Key Takeaways

  • CISOs still can’t answer the only question that matters: Is this exposure exploitable on this asset, in our production environment, against our controls, right now?
  • The vulnerability firehose broke the old model: With 48,177 CVEs published in 2025, “critical” lists are too large to fix, so the real job is separating actionable risk from noise.
  • Most programs run on probability, not proof: Version-to-CVE mapping and CVSS-heavy prioritization produce “likely important” work, but don’t confirm reachability, exploitability, or control effectiveness in production.
  • That mismatch wastes scarce engineering cycles: Teams patch issues that can’t be exploited, argue over scores, and still miss real, reachable attack paths that persist in the backlog.
  • ETM 2.0 closes the certainty gap with validation at scale: TruConfirm, embedded in Qualys ETM, provides agent-led, production-safe exploit validation, and Agent Val orchestrates what to validate next, then turns confirmed results into TruRisk-driven actions inside the Risk Operations Center.

The Question CISOs Cannot Answer Today

The scan is done. Dashboards are full. Change windows are tight. And one critical question dominates every vulnerability review: “Is this exposure actually exploitable on our asset, in our production environment,with our controls, right now?”

Volume is no longer an anomaly. In 2025, a staggering 48,177 CVEs were published. Most organizations now face thousands – often tens of thousands – of vulnerabilities labeled as “critical.” No security team has the resources to fix all of them. The real challenge is deciding which risks actually require action – and which are already mitigated by existing controls or simply not exploitable.

Most programs can inventory vulnerabilities and assign severity. Far fewer can answer the question CISOs actually care about: which of these will work against us – and which we can safely deprioritize.

Qualys TRU analysis shows that only 1% of reported CVEs are ever weaponized, yet remediation effort continues to be spread across the remaining 99%. High scores still dominate decision-making, even though severity does not equal exploitability, and theoretical risk continues to consume real engineering time and budget.

Attackers do not exploit CVEs. They exploit reachable code paths in live environments. They test whether a service is exposed, whether authentication can be bypassed, and whether deployed controls actually stop execution. Until exploitability is proven, teams debate, patch broadly, debate endlessly, and still miss the paths that matter most. This is not a visibility problem. It is a certainty problem.

The Certainty Problem in Modern Vulnerability Management

Most vulnerability programs still rely on a fragile chain of static signals rather than evidence – a software version maps to a CVE, a score implies likelihood, a ticket implies risk reduction. That logic collapses on an enterprise scale. 

Even “risk-based prioritization” remains probabilistic. It helps narrow the focus, but it still produces a list of theoretically important risks, not proof that any exposures are actually exploitable or not already mitigated in production. At scale, no amount of prioritization can resolve risk on its own because prioritization ranks assumptions, while production environments demand proof. 

  • “Potentially vulnerable” becomes the unit of work. Version-based detection answers “is the component present?” It does not answer “can an attacker reach and exploit it in our environment?”Presence, reachability, exploitability, and control effectiveness are treated as the same problem, even though they are not.
  • Scores flatten reality. CVSS and other scoring models summarize probabilities and emphasizetheoretical scores that may not be relevant to every organization. They cannot account for network routes, authentication state, runtime behavior, compensating controls, or deployment drift across clusters and clouds. A high score often triggers urgency, but still leaves teams guessing whether the exposure can succeed in their environment.
  • Controls stay unverified. Scanners and scoring engines rarely validate whether WAF rules, firewall policies, segmentation, or EDR already block exploitation. Scanning alone can identify what exists, but it cannot determine which exposures will actually succeed against production assets and deployed controls. Scanning can identify what exists, but it cannot determine which risks are already mitigated versus which remain actionable.
  • Breach and Attack Simulation (BAS) and attack path tools attempt to close this gap, but they often rely on simulated conditions, pre-determined paths, or non-production environments. In practice, they add tools, integrations, and operational overhead without delivering evidence-based validation of exploitability in live production systems.

