Home
Blog
How long do exploits last? Are your patches fast enough?

How long do exploits last? Are your patches fast enough?

Paul Ducklin
08/18/2025
Share this article:

Patch early, patch often

Remember the WannaCry virus, which took the world by surprise just over eight years ago?

Very swiftly summarized, the story goes something like this:

  • The US National Security Agency (NSA) maintained a set of undisclosed vulnerabilities, gambling that if it kept them secret and exploited them carefully, it would be able to obtain cyberintelligence against a wide range of targets without leaking the details of the vulnerability and thus inviting revenge attacks by the very state-sponsored actors or cybercrime groups it was targeting.
  • Hackers going by ShadowBrokers somehow compromised and stole some or all of the NSA’s exploit collection some time in 2016, including a Windows networking vulnerability known as ETERNALBLUE. Microsoft became aware of this bug, among others, and quietly patched against it in the March 2017 Patch Tuesday. Sysadmins who updated promptly therefore immunized themselves against future abuse of this vulnerability.
  • Having failed to acquire a buyer for the stolen attack tools for several months, ShadowBrokers presumably inferred that the appearance of patches meant that vendors had been alerted by the NSA and thus that the vulnerabilities now had no darkweb value at all. In April 20217, they dumped the stolen exploits for anyone to use, by publishing the decryption key for a password-protected archive file originally released in 2016.
  • In May 2017, a ransomware strain called WannaCry appeared, not merely scrambling computers it attacked, but exploiting ETERNALBLUE to spread itself automatically on and between Windows networks.

Good news and bad news

By very good fortune, a British cybersecurity researcher spotted an as-yet-unregistered internet domain name that the virus code tried to contact, and quickly registered it, hoping to prevent the attackers from using it later on as a command-and-control channel to implant new malware, a common malware scenario then and now.

(Controlling a malware domain and thereby actively capturing any call-home activity can also provide actionable insight into the prevalence and distribution of that malware.)

In fact, this special domain name had been coded into the worm as an emergency “kill switch,” perhaps so that the worm operators could turn the malware off abruptly if it spread so far and fast that it backfired and started harming the attackers themselves.

The fortuitous activation of the kill switch certainly made the damage done by WannaCry much less dramatic that it would otherwise have been, but even in the short time window during which it was able to spread unnoticed and unregulated, it is estimated to have hit more than 200,000 computers across the globe.

The British National Health Service (NHS), one of the world’s biggest employers, was particularly badly hit, with non-emergency health care affected; other victims apparently included the German railway network, French automotive factories, Spanish telecommunications companies, and service stations in China.

The malware outbreak, and the risk of subsequent attacks using the same exploit, was sufficiently severe that Microsoft followed up its Patch Tuesday updates by publicly releasing patches for old, out-of-support Windows versions, including Windows XP.

How long is too long?

Even eight years ago, you might have hoped that IT teams with any sense of malware history and cybersecurity risk would make sure they rolled out patches for critical remote code execution (RCE) vulnerabilities within two months.

Unauthenticated RCE bugs that work at the network packet level – such that almost any user within “network reach” of an at-risk computer can trigger the bug without needing to login or to show their hand first – are well-known to be high-risk vulnerabilities.


If you’re a LinkedIn user and you’re not yet following @SolCyber, do so now to keep up with the delightfully useful Amos The Armadillo’s Almanac series. SolCyber’s lovable mascot Amos provides regular, amusing, and easy-to-digest explanations of cybersecurity jargon, from MiTMs and IDSes to DDoSes and RCEs.

How long do exploits last? Are your patches fast enough? - SolCyber

Even if you know all the jargon yourself, Amos will help you explain it to colleagues, friends, and family in an unpretentious, unintimidating way.


Anyone who has read anything about super-quick network spreading malware of the past, such the Morris worm of 1998 or the Slammer worm of 2003, will know that unauthenticated network RCE bugs have frequently been associated not merely with intrusions, but with so-called wormable exploits.

A wormable exploit means that a system, once attacked, can automatically be turned against other vulnerable systems to spread the attack further, typically without further human intervention.

As it happens, self-spreading malware of this sort is unusual these days, not least because it generally draws more attention to itself than it needs to.

