Networking-Forums.com

Professional Discussions => Vendor Advisories => Topic started by: Netwörkheäd on August 03, 2023, 06:13:57 PM

Title: US-CERT- 2022 Top Routinely Exploited Vulnerabilities
Post by: Netwörkheäd on August 03, 2023, 06:13:57 PM
2022 Top Routinely Exploited Vulnerabilities

[html]

SUMMARY


The following cybersecurity agencies coauthored this joint Cybersecurity Advisory (CSA):


This advisory provides details on the Common Vulnerabilities and Exposures (CVEs) routinely and frequently exploited by malicious cyber actors in 2022 and the associated Common Weakness Enumeration(s) (CWE). In 2022, malicious cyber actors exploited older software vulnerabilities more frequently than recently disclosed vulnerabilities and targeted unpatched, internet-facing systems.


The authoring agencies strongly encourage vendors, designers, developers, and end-user organizations to implement the recommendations found within the Mitigations section of this advisory—including the following—to reduce the risk of compromise by malicious cyber actors.


Download the PDF version of this report:






   

    AA23-215A PDF
    (PDF,       980.90 KB
  )

 


TECHNICAL DETAILS


Key Findings


In 2022, malicious cyber actors exploited older software vulnerabilities more frequently than recently disclosed vulnerabilities and targeted unpatched, internet-facing systems. Proof of concept (PoC) code was publicly available for many of the software vulnerabilities or vulnerability chains, likely facilitating exploitation by a broader range of malicious cyber actors.


Malicious cyber actors generally have the most success exploiting known vulnerabilities within the first two years of public disclosure—the value of such vulnerabilities gradually decreases as software is patched or upgraded. Timely patching reduces the effectiveness of known, exploitable vulnerabilities, possibly decreasing the pace of malicious cyber actor operations and forcing pursuit of more costly and time-consuming methods (such as developing zero-day exploits or conducting software supply chain operations).


Malicious cyber actors likely prioritize developing exploits for severe and globally prevalent CVEs. While sophisticated actors also develop tools to exploit other vulnerabilities, developing exploits for critical, wide-spread, and publicly known vulnerabilities gives actors low-cost, high-impact tools they can use for several years. Additionally, cyber actors likely give higher priority to vulnerabilities that are more prevalent in their specific targets' networks. Multiple CVE or CVE chains require the actor to send a malicious web request to the vulnerable device, which often includes unique signatures that can be detected through deep packet inspection.


Top Routinely Exploited Vulnerabilities


Table 1 shows the top 12 vulnerabilities the co-authors observed malicious cyber actors routinely exploiting in 2022:










































Table 1: Top 12 Routinely Exploited Vulnerabilities in 2022

CVE



Vendor



Product



Type



CWE



CVE-2018-13379



Fortinet



FortiOS and FortiProxy



SSL VPN credential exposure



CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')



CVE-2021-34473


(Proxy Shell)



Microsoft



Exchange Server



RCE



CWE-918 Server-Side Request Forgery (SSRF)



CVE-2021-31207


(Proxy Shell)



Microsoft



Exchange Server



Security Feature Bypass



CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')



CVE-2021-34523


(Proxy Shell)



Microsoft



Exchange Server



Elevation of Privilege



CWE-287 Improper Authentication



CVE-2021-40539



Zoho ManageEngine



ADSelfService Plus



RCE/


Authentication Bypass



CWE-287 Improper Authentication



CVE-2021-26084



Atlassian



Confluence Server and Data Center



Arbitrary code execution



CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')



CVE-2021- 44228


(Log4Shell)



Apache



Log4j2



RCE



CWE-917 Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')