State of Exploitation - A look Into The 1H-2025 Vulnerability Exploitation & Threat Activity
In the first half of 2025, evidence of exploitation for the 432 KEVs added to VulnCheck was first observed across more than 74 unique sources, highlighting the importance of having broad source coverage to ensure the earliest detection of exploitation. A comparison can be seen from the 1H-2024 state of exploitation report.
Before publishing this article, VulnCheck produced a blog about Auditing ShadowServer for Unassigned CVEs. They said: We performed an extensive audit of ShadowServer’s daily detection snapshots. During this process, we identified vulnerabilities with active detections but no associated CVE ID, a major blind spot for defenders relying on structured vulnerability intelligence. Rather than let these gaps persist, we tracked down the original advisories and/or exploit proof-of-concepts and issued CVEs ourselves. In total, we contributed 30+ new CVEs through this audit process where exploitation evidence existed.