Appendix
PART 1: Methodology and Data Tables
A. Methodology
Black Kite Research Group Analysis Process
The findings within the 2026 Supply Chain Vulnerability Report are founded on a rigorous manual analysis process conducted by the Black Kite Research Group™. While automated scanners track the raw volume of disclosures, raw Common Vulnerability Scoring System (CVSS) data alone is insufficient for effective Third-Party Cyber Risk Management (TPCRM). To extract actionable intelligence, our researchers manually analyzed 1,240 high-priority Common Vulnerabilities and Exposures (CVEs) published in 2025.
This represents a 59% increase in manual analysis volume compared to the 780 high-priority CVEs analyzed in the 2024 reporting period. This escalating workload reflects the growing complexity of the digital supply chain and the rapid weaponization of newly disclosed flaws.
The criteria for designating a vulnerability as "high-priority" requires the flaw to extend beyond theoretical severity. The Black Kite Research Group evaluates vulnerabilities based on real-world exploitability, the prevalence of the affected product within enterprise supply chains, and the active interest of threat actors. Vulnerabilities that are strictly internal, highly theoretical, or confined to obscure hardware are filtered out of this high-priority dataset.
Data Sources
The quantitative and qualitative intelligence in this report aggregates telemetry and validated findings from multiple authoritative databases and external threat intelligence providers:

NVD
The National Vulnerability Database for baseline CVE publication data and CVSS metrics.

CISA KEV
The Cybersecurity and Infrastructure Security Agency's Known Exploited Vulnerabilities catalog, utilized to confirm active, real-world exploitation.

EPSS
The Exploit Prediction Scoring System, used to gauge the probabilistic likelihood of exploitation within a 30-day window.

Black Kite Proprietary Data
Internal scanning telemetry, OSINT collection, company-to-CVE mapping across 250,000 continuously monitored organizations, and proprietary FocusTags® risk tracking.

External Sources
Validated intelligence from Trend Micro, the Mandiant M-Trends 2026 report, and Google Threat Intelligence regarding AI vulnerability volumes and zero-day exploitation timelines.
FocusTag® Assignment Criteria
To operationalize vulnerability data, the Black Kite Research Group utilizes FocusTags®. A FocusTag® is only assigned when a vulnerability meets strict discoverability and exploitability thresholds, significantly reducing alert fatigue.
- OSINT Discoverability Requirement: A vulnerability must be identifiable on external-facing assets using Open-Source Intelligence (OSINT) tools. If attackers cannot see the vulnerability from the outside, it is highly unlikely to be exploited at scale across the supply chain.
- Exploitability Indicators: The vulnerability must exhibit dynamic risk indicators, including the public availability of Proof-of-Concept (PoC) exploit code, observed exploitation by threat actors, inclusion in the CISA KEV catalog, or surging mentions within underground and security communities.
Each FocusTag® is distributed with a transparent Confidence Level to dictate the urgency of vendor outreach:
- Very High: Direct, definitive evidence exists that the vulnerable product version is actively in use by the vendor.
- High: The specific product is identified on the vendor's perimeter, and the vast majority of deployed versions are known to be vulnerable.
- Medium: The specific product is identified, but only a limited subset of its versions is vulnerable. This tag requires monitoring or clarifying engagement to confirm exposure.
B. CVE Data Tables & Graphics
Table B.1: Top 20 CVEs by Company Match (2025) Note: This table reflects the vulnerabilities with the widest blast radius across the 250,000 continuously monitored organizations in Black Kite's dataset. The "Long Tail" of risk consists of vulnerabilities outside this top tier.
Table B.2: CISA KEV Additions by Month (2025) Total Additions: 245
Table B.3: Zero-Day Breakdown by Vendor (2025) Total Zero-Days Tracked: 99
Graphic B.4: Top 10 Vendors by Zero-Day Vulnerabilities in 2025
Graphic B.5: Monthly Distribution of Zero-Day Vulnerabilities (2025) Peak in March
Graphic B.6: Ransomware Victim Numbers
Graphic B.7: CVSS Range Distribution (2025 Analyzed CVEs)
Graphic B.8: EPSS Range Distribution (2025 Analyzed CVEs)
Graphic B.9: Out of all unique CVEs for MICROSOFT, 2,887 have been found in Patch Management findings in companies scanned by Black Kite from the past up to February 26, 2026.
Graphic B.11: Global Distribution of Vendor Vulnerabilities by Country
Graphic B.10: Companies Suspected to High-Priority OSINT-Discoverable Vulnerabilities
C. FocusTags Reference
Summary Statistics
- Total FocusTags Applied (2025): 158
- CVEs Covered by Tags: 329+
- Confidence Distribution:
- Very High: 50
- High: 93
- Medium: 15
By Product Category Concentration
D. Threat Actor Reference
Ransomware Groups (By Global Footprint)
Lockbit
Targeted organizations across
countries.
Qilin
Targeted organizations across
countries.
INC Ransom
Targeted organizations across
countries.
Akira
Targeted organizations across
countries.
Clop
Targeted organizations across
countries.
APT Groups (By Global Footprint & Exposure)
APT29
Targeted organizations across
countries.
APT41
Targeted organizations across
countries.
Volt Typhoon
Targeted organizations across
countries.
(Highest aggregate exposure score due to critical infrastructure targeting)
UNC5221
Generated an extreme exposure score of
based on deep vertical persistence.
E. AI Vulnerability Catalog
2025 AI Vulnerability Statistics
- Total AI-Related CVEs: 2,100+
- Proportion of Global CVEs: 4.42% of all published vulnerabilities
- High/Critical Severity AI CVEs: 641 total (124 Critical-severity, 517 High-severity)
Notable AI Supply Chain CVEs (2025)
PART 2: Glossary of Supply Chain Vulnerability Terms
For a full TPRM and TPCRM glossary, visit https://blackkite.com/knowledge-centers/tprm-tpcrm-glossary.
References:
- https://www.trendmicro.com/vinfo/us/security/news/threat-landscape/fault-lines-in-the-ai-ecosystem-trendai-state-of-ai-security-report - Trend Micro TrendAI™ State of AI Security Report
- https://deepstrike.io/blog/ai-cyber-attack-statistics-2025 - DeepStrike AI Cyber Attack Statistics 2025, Trends, Costs, Defense
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog - CISA KEV Catalog
- https://cloud.google.com/blog/topics/threat-intelligence/m-trends-2026 - Mandiant M-Trends 2026: Data, Insights, and Strategies From the Frontlines
- https://jerrygamblin.com/2026/01/01/2025-cve-data-review/ - 2025 CVE Data Review
- https://nvd.nist.gov/ - NVD NIST Database
- https://blackkite.com/report/2025-supply-chain-vulnerability-report/ - Black Kite, 2025 Supply Chain Vulnerability Report