Top 30 most exploited software vulnerabilities being used today

For all the , custom-crafted and other completely unknown security , others have been around for years and are widely used across the board. To showcase this, the (United States Federal Bureau of Investigation), CISA (United States ), ACSC (Australian Cyber Security Centre) and NCSC (United Kingdom National Cyber Security Centre) issued a Joint Cybersecurity Advisory. In this Advisory, they broke down the top 30 vulnerabilities used in 2020 and 2021.

Many of these vulnerabilities have been around for years, despite the manufacturer’s and developers’ best efforts. As shown by the “PrintNightmare in Microsoft’s Print Spooler, for example, just because something is known does not mean that it is easily eliminated.

Accellion

It’s very important to remember while going down this list that every vulnerability in this article is either considered “critical” at some point, and they all have been used extensively. Therefore the major takeaway from all of this is that if you’re using a product listed here, make sure you’re patched immediately.

The FTA server mentioned here is primarily used for transferring very large files. The program itself has been updated over 20 years and has been in sunset status since 2018.

Read More: https://resources.infosecinstitute.com/topic/top-30-most-exploited-software-vulnerabilities-being-used-today/