The most exploited vulnerabilities in 2022 (2024)

Offensive security is a fast-moving space, yet some security vulnerabilities persist for years, causing problem after problem. 2023 being no exception, you can spare yourself from repetitive work by learning to find and mitigate these top 10 CVEs.

These common vulnerabilities pose a significant risk to businesses and individuals alike, making them prime targets for cybercrime.

To give you the ethical hacker's perspective on the cybersecurity landscape, we're sharing the top 10 most exploited vulnerabilities of 2022. This list includes CVEs which offensive security pros most often proved to be a real risk to businesses and their customers.

While many of them are also listed in the Known Exploited Vulnerabilities Catalog maintained by the US Cybersecurity & Infrastructure Security Agency (CISA), this top 10 serves as a valuable filter to help you stay ahead of the game. Focusing on these high-risk, high-impact CVEs allows you to provide actionable reports and mitigation steps to your clients, dramatically reducing their risk.

10. CVE-2021-34473 (ProxyShell)

ProxyShell is an attack chain that exploits three known vulnerabilities in Microsoft Exchange servers: CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207. These vulnerabilities allow for remote code execution, making them critical.

Unlike other RCE vulnerabilities, ProxyShell is relatively easy to exploit, which has led to its widespread use among attackers. Security researchers first discussed the exploit at the 2021 Black Hat USA conference, leading to an initial wave of attacks against Exchange servers.

According to Unit 42 analysis by Palo Alto, ProxyShell was used 55% of the time out of the 6 CVEs which were most exploited for Initial Access.

Source: ProxyShell: Deep Dive into the Exchange Vulnerabilities

Since then, security researchers have seen attackers use the exploit to create web shells and plant ransomware such as LockFile, Babuk, and Squirrelwaffle. Many organizations suffered from these attacks, including building manufacturers, seafood processors, industrial machinery companies, auto repair shops, and small airports.

To protect against ProxyShell vulnerabilities, organizations need to patch their on-premises Microsoft Exchange servers, perform a comprehensive malware scan, and run a deep network security scan to determine if their servers have already been compromised.

9. CVE-2021-44228 (Log4j or Log4Shell)

Log4Shell is a vulnerability in Apache Log4j2 that gained a lot of popularity in 2022. It is a Java-based logging utility that is related to the JNDI (Java Naming and Directory Interface) feature used in configuration, log messages, and parameters, which do not protect against attacker-controlled LDAP and other JNDI-related endpoints.

This means that an attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled.

As the keeper of highly valuable sensitive data, the financial industry has suffered the most attacks using this CVE as the main vector.

Source: Vulnerability in FortiGate VPN servers is exploited in Cring ransomware attacks

To prevent attacks targeting FortiOS systems, organizations need to update to the latest version of FortiOS, limit the number of users with administrative access, restrict access to the SSL-VPN portal, and monitor the system for suspicious activity.

Additionally, organizations should use security tools to detect and block malformed resource requests to avoid data breaches.

7. CVE-2020-14179

CVE-2020-14179 is an Information Disclosure vulnerability in Atlassian Jira Server and Data Center that allows remote, unauthenticated attackers to view custom field names and custom SLA names through the /secure/QueryComponent!Default.jspa endpoint.

The affected versions are before version 8.5.8 and from version 8.6.0 before 8.11.1. The CVSS score of this vulnerability is rated as 5.0. Remediation consists of upgrading your Jira instance to the latest version will remove the threat.

Here is a simple PoC we found helpful.

6. CVE-2021-26086

An investigation into the /WEB-INF/web.xml endpoint of Atlassian Jira Server and Data Center uncovered a path traversal vulnerability that allows remote attackers to read certain files.

Atlassian Jira is a widely used ticketing tool that organizations from around the world rely on. The affected versions of Jira Server and Data Center are:

  • All versions below 8.5.14

  • Versions 8.6.0 to 8.13.6

  • Versions 8.14.0 to 8.16.1.

