2 min read

U.S Government Lists CVEs Most Exploited by Foreign Cyber Adversaries

Silviu STAHIE

May 13, 2020

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
U.S Government Lists CVEs Most Exploited by Foreign Cyber Adversaries

A joint report from the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI) and the broader U.S. government offers information about the commonly known vulnerabilities exploited by sophisticated foreign cyber actors.

Outdated software and hardware remain one of the most significant security problems for companies and organizations, and it”s a main route attackers looking for a way in will take. Not surprisingly, bad actors usually look for vulnerabilities that were never patched, even though, patches are usually available.

It”s true that attackers sometimes use zero-day vulnerabilities, exploits that are unknown and unpatched, but that”s the exception and not the rule.

“The public and private sectors could degrade some foreign cyber threats to U.S. interests through an increased effort to patch their systems and implement programs to keep system patching up to date,” says the advisory.

“A concerted campaign to patch these vulnerabilities would introduce friction into foreign adversaries” operational tradecraft and force them to develop or acquire exploits that are more costly and less widely effective. A concerted patching campaign would also bolster network security by focusing scarce defensive resources on the observed activities of foreign adversaries.”

The most exploited vulnerabilities between 2016 and 2019 are: CVE-2017-11882, CVE-2017-0199, CVE-2017-5638, CVE-2012-0158, CVE-2019-0604, CVE-2017-0143, CVE-2018-4878, CVE-2017-8759, CVE-2015-1641, and CVE-2018-7600.

According to cybersecurity specialists in the U.S. government, Microsoft”s Object Linking and Embedding (OLE) technology is often exploited, followed in second place by widespread Web framework known as Apache Struts.

Foreign actors from China, Iran, North Korea, and Russia are the most frequent users of vulnerabilities, looking for companies and organizations that have yet to apply the patches for the vulnerabilities mentioned above.

Finally, the landscape in 2020 looks a little bit different, with bad actors exploiting unpatched VPN vulnerabilities, for Citrix VPN or Pulse Secure VPN. Also, the surge of people working from home determined criminals to target organizations whose hasty deployed Microsoft O365 without implementing the necessary security measures.

The advisory also lists the mitigations for the mentioned vulnerabilities, which most of the time can be done just by installing the latest updates.

tags


Author



Right now

Top posts

Bitdefender Study Reveals How Consumers Like (and Dislike) Managing Passwords

Bitdefender Study Reveals How Consumers Like (and Dislike) Managing Passwords

October 26, 2021

3 min read
What are drive-by download attacks and how do you prevent them?

What are drive-by download attacks and how do you prevent them?

October 25, 2021

2 min read
Criminals Can't Wait to Add Your IoT Device to Their DDoS Networks

Criminals Can't Wait to Add Your IoT Device to Their DDoS Networks

October 22, 2021

2 min read
Six in 10 Consumers Faced a Cyber Threat in 2021, New Bitdefender Study Reveals

Six in 10 Consumers Faced a Cyber Threat in 2021, New Bitdefender Study Reveals

October 20, 2021

3 min read
What Is a VPN, How Does It Protect Me, and What Cool Perks Does it Offer?

What Is a VPN, How Does It Protect Me, and What Cool Perks Does it Offer?

September 23, 2021

2 min read
Ultimate Privacy Guide for Your Facebook Account

Ultimate Privacy Guide for Your Facebook Account

August 31, 2021

6 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Tesla reverses "Full self-driving" beta update after sudden braking reports Tesla reverses "Full self-driving" beta update after sudden braking reports
Graham CLULEY

October 27, 2021

2 min read
Ukrainian Police Arrest Underground Darknet Group Laundering Cryptocurrency for Hackers Ukrainian Police Arrest Underground Darknet Group Laundering Cryptocurrency for Hackers
Silviu STAHIE

October 26, 2021

1 min read
Bitdefender Study Reveals How Consumers Like (and Dislike) Managing Passwords Bitdefender Study Reveals How Consumers Like (and Dislike) Managing Passwords
Filip TRUȚĂ

October 26, 2021

3 min read