This table is from a fairly small data-set of approximately 80 vendor reports from this 2017 – but it still provides a number of insights:
Effective exploits proliferate quickly
The #1 ranked exploit CVE-2017-0199 is extremely popular. It has been used by targeted attackers in locations as diverse as North Korea (FreeMilk), China (Winnti) and Iran (Oilrig).
It has also been heavily abused by criminal gangs such as some of those deploying Dridex.

The most popular vulnerabilities remain exploited for a long period of time
CVE-2012-0158 comes in as the third most referenced vulnerability. Sophos described the exploit as “arguably one of the most exploited vulnerabilities of the last decade” – and it continues to be extremely popular despite being 5 years old. This isn't a new phenomenon. Kaspersky reported that the Stuxnet vulnerability CVE-2010-2568 from 2010 was the exploit most seen by their users in 2015.
The most popular exploits are for Microsoft Windows and Office
Microsoft have exceptionally mature processes to prevent exploits. However, due to their software’s ubiquity, once an exploit does slip through and is discovered, it is used heavily.
The highest ranked exploit for an operating system other than Microsoft Windows is CVE-2013-6282. This has been used by Android malware to escalate privileges once installed on a victim’s phone.
What exploits are our customers seeing?
Using data from customer telemetry, the following table lists the exploits our customers have alerted on, in order of the number of times they have seen each exploit:
This data-set is very large, and consists of many billions of security events. However the data is heavily biased towards “noisy” network based exploit attempts from worms and exploit scanners. This explains why we’re still recording ancient vulnerabilities from 2001 in this table. Overall, we’d recommend the data in the prior table sourced from vendor reports if you’re interested on finding which exploits to prioritize a defense against.
Further work prioritizing exploits based on real world attacks is available from our friends at NopSec and Kenna Security.
Stay tuned for part 2 of this OTX blog series, where we’ll talk about malware trends!