here<\/a> to know more about our research.<\/p>\n <\/p>\n
Techniques and Tactics<\/strong><\/p>\nTo understand how attackers could exploit the vulnerabilities in VPNs, we mapped the CVEs to their MITRE techniques and tactics.<\/p>\n
\n- \n
Unsurprisingly, the top three tactics were Initial Access, Impact, and Execution<\/strong>.<\/p>\n<\/li>\n- \n
CVE-2022-1388 <\/strong>stood apart as it could be used in six different ways in an attack: Initial Access, Persistence, Privilege Escalation, Defense Evasion, Lateral Movement, and Impact. This vulnerability in BIG-IP systems could allow unauthenticated attackers to execute arbitrary system commands and disable services. The impact combined with the capabilities make CVE-2022-1388 a highly dangerous vulnerability that must be patched without delay.<\/p>\n<\/li>\n<\/ul>\n <\/p>\n
Are Scanners Finding It All?<\/h2>\n
The go-to solution for organizations to identify vulnerabilities in their systems is to use a scanner. We cross-referenced the identified vulnerabilities with popular scanners\u2019 results to understand if they were flagging all.<\/p>\n
\n- \n
A staggering 294 vulnerabilities in VPNs are not being detected by popular scanners<\/strong> such as Nessus, Nexpose, and Qualys. This means that these vulnerabilities will not be detected even if they are in your systems.<\/p>\n<\/li>\n- \n
32 of the missed vulnerabilities have been weaponized.<\/p>\n<\/li>\n
- \n
CVE-2021-27860 (FatPipe VPN RCE) and CVE-2020-9054 (Zyxel Firmware RCE) are CISA KEVs with elapsed deadlines of Jan. 24 and Apr. 15, respectively, when they should have been patched as directed by the federal mandate. These do not have scanner plugins.<\/p>\n<\/li>\n<\/ul>\n
<\/p>\n
If the scanners you use do not catch these vulnerabilities, you will miss out on their patches and create a pathway for attackers to exploit.\u00a0<\/strong><\/p>\n <\/p>\n
Weaponized Vulnerabilities in VPNs missed by scanners<\/p>\n