The following cybersecurity agencies coauthored this joint Cybersecurity Advisory (CSA):
This advisory provides details on the Common Vulnerabilities and Exposures (CVEs) routinely and frequently exploited by malicious cyber actors in 2022 and the associated Common Weakness Enumeration(s) (CWE). In 2022, malicious cyber actors exploited older software vulnerabilities more frequently than recently disclosed vulnerabilities and targeted unpatched, internet-facing systems.
The authoring agencies strongly encourage vendors, designers, developers, and end-user organizations to implement the recommendations found within the Mitigations section of this advisory—including the following—to reduce the risk of compromise by malicious cyber actors.
Download the PDF version of this report:
In 2022, malicious cyber actors exploited older software vulnerabilities more frequently than recently disclosed vulnerabilities and targeted unpatched, internet-facing systems. Proof of concept (PoC) code was publicly available for many of the software vulnerabilities or vulnerability chains, likely facilitating exploitation by a broader range of malicious cyber actors.
Malicious cyber actors generally have the most success exploiting known vulnerabilities within the first two years of public disclosure—the value of such vulnerabilities gradually decreases as software is patched or upgraded. Timely patching reduces the effectiveness of known, exploitable vulnerabilities, possibly decreasing the pace of malicious cyber actor operations and forcing pursuit of more costly and time-consuming methods (such as developing zero-day exploits or conducting software supply chain operations).
Malicious cyber actors likely prioritize developing exploits for severe and globally prevalent CVEs. While sophisticated actors also develop tools to exploit other vulnerabilities, developing exploits for critical, wide-spread, and publicly known vulnerabilities gives actors low-cost, high-impact tools they can use for several years. Additionally, cyber actors likely give higher priority to vulnerabilities that are more prevalent in their specific targets' networks. Multiple CVE or CVE chains require the actor to send a malicious web request to the vulnerable device, which often includes unique signatures that can be detected through deep packet inspection.
Table 1 shows the top 12 vulnerabilities the co-authors observed malicious cyber actors routinely exploiting in 2022:
CVE | Vendor | Product | Type | CWE |
Fortinet | FortiOS and FortiProxy | SSL VPN credential exposure | CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') | |
(Proxy Shell) | Microsoft | Exchange Server | RCE | CWE-918 Server-Side Request Forgery (SSRF) |
(Proxy Shell) | Microsoft | Exchange Server | Security Feature Bypass | CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
(Proxy Shell) | Microsoft | Exchange Server | Elevation of Privilege | CWE-287 Improper Authentication |
Zoho ManageEngine | ADSelfService Plus | RCE/ Authentication Bypass | CWE-287 Improper Authentication | |
Atlassian | Confluence Server and Data Center | Arbitrary code execution | ||
(Log4Shell) | Apache | Log4j2 | RCE |
CWE-20 Improper Input Validation
CWE-400 Uncontrolled Resource Consumption
CWE-502 Deserialization of Untrusted Data |
VMware | Workspace ONE Access and Identity Manager | RCE | CWE-94 Improper Control of Generation of Code ('Code Injection') | |
VMware | Workspace ONE Access, Identity Manager, and vRealize Automation | Improper Privilege Management | CWE-269 Improper Privilege Management | |
F5 Networks | BIG-IP | Missing Authentication Vulnerability | CWE-306 Missing Authentication for Critical Function | |
Microsoft | Multiple Products | RCE | None Listed | |
Atlassian | Confluence Server and Data Center | RCE |
In addition to the 12 vulnerabilities listed in Table 1, the authoring agencies identified vulnerabilities—listed in Table 2—that were also routinely exploited by malicious cyber actors in 2022.
CVE | Vendor | Product | Type | CWE |
Microsoft | Multiple Products | Arbitrary Code Execution | None Listed | |
Microsoft | Exchange Server | Arbitrary Code Execution | CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer | |
Ivanti | Pulse Secure Pulse Connect Secure | Arbitrary File Reading | CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') | |
Microsoft | Remote Desktop Services | RCE | ||
Citrix | Application Delivery Controller and Gateway | Arbitrary Code Execution | CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') | |
F5 Networks | BIG-IP | RCE | CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') | |
Microsoft | Multiple Products | Privilege Escalation | CWE-330: Use of Insufficiently Random Values | |
Oracle | WebLogic Server | RCE | None Listed | |
Oracle | WebLogic Server | RCE | None Listed | |
SonicWALL | SSLVPN SMA100 | SQL Injection | CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') | |
(ProxyLogon) | Microsoft | Exchange Server | RCE | CWE-918: Server-Side Request Forgery (SSRF) |
(ProxyLogon) | Microsoft | Exchange Server | RCE | CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
(ProxyLogon) | Microsoft | Exchange Server | RCE | None Listed |
(ProxyLogon) | Microsoft | Exchange Server | RCE | CWE-502: Deserialization of Untrusted Data |
SonicWALL | Email Security | Privilege Escalation Exploit Chain | CWE-269: Improper Privilege Management | |
Apache | HTTP Server | Server-Side Request Forgery | CWE-918: Server-Side Request Forgery (SSRF) | |
Apache | HTTP Server | Server Path Traversal | CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') | |
Apache | HTTP Server | Server Path Traversal | CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') | |
SonicWall | SMA 100 Series Appliances | Stack-based Buffer Overflow | CWE-121: Stack-based Buffer Overflow | |
Apache | Log4j | RCE | ||
Fortinet | FortiOS | Heap-based Buffer Overflow | ||
Zimbra | Collaboration Suite | 'Cross-site Scripting' | CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | |
SAP | Internet Communication Manager (ICM) | HTTP Request Smuggling | CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') | |
VMware Tanzu | Spring Cloud | RCE | CWE-94: Improper Control of Generation of Code ('Code Injection') | |
WSO2 | Multiple Products | RCE | CWE-434: Unrestricted Upload of File with Dangerous Type | |
Zimbra | Zimbra Collaboration Suite | Command Injection | ||
Microsoft | Windows CSRSS | Elevation of Privilege | CWE-269: Improper Privilege Management | |
QNAP | QNAP NAS | Externally Controlled Reference | CWE-610: Externally Controlled Reference to a Resource in Another Sphere | |
Microsoft | Exchange Server | Privilege Escalation | None Listed | |
Fortinet | FortiOS, FortiProxy, FortiSwitchManager | Authentication Bypass | CWE-306: Missing Authentication for Critical Function |
The authoring agencies recommend vendors and developers take the following steps to ensure their products are secure by design and default:
For more information on designing secure-by-design and -default products, including additional recommended secure-by-default configurations, see joint guide Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Security-by-Design and -Default.
