6 min read
|
Saved February 14, 2026
|
Copied!
Do you care about this?
The article reports on 884 new Known Exploited Vulnerabilities (KEVs) identified in 2025, highlighting that nearly 29% were exploited on or before their CVE publication date. It emphasizes the rapid pace of exploitation and the need for organizations to prioritize timely remediation of both new and existing vulnerabilities.
If you do, here's more
In 2025, VulnCheck reported 884 Known Exploited Vulnerabilities (KEVs) that had not been exploited prior to that year. Notably, 28.96% of these KEVs were exploited on or before their CVE publication date, indicating a rise from 23.6% in 2024. This trend underscores the speed at which attackers exploit vulnerabilities, often before they are publicly disclosed. As attackers increasingly target internet-facing technologies, organizations face pressure to remediate vulnerabilities swiftly to avoid falling victim to exploits.
The report highlights that over 100 unique organizations provided evidence of exploitation, with Shadowserver leading in first-reporter status. Network edge devices, including firewalls and VPNs, were the primary targets, followed by content management systems and open-source software. The analysis shows a broad range of exploited technologies, extending even to hardware and AI systems. VulnCheck's ability to identify exploitation evidence significantly earlier than CISA in many cases emphasizes the need for organizations to prioritize timely responses to threats.
VulnCheck's findings also suggest a stable pattern in attacker behavior, with time-to-exploitation trends consistent with previous years. In comparing VulnCheck's KEV data with CISA's, VulnCheck identified more than three times the number of vulnerabilities, indicating a more comprehensive coverage of vendors and products. This distinction highlights the importance of vigilance in vulnerability management, as the exploitation landscape continues to evolve rapidly.
Questions about this article
No questions yet.