Industry Analysis

The 2024 End-of-Year Vulnerability Disclosure Report

A look back at vulnerability disclosure in 2024: counts, severity distribution, time-to-patch, and the handful of incidents that shifted practice. Numbers, not narrative.

Nayan Dey
Senior Security Engineer
6 min read

Every year produces roughly the same shape of vulnerability year-in-review writeups — total CVE counts, notable incidents, new attack classes — and the summaries blur together because most years have a similar statistical signature. 2024 is different in two specific ways worth calling out before the usual year-end aggregation: the total CVE count crossed historical records by a visible margin, and two specific incidents (XZ Utils, CrowdStrike Falcon sensor) shifted operational practice across the industry in ways that will persist well into 2025. The rest of 2024 was, by the numbers, a continuation of existing trends rather than a break from them. This post is the numeric side of the year-end story, with practitioner-relevant interpretation rather than hype.

What does the 2024 CVE total actually look like?

CVE issuance in 2024 crossed 40,000 published IDs, a new annual record. Month-over-month, 2024 ran roughly 15–20% higher than 2023, which was itself a record year. The growth is driven less by a surge in new vulnerability classes and more by expanded researcher engagement, broader CNA participation (the number of organizations empowered to assign CVE IDs continued to grow), and retroactive issuance of IDs for older findings as programs matured.

Interpretation: the raw count is not a great risk signal by itself. A more useful metric is the count of KEV (Known Exploited Vulnerabilities) additions per month, which ran at roughly 12–15 per month through 2024 — up modestly from 2023 but not a step change.

What was the severity distribution?

Roughly in line with multi-year trends:

  • Critical (CVSS 9.0+): ~10% of total
  • High (7.0–8.9): ~35%
  • Medium (4.0–6.9): ~40%
  • Low (0.1–3.9): ~15%

The critical percentage moved slightly upward from 2023 but within historical noise. What shifted noticeably was the distribution of critical findings by category: network-edge devices (firewalls, VPN appliances, remote access gateways) captured a disproportionate share of criticals, consistent with ongoing attacker focus on public-edge infrastructure.

Which vulnerability classes grew fastest?

Three categories grew materially faster than the overall trend:

Authentication and authorization bypasses. Especially on identity providers and SSO integrations. The growth here reflects attacker focus on identity infrastructure as the highest-leverage target in modern environments.

Supply chain / build pipeline vulnerabilities. Findings in CI/CD platforms, build tools, and package registries grew, reflecting both increased researcher attention and genuine architectural exposure.

AI/ML infrastructure vulnerabilities. A new category effectively, with findings in model-serving platforms, inference APIs, and ML orchestration tools. Total volume still small but the year-over-year growth rate is the largest of any tracked category.

What was time-to-patch like?

Vendor patch release times remained stubbornly uneven. Two data points:

  • Critical vulnerabilities with KEV inclusion: median time from disclosure to patch was around 14 days, with long tails extending to 60+ days for some vendors. Edge-device vendors specifically had notable latencies.
  • Non-KEV critical vulnerabilities: median ~30 days, long tails much longer.

Customer time-to-patch (from vendor release to deployment in customer environments) was the more persistent problem. KEV-listed critical vulnerabilities still showed deployment medians measured in weeks rather than days in most enterprise environments. The CISA BOD 22-01 directive for federal agencies continues to drive federal time-to-patch down, but the commercial long tail remains slow.

What were the incidents that actually shifted practice?

Three that produced durable operational changes:

XZ Utils backdoor (March 2024). The multi-year social engineering attack on the XZ Utils maintainer that inserted a backdoor into liblzma before being caught reshaped the industry conversation about open source maintainer trust. The specific effect: serious investment in maintainer-identity signals, social-engineering-aware supply chain threat modeling, and a renewed push for reproducible builds.

CrowdStrike Falcon sensor global outage (July 2024). Not a vulnerability in the classical sense but a supply chain reliability incident with massive blast radius (estimated 8.5 million Windows devices affected). The effect on practice: increased scrutiny on kernel-level agent deployment, phased rollout policies for security agents, and vendor change management expectations.

Ivanti Connect Secure cascade (January–April 2024). Multiple serious vulnerabilities in Ivanti edge appliances exploited in sequence. The effect: edge-device vendor consolidation conversations, renewed interest in agentless alternatives, and tighter EDR-on-edge policies.

What does KEV data tell us about 2024?

The KEV catalog grew to over 1,200 entries by year-end, with ~200 added during 2024. The composition is notable:

  • Edge devices still dominate KEV additions (firewalls, VPN appliances, remote access).
  • Legacy enterprise software (enterprise Java applications, older versions of shipped enterprise products) continues to generate KEV entries years after disclosure, indicating persistent long-tail exposure.
  • Browser and OS vulnerabilities make up a smaller portion of KEV than the raw CVE population — reflecting that browsers and major OSes have active disclosure-to-patch-to-deploy pipelines that keep exploitation windows short.

Operationally, KEV continues to be the highest-signal vulnerability catalog available. If your program can't prioritize using full CVE data, KEV is the fallback that still produces defensible triage.

What should 2025 programs be reading into the 2024 numbers?

Four practical reads:

  1. Expect CVE volume to continue growing. Plan triage capacity and tooling for 45,000+ annual issuance in 2025.
  2. Edge-device vulnerability fatigue is real. If your program is still treating each new edge-device zero-day as an exception, restructure. This is the baseline now.
  3. Supply chain and AI/ML categories will keep growing as a share of findings. Tooling that does not cover them has a growing blind spot.
  4. Time-to-deploy is still the bottleneck. The work of 2025 is less about finding more and more about patching faster on the ones that matter.

How Safeguard Helps

Safeguard ingests the full CVE feed, KEV, EPSS, and vendor advisory streams and correlates them with the reachability graph of your applications so the triage output is "these 12 CVEs matter for you" rather than "here are 2,000 findings." Griffin AI summarizes year-over-year trend data for your specific dependency footprint, not the industry aggregate, so executive reporting reflects your actual exposure. Policy gates can enforce time-to-patch SLAs at PR and deploy time, closing the deploy-latency gap that the aggregate numbers show is the real bottleneck. For security leaders whose programs are scaling against a growing CVE volume, Safeguard compresses the triage surface and makes the patch-velocity metric the one that gets optimized.

Never miss an update

Weekly insights on software supply chain security, delivered to your inbox.