The authoring agencies recommend end-user organizations implement the mitigations below to improve cybersecurity posture on the basis of the threat actors' activity. These mitigations align with the cross-sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA's Cross-Sector Cybersecurity Performance Goals for more information on CPGs, including additional recommended baseline protections.
The information in this report is being provided "as is" for informational purposes only. CISA, FBI, NSA, ACSC, CCCS, NCSC-NZ, CERT NZ, and NCSC-UK do not endorse any commercial product or service, including any subjects of analysis. Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring.
This document was developed by CISA, NSA, FBI, ACSC, CCCS, NCSC-NZ, CERT NZ, and NCSC-UK in furtherance of their respective cybersecurity missions, including their responsibilities to develop and issue cybersecurity specifications and mitigations.
[1] Apache Log4j Vulnerability Guidance
August 3, 2023: Initial version.
CVE | Vendor | Affected Products and Versions | Patch Information | Resources |
Microsoft | Multiple Products | Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows | ||
Microsoft | Office, Multiple Versions | Microsoft Office Memory Corruption Vulnerability, CVE-2017-11882 | ||
Fortinet | FortiOS and FortiProxy 2.0.2, 2.0.1, 2.0.0, 1.2.8, 1.2.7, 1.2.6, 1.2.5, 1.2.4, 1.2.3, 1.2.2, 1.2.1, 1.2.0, 1.1.6 | FortiProxy - system file leak through SSL VPN special crafted HTTP resource requests | Joint CSAs: | |
Ivanti | Pulse Secure Pulse Connect Secure versions, 9.0R1 to 9.0R3.3, 8.3R1 to 8.3R7, and 8.2R1 to 8.2R12 | CISA Alerts: Continued Exploitation of Pulse Secure VPN Vulnerability Chinese Ministry of State Security-Affiliated Cyber Threat Actor Activity ACSC Advisory: 2019-129: Recommendations to mitigate vulnerability in Pulse Connect Secure VPN Software Joint CSA: CCCS Alert: APT Actors Target U.S. and Allied Networks - Update 1 | ||
Microsoft | Remote Desktop Services | Remote Desktop Services Remote Code Execution Vulnerability | ||
Citrix | ADC and Gateway version 13.0 all supported builds before 13.0.47.24 NetScaler ADC and NetScaler Gateway, version 12.1 all supported builds before 12.1.55.18; version 12.0 all supported builds before 12.0.63.13; version 11.1 all supported builds before 11.1.63.15; version 10.5 all supported builds before 10.5.70.12 SD-WAN WANOP appliance models 4000-WO, 4100-WO, 5000-WO, and 5100-WO all supported software release builds before 10.2.6b and 11.0.3b | Joint CSAs: Chinese Ministry of State Security-Affiliated Cyber Threat Actor Activity CCCS Alert: Detecting Compromises relating to Citrix CVE-2019-19781 | ||
F5 | BIG IP versions 15.1.0, 15.0.0 to 15.0.1, 14.1.0 to 14.1.2, 13.1.0 to 13.1.3, 12.1.0 to 12.1.5, and 11.6.1 to 11.6.5 | K52145254: TMUI RCE vulnerability CVE-2020-5902 | CISA Alert: Threat Actor Exploitation of F5 BIG-IP CVE-2020-5902 | |
Microsoft | Windows Server, Multiple Versions | Microsoft Security Update Guide: Netlogon Elevation of Privilege Vulnerability, CVE-2020-1472 | ACSC Advisory: 2020-016: Netlogon Elevation of Privilege Vulnerability (CVE-2020-1472) Joint CSA: CCCS Alert: Microsoft Netlogon Elevation of Privilege Vulnerability - CVE-2020-1472 - Update 1 | |
O |