По стандарту ISO 27001 фактически внутренняя уязвимость.
Specifically, assets have internal (or intrinsic) and external (or extrinsic) vulnerabilities. For example, with respect to information and communication technology (ICT), intrinsic vulnerabilities can be found within system design, security configurations, hardware, and software, among other areas (ENISA, 2017).
https://www.unodc.org/e4j/en/cybercrime/module-9/k...