Year in Review: Vulnerabilities old and new and something React2
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,抓住主要信息。 文章主要讨论了2025年的漏洞情况,特别是Talos的年度回顾。文中提到React2Shell成为攻击的最高比例,而Log4j和PHPUnit这样的旧组件仍然被攻击。这说明旧系统和依赖仍然是主要攻击目标。 另外,文章还提到Agentic AI的能力缩短了攻击者的时间,使得防御者压力增大。攻击者更关注身份验证系统,如MFA和网络设备,这可能导致更大的风险。 最后,防御建议包括评估身份相关组件、优先修补网络设备,并注意补丁周期带来的影响。 现在,我需要把这些要点浓缩成100字以内。重点放在旧系统、React2Shell、AI的影响、身份验证攻击以及防御建议上。 </think> 2025年网络安全报告指出,旧基础设施和依赖(如Log4j、PHPUnit)成为主要攻击目标。React2Shell在年末占据最高攻击比例。Agentic AI加速了漏洞利用速度,缩短了防御反应时间。攻击者聚焦身份验证系统(如MFA),扩大风险。报告建议企业优先修补网络设备,并关注补丁周期与政策漏洞。 2026-4-7 10:3:50 Author: blog.talosintelligence.com(查看原文) 阅读量:11 收藏

Speed and age shouldn’t be allowed to pair up, but that is the theme of the Talos 2025 Year in Review vulnerability findings.

Figure 1. React/React2Shell (2025) at the top, with PHPUnit (2017) and Log4j (2021) following up.

The year was characterized by an unending beat-down on infrastructure that relied on older enmeshed dependencies (e.g., Log4j and PHPUnit), while React2Shell rocketed to the highest percentage of attacks for the entire year within the last three weeks of 2025. Agentic AI's capacity for building and deploying new proofs-of-concepts and exploit kits lowered attacker time-to-exploit, and the landscape shifted for defenders. 

“The speed at which these CVEs climbed into the top tier reflects a larger systemic challenge: Newly disclosed vulnerabilities in widely deployed software can generate significant, organization-wide impact long before typical patch cycles catch up, leaving defenders with small reaction windows and escalating consequences for even short-lived exposure.” – 2025 Talos Year in Review

Top-targeted infrastructure 

Outdated infrastructure continues to expand the attack surface. Components like PHPUnit, ColdFusion, and Log4j are often embedded within applications, tightly coupled to legacy applications. Technologies age quickly, and companies are under pressure to adopt first, ask questions later. Low-use systems in a network can fossilize, unnoticed and unpatched. Others become mainstays that often cannot be swapped out or even patched without destabilizing an organization.  

Attackers prioritized software and firmware inside network appliances, identity-adjacent systems, and widely deployed open-source components: 

  • Remote code execution (RCE) flaws, which enable access without requiring user interaction, avoiding a need for social engineering  
  • Legacy systems and widely used components 
  • Perimeter devices, especially without endpoint detection and response (EDR) 
Figure 2. Top 50 network infrastructure CVEs.

The theme was identity, identity, identity. Controlling identity meant controlling access, so attackers focused on components that authenticate users, enforce access decisions, and broker trust between systems. A small number of vulnerabilities targeting these vectors drove outsized risk. This can invalidate multi-factor authentication (MFA) checks and bypass segmentation. 

Defender recommendations 

Attacker prioritization is now guided less by vulnerability age or maturity and more by exposure, exploitability, and proximity to trust, reshaping how organizations must think about risk in modern environments. 

Attackers exploit patching gaps and policy weaknesses in vendor lifecycles. Organizations should evaluate their identity-centric network components and management platforms and prioritize patching of network devices accordingly. 

For a more in-depth analysis of these trends, as well as how company size impacted CVE targeting trends, why the management plane matters, and the shortening window defenders have for putting defenses in place, see the 2025 Year in Review report.


文章来源: https://blog.talosintelligence.com/year-in-review-vulnerabilities-old-and-new-and-something-react2/
如有侵权请联系:admin#unsafe.sh