exploit?<\/h3>\n\n\n\n<p>As mentioned, an exploit is the use of a specific code or technique that takes advantage of a vulnerability that exists in a target\u2019s IT systems or software. Essentially, a hacker will exploit the vulnerability in a way that gets them unauthorized access to the system. Exploits need vulnerabilities to exist, which is why preventing vulnerabilities is so important.<\/p>\n\n\n\n<p>Looking for vulnerabilities manually would be a laborious way of hacking, which is why hackers use automated tools to attack vulnerabilities at mass scale. For many hackers, exploiting vulnerabilities is very much a numbers game. If a hacker discovers an outdated piece of software in a CMS, they may use an automation tool to crawl thousands of sites that use that CMS looking for the vulnerability so they can collect mass amounts of data, typically from many small websites.<\/p>\n\n\n\n<p>Knowing the difference between vulnerabilities and exploits is the first step in knowing how to protect yourself.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Zero Day Vulnerabilities and Exploits<\/h3>\n\n\n\n<p>So, what happens if there is a vulnerability that you\u2019ve discovered within your own application but haven\u2019t patched yet? Or what if a cybercriminal has created <a href=\"https:\/\/sectigostore.com\/blog\/different-types-of-malware\/\">malware<\/a> or another way to exploit your application that no one has seen before? Each of these two examples is known as a <a href=\"https:\/\/sectigostore.com\/blog\/zero-day-what-is-a-zero-day-attack-exploit-or-vulnerability\/\">zero day vulnerability and a zero day exploit<\/a>, respectively.<\/p>\n\n\n\n<p>A zero day vulnerability is an exploit that you may or may not know about but haven\u2019t yet had time to address. There are organizations and websites such <a href=\"https:\/\/cve.mitre.org\/cve\/search_cve_list.html\" target=\"_blank\" rel=\"noreferrer noopener\">MITRE<\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/search\" target=\"_blank\" rel=\"noreferrer noopener\">NIST<\/a> and <a href=\"https:\/\/vuldb.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">vuldb.com<\/a> that maintain lists of known critical vulnerabilities and exposures. Once a patch is released for the vulnerability, however, it\u2019s no longer considered a zero day vulnerability.<\/p>\n\n\n\n<p>A zero day exploit is when a cybercriminal uses an unpatched or unknown vulnerability to their advantage. They can do this by creating new malware that they create or by using phishing techniques to direct users to infected websites. \u201cZero day\u201d attacks are particularly dangerous because they capitalize on unknown or unpatched issues that have yet to be fixed. They\u2019re also typically undetectable because traditional antivirus and anti-malware software aren\u2019t looking for them.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Examples of Vulnerabilities and Exploits<\/h3>\n\n\n\n<p>So, now that you know what vulnerabilities and exploits are, you\u2019ll probably want a few more examples that you might come across. Here a few examples of how a hacker might use a vulnerability and exploit:<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Example 1<\/h4>\n\n\n\n<p><strong><em>Vulnerability: <\/em><\/strong>You did not <a href=\"https:\/\/sectigostore.com\/blog\/secure-wordpress-website\/\">update your WordPress plugin<\/a>, which has a code error.<\/p>\n\n\n\n<p><strong><em>Exploit:<\/em><\/strong> A hacker uses the vulnerability to launch a <a href=\"https:\/\/sectigostore.com\/blog\/what-is-sql-injection-8-tips-on-how-to-prevent-sql-injection-attacks\/\">SQL injection<\/a> attack.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Example 2<\/h4>\n\n\n\n<p><strong><em>Vulnerability:<\/em><\/strong> A web admin has a weak password that lacks complexity and doesn\u2019t meet NIST passwords standards. (See <a href=\"https:\/\/pages.nist.gov\/800-63-3\/sp800-63b.html\" target=\"_blank\" rel=\"noreferrer noopener\">NIST SP 800-63B Authentication and Lifecycle Management<\/a>, section 5.1.1.) Some general password creation best practices include using long passwords that include a combination of uppercase and lowercase characters, and at least one special character and number.<\/p>\n\n\n\n<p><strong><em>Exploit:<\/em><\/strong> A hacker uses a \u201ccracker tool\u201d to crack the password and now controls your website. It should be noted should how accessible these \u201ccracker tools\u201d are. There are literally <a href=\"https:\/\/resources.infosecinstitute.com\/10-popular-password-cracking-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\">top 10 lists<\/a> that rank password cracking tools that range from ones that assists with brute force attacks to tools that can crack LM and NTLM hashes!<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Example 3<\/h4>\n\n\n\n<p><strong><em>Vulnerability:<\/em><\/strong> A website has an area that allows users to upload unvalidated files with no filters or limits.