3. The adversary is capable of collecting critical information, correctly analyzing it, and then taking timely action.
A vulnerability exists when the adversary is capable of collecting critical information, correctly analyzing it, and then taking timely action.