ArXiv TLDR

CVEs With a CVSS Score Greater Than or Equal to 9

🐦 Tweet
2604.20765

Lena Sinterhauf, Andreas Aßmuth, Roland Kaltefleiter

cs.CR

TLDR

This paper analyzes the identification and resolution timelines of critical CVEs (CVSS >= 9.0), revealing significant delays in disclosure and patching.

Key contributions

  • Analyzes 245,456 CVEs (2009-2024), finding 12.8% are critical (CVSS >= 9.0).
  • Uses mixed methods, combining global vulnerability data with qualitative incident case studies.
  • Reveals significant delays in public disclosure and patch deployment for critical vulnerabilities.
  • Identifies key delay factors: industry specifics, resource availability, and organizational processes.

Why it matters

This paper highlights the systemic risk posed by the remediation gap for critical vulnerabilities, despite faster disclosure. Its findings on delay factors and actionable recommendations are crucial for organizations to improve their vulnerability management strategies and minimize cyberattack risks.

Original Abstract

Critical vulnerabilities with Common Vulnerability Scoring System scores of 9.0 or higher pose severe risks to organisations' information systems. Timely detection and remediation are essential to minimise economic and reputational damage from cyberattacks. This paper provides a thorough analysis of the identification and resolution timelines of such critical vulnerabilities. A mixed-methods approach is employed, integrating quantitative data from global vulnerability databases analysing 245,456 Common Vulnerabilities and Exposures records spanning from 2009 to 2024, of which 12.8 % were critical, with qualitative case studies of notable incidents. This methodical combination of quantitative and qualitative data sources enables the identification of patterns and delay factors in vulnerability management. The findings indicate significant delays in public disclosure and patch deployment, influenced by industry-specific factors, resource availability and organisational processes. The paper concludes with a series of actionable recommendations to improve the efficiency of vulnerability responses. Despite faster disclosure, the remediation gap for critical vulnerabilities remains a systemic risk, driven by organisational inertia and system complexity.

📬 Weekly AI Paper Digest

Get the top 10 AI/ML arXiv papers from the week — summarized, scored, and delivered to your inbox every Monday.