EY refers to the global organization, and may refer to one or more, of the member firms of Ernst & Young Global Limited, each of which is a separate legal entity. Ernst & Young Global Limited, a UK company limited by guarantee, does not provide services to clients.
How EY can help
-
EY helps government agencies address IT risk, cybersecurity and data privacy. Explore services that can transform outcomes for public sector organizations.
Read more
A dual focus on prevention and rapid response helps contain the blast radius of successfully executed exploits. Organizations relying solely on traditional security measures, such as infrequent patching, will find themselves ill-prepared for modern vulnerability exploits. A lack of awareness regarding the risk presented by such vulnerabilities can foster a false sense of security within an organization, so a comprehensive understanding of the threat landscape, coupled with advanced security measures, is essential.
This analysis explores how a defense-in-depth approach operationalizes prevention and rapid response capabilities by layering complementary tools and procedures. By treating VDR with the same urgency as TDR, organizations can reduce the window of exposure, limit the blast radius of successful exploits and build enduring resilience against evolving adversary tactics.
The ToolShell N-day exploit
On July 19, 2025, a critical N-day vulnerability, known as ToolShell (CVE-2025-53770), was exploited against a widely used, on-premises file-sharing platform in a worldwide attack. As reported by Eye Security (July 19, 2025), over 100 servers were compromised in the initial wave of exploitation. According to cybersecurity firm SentinelOne (July 22, 2025), “the early targets suggest that the activity was initially carefully selective, aimed at organizations with strategic value or elevated access.”
In the ToolShell attack chain, a crafted HTTP command is sent to a platform-specific uniform resource identifier (URI), where a logic flaw in the referrer header validation grants access to a legacy system page used for website configuration and management. This exploit gives attackers unauthenticated access to the platform’s content, exposing the network to remote code execution (RCE).
Even for organizations not directly affected by ToolShell, these events underscore the evolving threat landscape, where attackers relentlessly seek vulnerabilities in widely used software. ToolShell also highlights the importance of a swift response to CVE disclosure: A vulnerability in the ToolShell attack chain had been disclosed 10 days before the first observed widespread wave of attacks.
Leveraging defense-in-depth for mitigating vulnerability exploits
Vulnerability exploits take many forms, so there is no “silver bullet” that will provide organizations with adequate protection. Traditional cybersecurity measures, such as frequent patching and system hardening, must be augmented with a layered cybersecurity architecture that exemplifies the defense-in-depth design principle.
An effective defense-in-depth implementation addresses vulnerabilities across multiple attack surfaces and should include:
- Threat-aware workforce
- Web application firewalls (WAF)
- Endpoint detection and response (EDR)
- Privileged access management (PAM)
- Security information and event management (SIEM) with user and entity behavioral analysis (UEBA)