Untitled 2
Untitled 2
In 2024, the global cybersecurity field continued to face increasingly severe challenges. Against the
backdrop of digital transformation, vulnerability exploitation has become a top priority for
cyberattacks. According to statistics, the number of newly discovered vulnerabilities worldwide has
reached a new high, with the complexity of vulnerabilities increasing and the repair cycle
shortening. However, attackers' methods have become more sophisticated, with vulnerability-based
attack paths becoming more concealed and composite. The threat of vulnerabilities in open-source
projects, cloud computing, the Internet of Things (IoT), domestic software, and critical
infrastructure has significantly increased.
Looking ahead to 2025, the rapid development of artificial intelligence, quantum computing, cloud-
native architectures, and IoT will further expand the attack surface for vulnerabilities. The conflict
between vulnerability discovery, repair, and exploitation will become the focal point of future
offensive and defensive strategies. This report, based on the vulnerability data, typical cases, and
security incidents collected by Qi An Xin CERT in 2024, comprehensively presents the
vulnerability landscape. It also provides a forward-looking outlook on emerging technology trends
related to vulnerabilities in 2025, offering reference for enterprises, government agencies, and
cybersecurity practitioners.
Summary
Key Findings on the 2024 Vulnerability Landscape:
Continued Growth in Vulnerability Numbers: In 2024, 43,757 new vulnerabilities were discovered,
a year-on-year increase of 46.7%. Among these, 17.8% were high-risk vulnerabilities, indicating a
deepening overall threat level.
Shortening Time Window from Exposure to Exploitation: The average time from exposure to
exploitation has been reduced to 18 days, posing increasing challenges for timely identification and
patching of actual threats.
Vulnerabilities Facilitating APT Attacks: APT groups increasingly prefer to use zero-day
vulnerabilities and composite attack chains, targeting government, energy, financial, and domestic
software industries.
Increased Focus on Domestic Software Vulnerabilities: 706 vulnerabilities in domestic software
were disclosed, mainly concentrated in OA and ERP systems, exposing weaknesses in domestic
software security auditing capabilities.
High Threat from Supply Chain Vulnerabilities: Supply chain vulnerabilities are frequently
exploited, with notable cases like the XZ Utils backdoor incident, which had widespread
propagation and was difficult to repair.
Ransomware Continues to Benefit from Vulnerability Exploitation: Ransomware groups frequently
exploit vulnerabilities, with high-risk industries including healthcare, education, and energy.
3. Ransomware-Related Vulnerabilities
Ransomware groups frequently exploit vulnerabilities to gain initial access. Notable vulnerabilities
include those in ConnectWise ScreenConnect and JetBrains TeamCity.
Chapter 6: Conclusion
The 2024 vulnerability landscape indicates a continued increase in vulnerability numbers and a
comprehensive escalation of threats. Key areas of vulnerability outbreaks and industry-specific
threats have become more pronounced, with exploitation methods becoming more complex and
concealed. Looking ahead to 2025, the rapid development of AI, quantum computing, cloud-native
technologies, and IoT will further expand the vulnerability threat landscape, demanding higher
standards for network defense. Enterprises must adjust their security strategies promptly, building
proactive defense systems through technological upgrades, automated management, and threat
intelligence support to counter increasingly complex vulnerability threats.
This translation provides a comprehensive overview of the document's content, summarizing key
points and trends in the 2024 cybersecurity vulnerability landscape and offering insights into
emerging threats for 2025.