International cyber agencies have jointly issued a Cyber Security Alert (CSA) showing an increase in cyber attackers initially exploiting zero-day vulnerabilities to compromise networks.
The CSA, “2023 Top Routinely Exploited Vulnerabilities,” details the top 15 Common Vulnerabilities and Exposures (CVEs) collected by the authoring agencies in 2023. Eleven of the 15 CVEs were initially exploited as a zero day – a vulnerability in a computer system unknown to its owner, developer, and the general public. In contrast, only two of the top exploited vulnerabilities were zero day in the 2022 report. ?
“All of these vulnerabilities are publicly known, but many are in the top 15 list for the first time,” said Jeffrey Dickerson, NSA’s cybersecurity technical director. “Network defenders should pay careful attention to trends and take immediate action to ensure vulnerabilities are patched and mitigated. Exploitation will likely continue in 2024 and 2025.” ?
In addition to the top 15 exploited CVEs, the CSA shares a comprehensive list of additional routinely exploited vulnerabilities. The authors are releasing the data points, along with previous annual reports, to assist in future trend analysis and retrospection. ?
The report urges vendors, designers, and developers to prioritize secure by default configurations and to ensure published CVEs include the proper Common Weakness Enumerations (CWEs) to identify the root cause of the vulnerability. It also advises end-user organizations to apply timely patches to systems, implement a centralized patch management system, use security tools (e.g., endpoint detection and response (EDR), web application firewalls, and network protocol analyzers), and ask software providers about their secure by design programs. ?
Co-authors include the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the National Security Agency (NSA), the Australian Signals Directorate’s Australian Cyber Security Centre (ASD ACSC), Canadian Centre for Cyber Security (CCCS), New Zealand National Cyber Security Centre (NCSC-NZ), Computer Emergency Response Team New Zealand (CERT NZ), and the United Kingdom’s National Cyber Security Centre (NCSC-UK).
The authoring agencies strongly encourage vendors, designers, developers, and end-user organizations to?implement the following recommendations, and those found within the Mitigations section of this advisory, to reduce the risk of compromise by malicious cyber actors.
- Vendors, designers, and developers. Implement secure by design and default principles and tactics to reduce the prevalence of vulnerabilities in your software. Follow the?SP 800-218?Secure Software Development Framework (SSDF) and implement secure by design practices into each stage of the software development life cycle (SDLC). Establish a coordinated vulnerability disclosure program that includes processes to determine root causes of discovered vulnerabilities. Prioritize secure by default configurations, such as eliminating default passwords and not requiring additional configuration changes to enhance product security. Ensure that published CVEs include the proper CWE field, identifying the root cause of the vulnerability.
- End-user organizations: Apply timely patches to systems. Note: If CVEs identified in this advisory have not been patched, check for signs of compromise before patching. Implement a centralized patch management system. Use security tools such as endpoint detection and response (EDR), web application firewalls, and network protocol analyzers. Ask your software providers to discuss their secure by design program, provide links to information about how they are working to remove classes of vulnerabilities, and to set secure default settings.
Technical Details
Key Findings
In 2023, malicious cyber actors exploited more zero-day vulnerabilities to compromise enterprise networks compared to 2022, allowing them to conduct cyber operations against higher-priority targets. In 2023, the majority of the most frequently exploited vulnerabilities were initially exploited as a zero-day, which is an increase from 2022, when less than half of the top exploited vulnerabilities were exploited as a zero-day.?
Malicious cyber actors continue to have the most success exploiting vulnerabilities within two years after public disclosure of the vulnerability. The utility of these vulnerabilities declines over time as more systems are patched or replaced. Malicious cyber actors find less utility from zero-day exploits when international cybersecurity efforts reduce the lifespan of zero-day vulnerabilities.
Cybersecurity Efforts to Include
Implementing security-centered product development lifecycles. Software developers?deploying patches to fix software vulnerabilities is often a lengthy and expensive process, particularly for zero-days. The use of more robust testing environments and implementing threat modeling throughout the product development lifecycle will likely reduce overall product vulnerabilities.
Increasing incentives for responsible vulnerability disclosure.?Global efforts to reduce barriers to responsible vulnerability disclosure could restrict the utility of zero-day exploits used by malicious cyber actors. For example, instituting vulnerability reporting bug bounty programs that allow researchers to receive compensation and recognition for their contributions to vulnerability research may boost disclosures.
