Attackers exploit 80% of critical vulnerabilities before patches are applied, study finds

April 12, 20262 min read1 sources
Share:
Attackers exploit 80% of critical vulnerabilities before patches are applied, study finds

A sweeping analysis of one billion vulnerability remediation records has revealed a critical gap in organizational defense, with threat actors exploiting the vast majority of critical flaws before patches can be applied. The study, conducted by cybersecurity firm Qualys, found that 80% of the vulnerabilities listed in CISA’s Known Exploited Vulnerabilities (KEV) catalog were compromised prior to remediation by defenders.

The research, which spanned 18 months and covered 150 million unique assets, focused specifically on the CISA KEV catalog. This catalog is a definitive list of security flaws that have been confirmed to be under active attack in the wild. Federal agencies are mandated to patch these specific vulnerabilities within strict deadlines, making them a high-priority benchmark for all security teams.

The data highlights the extreme speed at which attackers operate. According to Qualys, approximately 40% of the vulnerabilities added to the KEV list are exploited within just two weeks of their public disclosure. This rapid weaponization of known flaws demonstrates that traditional, human-driven patching cycles are often too slow to prevent initial compromise.

The findings suggest that organizations relying on manual processes are fundamentally outmatched. While security teams struggle with patch fatigue and prioritization, automated attack campaigns can scan for and exploit unpatched systems at a massive scale. The report underscores that the challenge is not a lack of awareness, but a lack of speed and automation in responding to the most imminent threats.

“Human-scale security is failing to keep pace with the speed and scale of cyberattacks,” stated Qualys CEO Sumedh Thakar in a press release accompanying the report. The firm advocates for a shift toward automated, risk-based vulnerability management to close the gap between when a critical vulnerability is disclosed and when it is successfully patched.

Share:

// SOURCES

// RELATED

Adobe patches critical zero-day that was exploited for months

Adobe has patched a critical zero-day (CVE-2024-34097) in Acrobat and Reader that was actively exploited via malicious PDFs for at least four months.

2 min readApr 14

OpenAI rotates security certificates after supply chain attack hits development pipeline

A malicious package impersonating 'axios' was executed in a GitHub Actions workflow, forcing OpenAI to rotate potentially exposed macOS code-signing k

2 min readApr 14

OpenAI issues Mac app update after developer tool hit by supply chain attack

OpenAI released a precautionary update for its macOS app after a developer tool used in its creation pulled a malicious version of a code library.

2 min readApr 14

Docker flaw lets attackers bypass authorization to gain host access

A high-severity flaw in Docker Engine, CVE-2026-34040, allows attackers to bypass security plugins and gain full access to host systems.

2 min readApr 13