Context Over CVSS: Why Medium, Low, CVEs Matter More Than You Think

Executive Takeaway

In 2024, more than 33,000 CVEs were disclosed, an all‑time high, but only about 12% of those labeled “Critical” actually proved exploitable. Meanwhile, high‑profile exploit chains like Pegasus and Blastpass, and careless breaches like the Tea app hack, reveal that Medium‑ranked or poorly‑coded vulnerabilities, rather than CVSS labels, often lead to real attacker impact.

written by
Mahesh Babu
published on
August 22, 2025
topic
Vulnerabilities

The Data Landscape

The latest severity breakdown from NVD shows that in 2024, 14% of CVEs were Critical, 34% High, 50% Medium, and 2% Low, meaning the majority of exposure lies in categories commonly overlooked. Audits confirm this imbalance: in one case, 88% of Critical‑labeled CVEs and 57% of those labeled High were overstated compared to real-world exploitability. The result? Researchers are focused on the wrong part of the vulnerability curve.

Medium and Low CVEs: The Attack Chain Enablers

Contain a reachable Medium CVE in production, and you have more to worry about than a Critical flaw locked behind off‑line code. Low‑scored bugs often don’t earn attention, yet they form the building bricks of impactful exploit chains. Real‑world data shows some Medium and Low CVEs are exploited more frequently than certain High‑scored ones, simply because attackers prioritize reachability and context—above severity metrics.

Case Examples from the Real-World Attack Scene

Pegasus / FORCEDENTRY – Attackers exploited a Medium-rated JBIG2-PDF flaw (CVE-2021-30860), combining it with Apple’s CoreGraphics and sandbox weaknesses to achieve zero-click remote code execution on iPhones. None of the individual CVEs were initially flagged as Critical, yet in concert they delivered one of the most sophisticated spyware attacks in recorded history.

Trident – An exploit chain composed of WebKit memory corruption, a kernel info leak, and kernel memory abuse (CVE-2016-4657, -4655, -4656) achieved persistent jailbreak-level access on iOS devices. Individually rated below Critical, together they bypassed every layer of device defense.

Blastpass – This zero-click exploit used a vulnerable Wallet pass (.pkpass) and an ImageIO buffer overflow (CVE-2023-41064, -41061). Though rated Medium/High, the chaining of these flaws enabled code execution, proving that running CVEs contextually matter far more than their CVSS score.

Tea app breach – A disturbing but non-CVSS example of “vibe-coding” gone wrong: Tea, a viral safety app, stored government-issued ID scans, selfies, and over 1.1 million private messages in an unsecured Firebase database. The app’s backend was left publicly open with no authentication or encryption, allowing attackers (and researchers) to scrape 72,000 images and 1.1 million intimate user messages, many focused on abuse, abortion, or infidelity, on 4chan and other public platforms. This breach highlights how negligent coding and immature development can create devastating outcomes, especially for vulnerable populations apnews.com+12medium.com+12businessinsider.com+12.

Why the Current System Keeps Failing

Critical severity labels create alert fatigue. Developers learn to tune out, especially when many “Criticals” aren’t practically exploitable. Meanwhile, CVEs pile up in NVD’s backlog without severity metadata, offering blind spots in triage workflows. CVSS remains a blunt instrument—useful for uniform scoring but limited in reflecting real-world exploitability or attack context.

A Clear Path Forward for Security Researchers

Shift focus from CVE labels to context: Is it exploitable? Reachable? Chainable? Validate Criticals before raising the alarm, they are often noise. Treat Medium, Low, and development oversights (like in Tea) as potential pivot points in the chain of compromise. Employ probability-based scoring like EPSS to balance severity with attack likelihood. 

Finally and most importantly, incorporate context from one’s own environment to understand true attack likelihood and consequently, risk.

Bottom Line

Severity labels mislead. What matters is whether a flaw, or poorly coded app, is actually exploitable in context. Pegasus, Trident, Blastpass, and the Tea breach all prove the same lesson: Medium and Low CVEs, or trivial backend misconfigurations, can cause real, impactful exploitation. Security must evolve from label-driven triage to attacker reality and system maturity.

References

  • Citizen Lab. (2021). FORCEDENTRY: NSO Group iMessage Zero-Click Exploit Captured in the Wild.
  • Citizen Lab. (2023). Blastpass: NSO Group iPhone Zero-Click Exploit.
  • TechRadar Pro. (2025, August 18). Security’s blind spot: The problem with taking CVE scores at face value.
  • Yahya, F. (2025). CVE trends (2023–2025): Volumes, severities, and threat evolution. LinkedIn.
  • Recorded Future. (2018, July 19). Exploring exploitation of Medium and Low CVSS score vulnerabilities.
  • VulnCheck. (2024, September 30). Danger is still lurking in the NVD backlog.
  • Tahir. (2025, July 26). Tea App Security Fail: Firebase Leak Reveals Driver’s Licenses & Selfies. Medium.
  • Tahir. (2025, three weeks ago). The Private Message Leak: Tea App Breach. Medium.
  • Security Bloggers Network. (2025, August 18). The Tea App Hack: How a “Safe” Space Leaked 13,000 ID Photos & 1.1M Messages.
  • Business Insider. (2025, July 28). Tea App Private Messages Were Exposed in a Recent Breach.
  • The Verge. (2025, three weeks ago). Women’s “red flag” app Tea is a privacy nightmare.

Blog written by

Mahesh Babu

Head of Marketing

More blogs

View all

Vulnerability Alert: S1ngularity – Malicious Nx npm Packages

A malicious actor published tainted Nx releases to npm on August 26–27, 2025, inserting a postinstall payload that harvested secrets, stole GitHub/npm tokens, and exfiltrated them through new GitHub repositories created inside victim accounts. This is an active supply-chain attack with the potential to cascade from compromised developer endpoints into source control, CI/CD, and production.

August 28, 2025

License Compliance: A Legacy Problem, Reimagined with Runtime

License compliance is one of the oldest disciplines in application security. For more than two decades, organizations have relied on Software Composition Analysis (SCA) tools to identify copy-left licenses, produce audit trails, and reduce legal risk. Kodem’s new license enforcement capability represents the first real breakthrough in years.

August 26, 2025

Circumventing Security in Claude Code: Misconfiguration and Denial-of-Service

Kodem recently identified two security issues in Claude Code: a misconfiguration allowing circumvention of user approval and a subsequent Denial-of-Service (DoS) condition.

July 30, 2025

A Primer on Runtime Intelligence

See how Kodem's cutting-edge sensor technology revolutionizes application monitoring at the kernel level.

5.1k
Applications covered
1.1m
False positives eliminated
4.8k
Triage hours reduced

Platform Overview Video

Watch our short platform overview video to see how Kodem discovers real security risks in your code at runtime.

5.1k
Applications covered
1.1m
False positives eliminated
4.8k
Triage hours reduced

The State of the Application Security Workflow

This report aims to equip readers with actionable insights that can help future-proof their security programs. Kodem, the publisher of this report, purpose built a platform that bridges these gaps by unifying shift-left strategies with runtime monitoring and protection.

Get real-time insights across the full stack…code, containers, OS, and memory

Watch how Kodem’s runtime security platform detects and blocks attacks before they cause damage. No guesswork. Just precise, automated protection.

Stay up-to-date on Audit Nexus

A curated resource for the many updates to cybersecurity and AI risk regulations, frameworks, and standards.