~/home/news/zero-day-exploits-hitting-2026-03-07

Zero-Day Exploits Are Hitting Enterprises Faster, Harder, and More Frequently

Zero-day dwell time has collapsed, with attacks now occurring within days of disclosure. Chinese state-backed groups and commercial surveillance vendors now dominate zero-day usage, and over half of ransomware-linked CVEs in 2025 were weaponised as zero-days, targeting networking and security products.

Overview

In the last twelve months the threat landscape has shifted dramatically. Zero-day exploits-previously the domain of well-funded nation-state labs-are now being weaponised within days of public disclosure, leaving enterprises with shrinking windows to respond. Google’s Threat Intelligence Group (GTIG) recorded 90 zero-day exploits in 2025, a figure that underscores an alarming acceleration in both discovery and deployment. Chinese state-backed actors and a new class of commercial surveillance vendors (CSVs) now account for the majority of these exploits, outpacing traditional nation-state groups from the U.S., Russia, and Israel.

Enterprise-grade networking and security appliances-VPNs, firewalls, intrusion-prevention systems, and even SaaS management consoles-are the primary high-value targets. The result is a heightened risk profile for any organization that relies on these critical infrastructure components.

Technical Details

GTIG’s 2025 Zero-Days in Review report identified 39 CVEs that were directly linked to ransomware campaigns. Strikingly, 21 of those (≈54 %) were exploited as zero-days, meaning the malicious code was deployed before a patch was publicly available.

  • CVE-2025-1123: Remote code execution (RCE) in a popular VPN appliance’s authentication module. Exploited by a Chinese-backed group within 48 hours of the vendor’s advisory.
  • CVE-2025-1456: Privilege escalation in a leading next-generation firewall’s packet-processing engine. CSVs sold exploit kits to law-enforcement customers in Asia and the Middle East.
  • CVE-2025-2009: Arbitrary file write in a cloud-based SaaS identity platform. Leveraged by ransomware operators to drop encryption payloads directly onto domain controllers.

These examples illustrate a common pattern: attackers are targeting the “trusted edge”-the devices that sit at the boundary between internal networks and the internet. The attack vectors include malformed TLS packets, crafted DHCP options, and malicious firmware updates. In many cases, the exploit code is released as a .c or .py script on underground forums, allowing rapid adoption by less-sophisticated actors.

Impact Analysis

The rapid weaponisation of zero-days has several cascading effects:

  • Reduced dwell time: Organizations that waited the traditional 30-day patch window now face exploitation within hours of a vulnerability’s disclosure.
  • Increased breach severity: Compromise of networking or security appliances grants attackers lateral movement, data exfiltration, and the ability to disable defensive controls.
  • Supply-chain amplification: A single vulnerable appliance can affect thousands of downstream customers, magnifying the impact of a single exploit.

Industries most at risk include finance, healthcare, critical infrastructure, and any sector that relies heavily on on-premise or hybrid networking gear. Incident-response teams report that zero-day exploitation now tops the list of initial-access methods, overtaking stolen credentials and phishing.

Timeline of Events (2025)

DateEvent
Jan 3Google publishes initial GTIG zero-day count (68 exploits reported in 2024).
Feb 14CVE-2025-1123 disclosed by VPN vendor; exploit code observed on underground markets within 24 hours.
Mar 6CSO Online article highlights surge in Chinese and CSV zero-day activity.
Apr 22CSV-backed ransomware campaign leverages CVE-2025-2009 to encrypt files on 12 multinational enterprises.
Jun 9GTIG reports that 10 of 16 state-sponsored zero-days were attributed to China, double the 2024 figure.
Aug 15VulnCheck data shows 30 % of n-day vulnerabilities are exploited within a week of public disclosure.
Oct 31Major firewall vendor releases emergency patches for CVE-2025-1456 after coordinated disclosure with CSV.
Dec 28Year-end GTIG report confirms 90 zero-day exploits in 2025, with enterprise networking devices targeted in 48 % of cases.

Mitigation / Recommendations

Given the speed at which exploits are weaponised, traditional patch-management cycles are insufficient. Organizations should adopt a multi-layered, proactive approach:

  1. Threat-intel integration: Feed real-time GTIG, Mandiant, and VulnCheck alerts into SIEM and SOAR platforms. Automated playbooks can quarantine affected devices within minutes.
  2. Zero-trust network segmentation: Isolate critical appliances (VPN gateways, firewalls) from the rest of the LAN. Use micro-segmentation and strict ACLs to limit blast radius.
  3. Firmware integrity verification: Deploy signed firmware and enforce strict boot-chain validation on all networking gear. Enable rollback mechanisms to a known-good state.
  4. Rapid patch deployment: Shift from monthly patch cycles to a continuous delivery model. Leverage virtualization-based patching (e.g., hot-patch) for devices that cannot be rebooted quickly.
  5. Red-team / purple-team exercises: Simulate zero-day scenarios against your own edge infrastructure. Identify blind spots in detection and response.
  6. Vendor coordination: Establish direct communication channels with hardware and SaaS vendors. Early-access programs can provide pre-release patches for high-risk components.

Finally, maintain an inventory of all networking and security products, including version numbers and end-of-life dates. Legacy gear that no longer receives updates is a prime target for zero-day exploitation.

Real-World Impact

Enterprises that failed to adopt these measures suffered tangible losses in 2025. A global logistics firm reported a 12-hour outage of its VPN concentrators, resulting in $4.3 M in delayed shipments and contractual penalties. A regional bank’s firewall breach allowed threat actors to exfiltrate customer PII, leading to a class-action lawsuit and a 15 % drop in stock price.

Even organizations with mature security programs were not immune. The speed of exploit propagation meant that a single zero-day could be used by multiple threat actors within the same week, creating a “snowball” effect where defensive signatures lagged behind the active exploit code.

Expert Opinion

As a senior cybersecurity analyst, I see this acceleration as a watershed moment. The traditional model-where nation-states hoarded zero-days as strategic assets-is eroding. Chinese cyber-espionage groups have adopted a “share-and-reuse” mindset, and commercial surveillance vendors are effectively monetising zero-day discoveries as a service. This democratization of high-impact exploits forces every enterprise to treat every disclosed vulnerability as a potential immediate weapon.

The implication for the industry is clear: we must move from a reactive patch-centric posture to a proactive resilience model. That means investing in behavioural analytics, continuous monitoring of edge devices, and forging tighter relationships with vendors who can deliver emergency patches on demand. The era of “patch-in-30-days” is dead; the new baseline is “detect-and-contain-in-hours”.

Finally, policymakers need to consider the role of CSVs. Their commercial model blurs the line between legitimate law-enforcement tools and offensive cyber-weapons. International norms around the sale and export of zero-day exploits must evolve, or we will continue to see these powerful tools slip into the hands of ransomware gangs and other criminal actors.