{"id":8312,"date":"2022-09-09T08:17:09","date_gmt":"2022-09-09T08:17:09","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?post_type=patch_watch&p=8312"},"modified":"2023-02-17T13:30:10","modified_gmt":"2023-02-17T20:30:10","slug":"dhs-cisa-kevs-weekly-edition-17-patch-before-you-hit-the-deadline","status":"publish","type":"patch_watch","link":"https:\/\/10.42.32.162\/patch_watch\/dhs-cisa-kevs-weekly-edition-17-patch-before-you-hit-the-deadline\/","title":{"rendered":"DHS CISA KEVs Weekly Edition 17: Patch Before You Hit the Deadline"},"content":{"rendered":"

In this 17th edition of the patch watch blog, we bring to you the vulnerabilities that CISA has recommended be patched between\u00a0 September 5, 2022 and\u00a0 September 9, 2022.<\/strong><\/p>\n

Why should organizations take notice of these vulnerabilities?<\/strong><\/h2>\n

The vulnerabilities listed in the KEVs are those that have a history of repeated exploitation by attackers. An unpatched KEV is an attack vector offered on a silver platter.<\/p>\n

Let us look at the analysis of all the vulnerabilities below:<\/strong><\/p>\n

\"\"<\/p>\n

    \n
  • \n

    Of the vulnerabilities to be patched this week, 93% have known exploits, implying that tried and tested code is readily available to misuse products with this exposure, with RCE\/PE belonging to the category of most dangerous exploits from an impact perspective.<\/p>\n<\/li>\n

  • \n

    Attackers are constantly looking out for available instances of 60% of these vulnerabilities that are trending in deep and dark web searches.<\/p>\n<\/li>\n

  • \n

    Vulnerabilities with ransomware and APT associations are most critical for an organization as they can cause devastating impacts ranging from being locked out of your own systems to data leaks, data corruption, sensitive data availability to malicious attackers, and even national-level threats.<\/p>\n<\/li>\n<\/ul>\n

    How Far Back Do They Go?<\/h2>\n

    The CVEs range from 2009 to 2022. Beware that old CVEs have many more exploits than the latest discovered ones.\u00a0Added to that, older the CVE, more mature is a given exploit code<\/strong>, allowing for deeper penetration into networks.<\/p>\n

    \"\"
    \nWhich Vendors Are Affected?<\/h2>\n

    Adobe has the highest count of CVEs that need to be patched this week.<\/p>\n

    The chart represents count of CVEs to be patched by each vendor and the due date for patching them<\/em><\/span><\/p>\n

    \"\"<\/p>\n

    We call upon vendors to take the initiative to inform their customers of existing flaws and the measures to be taken to keep their products safe from attacks.<\/p>\n

    Severity Scores<\/h2>\n

    Patching these vulnerabilities is of high priority, as many rank high and critical on the CVSS scoring scale. These are the vulnerabilities which, when exploited, allow attackers to engage in achieving their motives faster and with lesser effort, owing to the attack capabilities offered by the vulnerabilities.<\/p>\n

    \"\"<\/p>\n

    CVE-2022-32894, CVE-2022-32893, CVE-2022-2856 do not have any CVSS scores assigned to them.<\/strong> Organizations that depend solely on the NVD would not prioritize these vulnerabilities due to lack of a severity rating, although they are associated with a higher threat context.<\/p>\n

    Software Weaknesses<\/h2>\n

    The following CWEs have caused the vulnerabilities that need to be patched this week.<\/p>\n

    \"\"
    \nSeven CVEs (CVE-2022-26923, CVE-2022-32894, CVE-2022-32893, CVE-2009-3960, CVE-2017-15944, CVE-2022-21971, CVE-2022-2856) do\u00a0not have any associated CWE.\u00a0With no readily available mapping, organizations are at a loss to understand how these vulnerabilities can be utilized in a cyber attack.<\/strong><\/p>\n

    Read to learn more about our research into such gaps in mapping vulnerabilities to weaknesses, and thereby their mitre attack techniques.<\/a><\/p>\n