Security

CSO

Five Eyes infosec agencies list 2023's most exploited software flaws

Slack patching remains a problem – which is worrying as crooks increasingly target zero-day vulns


The cyber security agencies of the UK, US, Canada, Australia, and New Zealand have issued a list of the 15 most exploited vulnerabilities in 2023, and warned that attacks on zero-day exploits have become more common.

"More routine initial exploitation of zero-day vulnerabilities represents the new normal which should concern end-user organizations and vendors alike as malicious actors seek to infiltrate networks," wrote Ollie Whitehouse, CTO of the UK's National Cyber Security Centre.

"To reduce the risk of compromise, it is vital all organizations stay on the front foot by applying patches promptly and insisting upon secure-by-design products in the technology marketplace," he added. "We urge network defenders to be vigilant with vulnerability management, have situational awareness in operations and call on product developers to make security a core component of product design and life-cycle to help stamp out this insidious game of whac-a-mole at source."

The top two spots on the list go to Citrix, which topped the chart with a remote code execution bug in versions 12 and 13 of NetScaler ADC and Gateway. The two platforms also got a second place spot due to sensitive information leaking when they are configured as a gateway or authentication, authorization and accounting (AAA) server.

Third and fourth positions on the Five Eyes wall of shame go to Cisco for issues with its IOS XE operating system. The worst issue saw attackers used paired issues to subvert the software – first by creating a local account and then elevating their privileges to root. The fourth most common route into the operating system was down to insufficient input validation that could also allow code to be run as root.

Another operating system in trouble – in fifth place – is Fortinet's FortiOS. The FortiProxy setup tool shares the problem: vulnerability to a heap-based buffer overflow vulnerability. Send the right request and it's open to remote code execution.

You'd expect a file transfer system to be a high-value target and in sixth place is an SQL injection vulnerability in Progress MOVEit Transfer that would allow an attacker to sniff around MySQL, Microsoft SQL Server, or Azure SQL databases. All versions of 2020.0 and 2019x are vulnerable and the flaw has been exploited in the wild since May.

In seventh we have Atlassian Confluence Data Center and Server, which allows attackers to create admin-level accounts and run code, thanks to an improper input validation flaw. The good news is that cloudy versions of Confluence aren't impacted – if accessed at an atlassian.net domain.

There's a blast from the past in at number eight: the Apache Log4j vulnerability from 2021 that caused havoc around the world. But it's still a serious issue, because many haven't patched log4j-core code.

More recent is the 2023 discovery of serious flaws in Barracuda Networks Email Security Gateway, which are much beloved by Chinese attackers. Again, it's an input validation issue – but as the ninth on the list it's clearly still popular.

SaaS-y software vendor Zoho takes tenth place with a serious and much exploited flaw in its ManageEngine tool. If an attacker sends a cunningly coded samlResponse XML to the ServiceDesk Plus SAML endpoint, it's game over. Thankfully only systems with SAML SSO activated are vulnerable.

Print management software seller PaperCut scored number 11 on the list, with a year-old flaw in its scripting that's being used to subvert systems. An attacker can bypass authentication completely to run a remote code attack.

Microsoft's first appearance on the list – at number 12 – is down to a venerable flaw in its netlogon protocol that was first spotted being attacked in September 2020. It's a pretty poor reflection on some people's patching protocols that this is still an issue – the agencies note that this same vuln has made the top 15 list for four years now.

Czech developer tools maker JetBrains takes the unlucky 13th spot on the list, for an authentication bypass in its continuous integration server TeamCity. While not too old a vulnerability, JetBrains has had other problems in the past and could do with improving its relations with the security industry.

Microsoft returns to the list at number 14 with an Outlook issue from March 2023. The vulnerability allows an attacker to escalate privileges, and Russia has been using this actively to go after Western critical infrastructure for the last year – so it's vital to fix.

Finally, open source file-sharing software biz ownCloud makes it on in last place with a CVSS 10-scoring flaw in its owncloud/graphapi 0.2.x before 0.2.1 and 0.3.x before 0.3.1 software. Attackers can use this flaw to steal admin passwords, mail server credentials, and license keys.

We cover these lists every year, but the same names keep cropping up. It's a good time to check and make sure you're fully covered – attackers certainly will. ®

Editor's note: This article was updated on November 15 to correct the year to 2023, not 2024 as first stated. We regret the error.

Send us news
28 Comments

How nice that state-of-the-art LLMs reveal their reasoning ... for miscreants to exploit

Blueprints shared for jail-breaking models that expose their chain-of-thought process

Ivanti endpoint manager can become endpoint ravager, thanks to quartet of critical flaws

PoC exploit code shows why this is a patch priority

C++ creator calls for help to defend programming language from 'serious attacks'

Bjarne Stroustrup wants standards body to respond to memory-safety push as Rust monsters lurk at the door

Does terrible code drive you mad? Wait until you see what it does to OpenAI's GPT-4o

Model was fine-tuned to write vulnerable software – then suggested enslaving humanity

UK's new thinking on AI: Unless it's causing serious bother, you can crack on

Plus: Keep calm and plug Anthropic's Claude into public services

FYI: An appeals court may kill a GNU GPL software license

Defense of FOSS licensing rests on the shoulders of a guy in Virginia

Why AI benchmarks suck

Anyone remember when Volkswagen rigged its emissions results? Oh...

Qualcomm pledges 8 years of security updates for Android kit using its chips (YMMV)

Starting with Snapdragon 8 Elite and 'droid 15

Open Source Initiative defends disallowing board candidate after timezone SNAFU

Here's another thing AI can do: Cause conflict around whether it's compatible with the very idea of open source

US Cyber Command reportedly pauses cyberattacks on Russia

PLUS: Phishing suspects used fishing gear as alibi; Apple's 'Find My' can track PCs and Androids; and more

Microsoft expands Copilot bug bounty targets, adds payouts for even moderate messes

Said bugs 'can have significant implications' – glad to hear that from Redmond

China's Silver Fox spoofs medical imaging apps to hijack patients' computers

Sly like a PRC cyberattack