Get Started Now

Get Started with a Free account on our PRIOn Knowledge Base

2023 Vulnerabilities and Threat Trends

Highlights

  • CVE-2023-23397 seems to be one of the most dangerous vulnerability in Q1 2023 as no user interaction is needed. It is a Privilege Escalation vulnerability and affects all versions of Microsoft Outlook desktop. APT28 threat actor group took advantage of this vulnerability to attack sectors such as Governments, Military, Energy and Transportation in broader Europe.
  • A Bypass Authentication vulnerability, CVE-2023-27350, affected Papercut servers. Bl00dy, Clop and Lockbit ransomware operations took advantage of this vulnerability by attacking different countries and sectors to steal corporate data.
  • Mirai Botnet, and variations of it , took advantage of two critical CVE vulnerabilities, the CVE-2023-28771 (Zyxel) and the CVE-2023-1389 (TP-Link) respectively. Both CVEs suffered from an OS command injection vulnerability.
  • Clop ransomware gang took advantage of the CVE-2023-0669 OS command injection vulnerability. It has been exploited as a zero-day to steal data from various companies worldwide.
  • A zero-day remote command injection vulnerability, CVE-2023-2868, has been exploited since 2022, for at least seven (7) months, to backdoor customers Barracuda Email Security Gateway (ESG) appliances. It was identified on May 19 2023. A custom malware was deployed to Barracuda ESG appliances with an ultimate goal to steal data.
  • Magniber ransomware gang group took advantage of the Security Bypass vulnerability, CVE-2023-24880, in Microsoft Windows.
  • Nokoyama ransomware gang group took advantage of the CLFS (Common Log File System) driver Privilege Escalation vulnerability, CVE-2023-28252, in Microsoft Windows.
  • A Russia threat actor group, namely FIN7, took advantage of a design flaw vulnerability, CVE-2023-27532, which affected the Veeam Backup software.
  • Threat actor groups, including UNC4857 and Lace Tempest, took advantage of a critical SQL Injection vulnerability, CVE-2023-34362, in the MOVEit Transfer, a secure managed file transfer software. Threat actors uploaded web shells with data exfiltration capabilities.

Vulnerabilities

In the following table we describe the vulnerabilities per vendor/product. Each row contains the following information:

