12:00am, 4 August 2023
TLP Rating:
Joint advisory: 2022 top routinely exploited vulnerabilities
The joint advisory provides details on the top Common Vulnerabilities and Exposures (CVEs) routinely exploited by malicious cyber actors in 2022, as well as other frequently exploited CVEs.
Joint advisory: 2022 top routinely exploited vulnerabilities
International partners include the:
- the U.S. Cybersecurity and Infrastructure Security Agency (CISA External Link ),
- National Security Agency (NSA External Link ),
- the Federal Bureau of Investigation (FBI External Link ),
- and the cyber security authorities of Australia, Australian Cyber Security Centre (ASD’s ACSC External Link ),
- Canada, Canadian Centre for Cyber Security (CCCS External Link ), and
- United Kingdom’s National Cyber Security Centre (NCSC-UK External Link ).,
What's happening
Systems affected
The advisory outlines the most routinely exploited vulnerabilities from 2022. Threat actors continue to rely on these known CVEs to gain unauthorised access and compromise systems across a wide range of sectors.
What this means
The authoring agencies encourage organisations to apply the recommendations in the mitigations section of this advisory and to check for signs of compromise, even if a vulnerability was previously patched.
Key mitigations include:
- applying timely patches to systems, and
- implementing a centralised patch management system to reduce the risk of compromise by malicious cyber actors.
What to look for
How to tell if you're at risk
Organisations should review systems for indicators of compromise linked to CVEs listed in the advisory, even if they believe vulnerabilities have already been mitigated.
What to do
Prevention
Lisa Fong, responsible for New Zealand’s National Cyber Security Centre, said, “This advisory reinforces one of the foundational aspects of cyber security. Malicious actors continue to succeed using the same techniques over and over. I can’t emphasise enough the importance of doing the basics well by understanding your assets, and rapidly applying patches when they become available. Acting on CVE reporting is the difference between getting onto your to-do list and getting onto someone else’s to-do list.”
CERT NZ Director Rob Pope said, “This is a timely reminder for organisations that asset lifecycle management and patching policies are incredibly important. I’d also like to stress that vulnerability disclosure is a very good thing and organisations that supply software or services should have a vulnerability disclosure policy in place as part of the secure-by-design principles. Doing this makes everyone more secure in the long run.”
More information
How helpful was this page?
This site is protected by reCAPTCHA and the Google Privacy Policy External Link and Terms of Service External Link apply.