Last update: February 12, 2018 Configuration Weaknesses in this category are typically introduced during the configuration of the software.