OSINT Academy

The 12 Most Frequently Exploited Vulnerabilities in 2022

Exploiting known and unpatched vulnerabilities continues to be a common tactic used by threat actors. From security bypasses and credential exposure to remote code execution, software vulnerabilities have always been a powerful weapon for cyber attackers to compromise systems.

While some new figures have appeared in this year's disruptions, such as new vulnerabilities discovered in Active Directory and MOVEit file transfer applications, and those used in the AlienFox toolkit or IceFire ransomware campaigns, some of the known vulnerabilities have remained strong in terms of frequency of abuse so far.

In this article, we dive into CISA's newly released list of the 12 most frequently exploited vulnerabilities in 2022 that will continue to pose a significant threat to enterprise business.

vulnerabilities

1. Fortinet FortiOS & FortiProxy (CVE-2018-13379)

Fortinet FortiOS SSL VPNs are primarily used in border firewalls and function by isolating sensitive internal networks from the public Internet. CVE-2018-13379 serves as a particularly severe path traversal vulnerability that allows APT participants to use specially crafted HTTP resource requests to steal legitimate credentials, connect to an unpatched VPN and download system files. Despite the release of a patch back in 2019, CVE-2018-13379 has made several comebacks over the past three years, targeting government, commercial, and technical service networks, among others.

In 2020, a hacker exploited the vulnerability to steal VPN credentials from nearly 50,000 Fortinet VPN devices. Security researchers noted at the time that more than 40 of those 50,000 domains belonged to well-known financial and government organizations. Later that year, the vulnerability reappeared. This time it was exploited by government-backed actors in an attempt to disrupt U.S. election support systems. During this campaign, CVE-2018-13379 was linked to other attacks to exploit servers exposed to the Internet and gain access. The vulnerability reappeared in 2021 when 87,000 sets of credentials for Fortigate SSL VPN devices obtained through the exploitation of CVE-2018-13379 were leaked online.

These critical vulnerabilities remain lucrative for threat actors. The larger the user base, the more potential targets there are, which increases the appeal to attackers. Due to their frequent abuse, the FBI and CISA have issued a joint advisory warning Fortinet users and administrators to beware of Advanced Persistent Threat (APT) attackers actively exploiting existing and future critical VPN vulnerabilities. It is highly likely that these vulnerabilities will continue to be used to gain an initial foothold in vulnerable environments as a springboard for future attacks.

2-4. Microsoft Exchange Server (CVE-2021-34473, CVE-2021-31207, CVE-2021-34523)

Microsoft Exchange Server is a popular email and support system for global organizations, deployed both locally and in the cloud. To this day, a series of vulnerabilities found in unpatched local versions of Microsoft Exchange Server continue to be actively exploited on Internet-facing servers.

This series of vulnerabilities, collectively referred to as "ProxyShell," includes CVE-2021-34473, CVE-2021-31207, and CVE-2021-34523, and affects multiple versions of local Microsoft Exchange Server. ProxyShell targets unpatched Exchange servers to enable pre-authenticated Remote Code Execution (RCE). Of the three vulnerabilities, CVE-2021-34473 has the highest CVSS score of 9.1, and while the remaining vulnerabilities were initially categorized as "exploitation less likely" when used in conjunction with CVE-2021-34473, they provide significant value to attackers. In short, ProxyShell allows an attacker to execute arbitrary commands on a vulnerable Exchange server on port 443.

All three vulnerabilities were patched in 2021, but security researchers are currently tracking several uncategorized threat (UNC) organizations known to be exploiting the ProxyShell vulnerability, while predicting additional clusters to emerge as future generations of threat actors adopt valid vulnerabilities. In one particular cluster of threat activity tracked as UNC2980, Mandiant researchers observed that the ProxyShell vulnerability was used in a cyber espionage campaign. In this operation, UNC2980 dropped multiple tools into the U.S. university's system environment after gaining access and deploying a web shell by utilizing ProxyShell. After conducting an attack via ProxyShell, the attackers used publicly available tools (e.g., Mimikatz, HTRAN, and EarthWorm) to conduct post-attack activities.

5. Microsoft Various Products (CVE-2022-30190)

CVE-2022-30190, known as "Follina", is a critical RCE vulnerability that affects multiple Microsoft Office products. Follina allows an attacker to execute arbitrary code after convincing a user to open a malicious Word document or any other vector that handles URLs. Due to the large number of unpatched Microsoft Office products available, Follina continues to appear in various cyberattacks.

