{"id":7471,"date":"2022-01-04T18:59:13","date_gmt":"2022-01-05T01:59:13","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=7471"},"modified":"2024-04-10T10:22:01","modified_gmt":"2024-04-10T17:22:01","slug":"top-5-affected-products-in-cisas-catalog-of-known-exploited-vulnerabilities-kev","status":"publish","type":"post","link":"https:\/\/webdev.securin.xyz\/articles\/top-5-affected-products-in-cisas-catalog-of-known-exploited-vulnerabilities-kev\/","title":{"rendered":"Top 5 Affected Products in CISA\u2019s Catalog of Known Exploited Vulnerabilities (KEV)\u00a0\u00a0"},"content":{"rendered":"

A deep dive into CISA\u2019s catalog of 311 known exploited vulnerabilities reveals a plethora of vendors who have multiple products affected by several vulnerabilities. We looked into the products with the most vulnerabilities and the maximum CVEs associated with them. Let us take a closer look at the Top 5 worst-affected products.\u00a0<\/strong><\/p>\n

 <\/p>\n

Product Density Map<\/strong><\/h2>\n

\"CISA<\/p>\n

We have already looked at the top vendors affected<\/a>, where Microsoft, Apple, and Google share the top three positions with the most vulnerabilities. When we look at the product density map, however, Google and Microsoft take pole positions, appearing twice in the same list, but for different products. Ruling the roost, Chrome and Exchange Servers share 10 vulnerabilities each. Apple creates a neat divide to the table with 9 vulnerabilities affecting iOS. Chromium V8 and Windows Win32K take up 9 and 7 pieces each to make it the fourth and fifth worst affected products by number of associated vulnerabilities.<\/p>\n

A detailed list of product versions affected is listed at the end of this article as a ready-reckoner that can be referred to during remediation.<\/p><\/blockquote>\n

 <\/p>\n

Google Chrome<\/strong><\/h2>\n

Google Chrome has the highest number of vulnerabilities affecting it. With a total of 10 unique CVEs, it stands atop the product density list, alongside Microsoft Exchange Server.<\/p>\n