<\/p>\n\n\n\n<p><strong><em>Exploit:<\/em><\/strong> A hacker uploads a file that contains executable code and now has access to your website source code and database credentials (basically controlling your website).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The CIA Triad: What It Is &amp; Why You Should Use It<\/h2>\n\n\n\n<p>So, now that you know the difference between a vulnerability and an exploit, you might be semi-worried that someone is going to use them against you. Don\u2019t worry (or even be semi-worried) \u2014 we got you covered. Let\u2019s start with the <a href=\"https:\/\/www.cisecurity.org\/spotlight\/ei-isac-cybersecurity-spotlight-cia-triad\/\" target=\"_blank\" rel=\"noreferrer noopener\">CIA triad<\/a>, or what\u2019s sometimes called the AIC triad. This model provides a great starting place for responding to information security threats.<\/p>\n\n\n\n<p>No matter which you prefer to call it, the triad is a helpful and accurate way to remember the three cornerstones of a good cybersecurity program:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Confidentiality<\/strong> \u2014 Keep your data\/info \u2014 such as HR documentation, customer info, and passwords \u2014 confidential and protected from unauthorized access.<\/li><li><strong>Integrity<\/strong> \u2014 Maintain the integrity of your data assets to avoid hackers modifying, eliminating or controlling them in any way.<\/li><li><strong>Availability<\/strong> \u2014 Your data and systems should always be available to those who have legitimate access. Don\u2019t let hackers block users from your website or systems, or allow anyone to take them out entirely.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Pro Tips for Dealing with Vulnerabilities and Exploits<\/h2>\n\n\n\n<p>As mentioned, the CIA triad is an excellent barometer for what cybersecurity methods and protocols you should implement. So, when you are attempting to prevent vulnerabilities from becoming a thing, it\u2019s important to look for methods and protocols that align with the CIA triad and can help you avoid being the victim of a hacker.<\/p>\n\n\n\n<p>Here a few tips and suggestions that we think can help:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Get an SSL\/TLS Certificate<\/strong><\/h3>\n\n\n\n<p>Make sure your entire website is using the secure HTTPS protocol. This is imperative for ensuring that your site exchanges data via a secure, encrypted channel. Do this by installing an <a href=\"https:\/\/sectigostore.com\/blog\/what-is-a-pki-certificate\/\">SSL\/TLS certificate<\/a> via your web hosting control panel. After that, update your CMS to use HTTPS URLs and then set your HTTP URLS to point to their secure HTTPS counterparts (using 301 redirects).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Use End-to-End Encryption<\/strong> <\/h3>\n\n\n\n<p>Cybercriminals love to target email because it\u2019s a common way for companies to communicate and share information internally. Unfortunately, many organizations choose to share sensitive information via email, and this can leave that data vulnerable to cybercriminals.<\/p>\n\n\n\n<p>By using an <a href=\"https:\/\/sectigostore.com\/id\/email-signing-certificate\">email signing certificate<\/a>, you can encrypt the email message and attachments (using <a href=\"https:\/\/sectigostore.com\/blog\/5-differences-between-symmetric-vs-asymmetric-encryption\/\">asymmetric encryption<\/a>) before you hit the end button. This means that no matter whether your email sends through secure or insecure channels, your data is secure from prying eyes because only your recipient will be able to open the email using their private key.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Have a Strong &amp; Unique Password (For Everything) <\/strong><\/h3>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/insecure-password.png\" alt=\"\" class=\"wp-image-1539\" width=\"191\" height=\"258\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/insecure-password.png 369w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/insecure-password-222x300.png 222w\" sizes=\"auto, (max-width: 191px) 100vw, 191px\" \/><\/figure><\/div>\n\n\n\n<p>Nothing makes life easy for hackers like a weak password. Use a long password (like 12-20 characters long) with numbers, capital letters, lowercase letters and special characters. Also, use a new password that isn\u2019t similar to anything you use on other accounts. By using a unique password for every account you use, even if your password for one account gets compromised in a data breach, all of your passwords are still secure.\u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Implement Access Controls <\/strong><\/h3>\n\n\n\n<p>As a web admin, it\u2019s important to control your CMS user accounts. There are two ways to do this.<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li><strong>Limit access to a need-only basis.<\/strong> So, if you have a writer that publishes blogs on your website, they don\u2019t need full access to all the capabilities found in the backend of your CMS. That way, if a hacker is able to obtain their login information, their capabilities are limited as well.<\/li><li><strong>Delete inactive accounts.