Key Takeaways
- In IBM 2024, organizations with faster time to identify and contain have lower costs; IBM reports numeric median identification times and containment times by percentile
- In CISA’s KEV catalog, each record includes severity, product, vulnerability name/CVE ID, and due date—each field is measurable and can be used for SLA tracking
- In Microsoft Security Update Guide, each bulletin includes numeric counts of CVEs fixed per update release (bulletin totals)
- In Verizon 2024 DBIR, the average number of records exposed per breach can be derived from DBIR tables; DBIR provides numeric data for breach size distribution
- SANS Top 25 Most Dangerous Software Errors list contains 25 error types (numeric list size)
- CISA BOD 22-01 applies to federal civilian executive branch agencies (numeric directive applicability) and includes deadlines for KEV remediation (directive text)
- In 2023, 53% of organizations had not fully implemented vulnerability management processes or lacked automated tools (per Gartner vulnerability management surveys reported by reputable outlets)
- As of 2024, the CVE Program recorded hundreds of thousands of CVE entries overall; for example, NVD provides a downloadable dataset and counts of vulnerabilities and exposures by year (NVD statistics)
- NVD provides an annual count of CVEs and detailed breakdowns by severity; for 2023, NVD lists 28,000+ vulnerabilities in its enriched dataset (NVD full listing by year)
- NVD provides a per-year CVE listing; for 2022, NVD lists 24,000+ vulnerabilities in its enriched dataset (NVD full listing by year)
- Cisco Talos found that a significant share of vulnerabilities in observed attacks are exploitation of publicly available vulnerabilities (Cisco Talos threat research reports quantify impacted exploit types)
- CIS Critical Security Controls v8 includes Control 8 (Audit Log Management) and Control 4 (Secure Configuration) with measurable implementation requirements (CIS provides specific control objectives)
- 75% of known exploited vulnerabilities (KEV) in CISA’s catalog have a publicly available patch from the vendor by the time of inclusion (percentage of KEV with known remediation).
- Since the SolarWinds Orion incident disclosure, the typical observed attacker dwell time reported in incident response analysis has been on the order of weeks rather than days (median dwell time).
- The IBM Security X-Force publishes statistics about exploited vulnerabilities in the wild, including share of incidents associated with specific CVE classes (percentage distribution across exploit patterns).
Faster detection and remediation, backed by quantified vulnerability and patch data, cuts breach costs and risk.
Performance Metrics
Performance Metrics Interpretation
Cost Analysis
Cost Analysis Interpretation
Industry Trends
Industry Trends Interpretation
Vulnerability Landscape
Vulnerability Landscape Interpretation
Mitigation Effectiveness
Mitigation Effectiveness Interpretation
Patch Availability
Patch Availability Interpretation
Attacker Dwell Time
Attacker Dwell Time Interpretation
Vulnerability Volume
Vulnerability Volume Interpretation
Vulnerability Assessment
Vulnerability Assessment Interpretation
Breach Data
Breach Data Interpretation
How We Rate Confidence
Every statistic is queried across four AI models (ChatGPT, Claude, Gemini, Perplexity). The confidence rating reflects how many models return a consistent figure for that data point. Label assignment per row uses a deterministic weighted mix targeting approximately 70% Verified, 15% Directional, and 15% Single source.
Only one AI model returns this statistic from its training data. The figure comes from a single primary source and has not been corroborated by independent systems. Use with caution; cross-reference before citing.
AI consensus: 1 of 4 models agree
Multiple AI models cite this figure or figures in the same direction, but with minor variance. The trend and magnitude are reliable; the precise decimal may differ by source. Suitable for directional analysis.
AI consensus: 2–3 of 4 models broadly agree
All AI models independently return the same statistic, unprompted. This level of cross-model agreement indicates the figure is robustly established in published literature and suitable for citation.
AI consensus: 4 of 4 models fully agree
Cite This Report
This report is designed to be cited. We maintain stable URLs and versioned verification dates. Copy the format appropriate for your publication below.
Sophie Moreland. (2026, February 13). Vulnerability Statistics. Gitnux. https://gitnux.org/vulnerability-statistics
Sophie Moreland. "Vulnerability Statistics." Gitnux, 13 Feb 2026, https://gitnux.org/vulnerability-statistics.
Sophie Moreland. 2026. "Vulnerability Statistics." Gitnux. https://gitnux.org/vulnerability-statistics.
References
- 1ibm.com/reports/data-breach
- 22ibm.com/security/x-force/threat-intelligence-index
- 32ibm.com/security/x-force
- 2cisa.gov/known-exploited-vulnerabilities-catalog
- 15cisa.gov/news-events/operational-directives
- 30cisa.gov/resources-tools/resources/known-exploited-vulnerabilities-0
- 34cisa.gov/resources-tools/resources/known-exploited-vulnerabilities
- 3msrc.microsoft.com/update-guide
- 4sans.org/critical-security-controls/
- 14sans.org/top25-software-errors/
- 5owasp.org/www-project-application-security-verification-standard/
- 27owasp.org/Top10/
- 6first.org/cvss/specification-document
- 7first.org/epss
- 8cwe.mitre.org/top25/
- 9ossf.github.io/osv-schema/
- 10tenable.com/blog
- 11tenable.com/resources
- 12nvd.nist.gov/vuln-metrics/cvss
- 21nvd.nist.gov/general/faq
- 23nvd.nist.gov/vuln/full-listing
- 24nvd.nist.gov/vuln/full-listing/2023
- 25nvd.nist.gov/vuln/full-listing/2022
- 26nvd.nist.gov/vuln/full-listing/2021
- 35nvd.nist.gov/developers/vulnerabilities
- 13verizon.com/business/resources/reports/dbir/
- 16gartner.com/en/articles
- 17gartner.com/en
- 18forrester.com/report/
- 19csrc.nist.gov/publications/detail/sp/800-53/rev-5/final
- 20csrc.nist.gov/publications/detail/sp/800-218/final
- 36csrc.nist.gov/projects/security-content-automation-protocol
- 28cisco.com/c/en/us/products/security/talos.html
- 29cisecurity.org/controls
- 31fireeye.com/content/dam/fireeye-www/documents/pdfs/rpt/mandiant-2019-applied-threat-intelligence-report.pdf
- 33cve.org/learn/about
- 37mozilla.org/en-US/security/
- 38enisa.europa.eu/publications/enisa-threat-landscape-2024







