Answer: Forever-Day Exploits
There is a chance that computer security will attack a vulnerability prior to servicing the software or hardware company responsible for responding is known as a "zero-day exploit". The zero-day attacks occur during the time that the vulnerability to the product responsible company becomes known and a type of patch or update is released to counteract the attacks and close the vulnerability.
Many zero-day exploits are slowly turning into perpetual exploits, and that's the alarm of many people in the security industry and beyond. Forever-day exploits occur when the company responsible for the software or hardware in question does nothing to correct the exploit.
This can happen because a product is approaching the end of its life cycle and the company no longer wants to invest energy and money in the upkeep. In other cases, the company considers the exploit to be opaque enough or far enough away from mission-critical elements of the system that clogging the gap is not a priority. In cases where the exploit is part of the firmware of a device, the device may not be patched and the exploit is permanent.
Unfortunately, with more and more systems connected to corporate and global networks, there is a growing likelihood that malicious users will be able to access devices that are forever exploited and cause real harm.