<\/strong> If there\u2019s no longer the need for an account, it\u2019s important to delete it. The idea here is to eliminate any unnecessary channels hackers can use to get into your website.<\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Update Your Software, Hardware, and Plugins <\/strong><\/h3>\n\n\n\n<p>This may be the most important tip of the bunch. It\u2019s vital you keep your software updated as outdated software is a very common vulnerability hackers will exploit. Generally, you will need to ensure your CMS and CMS add-ons (themes, plugins, etc.) are updated while holding your web host accountable to maintain updates for your operating system and server software.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Review and Test Your Code<\/strong> <\/h3>\n\n\n\n<p>Reviewing and testing your code for weaknesses is a critical component of the project lifecycle when creating new sites and applications. This process should include a secure code review. Don\u2019t skip or skimp on this crucial step as doing so may result in data breaches or <a class=\"wpil_keyword_link\" href=\"https:\/\/sectigostore.com\/blog\/10-different-types-of-cyber-attacks-how-they-work\/\" title=\"cyber attacks\" data-wpil-keyword-link=\"linked\">cyber attacks<\/a> that you could have otherwise prevented. \u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Perform Vulnerability Assessments <\/strong><\/h3>\n\n\n\n<p>A vulnerability assessment is the act of finding, measuring, and categorizing vulnerabilities in your website, computers and other systems. Using automated tools, such as a vulnerability scanner, is a popular way to attack this task.<\/p>\n\n\n\n<p>If you go the vulnerability scanner route, I suggest looking for a vulnerability scanner that keeps an updated database of known vulnerabilities, one that is specific to the CMS you use and one that scans for implementation vulnerabilities. There are also website scanners like <a href=\"https:\/\/sectigostore.com\/website-security\/hacker-proof-trust-mark-vulnerability-scan\">Sectigo\u2019s HackerProof Trust Mark<\/a>, which scans your website daily and provides recommendations for how to remediate them.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Use Penetration Testing<\/strong> <\/h3>\n\n\n\n<p>Pentesting is basically simulating a cyberattack to see if any vulnerabilities exist and if\/how they can be exploited. Having this ability allows you to not only list what vulnerabilities exist but measure what methods cybercriminals could use to exploit the vulnerabilities. This extra layer of knowledge will make patching vulnerabilities more accurate and efficient.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Put a Web Application Firewall (WAF) in Place<\/strong><\/h3>\n\n\n\n<p>A WAF is longtime best practice in the world of websites. It\u2019s essentially a defense that sits between your website and users. For small businesses, I recommend a cloud-based WAF. It allows for both convenience and customizability. WAFs are all about what rules you set to detect and fight off attacks (and how you evolve the rules over time as well).<\/p>\n\n\n\n<p>With a cloud-based WAF, the CDN\/WAF company will manage and update the rules for you, but you will have the option to add your own rules as well.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion on the Topic of Vulnerabilities and Exploits (TL;DR)<\/h2>\n\n\n\n<p>I hope that this article provides you with greater insights about exploits vs vulnerabilities! To quickly recap for those of you who want to skim to understand an exploit vs a vulnerability:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>A vulnerability is a weakness or gap in your defenses that could be exploited. Vulnerabilities can exist in everything from websites and servers to operating systems and software.<\/li><li>An exploit is when a cybercriminal takes advantage of a vulnerability to gain unauthorized access.<\/li><li>Not all vulnerabilities get exploited \u2014 but when they do, the resulting damages can be immense.<\/li><li>Frequently rolling out updates and patches is essential to the cybersecurity of your website and organization as a whole.<\/li><li>There are many ways to prevent and patch vulnerabilities. The key is to find a routine and process that incorporates a variety of tactics (like the ones mentioned above) to ensure your site, software, network and other IT-related systems are as safe and secure as they can be.&nbsp;<\/li><\/ul>\n\n\n\n<p>Understanding what the differences are between vulnerabilities and exploits is critical to helping you address them before they become security issues. And now that you know more about them, make sure to implement these best practices to make your organization a tougher and less vulnerable target. Good luck!