Friday, April 12, 2024
spot_img
spot_img

Cyberattackers achieve their greatest successes by exploiting known and unpatched vulnerabilities, according to Tenable

spot_img
spot_img
- Advertisement -

An abundance of successful cyberattacks in the final quarter of 2023 resulted from threat actors leveraging known and exploitable vulnerabilities, according to Tenable, the Exposure Management Company. Telemetry data from Tenable’s Research Team found that 54% of devices affected by ‘CitrixBleed’ (aka CVE-2023-4966, the top vulnerability of Q4 2023) had not been remediated as of January 2024, more than three months after a patch was first announced. 


Similarly, a pair of Cisco flaws that were part of an attack chain to exploit Cisco devices running their Internetworking Operating System (IOS) and IOS XE operating systems (CVE-2023-20198 and CVE-2023-20273) had only been remediated in 39% of devices. 

While zero-days and AI-powered threats grab headlines, the known and unpatched vulnerabilities are most frequently exploited, especially when coupled with opportunistic actions by malicious actors, allowing ransomware to persist. 

Mr. Satnam Narang, senior staff research engineer, at Tenable. 
Mr. Satnam Narang, senior staff research engineer, at Tenable. 

“Threat actors continue to find success with known and exploitable vulnerabilities that organisations have failed to patch or remediate successfully. These long-known vulnerabilities frequently cause more destruction than emerging threats,” said Mr. Satnam Narang, senior staff research engineer, at Tenable. 

Despite the public disclosure of the Atlassian Confluence bug (CVE-2023-22518) in November 2023 and subsequent warnings about its exploitation for spreading the C3RB3R Ransomware, 43% of assets remained vulnerable as of January 23, 2024.  On December 20, 2023, there was a spike in IP addresses attempting to exploit several Atlassian flaws including CVE-2023-22515 and CVE-2023-22518. Despite these attempts, nearly half the assets remain vulnerable. 

“The key to keeping attackers at bay is organisations understanding the tactics, techniques and procedures employed. By digesting existing knowledge of common breach scenarios and implementing preventive measures, organisations can mitigate such risks. Organizations should focus on identifying and rectifying vulnerabilities promptly and addressing common misconfigurations to bolster cyber hygiene,” said Narang.

Covered By: NCN MAGAZINE / Tenable 

If you have an interesting Article / Report/case study to share, please get in touch with us at editors@roymediative.com , roy@roymediative.com9811346846/9625243429

- Advertisement -
spot_img
spot_img
spot_img
spot_img