In embedded products, patching every CVE often isn’t realistic due to certification, long test cycles, limited update windows, or system stability risks.
I’m curious how others handle this in practice. When a CVE affects a component in your system, what factors determine whether it gets patched immediately, deferred, or accepted as risk?
Do you prioritize based on exploitability, attack surface, physical access assumptions, update cost, or something else?