This CVE is classified as a directory traversal vulnerability and has a CVSS Score of 5.3. Although it enables partial information disclosure, it does not negatively impact the integrity or availability of the system. A bad actor can exploit it without the need for authentication, but this does not grant the attacker access.

Threat actors exploiting this vulnerability poison server logs and achieve remote code execution or steal sensitive files and information.

To mitigate this CVE, users need to update their Jira Server and Data Center to version 8.5.14 or later, 8.13.6 or later, and 8.16.1 or later respectively.

5. CVE-2019-8442

An attacker can exploit an Information Disclosure vulnerability in Atlassian Jira by sending a specific request to the target server, because of insufficient validation of user input.

The affected endpoints are:

/META-INF/maven/com.atlassian.jira/atlassian-jira-webapp/pom.xml
/META-INF/maven/com.atlassian.jira/jira-webapp-dist/pom.xml
/META-INF/maven/com.atlassian.jira/atlassian-jira-webapp/pom.properties

The vulnerable versions of Jira are 7.13.4, 8.0.0 to 8.0.4, and 8.1.0 to 8.1.1. To prevent this, update to the latest patch or upgrade from Atlassian.

The impact is quite high since the vulnerability leads to information disclosure. When including this CVE in your penetration testing reports, it’s helpful to demonstrate how remote attackers can exfiltrate sensitive information from vulnerable systems.

4. CVE-2018-2894

This security issue enables unauthorized access to the path (/ws_utc/config.do) on port 7001, which can only be accessed in development mode. To exploit the vulnerability, the attacker must first establish a writable Work Home Dir and then upload a Java Server Page (JSP) file through the security tab.

Executing the uploaded JSP file can result in complete server compromise.

To prevent exploitation, security teams need to verify that the WebLogic server is not operating in development mode and that port 7001 is blocked.

Malicious hackers can leverage thisCVE remotely, without authentication, which makes it particularly dangerous and urgent to address.

Here's a quick PoC with a good explanation that shows how easily this vulnerability can wreak havoc on the victim’s infrastructure.

The vulnerability affects Oracle WebLogic Server versions 10.3.6.0, 12.1.3.0, 12.2.1.2, 12.2.1.3, and 12.2.1.4. Oracle has released a patch to address this, which is highly recommended, and there’s also the option to upgrade the version to protect exposed systems.

3. CVE-2020-1938 (GhostCat)

CVE-2020-1938 is a vulnerability that affects Apache Tomcat, an open-source Java Servlet Container. It’s a result of a flaw in the way the Apache Tomcat server handles HTTP requests that contain multiple Content-Length headers.

This CVE allows a remote, unauthenticated attacker to perform a denial of service (DoS) attack or potentially execute arbitrary code on a vulnerable system. It’s worth mentioning that reaching RCE is very hard and requires using non-default configurations.

A bad actor can exploit this vulnerability by sending a specially crafted HTTP request to a vulnerable Apache Tomcat server. The request would include multiple Content-Length headers, which would cause the server to crash or become unresponsive.

The CVE affects Apache Tomcat versions 9.0.0.M1 to 9.0.31, 8.5.0 to 8.5.51, and, 7.0.0 to 7.0.100. Mitigation includes upgrading to a version of Apache Tomcat that addresses this issue or applying the appropriate patch to protect exposed systems.

You can learn how to manually exploit this vulnerability on tryhackme.

2. CVE-2022-24086

CVE-2022-24086 is a remote code execution vulnerability in Adobe Commerce and Magento Open Source because of inadequate input validation.

Bad actors can exploit this vulnerability without authentication. As it is pre-authenticated, this CVE allows attackers to bypass protections by running scans for web vulnerabilities. Successful exploitation can result in the complete compromise of the targeted system.

This vulnerability affects all platforms running Magento Open Source 2.4.3-p1, 2.4.3-p2, and earlier versions (2.3.7-p2 and earlier versions), as well as Adobe Commerce 2.4.3-p1, 2.4.3-p2 and earlier versions (2.3.7-p2 and earlier versions).

