Ransomware Threat Intelligence EPSS

Ransomware Triage: Using EPSS + KEV to Patch Before You're Breached

Ransomware operators move fast. They exploit known vulnerabilities within 48–72 hours of PoC release. Here's the predictive framework for patching what they'll use before they get there.

CVEasy AI Threat Research· February 22, 2026·9 min read
CVEasy AI, Ransomware defense

The 2024 Verizon DBIR found that vulnerability exploitation as an initial access vector grew 180% year-over-year, driven almost entirely by ransomware groups. The playbook is consistent: identify a high-value vulnerability, acquire or develop an exploit, and deploy at scale within days of PoC publication.

Your traditional patch cycle isn't designed for this tempo. A 30-day patch SLA looks reasonable on paper. Against a threat actor who starts exploiting a CVE 48 hours after the PoC drops, it's a guaranteed breach window.

The math is brutal: Ransomware groups exploit the average KEV-listed vulnerability within 4.4 days of public PoC availability (Mandiant, 2024). Your 30-day critical patch SLA provides zero protection against this timeline. You need to patch before the PoC drops, which means predicting what's going to be weaponized next.

How Ransomware Groups Select Targets

Understanding the attacker's prioritization logic helps you mirror it defensively. Ransomware operators are rational economic actors; they optimize for maximum impact with minimum effort. Their CVE selection criteria:

This selection criteria maps directly onto EPSS. EPSS is trained on actual observed exploitation, which means the CVEs ransomware groups find attractive tend to score highly on EPSS before they become KEV entries.

The Predictive Triage Stack

Layer 1: CVSS for Initial Scope

Use CVSS not as your final prioritization metric, but as a filter to reduce scope. Set a threshold, CVSS ≥ 6.0, or RCE/auth bypass specifically, and work within that space. This cuts your universe from 40,000 CVEs to a manageable few thousand without significant risk of missing critical issues.

Layer 2: EPSS for Predictive Exploitation Risk

Within your CVSS-filtered set, sort by EPSS descending. Anything with EPSS ≥ 0.5 (50% exploitation probability within 30 days) should enter an expedited triage lane. Anything ≥ 0.9 is effectively on fire, treat it as an incident response item, not a patch ticket.

Critical nuance: EPSS updates daily. A CVE that was EPSS 0.02 last week can jump to 0.85 overnight when a PoC drops. Monitoring EPSS delta, not just current value, gives you early warning before the KEV catalog confirms exploitation.

Layer 3: KEV as a Hard Override

Any CVE in the CISA KEV catalog is being actively exploited in the wild, confirmed. It doesn't matter where it ranks on CVSS or EPSS. KEV entries bypass your normal prioritization entirely and enter emergency response. Your target: triage within 4 hours, remediation plan within 24 hours, patch or compensating control within 72 hours.

Layer 4: Industry Context

Not all organizations are equally targeted. Ransomware groups specialize. LockBit and Cl0p have demonstrated consistent focus on healthcare and financial services. Volt Typhoon targets critical infrastructure. Your industry shapes which CVEs are most likely to be weaponized against your specific environment.

Ransomware Response Timeline by Signal Strength
Signal Target Triage Target Patch/Mitigate
KEV entry < 4 hours 72 hours
EPSS ≥ 0.9 < 24 hours 7 days
EPSS 0.5–0.9 < 48 hours 14 days
CVSS ≥ 7.0, EPSS < 0.5 Standard triage 30 days

The Pre-Exploitation Window: Your Actual Opportunity

The insight that transforms ransomware defense: there's a predictable window between CVE publication and active exploitation. EPSS identifies CVEs that are trending toward weaponization before the weapon is built.

A CVE that jumps from EPSS 0.01 to 0.40 in a week is a warning signal: the security research community is paying attention to it, PoC development is likely underway, and KEV listing may be days away. Patching during this window, before exploitation is confirmed, eliminates your exposure entirely.

This is why monitoring EPSS delta is more valuable than monitoring EPSS absolute value. You want to catch the rising curve, not confirm the explosion after it happens.

Compensating Controls When You Can't Patch

Not every critical vulnerability can be patched on an emergency timeline. VPN appliances, OT systems, legacy applications, and systems requiring maintenance windows create patch gaps. For these, compensating controls buy time:

CVEasy AI generates compensating control recommendations automatically alongside remediation runbooks. When a CVE is flagged as KEV or high-EPSS, the AI generates both a patch plan and an interim compensating control strategy, so your team has options regardless of patching constraints.

Building the Ransomware-Specific Queue

Operationally, implement a dedicated ransomware triage lane alongside your standard vulnerability queue:

  1. Filter your CVE inventory daily to: KEV = YES OR EPSS ≥ 0.5
  2. Apply industry-specific filters (healthcare: focus on VPN, RDP, remote access; finance: focus on web-facing applications and payment systems)
  3. Cross-reference against your asset inventory, a KEV CVE that doesn't affect any of your systems still needs to be confirmed and documented as not applicable
  4. Auto-escalate anything that moves: if EPSS jumps ≥ 0.3 in 7 days, pull it into the expedited lane regardless of absolute value
  5. Track resolution velocity separately, your ransomware response speed is a distinct capability from general patch management

Ransomware groups exploit speed asymmetry. They move faster than traditional patch programs. Correlated intelligence, EPSS + KEV + industry context, is how you move fast enough to defend against them.

Get Ahead of Ransomware Operators

EPSS + KEV + TRIS™ score, correlated intelligence that tells you what to patch before it's weaponized.