Top 30 Most Exploited Cybersecurity Vulnerabilities (Revealed By The FBI)

top 30 cybersecurity vulnerabilities

In a joint advisory published by the FBI, the U.S. Cybersecurity and Infrastructure Security Agency (CISA), and its UK and Australian counterparts provided details on the top 30 vulnerabilities. These were the most used exploits and vulnerabilities used by malicious cyber attackers in 2020 and thus far in 2021.  

Microsoft accounted for nine out of 30 cybersecurity vulnerabilities, with all of them being related to either arbitrary/remote code execution or domain impression. According to U.S. Government technical analysis, Citrix’s vulnerability became the most exploited flaw in 2020.

“Cyber actors continue to exploit publicly known—and often dated—software vulnerabilities against broad target sets, including public and private sector organizations worldwide. However, entities worldwide can mitigate the vulnerabilities listed in this report by applying the available patches to their systems and implementing a centralized patch management system.” 

Cybersecurity vulnerabilities to look out for in 2021

vulnerabilities exploited by cyber attackers

The report also mentioned that cyber attackers continued to target cybersecurity vulnerabilities in perimeter-type devices. Here are some organizations where users should prioritize fixing the following vulnerabilities:

Top 30 Vulnerabilities

Product Vendor CVE Type
Netscaler Directory Traversal Citrix CVE-2019-19781 Remote code execution
Pulse Secure Connect VPN Pulse CVE 2019-11510 Arbitrary file reading
FortioOS Secure Socket Layer VPN Fortinet CVE 2018-13379 Path traversal
Big IP Traffic Management User Interface F5- Big IP CVE 2020-5902 Remote code execution
MobileIron Core & Connector MobileIron CVE 2020-15505 Remote code execution
Microsoft Exchange Memory Corruption Microsoft CVE-2020-0688 Remote code execution
Atlassian Confluence Server and Data Center Widget Connector Atlassian CVE-2019-3396 Server-side template injection
Microsoft Office Microsoft CVE 2017-11882 Arbitrary code execution
Atlassian Crowd and Crowd Data Center Atlassian CVE 2019-11580 Remote code execution
Drupal versions before 7.58 Drupal CVE 2018-7600 Arbitrary code execution
Telerik User Interface (UI) for ASP.NET Telerik  CVE 2019-18935 Remote code execution
Microsoft SharePoint Microsoft CVE-2019-0604 Arbitrary code execution
Windows Background Intelligent Transfer Service (BITS) Microsoft CVE-2020-0787 Arbitrary code execution
Windows Netlogon Remote Protocol (MS-NRPC) Microsoft CVE-2020-1472 Domain Impersonation
Microsoft Exchange Microsoft CVE-2021-26855 Remote code execution
Microsoft Exchange Microsoft CVE-2021-26857 Remote code execution
Microsoft Exchange Microsoft CVE-2021-26858 Remote code execution
Microsoft Exchange Microsoft CVE-2021-27065 Remote code execution
Pulse Connect Secure VPN Pulse CVE-2021-22893 Authentication bypass
Pulse Connect Secure VPN Pulse CVE-2021-22894 Buffer overflow vulnerability
Pulse Connect Secure VPN Pulse CVE-2021-22899 Remote code execution
Pulse Connect Secure VPN Pulse CVE-2021-22900 Unrestricted uploads
Accellion File Transfer Appliance Accellion CVE-2021-27101 SQL injection
Accellion File Transfer Appliance Accellion CVE-2021-27102 Command execution
Accellion File Transfer Appliance Accellion CVE-2021-27103 SSRF via a crafted POST
Accellion File Transfer Appliance Accellion CVE-2021-27104 Command execution
VMware vCenter Software Vmware CVE-2021-21985 Remote code execution
Fortinet FortiOS Fortinet CVE-2018-13379 Path traversal
Fortinet FortiOS Fortinet CVE-2020-12812 Improper authentication
Fortinet FortiOS Fortinet CVE-2019-5591 LDAP server impersonation

Similar Posts