768 CVEs Exploited in 2024, Reflecting a 20% Improve from 639 in 2023

Feb 03, 2025Ravie LakshmananVulnerability / Community Safety

As many as 768 vulnerabilities with designated CVE identifiers had been reported as exploited within the wild in 2024, up from 639 CVEs in 2023, registering a 20% enhance year-over-year.

Describing 2024 as “another banner year for threat actors targeting the exploitation of vulnerabilities,” VulnCheck stated 23.6% of identified exploited vulnerabilities (KEV) had been identified to be weaponized both on or earlier than the day their CVEs had been publicly disclosed.

This marks a slight lower from 2023’s 26.8%, indicating that exploitation makes an attempt can happen at any time in a vulnerability’s lifecycle.

“During 2024, 1% of the CVEs published were reported publicly as exploited in the wild,” VulnCheck’s Patrick Garrity stated in a report shared with The Hacker Information. “This number is expected to grow as exploitation is often discovered long after a CVE is published.”

Cybersecurity

The report comes over two months after the corporate revealed that 15 completely different Chinese language hacking teams out of a complete of 60 named menace actors have been linked to the abuse of a minimum of one of many high 15 routinely exploited vulnerabilities in 2023.

“Not surprisingly, the Log4j CVE (CVE-2021-44228) is associated with the most threat actors overall, with 31 named threat actors linked to its exploitation,” Garrity famous late final 12 months, including the corporate recognized 65,245 hosts doubtlessly susceptible to the flaw.

In all, there are roughly 400,000 internet-accessible techniques doubtless vulnerable to assaults stemming from the exploitation of 15 safety shortcomings in Apache, Atlassian, Barracuda, Citrix, Cisco, Fortinet, Microsoft, Progress, PaperCut, and Zoho merchandise.

“Organizations should evaluate their exposure to these technologies, enhance visibility into potential risks, leverage robust threat intelligence, maintain strong patch management practices, and implement mitigating controls, such as minimizing internet-facing exposure of these devices wherever possible,” VulnCheck stated.

Discovered this text fascinating? Comply with us on Twitter and LinkedIn to learn extra unique content material we put up.

Recent articles

Cisco Finds DeepSeek R1 Extremely Weak to Dangerous Prompts

DeepSeek R1, a cost-efficient AI mannequin, achieves spectacular reasoning...

PyPI Introduces Archival Standing to Alert Customers About Unmaintained Python Packages

Feb 03, 2025Ravie LakshmananOpen Supply / Software program Safety The...

6 Finest No-Log VPNs for 2025: Reviewed & Examined

When a VPN supplier claims to have a “no-logs...