Blog

Part 2: Vulnerability Insights and Prioritization Report 2025 H1 Analysis

Part 2 of our series analyzes the vulnerabilities Flashpoint prioritized in the first half of 2025, revealing key trends in attacker behavior, vendor exposure, and the critical importance of real-time, contextual intelligence. If you missed Part 1 – Read it here.

Default Author Image
July 17, 2025

Contextual Intelligence for Real-World Risk

This mid-year report equips security leaders and operators with the contextual intelligence required to act decisively and goes beyond routine CVSS scoring and patch availability. It considers real-world consequences: how vulnerabilities are weaponized, what adversaries are favoring, and which vendor ecosystems- beyond the usual enterprise players- are drawing increased attention from threat actors. 

This report also surfaces high-risk vulnerabilities that lack official CVE IDs, but present significant exploitation potential and business risk. These unofficial, but significant flaws, expose a fundamental gap in traditional vulnerability tracking systems, and underscore the importance of continuously managed, intelligence-driven vulnerability coverage.

To learn how to approach vulnerability and exposure management with threat-informed vulnerability prioritization, check out the Flashpoint Method for Threat-Informed Vulnerability Prioritization.

Learn More

Get an in-depth view into how Flashpoint helps organizations deliver an 85% reduction in vulnerability triage, including the strategy and prioritization criteria.

Vulnerability Insights from 2025 H1

1. Exploitation Visibility is Non-Negotiable

  • At the time of publishing, 54% of prioritized vulnerabilities had an exploit or were being exploited, possessed a high CVSS score, were remotely exploitable, affected a ‘major’ vendor, and had already been exploited in the wild.
    • In today’s vulnerability disclosure landscape, by the time many serious flaws are made public, there’s a high chance they’ve already been used for attacks.
  • Between January and June 2025, 60% of vulnerabilities published by Flashpoint had publicly available exploit code (e.g., GitHub, Exploit-DB, Telegram etc.).
    • Additionally, 97% of vulnerabilities with exploit information already had that information available when they were disclosed, further emphasizing the speed at which adversaries move.
      • The elevated risk stems from the increased likelihood of these vulnerabilities being actively exploited by threat actors.

2. Rapid Weaponization is the Rule, Not the Exception

  • On average, it takes less than one day for an exploit to become available from public vulnerability disclosure.
    • This statistic applies to vulnerabilities where both the disclosure date and the availability of an exploit are known. This rapid development cycle highlights the critical need for immediate action to mitigate risk effectively.
  • Several high-profile vulnerabilities saw mass exploitation in under 24 hours.

Exploitation Consequence Distribution & Vendor Focus

Exploitation Consequences

In the first half of 2025 alone, our analysts identified and suggested prioritization for 96 vulnerabilities out of more than 21,100 vulnerabilities published to Flashpoint VulnDB and Ignite. These vulnerabilities could affect enterprises because many are found in widely used products and all of them contain one or more of the following criterion:

  • Are in widely used products and are potentially enterprise-affecting
  • Have critical severity and high CVSS score 
  • Are exploited in the wild or have exploits available 
  • Allow full system compromise
  • Can be exploited via the network alone or in combination with other vulnerabilities
  • Have a solution to take action on

An analysis of their exploit consequences reveals the potential impact across systems, data, and operations. This figure details the severity of potential breaches and their distribution among various exploit outcomes.

Exploit ConsequencesVulnerability Count
RCE, including “Remote Command Execution” and “Remote Code Execution”31
Authentication Bypass8
Privilege Escalation7
Command Injection6
Information or Credential Disclosure4
Other (i.e. buffer overflow, denial of service, and default/hard-coded credentials40

Vendor Concentration

(Remote, Exploit Available or Active, High CVSS Score)

The following dataset offers a compelling look at the vulnerability landscape from January to June 2025, specifically focusing on vulnerabilities that are remotely exploitable, have active exploits available, and possess a high CVSS score, rather than all vulnerabilities affecting the mentioned vendors during this period. This list highlights the continued dominance of tech giants like Amazon, Dell, and Microsoft at the top of the charts, underscoring the extensive and widespread usage of their technologies, demanding heightened attention.

Curiously, NASA’s three-time inclusion provides a unique data point, suggesting that even highly specialized and secure organizations are not immune to vulnerabilities. Furthermore, the significant presence of automation and ICS/IoT vendors such as Schneider, Siemens, Wiedmuller, and Eaton points to a growing concern within critical infrastructure and industrial control systems.

