May 06, 2025 • GreyNoise Blog
Verizon DBIR 2025: Edge KEVs Are Increasingly Left Unpatched — and More Often Exploited in Breaches
The 2025 Verizon Data Breach Investigations Report (DBIR) highlights a significant escalation in cybersecurity risks associated with edge vulnerabilities....
Executive Summary
The 2025 Verizon Data Breach Investigations Report (DBIR) highlights a significant escalation in cybersecurity risks associated with edge vulnerabilities. Known Exploited Vulnerabilities (KEVs) at the network edge are being exploited at eight times the previous rate, indicating a critical shift in attacker methodology. Despite the immediate risk posed by these unpatched systems, organizations continue to leave them vulnerable, facilitating successful breaches. This trend underscores the urgent need for rigorous patch management protocols and heightened visibility into edge infrastructure. Failure to address these gaps exposes enterprises to severe compromise. Security teams must prioritize remediation of KEVs to mitigate this growing threat landscape. The report serves as a stark warning that neglecting edge security posture directly correlates with increased breach likelihood. Immediate action is required to secure perimeter defenses against active exploitation campaigns targeting unpatched vulnerabilities.
Summary
Edge vulnerabilities are a critical and growing threat. The 2025 DBIR reveals an eightfold surge in exploitation, yet many remain unpatched despite immediate risk.
Published Analysis
The 2025 Verizon Data Breach Investigations Report (DBIR) highlights a significant escalation in cybersecurity risks associated with edge vulnerabilities. Known Exploited Vulnerabilities (KEVs) at the network edge are being exploited at eight times the previous rate, indicating a critical shift in attacker methodology. Despite the immediate risk posed by these unpatched systems, organizations continue to leave them vulnerable, facilitating successful breaches. This trend underscores the urgent need for rigorous patch management protocols and heightened visibility into edge infrastructure. Failure to address these gaps exposes enterprises to severe compromise. Security teams must prioritize remediation of KEVs to mitigate this growing threat landscape. The report serves as a stark warning that neglecting edge security posture directly correlates with increased breach likelihood. Immediate action is required to secure perimeter defenses against active exploitation campaigns targeting unpatched vulnerabilities. Edge vulnerabilities are a critical and growing threat. The 2025 DBIR reveals an eightfold surge in exploitation, yet many remain unpatched despite immediate risk. Edge vulnerabilities are a critical and growing threat. The 2025 DBIR reveals an eightfold surge in exploitation, yet many remain unpatched despite immediate risk.