The vulnerability of the system was exposed during the cyberattack.
Addressing vulnerability is crucial for stability.
Software vulnerability can expose user data.