Back to Intelligence

90 Zero-Day Exploits Uncovered in 2025: Enterprise Security Under Siege

SA
Security Arsenal Team
March 5, 2026
5 min read

90 Zero-Day Exploits Uncovered in 2025: Enterprise Security Under Siege

The digital battlefield intensified dramatically in 2025. According to the Google Threat Intelligence Group (GTIG), cyber actors actively exploited 90 zero-day vulnerabilities throughout the year. This isn't just a statistic; it is a clarion call for organizations relying on traditional "patch Tuesday" cycles to survive.

What makes this year's data particularly alarming is the target selection. Gone are the days when zero-days were reserved solely for high-value political targets or rare consumer devices. Nearly half of these exploits—specifically 40% to 50%—targeted enterprise software and appliances, including firewalls, VPN concentrators, and edge security devices.

The Shift to the Edge: An Analysis of the 2025 Threat Landscape

A zero-day vulnerability is a security flaw unknown to the vendor and for which no patch is available. When these are weaponized, organizations are left defenseless—unless they have robust behavioral detection and layered security controls.

The GTIG report highlights a strategic pivot by threat actors. Why focus on enterprise appliances?

  1. High Value: Edge devices like VPN gateways and secure email gateways sit at the perimeter. Compromising one provides an attacker with a beachhead into the internal network, often bypassing standard endpoint detection and response (EDR) sensors.
  2. Complex Codebases: Enterprise appliances often run monolithic codebases or legacy operating systems. Memory corruption vulnerabilities (CVEs involving buffer overflows or use-after-free errors) are more common and harder to patch in these environments than in modern SaaS applications.
  3. Difficult Patching: Unlike a workstation that updates automatically, a core firewall or load balancer requires maintenance windows, configuration backups, and rigorous testing. Attackers exploit this hesitation to patch.

The Mechanics of Exploitation

The exploits tracked in 2025 frequently utilized memory corruption vulnerabilities. Attackers craft specific inputs to overwrite memory pointers, allowing them to execute arbitrary code with system-level privileges. Once an edge device is compromised, attackers often deploy webshells or move laterally to Active Directory controllers.

Detection & Threat Hunting: Finding the Unknown

Since zero-days have no signatures, you cannot rely on simple antivirus definitions. You must hunt for the behavior of exploitation. Below are queries and scripts to help your SOC identify potential exploitation attempts on your network and endpoints.

Hunting for Suspicious Process Spawns (KQL)

Zero-day exploits often result in unusual process chains. For example, a web server process spawning a shell is a massive red flag. Use this KQL query in Microsoft Sentinel to detect anomalies in process creation events.

Script / Code
DeviceProcessEvents
| where Timestamp > ago(7d)
// Look for high-privilege or network services spawning shells
| where InitiatingProcessFileName in ("apache2", "nginx", "httpd", "java", "tomcat", "svchost.exe", "services.exe")
| where FileName in ("cmd.exe", "powershell.exe", "pwsh.exe", "bash", "sh")
| extend AccountName = tostring(split(AccountName, '\')[1]),
         AccountDomain = tostring(split(AccountName, '\')[0])
| project Timestamp, DeviceName, InitiatingProcessFileName, FileName, ProcessCommandLine, AccountName, AccountDomain
| order by Timestamp desc

Auditing Edge Appliances for Recent Crashes (Bash)

Exploitation attempts often cause the target service to crash (segfault) before the attacker succeeds in a stable exploit. Frequent crashes on an edge appliance are a precursor to compromise. This script checks system logs for segmentation faults in the last 24 hours.

Script / Code
#!/bin/bash
# Check for segmentation faults or kernel panics in the last 24 hours

LOG_FILE="/var/log/syslog"
if [ ! -f "$LOG_FILE" ]; then
  LOG_FILE="/var/log/messages"
fi

echo "Checking for recent application crashes (segfaults/panics)..."

grep -i "segfault\|general protection fault\|kernel panic" "$LOG_FILE" \n  | awk '$1 " " $2 >= strftime("%b %d", systime() - 86400)' \n  | tail -20

if [ $? -ne 0 ]; then
  echo "No recent crash logs found."
fi

Checking for Memory Integrity Issues (PowerShell)

On Windows endpoints and servers, attackers attempt to bypass Control Flow Guard (CFG) or exploit memory corruption. This PowerShell snippet checks for Event ID 1 (Kernel-Object-Manager) or specific memory protection violations often associated with exploit attempts.

Script / Code
# Check for Memory integrity / Exploit Guard violations in System logs
$Events = Get-WinEvent -LogName System -FilterXPath "*[System[(EventID=1)]]" -ErrorAction SilentlyContinue

if ($Events) {
    Write-Host "Found potential memory integrity events:" -ForegroundColor Yellow
    $Events | Select-Object TimeCreated, Id, LevelDisplayName, Message | Format-Table -Wrap
} else {
    Write-Host "No critical memory integrity events found in System logs." -ForegroundColor Green
}

Mitigation: Moving Beyond Patching

While patching is the ultimate fix, the 90 zero-days in 2025 prove that you cannot patch your way out of this problem alone. You need a proactive defense posture.

  1. Aggressive Surface Area Reduction: If you aren't using a specific service, protocol, or interface on an edge appliance, disable it. The best way to survive a zero-day in the VPN service is to not expose the VPN service to the entire internet. Implement strict access control lists (ACLs) allowing access only from known source IPs (e.g., corporate IP ranges or VPN gateways).
  2. Zero Trust Network Access (ZTNA): Assume the perimeter is breached. Implement identity-based micro-segmentation. If a firewall is exploited, the attacker should not be able to pivot laterally because every lateral move requires strong MFA and device posture validation.
  3. Unified Monitoring: Don't let edge appliances log into a void. Aggregate firewall, VPN, and load balancer logs into your SIEM. Correlate a "login" on the firewall with an "executable launch" on a server.
  4. Virtual Patching: Utilize Intrusion Prevention Systems (IPS) and Web Application Firewalls (WAF) with virtual patching capabilities. Vendors often release signatures to block the exploitation attempt for a vulnerability before the software patch is available.

Conclusion

The record number of zero-days in 2025 confirms that we are in an arms race. Cybercriminals are investing heavily in finding bugs in the very infrastructure we trust to keep us safe. Security Arsenal is here to help you turn the tide. By shifting focus from reactive patching to proactive hunting and architectural hardening, we can stop these attacks before they become breaches.


Related Resources

Security Arsenal Managed SOC Services AlertMonitor Platform Book a SOC Assessment soc-mdr Intel Hub

socthreat-intelmanaged-soczero-daythreat-intelligencevulnerability-managemententerprise-securitygoogle-gtig

Is your security operations ready?

Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.