{"id":2992,"date":"2023-11-12T10:12:02","date_gmt":"2023-11-12T10:12:02","guid":{"rendered":"https:\/\/antidos.com\/blog\/?p=2992"},"modified":"2023-11-13T11:31:58","modified_gmt":"2023-11-13T11:31:58","slug":"7-key-findings-from-cisas-top-routinely-exploited-vulnerabilities-report","status":"publish","type":"post","link":"https:\/\/antidos.com\/blog\/7-key-findings-from-cisas-top-routinely-exploited-vulnerabilities-report\/","title":{"rendered":"7 Key Findings From CISA&#8217;s Top Routinely Exploited Vulnerabilities Report"},"content":{"rendered":"<p>The CISA Top Routinely Exploited Vulnerabilities report is a collaborative effort involving international partners from Australia, Canada, New Zealand, and the UK. It identifies common vulnerabilities and exposures (CVEs) that were frequently exploited by <a href=\"https:\/\/antidos.com\/blog\/threat-actors-can-use-chatgpt\/\">threat actors<\/a>, along with their associated common weaknesses and enumerations (CWEs).<\/p>\n<p>This report is essential for organizations seeking to enhance their cybersecurity defenses. In addition to listing specific vulnerabilities, the report also offers valuable recommendations for mitigating the risk of <a href=\"https:\/\/antidos.com\/blog\/types-of-malware\/\">malicious attacks<\/a>. These recommendations encompass a wide range of best practices and strategies to safeguard against cyber threats.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2993 size-full aligncenter\" src=\"https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/11\/Routinely-Exploited-Vulnerabilities.webp\" alt=\"Routinely Exploited Vulnerabilities\" width=\"774\" height=\"578\" srcset=\"https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/11\/Routinely-Exploited-Vulnerabilities.webp 774w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/11\/Routinely-Exploited-Vulnerabilities-300x224.webp 300w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/11\/Routinely-Exploited-Vulnerabilities-768x574.webp 768w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/11\/Routinely-Exploited-Vulnerabilities-370x276.webp 370w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/11\/Routinely-Exploited-Vulnerabilities-270x202.webp 270w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/11\/Routinely-Exploited-Vulnerabilities-570x426.webp 570w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/11\/Routinely-Exploited-Vulnerabilities-740x553.webp 740w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/11\/Routinely-Exploited-Vulnerabilities-80x60.webp 80w\" sizes=\"auto, (max-width: 774px) 100vw, 774px\" \/><\/p>\n<p>Furthermore, there is an informative visualization created by Patrick Garrity of Nucleus Security that presents the top 42 vulnerabilities from the report. This visualization provides an overview of these vulnerabilities across various vendors and their associated products. It serves as a useful tool for organizations to understand<\/p>\n<p>In this article, you will learn about seven key findings from CISA\u2019s Most routinely exploited vulnerabilities report.<\/p>\n<h1 id='7-key-findings-from-cisa-s-top-routinely-exploited-vulnerabilities-report'  id=\"boomdevs_1\" >7 Key Findings From CISA&#8217;s Top Routinely Exploited Vulnerabilities Report<\/h1>\n<h2 id='1-pervasive-exploitation-of-legacy-systems'  id=\"boomdevs_2\" >1.\u00a0 Pervasive Exploitation of Legacy Systems<\/h2>\n<p>One of the recurring themes in CISA&#8217;s report is the persistent exploitation of legacy systems. Legacy systems are older computer systems, software, or technologies that are still in use despite being outdated and potentially vulnerable. Attackers often target these systems because they are less likely to have the latest security updates and patches. According to CISA, several vulnerabilities in legacy systems remained highly exploited. Organizations are urged to prioritize modernization efforts and invest in upgrading or replacing aging infrastructure to mitigate these cybersecurity risks effectively.<\/p>\n<h2 id='2-continued-prevalence-of-known-vulnerabilities'  id=\"boomdevs_3\" >2.\u00a0 Continued Prevalence of Known Vulnerabilities<\/h2>\n<p>Surprisingly, many of the vulnerabilities routinely exploited in 2022 were well-known issues that had been previously reported and had patches available. This finding underscores the importance of timely patching and vulnerability management.<\/p>\n<p>Organizations that neglect to apply patches or updates are essentially leaving their doors wide open to cybercriminals. CISA&#8217;s report emphasizes the need for proactive vulnerability scanning, patch management processes, and security awareness training for employees to reduce exposure to known vulnerabilities.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2994 size-full aligncenter\" src=\"https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/11\/Continued-Prevalence-of-Known-Vulnerabilities.webp\" alt=\"Continued Prevalence of Known Vulnerabilities\" width=\"585\" height=\"598\" srcset=\"https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/11\/Continued-Prevalence-of-Known-Vulnerabilities.webp 585w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/11\/Continued-Prevalence-of-Known-Vulnerabilities-293x300.webp 293w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/11\/Continued-Prevalence-of-Known-Vulnerabilities-370x378.webp 370w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/11\/Continued-Prevalence-of-Known-Vulnerabilities-270x276.webp 270w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/11\/Continued-Prevalence-of-Known-Vulnerabilities-570x583.webp 570w\" sizes=\"auto, (max-width: 585px) 100vw, 585px\" \/><\/p>\n<h2 id='3-attackers-favor-credential-theft'  id=\"boomdevs_4\" >3.\u00a0 Attackers Favor Credential Theft<\/h2>\n<p>Credential theft remains a favored technique among cybercriminals. Gaining access to user usernames and passwords allows attackers to move laterally within an organization&#8217;s network and escalate privileges. The report highlights the continued use of techniques like <a href=\"https:\/\/antidos.com\/blog\/7-key-steps-you-can-take-to-neutralize-phishing-attacks\/\">phishing<\/a>, password spraying, and credential stuffing to compromise user accounts. To counter this threat, organizations must prioritize multi-factor authentication (MFA), strong password policies, and robust user awareness training to mitigate the risks associated with credential theft.