Vulnerability Management, Ransomware, Patch/Configuration Management

Report: CISA vulnerabilities catalog monitored by ransomware gangs

(Adobe Stock)

Ransomware operations have exploited 28% of security flaws in the Cybersecurity and Infrastructure Security Agency's Known Exploited Vulnerabilities catalog in attacks last year, according to The Register.

While some of the flaws — including the Cleo Harmony remote code execution bug, tracked as CVE-2024-50623, and the maximum severity Progress Kemp LoadMaster command execution issue, tracked as CVE-2024-1212 — were added following mass exploitation, most of the CISA KEV inclusions occurred within at least a week of confirmed exploits and intrusions, indicating ransomware gangs' tracking of the database, a report from GreyNoise revealed. Additional findings showed that vulnerabilities that are at least four years old — including the critical Dasan GPON router and Realtek SDK flaws CVE-2018-10561 and CVE-2014-8361, respectively — accounted for 40% of the exploited bugs last year. Meanwhile, organizations and other users leveraging Ivanti, D-Link, and VMware products were recommended to switch vendors due to their elevated zero-day exploits and mishandling of security fixes for vulnerable products.

An In-Depth Guide to Ransomware

Get essential knowledge and practical strategies to protect your organization from ransomware attacks.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds