Vulnerability Prioritization: A Persistent Challenge in Cybersecurity
The Challenge of Vulnerability Prioritization Persists
Despite advances in vulnerability management, prioritizing flaws remains a significant challenge for defenders. According to recent research, only a small fraction of disclosed vulnerabilities are actually exploited in the wild. In 2025, for example, just 1% of over 40,000 disclosed vulnerabilities were exploited, as reported by CyberScoop.
Traditional Scoring Systems Losing Relevance
Traditional vulnerability scoring systems, such as CVSS ratings, are losing relevance in prioritizing security work. Many teams are shifting their focus to known exploited vulnerabilities, concentrating on verified risks rather than speculative scoring. This approach is driven by the reality that a significant number of vulnerabilities are not actively exploited.
Network Edge Devices Disproportionately Targeted
Network edge devices were disproportionately targeted in 2025, with 28% of products impacted by Known Exploited Vulnerabilities (KEV). Products from major vendors, including Microsoft, VMware, Oracle, Ivanti, SonicWall, and Fortinet, were repeatedly targeted. Notable attacks included four SharePoint zero-days, which compromised over 400 organizations, and React2Shell, which had 236 public exploits within a month.
“We need to reassess how technology can evolve to be more resilient to these attacks in the long term,” said Caitlin Condon, Vice President of Security Research at VulnCheck.
The Persistence of Vulnerability Prioritization Challenges
The persistence of vulnerability prioritization challenges is a symptom of a broader issue. As the number of disclosed vulnerabilities continues to grow, defenders must adapt their strategies to focus on the most critical flaws. This requires a nuanced understanding of the threat landscape and the ability to prioritize vulnerabilities based on real-world exploitation.
Recent Discoveries Highlight Importance of Proactive Management
The recent discovery of security flaws in Anthropic’s Claude Code, which could have enabled remote code execution and API credential compromise, serves as a reminder of the importance of proactive vulnerability management. Similarly, the patching of a critical command injection vulnerability in Zyxel routers, tracked as CVE-2025-13942, highlights the need for timely remediation.
Effective Vulnerability Management Requires a Multifaceted Approach
Ultimately, effective vulnerability management requires a multifaceted approach that incorporates threat intelligence, vulnerability scoring, and proactive remediation. By reassessing their strategies and focusing on verified risks, defenders can improve their resilience to cyberattacks and reduce the likelihood of exploitation.
