{"id":7563,"date":"2021-01-21T20:52:29","date_gmt":"2021-01-22T03:52:29","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=7563"},"modified":"2023-04-05T12:41:19","modified_gmt":"2023-04-05T19:41:19","slug":"could-googles-most-searched-top-10-vulnerabilities-in-2020-be-key-attack-indicators","status":"publish","type":"post","link":"https:\/\/webdev.securin.xyz\/articles\/could-googles-most-searched-top-10-vulnerabilities-in-2020-be-key-attack-indicators\/","title":{"rendered":"Could Google\u2019s Most Searched Top 10 Vulnerabilities in 2020 be Key Attack Indicators?"},"content":{"rendered":"
\nWe analyzed ten vulnerabilities (discovered in 2020) that had a high search volume on google and here is what we found –<\/span><\/span><\/p>\n
\n
- \n
CVE-2020-10189 – a RCE vulnerability in Zoho\u2019s Manage Engine Desktop Central is being exploited by APT41.\u00a0<\/span><\/span><\/p>\n<\/li>\n
- \n
CVE-2020-0688 – a RCE vulnerability in Microsoft Exchange Server was exploited in March by APT group Dark Halo<\/a>. They used this weakness to bypass multi-factor authentication defenses against unauthorized email access, making it easy for them to log in to SolarWinds\u2019 trojanized update.\u00a0<\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<\/blockquote>\n
2020 was a productive year for threat actors. The world\u2019s workforce is working remotely while dealing with the pandemic and threat actors were busy weaponizing critical vulnerabilities that had a global impact. Many organizations fell prey to ransomware and sophisticated cyber attacks that allowed remote and privileged access to sensitive information.\u00a0<\/span><\/span><\/p>\n
CSW analysts examined the recent vulnerabilities (discovered in 2020) with high search volume in Google and found ten weaknesses (Click here to view the table<\/a>). <\/span><\/span><\/p>\n
We sought to find out why these vulnerabilities were searched and here are our insights –<\/span><\/span><\/p>\n
The average weaponization rate\u00a0<\/span><\/strong><\/span><\/h3>\n
While the average weaponization rate in 2020 is more than 45 days, four CVE\u2019s CVE-2020-10189, CVE-2020-9484, CVE-2020-1147 and CVE-2020-0688 got weaponized under 20 days of their discovery!<\/span><\/span><\/p>\n
While we are happy to share this insight it also begs the question as to how organizations can defend themselves without a sophisticated RBVM that would provide them this kind of dynamic trending analytics.<\/span><\/span><\/p>\n
<\/p>\n
Two vulnerabilities exploited by APT Groups & Ransomwares\u00a0<\/span><\/strong><\/span><\/h3>\n
We also found that a vulnerability (CVE-2020-10189) in Zoho\u2019s Cloud Desktop Central is being exploited by APT-41 –\u00a0 a Chinese APT group known for using Maze ransomware as their arsenal. Hackers have been selling access to networks that use this Remote Monitoring Management application for $100,000 in the dark web<\/a>.<\/span><\/span><\/p>\n
CVE-2020-0688 – a Microsoft Exchange Server vulnerability is being used by two ransomwares (Egregor, and Thanos). *Discovered in February 2020, an exploit became available for this vulnerability in March and within the same month it started trending.\u00a0<\/span><\/span><\/p>\n
Note<\/strong>: *Based on the trending charts from our RBVM platform (RiskSense) that draws data from hacker forums and advanced vulnerability analytics.<\/span><\/span><\/p>\n
This vulnerability was used by APT Group Dark Halo to bypass multi-factor authentication defenses against unauthorized email access making it easy for them to login to SolarWinds trojanized update. <\/span>Dark Halo is suspected to have attacked SolarWinds three times between late 2019 and July 2020.<\/a><\/span><\/p>\n
Common Weaknesses that caused these vulnerabilities\u00a0<\/span><\/strong><\/span><\/h3>\n
The products that are weakened by these vulnerabilities are Microsoft Exchange Server, Windows (10, 8, 7) & Windows server (2019, 2016, 2008, 2012), Oracle\u2019s Fusion Middleware, Weblogic Server, Zoho\u2019s Manage Engine Desktop Central, Apache\u2019s Tomcat and CISCO\u2019s Ios xr.<\/span><\/span><\/p>\n
When we analyzed the CWE (common weakness enumeration) we found the following – CWE-835 (Infinite Loop), CWE-269 (Improper Privilege Management), CWE-20 (Improper Input Validation), CWE-134 (Use of Externally-Controlled Format String), and CWE-502 (Deserialization of Untrusted Data). Out of three vulnerabilities categorized under CWE-502 two are being used by APT groups and ransomware.\u00a0<\/span><\/span><\/p>\n
This calls to question the secure coding practices that developers need to adopt. They should avoid these weaknesses even while they write the code to avoid shipping products that are vulnerable to serious cyber attacks.<\/span><\/span><\/p>\n
Analysis of Top 3 Vulnerability Scanners<\/span><\/strong><\/span><\/h3>\n
The good news is that popular scanners such as Tenable, Nexpose, and Qualys can detect these vulnerabilities. However, Nexpose doesn\u2019t detect these two vulnerabilities – CVE-2020-2555 and CVE-2020-3118.<\/span><\/span><\/p>\n
<\/a>Google’s 2020 Top 10 Vulnerabilities<\/h4>\n