;

2026 Supply Chain Vulnerability Report:

Velocity Without Visibility Is the New Supply Chain Crisis

By the Black Kite Research Group™

Download a PDF of this report.

;

2026 Supply Chain Vulnerability Report

Velocity Without Visibility Is the New Supply Chain Crisis

By the Black Kite Research Group™

INTRODUCTION

Vulnerabilities are a supply chain risk, not just an internal IT concern.

A single unpatched flaw in a vendor can cascade across thousands of downstream organizations, turning an isolated technical weakness into a systemic business disruption.


This is Black Kite's second annual Supply Chain Vulnerability Report. We produced this research because the rules of engagement fundamentally changed in 2025.

  • According to Mandiant, attackers routinely exploited vulnerabilities an average of seven days before public disclosure.
  • Furthermore, artificial intelligence fully entered the vulnerability conversation, acting simultaneously as a massive new attack surface and a powerful detection tool.

Defending against this velocity requires Third-Party Cyber Risk Management (TPCRM) teams to utilize intelligence that goes far beyond raw CVSS scores. In 2025, more than 48,000 CVEs were published globally. To cut through that volume, the Black Kite Research Group™ analyzed more than 1,240 high-priority CVEs and identified just 58 that posed a genuine, discoverable, and exploitable threat to enterprise supply chains.

CVEs published

High-priority CVEs analyzed

Matter to supply chains

This is proof that precision, not volume, is the competitive advantage.

What makes this report different:

Most vulnerability reports analyze isolated Common Vulnerabilities and Exposures (CVEs). We examine how those vulnerabilities propagate through vendor ecosystems. Rather than prioritizing theoretical severity, this report focuses exclusively on OSINT discoverability, real-world exploitability, and direct vendor exposure.

To deliver this level of precision, the Black Kite Research Group™ manually analyzed 1,240 high-priority CVEs in 2025 (a 59% increase from 2024) augmented by AI-powered analysis capabilities to match the scale of the threat.

The result: of more than 48,000 CVEs published in 2025, 800+ were exploited in the wild. Yet only 58 were OSINT-discoverable and exploitable enough to pose a genuine, targeted threat to enterprise supply chains.

This report delivers three core pillars of actionable intelligence:

Intelligence that helps organizations pinpoint which vendors in their supply chain are affected.

Which IT assets and products are at risk.

How threat actors are likely to exploit them, including new AI-specific vectors.

Who should read this report

This report is built for TPCRM leaders, CISOs, security operations teams, supply chain leaders and vendor risk managers. It provides the definitive data and methodology for anyone responsible for securing an extended vendor ecosystem and transitioning their program from reactive patching to proactive risk mitigation.

TABLE OF CONTENTS

01 | EXECUTIVE SUMMARY

Why Vulnerabilities Are Now a Supply Chain Crisis

02 | 2025 VS. 2024

The Year the Rules Broke

03 | THREAT ACTORS

Who Is Attacking Your Vendors

04 | THE AI FACTOR

AI Didn't Just Change the Attack Surface, It Expanded It

05 | PRIORITIZATION FRAMEWORK

Going from 48,000+ CVEs to the 58 That Matter

06 | ACTIONABLE INTELLIGENCE

How FocusTags® Work in the Real World

07 | VENDOR ENGAGEMENT

Evidence Over Questionnaires

08 | NEXT STEPS

What TPCRM Leaders Must Do Now

09 | METHODOLOGY

Read the Executive Summary

NEXT