Cyber Insurers May Deny Claims for Unpatched Vulnerabilities

Published:

spot_img

Cyber Insurance Providers Raise Concerns Over Claim Exclusions

A growing number of cyber insurance providers are voicing their concerns regarding competitors that impose strict exclusions on claims tied to unpatched vulnerabilities. Coalition, a prominent cyber insurance firm, recently highlighted this issue in a LinkedIn post, revealing an increase in such exclusions, although they are not yet commonplace across the industry. Some insurers withhold payments for claims related to vulnerabilities that remain unaddressed for a pre-determined number of days. Others adopt a sliding scale approach, where payouts decrease the longer the vulnerabilities are left unpatched.

Understanding the Exclusions: Vulnerabilities and Claims

Coalition noted that a well-known U.S. insurer has a policy in place that denies coverage for losses arising from Common Vulnerabilities and Exposures (CVEs) boasting a Common Vulnerability Scoring System (CVSS) score greater than 8.0 if a patch has not been implemented within three weeks. Tiago Henriques, Chief Underwriting Officer at Coalition, addressed these practices by stating, “This logic might make sense if patching were simple and straightforward. But in reality, vulnerability management is complicated and convoluted, even for businesses with sophisticated security teams.”

The Landscape of Cyber Vulnerabilities

Examining the data associated with the CVSS 8.0 patching exclusions, Coalition revealed a staggering statistic: as of July 2025, there will be more than 61,000 vulnerabilities that fall under this exclusion. Notably, only a fraction—around 1%—of these vulnerabilities are catalogued in the Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities (KEV) database. With over 40,000 new vulnerabilities appearing each year, Henriques pointed out that companies face an unwinnable dilemma. They must either commit valuable resources to investigate thousands of unlikely vulnerabilities or invest in a cyber insurance policy that carries the risk of claim denial following a breach of an unpatched system.

Examples of Exclusion Policies in Action

While Coalition has chosen not to specify the insurers implementing these patch exclusions, they referenced Chubb as an example of a competitor with an approach that may disadvantage businesses lacking timely patch management. Chubb’s “Neglected Software Exploit Endorsement” considers policyholders’ compliance with security updates. According to Chubb, this endorsement grants a grace period of 45 days to patch published CVEs from the National Vulnerability Database. After this period, the risk is shared between the insurer and the policyholder. If the vulnerability remains unaddressed at the 45, 90, 180, or 365-day mark, the burden of risk progressively shifts to the policyholder.

A Proposal for Better Practices

In response to these challenges, Coalition advocates for a more balanced, risk-based approach to cyber insurance that includes technical support for policyholders. Their new Active Cyber Policy offers rewards for companies demonstrating good security practices. Coalition Security— the insurer’s dedicated security division—prioritizes threats similar to those exploited by ransomware attackers and informs policyholders about critical vulnerabilities. In 2024, Coalition reported issuing an average of 5.5 alerts each month, representing a mere 0.15% of all published vulnerabilities. Impressively, 90% of its policyholders received no alerts throughout the year, underscoring the targeted nature of their communications.

Coalition emphasizes, “If you receive a Coalition security alert, pay attention because it’s important,” reflecting a commitment to directing attention to the most urgent and high-impact threats that carry significant financial risks.

spot_img

Related articles

Recent articles

French Football Federation Reveals Data Breach Following Administrative Software Compromise

Stolen Credentials Lead to Major Data Breach in French Football The French Football Federation (FFF) has recently confirmed a significant cyber breach affecting club memberships...

Major Data Seizures at Medical Colleges: 9 States, 15 Locations Raided

New Delhi / Mumbai | November 28, 2025 ED Conducts Widespread Raids on Alleged Medical College Corruption On November 27, 2025, the Directorate of Enforcement (ED)...

Bank Held Accountable for Failing to Stop Unauthorized Transactions

Bengaluru | November 28, 2025 – The Additional District Consumer Commission in Bengaluru has mandated Canara Bank to reimburse ₹1,75,000 to BC Gayatri, a...

XDR: A Key Investment for SMB Cyber Resilience

Strengthening Cybersecurity: Emad Haffar's Perspective on SMB Protection The Changing Landscape for SMBs In an era where cyber threats are proliferating at an alarming rate, small...