Yes. I tried to find any evidence for exploiting AVs (Home and Small Business versions). No evidence found.
Did you ever saw something like that?
I think there’s more to uncover here , I was able to find a few of these within a few minutes. I also know you were aware of the Microsoft examples.
Notable real-world examples
Microsoft Defender / Malware Protection Engine (CVE‑2021‑1647) — Microsoft acknowledged this as a zero‑day in the Malware Protection Engine and said it had been exploited in the wild. This is a canonical example of an AV engine vulnerability used by attackers.
Microsoft Defender (Malware Protection Engine) — CVE‑2021‑1647 (Jan 2021)
Proof summary: Remote code execution bug in the Defender scanning engine that Microsoft and CISA confirmed was exploited in the wild prior to the patch.
Sources: Microsoft/CISA advisory & Project Zero analysis.
Sophos XG Firewall (SFOS) — CVE‑2020‑12271 (Apr 2020)
Proof summary: Pre‑auth SQL injection in Sophos XG that Sophos discovered after seeing active attacks; multiple vendors and US health sector advisory documented in‑the‑wild exploitation (Asnarök malware observed).
Sources: Sophos advisory / NVD / HC3 alert / Rapid7 writeup.
Sophos Web Appliance — CVE‑2023‑1671 (Apr 2023; added to CISA KEV Nov 2023)
Proof summary: Pre‑auth command‑injection in the Sophos Web Appliance; CISA added CVE‑2023‑1671 to its Known Exploited Vulnerabilities (KEV) catalog after evidence of active exploitation.
Sources: NVD + CISA/KEV reporting and security press.
Sophos Firewall (SFOS) — CVE‑2022‑3236 (Sept 2022)
Proof summary: Critical code injection / RCE in Sophos firewall products; vendor patched and later warned of exploit attempts against older versions — Sophos confirmed active exploit attempts.
Sources: Sophos security advisory / government reporting.
Trend Micro Apex One (On‑Prem Management Console) — CVE‑2025‑54948 & CVE‑2025‑54987 (Aug 2025)
Proof summary: Critical command‑injection / RCE affecting the Apex One management console. Trend Micro stated they had observed at least one attempt to exploit the flaw in the wild and distributed emergency mitigations/patches. (Enterprise endpoint/management console = security product.)
Sources: Trend Micro advisory / Qualys & industry reporting.
6. (
Representative class example) — multiple endpoint/firewall vendors added to CISA’s KEV catalog
Proof summary: CISA’s Known Exploited Vulnerabilities catalog is an authoritative list of CVEs where evidence supports active exploitation; several security‑product CVEs (e.g., Sophos CVE‑2023‑1671) are present there. Use KEV to back any “exploited in the wild” claim.
Source: CISA KEV.