GreyNoise has detected a significant surge in exploitation activity targeting two vulnerabilities — CVE-2022-47945 and CVE-2023-49103.
The alarming uptick in attacks underscores critical issues in vulnerability management and patch prioritization.
Cybercriminals are actively scanning and exploiting both vulnerabilities, though they are being perceived differently in terms of risk.
GreyNoise observed a substantial increase in exploitation attempts over the past 10 days, sparking urgent calls for action from the security community.
The contrasting treatment of these two vulnerabilities highlights a growing issue in vulnerability management.
CVE-2022-47945, though actively exploited, has not received the same level of attention due to its absence from KEV and its low EPSS score.
Meanwhile, CVE-2023-49103 continues to underline the importance of staying vigilant against already-flagged threats.
Key Lessons for Organizations:
To safeguard against these threats, security teams should:
This incident serves as a stark reminder of the challenges in fortifying cybersecurity perimeters. Real-time exploitation intelligence must become a cornerstone of enterprise risk management strategies.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free
In a significant discovery, PRODAFT's security research team has identified two critical vulnerabilities in the…
Threat actors have increasingly been leveraging legitimate remote monitoring and management (RMM) software to infiltrate…
Threat actors have recently been exploiting legacy drivers to bypass certificate validation, leveraging a technique…
In a stark revelation of the escalating cyber threat landscape, Flashpoint's latest intelligence report highlights…
In recent years, VPN vulnerabilities have emerged as a critical threat vector for organizations worldwide.…
A significant vulnerability in Microsoft Windows File Explorer, identified as CVE-2025-24071, has been discovered and…