Exploiting a vulnerability through metasploit is very easy. Depending on the attack strategy through Metasploit, it will be possible to compromise all of your systems.