2025 Sees 20% Surge in CISA’s Known Exploited Vulnerabilities

Published:

spot_img

Rising Vulnerabilities: Key Insights from the 2025 CISA KEV Report

The landscape of cybersecurity continues to evolve, with a marked increase in known exploited vulnerabilities (KEVs) reported in 2025. This trend has been highlighted in an analysis by Cyble, which scrutinized the data from the Cybersecurity and Infrastructure Security Agency (CISA).

Riding the Wave of Vulnerabilities

Following a period of stabilization in 2024, the rise in known exploited vulnerabilities gained momentum in 2025. CISA’s catalog saw an addition of 245 vulnerabilities that year, leading to an impressive growth rate of approximately 20%. This uptick compares significantly to the 185 vulnerabilities added in the preceding two years, resulting in growth rates of about 21% for 2023 and a reduced 17% for 2024. As of the end of 2025, the total number of vulnerabilities cataloged reached 1,484, illustrating the growing risks associated with various software and hardware flaws.

A Closer Look at Historical Vulnerabilities

Interestingly, the catalog also noted a rise in older vulnerabilities added to the KEV database. In 2025, CISA recorded 94 vulnerabilities from 2024 and previous years, which marks a noteworthy 45% increase when compared to the average of 65 older vulnerabilities added in 2023 and 2024. This focus on historically significant vulnerabilities underlines the ongoing threat they pose.

Among the older vulnerabilities, CVE-2007-0671, a Microsoft Office Excel Remote Code Execution flaw, took the spotlight as the most dated addition in 2025. Meanwhile, the oldest vulnerability still present in the KEV catalog remains CVE-2002-0367, a privilege escalation flaw linked to ransomware attacks.

Ransomware’s Targeted Threats

A total of 24 new vulnerabilities added to the KEV catalog in 2025 were identified as being actively exploited by ransomware groups. Notable among these were vulnerabilities like CVE-2025-5777, commonly referred to as “CitrixBleed 2,” and the vulnerabilities in Oracle E-Business Suite exploited by the notorious CL0P ransomware gang. Vendors like Microsoft, Fortinet, and Oracle featured prominently in this year’s alarming trends, with numerous vulnerabilities marked for exploitation.

Prominent Players in the Vulnerability Game

As in previous years, Microsoft led the pack with the highest number of vulnerabilities recorded in the CISA KEV additions, with 39 vulnerabilities in 2025, a slight rise from 36 in 2024. Other tech giants such as Apple, Cisco, and Google Chromium followed, each contributing between seven and nine vulnerabilities to the KEV catalog. In a positive development, several vendors, including Adobe, VMware, and Palo Alto Networks, demonstrated improvements in their security measures, showing a decrease in vulnerabilities compared to the previous year.

Common Weaknesses on the Rise

Among the vulnerabilities added to the KEV catalog, a consistent list of common software weaknesses emerged. Cyble identified eight specific weaknesses that were prevalent among the 2025 KEV additions:

  • CWE-78: OS Command Injection accounted for 18 vulnerabilities.
  • CWE-502: Deserialization of Untrusted Data impacted 14 vulnerabilities.
  • CWE-22: Path Traversal appeared in 13 instances.
  • CWE-416: Use After Free was noted in 11 cases.
  • CWE-787: Out-of-bounds Write was represented in 10 vulnerabilities.
  • CWE-79: Cross-site Scripting appeared seven times.
  • CWE-94 and CWE-287: Code Injection and Improper Authentication were also noted six times each.

This consistent identification of vulnerabilities calls for a focused approach in cybersecurity strategies across various sectors.

In sum, the CISA KEV report for 2025 paints a clear picture of a dynamic threat landscape requiring ongoing vigilance and adaptation from software developers and IT security professionals alike.

spot_img

Related articles

Recent articles

Webinar: Uncovering Suspicious APK Files in Wedding Card and Loan App Scams

The surge of malicious APK files in cyber fraud schemes, such as fake wedding invitations and instant loan applications, has become a growing concern....

Skylon Partners with COBNB to Launch COBNB+ Featuring L’Occitane en Provence Hotel Amenities

Skylon Partners with COBNB for a Luxurious Hospitality Experience in Kuala Lumpur Introduction to the New Partnership In an exciting development for the hospitality scene in...

Understanding CISA KEV: Key Insights and Tools for Security Teams

Understanding the CISA Known Exploited Vulnerability (KEV) Catalog The Cybersecurity and Infrastructure Security Agency (CISA) maintains the Known Exploited Vulnerability (KEV) catalog, a resource designed...

Dark Web Leak Sparks WFH Job Scams; Prayagraj Police Freeze ₹2 Crore in Fraudulent Funds

Rising Cybercrime in Prayagraj: A New Target Shifting Tactics of Cybercriminals In Prayagraj, the landscape of cybercrime is evolving. Previously, scammers predominantly targeted victims through enticing...