These vulnerabilities are what Chinese hackers target the most 

B2B Cyber ​​Security ShortNews

Share post

The US Cybersecurity and Infrastructure Security Agency - CISA for short - has created the top list of vulnerabilities that are actively used by state-sponsored cyber actors in the People's Republic of China. All companies and operators of critical infrastructure (KRITIS) should pay attention to the list.

This joint Cybersecurity Advisory (CSA) contains the key common vulnerabilities and exposures (CVEs) exploited by state-sponsored cyber actors of the People's Republic of China (PRC) since 2020. The assessment was jointly conducted by the National Security Agency (NSA), the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI). PRC state-sponsored actors continue to exploit these known vulnerabilities to actively target US and allied networks and software and hardware companies around the world to steal intellectual property and gain access to sensitive networks.

Cybersecurity Advisory lists the vulnerabilities

This joint CSA builds on previous NSA, CISA and FBI reports to inform federal and state, local, tribal and territorial (SLTT) governments. Critical infrastructure operators, including the defense industrial base sector and private sector organizations, should also be informed about the Trends, Tactics, Techniques and Procedures (TTPs).

The NSA, CISA, and FBI urge U.S. and federal governments, critical infrastructure, and private sector organizations to apply the recommendations in the Mitigations section and listed below to strengthen their cyber defenses to address the threat posed by VR state-sponsored cyber actors reduce China.

On its website, CISA also lists further explanations of the vulnerabilities and what measures companies and administrators should take.

More at CISA.gov

 

CSA – Cybersecurity Advisory of Vulnerabilities

Manufacturers CVE vulnerability type
apachelog4j CVE-2021-44228 Remote Code Execution
Pulse Connect securely CVE-2019-11510 Arbitrary reading of files
GitLab CE/EE CVE-2021-22205 Remote Code Execution
Atlassian CVE-2022-26134 Remote Code Execution
microsoft Exchange CVE-2021-26855 Remote Code Execution
F5 Big IP CVE-2020-5902 Remote Code Execution
VMware vCenter Server CVE-2021-22005 Any file upload
Citrix ADC CVE-2019-19781 Path Traversal
Cisco Hyperflex CVE-2021-1497 command line execution
Buffalo WSR CVE-2021-20090 Relative path traversal
Atlassian Confluence servers and data center CVE-2021-26084 Remote Code Execution
Hikvision web server CVE-2021-36260 command injection
Sitecore XP CVE-2021-42237 Remote Code Execution
F5 Big IP CVE-2022-1388 Remote Code Execution
Apache CVE-2022-24112 Authentication bypass through spoofing
ZOHO CVE-2021-40539 Remote Code Execution
Microsoft CVE-2021-26857 Remote Code Execution
Microsoft CVE-2021-26858 Remote Code Execution
Microsoft CVE-2021-27065 Remote Code Execution
Apache HTTP Server CVE-2021-41773 Path Traversal

 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more