A new report from Rapid7 highlights a dangerous acceleration in the threat landscape: the time between the public disclosure of a vulnerability and its widespread exploitation is shrinking dramatically. The analysis reveals that the median time for a vulnerability to be added to CISA's Known Exploited Vulnerabilities (KEV) catalog has fallen to just 5 days, down from 8.5 days previously. The mean time-to-exploit has been nearly halved, from 61 to 28.5 days. This compression of the "patching window" is attributed to the industrialization of cybercrime and the growing use of Artificial Intelligence (AI) by threat actors to reverse-engineer patches and generate exploits. The practical implication is that defenders are in a constant race against time, and known but unpatched "n-day" vulnerabilities have become a more significant and immediate threat than undisclosed "zero-day" flaws.
The key findings from Rapid7's Cyber Threat Landscape Report, corroborated by research from Veracode, paint a stark picture for defenders:
This data shows that attackers are operating on a clock, while many organizations are still operating on a calendar. The traditional monthly or quarterly patch cycle is no longer adequate to manage risk in this accelerated environment.
Two primary factors are driving this trend:
This trend fundamentally shifts the risk calculus for defenders. While zero-day vulnerabilities (flaws with no patch available) are dangerous, they are also rare and expensive to use. In contrast, n-day vulnerabilities (flaws for which a patch exists) are now the weapon of choice for a majority of attackers.
Attackers know that many organizations have slow patching processes. By focusing on recently disclosed CVEs, they can target a vast number of vulnerable systems before defenders have had a chance to react. Incident response firm Coalition confirmed this, stating they see far more exploitation of known, patched issues than true zero-days. Every patch release is now effectively a starting gun for a race between attackers and defenders.
The collapsing patching window has profound implications for security operations and risk management:
To survive in this accelerated threat landscape, organizations must adapt their security strategies:
Fortinet reports 389% surge in ransomware victims and time-to-exploit shrinking to 24-48 hours, driven by AI-enabled attacks.
Accelerate patch deployment cycles, prioritizing vulnerabilities known to be exploited in the wild.
Mapped D3FEND Techniques:
Continuously scan the attack surface and prioritize vulnerabilities based on risk and active exploitation, not just CVSS score.
Implement network segmentation as a compensating control to limit the impact of an exploit on an unpatched system.
Mapped D3FEND Techniques:
In response to the collapsing patching window, organizations must treat Software Update not as a routine task but as a time-critical incident response function. Manual, quarterly patching is no longer defensible. Security teams must invest in and implement automated patch management systems capable of deploying critical updates in days, not weeks. The process should be driven by risk and threat intelligence. When a vulnerability appears in CISA's KEV catalog, it should trigger an emergency change process to get the patch deployed to all affected systems within a 72-hour SLA. This requires pre-approved change windows for critical security updates and automated testing to reduce the risk of operational disruption. The goal is to move faster than the attackers, who are now weaponizing patches within a week.
With thousands of new CVEs disclosed each month, trying to patch everything is a losing strategy. Organizations must adopt a rigorous Vulnerability Prioritization and Management framework. This means moving beyond CVSS scores alone and incorporating real-world threat intelligence. The primary input for prioritization should be evidence of active exploitation, such as inclusion in the CISA KEV catalog or other threat intelligence feeds. Additionally, context from the organization's own attack surface management—is the vulnerable asset internet-facing? Is it business-critical?—is essential. By focusing patching efforts on the small subset of vulnerabilities that are both exploitable and exposed, security teams can allocate their limited resources far more effectively and have a greater impact on reducing overall risk.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.