
Security teams are inundated with vulnerability alerts daily, but not every “critical” CVE warrants an emergency response. Traditional scoring systems like CVSS often lack context about real-world exploitability, leading to wasted resources on patching flaws that pose no actual risk. A data-driven approach focusing on exposure validation can reduce remediation workloads by up to 95% while maintaining effective security1.
TL;DR: Key Takeaways
- 53% reduction in critical vulnerabilities achieved by prioritizing exploitable flaws2
- CVSS 9.4 vulnerabilities can drop to risk scores of 2.4 after environmental validation3
- Breach and Attack Simulation (BAS) tools provide actionable exploitability data
- Runtime SCA solutions like Oligo detect loaded/executed vulnerable libraries
- SBOMs with VEX statements provide crucial supply chain context4
The CVSS Blind Spot
Common Vulnerability Scoring System (CVSS) ratings frequently create false urgency. A BleepingComputer analysis found organizations waste significant patching efforts on vulnerabilities mitigated by existing controls like firewalls or network segmentation1. The MOVEit breach (CVE-2023-34362) demonstrated how unpatched SQL injection flaws with available exploit code caused widespread damage, while many CVSS 9.8+ vulnerabilities remain unexploited in practice5.
Cymulate’s research shows three critical factors determine actual exploitability: public exploit code availability, network reachability of affected assets, and potential for attacker pivoting through misconfigurations2. Microsoft’s recurring security failures (ProxyLogon, PetitPotam) highlight how vendor severity ratings often conflict with real-world risk profiles6.
Validation Before Remediation
Exposure validation tools like Picus and Cymulate use Breach and Attack Simulation to test vulnerabilities in specific environments. One case study showed a team reducing their remediation workload from 300 vulnerabilities to just 15 exploitable flaws – a 95% reduction in effort without compromising security3.
Automated pentesting techniques simulate attacker behaviors including:
Technique | Validation Purpose |
---|---|
Lateral movement | Tests network segmentation effectiveness |
Privilege escalation | Validates IAM controls |
Endpoint exploitation | Confirms patch effectiveness |
Beyond CVEs: The Supply Chain Factor
The Kusari team emphasizes that Software Bill of Materials (SBOMs) combined with Vulnerability Exploitability eXchange (VEX) statements provide necessary context for transitive risks4. The GUAC framework aggregates dependency data to identify hidden threats like Log4j in nested dependencies. Runtime Software Composition Analysis (SCA) tools using eBPF instrumentation can detect when vulnerable libraries are actually loaded in memory, as demonstrated by Spring4Shell’s conditional exploitability7.
Actionable Recommendations
Effective vulnerability management requires shifting from theoretical severity to validated risk:
- Integrate continuous validation with existing SIEM/SOAR workflows
- Prioritize CISA Known Exploited Vulnerabilities (KEV) catalog entries
- Combine BAS results with patch management systems
- Implement runtime SCA for accurate library risk assessment
- Monitor non-CVE risks like misconfigurations and EOL systems
“You don’t need to fix everything. You just need to fix what’s real.”
— Picus Security
As Picus’ research confirms, focusing validation efforts on exploitable vulnerabilities allows teams to maintain strong security postures while avoiding unnecessary fire drills over theoretical risks. The data shows this approach reduces critical vulnerability counts by 53% on average while actually improving defensive effectiveness1,2.
References
- “Not every CVE deserves a fire drill: Focus on what’s exploitable,” BleepingComputer, 2025. [Online]. Available: https://www.bleepingcomputer.com/news/security/not-every-cve-deserves-a-fire-drill-focus-on-whats-exploitable
- “Exploitable vulnerabilities: Cutting through the noise,” Cymulate, 2025. [Online]. Available: https://cymulate.com/blog/exploitable-vulnerabilities
- “Counting CVEs was never enough,” Kusari, 2024. [Online]. Available: https://www.kusari.dev/blog/counting-cves-was-never-enough
- “Identifying and mitigating exploitable vulnerabilities,” Seemplicity, 2025. [Online]. Available: https://seemplicity.io/blog/identifying-and-mitigating-exploitable-vulnerabilities
- “What is a CVE?,” Balbix, 2025. [Online]. Available: https://www.balbix.com/insights/what-is-a-cve
- “Microsoft’s security failures persist,” Cybereason, 2025. [Online]. Available: https://www.cybereason.com/blog/microsoft-security-failures-analysis
- “Runtime SCA and ADR solutions,” Deep-Kondah, 2025. [Online]. Available: https://deep-kondah.com/research/runtime-sca