159 CVEs Reported Exploited in Q1 2025 — 28.3% Targeted Within 24 Hours of Disclosure

April 24, 2025
Vulnerability / Threat Intelligence

In the first quarter of 2025, a total of 159 CVE identifiers have been identified as actively exploited, a rise from 151 in the previous quarter. According to a report from VulnCheck shared with The Hacker News, the pace of exploitation remains rapid, with 28.3% of these vulnerabilities being targeted within a day of their disclosure. This accounts for 45 security flaws weaponized in real-world attacks shortly after being revealed. An additional 14 vulnerabilities were exploited within a month, while another 45 were abused over the course of a year. The majority of these vulnerabilities were found in content management systems (CMS), followed by network edge devices, operating systems, open-source software, and server software. Breakdown includes:

  • Content Management Systems (CMS): 35
  • Network Edge Devices: 29
  • Operating Systems: 24
  • Open Source Software: 14
  • Server Software: 14

159 CVEs Exploited in Q1 2025—28.3% Within 24 Hours of Disclosure

April 24, 2025

In the first quarter of 2025, a total of 159 Common Vulnerabilities and Exposures (CVEs) have been identified as actively exploited, a notable increase from 151 in the previous quarter. According to a report from VulnCheck shared with The Hacker News, the pace of exploitation remains alarmingly rapid. Specifically, 28.3% of these vulnerabilities were targeted within just 24 hours of their disclosure, illustrating the urgency with which threat actors can mobilize.

This quick turnaround represents 45 vulnerabilities that were leveraged for real-world attacks almost immediately following their announcement. Alongside these, another 14 vulnerabilities were exploited within a month of their disclosure, and an additional 45 were taken advantage of over the course of a year.

The cybersecurity company highlights that a significant portion of these exploited vulnerabilities are prevalent in content management systems (CMS), followed closely by network edge devices, operating systems, open-source software, and server software. Among them, 35 vulnerabilities were found in CMS platforms, 29 in network edge devices, and 24 in operating systems, with 14 each detected within open-source and server software categories.

As businesses continue to adopt new technologies and software solutions, the evolving threat landscape places them at increased risk. Understanding the nature of these vulnerabilities and the types of systems they are affecting is essential for risk management.

From a tactical perspective, the MITRE ATT&CK framework offers valuable insights into how threat actors may have executed these exploits. Techniques such as initial access, which allows attackers to gain footholds in target systems, and privilege escalation, which enables them to elevate their access rights, are likely employed in these scenarios. This exploitation cycle often begins with reconnaissance efforts that identify the weakest links in a target’s defenses.

With the emphasis on speed in the exploitation of vulnerabilities, it becomes crucial for business owners to reinforce their cybersecurity posture. Proactive measures, including timely patching of software, employee training, and employing robust monitoring systems, can help mitigate the risks associated with these vulnerabilities. The imperative for vigilance cannot be overstated, as the landscape of cybersecurity threats will continue to evolve swiftly.

In summary, the increasing frequency of exploited vulnerabilities in early 2025 warrants close attention. A strategic approach to cybersecurity can play a pivotal role in shielding organizational assets from the dangers posed by threat actors who exploit these flaws without delay.

Source link