Fast Facts
- Despite over 40,000 vulnerabilities published in 2025, only 1% (just 422) were exploited in the wild, highlighting the challenge of effective prioritization amid such volume.
- Attackers predominantly target network edge devices, which account for 28% of impacted products, due to their privileged role in network access and outdated software bases.
- The top exploited vulnerabilities, including those in Microsoft SharePoint, React, and other major vendors, were linked to multiple threat groups and ransomware, with some like React2Shell having over 236 exploits shortly after disclosure.
- The report emphasizes that technology as a whole is the core issue, stressing the urgent need to reevaluate and enhance the resilience of all technological infrastructure against evolving, organized threats.
The Issue
In 2025, cybersecurity experts from VulnCheck reported a significant surge in new vulnerabilities, with over 40,000 being published, yet only about 1%, or 422 of these, were actively exploited in real-world attacks. This massive influx overwhelmed security teams, making it difficult to prioritize threats effectively. Caitlin Condon, VulnCheck’s vice president of security research, explained that the rapid growth in known vulnerabilities and declining reliability of traditional risk indicators compelled defenders to focus on verified risks, especially known exploited vulnerabilities, rather than unsubstantiated threat claims. Many of the most targeted vulnerabilities involved network edge devices, which often run outdated software and are prime entry points for hackers, including state-sponsored groups and cybercriminal organizations. Notably, vulnerabilities in Microsoft SharePoint and a defect in React Server Components led to widespread intrusions, impacting hundreds of organizations, including government agencies. Overall, the report emphasizes that the current technological landscape, characterized by outdated systems and organized threat actors, creates a persistent and evolving threat environment, urging a critical reassessment of cybersecurity strategies and technological resilience.
Critical Concerns
In 2025, vulnerabilities increased rapidly, like weeds spreading unchecked. However, only 1% of these weaknesses were exploited in attacks. For your business, this means that many security gaps might be unnoticed but still present. Left unaddressed, these vulnerabilities can be used by cybercriminals to infiltrate systems, steal data, or cause disruptions. As a result, even if your defenses stop most attacks, the remaining threats are enough to damage your reputation, finances, and customer trust. Therefore, continuously monitoring, updating, and strengthening your security measures is crucial to prevent small weaknesses from turning into costly breaches.
Possible Actions
In an environment where vulnerabilities can multiply rapidly, swift action is vital to prevent exploitation and minimize damage. Even though only a small fraction—about 1%—were weaponized in attacks in 2025, the sheer volume of unchecked vulnerabilities poses a mounting risk to organizational security and resilience.
Rapid Response
Quickly identify and assess vulnerabilities through continuous scanning to understand potential threats.
Prioritized Patching
Implement a risk-based approach to patch high-severity vulnerabilities immediately, delaying lower urgency fixes as appropriate.
Automated Remediation
Leverage automation tools to expedite patch deployment and configuration changes, reducing human error and response time.
Threat Intelligence Integration
Utilize current threat intelligence to understand which vulnerabilities are being actively exploited and adjust remediation efforts accordingly.
Vulnerability Management
Maintain a dynamic inventory of vulnerabilities, track remediation progress, and perform regular audits to ensure no critical issues are overlooked.
Security Training
Educate staff on recognizing early warning signs and proper procedures for reporting vulnerabilities to facilitate prompt action.
Incident Response Planning
Develop and regularly test incident response plans that include procedures specifically for rapid vulnerability remediation to ensure preparedness.
Advance Your Cyber Knowledge
Explore career growth and education via Careers & Learning, or dive into Compliance essentials.
Explore engineering-led approaches to digital security at IEEE Cybersecurity.
Disclaimer: The information provided may not always be accurate or up to date. Please do your own research, as the cybersecurity landscape evolves rapidly. Intended for secondary references purposes only.
Cyberattacks-V1cyberattack-v1-multisource
