{"id":7557,"date":"2021-03-02T20:47:34","date_gmt":"2021-03-03T03:47:34","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=7557"},"modified":"2023-04-05T12:41:08","modified_gmt":"2023-04-05T19:41:08","slug":"google-trends-most-searched-top-10-vulnerabilities-in-2020","status":"publish","type":"post","link":"https:\/\/webdev.securin.xyz\/articles\/google-trends-most-searched-top-10-vulnerabilities-in-2020\/","title":{"rendered":"Google Trends: Most Searched Top 10 Vulnerabilities in 2020"},"content":{"rendered":"
CSW experts compiled the list of vulnerabilities that were highly searched in Google and came up with top 10 CVEs. Here are our insights as to why they trended –<\/p>\n
8 out of 10 CVEs are RCE vulnerabilities<\/p>\n<\/li>\n
7 CVEs are associated with 24 ransomwares. Notable among them are Cerber, Petya, Ryuk, Locky, Wannacry, Samsa, Satan etc.<\/p>\n<\/li>\n
4 vulnerabilities are being used by 27 APT Groups. Two APT groups are known to be Chinese state actors (APT41 & Cycldek). CVE-2017-11882 and CVE-2017-0199 are being used by 14 APT groups each<\/p>\n<\/li>\n
Among the top 10 is CVE-2017-5638 – the infamous Apache Struts vulnerability, responsible for Equifax Data Breach in 2017.<\/p>\n<\/li>\n
CVE-2019-0708 – a RCE vulnerability is present in 349K active targets<\/p>\n<\/li>\n<\/ul>\n
CVE-2017-5638 – a RCE vulnerability in Apache struts was found trending in 2020. This vulnerability was used to breach into Equifax and expose personal information of 147 million people.<\/p>\n
CVE-2017-0143, another RCE vulnerability that exists in Windows Server 2012 is used by 136K computers around the globe.<\/p>\n
Click here to download the exposure data<\/a><\/p>\n Four out of ten vulnerabilities are categorized under CWE-20 (Improper input validation) spotlighting what developers ought to keep in mind while writing their code.<\/p>\n Seven Vulnerabilities are associated with 24 ransomware strains and they have been spotlighted in our recently published Ransomware 2021report.<\/a><\/p>\n Notable among them are Cerber, Petya, Ryuk, Locky, Wannacry, Samsa, Satan etc. Out of the seven CVE-2017-0143 and CVE-2017-11882 are associated with 10 and 8 ransomware strains respectively.<\/p>\n Four CVEs (CVE-2017-11882, CVE-2017-0199, CVE-2017-0143, CVE-2018-7600) are being used by 27 APT groups. China, Russia, North Korea and Iran were some of the nation states that are controlling these APT groups.<\/p>\n CVE-2017-11882 and CVE-2017-0199 are being used by 14 APT groups each, to infiltrate into critical organizations and mount targeted attacks resulting in exposure of proprietary and sensitive information.<\/p>\n CVE-2019-5544 (CVSSv3 9.8) is an interesting vulnerability that exists in VMware products<\/a> (ESXI, Enterprise Linux Desktop, Enterprise Linux Server Aus etc.).This CVE is used as a Ransomware chain along with another critical CVE (CVE-2020-3992) to exploit virtual hard disks.<\/p>\n CVE-2020-0549<\/a> is a medium severity weakness that exists in Intel products and this vulnerability is capable of resurrecting private browsing history details, passwords etc. This CVE was widely searched because this weakness was discovered in 2020 and it affects desktop, laptop, cloud computers, physical servers that use intel processor generations released from 2011 onwards.<\/p>\n CVE-2020-2555 – RCE bug in Oracle products has a score of 9.5 and is red-flagged by National Security Agency (NSA) as they are used by Chinese APT groups<\/a>.<\/p>\nFoundational Code Weakness<\/strong><\/h2>\n
Ransomware, APT Groups & Malware<\/strong><\/h2>\n
A Pentester’s Perspective<\/strong><\/h2>\n
Are you vulnerable to these CVEs? Click here to download patches<\/h4>\n