Introduction
Most CVEs never get touched. The bulk sit in databases, patched quietly or ignored by attackers. But the ones that do matter move fast.
Once a CVE is public and proof-of-concept code appears, exploitation often follows in days. Exploit kits don’t innovate much. They recycle public PoCs and drop them into campaigns. That’s where the grace period collapses.
This dossier focuses on that slice: the path from disclosure to live exploitation. The aim is to show how weaponization happens, how quickly it unfolds, and where defenders should concentrate effort.
Historical Evolution
- 2006–2010: WebAttacker and MPack prove browser exploitation works: redirect → exploit → payload.
- 2010–2013: Blackhole dominates. Exploit kits become services with panels, updates, and paying customers.
- 2013–2016: Angler peaks. Malvertising, compromised sites, near-40% success rates at its height.
- 2014–Now: RIG survives takedowns. Public PoCs feed directly into its modules, targeting old stacks still online.
Kits never disappeared. They adapted into modular services that swap in new PoCs at speed.
The window between public CVE disclosure and active exploitation is shrinking. Understanding which vulnerabilities get weaponized quickly — and why — is the difference between proactive and reactive security.
Noorstream delivers threat intelligence, vulnerability management, and offensive security assessments for high-risk environments.
Technical Breakdown
Disclosure timelines
- Patches ship fast, but exploits ship faster.
- Exploits often surface within days.
- PoC release is the pivot. Exploitation spikes once code is public.
- CVE IDs are often assigned before publication. Unit 42 measured an average 40-day delay between assignment and public release, with some IDs remaining “reserved” for years. This gap leaves defenders in the dark.
Exploit development path
- Recon: review advisory, diff patch.
- PoC: crash → working exploit draft.
- Stabilize: ROP, heap spray, sandbox bypass.
- Weaponize: automate targeting + delivery.
- AI impact: tooling now cuts analysis cycles from weeks to hours. Some industry reports claim PoCs in minutes, though strong evidence remains limited.
Exploit kit design
- Traffic filters: IP, region, language.
- Proxies: disposable redirectors.
- Exploit hosts: browser/OS-specific modules.
- Decision engines: fingerprint victim → select exploit.
- Panels: push payloads, track hits, rotate modules.
This isn’t hobbyist code. It’s structured infrastructure built for repeatable compromise.
Case Studies
- Angler: At peak, compromised nearly 40% of traffic; ~$60M/year in ransomware.
- RIG: Still active. Around 30% success in 2022, hitting Windows 7 + IE stacks hardest.
- Purple Fox: Integrated CVE-2021-26411 within days of PoC release. Shows how fast cycles collapse.
Strategic Implications
For defenders
- Treat PoC-backed CVEs as live fire. Patch them first.
- Run two patch tracks: KEV/PoC vulnerabilities, then everything else.
- Kill browser and plugin debt.
- Monitor redirect chains, fingerprinting, and script injection — stronger signals than static IOCs.
For regulators
- Enforce clearer advisories.
- Hold ad networks accountable for malvertising.
- Push for standard PoC tagging to help enterprises triage faster.
For attackers (what they rely on)
- Patch delays.
- Legacy stacks kept for “compatibility.”
- Trust in third-party ad networks.
Future Outlook
Exploit kits will keep pulling in public PoCs at speed. AI-driven exploit generation shortens timelines further. The long tail of outdated systems stays profitable, while modular “as-a-service” kits continue to plug into wider criminal ecosystems.
Recent exploitation data from 2024–2025 confirms the acceleration: dozens of CVEs were weaponized within days of disclosure. The overall volume remains small, but the subset that matters is moving faster than ever.
Noorstream Perspective
Once a CVE is public and a PoC drops, treat it as live fire. Patch as priority. Don’t waste cycles arguing CVSS scores. Attackers don’t care.
Exploit kits feed on what defenders leave behind: unpatched stacks, old plugins, and ad networks that serve poisoned redirects. Shut those down. Track how fast you close PoC-to-patch gaps, and how much exploit traffic you block before it reaches landing pages. That’s the real measure of success.