The result is predictable. Teams waste scarce remediation resources fixing issues that cannot be exploited, while quieter but real exposures remain buried in the backlog. Engineering fatigue sets in. MTTR slows as teams debate what is “real.” Reprioritization becomes constant. And the risks that attackers can actually exploit persist.

When exploit speed outpaces decision speed, theoretical prioritization breaks down.

Introducing TruConfirm: Agent-led, Safe Exploit Validation, Powered By Proof

ETM 2.0 introduces an agent-led risk operations model that shifts exposure management from risk theory to validated risk execution.

TruConfirm, an exposure validation service natively embedded in Qualys ETM, provides deterministic, production-safe evidence that shows whether an exposure can be exploited or is already blocked by existing controls. Agent Val continuously decides which high-risk exposures to validate next, safely orchestrates validation in production, and turns confirmed results into action inside the Risk Operations Center.

Agent Val becomes the central orchestration layer for exploit validation, continuously deciding what to validate, safely orchestrating TruConfirm execution, and driving confirmed results directly into risk operations. TruConfirm extends ETM with production-safe, evidence-based exploit validation.

Together, TruConfirm & Agent Val deliver “ground truth” by proving whether an exploit path executes – or is blocked – on real assets, against real security controls, in an organization’s live production environment. This proof is what enables ETM to move from theoretical prioritization to evidence-driven, continuously executed risk reduction, without adding tools, agents, or operational friction.

  1. Production-safe, deterministic validation – Teams relying on version-based scanners or traditional Breach and Attack Simulation (BAS) tools are often forced to work from assumptions. BAS tools typically run on golden images or simulated attack paths that rarely reflect the complexity of real production environments. Orchestrated by Agent Val, TruConfirm performs active validation directly on live assets. It uses a safety-first architecture with pre-tested, benign payloads including cryptographic proof-of-execution and silent out-of-band callbacks. This confirms exploitability without disrupting operations, installing agents, or exposing sensitive data. With validation tightly coupled to ETM’s risk model, results are immediately actionable.
  2. Validation that directly drives ETM risk decisions – TruConfirm is a core service within ETM’s risk engine. ETM aggregates asset and exposure data from Qualys and third-party sources. Using ETM’s risk context (threat intelligence, business context, and control awareness), Agent Val identifies high-risk exposures and orchestrates TruConfirm to validate whether they are truly exploitable.

    Once exploitability is confirmed, ETM automatically amplifies the associated TruRisk™ score, generates risk-reduction recommendations tied to specific assets, business entities, and attacker activity, including ransomware-linked and CISA KEV exposures. 

    ETM then verifies outcomes and feeds results back into Agent Val, enabling continuous prioritization, faster mobilization, and verified TruRisk reduction within a single operating model.

  3. Evidence-based validation of security control effectiveness – Many tools return a binary verdict: exploitable or not. TruConfirm goes further by capturing evidence that explains why an exploit attempt succeeded or failed. When validation is blocked, ETM records the exact defensive layer responsible, such as a WAF rule, firewall policy, network segmentation control, or EDR. When exploit paths are open, results flow directly into ETM workflows as prioritized tasks and mitigation plans. Teams can mobilize faster, reduce CAB friction with proof, and track projected TruRisk reduction tied to planned and completed actions.

Agent Val: Operationalizing Continuous Validation

Agent Val, a purpose-built agent available through the Agent Marketplace, operationalizes TruConfirm workflows end to end, deciding what to validate, executing TruConfirm safely, and translating proof into action inside ETM. Agent Val ensures continuous validation so exploitable exposures are never left untested in your environment.

Built on TruConfirm and embedded within Enterprise TruRisk Management (ETM), Agent Val intelligently determines what to validate next based on business entities, asset criticality, exposure type, and attacker relevance, including ransomware and CISA KEV. It safely orchestrates production validation using attacker techniques, while exploit execution remains deterministic and non-agentic to preserve trust and control.

Validation outcomes clearly separate exploitable paths from those blocked by existing controls, suppressing noise and reducing remediation churn. Confirmed exploitability feeds directly into ETM, generating next-best actions such as notifications, tasks, and mitigation plans.

