CyberGlossary

Vulnerabilities

Weaponized Exploit

Also known as: Operational exploit

Definition

A reliable, fully developed exploit ready for real-world use — typically integrated into malware, intrusion frameworks, or attacker tradecraft.

Whereas a proof of concept only demonstrates that a vulnerability is exploitable, a weaponized exploit is engineered for reliability, stealth, and scale: it bundles target detection, exploit primitives, sandbox or ASLR bypasses, a stable shellcode loader, and often persistence. Weaponization may include obfuscation, anti-analysis tricks, fall-back techniques across OS or patch levels, and packaging into a delivery vehicle such as a phishing document or worm. Once a vulnerability is weaponized, the time between disclosure and mass exploitation shrinks dramatically, raising the urgency of patching, detection engineering, and threat-intelligence sharing.

Examples

  • WannaCry weaponizing EternalBlue (CVE-2017-0144) into a self-spreading worm.
  • Cobalt Strike beacons paired with weaponized n-day VPN exploits.

Related terms