The FBI and the U.S. Cybersecurity and Infrastructure Security Agency (CISA) joined counterparts in the UK and Australia today to announce the top 30 vulnerabilities exploited since the start of the pandemic.
The list, a joint effort with the Australian Cyber Security Centre (ACSC) and the UK’s National Cyber Security Centre (NCSC), details vulnerabilities – primarily Common Vulnerabilities and Exposures (CVEs) – “routinely exploited by malicious cyber actors in 2020 and those being widely exploited thus far in 2021.”
Many of the vulnerabilities are known ones for which patches exist, so they can typically be easily fixed. The agencies also recommended a centralized patch management system to prevent such oversights going forward.
Most of the vulnerabilities targeted in 2020 were disclosed during the last two years. “Cyber actor exploitation of more recently disclosed software flaws in 2020 probably stems, in part, from the expansion of remote work options amid the COVID-19 pandemic,” said a CISA statement. “The rapid shift and increased use of remote work options, such as virtual private networks (VPNs) and cloud-based environments, likely placed additional burden on cyber defenders struggling to maintain and keep pace with routine software patching.”
The widespread reliance on VPNs during the pandemic has led to calls for greater adoption of zero trust principles by governments and others. Zero trust has also been a cornerstone of the Biden Administration’s response to the Colonial Pipeline ransomware attack.
The Administration’s latest effort to protect critical infrastructure was also announced today. The Industrial Control Systems Cybersecurity Initiative is a voluntary, collaborative effort between the federal government and the critical infrastructure community to encourage and help with “deployment of technologies and systems that provide threat visibility, indications, detection, and warnings, and that facilitate response capabilities for cybersecurity in essential control system and operational technology networks.”
Biden Warns Cyber Attacks Could Lead to War
The announcements come the day after President Biden warned that cyber incidents could lead to a war.
“You know, we’ve seen how cyber threats, including ransomware attacks, increasingly are able to cause damage and disruption to the real world,” Biden said in remarks at the National Counterterrorism Center. “I can’t guarantee this, and you’re as informed as I am, but I think it’s more likely we’re going to end up — well, if we end up in a war, a real shooting war with a major power, it’s going to be as a consequence of a cyber breach of great consequence. And it’s increasing exponentially — the capabilities.”
The Most Exploited Vulnerabilities
Here are the 12 most exploited vulnerabilities announced today. The announcement follows MITRE’s recently released list of the 25 most dangerous software weaknesses.
Vendor | CVE | Type |
Citrix | CVE-2019-19781 | arbitrary code execution |
Pulse | CVE 2019-11510 | arbitrary file reading |
Fortinet | CVE 2018-13379 | path traversal |
F5- Big IP | CVE 2020-5902 | remote code execution (RCE) |
MobileIron | CVE 2020-15505 | RCE |
Microsoft | CVE-2017-11882 | RCE |
Atlassian | CVE-2019-11580 | RCE |
Drupal | CVE-2018-7600 | RCE |
Telerik | CVE 2019-18935 | RCE |
Microsoft | CVE-2019-0604 | RCE |
Microsoft | CVE-2020-0787 | elevation of privilege |
Netlogon | CVE-2020-1472 | elevation of privilege |
The agencies also urged organizations to prioritize these additional fixes:
- Microsoft Exchange: CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065
- Pulse Secure: CVE-2021-22893, CVE-2021-22894, CVE-2021-22899, and CVE-2021-22900
- Accellion: CVE-2021-27101, CVE-2021-27102, CVE-2021-27103, CVE-2021-27104
- VMware: CVE-2021-21985
- Fortinet: CVE-2018-13379, CVE-2020-12812, and CVE-2019-5591
Further reading: Top Vulnerability Management Tools