Vulnerability exploitation remains a leading cause of breaches, yet many organizations still take weeks, or months, to deploy available patches. With attackers now using AI to exploit vulnerabilities within hours, even minutes of their disclosure, security teams can ill-afford delays. This guide explains why patching is slow, what really matters, and how to accelerate remediation without burning out your team.
When a new vulnerability is disclosed, two clocks start. One is the attacker’s clock, as exploit code spreads and scanning ramps up. The other is yours. Patching is the workflow that turns a security advisory into a verified fix in production. It begins with understanding where the affected software runs in your environment, moves through decisions about risk and timing, and ends when every impacted system is either updated, mitigated, or retired.
In most organizations this is a relay. Security confirms exposure and assesses risk. Application owners test vendor patches or configuration changes in a safe environment. IT coordinates change windows, rolls updates into production, and documents outcomes. Operations and security then verify that fixes took hold and that nothing broke along the way. Not every fix is a patch file; sometimes the fastest, safest option is a configuration change, a rule on an existing control, or a temporary mitigation until a vendor update arrives. The goal is the same: close the exposure across all affected assets and prove that it worked.
Definition: Time to patch (TTP) is the period from the public disclosure of a vulnerability (typically when it receives a CVE) to full remediation across all affected assets.
The TTP lifecycle
Compressing each stage of this cycle shortens the exposure window and limits the time attackers have to exploit a known weakness.
This is not theoretical. The 2024 Verizon Data Breach Investigations Report attributes roughly 20% of breaches to vulnerability exploitation. Mandiant reports a median time to exploit (TTE) of about five days (ie, based on 2023 data, published in 2024; the number continues to decline) and proof-of-concept code often appears within hours on public repositories or criminal forums. The 2023 MOVEit Transfer zero-day was mass-exploited within 48 hours of disclosure, leading to widespread compromise and significant losses.
Beyond breach risk, long TTP carries operational and financial costs. Delayed patching derails planned work, pushes teams into emergency change windows and overtime, and sometimes requires outside consultants. These disruptive, unplanned cycles can cost 30-50% more than routine maintenance and can crowd out strategic initiatives.
Regulators are raising expectations. In the United States, CISA requires federal agencies to patch Known Exploited Vulnerabilities (KEV) within two weeks. Globally, GDPR and DORA increase scrutiny and penalties for slow remediation. Reputational risk is real as well; incidents such as Log4j showed how visible lag in patching can trigger stock impacts, regulatory attention, and lasting brand damage.
Mature programs often target an average TTP under 30 days, with critical vulnerabilities (active exploits, or CVSS > 9) addressed within seven days. In practice, global averages still hover around 60–150 days, highlighting the gap between best practice and day-to-day reality.
Scale and noise. More than 40,000 CVEs were published in 2024. Treating them as equally urgent creates endless queues and analyst fatigue. Static scoring systems like CVSS can overstate severity in ways that do not map to real-world exploitation. Research shows that fewer than 10% of vulnerabilities scored 9 or higher are actually exploited in the wild. The result is misallocated attention.
Change control friction. Legacy change control, the governance that approves and schedules production changes, often introduces delay. Approval chains stretch, and maintenance windows leave little room to act. In environments that prize uptime, especially around ERP and OT systems, risk aversion pushes patches off the calendar.
Tooling fragmentation. Scanners, IT service management platforms such as ServiceNow, and configuration management databases rarely share a single, current view of assets and ownership. Analysts shuttle data between systems, and Security and IT talk past each other about what to patch, where, and who owns the work.
Misaligned incentives. Security is incentivized to shrink risk; IT is tasked with uptime and stability. Without a shared risk model and prioritized, deduplicated queues, patch tickets languish without clear ownership or SLAs. Given the attacker speed established above, delays that once seemed tolerable now invite near-immediate attacks, even when vulnerabilities are known.
Measuring time to patch only works if everyone calculates it the same way. Define TTP as the span from public disclosure of a vulnerability (usually when it receives a CVE) to verified remediation across the scoped assets, and be explicit about what “verified” means in your environment.
With a common definition in place, build a shared scorecard around these metrics:
Reviewed weekly in operations and monthly with executives, these metrics make progress visible, surface blockers early, and keep TTP trending down.
Most teams don’t have a patching problem; they have a prioritization and coordination problem. Zafran replaces “patch everything” fire drills with a risk-first operating model that proves which findings are truly exploitable in your environment, mitigates them fast using the tools you already own, and turns the rest into clear, action-ready work for IT.
1) Reveal what’s actually exploitable (filter noise, amplify signal): Zafran aggregates, deduplicates, and normalizes data from your existing scanners and asset systems, then applies net-new context: runtime presence, internet exposure, active exploitation intelligence, and critically, the configuration and coverage of your deployed defenses (EDR, NGFW, WAF, CNAPP). The result: ~90% of “critical” vulns are de-prioritized as non-exploitable noise, and the top 10% that matter rise to the top. This closes the five-day exploit window by eliminating wasted cycles on phantom fires.
2) Reduce risk now, before the patch: Patches can wait; attackers will not. Zafran details step-by-step mitigations that use your current controls to drop exploitability today (e.g., tightening a WAF rule, enabling an EDR block, segmenting via NGFW policy). These compensating controls remove lengthy change windows from the critical path of risk relief, and buy time for proper remediation.
3) Turn insights into action with RemOps: Zafran’s RemOps engine converts hundreds of overlapping CVEs into a single “golden ticket” per root cause, enriched with clear fix steps and due dates. With tickets being auto-routed to the right owners via Jira/ServiceNow by using assignment rules, ticket noise into the remediation backend is reduced, communications are enhanced, and MTTR slashed, as Security and IT align around the same, high-fidelity plan.
4) Continuously detect and verify: Agentlessly leverage existing endpoint tools to keep SBOMs and runtime visibility current without need for new agents or intrusive scans. Zafran tracks exposure trends, validates control effectiveness, and provides executive-ready reporting so leaders can see measurable progress against SLAs and high-profile CVEs.
Attackers move faster than defenders can patch. Closing that gap means shifting from volume-based patching to risk-based, automated, and collaborative remediation operations.
By automating triage of your risk context to prioritize the most exploitables, scanning continuously, and using compensating controls, teams can cut average TTP from months to days.
Zafran accelerates that journey by filtering noise, orchestrating rapid mitigations, and streamlining remediation through AI. Faster fixes reduce breach probability, liberate staff from manual drudgery to focus on higher value work, and improve risk posture.
See Zafran in Action