Log4Shell, ProxyLogon and Atlassian bug top CISA’s list of routinely exploited vulnerabilities in 2021

The Cybersecurity and Infrastructure Security Agency (CISA) urged firms and different organizations Wednesday to take an extended, onerous take a look at its list of the top 15 routinely exploited vulnerabilities in 2021.

Log4Shell, Microsoft bugs ProxyLogon and ProxyShell in addition to a vulnerability affecting Atlassian products topped the list.

“We know that malicious cyber actors return to what works, which implies they aim these similar vital software program vulnerabilities and will proceed to take action till firms and organizations tackle them,” CISA Director Jen Easterly stated in an announcement.

“CISA and our companions are releasing this advisory to spotlight the danger that probably the most generally exploited vulnerabilities pose to each public and non-public sector networks,” Easterly stated.

CISA printed the list alongside cyber companies from the opposite international locations in the Five Eyes intelligence partnership.

The National Security Agency (NSA), Federal Bureau of Investigation (FBI), Australian Cyber Security Centre (ACSC), Canadian Centre for Cyber Security (CCCS), New Zealand National Cyber Security Centre (NZ NCSC), and the United Kingdom’s National Cyber Security Centre (NCSC-UK) labored alongside CISA to compile the list.

CISA famous that three of the top 15 routinely exploited vulnerabilities had been additionally routinely exploited in 2020: CVE-2020-1472 which impacts Windows merchandise; CVE-2018-13379, which impacts networking gear vendor Fortinet; and CVE-2019-11510, which impacts Pulse Secure merchandise.

The authorities companies defined that for many of the top exploited vulnerabilities, researchers or different actors released proof-of-concept code inside two weeks of the vulnerability’s disclosure, which they consider was “seemingly facilitating exploitation by a broader vary of malicious actors.”

When requested whether or not CISA needed researchers and analysts to cease releasing proof-of-concept code or wait a sure interval of time, a CISA spokesperson instructed The Record that proof of idea code “supplies a web profit to community defenders, permitting them to validate patches and take a look at mitigations.”

“CISA recommends researchers and analysts wait a minimum of two weeks to launch proof of idea code, as observations point out they are often exploited by malicious actors if launched earlier than mitigations are extensively obtainable or applied,” the spokesperson stated.

CVE-2021-26084 — the Atlassian bug — was cited as one occasion the place a proof of idea was launched inside per week of its disclosure, rapidly making it one of probably the most routinely exploited vulnerabilities.

“Attempted mass exploitation of this vulnerability was noticed in September 2021,” the discover defined. 

In addition to the much-discussed, extensively abused Log4j vulnerability and the Microsoft Exchange e-mail server bugs, the top 15 list consists of CVE-2021-40539 and CVE-2021-21972, distant code execution (RCE) vulnerabilities affecting merchandise from Zoho and VMware.

The Zoho vulnerability was used in the headline-grabbing attack on The Red Cross final yr.

The list of the top 15 routinely exploited vulnerabilities in 2021

“We are seeing a rise in the pace and scale of malicious actors taking benefit of newly disclosed vulnerabilities,” stated Lisa Fong, Director of the New Zealand Government Communications Security Bureau’s National Cyber Security Centre (NCSC).

She added that the advisory “underscores the significance of addressing vulnerabilities as they’re disclosed.”

Vulnerabilities affecting Microsoft Netlogon Remote Protocol (MS-NRPC), Microsoft Exchange Server, Pulse Secure Pulse Connect Secure, Fortinet FortiOS and FortiProxy rounded out the list. 

The authorities companies included a second list of different vulnerabilities they noticed being routinely exploited in 2021 that included bugs in merchandise from Accellion, SonicWall, Sudo, Checkbox Survey, QNAP and Citrix. 

“This report ought to be a reminder to organizations that unhealthy actors don’t must develop subtle instruments once they can simply exploit publicly identified vulnerabilities,” stated NSA Cybersecurity Director Rob Joyce. “Get a deal with on mitigations or patches as these CVEs are actively exploited.”

A second list of vulnerabilities the companies are involved about.

The discover consists of hyperlinks to patches for all of the vulnerabilities and mitigation steps organizations ought to take. 

In current weeks, a number of cybersecurity companies have warned that Log4Shell remains to be a difficulty regardless of the worldwide marketing campaign to patch the vulnerability after it first emerged in December.

This morning, Symantec stated an unnamed engineering firm with vitality and army prospects was hacked by the North Korean authorities using the Log4j vulnerability.

Yotam Perkal, vulnerability researcher at cybersecurity agency Rezilion, released a report that discovered 55% of purposes include an out of date model of Log4j in their newest variations. 

About 90,000 machines and 68,000 public-facing web servers are nonetheless susceptible to Log4Shell, in keeping with Perkal, who added that the time to patch the susceptible containers exceeded 100 days and on common took 80 days. 

David Wolpoff, CTO of safety firm Randori, instructed The Record that Log4j “was one of the worst vulnerabilities I’ve seen in my profession, and little doubt could have long-lasting impacts.”

“The breadth of the difficulty and the issue in figuring out what was affected implies that it will have an extended tail to it,” Wolpoff defined.

“Many of the impacted purposes had been additionally actually vital purposes: Vmware Horizon supplies virtualized desktops; Jamf and Mobileiron present machine administration (generally fleet-wide). 

Cyber insurance coverage firm Coalition additionally shared data exhibiting how the Microsoft Exchange vulnerabilities impacted cyber claims final yr. Of their policyholders, 1,000 had been uncovered through the preliminary set of Exchange vulnerabilities.

Organizations with lower than $25 million in income that used Microsoft Exchange had a 103% enhance in claims relative to organizations that didn’t use the device.

Jonathan has labored throughout the globe as a journalist since 2014. Before shifting again to New York City, he labored for information retailers in South Africa, Jordan and Cambodia. He beforehand lined cybersecurity at ZDNet and TechRepublic.



https://therecord.media/cisa-top-exploited-vulnerabilities-2021-log4shell-proxylogon-atlassian/

Related Posts