Cybersecurity is a battlefield, and the latest skirmish reveals the cracks in our defenses. Operation Lunar Peek, a cyberattack in November 2024, exposed the vulnerability of over 13,000 Palo Alto Networks management interfaces. Attackers gained root access, exploiting CVEs rated by two different scoring systems. These scores, under CVSS v4.0 and v3.1, failed to flag the potential for a chained attack, highlighting a critical flaw in vulnerability triage.
The CVSS Dilemma
CVSS, the Common Vulnerability Scoring System, is designed to assess individual vulnerabilities. But attackers don’t play by those rules. They chain vulnerabilities, bypassing the isolated scores that CVSS provides. The Palo Alto incident is a textbook case: CVE-2024-0012, an authentication bypass, paired with CVE-2024-9474, a privilege escalation. Separately, neither score triggered alarms. Together, they opened the door to a breach. Adam Meyers of CrowdStrike describes this oversight as a form of "operational amnesia," where each vulnerability is assessed in isolation, neglecting the bigger picture.
The Market Landscape
The cybersecurity landscape is evolving rapidly. According to CrowdStrike’s 2026 Global Threat Report, vulnerabilities exploited as zero-days have increased by 42% year-over-year. The average breakout time for intrusions is a mere 29 minutes, with the fastest recorded at 27 seconds. This speed leaves traditional patch cycles in the dust. Nation-state actors, like those in China, weaponize vulnerabilities within days of patch releases, turning routine maintenance into potential disaster zones.
Implications for the Industry
For engineers and security directors, this is a call to action. The traditional reliance on CVSS base scores is outdated. As Peter Chronis, former CISO of Paramount, noted, real-world context is crucial. His shift away from CVSS-first prioritization reduced critical vulnerabilities by 90%. Organizations must adopt more comprehensive models like FIRST’s EPSS and CISA’s SSVC, which incorporate exploitation probability and decision-tree logic.
Security teams face an overwhelming volume of vulnerabilities. Jerry Gamblin of Cisco projects 70,135 CVEs for 2026, a 263% increase since 2020. This surge strains the infrastructure behind scoring systems, with NIST now prioritizing only federal critical software. The sheer volume risks overwhelming even the most robust patch pipelines.
What Comes Next
The path forward requires a strategic overhaul. Security directors should conduct chain-dependency audits, compress patch SLAs, and integrate identity-surface controls into vulnerability management. Stress-testing pipeline capacity against projected CVE volumes will be essential. With frontier AI accelerating vulnerability discovery, the pressure on defenses will only increase.
The cybersecurity landscape is shifting, and the stakes have never been higher. As adversaries evolve, so must our defenses. The time to act is now, before the next breach forces our hand. For more on Palo Alto Networks and their offerings, visit their website.




