Known threat actors exploit the Follina vulnerability through phishing scams that use social engineering techniques to trick users into opening malicious Office documents. When a user encounters embedded links within Office applications, these links are automatically fetched, triggering the execution of the Microsoft Support Diagnostic Tool (MSDT) protocol, a Microsoft service that is primarily used to collect system crash information for reporting to Microsoft Support. However, threat actors can exploit this protocol by crafting links to enforce the execution of malicious PowerShell commands without any further user interaction. This poses a serious security risk as it allows attackers to remotely execute unauthorized commands on the target system via seemingly innocuous links.

Recently, the Follina vulnerability has been used as a zero-day exploit to support threat campaigns against key industry organizations. From March through May 2022, an active cluster tracked as UNC3658 used Follina to attack the Philippine government. In April of the same year, more Follina samples appeared in the UNC3347 campaign targeting telecom entities and business services in South Asia. A third cluster named UNC3819 also used CVE-2022-30190 to attack organizations in Russia and Belarus.

6. Zoho ManageEngine ADSelfService Plus (CVE-2021-40539)

A patched critical vulnerability in the Zoho ManageEngine ADSelfService Plus software in late 2021 led to attacks on at least nine entities in the defense, healthcare, energy, technology and education sectors. The product is said to provide a comprehensive self-service password management and single sign-on (SSO) solution for Active Directory and cloud applications, designed to allow administrators to enforce two-factor authentication (2FA) for secure application logins while granting users the ability to reset their passwords on their own.

The vulnerability, tracked as CVE-2021-40539, allows threat actors to gain initial access to a victim organization's system.CVE-2021-40539 (CVSS score 9.8) is an authentication bypass vulnerability that affects REST API URLs that can be used for RCE.

In response, CISA issued an alert about the zero-day vulnerability, informing users how attackers could exploit the vulnerability to deploy web shells for post-exploitation activities such as stealing administrator credentials, performing lateral moves, and leaking registry and Active Directory (AD) files. The vulnerabilities are particularly acute in SSO solutions for AD and cloud applications. If these vulnerabilities are successfully exploited, attackers can essentially access critical applications, sensitive data, and other areas deep within the corporate network via AD.

CVE-2021-40539 exploit analysis flowchart 

Vulnerabilities exploiting CVE-2021-40539 were also recently discovered in an attack against the International Committee of the Red Cross (ICRC). In a statement, the ICRC acknowledged that they missed critical patches that could have protected them from the attack, emphasizing the importance of maintaining a robust patch management process. As a result of the attack, the names, locations and contact information of more than 515,000 people involved in the ICRC's Restoring Family Links program were compromised.

7–8. Atlassian Confluence Server & Data Center (CVE-2021-26084, CVE-2022-26134)

Atlassian Confluence, a collaboration and documentation platform used by many government and private sector organizations, is also highly favored by threat actors. The two shortlisted vulnerabilities, CVE-2021-26084 and CVE-2022-26134, are both related to Object Graph Navigation Language (OGNL) injection.

The first large-scale exploitation of CVE-2021-26084 occurred in September 2021 and targeted the popular web-based document service. The Confluence platform is designed to allow multiple teams to collaborate on shared projects. A malicious actor could use the command injection vulnerability CVE-2021-26084 to execute arbitrary code on a Confluence server or data center instance. Attackers essentially have the same privileges as the user running the service, and are therefore able to execute any command, gain elevated administrative privileges, and establish a foothold in the environment. CISA issued an advisory directing users and administrators to check for updates to Atlassian to prevent compromise.

Just nine months later, Atlassian released another OGNL injection vulnerability against Confluence servers and data centers. Tracked as CVE-2021-26134, the vulnerability allows an unauthenticated attacker to execute arbitrary code in all supported Confluence data center and server versions. After a Proof of Concept (PoC) was released within a week of the initial disclosure, this critical level vulnerability quickly became one of the most exploited. In this case, CVE-2021-26134 was used to implement an unauthenticated RCE on a server and then cast a Behinder web shell. The Behinder web shell empowers malicious actors with very powerful features, such as interaction with Meterpreter and Cobalt Strike and a memory-only web shell.

According to Atlassian's website, the company supports 83 percent of Fortune 500 companies, has 10 million active users per month, and has more than 235,000 users in more than 190 countries. These two Atlassian-based CVEs demonstrate how financially motivated threat actors continue to exploit vulnerabilities to attack many attractive targets simultaneously.

