Skip to content

Cybersecurity Vulnerabilities (CVE, KEV, 0-Day, and Theoretical Risk)

A practical guide to vulnerability types and why reported weaknesses keep growing every year. โ€ข May 3

Reported vulnerabilities keep rising every year โ€” not because security is getting worse, but because there is more software, more researchers, and better tooling to find flaws. What matters is not volume, but which ones are actually exploitable in your environment.

Contents

CVE Growth Trend โ€‹

Published CVEs have grown sharply every year. KEV entries (actively exploited) also increase, but far more slowly โ€” only ~3โ€“4% of the total CVE universe ends up being actively weaponized in the wild.

text
Approximate yearly CVE publications (2016-2025)

2016 | ###                     ~6.4k
2017 | #######                 ~14.6k
2018 | ########                ~16.5k
2019 | #########               ~17.4k
2020 | ##########              ~18.3k
2021 | ###########             ~20.1k
2022 | ##############          ~25.0k
2023 | ################        ~28.8k
2024 | #####################   ~40.0k
2025 | ######################  ~44.0k (preliminary)

Scale: each # โ‰ˆ 2,000 CVEs

In 2024: ~40โ€“45k CVEs published ยท ~1,200โ€“1,500 KEV entries ยท ~2โ€“8% are genuinely high priority in a typical enterprise backlog.

Key Concepts โ€‹

TermWhat it isRisk levelResponse
CVEPublicly disclosed vulnerability with a unique ID (e.g. CVE-2025-12345).Medium to HighPrioritize by context: exposure, CVSS, EPSS.
KEVCISA catalog entry โ€” active exploitation observed in the wild.CriticalPatch or mitigate immediately. Days matter.
0-DayExploited before a patch exists, or before defenders can deploy one.CriticalEmergency: contain, compensating controls, hunt.
TheoreticalPlausible weakness with no proven exploit path in your environment.Low to MediumValidate reachability first; handle in hardening backlog.

Risk and Difficulty Matrix โ€‹

Scores are baselines โ€” adjust up if the asset is internet-facing or business-critical, down if it is isolated or already mitigated.

Vulnerability classRisk (0โ€“10)Exploit difficulty~Share of CVEs~KEV presencePriority
0-day (no patch available)9.8Attacker-dependent<0.1%โ€”Emergency response
Unauthenticated RCE (internet-facing)9.5Practical2โ€“5%High (20โ€“30%)Immediate emergency
Injection (SQLi, command injection)8.0Practical โ†’ config-dependent12โ€“20%Medium (10โ€“18%)Very high
Privilege escalation (authenticated)7.5Requires specific configuration10โ€“15%Medium (10โ€“20%)Very high
AuthN/AuthZ logic flaw7.0Configuration-dependent8โ€“12%Medium (8โ€“15%)High
Cryptographic weakness / misuse6.5Config-dependent โ†’ advanced8โ€“12%Low (<3%)Mediumโ€“high
Information disclosure5.5Theoretical โ†’ practical12โ€“18%Lowโ€“medium (5โ€“10%)Medium (higher if chain exists)
Denial of service5.0Practical18โ€“25%Low (3โ€“6%)Medium
Theoretical (no practical path)3.0Theoretical30โ€“50%Very lowArchitecture hardening backlog

Notes: ~15โ€“30% of CVEs are practically exploitable; ~30โ€“50% are theoretical and never weaponized. Hard to replicate โ‰  low impact โ€” a difficult exploit on a critical system can still be devastating. Percentages are approximate ranges from NVD (2022โ€“2024) and CISA KEV data; sector context changes everything.

The Hidden Gap โ€‹

Two scenarios make your real exposure window wider than CVE databases suggest.

0-Days held by white-hat researchers โ€‹

During responsible disclosure, a researcher knows the full exploit but stays silent while waiting for the vendor to patch โ€” typically up to 90 days. During that window, the bug exists, may be independently discovered by attackers, and has no public CVE to scan for.

ExampleGap windowWhat happened
ProxyLogon โ€” CVE-2021-26855 (Exchange)~56 daysNation-state actors found it independently during the disclosure window and began exploiting before the patch shipped.
Spring4Shell โ€” CVE-2022-22965Hoursโ€“daysPoC leaked publicly before the vendor finished the fix, forcing an emergency release.
CVE-2024-38193 (Windows AFD / Lazarus)~weeksLazarus group used it in targeted attacks during the coordinated disclosure period.
Google Project Zero (general policy)0โ€“90+ daysP0 has published exploits for Chrome, iOS, and Windows when vendors missed the 90-day deadline โ€” with or without a patch ready.

KEV-listed CVEs left unpatched for 30โ€“120+ days โ€‹

A KEV listing means active exploitation is happening now. Yet median remediation time at many organizations is 30โ€“120+ days, because of dependency complexity, required downtime, or poor asset visibility.

ExampleTypical patch lagWhy it dragged
Log4Shell โ€” CVE-2021-44228Weeks to monthsLog4j was embedded in hundreds of products; orgs did not know where it lived.
Citrix NetScaler Bleed โ€” CVE-2023-496630โ€“90+ daysHealthcare and financial appliances stayed exposed well after the advisory.
Fortinet FortiOS auth bypass โ€” CVE-2022-40684 (CVSS 9.8)30โ€“60+ daysSlow patch adoption on older hardware despite emergency-level severity.
MOVEit Transfer SQLi โ€” CVE-2023-34362Daysโ€“weeks (+ pre-patch 0-day)Cl0p ransomware exploited it as a 0-day first; then slow adoption after the patch released.

Both windows โ€” researcher-held 0-days and unpatched KEVs โ€” are periods of asymmetric exposure. Attackers may already know and have an operational head start.

Takeaways โ€‹

  • Volume โ‰  risk. Most CVEs are never weaponized; focus on KEV, exposure, and exploitability (EPSS).
  • KEV = treat as ongoing incident. Define an SLA measured in days, not patch cycles.
  • Theoretical vulnerabilities matter for architecture hardening, but should not crowd out urgent fixes.

References โ€‹