
CVE volumes head towards 50,000 in 2025, analysts claim
www.computerweekly.com
A heady mixture of converging trends is likely to cause the volume of disclosed common vulnerabilities and exposures (CVEs) to hit at least 45,000 and possibly even as high as 50,000 during 2025, setting a new world record.This is according to the Forum of Incident Response and Security Teams (First), a security non-profit organisation based in North Carolina in the US, which said this figure was about 11% higher than in 2024, and almost six times higher in 2023. It said this underscores the growing complexity of the security landscape, and means organisations must start to think more about their risk prioritisation and mitigation strategies.The number of reported vulnerabilities isnt just growing, its accelerating, saidEireann Leverett, First liaison and lead member of its Vulnerability Forecasting Team. Security teams can no longer afford to be reactive; they must anticipate and prioritise threats before they escalate.Firsts analysts attributed this surge to a number of factors shifting technological mores, disclosure policy changes and worldwide geopolitical chaos among them.A combination of new players in the CVE ecosystem, evolving disclosure practices, new disclosure legislation in Europe, and a rapidly expanding attack surface is fuelling this surge, said Leverett.Most importantly, on the tech side, the rapid adoption of open source software (OSS) and the use of artificial intelligence (AI) tools to aid in vulnerability discovery was surfacing more flaws, and making it easier to spot them.Added to this, new contributors to the CVE ecosystem, such as Linux and Patchstack, are also having an effect on discovery volumes, and updates to how vulnerabilities are assigned and reported coupled with some funding challenges are altering disclosure patterns.Read more about vulnerability and patch managementTimely patch management should be crucial in any organisation, but too often it goes by the wayside. Automating the process may offer a path forward for hard-pressed cyber defenders.These 12 tools approach patching from different perspectives. Understanding their various approaches can help you find the right product for your needs.Some risks, like security vulnerabilities and system downtime, are obvious, others not so much. Good patch management also requires weighing the possible risks of patching.And a growing amount of state-sponsored cyber activity by government-run actors often but not necessarily always Chinese, Iranian or Russian ones is leading to more weaknesses being uncovered and exploited.In terms of the types of CVEs being seen, First noted that memory safety vulnerability volumes are currently declining, while conversely, cross-site scripting (XSS) vulnerabilities seem to be on the up.Looking ahead, Leverett said he anticipated further growth in 2026, with an estimated minimum volume of just under 51,300 CVEs expected to surface.He said this emphasised the long-term challenges around vulnerability management best practice, and advised defenders to try to think about such things more strategically, rather than merely reacting to disclosures.What this means in practice is that security pros should prioritise vulnerabilities that pose the greatest risk of exploitation using threat intel and predictive insights rather than trying to patch everything everywhere all at once. At the same time, teams and resources can and should be scaled appropriately to optimise roll-out, and attack surface management. Planning here is key, said Leverett, and leaders should try to find ways of predicting patch effort in advance, including needed downtime.It may also be a good idea to prepare for changing disclosure trends, trying to anticipate surges in reports this can be easily done around Microsofts Patch Tuesday, although it may prove more challenging in general and allocating resources based on this.It is far more important, said Leverett, to understand how a sequence of vulnerabilities might hit the organisation and impact the security teams work, rather than constantly being on the lookout for the next black swan vulnerability, like Citrix Bleed or Log4Shell.Understanding the numbers is one thing, acting on them is what truly matters, he said. Organisations that use this data to guide their security planning can reduce exposure, mitigate risk and stay ahead of attackers.
0 Σχόλια
·0 Μοιράστηκε
·54 Views