Using sophisticated endpoint detection and response (EDR) tools. End users?leveraging EDR solutions may improve the detection rate of zero-day exploits. Most zero-day exploits, including at least three of the top 15 vulnerabilities from last year, have been discovered when an end user or EDR system reports suspicious activity or unusual device malfunctions.
Top Routinely Exploited Vulnerabilities
The top 15 vulnerabilities the authoring agencies observed malicious cyber actors routinely exploiting in 2023 with details also discussed below.
- CVE-2023-3519: This vulnerability affects Citrix NetScaler ADC and NetScaler Gateway.Allows an unauthenticated user to cause a stack buffer overflow in the NSPPE process by using a HTTP GET request.
- CVE-2023-4966:?This vulnerability affects Citrix NetScaler ADC and NetScaler Gateway.Allows session token leakage; a proof-of-concept for this exploit was revealed in October 2023.
- CVE-2023-20198:?This vulnerability affects Cisco IOS XE Web UI.Allows unauthorized users to gain initial access and issue a command to create a local user and password combination, resulting in the ability to log in with normal user access.
- CVE-2023-20273:?This vulnerability affects Cisco IOS XE, following activity from CVE-2023-20198.Allows privilege escalation, once a local user has been created, to root privileges.
- CVE-2023-27997:?This vulnerability affects Fortinet FortiOS and FortiProxy SSL-VPN.Allows a remote user to craft specific requests to execute arbitrary code or commands.
- CVE-2023-34362: This vulnerability affects Progress MOVEit Transfer.Allows abuse of an SQL injection vulnerability to obtain a sysadmin API access token.Allows a malicious cyber actor to obtain remote code execution via this access by abusing a deserialization call.
- CVE-2023-22515:?This vulnerability affects Atlassian Confluence Data Center and Server.Allows exploit of an improper input validation issue.Arbitrary HTTP parameters can be translated into getter/setter sequences via the XWorks2 middleware and, in turn, allow Java objects to be modified at run time.The exploit creates a new administrator user and uploads a malicious plugin to get arbitrary code execution.
- CVE-2021-44228: This vulnerability, known as Log4Shell, affects Apache’s Log4j library, an open source logging framework incorporated into thousands of products worldwide.?Allows the execution of arbitrary code.An actor can exploit this vulnerability by submitting a specially crafted request to a vulnerable system, causing the execution of arbitrary code.The request allows a cyber actor to take full control of a system.The actor can then steal information, launch ransomware, or conduct other malicious activity.Malicious cyber actors began exploiting the vulnerability after it was publicly disclosed in December 2021.
- CVE-2023-2868:?This is a remote command injection vulnerability that affects the Barracuda Networks Email Security Gateway (ESG) Appliance.Allows an individual to obtain unauthorized access and remotely execute system commands via the ESG appliance.
- CVE-2022-47966: This is an unauthenticated remote code execution vulnerability that affects multiple products using Zoho ManageEngine.Allows an unauthenticated user to execute arbitrary code by providing a crafted samlResponse XML to the ServiceDesk Plus SAML endpoint.
- CVE-2023-27350: This vulnerability affects PaperCut MF/NG.Allows a malicious cyber actor to chain an authentication bypass vulnerability with the abuse of built-in scripting functionality to execute code.
- CVE-2020-1472: This vulnerability affects Microsoft Netlogon.Allows privilege escalation.An unauthorized user may use non-default configurations to establish a vulnerable Netlogon secure channel connection to a domain controller by using the Netlogon Remote Protocol. Note: This CVE has been included in top routinely exploited vulnerabilities lists since 2021.
- CVE-2023-42793: This vulnerability can affect JetBrains TeamCity servers.Allows authentication bypass that allows remote code execution against vulnerable JetBrains TeamCity servers.
- CVE-2023-23397: This vulnerability affects Microsoft Office Outlook.Allows elevation of privilege.A threat actor can send a specially crafted email that the Outlook client will automatically trigger when Outlook processes it.This exploit occurs even without user interaction.
- CVE-2023-49103: This vulnerability affects ownCloud graphapi.Allows unauthenticated information disclosure.An unauthenticated user can access sensitive data such as admin passwords, mail server credentials, and license keys.
