Skip to main content
Back to Home

Many of 2024's most exploited vulnerabilities were found in widely used third-party software rather than internally developed applications

April 8, 2025

Many of 2024's most exploited vulnerabilities were found in widely used third-party software rather than internally developed applications — This cybersecurity statistic was published by Black Kite in April 2025. It covers topics including CVEs, Vulnerabilities, Third-party. The original data appears in 2025 Supply Chain Vulnerability Report. For the full methodology and detailed findings, refer to the original report.

Source

View Original Report

Published on 4/8/2025

Share or Copy this stat

Frequently Asked Questions

What does this statistic say?

Many of 2024's most exploited vulnerabilities were found in widely used third-party software rather than internally developed applications This data was published by Black Kite and covers CVEs, Vulnerabilities, Third-party.

Where does this data come from?

This statistic comes from 2025 Supply Chain Vulnerability Report, published by Black Kite on April 8, 2025. You can view the original report at https://content.blackkite.com/ebook/2025-supply-chain-vulnerability-report/.

What cybersecurity topics does this cover?

This statistic relates to CVEs, Vulnerabilities, Third-party. Browse more statistics on CVEs or from Black Kite.

Want More Statistics Like This?

Get the latest cybersecurity stats delivered to your inbox every week

Stay Ahead of Cyber Threats

Join 1,000+ security professionals getting weekly insights