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We\u2019ll take an in-depth look at the difference between vulnerabilities and exploits, why they matter, and how you can use that knowledge to keep your website safe Ever wonder how&#8230;<\/p>\n","protected":false},"author":14,"featured_media":1533,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[133,132,134],"class_list":["post-1532","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-exploit","tag-exploit-vs-vulnerability","tag-vulnerabilities","post-with-tags"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Exploit vs Vulnerability: What\u2019s the Difference? - InfoSec Insights<\/title>\n<meta name=\"description\" content=\"Discover the difference between a vulnerability &amp; an exploit in this article that breaks down exploit vs vulnerability. Here&#039;s what to know.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/blog\/exploit-vs-vulnerability-whats-the-difference\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Exploit vs Vulnerability: What\u2019s the Difference? - InfoSec Insights\" \/>\n<meta property=\"og:description\" content=\"Discover the difference between a vulnerability &amp; an exploit in this article that breaks down exploit vs vulnerability. Here&#039;s what to know.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/blog\/exploit-vs-vulnerability-whats-the-difference\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Insights\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-25T14:05:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-20T18:31:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/exploit-vs-vulnerability.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Danny Lewis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Danny Lewis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/exploit-vs-vulnerability-whats-the-difference\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/exploit-vs-vulnerability-whats-the-difference\\\/\"},\"author\":{\"name\":\"Danny Lewis\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/25502b599fb00be7291f8a162d0d7267\"},\"headline\":\"Exploit vs Vulnerability: What\u2019s the Difference?\",\"datePublished\":\"2020-09-25T14:05:00+00:00\",\"dateModified\":\"2020-11-20T18:31:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/exploit-vs-vulnerability-whats-the-difference\\\/\"},\"wordCount\":2551,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/exploit-vs-vulnerability-whats-the-difference\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/exploit-vs-vulnerability.jpg\",\"keywords\":[\"Exploit\",\"Exploit vs Vulnerability\",\"Vulnerabilities\"],\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/exploit-vs-vulnerability-whats-the-difference\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/exploit-vs-vulnerability-whats-the-difference\\\/\",\"name\":\"Exploit vs Vulnerability: What\u2019s the Difference? - InfoSec Insights\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/exploit-vs-vulnerability-whats-the-difference\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/exploit-vs-vulnerability-whats-the-difference\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/exploit-vs-vulnerability.jpg\",\"datePublished\":\"2020-09-25T14:05:00+00:00\",\"dateModified\":\"2020-11-20T18:31:38+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/25502b599fb00be7291f8a162d0d7267\"},\"description\":\"Discover the difference between a vulnerability & an exploit in this article that breaks down exploit vs vulnerability. Here's what to know.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/exploit-vs-vulnerability-whats-the-difference\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/exploit-vs-vulnerability-whats-the-difference\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/exploit-vs-vulnerability-whats-the-difference\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/exploit-vs-vulnerability.jpg\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/exploit-vs-vulnerability.jpg\",\"width\":1600,\"height\":1000,\"caption\":\"Display Showing Stages of Hacking in Progress: Exploiting Vulnerability, Executing and Granted Access.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/exploit-vs-vulnerability-whats-the-difference\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Exploit vs Vulnerability: What\u2019s the Difference?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\",\"name\":\"InfoSec Insights\",\"description\":\"SectigoStore.com Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/25502b599fb00be7291f8a162d0d7267\",\"name\":\"Danny Lewis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f25ef0f7508958c9e3fc8f585b4182b78f50bee96670874ce71dd6940b588fef?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f25ef0f7508958c9e3fc8f585b4182b78f50bee96670874ce71dd6940b588fef?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f25ef0f7508958c9e3fc8f585b4182b78f50bee96670874ce71dd6940b588fef?s=96&d=mm&r=g\",\"caption\":\"Danny Lewis\"},\"description\":\"Danny is a writer and editor with a background in journalism, marketing and communications. He is a tech enthusiast and writes about technology, website security and cyber security.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Exploit vs Vulnerability: What\u2019s the Difference? - InfoSec Insights","description":"Discover the difference between a vulnerability & an exploit in this article that breaks down exploit vs vulnerability. Here's what to know.