Wormified or not, however, unauthenticated network-based exploits that lead to RCE or to unauthorized access are still a favored vehicle for attackers, especially if the exploit exists in a device that is directly exposed to the internet on purpose, such as a web server, a VPN access point, or a network security firewall.

Don’t be a slowcoach

With this in mind, therefore, it’s disappointing to see articles such as a recently-updated warning from the Dutch National Cyber Security Center (NCSC) about attacks involving various vulnerabilities in Citrix NetScaler products that were identified and patched back in June 2025.

Reports suggest that the security holes CVE-2025-5777 and CVE-2025-6543 can be used against NetScaler ADC and NetScaler Gateway products as a stepping stone to break into unpatched networks.

Between them, these vulnerabilities apparently allow unauthenticated outsiders to steal existing authentication credentials and to run untrusted code without any credentials.

This is a considerable security risk given that NetScaler Gateway devices are meant to be exposed to the internet, and may even act as a primary access control mechanism (a VPN, or virtual private network), the first port of call, for remote users.

It’s fair to criticize vendors for having bugs of this sort in the first place.

But be careful that your own customers don’t get a chance to criticize you in turn if you’re still vulnerable long after the vendor has disclosed, warned you about, and patched security holes of this sort.

What to do?

The lessons from this anecdote are simple:

  • Two months was too long to put off critical patches in 2017. It’s too long today. Patch early, patch often, as Amos advises above. Being attacked by a zero-day bug that no one knew about before the attack happened is bad enough; being compromised with an exploit that you could have neutralized weeks or even months ago is much worse.
  • You can’t patch it if you don’t know it’s there. Knowing which software components and hardware devices you are using in your business is vital, whether they are locally hosted, outsourced, or hosted in the cloud. If you’re not keeping track of your hardware, software, and patches, rest assured that state-sponsored attackers and cybercriminals are doing it for you. Some criminals seek out vulnerable systems to exploit directly themselves; others, known as Initial Access Brokers, deliberately stockpile lists of vulnerable systems to sell on to other attackers on the dark web.

How long do exploits last? Are your patches fast enough? - SolCyber

  • Don’t keep using it if it can’t be patched. Both the WannaCry and the NetScaler bugs applied to old systems that were long out of support, and therefore no longer receiving security updates, yet were still being used and exposed to the internet. Network-facing systems for which a known exploit exists but will never be patched remain actively vulnerable forever.
  • You don’t have to do it all yourself. Sign up with a specialist cybersecurity provider such as SolCyber, and free yourself to focus on your own business specialty, so you’re not diverting your own staff onto a reactive cybersecurity treadmill. Let SolCyber take care of the technical issues of threat detection and threat response, as well as the human-centered issues of how to improve your own security culture.

Why not ask how SolCyber can help you do cybersecurity in the most human-friendly way? Don’t get stuck behind an ever-expanding convoy of security tools that leave you at the whim of policies and procedures that are dictated by the tools, even though they don’t suit your IT team, your colleagues, or your customers!

How long do exploits last? Are your patches fast enough? - SolCyber


More About Duck


Paul Ducklin is a respected expert with more than 30 years of experience as a programmer, reverser, researcher and educator in the cybersecurity industry. Duck, as he is known, is also a globally respected writer, presenter and podcaster with an unmatched knack for explaining even the most complex technical issues in plain English. Read, learn, enjoy!

Paul Ducklin
Paul Ducklin
08/18/2025
Share this article:

Table of contents:

The world doesn’t need another traditional MSSP 
or MDR or XDR.

What it requires is practicality and reason.

Related articles

Choose identity-first managed security.

We start with identity and end with transparency — protecting where attacks begin and keeping you informed, with as much visibility as you want. No black boxes, just clear, expert-driven security.
No more paying for useless bells and whistles.
No more time wasted on endless security alerts.
No more juggling multiple technologies and contracts.

Follow us!

Subscribe

Join our newsletter to stay up to date on features and releases.

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

©
2025
SolCyber. All rights reserved
|
Made with
by
Jason Pittock

I am interested in
SolCyber XDR++™

I am interested in
SolCyber MDR++™

I am interested in
SolCyber Extended Coverage™

I am interested in
SolCyber Foundational Coverage™

I am interested in a
Free Demo

12365