References
Source: Google Cloud Threat Intelligence
Title: “Time Between Disclosure, Patch Release, and Vulnerability Exploitation”
Date: April 2024
URL: https://cloud.google.com/blog/topics/threat-intelligence/time-between-disclosure-patch-release-and-vulnerability-exploitation
Source Type: Primary Threat Report
Attribution Confidence: High
Source: Palo Alto Networks Unit 42
Title: “The State of Exploit Development”
Date: October 2023
URL: https://unit42.paloaltonetworks.com/state-of-exploit-development/
Source Type: Campaign/Exploit Analysis
Attribution Confidence: High
Source: Google Cloud Threat Intelligence
Title: “Time to Exploit Trends: 2023”
Date: January 2024
URL: https://cloud.google.com/blog/topics/threat-intelligence/time-to-exploit-trends-2023
Source Type: Primary Threat Report
Attribution Confidence: High
Source: VulnCheck
Title: “State of Exploitation: A Decade”
Date: December 2024
URL: https://vulncheck.com/blog/state-of-exploitation-a-decade
Source Type: Primary Data Analysis
Attribution Confidence: High
Source: VulnCheck
Title: “2024 Exploitation Trends”
Date: July 2024
URL: https://vulncheck.com/blog/2024-exploitation-trends
Source Type: Data Analysis
Attribution Confidence: High
Source: CISA / NSA (U.S. Government)
Title: “Top Routinely Exploited Vulnerabilities — Annual Report”
Date: December 2024
URL: https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3961769/cisa-nsa-and-partners-issue-annual-report-on-top-exploited-vulnerabilities/
Source Type: Government Threat Report
Attribution Confidence: High
Source: LRQA Cyber Labs
Title: “An Analysis of the RIG Exploit Kit”
Date: June 2022
URL: https://www.lrqa.com/en/cyber-labs/an-analysis-of-the-rig-exploit-kit/
Source Type: Campaign Summary
Attribution Confidence: High
Source: [RIG] RIG Exploit Kit: In-Depth Analysis
Title: “RIG Exploit Kit: In-Depth Analysis”
Date: 2022
URL: https://25491742.fs1.hubspotusercontent-eu1.net/hubfs/25491742/%5BRIG%5D%20RIG%20Exploit%20Kit_%20In-Depth%20Analysis.pdf
Source Type: Malware/Exploit Kit Analysis
Attribution Confidence: High
Source: Trend Micro
Title: “Executive Brief: Exploits-as-a-Service”
Date: 2016
URL: https://documents.trendmicro.com/assets/guides/executive-brief-exploits-as-a-service.pdf
Source Type: Executive/CTI Brief
Attribution Confidence: High
Source: Sophos
Title: “A Closer Look at the Angler Exploit Kit”
Date: July 2015
URL: https://news.sophos.com/en-us/2015/07/21/a-closer-look-at-the-angler-exploit-kit/
Source Type: Campaign Analysis
Attribution Confidence: High
Source: HP Wolf Security Threat Research
Title: “Purple Fox Exploit Kit Now Exploits CVE-2021-26411”
Date: March 2021
URL: https://threatresearch.ext.hp.com/purple-fox-exploit-kit-now-exploits-cve-2021-26411/
Source Type: Threat Research Note
Attribution Confidence: High
Source: Palo Alto Networks Unit 42
Title: “Angler Exploit Kit Continues to Evade Detection — Over 90,000 Websites Compromised”
Date: 2016
URL: https://unit42.paloaltonetworks.com/angler-exploit-kit-continues-to-evade-detection-over-90000-websites-compromised/
Source Type: Campaign Summary
Attribution Confidence: High
Source: Cisco Talos
Title: “Angler Exposed”
Date: 2015
URL: https://www.talosintelligence.com/angler-exposed/
Source Type: Threat Intelligence Report
Attribution Confidence: High
Source: SEI | Carnegie Mellon (CERT/CC)
Title: “Historical Analysis of Exploit Availability Timelines”
Date: August 2010
URL: https://www.sei.cmu.edu/library/historical-analysis-of-exploit-availability-timelines/
Source Type: Academic/Empirical Study
Attribution Confidence: High
Source: NIST | NVD
Title: “The CVE Process — Overview”
Date: 2023
URL: https://nvd.nist.gov/general/cve-process
Source Type: Program/Process Documentation
Attribution Confidence: High
Source: CVE Program (MITRE/Partners)
Title: “About CVE — Overview”
Date: 2023
URL: https://www.cve.org/about/overview
Source Type: Program/Process Documentation
Attribution Confidence: High

