Skip to content

Prominent monikers featured among the most frequently abused security flaws in 2021

Ransomware groups such as Hive and Conti are toying with vulnerable systems to mount fresh assaults, security experts cautioned.

Top vulnerabilities of 2021, with well-known flaws leading the pack
Top vulnerabilities of 2021, with well-known flaws leading the pack

Headline: Cybersecurity Alert: Widespread Vulnerabilities in Software and Systems Pose Significant Risk to Organizations

In a concerning development, a series of software vulnerabilities have been exploited by malicious threat actors, posing a significant risk to organizations worldwide.

Vendors Prioritizing Speed Over Security

The rush to release new software products has led vendors to prioritize speed over security, resulting in vulnerabilities cropping up everywhere. This situation has created a vicious cycle where more vulnerabilities are being disclosed, and both vendors and end users face the daunting task of fielding patches and performing updates.

Recent Exploits and Vulnerabilities

Some of the most notable vulnerabilities exploited recently include Log4j, Microsoft Exchange, Fortigate Firewall (CVE-2018-13379 and CVE-2018-13374), and Atlassian Confluence Server (CVE-2021-26084). Malicious actors have also been exploiting ProxyLogon and ProxyShell from Microsoft Exchange Server, as well as the Log4Shell (CVE-2021-44228).

The Question: Are We a Target?

Corporate stakeholders are seeking to better understand the risk calculus of their technology stacks, asking the question: Are we a target? The frequency and tone of warnings about these vulnerabilities have escalated over the past six months, with U.S. and allied cyber authorities issuing an advisory last week, urging companies to immediately patch their systems and take other mitigation steps.

The Ongoing Risk

Threat actors are using the same techniques to exploit the same vulnerabilities across various organizations, according to Katell Thielemann, research VP at Gartner. Despite the ongoing risk, there are no specific public reports or confirmed lists naming organizations that have downloaded dangerous unpatched versions of Log4j with probable current impacts from Spring4Shell within the last 24 hours.

Recommendations

To mitigate the risk, organizations are advised to update software, operating systems, firmware, and applications in a timely manner. Companies unable to quickly scan and patch should consider a reputable cloud service provider or managed service provider. Multifactor authentication must be implemented and enforced without any exceptions.

Support for Partners

NHS Digital in the U.K. is aware of a potential exploit for a critical vulnerability and is actively monitoring the situation. They will support partners with the system response to this critical vulnerability and continue to provide guidance to NHS organizations.

End-of-Life Software

Any software that has reached its end-of-life term, where the vendor no longer supports the product, requires replacement. This is especially important in the current climate, as the vulnerabilities exploited are not new, but were among the most widely seen vulnerabilities during 2021.

Developers' Role

According to Sonatype, over the last 24 hours, 37% of developers were still downloading vulnerable versions of Log4j. Similarly, since March 31, 81% of developers have downloaded potentially vulnerable versions of Spring4Shell. This underscores the importance of developers being vigilant and careful when downloading and implementing new software.

In conclusion, the current cybersecurity landscape is fraught with risks due to widespread software vulnerabilities. Organizations must prioritize security, update their systems regularly, and be vigilant to protect themselves from potential threats.

Read also: