WHITE PAPER

The Exploitability Intelligence Gap

New research reveals that 18% of vulnerabilities showed signs of exploitation before CISA KEV listing, with some cases surfacing confirmed activity up to 31 days earlier.

Most vulnerability programs act when risk becomes obvious. By then, the window to get ahead of it may already be closing.

Between October 2025 and March 2026, Nucleus Security Research reviewed every new KEV addition and found that 22 vulnerabilities, 18% of the total, showed meaningful exploitation or exploitability signals before formal listing. The problem is not a lack of signals. It is the inability to operationalize them in time.

18%
Of KEV additions showed pre-confirmation signals
31 days
Longest pre-KEV lead time in the dataset
121x
Larger median EPSS movement after KEV than before it

What the Research Found

  • Confirmed exploitation surfaced before KEV in 8 of 22 CVEs, with a median lead time of 5.5 days
  • 14 additional CVEs showed strong exploitability signals before KEV without confirmed exploitation
  • Public PoC is a strong signal, but not the only one, and its absence does not mean low risk
  • EPSS crossed actionable thresholds after KEV in most cases, not before, making it a poor early-warning signal on its own

The Gap Is Between Evidence and Action

Early signals exist. They are fragmented, hard to connect, and difficult to defend in a prioritization decision. Teams default to waiting for downstream confirmation, even when earlier evidence is already strong enough to matter.

Download the whitepaper to see the evidence CVE by CVE, and what it takes to close the gap.

See Nucleus in Action

Discover how unified, risk-based automation can transform your vulnerability management.