 <\/p>\n\n\n\n\n\n\n\n<\/colgroup>\n\n\n\n\n\n\n\n\n\n\n\n\n
\n

CVE ID<\/strong><\/p>\n<\/td>\n

\n

CVSS v3 Score | Severity<\/strong><\/p>\n<\/td>\n

\n

APT Associations<\/strong><\/p>\n<\/td>\n

\n

Ransomware<\/strong><\/p>\n

Associations<\/strong><\/p>\n<\/td>\n

\n

CWE Enumeration<\/strong><\/p>\n<\/td>\n

\n

CISA Patch Deadline<\/strong><\/p>\n<\/td>\n<\/tr>\n

\n

CVE-2021-30633\u200b<\/a><\/p>\n<\/td>\n

\n

9.6 | CRITICAL<\/p>\n<\/td>\n

\n

n\/a<\/p>\n<\/td>\n

\n

n\/a<\/p>\n<\/td>\n

\n

CWE-416<\/p>\n<\/td>\n

November 2021<\/td>\n<\/tr>\n
\n

CVE-2021-37973\u200b<\/a><\/p>\n<\/td>\n

\n

9.6 | CRITICAL<\/p>\n<\/td>\n

\n

n\/a<\/p>\n<\/td>\n

\n

n\/a<\/p>\n<\/td>\n

\n

CWE-416<\/p>\n<\/td>\n

\n

November 2021<\/p>\n<\/td>\n<\/tr>\n

\n

CVE-2020-16017<\/a><\/p>\n<\/td>\n

\n

9.6 | CRITICAL<\/p>\n<\/td>\n

\n

n\/a<\/p>\n<\/td>\n

\n

n\/a<\/p>\n<\/td>\n

\n

CWE-416<\/p>\n<\/td>\n

\n

May 2022<\/p>\n<\/td>\n<\/tr>\n

\n

CVE-2021-21166\u200b<\/a><\/p>\n<\/td>\n

\n

8.8 | HIGH<\/p>\n<\/td>\n

\n

n\/a<\/p>\n<\/td>\n

\n

n\/a<\/p>\n<\/td>\n

\n

CWE-119<\/p>\n<\/td>\n

\n

November 2021<\/p>\n<\/td>\n<\/tr>\n

\n

CVE-2021-30554\u200b<\/a><\/p>\n<\/td>\n

\n

8.8 | HIGH<\/p>\n<\/td>\n

\n

n\/a<\/p>\n<\/td>\n

\n

n\/a<\/p>\n<\/td>\n

\n

CWE-416<\/p>\n<\/td>\n

\n

November 2021<\/p>\n<\/td>\n<\/tr>\n

\n

CVE-2021-30563\u200b<\/a><\/p>\n<\/td>\n

\n

8.8 | HIGH<\/p>\n<\/td>\n

\n

n\/a<\/p>\n<\/td>\n

\n

n\/a<\/p>\n<\/td>\n

\n

CWE-843<\/p>\n<\/td>\n

\n

November 2021<\/p>\n<\/td>\n<\/tr>\n

\n

CVE-2021-30632<\/a><\/p>\n<\/td>\n

\n

8.8 | HIGH<\/p>\n<\/td>\n

\n

n\/a<\/p>\n<\/td>\n

\n

n\/a<\/p>\n<\/td>\n

\n

CWE-787<\/p>\n<\/td>\n

\n

November 2021<\/p>\n<\/td>\n<\/tr>\n

\n

CVE-2021-37975\u200b<\/a><\/p>\n<\/td>\n

\n

8.8 | HIGH<\/p>\n<\/td>\n

\n

n\/a<\/p>\n<\/td>\n

\n

n\/a<\/p>\n<\/td>\n

\n

CWE-416<\/p>\n<\/td>\n

\n

November 2021<\/p>\n<\/td>\n<\/tr>\n

\n

CVE-2020-15999<\/a><\/p>\n<\/td>\n

\n

6.5 | MEDIUM<\/p>\n<\/td>\n

\n

n\/a<\/p>\n<\/td>\n

\n

n\/a<\/p>\n<\/td>\n

\n

CWE-787<\/p>\n<\/td>\n

\n

November 2021<\/p>\n<\/td>\n<\/tr>\n

\n

CVE-2021-37976<\/a><\/p>\n<\/td>\n

\n

6.5 | MEDIUM<\/p>\n<\/td>\n

\n

n\/a<\/p>\n<\/td>\n

\n

n\/a<\/p>\n<\/td>\n

\n

N\/A<\/p>\n<\/td>\n

\n

November 2021<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n

 <\/p>\n

Some Google Chrome vulnerabilities that are worthy of mention are:<\/strong><\/p>\n

    \n
  1. \n

    CVE-2021-37973<\/a>, a use after free zero-day vulnerability that leads to remote code execution and affects the portals in Google Chrome versions prior to v94.0.4606.61.<\/p>\n<\/li>\n

  2. \n

    Most of the vulnerabilities associated with Chrome in 2021 were zero-day flaws<\/a> that require immediate remediation to avoid exploitation attacks.<\/p>\n<\/li>\n<\/ol>\n

     <\/p>\n

    Microsoft Exchange Server<\/strong><\/h2>\n

    Microsoft Exchange Server leads the product tally with a total of 10 unique CVEs affecting a variety of products.<\/p>\n

    The Exchange Server has also been plagued by ransomware attacks<\/a> in the last couple of months. Here is a detailed analysis of the 10 CVEs.<\/p>\n

