The Broken Physics of Remediation

Source: Vulnerabilities and Threat Research – Qualys Security Blog

Author: Saeed Abbasi

URL: https://blog.qualys.com/vulnerabilities-threat-research/2026/03/23/the-broken-physics-of-remediation

ONE SENTENCE SUMMARY:

Research shows manual patching can’t match weaponization speed, demanding new metrics, confirmation, intelligence prioritization, and automated remediation.

MAIN POINTS:

  1. Traditional “patch faster than exploit” model targets an outdated threat landscape.
  2. Manual remediation lagged attackers for 88% of critical actively weaponized vulnerabilities.
  3. Half of key vulnerabilities were weaponized before patches were available.
  4. Operationalized remediation pipelines enabled 15% to patch by KEV addition time.
  5. Study analyzed one billion CISA KEV remediation records across 10,000 organizations (2022–2025).
  6. Findings indicate a structural remediation failure, not merely slower patching speed.
  7. Vulnerability volume and attack surface growth outpaced teams’ capacity to respond.
  8. Day 7 and Day 30 critical vulnerability closure rates worsened over time.
  9. “Human ceiling” suggests staffing or process maturity alone cannot close the gap.
  10. Report proposes embedded intelligence, active confirmation, and automated remediation as the new approach.

TAKEAWAYS:

  1. Adopt AWE to measure exposure from weaponization through full environmental remediation.
  2. Use Risk Mass to quantify cumulative exposure-days beyond dashboard sprint windows.
  3. Address long-tail assets via Manual Tax insights to avoid 4–5x longer exposure.
  4. Close the confirmation gap with deterministic validation of real exploitability in-context.
  5. Modern remediation requires automation plus prioritization and verification, not faster manual patching.