Adobe has released patches to address this CVE, which has a severity rating of 9.8 out of 10, and advises customers to update their installations to the latest version.

Here’s a short demo showing you how to detect this vulnerability with Sniper Auto-Exploiter:

1. CVE-2020-3452

CVE-2020-3452 is a read-only path traversal vulnerability that affects Cisco ASA and FTD software. Sending a specifically crafted HTTP request to a vulnerable system allows a remote, unauthenticated attacker to take advantage of this security issue.

If they successfully exploit the vulnerability, an attacker can only access arbitrary files from the web services file system, which may also contain data like WebVPN configuration, bookmarks, web cookies, partial web content, and HTTP URLs.

According to Cisco, an intruder can only access these files if WebVPN or AnyConnect are set up on the system. To understand why this vulnerability received a 7.5 CVSSv3 score, it’s crucial to remember that an attacker could not read files from the ASA, FTD, or underlying operating system. This restricts the impact of the vulnerability.

Prediction for the future

We’ll most likely continue to see a rise in cyber threat activity targeting vulnerabilities in web applications and cloud environments, since these CVEs will probably remain exploitable for years to come.

The increasing use of IoT devices in both personal and professional settings may also lead to an increase in attacks targeting security holes in them. Statistics show that IoT grows each year, breaking adoption rate records from the previous 12 months:

  1. There are well over 7 billion connected IoT devices around the globe

  2. IoT devices surpassed non-IoT devices in 2020

  3. It’s expected there will be 25.4 billion IoT devices by 2030

  4. There are more than 400 active IoT platforms in existence.

Keeping up with all the latest high-risk vulnerabilities is a huge challenge for any organization, but it’s also the only way to improve their reaction and risk mitigation capabilities.

It’s also worth noting that ethical hackers (penetration testers, bug bounty hunters, etc.) play a major role in securing the internet by using the Pareto principle: helping blue teams prioritize the 20% security issues which account for 80% of the risk and business impact.

Monitoring and prioritizing assets, investing in threat intelligence, vulnerability management, and incident response plans make a powerful – and necessary – combination for organizations whose businesses depend on keeping operations and teams safe. Ethical hackers have never played such an important part of this as they do now.

Wrapping Up

It’s no surprise that vulnerabilities in web apps and misconfigurations in cloud environments were among the top exploited vulnerabilities in 2022. That’s why the same key advice remains relevant: regularly updating software, patching critical vulnerabilities, and properly configuring cloud environments.

Stay up-to-date with new cybersecurity issues and hot topics by:

  • Subscribing to security mailing lists and newsletters for timely updates on newly discovered vulnerabilities and threats

  • Joining cybersecurity communities for access to information and resources from other professionals, including their first-hand experience

  • Following security researchers and organizations on social media for updates on new vulnerabilities

  • Checking out our exploit database and staying up to date with new CVEs.

The most exploited vulnerabilities in 2022 (2024)

FAQs

What is the most exploited vulnerability? ›

CVE-2023-27350 At A Glance

In April 2023, Papercut disclosed that threat actors are exploiting CVE-2023-27350 to target print management servers. The vulnerability allows unauthenticated threat actors to bypass authentication and execute arbritrary code in the context of SYSTEM on a PaperCut Application Server.

What is the most exploited CVE 2022? ›

The top CVEs for 2022

Topping the list is Log4J (CVE-2021-44228). This isn't surprising, as this is likely one of the most high impact exploits we have seen in decades — leading to full remote compromise. The second most exploited vulnerability is the Atlassian Confluence Code Injection (CVE-2022-26134).

What is the most recent vulnerability? ›

  • Hackers targeting WhatsUp Gold with public exploit since August. ...
  • GitLab warns of critical pipeline execution vulnerability. ...
  • Microsoft September 2024 Patch Tuesday fixes 4 zero-days, 79 flaws. ...
  • Progress LoadMaster vulnerable to 10/10 severity RCE flaw. ...
  • SonicWall SSLVPN access control flaw is now exploited in attacks.

