The NSA has gathered enough cyber-attack data from Chinese hackers and has the list with the most exploited flaws.
In many cases, we see vulnerabilities that were fixed with patches one, two, or even three years ago.
Experts comment that most of these flaws indicate second-stage deployments.
The NSA (National Security Agency) has compiled a list with the top 25 most exploited vulnerabilities by Chinese state-supported hackers and released the relevant cybersecurity advisory to help agencies, companies, organizations, and web admins apply the corresponding mitigations.
CVE-2019-11510: Pulse Secure VPN arbitrary file reading flaw leading to the exposure of keys and passwords.
CVE-2020-3118: Flaw in Cisco IOS XR, which results in arbitrary code execution from an unauthenticated attacker.
CVE-2020-8515: DrayTek Vigor RCE with root privileges without authentication.
Oliver Tavakoli, CTO at Vectra, has shared the following comment with us on NSA’s list:
The breadth of products covered by this list of CVEs would indicate that the NSA has curated this list through the observation of many attacks undertaken by these actors. The exploits themselves also cover a broad range of steps in the cyberattack lifecycle, indicating that many of the attacks in which these exploits were observed were already pretty deep into the attack progression – and many were likely found only after-the-fact through deep forensic efforts rather than having been identified while the attacks were active.
Knowing what’s targeted is always valuable info, but in general, we can say that keeping your software up to date by applying all of the available patches and updates as soon as they become available is key.
The software vendors have fixed all of the above vulnerabilities - and in some cases, they were fixed since over a year ago. Thus, seeing them in lists like this indicates a lack of proper system maintenance practices and general negligence.
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: