Top 30 Most Exploited Cybersecurity Vulnerabilities (Revealed By The FBI)

top 30 cybersecurity vulnerabilities

In a joint advisory published by the FBI, the U.S. Cybersecurity and Infrastructure Security Agency (CISA), and its UK and Australian counterparts provided details on the top 30 vulnerabilities. These were the most used exploits and vulnerabilities used by malicious cyber attackers in 2020 and thus far in 2021.  

Microsoft accounted for nine out of 30 cybersecurity vulnerabilities, with all of them being related to either arbitrary/remote code execution or domain impression. According to U.S. Government technical analysis, Citrix’s vulnerability became the most exploited flaw in 2020.

“Cyber actors continue to exploit publicly known—and often dated—software vulnerabilities against broad target sets, including public and private sector organizations worldwide. However, entities worldwide can mitigate the vulnerabilities listed in this report by applying the available patches to their systems and implementing a centralized patch management system.” 

Cybersecurity vulnerabilities to look out for in 2021

vulnerabilities exploited by cyber attackers

The report also mentioned that cyber attackers continued to target cybersecurity vulnerabilities in perimeter-type devices. Here are some organizations where users should prioritize fixing the following vulnerabilities:

Top 30 Vulnerabilities

ProductVendorCVEType
Netscaler Directory TraversalCitrixCVE-2019-19781Remote code execution
Pulse Secure Connect VPNPulseCVE 2019-11510Arbitrary file reading
FortioOS Secure Socket Layer VPNFortinetCVE 2018-13379Path traversal
Big IP Traffic Management User InterfaceF5- Big IPCVE 2020-5902Remote code execution
MobileIron Core & ConnectorMobileIronCVE 2020-15505Remote code execution
Microsoft Exchange Memory CorruptionMicrosoftCVE-2020-0688Remote code execution
Atlassian Confluence Server and Data Center Widget ConnectorAtlassianCVE-2019-3396Server-side template injection
Microsoft OfficeMicrosoftCVE 2017-11882Arbitrary code execution
Atlassian Crowd and Crowd Data CenterAtlassianCVE 2019-11580Remote code execution
Drupal versions before 7.58DrupalCVE 2018-7600Arbitrary code execution
Telerik User Interface (UI) for ASP.NETTelerik CVE 2019-18935Remote code execution
Microsoft SharePointMicrosoftCVE-2019-0604Arbitrary code execution
Windows Background Intelligent Transfer Service (BITS)MicrosoftCVE-2020-0787Arbitrary code execution
Windows Netlogon Remote Protocol (MS-NRPC)MicrosoftCVE-2020-1472Domain Impersonation
Microsoft ExchangeMicrosoftCVE-2021-26855Remote code execution
Microsoft ExchangeMicrosoftCVE-2021-26857Remote code execution
Microsoft ExchangeMicrosoftCVE-2021-26858Remote code execution
Microsoft ExchangeMicrosoftCVE-2021-27065Remote code execution
Pulse Connect Secure VPNPulseCVE-2021-22893Authentication bypass
Pulse Connect Secure VPNPulseCVE-2021-22894Buffer overflow vulnerability
Pulse Connect Secure VPNPulseCVE-2021-22899Remote code execution
Pulse Connect Secure VPNPulseCVE-2021-22900Unrestricted uploads
Accellion File Transfer ApplianceAccellionCVE-2021-27101SQL injection
Accellion File Transfer ApplianceAccellionCVE-2021-27102Command execution
Accellion File Transfer ApplianceAccellionCVE-2021-27103SSRF via a crafted POST
Accellion File Transfer ApplianceAccellionCVE-2021-27104Command execution
VMware vCenter SoftwareVmwareCVE-2021-21985Remote code execution
Fortinet FortiOSFortinetCVE-2018-13379Path traversal
Fortinet FortiOSFortinetCVE-2020-12812Improper authentication
Fortinet FortiOSFortinetCVE-2019-5591LDAP server impersonation

Similar Posts