What are the 4 main types of vulnerability? ›

The four main types of vulnerabilities in information security are network vulnerabilities, operating system vulnerabilities, process (or procedural) vulnerabilities, and human vulnerabilities.

What is known exploited vulnerabilities? ›

CISA's Known Exploited Vulnerabilities (KEV) Catalog is a compilation of documented security vulnerabilities that have been successfully exploited, as well as vulnerabilities associated with ransomware campaigns.

What is the vulnerability of 2022? ›

CVE-2022-1388 is a Remote Code Execution (RCE) vulnerability that affects F5 BIG-IP iControl REST. The vulnerability exists in the iControl REST interface of BIG-IP, which is a web-based management interface for BIG-IP devices.

What is your biggest vulnerability? ›

For most people, either fear (of harm, isolation, deprivation) or shame (of failure) constitutes their core vulnerability. Fear and shame are both pretty dreadful, to be sure. Though no one wants to experience either for very long, one is usually worse than the other for most individuals.

What is the most active ransomware in 2022? ›

#1: LockBit 3.0 Ransomware Operator(s) As of July 2022, LockBit 3.0 is a ransomware-as-a-service (RaaS) group that continues the legacy of LockBit and LockBit 2.0. They are also the most active RaaS group targeting the U.S. HPH.

Which vulnerabilities impact the biggest danger? ›

Remote Code Execution

Remote code execution (RCE) vulnerabilities allow cybercriminals to infiltrate a vulnerability with malicious code and then control the code from a remote machine. This tactic can be used to steal data, but it can also enable a cybercriminal to take over a machine.

Which OWASP Top 10 item is considered the most severe? ›

What is the OWASP Top 10?
  1. Injection. ...
  2. Broken Authentication. ...
  3. Sensitive Data Exposure. ...
  4. XML External Entities (XEE) ...
  5. Broken Access Control. ...
  6. Security Misconfiguration. ...
  7. Cross-Site Scripting. ...
  8. Insecure Deserialization.

What is the most common web security vulnerability? ›

Most Common Website Security Vulnerabilities
  1. SQL Injections. ...
  2. Cross-Site Scripting (XSS) ...
  3. Broken Authentication & Session Management. ...
  4. Insecure Direct Object References. ...
  5. Security Misconfiguration. ...
  6. Cross-Site Request Forgery (CSRF)

Which vulnerability is exploited the most? ›

The most exploited vulnerabilities in 2022
  1. CVE-2020-3452. CVE-2020-3452 is a read-only path traversal vulnerability that affects Cisco ASA and FTD software.
  2. CVE-2022-24086. ...
  3. CVE-2020-1938 (GhostCat) ...
  4. CVE-2018-2894. ...
  5. CVE-2019-8442. ...
  6. CVE-2021-26086. ...
  7. CVE-2020-14179. ...
  8. CVE-2018-13379. ...

What are exploitable vulnerabilities? ›

At its core, exploitability refers to the potential or likelihood of a vulnerability being exploited by malicious actors to compromise systems, applications, or networks. Exploiting Vulnerabilities: In the context of cybersecurity, exploitability centers on how attackers can use vulnerabilities to their advantage.

What is the moment of greatest vulnerability? ›

Napoleon said, “The moment of greatest vulnerability is the instant immediately after victory.

Which is the top most common vulnerability? ›

With this in mind, let's explore 10 common internet vulnerability issues.
  • Injection Flaws. ...
  • Broken Authentication. ...
  • Cross-Site Scripting (XSS) ...
  • Insecure Direct Object References. ...
  • Security Misconfiguration. ...
  • Sensitive data exposure. ...
  • Missing Function Level Access Control. ...
  • Cross-Site Request Forgery (CSRF)

What is the biggest vulnerability? ›

Vulnerabilities come in various forms, but some of the most common types include the following:
  • #1. Zero Day. ...
  • #2. Remote Code Execution (RCE) ...
  • #3. Poor Data Sanitization. ...
  • #4. Unpatched Software. ...
  • #5. Unauthorized Access. ...
  • #6. Misconfiguration. ...
  • #7. Credential Theft. ...
  • #8. Vulnerable APIs.

