What's Happening?
A recent study by Flashpoint has highlighted a significant reduction in the time between vulnerability disclosure and exploitation, known as 'time to exploit' (TTE). Over the past five years, TTE has decreased by 94%, dropping from 745 days in 2020 to just
44 days in the previous year. This trend is largely driven by the increased use of n-day exploits, which are vulnerabilities that have been publicly disclosed but remain unpatched by organizations. Flashpoint's data indicates that n-days now account for over 80% of the Common Vulnerabilities and Exposures (CVEs) listed in its Known Exploited Vulnerabilities (KEV) database. The study notes that while zero-day vulnerabilities often capture more attention, n-days are more appealing to threat actors due to their lower research and development costs. The report also highlights the challenges faced by security teams, including issues with asset visibility and a 'CVE blind spot' due to unlisted vulnerabilities.
Why It's Important?
The rapid decrease in TTE poses a significant challenge for security and IT teams, who now have less time to patch vulnerabilities before they are exploited. This trend increases the risk of cyberattacks, particularly for organizations that fail to promptly address known vulnerabilities. The prevalence of n-day exploits underscores the importance of timely patch management and comprehensive asset visibility. Organizations that do not maintain an up-to-date inventory of their assets or rely solely on CVEs for vulnerability management may find themselves at a heightened risk of attack. The study's findings emphasize the need for improved security practices and tools to address these emerging threats, which could have widespread implications for industries reliant on digital infrastructure.
What's Next?
Organizations are likely to face increased pressure to enhance their cybersecurity measures, particularly in terms of patch management and asset visibility. Security teams may need to adopt more proactive strategies, such as leveraging threat intelligence and advanced scanning tools, to identify and mitigate vulnerabilities more effectively. Additionally, there may be a push for improved collaboration between industry stakeholders and government agencies to address the challenges posed by n-day exploits. As the threat landscape continues to evolve, organizations will need to stay vigilant and adapt their security practices to protect against increasingly sophisticated cyber threats.









