TXOne Networks

Block the Exploit Without Patching the System.

Virtual patching: mitigate CVEs on systems you cannot take down to patch

Virtual patching applies inline inspection rules at TXOne Edge and Stellar that block exploit attempts against known CVEs, without requiring a software patch on the vulnerable system. It is how you mitigate 26% of CISA advisories that have no patch available, and how you protect the legacy Windows and firmware-locked systems that cannot be patched in a four-hour maintenance window.

Compensating Control for the Unpatchable

Patching Is Not the Only Answer. In OT, It Is Usually Not the Fastest.

100% of organizations run legacy Windows. 26% of CISA advisories have no patch. A four-hour maintenance window cannot absorb every critical CVE.

Virtual patching closes the gap between a disclosed CVE and an applied fix. TXOne Edge enforces protocol-aware signatures that block the exploit pattern on the wire. Stellar enforces behavioral baselines that block exploit behavior at the endpoint. The vulnerable system stays exactly as it is. The exploit cannot reach it. The Gartner 2025 CPS Vulnerability analysis explicitly endorses this approach for CPS environments.

WHAT IT IS

Capability

What is Virtual Patching?

Virtual patching at TXOne takes two forms that work together. At the network layer, TXOne Edge applies OT-native signatures that detect and block exploit attempts against specific CVEs across 180+ industrial protocols. At the endpoint layer, Stellar enforces application lockdown and CPSDR behavioral baselines that block the exploit from executing even if it reaches the host. Both layers draw from Zero Day Initiative (ZDI) research and the TXOne threat research team. Together they deliver compensating protection for vulnerable systems you cannot patch today (or ever), with explicit credit in the VSAR vulnerability risk model inside Sennin.

KEY COMPONENTS

Requirements

Virtual Patching Challenges

Key challenges that Virtual Patching addresses.

Almost a quarter of disclosed CVEs are unpatchable today

26% of CISA Advisories Have No Patch Available

Gartner's 2025 CPS Vulnerability analysis documented 3,546 CISA advisories with 26% having no patch available and 18% having neither patch nor mitigation. The traditional patch-driven vulnerability program cannot help.

Key Components

Key Components

Core components of the Virtual Patching capability.

Network-Layer Virtual Patches (TXOne Edge)

Edge applies OT-native signatures that detect and block exploit attempts against specific CVEs across 180+ industrial protocols. The signatures recognize the exploit pattern on the wire and prevent it from ever reaching the vulnerable system. Blocks happen inline in sub-seconds, not after a 35-45 minute coordination window.

Key Capabilities

1,500+ OT-native threat signatures
Protocol-aware detection across 180+ protocols
Sub-second inline blocking at wire speed
Zero-day coverage via ZDI (Zero Day Initiative) research
Outcomes

Outcomes

$2-5M

Per-system replacement cost avoided

PROVEN RESULTS

CISA CPS advisories in scope
CISA advisories with no patch available
Legacy Windows prevalence in OT
Cite replacement cost as primary barrier

WHY TXONE

Why TXOne for Virtual Patching

Network and endpoint enforcement working together, backed by OT-specific research, with explicit credit in operational risk scoring.

TXOneOperations-first

Virtual patches run at both the network (Edge) and endpoint (Stellar) layers. Redundant coverage means an exploit has to bypass both; most bypass neither.

VS
Two Layers, Not One

Legacy approach creates operational risk

TXOneOperations-first

Gartner's 2025 CPS Vulnerability analysis explicitly endorses virtual patching for CPS environments, particularly given the 26% of advisories with no patch and 18% with no mitigation.

VS
Gartner-Endorsed Approach

Legacy approach creates operational risk

TXOneOperations-first

Windows 2000, XP, and Windows 7 all receive Stellar virtual patching. IT EDR tools that dropped these platforms cannot offer equivalent protection at the endpoint.

VS
Coverage for Systems Others Dropped

Legacy approach creates operational risk

TXOneOperations-first

When virtual patches cover a CVE, VSAR drops its priority. The compensating control is scored, not ignored, so your team works the unmitigated CVEs first.

VS
Credit in VSAR Scoring

Legacy approach creates operational risk

TXOneOperations-first

New virtual patches deploy without reboot or downtime. Security currency becomes independent of the maintenance window. IT EDR tools that require reboot for protection updates cannot make this claim.

VS
Zero-Reboot Deployment

Legacy approach creates operational risk

Operations-first security that works with your production environment

NEXT STEP

Protect the Systems You Cannot Patch

Start a Proof of Value on a legacy segment or endpoint. See network-layer and endpoint-layer virtual patches applied against your actual exposure. 60 minutes to initial visibility, without touching the vulnerable system itself.