     <\/p>\n\n\n\n\n\n\n\n<\/colgroup>\n\n\n\n\n\n\n\n\n\n\n\n\n
    \n

    CVE ID<\/strong><\/p>\n<\/td>\n

    \n

    CVSS v3 Score | Severity<\/strong><\/p>\n<\/td>\n

    \n

    APT Associations<\/strong><\/p>\n<\/td>\n

    \n

    Ransomware Associations<\/strong><\/p>\n<\/td>\n

    \n

    CWE Enumeration<\/strong><\/p>\n<\/td>\n

    \n

    CISA Patch Deadline<\/strong><\/p>\n<\/td>\n<\/tr>\n

    \n

    CVE-2021-26855<\/a><\/p>\n<\/td>\n

    \n

    9.8 | Critical<\/p>\n<\/td>\n

    \n

    10<\/p>\n<\/td>\n

    3<\/td>\n\n

    N\/A<\/p>\n<\/td>\n

    \n

    April 2021<\/p>\n<\/td>\n<\/tr>\n

    \n

    CVE-2021-34473<\/a><\/p>\n<\/td>\n

    \n

    9.8 | Critical<\/p>\n<\/td>\n

    \n

    1<\/p>\n<\/td>\n

    \n

    3<\/p>\n<\/td>\n

    \n

    N\/A<\/p>\n<\/td>\n

    \n

    November 2021<\/p>\n<\/td>\n<\/tr>\n

    \n

    CVE-2021-34523<\/a><\/p>\n<\/td>\n

    \n

    9.8 | Critical<\/p>\n<\/td>\n

    \n

    1<\/p>\n<\/td>\n

    \n

    2<\/p>\n<\/td>\n

    \n

    CWE-269<\/p>\n<\/td>\n

    \n

    November 2021<\/p>\n<\/td>\n<\/tr>\n

    \n

    CVE-2020-0688<\/a><\/p>\n<\/td>\n

    \n

    8.8 | High<\/p>\n<\/td>\n

    \n

    1<\/p>\n<\/td>\n

    \n

    2<\/p>\n<\/td>\n

    \n

    CWE-798<\/p>\n<\/td>\n

    \n

    May 2022<\/p>\n<\/td>\n<\/tr>\n

    \n

    CVE-2021-42321<\/a><\/p>\n<\/td>\n

    \n

    8.8 | High<\/p>\n<\/td>\n

    \n

    –<\/p>\n<\/td>\n

    \n

    –<\/p>\n<\/td>\n

    \n

    N\/A<\/p>\n<\/td>\n

    \n

    December 2021<\/p>\n<\/td>\n<\/tr>\n

    \n

    CVE-2020-17144<\/a><\/p>\n<\/td>\n

    \n

    8.4 | High<\/p>\n<\/td>\n

    \n

    –<\/p>\n<\/td>\n

    \n

    –<\/p>\n<\/td>\n

    \n

    N\/A<\/p>\n<\/td>\n

    \n

    May 2022<\/p>\n<\/td>\n<\/tr>\n

    \n

    CVE-2021-26857<\/a><\/p>\n<\/td>\n

    \n

    7.8 | High<\/p>\n<\/td>\n

    \n

    9<\/p>\n<\/td>\n

    2<\/td>\n\n

    N\/A<\/p>\n<\/td>\n

    \n

    April 2021<\/p>\n<\/td>\n<\/tr>\n

    \n

    CVE-2021-27065<\/a><\/p>\n<\/td>\n

    \n

    7.8 | High<\/p>\n<\/td>\n

    \n

    9<\/p>\n<\/td>\n

    \n

    4<\/p>\n<\/td>\n

    \n

    N\/A<\/p>\n<\/td>\n

    \n

    April 2021<\/p>\n<\/td>\n<\/tr>\n

    \n

    CVE-2021-26858<\/a><\/p>\n<\/td>\n

    \n

    7.8 | High<\/p>\n<\/td>\n

    \n

    9<\/p>\n<\/td>\n

    \n

    2<\/p>\n<\/td>\n

    \n

    N\/A<\/p>\n<\/td>\n

    \n

    April 2021<\/p>\n<\/td>\n<\/tr>\n

    \n

    CVE-2021-31207<\/a><\/p>\n<\/td>\n

    \n

    7.2 | High<\/p>\n<\/td>\n