The result is fewer tools, less manual effort, faster remediation, and measurable risk reduction driven by evidence, not assumptions.

The Operational Impact – From Millions of Findings to the Few That Matter

ETM integrates TruConfirm into how vulnerability and risk teams already operate:

  • Builds on the existing Qualys sensor footprint – No new sensors or architectural redesign
  • Unified exposure backlog – ETM aggregates Qualys and third-party signals; TruConfirm validates within that backlog
  • Focused validation – ETM targets weaponized, high-impact exposures that truly increase incident likelihood
  • Evidence capture – Confirms exploitation or documents effective controls
  • Risk elevation and mobilization – Validated risks flow into ETM workflows for prioritized action
  • Closed-loop remediation – ETM orchestrates fixes and verifies outcomes

Download the whitepaper to learn how Qualys ETM uses validation to close real attack paths.


CTEM Needs Validation – Qualys ETM Delivers It

CTEM does not succeed on prioritization alone. Validation is a required phase.

With TruConfirm embedded inside Qualys Enterprise TruRisk Management, ETM operationalizes all five CTEM phases – discovery, scoping, prioritization, validation, and mobilization – within a single, unified Risk Operations Center. This is what turns exposure management from measuring risk into eliminating real attack paths with evidence.

Prioritization is not enough. ETM narrows exposure at each stage – from raw findings to validated exploitability.

How TruConfirm Confirms Real-World Exploitability

Attackers focus on execution. ETM uses TruConfirm’s multi-modal validation methods to substantiate exploit paths using the least risky interaction that still produces defensible proof. No single method fits every exploit pattern – some yield outputs while others are intentionally blind. TruConfirm uses the least risky interaction that still provides defensible evidence.

Direct Response Validation Sends a benign payload and evaluates execution for auditable proof.
Cryptographic Execution Proof Uses unique hashes to mathematically confirm code execution, eliminating spoofing.
Out-of-Band Confirmation Validates blind exploits via controlled callbacks— if a response is received, it’s exploitable; if absent, it’s not.

Coverage That Matches the Modern Attack Surface

TruConfirm substantiates exploitability in areas where attackers are most active – web stacks, enterprise apps, network edge, cloud environments, and Internet of Things (IoT) devices. It focuses validation on 1,600+ weaponized CVEs, covering the threats that actually matter. Given that very few published CVEs are ever exploited in the wild, our coverage targets the attacks most likely to hit your environment, not the majority that never will. 

A Shift in Risk Operations: From “We Think” to “We Know”

Most exposure programs tend to plateau at the reporting stage, often delivering basic counts, trends, and visual heatmaps without demonstrating tangible reductions in risk. This reflects a maturity curve that transitions from merely measuring exposure to actively eliminating paths that attackers could exploit.

TruConfirm advances this maturity curve by transforming exploitability assessments into concrete evidence. Instead of relying on probabilistic assessments like “What if,” it enables organizations to operate with confidence, using validated data that ties directly to their assets. This information is actionable for change control and incident prevention, thus enhancing operational certainty.

Such clarity serves as a powerful control mechanism, reducing unnecessary debate, streamlining prioritization cycles, and allowing ROC teams to work from a unified source of truth rather than competing viewpoints.

The End of Vulnerability Guesswork

The industry must move beyond assumptions. The volume of threats is increasing, exploit timelines are shortening, and the term “critical” has become little more than a label rather than a decision-making tool. It’s imperative that proof becomes the standard for managing exposure.

Proof enables three vital advantages probability cannot match: (1) a defensible answer to the question of “is this exploitable now?”, (2) faster action by removing the need for debate, and (3) evidence artifacts that withstand audit, change control reviews, and board reporting. 

This is why TruConfirm is a game-changer. By incorporating automated exploit validation into Enterprise TruRisk Management, TruConfirm empowers risk operations to prioritize actions based on the actual threat landscape – focusing on execution and reachable paths rather than relying on conjecture. 

Qualys ETM is available now. TruConfirm is delivered as a core capability within ETM and is planned to be generally available by H1 2026.

Qualys ETM

Request Demo



Source link