Exploitation Trends Underscore the Need for Layered Cybersecurity in Healthcare

Ransomware, cloud vulnerabilities and misconfigurations, bad bot traffic and phishing are among the top cybersecurity threats facing healthcare organizations today. To protect against these threats, organizations must have a robust security posture in place, including tactics such as security training, identity management and vulnerability patching.
With legacy technology being used by many health systems and the proliferation of Internet of Medical Things devices, patching is a crucial step to secure healthcare IT environments. However, new data from SonicWall suggests that patching alone isn’t enough. In its 2025 Threat Brief, SonicWall notes a 110% increase in attacks targeting Microsoft vulnerabilities, amounting to more than 6.9 million threats blocked by SonicWall firewalls.
Click the banner below to read the recent CDW Cybersecurity Research Report.
Crucially, the most commonly patched vulnerabilities weren’t always the most exploited. Remote code execution flaws made up 40% of vulnerabilities but accounted for only 19% of exploits. By contrast, elevation of privilege (EoP) bugs — which can be less visible but are often more dangerous — were the most exploited, accounting for 38% of real-world attacks.
“With over 1,000 vulnerabilities patched and millions of associated threats blocked, one thing is clear: Patching alone isn’t enough,” says Douglas McKee, executive director of threat research at SonicWall. “Attackers are moving faster than ever to exploit the paths that provide the most rewards and least resistance.”
The Most Common Vulnerabilities Aren’t the Most ExploitedSonicWall’s report indicates that, in the wild, hackers flock to what works. For example, security feature bypass methods accounted for just 8% of known vulnerabilities but represented 29% of exploits.

Image courtesy of SonicWall
These figures are a reminder that volume alone cannot guide patching priorities. Instead, healthcare organizations should also be guided by how attackers behave in the real world.
READ MORE: Strengthen healthcare cybersecurity with managed Patching as a Service.
Vulnerability Severity Isn’t Always What It SeemsBy volume, remote code execution vulnerabilities were the most common. They also accounted for 77% of the most critical vulnerabilities. But being the most common and most critical category of vulnerability didn’t make them most likely to be exploited.
For example, security feature bypass flaws were less common and less critical in severity than remote code execution vulnerabilities. However, SonicWall’s data revealed that they were frequently used to help attackers escalate access or disable security tools, and these actions can turn a moderate vulnerability into an exploit with critical consequences.
SonicWall also noted that Microsoft labeled 123 vulnerabilities as “Exploitation More Likely” in 2024, which is an important indicator for cyberdefense. However, only 10 of them made it onto the Cybersecurity and Infrastructure Security Agency’s Known Exploited Vulnerabilities Catalog. Two of those 10 had been labeled “Exploitation Less Likely,” demonstrating that even the best predictions can be undone by real-world cybercriminal behavior.

Image courtesy of SonicWall
Layered, Proactive Defenses Have Become MandatoryMicrosoft’s 2024 vulnerability landscape reflected the variety and volatility of cyberthreats over sheer volume. Patching is and always will be important, but figuring out how to prioritize patches is becoming more complicated.
“Organizations need a smarter, faster approach, one that blends real-time detection and response with layered defenses across every attack surface,” McKee says. He flagged the following as priorities:
- Identifying sophisticated privilege escalation attempts
- Neutralizing malware hidden in Office documents
- Blocking exploits before they reach users
- Having integrated protections across endpoints, email accounts and networks
“Organizations that invest in coordinated, intelligence-driven security aren’t just keeping pace with threats, they’re staying ahead of them,” he says. “That can often be the difference.”
healthtechmagazine