    \n

    1<\/p>\n<\/td>\n

    \n

    2<\/p>\n<\/td>\n

    \n

    N\/A<\/p>\n<\/td>\n

    \n

    November 2021<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n

    MS Exchange vulnerabilities that are worthy of mention are:<\/strong><\/p>\n

      \n
    1. \n

      The ProxyLogon vulnerabilities<\/a> comprise four flaws –\u00a0CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065 –\u00a0each being crucial for organizations to fix since multiple ransomware and APT groups have exploited them in the wild.<\/p>\n<\/li>\n

    2. \n

      A Google Trends analysis of the aforementioned vulnerabilities finds the following trends in the past year.<\/p>\n<\/li>\n<\/ol>\n\n\n<\/colgroup>\n\n\n\n\n\n\n\n\n\n
      \n

      CVE-2021-26855<\/strong><\/p>\n<\/td>\n<\/tr>\n

      \n

      \"Google<\/p>\n<\/td>\n<\/tr>\n

      \n

      CVE-2021-26857<\/strong><\/p>\n<\/td>\n<\/tr>\n

      \n

      \"Google<\/p>\n<\/td>\n<\/tr>\n

      \n

      CVE-2021-26858<\/strong><\/p>\n<\/td>\n<\/tr>\n

      \n

      \"Google<\/p>\n<\/td>\n<\/tr>\n

      \n

      CVE-2021-27065<\/strong><\/p>\n<\/td>\n<\/tr>\n

      \n

      \"Google<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n

       <\/p>\n

        \n
      1. \n

        The vulnerabilities tagged as CVE-2021-31207, CVE-2021-34473, CVE-2021-34523 comprise what is popularly known as the ProxyShell vulnerabilities<\/a>. CVE-2021-34473, which was recently exploited by Blackbyte ransomware<\/a>, was noted trending in Australia, Germany, and India in the last 90 days.<\/p>\n<\/li>\n<\/ol>\n\n\n<\/colgroup>\n\n\n\n\n\n\n\n
        \n

        CVE-2021-31207<\/strong><\/p>\n<\/td>\n<\/tr>\n

        \n

        \"Google<\/p>\n<\/td>\n<\/tr>\n

        \n

        CVE-2021-34473<\/strong><\/p>\n<\/td>\n<\/tr>\n

        \n

        \"Google<\/p>\n<\/td>\n<\/tr>\n

        \n

        CVE-2021-34523<\/strong><\/p>\n<\/td>\n<\/tr>\n

        \n

        \"Google<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n

          \n
        1. \n

          MS Exchange vulnerabilities have been associated with major ransomware groups such as Conti<\/a>, Petya, Ryuk<\/a>, WannaCry<\/a>, Lockfile, Magniber, Vice Society<\/a>, and more recently, BlackByte.<\/p>\n<\/li>\n<\/ol>\n

           <\/p>\n

          Apple iOS<\/strong><\/h2>\n

          Apple\u2019s iOS has a total of nine vulnerabilities associated with it, giving Apple the third position on the products affected list.<\/p>\n

