Key Findings
- Moderate Confidence: The Patch Window Has Collapsed Beyond Recovery [SOURCED]
- Moderate Confidence: Vulnerability Volume and Exploit Velocity Are Accelerating Simultaneously [SOURCED]
- Moderate Confidence: Threat Actor Capability Democratization Lowers Barriers to Critical Infrastructure Attacks [SOURCED]
- Moderate Confidence: Critical Infrastructure Interdependence Amplifies Cascading Risk [SOURCED]
- Moderate Confidence: Organizational Capability Requirements Demand Structural Transformation, Not Incremental Improvement [ESTIMATED]
Executive Summary
The median exploitation window is now measured in hours, with 67% of exploited CVEs in 2026 weaponized before or on the day of disclosure , fundamentally inverting the historical advantage defenders once held. [Source: Repello AI, 2026-03] AI-enabled vulnerability discovery has created a structural asymmetry where AI systems can generate working CVE exploits in 10–15 minutes at approximately $1.00 per exploit, enabling attackers to operationalize more than 130 new CVEs daily at scale . [Source: BlastWave, 2026-03] This assessment concludes with MODERATE confidence that critical infrastructure defenders cannot maintain parity through traditional patch-cycle remediation alone, and must instead adopt fundamentally different organizational models centered on continuous threat exposure management, structural resilience, and AI-driven defense automation operating at machine speed.
The attack surface calculus has shifted from a vulnerability-centric model (find and patch) to an exposure-centric model (identify what matters, contain what cannot be patched). Organizations that fail to restructure their security operations around this reality will face cascading breaches across interconnected critical infrastructure systems.
The median exploitation window is now measured in hours, with 67% of exploited CVEs in 2026 weaponized before or on the day of disclosure , fundamentally inverting the historical advantage defenders once held. [Source: Repello AI, 2026-03] AI-enabled vulnerability discovery has created a structural asymmetry where AI systems can generate working CVE exploits in 10–15 minutes at approximately $1.00 per exploit, enabling attackers to operationalize more than 130 new CVEs daily at scale . [Source: BlastWave, 2026-03] This assessment concludes with MODERATE confidence that critical infrastructure defenders cannot maintain parity through traditional patch-cycle remediation alone, and must instead adopt fundamentally different organizational models centered on continuous threat exposure management, structural resilience, and AI-driven defense automation operating at machine speed.
The attack surface calculus has shifted from a vulnerability-centric model (find and patch) to an exposure-centric model (identify what matters, contain what cannot be patched). Organizations that fail to restructure their security operations around this reality will face cascading breaches across interconnected critical infrastructure systems.
- The Patch Window Has Collapsed Beyond Recovery [SOURCED]
The average patch takes 20 days to test and deploy, while the attack is already inside that window . [Source: Repello AI, 2026-03] Organizations can remediate approximately 10% of new vulnerabilities per month, with average time to test and deploy a security patch at 20 days, yet CISA data shows it takes organizations around 55 days to remediate 50% of known-exploited vulnerabilities once a patch is available . [Source: Repello AI, 2026-03] When the median time-to-exploit is measured in hours, a 55-day remediation timeline is not inadequate—it is catastrophic . [Source: Repello AI, 2026-03]
- Vulnerability Volume and Exploit Velocity Are Accelerating Simultaneously [SOURCED]
CVE publications rose from 25,000 in 2022 to over 48,000 in 2025—a 520% increase since 2016—driven by AI-assisted development where developers using AI coding tools report 40%+ productivity gains, with AI generating significant shares of committed code, meaning more code produced faster with proportionally less human review . [Source: Repello AI, 2026-03] IBM X-Force observed a 44% increase in attacks that began with exploitation of public-facing applications, largely driven by missing authentication controls and AI-enabled vulnerability discovery . [Source: IBM, 2026-02]
- Threat Actor Capability Democratization Lowers Barriers to Critical Infrastructure Attacks [SOURCED]
These systems lower the barrier to entry, with internal testing by Anthropic indicating that individuals without deep cybersecurity expertise were able to produce functional exploit outputs when assisted by advanced models, suggesting a broadening of the threat actor base from highly specialized groups to more numerous intermediate actors . [Source: Krypt3ia, 2026-04] The blurring line between nation-state and financially motivated actors is attributed to tactics and techniques spreading across underground forums, with AI streamlining reconnaissance and exploitation so techniques once reserved for nation-state actors are now adopted by financially motivated groups . [Source: IBM, 2026-02]
- Critical Infrastructure Interdependence Amplifies Cascading Risk [SOURCED]
U.S. critical infrastructure remains deeply interconnected across sectors such as energy, communications, water, transportation, and information technology, and while this interdependence enables efficiency, it introduces systemic risk where disruptions in one sector can propagate rapidly into others . [Source: Krypt3ia, 2026-04] In operational technology environments where patching timelines are long, the speed of AI-developed exploits poses a grave risk to critical infrastructure . [Source: Federal News Network, 2026-02]
- Organizational Capability Requirements Demand Structural Transformation, Not Incremental Improvement [ESTIMATED] Defenders require three core capability shifts: (1) Continuous Threat Exposure Management (CTEM) replacing reactive vulnerability management; (2) AI-driven runtime defense operating at machine speed to contain threats during the patch window; and (3) Cross-functional organizational integration breaking down silos between development, data science, and security teams to enable unified threat modeling and response.
The Structural Inversion of Attack Surface Dynamics
The traditional attack surface model—where defenders had time to discover, assess, prioritize, test, and deploy patches—has been inverted by AI-enabled vulnerability discovery. Historically, the exploitation window favored the defender, with a vulnerability disclosed, teams assessing exposure, and remediation following a predictable patch cycle, but AI has shattered that timeline, with over 32% of vulnerabilities exploited on or before the day the CVE was issued . [Source: The Hacker News, 2026-02]
The scale of this inversion is quantifiable. Just three months into 2026, the cURL team has found and fixed more vulnerabilities than each of the previous two years , [Source: NPR, 2026-04] driven by Anthropic's Mythos Preview model finding high-severity vulnerabilities, including some in every major operating system and web browser . [Source: NPR, 2026-04] This is not a marginal improvement in vulnerability discovery—it represents a categorical shift in the speed and scale at which attack surfaces can be mapped.
Exploitation Timeline Collapse: 2018-2026
Median time from vulnerability disclosure to first observed exploit (days)
Source: Repello AI, Blastwave, March 2026