If your vendor, whether its an supplier or contractor, is connected to your organization’s network, then any security vulnerabilites that they may have will also be inherited to your organizations network.
In 80 words or more review and discuss the following article
https://bridgepointconsulting.com/best-practices-reducing-third-party-risk-vendor-soc-reports/