           <\/p>\n\n\n\n\n\n\n\n<\/colgroup>\n\n\n\n\n\n\n\n\n\n\n\n
          \n

          CVE ID<\/strong><\/p>\n<\/td>\n

          \n

          CVSS v3 Score | Severity<\/strong><\/p>\n<\/td>\n

          \n

          APT Associations<\/strong><\/p>\n<\/td>\n

          \n

          Ransomware Associations<\/strong><\/p>\n<\/td>\n

          \n

          CWE Enumeration<\/strong><\/p>\n<\/td>\n

          \n

          CISA Patch Deadline<\/strong><\/p>\n<\/td>\n<\/tr>\n

          \n

          CVE-2021-1870<\/a><\/p>\n<\/td>\n

          \n

          9.8 | CRITICAL<\/p>\n<\/td>\n

          \n

          n\/a<\/p>\n<\/td>\n

          \n

          n\/a<\/p>\n<\/td>\n

          \n

          N\/A<\/p>\n<\/td>\n

          \n

          November 2021<\/p>\n<\/td>\n<\/tr>\n

          \n

          CVE-2021-1871\u200b<\/a><\/p>\n<\/td>\n

          \n

          9.8 | CRITICAL<\/p>\n<\/td>\n

          \n

          n\/a<\/p>\n<\/td>\n

          \n

          n\/a<\/p>\n<\/td>\n

          \n

          N\/A<\/p>\n<\/td>\n

          \n

          November 2021<\/p>\n<\/td>\n<\/tr>\n

          \n

          CVE-2021-30661<\/a><\/p>\n<\/td>\n

          \n

          8.8 | HIGH<\/p>\n<\/td>\n

          \n

          n\/a<\/p>\n<\/td>\n

          \n

          n\/a<\/p>\n<\/td>\n

          \n

          CWE-416<\/p>\n<\/td>\n

          \n

          November 2021<\/p>\n<\/td>\n<\/tr>\n

          \n

          CVE-2021-30666\u200b<\/a><\/p>\n<\/td>\n

          \n

          8.8 | HIGH<\/p>\n<\/td>\n

          \n

          n\/a<\/p>\n<\/td>\n

          \n

          n\/a<\/p>\n<\/td>\n

          \n

          CWE-120<\/p>\n<\/td>\n

          \n

          November 2021<\/p>\n<\/td>\n<\/tr>\n

          \n

          CVE-2021-30761\u200b<\/a><\/p>\n<\/td>\n

          \n

          8.8 | HIGH<\/p>\n<\/td>\n

          \n

          n\/a<\/p>\n<\/td>\n

          \n

          n\/a<\/p>\n<\/td>\n

          \n

          CWE-787<\/p>\n<\/td>\n

          \n

          November 2021<\/p>\n<\/td>\n<\/tr>\n

          \n

          CVE-2021-30762\u200b<\/a><\/p>\n<\/td>\n

          \n

          8.8 | HIGH<\/p>\n<\/td>\n

          \n

          n\/a<\/p>\n<\/td>\n

          \n

          n\/a<\/p>\n<\/td>\n

          \n

          CWE-416<\/p>\n<\/td>\n

          \n

          November 2021<\/p>\n<\/td>\n<\/tr>\n

          \n

          CVE-2021-30860<\/a><\/p>\n<\/td>\n

          \n

          7.8 | HIGH<\/p>\n<\/td>\n

          \n

          n\/a<\/p>\n<\/td>\n

          \n

          n\/a<\/p>\n<\/td>\n

          \n

          CWE-190<\/p>\n<\/td>\n

          \n

          November 2021<\/p>\n<\/td>\n<\/tr>\n

          \n

          CVE-2021-1782<\/a><\/p>\n<\/td>\n

          \n

          7.0 | HIGH<\/p>\n<\/td>\n

          \n

          n\/a<\/p>\n<\/td>\n

          \n

          n\/a<\/p>\n<\/td>\n

          \n

          CWE-362 | CWE-269<\/p>\n<\/td>\n

          \n

          November 2021<\/p>\n<\/td>\n<\/tr>\n

          \n

          CVE-2021-1879\u200b<\/a><\/p>\n<\/td>\n

          \n

          6.1 | MEDIUM<\/p>\n<\/td>\n

          \n

          1<\/p>\n<\/td>\n

          \n

          n\/a<\/p>\n<\/td>\n

          \n

          CWE-79<\/p>\n<\/td>\n

          \n

          November 2021<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n

          Here are some iOS vulnerabilities that are worthy of mention:<\/strong><\/p>\n

            \n
          1. \n

            Two high severity vulnerabilities which include CVE-2021-30860<\/a>, the other being CVE-2021-30858, were found trending in the wild over the last month. Interestingly, both the vulnerabilities have been linked to the infamous Pegasus Spyware zero-click iMessages attack<\/a> in September 2021.<\/p>\n<\/li>\n<\/ol>\n

