Cyber Posture

What companies patch, and what they don’t

A short intro to vulnerability management. We summarize patching progress in dozens of customer environments, then ask what customers chose to fix, and why.

Last updated: 19 May 2026 12:11 UTC

Vulnerability scanners find far more issues than any team can fix. Whatever is still open in the scanner today is, by definition, what’s left after deciding what to fix first, what to live with, and what to monitor. By comparing what’s left to the full list of all published CVEs, we can work out what customers actually focus on.

The vulnerability management lifecycle

A vulnerability is a flaw in code, configuration, or a default setting that lets an attacker do something the designer didn’t intend. Each is assigned a CVE identifier, given a severity (CVSS) score, and tracked by every vulnerability scanner.

What follows is a four-step cycle. A scanner finds the issues. A risk model ranks them. A patch or configuration change clears them. A re-scan confirms the fix. The cycle repeats indefinitely, because new vulnerabilities arrive faster than old ones get fixed. The question is not whether to keep up, but which issues to fix first.

1 Identify A scanner finds issues across your fleet. 2 Prioritize A risk model ranks what to fix first. 3 Remediate A patch or config change clears it. 4 Validate A re-scan confirms the fix worked. CYCLE REPEATS
The four-step vulnerability management cycle. New CVEs arrive faster than the loop closes; the work is choosing which issues to fix first.

What gets patched: the prioritization gap

If customers patched without any priorities, tackling issues in random order, their backlog would match the severity breakdown of all CVEs. But it doesn’t. The chart below compares the unpatched backlog across several dozen customer environments (red) against the severity mix of all published CVEs (grey).

Chart 1. Where the red bar is shorter than grey, customers patched aggressively. Critical-rated CVEs make up roughly a tenth of all published vulnerabilities but only a small slice of what’s left unpatched, because Criticals get attention. Mediums also shrink, probably because they ride along with the monthly Windows update, which gets applied all at once. The High band swells in the other direction: it’s where customers fix most of the issues but not all of them, and the rest piles up.

Open chart in new tab  ·  PNG version

What’s hard to patch

Three patterns explain most of the unpatched backlog.

1. Configuration outweighs code. The most common finding across the customer base isn’t a software bug. It’s an untrusted TLS/SSL server certificate. The rest of the top ten is similar: weak cipher suites, static-key ciphers, self-signed certificates, SMB signing not required, TLS 1.0 still enabled, the BEAST attack still possible, default SNMP community names. None of these need a vendor patch. They need someone to revisit long-forgotten settings on long-running services, and that operator action is the real bottleneck.

2. Operating system vs applications. Microsoft-tagged issues (Windows OS patches, Office, Edge) dominate the customer footprint, reflecting both endpoint counts and the volume of Microsoft’s monthly release cadence. Linux is essentially absent from the backlog, which has two equally honest explanations: many Linux servers auto-update via the package manager, and the customer base is simply Windows-heavy. Browser apps (Chrome, Edge) and the occasional Adobe Acrobat / Java install are the next-biggest category.

3. Old CVEs age out, with exceptions. The second chart traces every unpatched CVE by the year it was first published, as a share of the backlog (red) versus its share of the whole NVD universe (grey).

Chart 2. Most years, the red bar sits well below grey, meaning those CVEs got patched over time. The recent end (2024–2026) is the opposite: red towers over grey because those CVEs are too recent to have been patched. The interesting part is the small set of years where red matches or exceeds grey despite age: 1999, 2002, 2011, 2015, and 2016. Those are the survivors. A 1999 SNMP-defaults issue and the 2011 TLS BEAST flaw both still ride along on machines nobody has revisited. Configuration-hygiene CVEs stay around for years because nothing on the host actively prompts anyone to fix them.

Open chart in new tab  ·  PNG version

What “good” looks like

A healthy vulnerability-management programme is built on habits more than on tooling:

Three things to remember

  • Critical CVEs do get patched. If they’re rare in a mature backlog, prioritization is working.
  • The High band is where things accumulate. Volume, not severity, is what makes Highs the dominant category.
  • Configuration is the overlooked half of the job. The oldest unpatched issues in real environments are almost never software bugs — they’re default settings nobody went back to fix.

Charts based on an aggregated snapshot of a few dozen customer environments, compared to all published CVEs at the time of writing. Specific counts and customer identities are intentionally left out.