<\/p>\n<h2 id='4-supply-chain-attacks-on-the-rise'  id=\"boomdevs_5\" >4.\u00a0 Supply Chain Attacks on the Rise<\/h2>\n<p>CISA&#8217;s report also draws attention to the increasing prevalence of supply chain attacks. These attacks involve compromising software or hardware providers to infiltrate the target organization. High-profile <a href=\"https:\/\/antidos.com\/blog\/cost-of-data-breach-report-2023\/\">data breaches <\/a>like the SolarWinds have demonstrated the potential impact of supply chain attacks on both public and private sectors. Organizations are advised to scrutinize their third-party vendors and suppliers, conduct security assessments, and establish strict controls to mitigate the risks posed by supply chain vulnerabilities.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2995 size-full aligncenter\" src=\"https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/11\/Supply-Chain-Attacks-on-the-Rise.webp\" alt=\"Supply Chain Attacks on the Rise\" width=\"744\" height=\"634\" srcset=\"https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/11\/Supply-Chain-Attacks-on-the-Rise.webp 744w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/11\/Supply-Chain-Attacks-on-the-Rise-300x256.webp 300w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/11\/Supply-Chain-Attacks-on-the-Rise-370x315.webp 370w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/11\/Supply-Chain-Attacks-on-the-Rise-270x230.webp 270w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/11\/Supply-Chain-Attacks-on-the-Rise-570x486.webp 570w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/11\/Supply-Chain-Attacks-on-the-Rise-740x631.webp 740w\" sizes=\"auto, (max-width: 744px) 100vw, 744px\" \/><\/p>\n<h2 id='5-heightened-risks-to-critical-infrastructure'  id=\"boomdevs_6\" >5.\u00a0 Heightened Risks to Critical Infrastructure<\/h2>\n<p>Critical infrastructure and <a href=\"https:\/\/antidos.com\/blog\/industries-risk-of-cybersecurity-attacks\/\">industries <\/a>such as energy, water, and transportation are prime targets for cyberattacks. CISA&#8217;s report highlights the ongoing threats to these sectors, emphasizing the need for enhanced security measures. The adoption of the Cybersecurity and Infrastructure Security Agency Act (CISA Act) in the United States underscores the importance of securing critical infrastructure. Organizations within these sectors should prioritize the implementation of robust cybersecurity frameworks, threat detection systems, and incident response plans to safeguard vital services from potential disruptions.<\/p>\n<h2 id='6-emphasis-on-security-patching-and-timely-updates'  id=\"boomdevs_7\" >6.\u00a0 Emphasis on Security Patching and Timely Updates<\/h2>\n<p>Lastly, the report underscores the importance of security patching and timely updates. Many of the vulnerabilities that continue to be exploited could have been prevented if organizations had applied available patches promptly. Delayed patching not only increases an organization&#8217;s exposure to threats but also demonstrates a lack of commitment to cybersecurity best practices. Organizations must establish a comprehensive patch management program that includes regular vulnerability assessments, testing, and deployment of patches to protect their systems and networks.<\/p>\n<h2 id='7-exploitation-of-internet-accessible-systems'  id=\"boomdevs_8\" >7.\u00a0 Exploitation of Internet-Accessible Systems<\/h2>\n<p>Another alarming trend highlighted in the report is the exploitation of internet-accessible systems. Cybercriminals frequently target systems and services that are accessible via the internet, including remote desktop protocol (RDP) servers, virtual private networks (VPNs), and web servers.<\/p>\n<p>The shift towards remote work during the COVID-19 pandemic increased the attack surface, making it even more critical for organizations to secure their internet-facing assets. Properly configuring and serv, implementing strong access controls, and regularly reviewing and updating <a href=\"https:\/\/antidos.com\/blog\/web-application-firewall\/\">firewall <\/a>rules are essential steps to bolster cybersecurity.<\/p>\n<h2 id='conclusion'  id=\"boomdevs_9\" >Conclusion<\/h2>\n<p>CISA&#8217;s Top Routinely Exploited Vulnerabilities Report provides critical insights into the evolving landscape of <a href=\"https:\/\/antidos.com\/blog\/top-security-threats\/\">cybersecurity threats<\/a>. From the persistent targeting of legacy systems to the growing risks posed by supply chain attacks, the report highlights the need for organizations to remain vigilant and proactive in their cybersecurity efforts. By addressing these key findings, organizations can take significant steps<\/p>\n<p>What did you learn from CISA&#8217;s top routinely exploited vulnerabilities report? Share it with us in the comments section below.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The CISA Top Routinely Exploited Vulnerabilities report is a collaborative effort involving international partners from Australia, Canada, New Zealand, and the UK. It identifies common vulnerabilities and exposures (CVEs) that were frequently exploited by threat actors, along with their associated common weaknesses and enumerations (CWEs). This report is essential for organizations seeking to enhance their [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2996,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[52,47],"tags":[57,56],"class_list":["post-2992","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-generals","category-security","tag-infrastructure","tag-vulnerabilities-report"],"_links":{"self":[{"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/posts\/2992","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/comments?post=2992"}],"version-history":[{"count":2,"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/posts\/2992\/revisions"}],"predecessor-version":[{"id":2998,"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/posts\/2992\/revisions\/2998"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/media\/2996"}],"wp:attachment":[{"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/media?parent=2992"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/categories?post=2992"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/tags?post=2992"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}