Mitigations
Vendors and Developers
The authoring agencies recommend vendors and developers take the following steps to help ensure their products are secure by design and default:
- Identify repeatedly exploited classes of vulnerability.Perform an analysis of both CVEs and known exploited vulnerabilities (KEVs) to understand which classes of vulnerability are identified more than others.Implement appropriate mitigations to eliminate those classes of vulnerability.If a product has several instances of SQL injection vulnerabilities, ensure all database queries in the product use parameterized queries and prohibit other forms of queries.
- Ensure business leaders are responsible for security.Business leaders should ensure their teams take proactive steps to eliminate entire classes of security vulnerabilities, rather than only making one-off patches when new vulnerabilities are discovered.
- Follow?SP 800-218 SSDF and implement secure by design practices into each stage of the SDLC; in particular, aim to perform the following SSDF recommendations:Prioritize the use of memory safe languages wherever possible [SSDF PW 6.1].Exercise due diligence when selecting software components (e.g., software libraries, modules, middleware, frameworks) to ensure robust security in consumer software products [SSDF PW 4.1].Set up secure software development team practices—this includes conducting peer code reviews, working to a common organization secure coding standard, and maintaining awareness of language-specific security concerns [SSDF PW.5.1, PW.7.1, PW.7.2].Establish a vulnerability disclosure program to verify and resolve security vulnerabilities disclosed by people who may be internal or external to the organization [SSDF RV.1.3] and establish processes to determine root causes of discovered vulnerabilities.Use static and dynamic application security testing (SAST/DAST) tools to analyze product source code and application behavior to detect error-prone practices [SSDF PW.7.2, PW.8.2].
- Configure production-ready products to have the most secure settings by default and provide guidance on the risks of changing each setting [SSDF PW.9.1, PW9.2].Prioritize secure by default configurations such as eliminating default passwords, implementing single sign on (SSO) technology via modern open standards, and providing high-quality audit logs to customers with no additional configuration necessary and at no extra charge.
- Ensure published CVEs include the proper CWE field identifying the root cause of the vulnerability to enable industry-wide analysis of software security and design flaws.
For more information on designing secure by design and default products, including additional recommended secure by default configurations, see CISA’s joint guide Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Security by Design and Default.
End-User Organizations
The authoring agencies recommend end-user organizations implement the mitigations below to improve their cybersecurity posture based on threat actors’ activity. These mitigations align with the cross-sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s?CPGs webpage?for more information on CPGs, including additional recommended baseline protections.
Vulnerability and Configuration Management
- Update software, operating systems, applications, and firmware on IT network assets in a timely manner [CPG 1.E].Prioritize patching KEVs, especially those CVEs identified in this advisory, then critical and high vulnerabilities that allow for remote code execution or denial-of-service on internet-facing equipment.For patch information on CVEs identified in this advisory, refer to the Appendix: Patch Information and Additional Resources for Top Exploited Vulnerabilities.If a patch for a KEV or critical vulnerability cannot be quickly applied, implement vendor-approved workarounds.Replace end-of-life software (i.e., software no longer supported by the vendor).
- Routinely perform automated asset discovery across the entire estate to identify and catalogue all the systems, services, hardware, and software.
- Implement a robust patch management process?and centralized patch management system that establishes prioritization of patch applications [CPG 1.A].Organizations that are unable to perform rapid scanning and patching of internet-facing systems should consider moving these services to mature, reputable cloud service providers (CSPs) or other managed service providers (MSPs).Reputable MSPs can patch applications (such as webmail, file storage, file sharing, chat, and other employee collaboration tools) for their customers. Note: MSPs and CSPs can expand their customer’s attack surface and may introduce unanticipated risks, so organizations should proactively collaborate with their MSPs and CSPs to jointly reduce risk [CPG 1.F]. For more information and guidance, see the following resources:CISA Insights’ Risk Considerations for MSP Customers.CISA Insights’ Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses.ACSC’s How to Manage Your Security When Engaging a MSP.
- Document secure baseline configurations for all IT/OT components, including cloud infrastructure.Monitor, examine, and document any deviations from the initial secure baseline [CPG 2.O].
- Perform regular secure system backups and create known good copies of all device configurations for repairs and/or restoration.Store copies off-network in physically secure locations and test regularly [CPG 2.R].