  • CVE
  • Vendor
  • Product
  • PRIOn Score
  • Vulnerability Type
  • Threat Reports
  • Exploited in the Wild
  • Available exploits
  • Advisory (Patch/Info)
CVE
Vendor
Product
PRIOn Score
Vulnerability Type
Threat Reports
Exploited In the Wild
Exploits
Advisory (Patch/Info)
Microsoft
Office
99
Privilege Escalation
YES (APT28)
  • CISA KEV
  • Zer0-Day.cz
  • GoogleProjectHero
  • Github
  • PaperCut
    NG
    95
    Bypass Authentication
    YES (Bl00dy/Clop/LockBit)
  • CISA KEV
  • Coresecurity Labs
  • Github
  • ExploitDB
  • Fortra
    GoAnywhere MFT
    94
    Command Injection
    YES (T505/Clop/LockBit)
  • CISA KEV
  • Zer0-Day.cz
  • Coresecurity Labs
  • Metasploit
  • Github
  • ExploitDB
  • Microsoft
    Windows
    94
    Security Feature Bypass
    YES (Magniber)
  • CISA KEV
  • Zer0-Day.cz
  • GoogleProjectHero
  • N/A
    Microsoft
    Microsoft
    94
    Privilege Escalation
    YES (Nokoyama)
  • CISA KEV
  • Zer0-Day.cz
  • GoogleProjectHero
  • N/A
    Barracuda
    ESG
    93
    Command Injection
    YES (SALTWATER/SEASPY/SEASIDE)
  • CISA KEV
  • Zer0-Day.cz
  • N/A
    Zyxel
    ZyWALL/USG/FLEX/ATP
    93
    OS Command Injection
    YES (Mirai Botnet)
  • CISA KEV
  • Github
  • Progress
    MOVEit Transfer
    93
    SQL Injection
    YES (UNC4857)
  • CISA KEV
  • Zer0-Day.cz
  • N/A
    Google
    Chrome
    88
    Integer Overflow
    N/A
  • CISA KEV
  • Zer0-Day.cz
  • GoogleProjectHero
  • N/A
    Veeam
    Backup & Replication
    86
    Design Flaw
    YES (FIN7)
    N/A
  • Coresecurity Labs
  • Github
  • Microsoft
    Windows
    86
    Privilege Escalation
    N/A
  • CISA KEV
  • Zer0-Day.cz
  • N/A
    Google
    Chrome
    86
    Type Confusion
    N/A
  • CISA KEV
  • Zer0-Day.cz
  • GoogleProjectHero
  • N/A
    Apple
    Multiple
    86
    Out of Bounds Write
    N/A
  • CISA KEV
  • Zer0-Day.cz
  • GoogleProjectHero
  • N/A
    Adobe
    ColdFusion
    86
    Improper Access Control
    N/A
  • CISA KEV
  • Zer0-Day.cz
  • Metasploit
  • Microsoft
    Windows
    86
    Privilege Escalation
    N/A
  • CISA KEV
  • Zer0-Day.cz
  • GoogleProjectHero
  • N/A
    Microsoft
    Windows
    86
    Security Feature Bypass
    N/A
  • CISA KEV
  • Zer0-Day.cz
  • N/A
    Apple
    Multiple
    86
    Type Confusion
    N/A
  • CISA KEV
  • Zer0-Day.cz
  • GoogleProjectHero
  • N/A
    Microsoft
    Windows
    86
    Privilege Escalation
    N/A
  • CISA KEV
  • Zer0-Day.cz
  • GoogleProjectHero
  • N/A
    Sugarcrm
    Sugarcrm
    86
    Input Validation
    N/A
  • CISA KEV
  • Metasploit
  • Microsoft
    Windows
    85
    Remote Code Execution
    N/A
  • CISA KEV
  • Zer0-Day.cz
  • GoogleProjectHero
  • N/A
    Oracle
    Weblogic
    85
    Design Flaw
    N/A
  • CISA KEV
  • Coresecurity Labs
  • Github
  • Minio
    Minio
    84
    Information Disclosure
    N/A
  • CISA KEV
  • Github
  • Ruckuswireless
    Ruckuswireless
    83
    Remote Code Execution
    YES (AndoryuBot)
  • CISA KEV
  • N/A
    Apple
    Webkit
    82
    Use After Free
    N/A
  • CISA KEV
  • Zer0-Day.cz
  • GoogleProjectHero
  • N/A
    Apple
    Webkit
    82
    Out of Bounds Read
    N/A
  • CISA KEV
  • Zer0-Day.cz
  • GoogleProjectHero
  • N/A
    Apple
    Webkit
    82
    Sandbox Escape
    N/A
  • CISA KEV
  • Zer0-Day.cz
  • GoogleProjectHero
  • N/A
    ARM
    GPU
    81
    Memory Leak
    N/A
  • CISA KEV
  • Zer0-Day.cz
  • GoogleProjectHero
  • N/A
    TP-Link
    Archer Ax21
    80
    Command Injection
    YES (Mirai Botnet)
  • CISA KEV
  • N/A
    Microsoft
    Windows
    78
    Privilege Escalation
    N/A
  • GoogleProjectHero
  • Coresecurity Labs
  • Metasploit
  • Github
  • Zoho
    ManageEngine
    78
    Command Injection
    N/A
    N/A
  • Coresecurity Labs
  • Github
  • Microsoft
    Windows
    78
    Privilege Escalation
    N/A
    N/A
  • Coresecurity Labs
  • Debian
    Sudoedit
    78
    Privilege Escalation
    N/A
    N/A
  • Metasploit
  • Github
  • Microsoft
    Windows
    77
    Security Feature Bypass
    N/A
  • Zer0-Day.cz
  • Github
  • Microsoft
    Windows
    76
    Denial of Service
    N/A
    N/A
  • Coresecurity Labs
  • Microsoft
    Windows
    76
    Privilege Escalation
    N/A
    N/A
  • Coresecurity Labs
  • Linux
    Kernel
    75
    Use After Free
    YES (Variston-Heliconia framework)
  • CISA KEV
  • GoogleProjectHero
  • N/A
    Noviservey
    Noviservey
    73
    Remote Code Execution
    N/A
  • CISA KEV
  • N/A
    Apple
    Multiple
    71
    Use After Free
    N/A
  • CISA KEV
  • N/A
    Google
    Android
    71
    Privilege Escalation
    N/A
  • CISA KEV
  • GoogleProjectHero
  • N/A
    Microsoft
    Windows
    69
    Security Feature Bypass
    YES (BlackLotus)
    N/A
    N/A
    Microsoft
    Windows
    69
    Security Feature Bypass
    YES (Russian Threat Actor)
    N/A
    N/A
    Papercut
    NG
    68
    Bypass Authentication
    YES (Clop/Lockbit)
    N/A
    N/A
    3CX
    DesktopApp
    68
    Design Flaw
    YES (Unknown Actor(s))
    N/A
    N/A
    Samsung
    Mobile
    63
    Security Feature Bypass
    N/A
  • CISA KEV
  • GoogleProjectHero
  • N/A
    PRIOn Classification Recommendation
    21
    Patch Immediately (Score 100-85)
    15
    Must Be Patched (Score 84-75)
    8
    Should Be patched (Score 74-60)

