The time between vulnerability disclosure and exploitation is shrinking dramatically, putting pressure on security teams to accelerate their patching processes. A significant increase in exploitation of high-severity vulnerabilities has been observed, with a 105% rise in confirmed cases in 2025 compared to the previous year, reaching 146 instances1. The window for patching has collapsed, with the median time to inclusion in the CISA Known Exploited Vulnerabilities list dropping to just 5 days, and the mean time-to-exploit decreasing to 28 days. This compressed timeline underscores the need for security teams to prioritize patching and implement more efficient vulnerability management practices. The rapid acceleration of exploitation highlights the importance of proactive measures to mitigate potential threats, making it essential for practitioners to reevaluate their patching strategies to stay ahead of emerging vulnerabilities.
Patch windows collapse as time-to-exploit accelerates
⚠️ Critical Alert
Why This Matters
According to Rapid7’s latest Cyber Threat Landscape Report , confirmed exploitation of newly disclosed high- and critical-severity vulnerabilities (CVSS 7-10) increased 105% year.
References
- Rapid7. (2026, April 9). Patch windows collapse as time-to-exploit accelerates. CSO Online. https://www.csoonline.com/article/4156005/patch-windows-collapse-as-time-to-exploit-accelerates.html
Original Source
CSO Online
Read original →