Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

10/20/2020
02:50 PM
50%
50%

NSA Reveals the Top 25 Vulnerabilities Exploited by Chinese Nation-State Hackers

Officials urge organizations to patch the vulnerabilities most commonly scanned for, and exploited by, Chinese attackers.

The US National Security Agency (NSA) today published a list of the top 25 publicly known vulnerabilities most often scanned for and targeted by state-sponsored attackers out of China.

Related Content:

Trickbot Tenacity Shows Infrastructure Resistant to Takedowns

2020 State of Cybersecurity Operations and Incident Response

New on The Edge: Expert Tips to Keep WordPress Safe

Chinese state-sponsored cyber activity is "one of the greatest threats" to US National Security Systems, the US Defense Industrial Base, and Department of Defense information networks, the NSA writes in its advisory. This activity often includes a range of tactics and techniques to target networks for sensitive intellectual property and economic, political, and military information.

These attackers typically use the same process as other sophisticated actors: they first identify their target, gather technical data, identify vulnerabilities linked to the target, develop or reuse an exploit, and then launch their attack operation. 

Most of the vulnerabilities on the NSA's list can be exploited to gain initial access into victim networks using products that are directly accessible from the Internet and act as gateways into internal networks. Most of these products are used for remote access or external Web services, and "should be prioritized for immediate patching," NSA officials say.

This list includes recently disclosed flaws like Zerologon in Microsoft Windows and other vulnerabilities in Windows, Windows Server, Citrix Gateway, Pulse Connect Secure, F5 BIG-IP proxy/load balancer devices, Adobe ColdFusion, Oracle WebLogic Server, and other products and services. 

The NSA advises organizations to prioritize patching these 25 vulnerabilities and notes this is a non-exhaustive list of what is available to, and used by, Chinese attackers; however, these flaws are those known to be operationalized by China. 

Read the NSA's cybersecurity advisory for more details.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-28976
PUBLISHED: 2020-11-30
The Canto plugin 1.3.0 for WordPress contains a blind SSRF vulnerability. It allows an unauthenticated attacker can make a request to any internal and external server via /includes/lib/detail.php?subdomain=SSRF.
CVE-2020-28977
PUBLISHED: 2020-11-30
The Canto plugin 1.3.0 for WordPress contains blind SSRF vulnerability. It allows an unauthenticated attacker can make a request to any internal and external server via /includes/lib/get.php?subdomain=SSRF.
CVE-2020-28978
PUBLISHED: 2020-11-30
The Canto plugin 1.3.0 for WordPress contains blind SSRF vulnerability. It allows an unauthenticated attacker can make a request to any internal and external server via /includes/lib/tree.php?subdomain=SSRF.
CVE-2020-27660
PUBLISHED: 2020-11-30
SQL injection vulnerability in request.cgi in Synology SafeAccess before 1.2.3-0234 allows remote attackers to execute arbitrary SQL commands via the domain parameter.
CVE-2020-27659
PUBLISHED: 2020-11-30
Multiple cross-site scripting (XSS) vulnerabilities in Synology SafeAccess before 1.2.3-0234 allow remote attackers to inject arbitrary web script or HTML via the (1) domain or (2) profile parameter.