Accelerated Exploitation of New Vulnerabilities in 2025
Summary
Hide ▲
Show ▼
In 2025, approximately 50 to 61 percent of newly disclosed vulnerabilities were weaponized within 48 hours, driven by automated attack systems. The time to exploit (TTE) dropped from 745 days in 2020 to 44 days in 2025, with n-day exploits representing over 80% of the CVEs listed in the VulnDB database. Attackers exploit the delay between vulnerability disclosure and patch deployment, which often follows a slower, human-driven process. The traditional patching cadence is no longer sustainable as attackers use AI and automation to rapidly weaponize vulnerabilities, while defenders struggle to keep up. The exploitation economy operates at machine speed, with threat actors leveraging automated scripts, AI, and dark web forums to quickly develop and distribute exploits. Defenders face challenges due to the need for near-perfect stability and the risk of service interruptions, which attackers do not consider. To mitigate this, organizations must transition to automated, policy-driven remediation to close the gap between vulnerability disclosure and patch deployment.
Timeline
-
12.02.2026 11:30 1 articles · 23h ago
N-Day Exploits Dominate Vulnerability Landscape in 2025
N-day exploits now represent over 80% of the CVEs listed in the VulnDB database. Adversaries rapidly weaponize researcher-published proof-of-concept (PoC) code, combining these ready-made exploits with internet-wide scanning tools to conduct mass exploitation across large segments of the internet in hours. Security and perimeter software is a growing target for n-day attacks, with 37 n-day attacks observed in 2025.
Show sources
- Time to Exploit Plummets as N-Day Flaws Dominate — www.infosecurity-magazine.com — 12.02.2026 11:30
-
12.02.2026 11:30 1 articles · 23h ago
Visibility Issues Compound Security Challenges in 2025
The challenges facing security teams are exacerbated by asset visibility issues, with most large organizations not having more than a quarter of their total assets inventoried. Additionally, a 'CVE blind spot' arises from the fact that thousands of vulnerabilities disclosed every year never receive an official CVE ID, representing a massive blind spot for standard scanners.
Show sources
- Time to Exploit Plummets as N-Day Flaws Dominate — www.infosecurity-magazine.com — 12.02.2026 11:30
-
13.11.2025 13:30 2 articles · 3mo ago
Accelerated Exploitation of New Vulnerabilities in 2025
In 2025, approximately 50 to 61 percent of newly disclosed vulnerabilities were weaponized within 48 hours, driven by automated attack systems. The time to exploit (TTE) dropped from 745 days in 2020 to 44 days in 2025, with n-day exploits representing over 80% of the CVEs listed in the VulnDB database. Attackers exploit the delay between vulnerability disclosure and patch deployment, which often follows a slower, human-driven process. The traditional patching cadence is no longer sustainable as attackers use AI and automation to rapidly weaponize vulnerabilities, while defenders struggle to keep up.
Show sources
- When Attacks Come Faster Than Patches: Why 2026 Will be the Year of Machine-Speed Security — thehackernews.com — 13.11.2025 13:30
- Time to Exploit Plummets as N-Day Flaws Dominate — www.infosecurity-magazine.com — 12.02.2026 11:30
Information Snippets
-
50 to 61 percent of newly disclosed vulnerabilities in 2025 were weaponized within 48 hours.
First reported: 13.11.2025 13:302 sources, 2 articlesShow sources
- When Attacks Come Faster Than Patches: Why 2026 Will be the Year of Machine-Speed Security — thehackernews.com — 13.11.2025 13:30
- Time to Exploit Plummets as N-Day Flaws Dominate — www.infosecurity-magazine.com — 12.02.2026 11:30
-
Attackers use automated scripts and AI to rapidly develop and distribute exploits.
First reported: 13.11.2025 13:302 sources, 2 articlesShow sources
- When Attacks Come Faster Than Patches: Why 2026 Will be the Year of Machine-Speed Security — thehackernews.com — 13.11.2025 13:30
- Time to Exploit Plummets as N-Day Flaws Dominate — www.infosecurity-magazine.com — 12.02.2026 11:30
-
Defenders face challenges due to the need for near-perfect stability and the risk of service interruptions.