            \"CISA<\/p>\n

            \u00a0 \u00a0 2. CVE-2021-30860 was seen trending mostly in Canada, France, and Germany
            \nthis year.<\/p>\n

            \"Google<\/p>\n

              \n
            1. \n

              Two zero-day vulnerabilities of interest that affect the Webkit Storage in iOS devices are CVE-2021-30761 and CVE-2021-30762<\/a>. Both vulnerabilities lead to arbitrary code execution attacks.<\/p>\n<\/li>\n<\/ol>\n

              Google Chromium V8<\/strong><\/h2>\n

              Google appears twice in the list of Top products affected, with Chromium V8 affected by 8 vulnerabilities.<\/p>\n

               <\/p>\n\n\n\n\n\n\n\n<\/colgroup>\n\n\n\n\n\n\n\n\n\n\n\n
              \n

              CVE ID<\/strong><\/p>\n<\/td>\n

              \n

              CVSS v3 Score | Severity<\/strong><\/p>\n<\/td>\n

              \n

              APT Associations<\/strong><\/p>\n<\/td>\n

              \n

              Ransomware Associations<\/strong><\/p>\n<\/td>\n

              \n

              CWE Enumeration<\/strong><\/p>\n<\/td>\n

              \n

              CISA Patch Deadline<\/strong><\/p>\n<\/td>\n<\/tr>\n

              \n

              CVE-2021-21148\u200b<\/a><\/p>\n<\/td>\n

              \n

              8.8 | HIGH<\/p>\n<\/td>\n

              \n

              n\/a<\/p>\n<\/td>\n

              \n

              n\/a<\/p>\n<\/td>\n

              \n

              CWE-787<\/p>\n<\/td>\n

              \n

              November 2021<\/p>\n<\/td>\n<\/tr>\n

              \n

              CVE-2021-21193\u200b<\/a><\/p>\n<\/td>\n

              \n

              8.8 | HIGH<\/p>\n<\/td>\n

              \n

              n\/a<\/p>\n<\/td>\n

              \n

              n\/a<\/p>\n<\/td>\n

              \n

              CWE-416<\/p>\n<\/td>\n

              \n

              November 2021<\/p>\n<\/td>\n<\/tr>\n

              \n

              CVE-2021-21220\u200b<\/a><\/p>\n<\/td>\n

              \n

              8.8 | HIGH<\/p>\n<\/td>\n

              \n

              n\/a<\/p>\n<\/td>\n

              \n

              n\/a<\/p>\n<\/td>\n

              \n

              CWE-119|CWE-20<\/p>\n<\/td>\n

              \n

              November 2021<\/p>\n<\/td>\n<\/tr>\n

              \n

              CVE-2021-21224\u200b<\/a><\/p>\n<\/td>\n

              \n

              8.8 | HIGH<\/p>\n<\/td>\n

              \n

              n\/a<\/p>\n<\/td>\n

              \n

              n\/a<\/p>\n<\/td>\n

              \n

              CWE-843<\/p>\n<\/td>\n

              \n

              November 2021<\/p>\n<\/td>\n<\/tr>\n

              \n

              CVE-2021-30551\u200b<\/a><\/p>\n<\/td>\n

              \n

              8.8 | HIGH<\/p>\n<\/td>\n

              \n

              n\/a<\/p>\n<\/td>\n

              \n

              n\/a<\/p>\n<\/td>\n

              \n

              CWE-843<\/p>\n<\/td>\n

