Close

New Workspace Modernization Research from CDW

See how IT leaders are tackling workspace modernization opportunities and challenges.

Mar 17 2026
Security

Vulnerability Exploitability eXchange: Smarter Patching for State and Local IT Teams

VEX helps public-sector security teams prioritize repairs by identifying which vulnerabilities affect their systems.

State and local government IT teams face a constant flood of vulnerability alerts. With tens of thousands of new common vulnerabilities and exposures (CVEs)  published every year, security teams must decide which vulnerabilities require immediate remediation and which can wait. That prioritization challenge has become increasingly complex as software supply chains expand across cloud services, third-party libraries and open-source components.

The Vulnerability Exploitability eXchange aims to bring clarity to that process. By enabling software suppliers to communicate whether a vulnerability is exploitable in a specific product configuration, VEX helps IT teams reduce patching noise and focus on risks that truly matter.

Christopher “CRob” Robinson, CTO of the Open Source Security Foundation and director of security communications at Intel, says the core goal is simple: Help defenders cut through the noise.

“Effective vulnerability management is about addressing the most important issues,” Robinson says. “VEX fundamentally changes the focus from, ‘Is this component present?’ to, ‘Does this vulnerability truly affect the product?’”

Click the banner below to measure the success of vulnerability management.

 

What Is the Vulnerability Exploitability eXchange?

VEX is a standardized, machine-readable format that allows software suppliers to communicate exploitability status for known vulnerabilities affecting their products. Instead of simply listing all vulnerabilities tied to components, a VEX statement clarifies whether a vulnerability is:

  • Affected
  • Not affected
  • Fixed
  • Under investigation

This information can be consumed by automated tools, allowing vulnerability management platforms to determine whether an alert is relevant without requiring manual investigation.

The importance of automation becomes clear when considering the scale of the problem. Robinson notes that roughly 40,000 new CVEs are published annually, making manual vulnerability triage increasingly impractical.

By providing machine-readable exploitability data, VEX allows security teams to identify false positives programmatically and focus only on vulnerabilities that pose a real risk in their environment.

Why Do State and Local Governments Need VEX Now?

State and local government agencies face unique challenges when managing vulnerabilities. Many operate mixed environments that include legacy systems, commercial software, open-source components and cloud platforms — all with different patch cycles and security requirements.

Traditional vulnerability scoring systems such as the Common Vulnerability Scoring System can help estimate severity, but they do not always reflect real-world exploitability.

“CVSS measures theoretical severity, but it doesn’t account for whether a vulnerability is reachable or exploitable in a specific implementation,” Robinson says. “VEX complements CVSS by adding this critical layer of information about affectedness.”

Without that context, organizations can waste time chasing vulnerabilities that have little practical impact. Robinson points to an example involving common software libraries such as cURL, where vendors may receive large volumes of support requests for vulnerabilities that ultimately prove harmless in context.

VEX allows software suppliers to clarify that status upfront, preventing unnecessary investigation and reducing operational noise for security teams.

For government IT teams already operating with limited resources, this shift toward contextual vulnerability data can significantly improve prioritization and response times.

READ MORE: Consider whole-of-state cybersecurity as a smarter way to scale.

VEX and SBOM: How Do They Work Together for Supply Chain Security?

VEX becomes even more powerful when paired with a software bill of materials.

An SBOM provides a detailed inventory of the components and dependencies included in a software product. However, it does not indicate whether vulnerabilities tied to those components actually affect the final product.

Robinson describes the relationship this way: “Think of the SBOM as an inventory and VEX as a real-time, dynamic part of that inventory,” he says. “SBOM is a relatively static snapshot of components, while VEX information must stay live because vulnerability status changes over time.”

Together, the two tools allow defenders to combine supply chain visibility with exploitability intelligence. Security teams can see both what components exist and which vulnerabilities actually pose risk.

That data can then be integrated with other internal security inputs such as threat modeling, asset criticality and risk assessments.

“When VEX and SBOM join forces,” Robinson says, “you have a very precise picture of where your actual problems lie and when an alert is just a false positive.”

Can Prioritization With VEX Combat Alert Fatigue?

The ultimate goal of VEX is to help security teams move from reactive patching to risk-based vulnerability management.

Rather than treating every CVE alert as an urgent threat, organizations can prioritize remediation based on whether vulnerabilities are actually exploitable within their environment.

In practice, that means vulnerability data should flow automatically through security tooling, triggering responses only when necessary.

Robinson says that the ideal outcome is a security program that runs with quiet efficiency.

“A sign of a mature security program is boring reliability,” he says. “The goal is that vulnerability data flows seamlessly through the software supply chain graph, triggering the right actions without wasted manpower.”

For state and local agencies facing limited cybersecurity staffing, automation and precision are essential. VEX allows security teams to spend less time triaging alerts and more time addressing vulnerabilities that pose real risk.

DIVE DEEPER: AI-enhanced attacks call for greater vigilance.

What Steps Can Governments Take To Adopt VEX?

Adopting VEX does not require agencies to overhaul their entire vulnerability management program. Instead, organizations can begin incorporating exploitability intelligence through several practical steps.

1. Start with SBOM visibility.

Understanding what software components exist within systems is the first step toward applying exploitability context.

2. Ask suppliers about VEX.

CISOs should ask vendors whether they publish VEX statements and where those documents can be accessed. Robinson also recommends asking how vendors manage the “mismatched lifecycles” between static SBOM data and continuously evolving vulnerability information.

3. Evaluate vulnerability scanners.

Organizations should determine whether their scanning tools can ingest VEX statements and automatically reduce false positive alerts.

4. Understand the user experience.

Security teams should confirm their vulnerability management platforms can display VEX data alongside SBOMs and security advisories in a way that supports decision-making.

Robinson also notes that broader ecosystem improvements may be needed to accelerate adoption. One promising concept is a VEX discovery and distribution protocol — essentially a federated hub that would make it easier for organizations to locate and verify trusted VEX data.

“A centralized way to discover and share VEX information would improve consistency and help organizations take action more quickly,” Robinson says.

As software supply chains continue to grow more complex, vulnerability management will only become more challenging. By providing machine-readable exploitability intelligence, VEX offers state and local governments a practical way to reduce alert fatigue, prioritize remediation and strengthen their overall cybersecurity posture.

ljubaphoto/Getty Images