Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

666+ Articles
118+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Analysis of 1 Billion CISA KEV Records Exposes Limits of Human-Scale Security
Analysis of 1 Billion CISA KEV Records Exposes Limits of Human-Scale Security
NEWS

Analysis of 1 Billion CISA KEV Records Exposes Limits of Human-Scale Security

Qualys Threat Research Unit analyzed over 1 billion CISA KEV remediation records across 10,000 organizations spanning 2022–2025, finding that remediation volume grew 6x but outcomes worsened — with 63% of critical vulnerabilities still open at Day 7 in 2025.

Dylan H.

News Desk

April 12, 2026
5 min read

The Remediation Paradox: More Effort, Worse Outcomes

A landmark study by the Qualys Threat Research Unit (TRU) has quantified what many security teams intuitively suspected: organizations are working harder on vulnerability remediation but achieving less safety. The report, titled "The Broken Physics of Remediation," analyzed over 1 billion CISA KEV remediation records from more than 10,000 organizations spanning 2022 to 2025 — the largest dataset of its kind.

The core finding is striking: closed vulnerabilities grew 6x over the study period (from 73 million in 2022 to 473 million in 2025), yet the percentage of critical vulnerabilities still open at Day 7 increased from 56% to 63%. More remediation activity is producing worse security outcomes.

Key Findings

The Human Ceiling

Qualys calls this phenomenon the "human ceiling" — the structural limit of remediation architectures built around human decision-making speed. As attack surfaces expand and vulnerability volumes grow exponentially, human-paced processes cannot keep pace. The data shows the ceiling is not a future threat; organizations have already hit it.

"Any architecture dependent on human-speed response carries structural risk." — Qualys TRU

Time-to-Exploit Has Gone Negative

Citing Google M-Trends 2026 data, the report notes that average Time-to-Exploit is now negative 7 days — meaning attackers are weaponizing the most critical vulnerabilities before patches even exist. Of the 52 KEV vulnerabilities studied in depth:

  • 50% were exploited before public disclosure
  • 88% were remediated more slowly than they were exploited

This means the "patch before exploit" model is mathematically broken for the most critical flaws.

Remediation Velocity Breakdown by Year

YearClosed VulnsCritical Open at Day 7
202273 million56%
2023~200 million58%
2024~350 million61%
2025473 million63%

The data shows a consistent, worsening trend even as absolute remediation volume increased dramatically.

New Metrics Introduced

The report argues that traditional metrics like Mean Time to Remediate (MTTR) are insufficient because they only measure response speed — not cumulative exposure. Qualys introduces two replacement metrics:

Risk Mass

Risk Mass = vulnerable assets × days exposed

This captures the total exposure burden over time, not just whether a vulnerability was eventually closed. A vulnerability left open for 30 days on 100 systems has 10x the risk mass of the same flaw left open for 3 days on the same systems.

Average Window of Exposure (AWE)

The full duration from exploitability onset to complete remediation across the fleet. AWE replaces MTTR as the primary KPI because it accounts for the time attackers have advantage, not just how fast defenders act once they notice.

The Manual Tax

The report identifies a "Manual Tax" — the inherent latency introduced by human-driven processes at each stage of the remediation pipeline:

Vulnerability published
  → Human reviews scanner output (hours to days)
  → Ticket created in ITSM system (hours)
  → Ticket assigned and acknowledged (hours to days)
  → Patch tested in staging (days to weeks)
  → Patch deployed to production (hours)
  → Verification scan run (hours)
  → Ticket closed (hours)

Each step adds delay. For zero-days exploited before disclosure, the entire pipeline is already behind before it starts.

A Positive Signal

Amid the sobering data, the report identified one positive pattern: 15% of organizations that had operationalized their remediation pipeline were able to patch by the time a vulnerability was added to the CISA KEV catalog. This represents the viable benchmark — proof that the model can work when automation closes the human-speed gap.

The Path Forward: Autonomous Risk Operations

Qualys frames the conclusion as architectural rather than operational: the problem is not that security teams are doing their jobs poorly — it is that the jobs were designed for a threat landscape that no longer exists.

The report calls for a shift from Security Operations Centers (SOC) to Risk Operations Centers (ROC): autonomous, closed-loop systems that:

  • Continuously assess exploitability (not just CVE scores)
  • Trigger automated remediation without human bottlenecks
  • Measure risk mass and AWE, not MTTR
  • Prioritize by attacker timelines, not CVSS scores

"The attacker's timeline is the only one that matters — and that timeline is predictable." — Saeed Abbasi, Head of Threat Research, Qualys

Implications for Security Teams

  1. Stop optimizing MTTR — it measures the wrong thing. Measure AWE and risk mass instead
  2. Automate the routine — human review should be reserved for high-complexity decisions, not routine patch deployment
  3. Prioritize by exploitability, not CVSS — a CVSS 6.0 flaw with active KEV exploitation is more urgent than an unweaponized CVSS 9.8
  4. Acknowledge the ceiling — staffing more people into a broken architecture does not fix the architecture
  5. Invest in closed-loop pipelines — scan → assess → remediate → verify, without human queues at each stage

References

  • BleepingComputer — Analysis of 1 Billion CISA KEV Records Exposes Limits of Human-Scale Security
  • Qualys TRU Blog — The Broken Physics of Remediation
  • CISA Known Exploited Vulnerabilities Catalog
#CISA#Vulnerability#Remediation#Security Updates#Research#Qualys

Related Articles

CISA Orders Feds to Patch Actively Exploited Citrix Flaw by Thursday

CISA has issued a mandatory patching directive ordering all U.S. federal agencies to apply Citrix NetScaler security updates by Thursday, March 5, 2026,...

6 min read

CISA Orders Federal Agencies to Patch n8n RCE Flaw

CISA mandated all federal civilian agencies patch CVE-2025-68613, a CVSS 9.9 remote code execution flaw in the n8n workflow automation platform, after...

4 min read

Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621

Adobe has released emergency updates to fix a critical heap buffer overflow vulnerability in Acrobat Reader (CVE-2026-34621, CVSS 8.6) that has been actively exploited via malicious PDFs since at least December 2025.

4 min read
Back to all News