              \n

              November 2021<\/p>\n<\/td>\n<\/tr>\n

              \n

              CVE-2020-16009\u200b<\/a><\/p>\n<\/td>\n

              \n

              8.8 | HIGH<\/p>\n<\/td>\n

              \n

              n\/a<\/p>\n<\/td>\n

              \n

              n\/a<\/p>\n<\/td>\n

              \n

              CWE-787|CWE-843<\/p>\n<\/td>\n

              \n

              May 2022<\/p>\n<\/td>\n<\/tr>\n

              \n

              CVE-2020-16013<\/a><\/p>\n<\/td>\n

              \n

              8.8 | HIGH<\/p>\n<\/td>\n

              \n

              n\/a<\/p>\n<\/td>\n

              \n

              n\/a<\/p>\n<\/td>\n

              \n

              CWE-787<\/p>\n<\/td>\n

              \n

              May 2022<\/p>\n<\/td>\n<\/tr>\n

              \n

              CVE-2020-6418\u200b<\/a><\/p>\n<\/td>\n

              \n

              6.5 | MEDIUM<\/p>\n<\/td>\n

              \n

              n\/a<\/p>\n<\/td>\n

              \n

              n\/a<\/p>\n<\/td>\n

              \n

              CWE-787|CWE-843<\/p>\n<\/td>\n

              \n

              May 2022<\/p>\n<\/td>\n<\/tr>\n

              \n

              CVE-2021-4102<\/a><\/p>\n<\/td>\n

              \n

              –<\/p>\n<\/td>\n

              \n

              –<\/p>\n<\/td>\n

              \n

              –<\/p>\n<\/td>\n

              \n

              –<\/p>\n<\/td>\n

              \n

              December 2021<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n

               <\/p>\n

              Some Chromium V8 vulnerabilities of interest are as follows:<\/strong><\/p>\n

                \n
              1. \n

                CVE-2020-6418, is a remote code execution type confusion in Chromium V8 in Google Chrome versions prior to 80.0.3987.122. It allows an attacker to remotely exploit heap corruption via a maliciously crafted HTML page. It was exploited through vulnerability chaining<\/a> by a threat actor in the past. The patch for the vulnerability was released in February 2020.<\/p>\n<\/li>\n

              2. \n

                Our security analysts sensed malicious possibilities and advised users to address the following issue immediately. CVE-2021-30551<\/a>, a trending zero-day vulnerability in Chrome\u2019s Javascript engine which has privilege escalation capabilities. On June 10, 2021, CISA issued<\/a> a warning alert to urge users to patch these Chrome vulnerabilities that could allow an attacker to hijack affected systems.<\/p>\n<\/li>\n

              3. \n

                CVE-2021-30551 was seen trending primarily in Canada and the United States in 2021.<\/p>\n<\/li>\n<\/ol>\n

                \"Google<\/p>\n

                Microsoft Windows Win32K<\/strong><\/h2>\n

                Microsoft Windows Win32K, with 7 unique CVEs affecting its products tie Microsoft alongside Google with two products each in the top 5.<\/p>\n

