Vulnerability Landscape Retrospective Highlights Growing Threats
High volumes of software vulnerabilities persist, with significant implications for security management efforts across organizations.
In a recent analysis by Cisco Talos, 2025 recorded an unprecedented number of vulnerabilities, totaling 48,196—approximately 132 per day. The report reveals that traditional vulnerabilities such as cross-site scripting, SQL injection, and deserialization account for nearly 10,000 CVEs. This enduring prevalence of basic software security flaws accentuates the urgent need for improved software engineering practices.
A particularly concerning detail from the Known Exploited Vulnerabilities Catalog shows a 30 percent rise in confirmed active exploits, with 241 vulnerabilities actively being targeted—up from 186 in 2024. Alarmingly, many of these issues originated from CVEs disclosed as far back as 2007, signaling challenges with the patch management of legacy systems. Organizations are urged to maintain thorough asset inventories and comprehend the software running in their environments. For systems that may not be easily patched, alternative safeguards like microsegmentation and enhanced monitoring are crucial to limiting potential damage.
The data indicates that network infrastructure, including firewalls and VPNs, faced disproportionate scrutiny, with 54 KEVs targeting these systems. The increase in vendor diversity, from 79 in the previous year to 99 in 2025, complicates patch management processes, requiring organizations to invest more time in vulnerability management.
In a new dimension, the analysis also quantified vulnerabilities associated with artificial intelligence, which saw a near-doubling from 168 to 330 compared to the previous year. Notably, terms such as “Model Context Protocol” and “Claude” were introduced this year, marking a shift in the landscape of vulnerabilities related to AI technologies. However, many emergent risks, including model inversion attacks and hallucination-based misinformation, are not fully represented in the CVE data.
Defensive Context
Organizations managing complex environments, especially with legacy systems or those leveraging AI technologies, should prioritize addressing these vulnerabilities. This activity highlights the necessity for enhanced visibility into software assets and processes in environments reliant on network infrastructure, where attackers are increasingly targeting known weaknesses.
Why This Matters
Given the ongoing exploitation of long-standing vulnerabilities, organizations with outdated systems or poorly monitored network appliances might be more exposed than ever. The rising trend in AI-related vulnerabilities suggests that organizations employing or developing AI technologies could face an increasing risk of exploitation.
Defender Considerations
Attention to patch management must focus not only on current vulnerabilities but also on legacy systems that may harbor exploitable issues. Organizations should consider implementing monitoring solutions that can identify exploitation attempts, particularly targeting network equipment.
Environment Exposure
This information is relevant for organizations with legacy systems that cannot be patched. The landscape will remain volatile, particularly for those relying on multifaceted network infrastructures or diverse technology stacks, especially considering the continually evolving threat landscape surrounding AI vulnerabilities.


