The first quarter of 2025 revealed continued publication of vulnerabilities discovered and fixed from 2024, with a shift towards older OS versions being targeted in attacks.
There was a notable delay between problem investigation and patch release, emphasizing the importance of reserving CVE IDs early.
Linux kernel vulnerabilities in Q1 2025 were predominantly related to CWEs like Null Pointer Dereference and Use after Free.
Microsoft software vulnerabilities in the same period commonly involved issues like Heap-based Buffer Overflow and Out-of-bounds Write.
Exploiting vulnerabilities in common CWEs demands sophisticated capabilities due to Linux's robust mitigations.
Windows exploits in Q1 2025 targeted vulnerabilities like CVE-2018-0802 and CVE-2017-11882, emphasizing the need for regular updates.
The most exploited Linux vulnerabilities included CVE-2022-0847 (Dirty Pipe) and CVE-2019-13272, highlighting the importance of system updates.
Published exploits in Q1 2025 mostly targeted operating systems, browsers, and Microsoft Office products.
APT attacks focused on exploiting vulnerabilities in perimeter devices and server software, with the Zerologon vulnerability reappearing in the top 10 list.
Prominent vulnerabilities included a Windows LNK file display flaw and a NetNTLM hash leakage vulnerability in the file system indexer.
To mitigate risks, it is crucial to promptly install updates, monitor infrastructure, implement strong patch management, and use effective cybersecurity solutions.