- Maintain an updated cybersecurity incident response plan that is tested at least annually and updated within a risk informed time frame to ensure its effectiveness [CPG 2.S].
Identity and Access Management
- Enforce phishing-resistant multifactor authentication (MFA) for all users without exception [CPG 2.H].
- Enforce MFA on all VPN connections.If MFA is unavailable, require employees engaging in remote work to use strong passwords [CPG 2.A, 2.B, 2.C, 2.D, 2.G].
- Regularly review, validate, or remove unprivileged accounts (annually at a minimum) [CPG 2.D, 2.E].
- Configure access control under the principle of least privilege [CPG 2.O].Ensure software service accounts only provide necessary permissions (least privilege) to perform intended functions (using non-administrative privileges where feasible). Note: See CISA’s Capacity Enhancement Guide – Implementing Strong Authentication and ACSC’s guidance on Implementing MFA for more information on authentication system hardening.
Protective Controls and Architecture
- Properly configure and secure internet-facing network devices, disable unused or unnecessary network ports and protocols, encrypt network traffic, and disable unused network services and devices [CPG 2.V, 2.W, 2.X].
- Harden commonly exploited enterprise network services, including Link-Local Multicast Name Resolution (LLMNR) protocol, Remote Desktop Protocol (RDP), Common Internet File System (CIFS), Active Directory, and OpenLDAP.
- Manage Windows Key Distribution Center (KDC) accounts (e.g., KRBTGT) to minimize Golden Ticket attacks and Kerberoasting.
- Strictly control the use of native scripting applications, such as command-line, PowerShell, WinRM, Windows Management Instrumentation (WMI), and Distributed Component Object Model (DCOM).
- Implement Zero Trust Network Architecture (ZTNA) to limit or block lateral movement by controlling access to applications, devices, and databases. Use private virtual local area networks [CPG 2.F, 2.X]. Note: See CISA’s Zero Trust Maturity Model and the Department of Defense’s Zero Trust Reference Architecture for additional information on Zero Trust.
- Continuously monitor the attack surface and investigate abnormal activity that may indicate cyber actor or malware lateral movement [CPG 2.T].
- Use security tools, such as endpoint detection and response (EDR) and security information and event management (SIEM) tools.
- Consider using an information technology asset management (ITAM) solution to ensure EDR, SIEM, vulnerability scanners, and other similar tools are reporting the same number of assets [CPG 2.T, 2.V].
- Use web application firewalls to monitor and filter web traffic.
- These tools are commercially available via hardware, software, and cloud-based solutions, and may detect and mitigate exploitation attempts where a cyber actor sends a malicious web request to an unpatched device [CPG 2.B, 2.F].
- Implement an administrative policy and/or automated process configured to monitor unwanted hardware, software, or programs against an allowlist with specified, approved versions [CPG 2.Q].
Supply Chain Security
- Reduce third-party applications and unique system/application builds—provide exceptions only if required to support business critical functions [CPG 2.Q].
- Ensure contracts require vendors and/or third-party service providers to:
- Provide notification of security incidents and vulnerabilities within a risk informed time frame [CPG 1.G, 1.H, 1.I].
- Supply a Software Bill of Materials (SBOM) with all products to enhance vulnerability monitoring and to help reduce time to respond to identified vulnerabilities [CPG 4.B].
- Ask your software providers to discuss their secure by design program, provide links to information about how they are working to remove classes of vulnerabilities, and to set secure default settings.
Download The Complete Report Here
OK Bo?tjan Dolin?ek
Very informative! Essential to spread this far and wide.. Let the people know!!
SEO Specialist | Driving Organic Growth & Enhancing Digital Presence | Expertise in Keyword Research, Content Optimization, and Data Analysis | Upwork Freelancer
2 周Looks like the hackers are getting bolder with their zero-day exploits! Time to patch up those vulnerabilities before they turn into full-blown data breaches. Remember, a stitch in time saves cybercrime. ????? If you haven't updated your security protocols yet, it's time to hit "patch" on those CVEs! #CyberSecurity #ZeroDayExploits #VulnerabilityManagement #EDR #PatchYourSystems #CyberResilience
Cyber Security Consultancy Services
2 周Insightful. I have to say 15 sounds low however, the recommendations workload makes it tricky for teams to react and protect, without the right tools?