First reported: 13.11.2025 13:302 sources, 2 articlesShow sources
- When Attacks Come Faster Than Patches: Why 2026 Will be the Year of Machine-Speed Security — thehackernews.com — 13.11.2025 13:30
- Time to Exploit Plummets as N-Day Flaws Dominate — www.infosecurity-magazine.com — 12.02.2026 11:30
-
Organizations must transition to automated, policy-driven remediation to close the gap between vulnerability disclosure and patch deployment.
First reported: 13.11.2025 13:302 sources, 2 articlesShow sources
- When Attacks Come Faster Than Patches: Why 2026 Will be the Year of Machine-Speed Security — thehackernews.com — 13.11.2025 13:30
- Time to Exploit Plummets as N-Day Flaws Dominate — www.infosecurity-magazine.com — 12.02.2026 11:30
-
The time to exploit (TTE) dropped from 745 days in 2020 to 44 days in 2025.
First reported: 12.02.2026 11:301 source, 1 articleShow sources
- Time to Exploit Plummets as N-Day Flaws Dominate — www.infosecurity-magazine.com — 12.02.2026 11:30
-
N-day exploits now represent over 80% of the CVEs listed in the VulnDB database.
First reported: 12.02.2026 11:301 source, 1 articleShow sources
- Time to Exploit Plummets as N-Day Flaws Dominate — www.infosecurity-magazine.com — 12.02.2026 11:30
-
Adversaries rapidly weaponize researcher-published proof-of-concept (PoC) code.
First reported: 12.02.2026 11:301 source, 1 articleShow sources
- Time to Exploit Plummets as N-Day Flaws Dominate — www.infosecurity-magazine.com — 12.02.2026 11:30
-
Security and perimeter software is a growing target for n-day attacks.
First reported: 12.02.2026 11:301 source, 1 articleShow sources
- Time to Exploit Plummets as N-Day Flaws Dominate — www.infosecurity-magazine.com — 12.02.2026 11:30
-
Most large organizations may not have more than a quarter of their total assets inventoried.
First reported: 12.02.2026 11:301 source, 1 articleShow sources
- Time to Exploit Plummets as N-Day Flaws Dominate — www.infosecurity-magazine.com — 12.02.2026 11:30
-
Thousands of vulnerabilities disclosed every year never receive an official CVE ID.
First reported: 12.02.2026 11:301 source, 1 articleShow sources
- Time to Exploit Plummets as N-Day Flaws Dominate — www.infosecurity-magazine.com — 12.02.2026 11:30
Similar Happenings
Increase in Zero-Day and One-Day Exploits in 2025
In 2025, 28.96% of known exploited vulnerabilities (KEVs) were exploited before or on the day of public disclosure, up from 23.6% in 2024. VulnCheck identified 884 new vulnerabilities with evidence of exploitation, a 15% increase from 2024. Network edge devices, content management systems, and open-source software were the most targeted technologies. Time-to-exploitation patterns remained consistent with 2024, with operating systems being the most affected by zero-day and one-day exploits. Ransomware attribution continued to lag behind initial exploitation disclosure.
Microsoft December 2025 Patch Tuesday addresses 3 zero-days, 56 flaws
Microsoft's December 2025 Patch Tuesday addresses 56 vulnerabilities, including three zero-days. One zero-day (CVE-2025-62221) is actively exploited, allowing privilege escalation in Windows Cloud Files Mini Filter Driver. Two other zero-days (CVE-2025-64671, CVE-2025-54100) are publicly disclosed, affecting GitHub Copilot for JetBrains and PowerShell. The updates also fix 3 critical remote code execution vulnerabilities. Additionally, Microsoft released the KB5071546 extended security update for Windows 10 Enterprise LTSC and ESU program participants, addressing the same vulnerabilities and updating Windows 10 to build 19045.6691 and Windows 10 Enterprise LTSC 2021 to build 19044.6691. The update includes a fix for CVE-2025-54100, a remote code execution zero-day vulnerability in PowerShell, and introduces a confirmation prompt with a security warning for script execution risk when using the Invoke-WebRequest command in PowerShell 5.1. Microsoft patched a total of 1,275 CVEs in 2025, according to data compiled by Fortra. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2025-62221 to the Known Exploited Vulnerabilities (KEV) catalog, mandating FCEB agencies to apply the patch by December 30, 2025. The remaining two zero-days, CVE-2025-54100 and CVE-2025-64671, are part of a broader set of security vulnerabilities collectively named IDEsaster, affecting multiple AI coding platforms.
Increasing CVE Volume and Cyber Insurance Strategies
The number of Common Vulnerabilities and Exposures (CVEs) published has surged, with approximately 33,000 CVEs listed by mid-September 2025, nearly double the 18,400 published in 2020. This rapid increase poses significant challenges for cybersecurity teams and insurers. Cyber insurance carriers and brokers are adopting varied approaches to manage the growing risk, ranging from proactive assistance to penalizing policyholders for unpatched vulnerabilities. The industry is also focusing on holistic risk management strategies beyond just CVEs. The perception of cyber resilience among executives has risen, but the threat landscape remains fast-moving and unpredictable.
CISA Emergency Directive 25-03: Mitigation of Cisco ASA Zero-Day Vulnerabilities
The Cybersecurity and Infrastructure Security Agency (CISA) has **reiterated urgent warnings** to U.S. federal agencies after discovering that some organizations incorrectly applied updates for **CVE-2025-20333** and **CVE-2025-20362**, leaving devices marked as 'patched' but still vulnerable to active exploitation. CISA confirmed it is tracking ongoing attacks targeting unpatched Cisco ASA and Firepower devices within Federal Civilian Executive Branch (FCEB) agencies, with over **30,000 devices** remaining exposed globally, down from 45,000 in early October. The vulnerabilities enable unauthenticated remote code execution, unauthorized access to restricted endpoints, and denial-of-service (DoS) attacks. They have been linked to the **ArcaneDoor campaign**, a state-sponsored group active since at least July 2023, which has deployed malware like **RayInitiator** and **LINE VIPER**, manipulated ROM for persistence, and forced devices into reboot loops. CISA’s **Emergency Directive 25-03**, issued in September 2025, mandates federal agencies to account for all affected devices, disconnect end-of-support systems, and apply minimum software versions. The directive also introduced the **RayDetect scanner** to detect compromise evidence in ASA core dumps. Recent findings reveal the same threat actor also exploited **CVE-2025-5777 (Citrix Bleed 2)** and **CVE-2025-20337 (Cisco ISE)** as zero-days, deploying a custom web shell ('IdentityAuditAction') with advanced evasion techniques. The campaign’s indiscriminate targeting and multi-platform exploitation underscore the adversary’s broad capabilities and access to sophisticated tools.
SecAlerts service launched for real-time vulnerability alerts
SecAlerts, a new service, has been launched to deliver real-time vulnerability alerts. This service aims to streamline vulnerability management by providing immediate, actionable information directly to security teams. It aggregates data from over 100 sources, including vendors, researchers, forums, and blogs, to avoid delays associated with traditional sources like the National Vulnerability Database (NVD). The service allows users to filter alerts based on severity, exploitation status, and other criteria, reducing noise and focusing on critical vulnerabilities. SecAlerts supports various integration methods and customizable alert delivery, making it suitable for a wide range of businesses and industries. It uses three core components: Stacks, Channels, and Alerts, to deliver vulnerability information. The service provides a Feed that shows vulnerabilities affecting your software over any period of time, along with a bar graph showing the vulnerabilities for that same period of time, color-coded to show their severity. SecAlerts also offers an API for programmatic access and automated integration into existing tooling. The service has already gained a global client base across five continents, including universities, intelligence agencies, startups, banks, government departments, aviation, and cyber insurers.