TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Project Discovery

Year in Review: The Vulnerabilities That Defined 2025

2025-12-18 · Read original ↗

ATT&CK techniques detected

11 predictions
T1190Exploit Public-Facing Application
98%
"level issue enabling unauthenticated code execution meant that many applications became viable targets at once, regardless of how they were intended to be exposed. by the end of the year, it was increasingly difficult to argue that application frameworks could be treated as meani…"
T1190Exploit Public-Facing Application
94%
"played out in 2025 looking back, exploitation in 2025 didn ’ t follow a clean month - by - month progression. instead, activity clustered into phases shaped by attacker incentives and software deployment realities. phase 1 ( jan - mar ) : perimeter devices as entry points the yea…"
T1190Exploit Public-Facing Application
91%
"and acted on it. # 3 : cve - 2025 - 0108 — pan - os authentication bypass february reinforced a pattern defenders had encountered before. a request - parsing inconsistency between nginx and apache handlers in pan - os allowed authentication to be bypassed on firewall management i…"
T1190Exploit Public-Facing Application
74%
"emerged. attackers favored : - unauthenticated access - remote code execution - high - exposure software - low - complexity exploitation paths deserialization flaws, authentication bypasses, path traversal issues, and hardcoded credentials accounted for a significant share of imp…"
T1190Exploit Public-Facing Application
72%
"year in review : the vulnerabilities that defined 2025 6 min read year in review : the vulnerabilities that defined 2025 table of contents - a year of real - world exploitation - the five vulnerabilities that defined 2025 - # 1 : cve - 2025 - 55182 — react server components rce (…"
T1588.006Vulnerabilities
68%
"iterative process makes it possible to track how vulnerabilities move from disclosure into exploitation without relying solely on severity scores or vendor advisories. what 2025 highlighted for defenders the primary takeaway from 2025 isn ’ t that vulnerabilities suddenly became …"
T1190Exploit Public-Facing Application
67%
"organizational boundaries. asset inventories consistently lagged behind attacker activity. phase 3 ( jul - sep ) : ubiquity as an attack multiplier mid - year exploitation favored software with broad deployment. sharepoint, fortinet appliances, cisco infrastructure, and other wid…"
T1190Exploit Public-Facing Application
62%
"that shaped exploitation behavior in practice : the ones that forced emergency response, exposed recurring blind spots, and reduced the margin for delay in meaningful ways. the perspective here is grounded in real - world exploitation signals, exposure data, and community validat…"
T1190Exploit Public-Facing Application
60%
"##plier - phase 4 ( oct - dec ) : developer and update infrastructure - what attackers optimized for - how this activity was tracked - what 2025 highlighted for defenders - looking ahead authors a year of real - world exploitation if you work in security, you probably remember re…"
T1588.006Vulnerabilities
46%
"emerged. attackers favored : - unauthenticated access - remote code execution - high - exposure software - low - complexity exploitation paths deserialization flaws, authentication bypasses, path traversal issues, and hardcoded credentials accounted for a significant share of imp…"
T1190Exploit Public-Facing Application
39%
"##d, rotation wasn ’ t possible. every affected device remained vulnerable until patched. the vulnerability itself wasn ’ t complex, and that simplicity contributed to its impact. hardcoded credentials have continued to surface in enterprise products despite years of guidance to …"

Summary

A Year of Real-World Exploitation If you work in security, you probably remember React2Shell. Shortly after public disclosure, scanning activity increased, and exploitation attempts began to surface. That sequence showed up repeatedly across several of 2025’s most impactful vulnerabilities. Advisories were still circulating while attackers were already testing and operationalizing exploits. This wasn’t true for the thousands of CVEs published quietly throughout the year. But for a smaller set