9. Log4Shell (CVE-2021-44228)

Log4shell, tracked as CVE-2021-44228 and also known as the "Log4j vulnerability", is the most serious RCE vulnerability found in Apache Log4j, a popular java-based logging library widely used in various applications. The vulnerability allows a remote attacker to execute arbitrary code on an affected system, which could lead to unauthorized access, data disclosure, or even compromise the entire system.

The vulnerability, which was first publicly disclosed in December 2021, is due to the use of untrusted data in the lookup mechanism of the "log4j2" component, which allows an attacker to inject malicious code via crafted log messages. This flaw exposed a wide variety of applications, including web servers, enterprise software, and cloud-based services that rely on Log4j for logging.

Although Apache quickly released a patch for the Level 10.0 RCE vulnerability, security experts confirmed that given its widespread use among major vendors, the exploit would continue and could lead to widespread malware deployment. CISA has since issued a Binding Operational Directive (BOD) ordering Federal Civilian Executive Branch (FCEB) agencies to patch their systems to address this critical vulnerability.

The rapid exploitation of Log4shell is attributed to its widespread deployment across different industries and platforms. What's more, patching the vulnerability has proven extremely challenging as many organizations struggle to identify and update all instances of Log4j in their infrastructure in a timely manner.

vulnerabilities

10–11. VMware Workspace ONE Access & Identity Manager (CVE-2022-22954, CVE-2022-22960)

VMware is a popular virtualization software that often falls prey to cyber attackers at all levels, including APT groups. Exploiting vulnerabilities in VMware can authorize unauthorized access to virtual machines and critical data hosted on the platform. Because VMware virtualizes multiple systems on a single physical server, a successful attack could compromise multiple virtual machines at once. Typically, attackers choose to target VMware environments in order to gain a foothold in a larger network, leveraging the trust and accessibility of virtualized infrastructure. The VMware vulnerability took two spots on CISA's vulnerability list this year.

First, CVE-2022-22954 (CVSS score 9.8) is a server-side template injection vulnerability that can be triggered by a malicious actor with network access to implement RCE in VMware's Workspace ONE access & Identity Manager. After the PoC for the vulnerability was released last spring, security researchers discovered that it was being used in an active attack to infect servers with mining machines.

Second, CVE-2022-22960 is a privilege escalation vulnerability. According to the CISA advisory on this vulnerability, it enables a malicious actor with local access to escalate privileges to root due to incorrect permissions in the support script. If linked with CVE-2022-22954, an attacker could execute arbitrary shell commands as a VMware user, then wipe the logs, escalate privileges, and move laterally to another system with root access.

12. F5 Networks BIG-IP (CVE-2022-1388)

Last September, F5 released a patch for a critical RCE vulnerability related to the BIG-IP product suite, and a few days later, security researchers were able to create an exploit for the vulnerability.

CVE-2022-1388 (CVSS score 9.8) is categorized as a missing authentication vulnerability involving an iControl REST authentication bypass, which could lead to an attacker gaining access and taking control of a compromised BIG-IP system. An attacker could perform many malicious actions such as loading a web shell for future attacks, deploying cryptocurrency miners and leaking sensitive data.

Remote code execution flaws are easy to exploit, which makes them a target for opportunistic threat actors. Whenever vulnerabilities are discovered in Internet-facing services, threat actors are sure to be quick to exploit them. Vulnerabilities like CVE-2022-1388 provide immediate initial access to the target network and often enable attackers to conduct attacks through lateral movement and privilege escalation.

Conclusion

Enterprise security teams must recognize that older vulnerabilities still exist and continue to pose a significant threat. While the latest CVEs are often more visible, CISA's annual list of commonly used vulnerabilities is a clear reminder that known vulnerabilities can still wreak havoc on vulnerable systems.

In addition to the comprehensive list, CISA provides guidance for vendors and technology organizations to identify and mitigate potential risks. Recommendations include adopting secure-by-design practices and prioritizing the patching of known exploited vulnerabilities to minimize the risk of compromise. Vendors are also encouraged to establish a coordinated vulnerability disclosure process to allow for root cause analysis of discovered vulnerabilities.



Open source intelligence and cybersecurity
Social informatization makes spies face threats
How do hackers ensure they are safe online?
Hacking Tools Cheat Sheet