GreyNoise has detected a significant surge in exploitation activity targeting two vulnerabilities — CVE-2022-47945 and CVE-2023-49103.
The alarming uptick in attacks underscores critical issues in vulnerability management and patch prioritization.
Cybercriminals are actively scanning and exploiting both vulnerabilities, though they are being perceived differently in terms of risk.
GreyNoise observed a substantial increase in exploitation attempts over the past 10 days, sparking urgent calls for action from the security community.
The contrasting treatment of these two vulnerabilities highlights a growing issue in vulnerability management.
CVE-2022-47945, though actively exploited, has not received the same level of attention due to its absence from KEV and its low EPSS score.
Meanwhile, CVE-2023-49103 continues to underline the importance of staying vigilant against already-flagged threats.
Key Lessons for Organizations:
To safeguard against these threats, security teams should:
This incident serves as a stark reminder of the challenges in fortifying cybersecurity perimeters. Real-time exploitation intelligence must become a cornerstone of enterprise risk management strategies.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free
A new project has exposed a critical attack vector that exploits protocol vulnerabilities to disrupt…
A threat actor known as #LongNight has reportedly put up for sale remote code execution…
Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager Mobile…
Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular application…
The European Union has escalated its response to Russia’s ongoing campaign of hybrid threats, announcing…
Venice.ai has rapidly emerged as a disruptive force in the AI landscape, positioning itself as…