Adversaries may acquire information about vulnerabilities that can be used during targeting. Adversaries may find vulnerability information by searching open databases or gaining access to closed vulnerability databases. [1]
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.