HomeIntelligenceBrief
🔓 BREACH BRIEF🟠 High🔍 ThreatIntel

63% of Critical Vulnerabilities Remain Unpatched After 7 Days, Exposing Third‑Party Supply Chains

Qualys’ review of over one billion CISA KEV remediation records shows the proportion of critical flaws still open after a week has risen to 63 %, despite a 6.5× increase in ticket closures. The lag between exploit and patch creates a systemic risk for all vendors that integrate third‑party software.

🛡️ LiveThreat™ Intelligence · 📅 April 10, 2026· 📰 bleepingcomputer.com
🟠
Severity
High
🔍
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
4 sector(s)
Actions
3 recommended
📰
Source
bleepingcomputer.com

Study Shows 63% of Critical Vulnerabilities Remain Unpatched After 7 Days, Undermining Enterprise Defenses

What Happened — A Qualys analysis of more than one billion CISA Known Exploited Vulnerabilities (KEV) remediation records from 10 000 organizations over the past four years reveals that the share of critical flaws still open after seven days rose from 56 % to 63 %, despite a 6.5‑fold increase in remediation tickets. In 88 % of the 52 high‑profile weaponized vulnerabilities examined, attackers exploited the flaw before the average enterprise applied a patch.

Why It Matters for TPRM

  • Persistent exposure to critical CVEs creates a systemic supply‑chain risk for all third‑party vendors.
  • Traditional “ticket‑close” metrics mask the true exposure window that attackers exploit.
  • The “human ceiling” indicates that staffing alone cannot close the gap, demanding new automated risk‑operational models.

Who Is Affected — All industries that rely on third‑party software and services, especially technology/SaaS, cloud infrastructure, financial services, and healthcare providers that integrate external components.

Recommended Actions

  • Re‑evaluate vendor security questionnaires to include cumulative exposure metrics (e.g., % of critical CVEs open > 7 days).
  • Require vendors to demonstrate autonomous, closed‑loop patching or mitigation processes.
  • Prioritize monitoring of CISA KEV listings and integrate real‑time exploit intelligence into risk assessments.

Technical Notes — The study tracks CISA KEV data, focusing on weaponized vulnerabilities such as Spring4Shell (exploited 2 days before disclosure, average remediation 266 days) and Cisco IOS XE flaw (exploited ≈ 1 month early, average remediation 263 days). The underlying issue is the operational model rather than a lack of effort; time‑to‑exploit has collapsed to ‑7 days, meaning exploits appear before patches exist. Source: BleepingComputer

📰 Original Source
https://www.bleepingcomputer.com/news/security/analysis-of-one-billion-cisa-kev-remediation-records-exposes-limits-of-human-scale-security/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.