VendorPrioritized, Threat-Informed Vulnerabilities
SUSE10
Dell9
Microsoft9
IBM8
Red Hat7
Amazon5
Canonical5
Software in the Public Interest5
Apache4
Cisco4
Apple4
Google4
Apache4
Cisco4
Apple4
Google4
Nilson Lazarin3
Palo Alto3
Ivanti3
NASA3
Fedora3
Oracle3
VMware2
D-link2
Zyxel2
Fortinet2
Sonicwall2
Siemens2
Opera2
Philips2

Real-World Examples

Three additional vulnerabilities we wanted to highlight on top of the ones already prioritized in the Weekly Vulnerability Prioritization and Insights Report are:

Microsoft Windows RAR File Extraction File Concealment Weakness
Vulnerability DescriptionMicrosoft Windows contains a flaw that is triggered when extracting files from specially crafted compressed RAR archives. This may allow a context-dependent attacker to hide extracted files when viewing directories in the Windows Explorer GUI.
Product(s)Windows 10, 11
ClassificationsAttack Type: Input Manipulation
Impact: Loss of Integrity
Solution: Solution Unknown
Disclosure: Discovered in the Wild
Ransomware LikelihoodMedium
Time to Exploit Zero-day
Disclosure DateCVE Assignment2/13/2025133 days with no CVE assignment yet
Google Chrome chrome_elf.dll DLL Side-loading Local Code Execution Weakness
Vulnerability DescriptionGoogle Chrome contains a flaw that is triggered when loading DLL files. This may allow a local attacker to load an attacker-controlled chrome_elf.dll library and execute arbitrary code.
Product(s)Google Chrome
ClassificationsAttack Type: Other
Impact: Loss of Integrity
Solution: Solution Unknown
Disclosure: Discovered in the Wild
FP Classification: Concern, Authentication Required
Time to Exploit Zero-day
Disclosure DateCVE Assignment3/13/2025105 days with no CVE assignment yet
Zoom Contact Center Remote Control Functionality Insecure Notification Handling Access Weakness
VulnerabilityZoom contains a flaw in the Contact Center component that is triggered as the remote control functionality allows the display of a changed username in notifications when a user requests control over a user’s screen. This may allow a context-dependent attacker to spoof system notification and entice the user into unintentionally granting access to their system.
Product(s) Zoom workplace desktop app for Windows, Linux and MacOS, Zoom client for Linux, Chrome, MacOS, Android, iOS, and ChromeOS
ClassificationsAttack Type: Input Manipulation
Impact: Loss of Integrity
Solution: Solution Unknown
Disclosure: Discovered in the Wild
Time to Exploit Zero-day
Disclosure DateCVE Assignment3/24/202594 days without a CVE assignment

These examples illustrate key trends and provide actionable insights into our ability to deliver early warning awareness for vulnerabilities that may pose significant risk to your organization. They still do not have a CVE assignment, for over 90 days now, representing Microsoft Windows, Google Chrome and Zoom Workplace.

For reference, we keep a running list of all vulnerabilities we have published as prioritizations in Flashpoint’s Weekly Vulnerability Prioritization and Insights Report.

Turning Signal Into Action

As we close the first half of 2025, one theme is unmistakably clear: most security teams are overwhelmed, not by a lack of data, but by an abundance of unusable, incomplete, and poor-quality data. With disparate sources offering inconsistent, delayed, or partial information, teams are forced to navigate a fragmented landscape that obscures more than it reveals. This not only drains resources and delays response but also leaves organizations dangerously exposed to threats that are already in the wild.

What’s needed is not just more vulnerability data, but better vulnerability intelligence that is curated, timely, and built with exploitation awareness at its core. Security operations require clarity, not noise; prioritization, not paralysis. The vulnerabilities outlined in this report illustrate how critical it is to have a continuously updated, independent view that goes beyond CVEs, CVSS scores, and patch availability alone.

Flashpoint delivers precisely this: a consolidated and actionable intelligence source that addresses the limitations of traditional repositories like the NVD and open-sourced databases that rely on it. By offering deeper enrichment, exploitation context, and extended coverage including vulnerabilities with no official CVE Flashpoint transforms vulnerability management from a reactive scramble into a strategic advantage.

To learn more, check out the Flashpoint Method for Threat-Informed Vulnerability Prioritization for an in-depth view into how Flashpoint helps organizations deliver an 85% reduction in vulnerability triage, including the strategy and prioritization criteria. Previously only available for customers, we showcase how curated intelligence, supported by weekly insights, can help security teams cut through the noise.

Request a demo today.