HomeIntelligenceBrief
VULNERABILITY BRIEF🟠 High Vulnerability

Verizon DBIR 2026 Shows 35% of KEV Vulnerabilities Still Open After 28 Days, 47M Instances Unresolved

Verizon’s 2026 DBIR, with Qualys data, reveals a reversal in remediation performance: 35% of known‑exploited vulnerabilities remain open after 28 days, and a long‑tail 9% (≈ 47 M) stay unresolved. The trend highlights a systemic capacity gap that third‑party risk managers must address through stricter vendor controls.

LiveThreat™ Intelligence · 📅 May 19, 2026· 📰 blog.qualys.com
🟠
Severity
High
VU
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
3 recommended
📰
Source
blog.qualys.com

Inside 2026 Verizon DBIR: One Billion Vulnerability Records Reveal Slowing Remediation Pace

What Happened — Verizon’s 2026 Data Breach Investigations Report, augmented by Qualys analysis of more than one billion anonymized vulnerability remediation records, shows that the share of CISA‑listed Known‑Exploited Vulnerabilities (KEV) still open 28 days after listing climbed to 35 %, up from 27 % in 2025. A persistent “long‑tail” of 9 % (≈ 47 million instances) remains open with no near‑term closure path, indicating that remediation capacity is being outpaced by vulnerability volume.

Why It Matters for TPRM

  • Growing backlog signals higher exposure to actively exploited flaws across all third‑party vendors.
  • The slowdown in proactive patching (down from 16.6 % to 12.1 %) reduces the safety margin for supply‑chain partners.
  • Organizations that pre‑emptively remediate before KEV listing continue to outperform, highlighting a measurable control gap for many vendors.

Who Is Affected — All industries that depend on external software or services, with particular risk for cloud‑SaaS providers, critical‑infrastructure operators, and enterprises with large third‑party ecosystems.

Recommended Actions

  • Audit vendor vulnerability‑management programs for KEV‑related SLAs and proactive patching commitments.
  • Require vendors to adopt risk‑based prioritization that incorporates threat‑actor context before official KEV publication.
  • Incorporate Verizon‑DBIR remediation metrics (e.g., 28‑day open rate) into third‑party risk scorecards.

Technical Notes — The analysis uses a survival‑curve methodology on 1 billion remediation events, tracking time from CISA KEV addition to closure. No specific CVE or exploit vector is disclosed; the finding reflects systemic process capacity rather than a single vulnerability. Source: Qualys Blog – Inside the 2026 Verizon DBIR

📰 Original Source
https://blog.qualys.com/vulnerabilities-threat-research/2026/05/19/inside-the-2026-verizon-dbir-what-one-billion-records-revealed-about-vulnerability-remediation

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.