Site icon TheCyberThrone

CISA Advisory on Top Exploited Vulnerabilities of 2022

Advertisements

The CISA has published a report that was co-authored by the NSA, FBI, and the FYEY (Five Eyes) from different countries.

The report provides a complete insight into CVEs that were frequently exploited by threat actors.

As per the report, threat actors have been relying on outdated software vulnerabilities for exploitation instead of those disclosed recently. Systems that were exposed to the internet and left unpatched were mostly targeted.

Advertisements

The following vulnerabilities have been most often exploited in 2022:

Advertisements

Among the other often exploited vulnerabilities listed, there are bugs in solutions by

Vendors and developers are advised to audit their environments to identify classes of exploited vulnerabilities and eliminate them, implement secure design practices, prioritize secure-by-default configurations, and follow Secure Software Development Framework.

Organizations are advised to apply available software updates and patches in a timely manner, perform secure system backups, maintain a cybersecurity incident response plan, implement robust identity and access management policies, ensure that internet-facing network devices are secured, implement Zero Trust Network Architecture, and improve their supply-chain security.

Exit mobile version