Skip Navigation

August 4, 2023 |

Top exploited vulnerabilities of 2022 revealed

Loading table of contents...

The Five Eyes intelligence alliance, consisting of Australia, Canada, New Zealand, the US, and the UK, released a list of the most exploited vulnerabilities observed in 2022.

The alliance noted that threat actors focused their efforts on unpatched systems vulnerable to historical vulnerabilities left exposed on the internet, rather than exploiting recently discovered vulnerabilities, likely due to the availability of proof-of-concept exploit code. The most exploited vulnerability is CVE-2018-13379, a Fortinet SSL VPN vulnerability, for which a patch has been available since May 2019.

Of the over 25,000 new security vulnerabilities discovered in 2022, only five made the alliance’s list, shown below:

CVE
Vendor
Product
Type

CVE-2018-13379

Fortinet

FortiOS and FortiProxy

SSL VPN credential exposure

CVE-2021-34473 (ProxyShell)

Microsoft

Exchange Server

Remote code execution (RCE)

CVE-2021-31207 (Proxy Shell)

Microsoft

Exchange Server

Security feature bypass

CVE-2021-34523 (Proxy Shell)

Microsoft

Exchange Server

Elevation of privilege

CVE-2021-40539

Zoho

ADSelfService Plus

RCE/authentication bypass

CVE-2021-26084

Atlassian

Confluence Server/Data Center

Arbitrary code execution

CVE-2021- 44228 (Log4Shell)

Apache

Log4j2

RCE

CVE-2022-22954

VMware

Workspace ONE

RCE

CVE-2022-22960

VMware

Workspace ONE

Improper privilege management

CVE-2022-1388

F5 Networks

BIG-IP

Missing authentication

CVE-2022-30190

Microsoft

Multiple Products

RCE

CVE-2022-26134

Atlassian

Confluence Server/Data Center

RCE

Source: Bleeping Computer

Analysis

This marks the third year in a row that CVE-2018-13379 has made it on this list. The fact that a vulnerability patched in 2019 is the most commonly exploited vulnerability four years later shows that as long as unpatched systems remain exposed on the internet, they will continue to be targeted by threat actors seeking information or financial gain.

This highlights the importance of maintaining a high patching cadence, especially when proof-of-concept exploit code is freely available. If every organization consistently applied patches to vulnerable systems, and decommissioned end-of-life systems, hackers would have a much more difficult time achieving their goals.

They would have to rely on more costly and time-consuming methods (such as developing zero-day exploits or conducting software supply chain operations), a capability that less sophisticated actors are unlikely to have.

Mitigation

Field Effect’s elite team of Security Intelligence professionals constantly monitors the cyber threat landscape for vulnerabilities discovered in hardware and software. This research contributes to the timely deployment of signatures into Covalence to detect and mitigate the exploitation of these vulnerabilities. Covalence users are automatically notified when vulnerable software is detected in their environment and are encouraged to review these AROs as quickly as possible.

References