    Vendors

    The following graph shows that 34.9% of the total disclosed vulnerabilities were reported in Microsoft products. The two closest ones were reported in Apple products with 14% and Google products with 6.98%.

    Vulnerability Types

    The following vulnerability types were extracted from the CVE descriptions via NLP classification techniques. Among them, Privilege Escalation, 22.7%, seems to be the number one vulnerability type. This vulnerability type allows unauthorized users to gain privileges, enabling them to access sensitive information or execute malicious activities. Security Feature Bypass is in the second place with 13.6%. Exploiting Security Feature Bypass vulnerabilities, threat actors can circumvent established (by design) security measures. In the third place we have Command Injection, 11.4%, critical vulnerabilities. By manipulating user input, attackers can execute arbitrary commands on vulnerable systems and gain unauthorized access to data. Other vulnerability types are memory corruption (e.g. Use After Free, Out of Bounds Read/Write, Type Confusion), Design Flaws, Input Validation, Authentication and Access Control issues etc.

    Disclosed Vulnerabilities over Months

    On this graph we can see the disclosed vulnerabilities per month. All months seem to be very busy in terms of exploitability, zero-days etc.

    Thoughts

    Understanding and monitoring vulnerability trends is crucial in maintaining robust cybersecurity practices. The evolving threat landscape demands constant vigilance and proactive measures from organizations and individuals alike. From the prevalence of privilege escalation vulnerabilities that enable unauthorized access to sensitive information, to the worrisome security feature bypass vulnerabilities that undermine established defenses, and the risks associated with command injection vulnerabilities that facilitate unauthorized execution of commands, it is clear that vulnerabilities continue to pose significant risks and evolve rapidly.

    The above analysis was done via the PRIOn Knowledge Base platform. PRIOn Knowledge Base, collects, enriches and analyses publicly disclosed vulnerabilities from the CVE program. It provides actionable data to cyber security practitioners to ensure that the most severe and dangerous vulnerabilities are prioritized. A risk score is assigned to each vulnerability according to its unique characteristics.

    Risk Based Vulnerability Management (RBVM) is one of the most challenging tasks in the cybersecurity landscape. We believe that a model that takes into account:

    • external contextualized data, such as threat and exploit intelligence, sentiment analysis on media presence
    • actionable extracted data from unstructured texts, using predictive Natural Processing Language techniques
    • internal business contextualized data (e.g. asset criticality, exposure etc.)
     

    will enable companies to address vulnerabilities that could matter most to their environment. PRIOn could help your organization to triage and prioritize cyber security risks across your entire IT environment.

    If you have any questions/comments/suggestions/corrections regarding the above analysis, feel free to contact us.

    © 2022-2023 PRIOn