Understand application, hardware, mobile, virtualization, operating system, cloud, web, and supply-chain vulnerabilities for Security+.
A vulnerability is the weakness that makes the attack path work. Security+ expects you to identify the category of weakness and the layer where it lives. That matters because the best mitigation depends on whether the problem is a web input-validation flaw, a mobile-device posture issue, a cloud misconfiguration, or a hypervisor escape risk.
SSRF: Server-side request forgery, a web flaw where the application is tricked into making requests the attacker should not control.
XSS: Cross-site scripting, where attacker-controlled script runs in another user’s browser through the vulnerable application.
Hypervisor: The software layer that hosts and isolates virtual machines.
CompTIA is usually checking whether you can:
| Category | Typical examples |
|---|---|
| Application | insecure deserialization, injection, broken access control |
| Hardware | firmware flaws, insecure peripherals, hardware tokens mishandled |
| Mobile | sideloading, jailbreaking, weak screen lock, lost device exposure |
| Virtualization | VM escape, snapshot misuse, weak hypervisor isolation |
| Operating system | unpatched kernel, insecure services, weak local configuration |
| Cloud-specific | over-permissive roles, exposed storage, insecure metadata access |
| Web-based | XSS, SQLi, CSRF, SSRF, path traversal |
| Supply chain | poisoned libraries, malicious updates, weak vendor build security |
| Scenario clue | Strongest vulnerability direction |
|---|---|
| user is tricked by delivery path, then executes a macro | insecure macro execution or weak application controls |
| public storage is reachable broadly | misconfigured access policy or cloud exposure |
| attacker abuses server-side requests to reach internal targets | web application weakness such as SSRF |
| mobile user bypasses platform restrictions | reduced platform trust or mobile hardening gap |
| guest escapes one tenant boundary into another | virtualization or hypervisor isolation weakness |
When Security+ describes a compromise, ask: what weakness made this possible? The answer is often narrower than the story.
Security+ now expects baseline cloud literacy. Many cloud weaknesses are not exotic technical bugs:
Those are all vulnerabilities even if the cloud provider infrastructure itself is sound.
1resource: object-storage-bucket
2issue: public_read_enabled
3owner: analytics-team
4risk: external_data_exposure
What to notice:
A developer accidentally stores cloud API secrets in a public code repository. Attackers later use those secrets to access storage and create new compute resources. Which statement is strongest?
A. The main vulnerability is a cold-site failure B. The main vulnerability is exposed secret handling and insecure configuration, not the eventual compute creation itself C. The main issue is only password length D. The only weakness is the attacker’s IP address
Best answer: B. Security+ expects you to identify the enabling weakness, which is exposed secret storage and insecure handling, not just the later attacker activity.
Continue with 2.4 Malicious Activity to connect the weakness to the kind of attack behavior CompTIA expects you to recognize.