This mid-year report equips security leaders and operators with the contextual intelligence required to act decisively and goes beyond routine CVSS scoring and patch availability. It considers real-world consequences: how vulnerabilities are weaponized, what adversaries are favoring, and which vendor ecosystems- beyond the usual enterprise players- are drawing increased attention from threat actors.
This report also surfaces high-risk vulnerabilities that lack official CVE IDs, but present significant exploitation potential and business risk. These unofficial, but significant flaws, expose a fundamental gap in traditional vulnerability tracking systems, and underscore the importance of continuously managed, intelligence-driven vulnerability coverage.
To learn how to approach vulnerability and exposure management with threat-informed vulnerability prioritization, check out the Flashpoint Method for Threat-Informed Vulnerability Prioritization.
Learn More
Get an in-depth view into how Flashpoint helps organizations deliver an 85% reduction in vulnerability triage, including the strategy and prioritization criteria.
In the first half of 2025 alone, our analysts identified and suggested prioritization for 96 vulnerabilities out of more than 21,100 vulnerabilities published to Flashpoint VulnDB and Ignite. These vulnerabilities could affect enterprises because many are found in widely used products and all of them contain one or more of the following criterion:
An analysis of their exploit consequences reveals the potential impact across systems, data, and operations. This figure details the severity of potential breaches and their distribution among various exploit outcomes.
Exploit Consequences | Vulnerability Count |
RCE, including “Remote Command Execution” and “Remote Code Execution” | 31 |
Authentication Bypass | 8 |
Privilege Escalation | 7 |
Command Injection | 6 |
Information or Credential Disclosure | 4 |
Other (i.e. buffer overflow, denial of service, and default/hard-coded credentials | 40 |
The following dataset offers a compelling look at the vulnerability landscape from January to June 2025, specifically focusing on vulnerabilities that are remotely exploitable, have active exploits available, and possess a high CVSS score, rather than all vulnerabilities affecting the mentioned vendors during this period. This list highlights the continued dominance of tech giants like Amazon, Dell, and Microsoft at the top of the charts, underscoring the extensive and widespread usage of their technologies, demanding heightened attention.
Curiously, NASA’s three-time inclusion provides a unique data point, suggesting that even highly specialized and secure organizations are not immune to vulnerabilities. Furthermore, the significant presence of automation and ICS/IoT vendors such as Schneider, Siemens, Wiedmuller, and Eaton points to a growing concern within critical infrastructure and industrial control systems.
Vendor | Prioritized, Threat-Informed Vulnerabilities |
SUSE | 10 |
Dell | 9 |
Microsoft | 9 |
IBM | 8 |
Red Hat | 7 |
Amazon | 5 |
Canonical | 5 |
Software in the Public Interest | 5 |
Apache | 4 |
Cisco | 4 |
Apple | 4 |
4 | |
Apache | 4 |
Cisco | 4 |
Apple | 4 |
4 | |
Nilson Lazarin | 3 |
Palo Alto | 3 |
Ivanti | 3 |
NASA | 3 |
Fedora | 3 |
Oracle | 3 |
VMware | 2 |
D-link | 2 |
Zyxel | 2 |
Fortinet | 2 |
Sonicwall | 2 |
Siemens | 2 |
Opera | 2 |
Philips | 2 |
Three additional vulnerabilities we wanted to highlight on top of the ones already prioritized in the Weekly Vulnerability Prioritization and Insights Report are:
Microsoft Windows RAR File Extraction File Concealment Weakness | |
---|---|
Vulnerability Description | Microsoft Windows contains a flaw that is triggered when extracting files from specially crafted compressed RAR archives. This may allow a context-dependent attacker to hide extracted files when viewing directories in the Windows Explorer GUI. |
Product(s) | Windows 10, 11 |
Classifications | Attack Type: Input Manipulation Impact: Loss of Integrity Solution: Solution Unknown Disclosure: Discovered in the Wild |
Ransomware Likelihood | Medium |
Time to Exploit | Zero-day |
Disclosure DateCVE Assignment | 2/13/2025133 days with no CVE assignment yet |
Google Chrome chrome_elf.dll DLL Side-loading Local Code Execution Weakness | |
---|---|
Vulnerability Description | Google Chrome contains a flaw that is triggered when loading DLL files. This may allow a local attacker to load an attacker-controlled chrome_elf.dll library and execute arbitrary code. |
Product(s) | Google Chrome |
Classifications | Attack Type: Other Impact: Loss of Integrity Solution: Solution Unknown Disclosure: Discovered in the Wild FP Classification: Concern, Authentication Required |
Time to Exploit | Zero-day |
Disclosure DateCVE Assignment | 3/13/2025105 days with no CVE assignment yet |
Zoom Contact Center Remote Control Functionality Insecure Notification Handling Access Weakness | |
---|---|
Vulnerability | Zoom contains a flaw in the Contact Center component that is triggered as the remote control functionality allows the display of a changed username in notifications when a user requests control over a user’s screen. This may allow a context-dependent attacker to spoof system notification and entice the user into unintentionally granting access to their system. |
Product(s) | Zoom workplace desktop app for Windows, Linux and MacOS, Zoom client for Linux, Chrome, MacOS, Android, iOS, and ChromeOS |
Classifications | Attack Type: Input Manipulation Impact: Loss of Integrity Solution: Solution Unknown Disclosure: Discovered in the Wild |
Time to Exploit | Zero-day |
Disclosure DateCVE Assignment | 3/24/202594 days without a CVE assignment |
These examples illustrate key trends and provide actionable insights into our ability to deliver early warning awareness for vulnerabilities that may pose significant risk to your organization. They still do not have a CVE assignment, for over 90 days now, representing Microsoft Windows, Google Chrome and Zoom Workplace.
For reference, we keep a running list of all vulnerabilities we have published as prioritizations in Flashpoint’s Weekly Vulnerability Prioritization and Insights Report.
As we close the first half of 2025, one theme is unmistakably clear: most security teams are overwhelmed, not by a lack of data, but by an abundance of unusable, incomplete, and poor-quality data. With disparate sources offering inconsistent, delayed, or partial information, teams are forced to navigate a fragmented landscape that obscures more than it reveals. This not only drains resources and delays response but also leaves organizations dangerously exposed to threats that are already in the wild.
What’s needed is not just more vulnerability data, but better vulnerability intelligence that is curated, timely, and built with exploitation awareness at its core. Security operations require clarity, not noise; prioritization, not paralysis. The vulnerabilities outlined in this report illustrate how critical it is to have a continuously updated, independent view that goes beyond CVEs, CVSS scores, and patch availability alone.
Flashpoint delivers precisely this: a consolidated and actionable intelligence source that addresses the limitations of traditional repositories like the NVD and open-sourced databases that rely on it. By offering deeper enrichment, exploitation context, and extended coverage including vulnerabilities with no official CVE Flashpoint transforms vulnerability management from a reactive scramble into a strategic advantage.
To learn more, check out the Flashpoint Method for Threat-Informed Vulnerability Prioritization for an in-depth view into how Flashpoint helps organizations deliver an 85% reduction in vulnerability triage, including the strategy and prioritization criteria. Previously only available for customers, we showcase how curated intelligence, supported by weekly insights, can help security teams cut through the noise.