What is vulnerability that can be exploited? ›

A vulnerability is a weakness in an IT system that can be exploited by an attacker to deliver a successful attack. They can occur through flaws, features or user error, and attackers will look to exploit any of them, often combining one or more, to achieve their end goal.

What is an exploit in vulnerability? ›

An exploit (in its noun form) is a segment of code or a program that maliciously takes advantage of vulnerabilities or security flaws in software or hardware to infiltrate and initiate a denial-of-service (DoS) attack or install malware, such as spyware, ransomware, Trojan horses, worms, or viruses.

Top Articles
Troubleshoot problems with detecting and removing malware
The 9 EMA - A Powerful Trading Strategy for Short-Term Traders
Po Box 7250 Sioux Falls Sd
Tmf Saul's Investing Discussions
Farepay Login
Seething Storm 5E
5 Bijwerkingen van zwemmen in een zwembad met te veel chloor - Bereik uw gezondheidsdoelen met praktische hulpmiddelen voor eten en fitness, deskundige bronnen en een betrokken gemeenschap.
Nc Maxpreps
Wmlink/Sspr
Zachary Zulock Linkedin
What Does Dwb Mean In Instagram
Nba Rotogrinders Starting Lineups
The Cure Average Setlist
라이키 유출
Indiana Wesleyan Transcripts
Craigslist Personals Jonesboro
Masterkyngmash
Www.craigslist.com Savannah Ga
Jail View Sumter
D2L Brightspace Clc
Scripchat Gratis
Craigslist Panama City Beach Fl Pets
Rgb Bird Flop
Kaliii - Area Codes Lyrics
Paradise Point Animal Hospital With Veterinarians On-The-Go
Florence Y'alls Standings
Missing 2023 Showtimes Near Mjr Southgate
Smayperu
2487872771
Mega Millions Lottery - Winning Numbers & Results
Microsoftlicentiespecialist.nl - Microcenter - ICT voor het MKB
Go Smiles Herndon Reviews
Greater Keene Men's Softball
Maxpreps Field Hockey
Encompass.myisolved
Let's co-sleep on it: How I became the mom I swore I'd never be
Gopher Hockey Forum
Subdomain Finder
Inducement Small Bribe
LoL Lore: Die Story von Caitlyn, dem Sheriff von Piltover
Lyndie Irons And Pat Tenore
3 bis 4 Saison-Schlafsack - hier online kaufen bei Outwell
Squalicum Family Medicine
Motorcycles for Sale on Craigslist: The Ultimate Guide - First Republic Craigslist
Cara Corcione Obituary
New Starfield Deep-Dive Reveals How Shattered Space DLC Will Finally Fix The Game's Biggest Combat Flaw
The 13 best home gym equipment and machines of 2023
Epower Raley's
683 Job Calls
Generator für Fantasie-Ortsnamen: Finden Sie den perfekten Namen
Fishing Hook Memorial Tattoo
Cataz.net Android Movies Apk
Latest Posts
Article information

Author: Aron Pacocha

Last Updated:

Views: 6223

Rating: 4.8 / 5 (68 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Aron Pacocha

Birthday: 1999-08-12

Address: 3808 Moen Corner, Gorczanyport, FL 67364-2074

Phone: +393457723392

Job: Retail Consultant

Hobby: Jewelry making, Cooking, Gaming, Reading, Juggling, Cabaret, Origami

Introduction: My name is Aron Pacocha, I am a happy, tasty, innocent, proud, talented, courageous, magnificent person who loves writing and wants to share my knowledge and understanding with you.