Top Threats

CISA Joint Advisory 2023 Top Routinely Exploited Vulnerabilities

  • 1.  CISA Joint Advisory 2023 Top Routinely Exploited Vulnerabilities

    Posted Nov 12, 2024 01:06:00 PM
      |   view attached

    Hi All,

    The following cybersecurity agencies coauthored this joint Cybersecurity Advisory (hereafter collectively referred to as the authoring agencies):
     United States: The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and National Security Agency (NSA)
     Australia: Australian Signals Directorate's Australian Cyber Security Centre (ACSC)
     Canada: Canadian Centre for Cyber Security (CCCS)
     New Zealand: New Zealand National Cyber Security Centre (NCSC-NZ) and Computer Emergency Response Team New Zealand (CERT NZ)
     United Kingdom: National Cyber Security Centre (NCSC-UK)
    This advisory provides details, collected and compiled by the authoring agencies, on the Common Vulnerabilities and Exposures (CVEs) routinely and frequently exploited by malicious cyber actors in 2023 and their associated Common Weakness Enumerations (CWEs). Malicious cyber actors exploited more zero-day vulnerabilities to compromise enterprise networks in 2023 compared to 2022, allowing them to conduct operations against high priority targets.
    The authoring agencies strongly encourage vendors, designers, developers, and end-user organizations to implement the following recommendations, and those found within the Mitigations section of this advisory, to reduce the risk of compromise by malicious cyber actors.

     Vendors, designers, and developers. Implement secure by design and default principles and tactics to reduce the prevalence of vulnerabilities in your software.
    ○ Follow the SP 800-218 Secure Software Development Framework (SSDF) and implement secure by design practices into each stage of the software development life cycle (SDLC). Establish a coordinated vulnerability disclosure program that includes processes to determine root causes of discovered vulnerabilities.
    November
    ○ Prioritize secure by default configurations, such as eliminating default passwords and not requiring additional configuration changes to enhance product security.
    ○ Ensure that published CVEs include the proper CWE field, identifying the root cause of the vulnerability.
     End-user organizations:
    ○ Apply timely patches to systems. Note: If CVEs identified in this advisory have not been patched, check for signs of compromise before patching.
    ○ Implement a centralized patch management system.
    ○ Use security tools such as endpoint detection and response (EDR), web application firewalls, and network protocol analyzers.
    ○ Ask your software providers to discuss their secure by design program, provide links to information about how they are working to remove classes of vulnerabilities, and to set secure default settings.



    ------------------------------
    Michael Roza CPA, CISA, CIA, CC, CCSKv5, CCZTv1, MBA, EMBA, CSA
    ------------------------------