VulnCheck

15 STATS2 REPORTS

All Statistics

26.9% of KEVs first seen in 1H-2025 were still awaiting analysis by NIST.

VulnCheckState of Exploitation - A look Into The 1H-2025 Vulnerability Exploitation & Threat Activity·Jul 30, 2025
VulnerabilitiesKEVs

The top five categories for KEVs in 1H-2025 are: Content Management Systems (CMS): 86 KEVs, with a significant volume attributed to WordPress Plug-ins; Network Edge Devices: 77 KEVs; Server Software: 61 KEVs; Open Source Software: 55 KEVs; and Operating Systems: 38 KEVs.

VulnCheckState of Exploitation - A look Into The 1H-2025 Vulnerability Exploitation & Threat Activity·Jul 30, 2025
VulnerabilitiesKEVs

Vendors with Highest Number of KEVs in 1H-2025: Microsoft: 32 KEVs, with 26 of these being for Windows; Cisco: 10 KEVs; Apple OS: 6 KEVs; Totolink Networking Devices: 6 KEVs; and VMware: 6 KEVs.

VulnCheckState of Exploitation - A look Into The 1H-2025 Vulnerability Exploitation & Threat Activity·Jul 30, 2025
VulnerabilitiesKEVs

In 2H-2024, 44 KEVs were attributed to the North Korean cyber group Silent Chollima.

VulnCheckState of Exploitation - A look Into The 1H-2025 Vulnerability Exploitation & Threat Activity·Jul 30, 2025
VulnerabilitiesKEVs

Reports of KEVs associated with China and North Korea decreased in 1H-2025, while reports associated with Russia and Iran increased.

VulnCheckState of Exploitation - A look Into The 1H-2025 Vulnerability Exploitation & Threat Activity·Jul 30, 2025
VulnerabilitiesKEVs

In 2H-2024, 66 KEVs were attributed to the Chinese threat actor Flax Typhoon (AKA Ethereal Panda).

VulnCheckState of Exploitation - A look Into The 1H-2025 Vulnerability Exploitation & Threat Activity·Jul 30, 2025
VulnerabilitiesKEVs

In 1H-2025, 29 KEVs were attributed to Iranian threat actors.

VulnCheckState of Exploitation - A look Into The 1H-2025 Vulnerability Exploitation & Threat Activity·Jul 30, 2025
VulnerabilitiesKEVs

The countries with the largest number of active threat actor groups are: China: 20 groups, Russia: 11 groups, North Korea: 9 groups, and Iran: 6 groups.

VulnCheckState of Exploitation - A look Into The 1H-2025 Vulnerability Exploitation & Threat Activity·Jul 30, 2025
Threat actor groups

4.4% of KEVs are in a deferred status by NIST, meaning they are no longer maintained or updated

VulnCheckState of Exploitation - A look Into The 1H-2025 Vulnerability Exploitation & Threat Activity·Jul 30, 2025
VulnerabilitiesKEVs

32.1% of vulnerabilities (Known Exploited Vulnerabilities - KEVs) had exploitation evidence on or before the day of their CVE disclosure, often indicating zero-day exploitation. This marks an 8.5% increase in the percentage of KEVs exploited on or before disclosure compared to 23.6% in 2024.

VulnCheckState of Exploitation - A look Into The 1H-2025 Vulnerability Exploitation & Threat Activity·Jul 30, 2025
VulnerabilitiesCVEsKEVs

1% of the CVEs published were reported publicly as exploited in the wild.

VulnCheck2024 Trends in Vulnerability Exploitation ·Feb 1, 2025

768 CVEs were publicly reported as exploited in the wild in 2024, a 20% year-over-year increase.

VulnCheck2024 Trends in Vulnerability Exploitation ·Feb 1, 2025

There were over 100 unique sources that were the first to report a CVE.

VulnCheck2024 Trends in Vulnerability Exploitation ·Feb 1, 2025

23.6% of Known Exploited Vulnerabilities (KEVs) were known to be exploited on or before the day their CVEs were publicly disclosed.

VulnCheck2024 Trends in Vulnerability Exploitation ·Feb 1, 2025

Exploited CVEs ranged from 30-50 per month, with spikes during April/May due to increased reports during RSA and end-of-quarter reports.

VulnCheck2024 Trends in Vulnerability Exploitation ·Feb 1, 2025