What Were the Most Routinely Exploited Vulnerabilities of 2021?

Several of the leading cybersecurity agencies around the world have released a joint cybersecurity advisory alert (AA22-117A) outlining the top 15 Common Vulnerabilities and Exposures (CVEs) of 2021 and recommended mitigation strategies to apply.

According to the advisory alert, the document was developed by U.S., Australian, Canadian, New Zealand and UK cybersecurity authorities to continue their respective cybersecurity missions, including their responsibilities to develop and issue cybersecurity specifications and mitigations.

The global cybersecurity authorities and agencies contributing to the report include the FBI, CISA and NSA from the United States, the Australian Cyber Security Centre, Canadian Centre for Cyber Security, New Zealand National Cyber Security Centre and the United Kingdom’s National Cyber Security Centre.

The report found that most threat actors targeted internet-facing applications including email servers and VPNs in 2021, with the top 15 routinely exploited vulnerabilities outlined below.

Source: https://www.cisa.gov/uscert/ncas/alerts/aa22-117a

It is no surprise that the Log4Shell vulnerability is on the list, as this vulnerability took over the headlines for several weeks last year; however, the fact that it was not disclosed until December 2021 and still made the list shows how rapid and widespread the exploitation of this vulnerability was.

The list also includes three repeat offenders—CVE-2020-1472, CVE-2018-13379 and CVE-2019-11510— all appearing on the list last year, illustrating the frustration with organizations that fail to patch software and address vulnerabilities despite knowing that they exist.

In addition to the top 15 exploited vulnerabilities, the advisory alert shares other widely reported vulnerabilities exploited in 2021 that impacted several widely used products such as Microsoft Office, Accellion FTA and Cisco IOS software.

The advisory also provides a comprehensive section on mitigation, with best practices to maximize vulnerability and configuration management, protective controls and architecture, and identity and access management.

The complete advisory alert and list are available at www.cisa.gov/uscert/ncas/alerts/aa22-117a.

 Related Articles

 About Schneider Downs Cybersecurity

The Schneider Downs cybersecurity practice consists of experts offering a comprehensive set of information technology security services, including penetration testing, intrusion prevention/detection review, ransomware security, vulnerability assessments and a robust digital forensics and incident response team. For more information, visit www.schneiderdowns.com/cybersecurity or contact the team at [email protected].

In addition, our Digital Forensics and Incident Response teams are available 24x7x365 at 1-800-993-8937 if you suspect or are experiencing a network incident of any kind.

Want to be in the know? Subscribe to our bi-weekly newsletter, Focus on Cybersecurity, at www.schneiderdowns.com/subscribe.

You’ve heard our thoughts… We’d like to hear yours

The Schneider Downs Our Thoughts On blog exists to create a dialogue on issues that are important to organizations and individuals. While we enjoy sharing our ideas and insights, we’re especially interested in what you may have to say. If you have a question or a comment about this article – or any article from the Our Thoughts On blog – we hope you’ll share it with us. After all, a dialogue is an exchange of ideas, and we’d like to hear from you. Email us at [email protected].

Material discussed is meant for informational purposes only, and it is not to be construed as investment, tax, or legal advice. Please note that individual situations can vary. Therefore, this information should be relied upon when coordinated with individual professional advice.

© 2024 Schneider Downs. All rights-reserved. All content on this site is property of Schneider Downs unless otherwise noted and should not be used without written permission.

our thoughts on
8 Key Considerations When Reviewing User Access
Allegheny County Marriage License Data Leak May Affect Recent Newlyweds
Pell Grant Program Facing Shortfall
$1 Billion a Day: Unpacking the Financial Aftershock of the Change Healthcare Cyber-Attack
Get the Low Down Before You Download: Exploring the Temu App’s Security Risks
Six-Figure Ransomware Attack Hits Washington County, PA
Register to receive our weekly newsletter with our most recent columns and insights.
Have a question? Ask us!

We’d love to hear from you. Drop us a note, and we’ll respond to you as quickly as possible.

Ask us
contact us
Pittsburgh

This site uses cookies to ensure that we give you the best user experience. Cookies assist in navigation, analyzing traffic and in our marketing efforts as described in our Privacy Policy.

×