Cyber insurers consider limiting payouts for breaches exploiting unpatched CVEs
Summary
Hide â˛
Show âŧ
Cyber insurers are exploring ways to limit payouts for breaches that exploit unpatched vulnerabilities, potentially introducing CVE exclusions into policies. This approach aims to hold policyholders accountable for outdated security practices. The move comes amid a growing number of disclosed vulnerabilities and increasing demand for cyber insurance. The insurance industry is grappling with how to manage risk effectively while supporting policyholders during cyber incidents. Some insurers are moving towards more tailored, advisory roles, assessing cybersecurity postures and suggesting solutions. Policyholders are advised to review their policies for CVE exclusion clauses and work with experienced brokers to avoid such terms.
Timeline
-
22.08.2025 16:30 đ° 1 articles
Cyber insurers consider limiting payouts for breaches exploiting unpatched CVEs
Cyber insurers are testing new methods to limit payouts for breaches involving unpatched vulnerabilities, potentially introducing CVE exclusions into policies. This approach aims to hold policyholders accountable for outdated security practices. The move comes amid a growing number of disclosed vulnerabilities and increasing demand for cyber insurance. The insurance industry is grappling with how to manage risk effectively while supporting policyholders during cyber incidents. Some insurers are moving towards more tailored, advisory roles, assessing cybersecurity postures and suggesting solutions. Policyholders are advised to review their policies for CVE exclusion clauses and work with experienced brokers to avoid such terms.
Show sources
- Insurers May Limit Payments in Cases of Unpatched CVEs â www.darkreading.com â 22.08.2025 16:30
Information Snippets
-
Cyber insurers are testing new methods to limit payouts for breaches involving unpatched vulnerabilities.
First reported: 22.08.2025 16:30đ° 1 source, 1 articleShow sources
- Insurers May Limit Payments in Cases of Unpatched CVEs â www.darkreading.com â 22.08.2025 16:30
-
CVE exclusions are a potential risk-limiting approach, though not yet widely adopted.
First reported: 22.08.2025 16:30đ° 1 source, 1 articleShow sources
- Insurers May Limit Payments in Cases of Unpatched CVEs â www.darkreading.com â 22.08.2025 16:30
-
The National Vulnerability Database (NVD) predicts over 46,000 vulnerabilities in 2025, with 30% being high or critical severity.
First reported: 22.08.2025 16:30đ° 1 source, 1 articleShow sources
- Insurers May Limit Payments in Cases of Unpatched CVEs â www.darkreading.com â 22.08.2025 16:30
-
Cyber insurers are shifting towards more advisory roles, assessing cybersecurity postures and offering tailored solutions.
First reported: 22.08.2025 16:30đ° 1 source, 1 articleShow sources
- Insurers May Limit Payments in Cases of Unpatched CVEs â www.darkreading.com â 22.08.2025 16:30
-
Policyholders are advised to review their policies for CVE exclusion clauses and consult with experienced brokers.
First reported: 22.08.2025 16:30đ° 1 source, 1 articleShow sources
- Insurers May Limit Payments in Cases of Unpatched CVEs â www.darkreading.com â 22.08.2025 16:30
Similar Happenings
Chinese State-Sponsored Actors Compromise Global Critical Infrastructure Networks
Chinese state-sponsored Advanced Persistent Threat (APT) actors, specifically the group known as Salt Typhoon, have been conducting a sustained campaign to gain long-term access to critical infrastructure networks worldwide. This campaign targets telecommunications, transportation, lodging, and military networks, exploiting vulnerabilities in routers and taking steps to evade detection and maintain persistent access. The Cybersecurity and Infrastructure Security Agency (CISA), in coordination with the National Security Agency (NSA), Federal Bureau of Investigation (FBI), and international partners, released a joint advisory detailing this ongoing malicious activity. The advisory provides actionable guidance and intelligence to help organizations defend against these sophisticated cyber threats. The advisory builds on previous reporting and incorporates updated threat intelligence from investigations conducted through August 2025, reflecting overlapping indicators with industry reporting on various Chinese state-sponsored threat groups. Salt Typhoon has been active since at least 2019, targeting at least 600 organizations, including 200 in the U.S., and 80 countries. The Czech Republic's National Cyber and Information Security Agency (NUKIB) issued a warning about data transfers to China, highlighting concerns over the transfer of system and user data to the PRC and the remote administration of technical assets. The Czech government previously accused China of targeting its critical infrastructure through APT 31, which began in 2022. China's offensive cyber activities include large-scale telco attacks by Salt Typhoon and positioning for potential destructive cyberattacks. The advisory tracks this cluster of activity to multiple advanced persistent threats (APTs), though it partially overlaps with Salt Typhoon. The advisory details how state-backed threat actors, including Salt Typhoon, penetrate networks around the world, as well as how defenders can protect their own environments. The Czech Republic's National Cyber and Information Security Agency (NUKIB) has assessed the risk of significant disruptions caused by China at a 'High' level, indicating a high probability of occurrence. NUKIB confirmed malicious activities of Chinese cyber-actors targeting the Czech Republic, including a recent APT31 campaign targeting the Czech Ministry of Foreign Affairs. The Chinese government has access to data stored by private cloud service providers within the Czech Republic, ensuring that sensitive data is always within its reach. NUKIB warns about consumer devices, such as smartphones, IP cameras, electric cars, large language models, and even medical devices and photovoltaic converters manufactured by Chinese firms, as risky devices that can transfer potentially sensitive data to Chinese infrastructure. 45 previously unreported domains associated with Salt Typhoon and UNC4841 have been discovered, with the oldest domain registration activity dating back to May 2020.