2025 Sees 20% Surge in CISA’s Known Exploited Vulnerabilities

Published:

spot_img

Rising Vulnerabilities: Key Insights from the 2025 CISA KEV Report

The landscape of cybersecurity continues to evolve, with a marked increase in known exploited vulnerabilities (KEVs) reported in 2025. This trend has been highlighted in an analysis by Cyble, which scrutinized the data from the Cybersecurity and Infrastructure Security Agency (CISA).

Riding the Wave of Vulnerabilities

Following a period of stabilization in 2024, the rise in known exploited vulnerabilities gained momentum in 2025. CISA’s catalog saw an addition of 245 vulnerabilities that year, leading to an impressive growth rate of approximately 20%. This uptick compares significantly to the 185 vulnerabilities added in the preceding two years, resulting in growth rates of about 21% for 2023 and a reduced 17% for 2024. As of the end of 2025, the total number of vulnerabilities cataloged reached 1,484, illustrating the growing risks associated with various software and hardware flaws.

A Closer Look at Historical Vulnerabilities

Interestingly, the catalog also noted a rise in older vulnerabilities added to the KEV database. In 2025, CISA recorded 94 vulnerabilities from 2024 and previous years, which marks a noteworthy 45% increase when compared to the average of 65 older vulnerabilities added in 2023 and 2024. This focus on historically significant vulnerabilities underlines the ongoing threat they pose.

Among the older vulnerabilities, CVE-2007-0671, a Microsoft Office Excel Remote Code Execution flaw, took the spotlight as the most dated addition in 2025. Meanwhile, the oldest vulnerability still present in the KEV catalog remains CVE-2002-0367, a privilege escalation flaw linked to ransomware attacks.

Ransomware’s Targeted Threats

A total of 24 new vulnerabilities added to the KEV catalog in 2025 were identified as being actively exploited by ransomware groups. Notable among these were vulnerabilities like CVE-2025-5777, commonly referred to as “CitrixBleed 2,” and the vulnerabilities in Oracle E-Business Suite exploited by the notorious CL0P ransomware gang. Vendors like Microsoft, Fortinet, and Oracle featured prominently in this year’s alarming trends, with numerous vulnerabilities marked for exploitation.

Prominent Players in the Vulnerability Game

As in previous years, Microsoft led the pack with the highest number of vulnerabilities recorded in the CISA KEV additions, with 39 vulnerabilities in 2025, a slight rise from 36 in 2024. Other tech giants such as Apple, Cisco, and Google Chromium followed, each contributing between seven and nine vulnerabilities to the KEV catalog. In a positive development, several vendors, including Adobe, VMware, and Palo Alto Networks, demonstrated improvements in their security measures, showing a decrease in vulnerabilities compared to the previous year.

Common Weaknesses on the Rise

Among the vulnerabilities added to the KEV catalog, a consistent list of common software weaknesses emerged. Cyble identified eight specific weaknesses that were prevalent among the 2025 KEV additions:

  • CWE-78: OS Command Injection accounted for 18 vulnerabilities.
  • CWE-502: Deserialization of Untrusted Data impacted 14 vulnerabilities.
  • CWE-22: Path Traversal appeared in 13 instances.
  • CWE-416: Use After Free was noted in 11 cases.
  • CWE-787: Out-of-bounds Write was represented in 10 vulnerabilities.
  • CWE-79: Cross-site Scripting appeared seven times.
  • CWE-94 and CWE-287: Code Injection and Improper Authentication were also noted six times each.

This consistent identification of vulnerabilities calls for a focused approach in cybersecurity strategies across various sectors.

In sum, the CISA KEV report for 2025 paints a clear picture of a dynamic threat landscape requiring ongoing vigilance and adaptation from software developers and IT security professionals alike.

spot_img

Related articles

Recent articles

Ajman Ruler Enacts Law for Managing Lost and Abandoned Property

New Law on Lost and Abandoned Property in Ajman Introduction of Law No. (2) of 2026 His Highness Sheikh Humaid bin Rashid Al Nuaimi, the Ruler...

Join Our Webinar: Navigating Risks and Mitigation Strategies in AI-Generated Code

As generative artificial intelligence increasingly makes its way into software development practices, cybersecurity professionals are spotlighting a new array of security vulnerabilities. These risks...

Gardaí Lack Resources to Monitor Dark Web

Gardaí Comment on Dark Web Monitoring and Child Abuse Material Gardaí's Stance on Dark Web Monitoring In a recent session of the Oireachtas Artificial Intelligence Committee,...

Saudi Arabia’s Digital Advancements: Expanding the xIoT Attack Surface

Navigating the Cybersecurity Landscape in Saudi Arabia's Digital Transformation Saudi Arabia's ambitious Vision 2030 initiative is signaling a new era of digital modernization across multiple...