Pre-disclosure attacks climb as nearly 29% of exploited flaws are hit before public disclosure

March 21, 20262 min read2 sources
Share:
Pre-disclosure attacks climb as nearly 29% of exploited flaws are hit before public disclosure

Attackers are exploiting more vulnerabilities before defenders even know they exist. VulnCheck found that 28.96% of vulnerabilities observed as exploited in 2025 were attacked before public disclosure, up from 23.6% in 2024, according to a report cited by Infosecurity Magazine.

The increase points to a larger share of exploitation happening in the pre-disclosure window, often described as zero-day activity. While the summary did not name specific CVEs or victim organizations, the trend suggests attackers are finding or acquiring usable exploits earlier, and using them before vendors can issue public advisories or patches.

That matters because many of the most damaging campaigns in recent years have targeted internet-facing systems such as firewalls, gateways, and VPN appliances. When exploitation starts before disclosure, defenders lose the normal warning period between a public CVE and active attacks. Security teams may only realize they are exposed after compromise indicators emerge or emergency guidance is published.

The finding also fits a broader pattern documented by government and industry researchers. CISA’s Known Exploited Vulnerabilities catalog continues to grow, reflecting how often attackers weaponize flaws that offer reliable access. Google-owned Mandiant has also warned that time-to-exploit is shrinking, with some campaigns beginning before disclosure and many others following almost immediately after public details appear.

For defenders, the takeaway is straightforward: patching remains necessary, but it is no longer enough to treat disclosure day as the start of the risk window. Organizations with large external attack surfaces, especially those running edge devices or hard-to-update appliances, may need to prioritize asset inventory, exposure reduction, segmentation, and monitoring for suspicious behavior even before vendor alerts are available.

One caveat: the Infosecurity report summarizes VulnCheck’s research, but does not include the full methodology, dataset scope, or whether the 2025 figure is year-to-date. Those details will matter in judging how broadly the trend applies. Even so, the direction is clear: more attackers are operating inside the disclosure gap, and defenders are being forced to respond after exploitation has already started.

Share:

// SOURCES

// RELATED

‘Copy Fail’ is a real Linux security crisis wrapped in AI slop

A critical, actively exploited Linux kernel flaw (CVE-2024-1086) allows root access, but the disclosure was marred by controversial AI-generated text.

6 min readMay 5

Nearly every Linux system built since 2017 vulnerable to ‘Copy Fail’ flaw

A critical flaw, CVE-2024-5219, in the Linux kernel since 2017 allows local attackers to gain root access. Admins are urged to patch immediately.

6 min readMay 2

A critical flaw in 911 systems could allow attackers to disrupt emergency services

A critical 9.8 CVSS vulnerability (CVE-2024-6074) in Intrado 911 gateways allows attackers to disrupt emergency services. Learn how to patch it.

6 min readApr 27

Former ransomware negotiator pleads guilty in BlackCat conspiracy, exposing a critical insider threat

A former ransomware negotiator has pleaded guilty to conspiring with the BlackCat group, using his insider knowledge to help them attack U.S. companie

7 min readApr 25