Morning Overview

Hackers are now exploiting vulnerabilities 7 days before patches exist — and hand off access in 22 seconds, Mandiant warns

A vulnerability tracked as CVE-2025-53770 and referred to as ToolShell is already being used against real targets, and the patch hasn’t caught up yet. On June 18, 2026, the U.S. Cybersecurity and Infrastructure Security Agency added the flaw to its Known Exploited Vulnerabilities Catalog, the federal government’s most urgent remediation list, confirming that attackers are actively leveraging it in the wild. Federal civilian agencies now face a mandatory deadline to fix or mitigate it. It is worth noting that, as of this writing, CVE-2025-53770 does not appear in any independently verifiable public vulnerability database outside of CISA’s own catalog process; the details below rely on what CISA and the linked NVD record provide.

The timing fits a pattern that Google Cloud’s Mandiant threat intelligence unit has been tracking through its incident-response caseload. In its M-Trends reporting, Mandiant has warned that attackers are weaponizing software flaws an average of seven days before a vendor ships a patch and, in some cases, handing off access to compromised systems in as little as 22 seconds. Those numbers come from real breach investigations, and they signal a fundamental shift: the traditional patch cycle is no longer a race defenders can expect to win.

What CISA and NIST have confirmed

CISA does not add a vulnerability to its catalog on speculation. Under Binding Operational Directive 22-01, inclusion requires evidence of active exploitation. The agency’s alert on CVE-2025-53770 states plainly that attackers are leveraging ToolShell against real targets and instructs federal agencies to remediate by a specified deadline or apply interim mitigations if a full fix is not yet available.

NIST’s National Vulnerability Database provides the technical layer. The NVD entry for CVE-2025-53770 consolidates the severity score, affected product identifiers, and cross-references to vendor advisories. Together, the two records form a confirmation loop: CISA certifies that exploitation is happening, and the NVD supplies the detail defenders need to respond.

By publishing both an exploitation confirmation and a remediation deadline in the same notice, CISA is treating ToolShell as an ongoing incident, not a theoretical risk. That framing matters. It compresses the decision window for every organization running affected software, whether or not they fall under the federal mandate.

What ToolShell does, based on available sources

Public details on the technical behavior of CVE-2025-53770 remain limited. Based on the NVD entry and the vendor advisories it references, ToolShell is a remote code execution vulnerability that allows an attacker to run arbitrary commands on a target system without prior authentication. In practical terms, a successful exploit gives the attacker an initial foothold, the ability to execute shell commands, install secondary payloads, or pivot deeper into the network, all before the victim organization has a patch to deploy. The name “ToolShell” appears to reflect this capability: the flaw effectively turns a legitimate software component into a remote shell for the attacker.

CISA’s catalog entry does not specify which product or vendor is affected beyond what the NVD record discloses, and the upstream vendor advisory has not been fully surfaced in the public record as of early June 2026. Security teams should consult the NVD listing directly for the most current affected-product identifiers and any available mitigation guidance. Because the flaw enables unauthenticated remote code execution, any exposed instance should be treated as a critical-priority item regardless of the organization’s normal patching cadence.

Why the Mandiant numbers matter, and where they need scrutiny

Mandiant’s seven-day and 22-second figures are drawn from the firm’s incident-response engagements, the same dataset that feeds its annual M-Trends reports. The numbers are consistent with a trend that multiple security vendors, including Rapid7, Qualys, and Google’s own Threat Analysis Group, have documented over the past two years: the window between vulnerability disclosure and first exploitation is collapsing.

That said, the specific methodology behind those metrics has not been published in a form that outside researchers can fully audit. It is not yet clear whether the seven-day average is a median, a mean, or a figure shaped by a small cluster of high-profile cases. The 22-second handoff, likely a measure of how quickly automated tooling or initial-access brokers transfer a foothold to a second operator, is striking but similarly difficult to verify independently. Until the underlying dataset is open to peer review, the figures function best as directional signals rather than precise benchmarks for formal risk models.

None of that diminishes the practical warning. Even if the real average is ten days instead of seven, or a minute instead of 22 seconds, the implication is the same: attackers are routinely inside networks before defenders have a patch to deploy.

What we still don’t know about ToolShell

CISA’s alert confirms exploitation but leaves significant gaps. The agency has not disclosed which threat actors are involved, what sectors have been hit, or how long exploitation was underway before the catalog listing. Vendor advisories referenced in the NVD entry may eventually fill those gaps, but as of early June 2026, the upstream details have not been fully surfaced in the public record.

The relationship between ToolShell and Mandiant’s broader metrics is also indirect. CVE-2025-53770 fits the profile of a vulnerability exploited at or before patch time, but no public source has explicitly tied this specific flaw to the seven-day or 22-second data points. Treating one confirmed case as proof of a systemic trend requires caution, even when the directional evidence lines up.

Security researchers have long observed that exploit brokers and initial-access sellers operate on dark-web forums, and compressed handoff times suggest increasing automation in those markets. But whether automated vulnerability chaining on underground platforms is the specific mechanism behind Mandiant’s 22-second figure has not been confirmed by any primary source in the current reporting cycle.

Three steps defenders should take before the next catalog entry drops

The practical response does not hinge on whether the exact numbers are seven days or ten. The confirmed pattern is clear enough to act on, and three steps can materially reduce exposure.

First, subscribe to CISA’s KEV catalog alerts. Every new entry should trigger an immediate internal review rather than waiting for a scheduled vulnerability scan. The catalog is updated in real time, and treating it as a passive reference rather than an active feed means losing the speed advantage it is designed to provide.

Second, cross-reference each new KEV entry against the NVD record. The NVD listing identifies affected products, available fixes, and any temporary mitigations that can shrink the exposure window while full remediation is underway. For ToolShell specifically, the NVD entry for CVE-2025-53770 is the starting point for identifying whether your environment is in scope.

Third, treat every catalog-listed vulnerability as an active incident. That means assigning an owner, setting an explicit internal deadline, and verifying that patches or mitigations have actually been deployed across all relevant systems. Assuming that routine update cycles will eventually close the gap is exactly the assumption attackers are now exploiting. The organizations that survive this shift will be the ones that stopped waiting for the patch and started hunting for the exposure.

More from Morning Overview

*This article was researched with the help of AI, with human editors creating the final content.