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/blog\/exploit-vs-vulnerability-whats-the-difference\/","og_locale":"en_US","og_type":"article","og_title":"Exploit vs Vulnerability: What\u2019s the Difference? - InfoSec Insights","og_description":"Discover the difference between a vulnerability & an exploit in this article that breaks down exploit vs vulnerability. Here's what to know.","og_url":"https:\/\/sectigostore.com\/blog\/exploit-vs-vulnerability-whats-the-difference\/","og_site_name":"InfoSec Insights","article_published_time":"2020-09-25T14:05:00+00:00","article_modified_time":"2020-11-20T18:31:38+00:00","og_image":[{"width":1600,"height":1000,"url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/exploit-vs-vulnerability.jpg","type":"image\/jpeg"}],"author":"Danny Lewis","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Danny Lewis","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/blog\/exploit-vs-vulnerability-whats-the-difference\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/exploit-vs-vulnerability-whats-the-difference\/"},"author":{"name":"Danny Lewis","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/25502b599fb00be7291f8a162d0d7267"},"headline":"Exploit vs Vulnerability: What\u2019s the Difference?","datePublished":"2020-09-25T14:05:00+00:00","dateModified":"2020-11-20T18:31:38+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/exploit-vs-vulnerability-whats-the-difference\/"},"wordCount":2551,"image":{"@id":"https:\/\/sectigostore.com\/blog\/exploit-vs-vulnerability-whats-the-difference\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/exploit-vs-vulnerability.jpg","keywords":["Exploit","Exploit vs Vulnerability","Vulnerabilities"],"articleSection":["Cyber Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/blog\/exploit-vs-vulnerability-whats-the-difference\/","url":"https:\/\/sectigostore.com\/blog\/exploit-vs-vulnerability-whats-the-difference\/","name":"Exploit vs Vulnerability: What\u2019s the Difference? - InfoSec Insights","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/exploit-vs-vulnerability-whats-the-difference\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/blog\/exploit-vs-vulnerability-whats-the-difference\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/exploit-vs-vulnerability.jpg","datePublished":"2020-09-25T14:05:00+00:00","dateModified":"2020-11-20T18:31:38+00:00","author":{"@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/25502b599fb00be7291f8a162d0d7267"},"description":"Discover the difference between a vulnerability & an exploit in this article that breaks down exploit vs vulnerability. Here's what to know.","breadcrumb":{"@id":"https:\/\/sectigostore.com\/blog\/exploit-vs-vulnerability-whats-the-difference\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/blog\/exploit-vs-vulnerability-whats-the-difference\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/blog\/exploit-vs-vulnerability-whats-the-difference\/#primaryimage","url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/exploit-vs-vulnerability.jpg","contentUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/exploit-vs-vulnerability.jpg","width":1600,"height":1000,"caption":"Display Showing Stages of Hacking in Progress: Exploiting Vulnerability, Executing and Granted Access."},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/blog\/exploit-vs-vulnerability-whats-the-difference\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sectigostore.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Exploit vs Vulnerability: What\u2019s the Difference?"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/blog\/#website","url":"https:\/\/sectigostore.com\/blog\/","name":"InfoSec Insights","description":"SectigoStore.com Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/25502b599fb00be7291f8a162d0d7267","name":"Danny Lewis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f25ef0f7508958c9e3fc8f585b4182b78f50bee96670874ce71dd6940b588fef?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f25ef0f7508958c9e3fc8f585b4182b78f50bee96670874ce71dd6940b588fef?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f25ef0f7508958c9e3fc8f585b4182b78f50bee96670874ce71dd6940b588fef?s=96&d=mm&r=g","caption":"Danny Lewis"},"description":"Danny is a writer and editor with a background in journalism, marketing and communications. He is a tech enthusiast and writes about technology, website security and cyber security."}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1532","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/comments?post=1532"}],"version-history":[{"count":6,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1532\/revisions"}],"predecessor-version":[{"id":1805,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1532\/revisions\/1805"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media\/1533"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media?parent=1532"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/categories?post=1532"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/tags?post=1532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}