                 <\/p>\n\n\n\n\n\n\n\n<\/colgroup>\n\n\n\n\n\n\n\n\n\n
                \n

                CVE ID<\/strong><\/p>\n<\/td>\n

                \n

                CVSS v3 Score | Severity<\/strong><\/p>\n<\/td>\n

                \n

                APT Associations<\/strong><\/p>\n<\/td>\n

                \n

                Ransomware Associations<\/strong><\/p>\n<\/td>\n

                \n

                CWE Enumeration<\/strong><\/p>\n<\/td>\n

                \n

                CISA Patch Deadline<\/strong><\/p>\n<\/td>\n<\/tr>\n

                \n

                CVE-2021-1732\u200b<\/a><\/p>\n<\/td>\n

                \n

                7.8 | HIGH<\/p>\n<\/td>\n

                \n

                1<\/p>\n<\/td>\n

                \n

                n\/a<\/p>\n<\/td>\n

                \n

                CWE-269<\/p>\n<\/td>\n

                \n

                November 2021<\/p>\n<\/td>\n<\/tr>\n

                \n

                CVE-2021-28310\u200b<\/a><\/p>\n<\/td>\n

                \n

                7.8 | HIGH<\/p>\n<\/td>\n

                \n

                1<\/p>\n<\/td>\n

                \n

                n\/a<\/p>\n<\/td>\n

                \n

                CWE-269<\/p>\n<\/td>\n

                \n

                November 2021<\/p>\n<\/td>\n<\/tr>\n

                \n

                CVE-2019-0797\u200b<\/a><\/p>\n<\/td>\n

                \n

                7.8 | HIGH<\/p>\n<\/td>\n

                \n

                n\/a<\/p>\n<\/td>\n

                \n

                n\/a<\/p>\n<\/td>\n

                \n

                N\/A<\/p>\n<\/td>\n

                \n

                May 2022<\/p>\n<\/td>\n<\/tr>\n

                \n

                CVE-2019-0803\u200b<\/a><\/p>\n<\/td>\n

                \n

                7.8 | HIGH<\/p>\n<\/td>\n

                \n

                n\/a<\/p>\n<\/td>\n

                \n

                n\/a<\/p>\n<\/td>\n

                \n

                N\/A<\/p>\n<\/td>\n

                \n

                May 2022<\/p>\n<\/td>\n<\/tr>\n

                \n

                CVE-2019-0808\u200b<\/a><\/p>\n<\/td>\n

                \n

                7.8 | HIGH<\/p>\n<\/td>\n

                \n

                n\/a<\/p>\n<\/td>\n

                \n

                2<\/p>\n<\/td>\n

                \n

                N\/A<\/p>\n<\/td>\n

                \n

                May 2022<\/p>\n<\/td>\n<\/tr>\n

                \n

                CVE-2019-0859\u200b<\/a><\/p>\n<\/td>\n

                \n

                7.8 | HIGH<\/p>\n<\/td>\n

                \n

                1<\/p>\n<\/td>\n

                \n

                1<\/p>\n<\/td>\n

                \n

                N\/A<\/p>\n<\/td>\n

                \n

                May 2022<\/p>\n<\/td>\n<\/tr>\n

                \n

                CVE-2020-1054<\/a><\/p>\n<\/td>\n

                \n

                7.8 | HIGH<\/p>\n<\/td>\n

                \n

                n\/a<\/p>\n<\/td>\n

                \n

                n\/a<\/p>\n<\/td>\n

                \n

                CWE-787<\/p>\n<\/td>\n

                \n

                May 2022<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n

                 <\/p>\n

                It is interesting to note that the vulnerabilities affecting Windows Win32K are all escalation of privileges vulnerabilities.<\/strong><\/p>\n

                <\/h2>\n

                Securin Vendor-specific Patch Watch notifications are a lifeline for organizations looking for product-specific information.<\/strong><\/h2>\n
                \n

                Securin security experts and researchers have provided Vendor-specific patch watch notifications and have called out more than 198 of the 311 vulnerabilities detailed by CISA in their Known Exploited Vulnerabilities (KEV) catalog<\/a>.<\/strong><\/p>\n<\/blockquote>\n

                It is a priority for organizations to take immediate action towards patching these exploited vulnerabilities. At Securin, our expert pentesters and security researchers can help prioritize the patching of the vulnerabilities and conduct monthly or quarterly assessments to improve your cyber hygiene, thereby enhancing your organization\u2019s security posture.<\/p>\n

                A list of the vulnerabilities mentioned in the blog having ransomware and threat group associations is detailed below. These vulnerabilities should be given special importance since some of them are trending and are being actively exploited by these attackers.<\/p>\n