HB Ad Slot
HB Mobile Ad Slot
Joint Advisory Lists Top Routinely Exploited Vulnerabilities
Thursday, November 14, 2024

On November 12, 2024, the Cybersecurity and Infrastructure Security Agency, the Federal Bureau of Investigation, and the National Security Agency, along with its security partners in Australia, Canada, New Zealand, and the United Kingdom issued the cybersecurity advisory “2023 Top Routinely Exploited Vulnerabilities,” outlining top vulnerabilities impacting companies across the free world.

The advisory states that threat actors “exploited more zero-day vulnerabilities to compromise enterprise networks in 2023 compared to 2022, allowing them to conduct operations against high priority targets.”

The advisory “strongly encourage[s] vendors, designers, developers, and end-user organizations to implement the following recommendations, and those found within the Mitigations section of this advisory, to reduce the risk of compromise by malicious cyber actors.”

Some high-level tips include:

  • Vendors, designers, and developers. Implement secure by design and default principles and tactics to reduce the prevalence of vulnerabilities in your software.

> Follow the SP 800-218 Secure Software Development Framework (SSDF) and implement secure by design practices into each stage of the software development life cycle (SDLC). Establish a coordinated vulnerability disclosure program that includes processes to determine root causes of discovered vulnerabilities.

> Prioritize secure by default configurations, such as eliminating default passwords and not requiring additional configuration changes to enhance product security.

> Ensure that published CVEs include the proper CWE field, identifying the root cause of the vulnerability.

  • End-user organizations:

> Apply timely patches to systems.
Note: If CVEs identified in this advisory have not been patched, check for signs of compromise before patching.

> Implement a centralized patch management system.

> Use security tools such as endpoint detection and response (EDR), web application firewalls, and network protocol analyzers.

> Ask your software providers to discuss their secure by design program, provide links to information about how they are working to remove classes of vulnerabilities, and to set secure default settings.

The Advisory provides additional resources on technical findings and a list of the top exploited vulnerabilities. IT professionals may wish to consider this guidance and follow its recommendations.

HB Ad Slot
HB Ad Slot
HB Mobile Ad Slot
HB Ad Slot
HB Mobile Ad Slot
 
NLR Logo
We collaborate with the world's leading lawyers to deliver news tailored for you. Sign Up to receive our free e-Newsbulletins

 

Sign Up for e-NewsBulletins