Research-Report-2022 Threat Landscape Report
Research-Report-2022 Threat Landscape Report
Research-Report-2022 Threat Landscape Report
THREAT LANDSCAPE
REPORT
A guide for security professionals to
navigate the modern attack surface
Contents
Foreword............................................................................................................................................. 3
Executive Summary........................................................................................................................... 5
Methodology....................................................................................................................................... 9
How to use this report........................................................................................................................ 9
Introduction.......................................................................................................................................10
Data security....................................................................................................................................21
Breaches............................................................................................................................................ 31
Unspecified cyberattacks are the root cause of a quarter of breach events...................................33
Conclusion......................................................................................................................................... 38
is not helping
full remediation was achieved.
And Log4Shell was hardly the only risk security organizations had to manage in 2022.
The year — marked by macroeconomic shocks spurred by rising inflation and geopolitical to reduce risk.
upheaval in the wake of Russia’s invasion of Ukraine — brought with it the disclosure of
even more vulnerabilities in common libraries and dependencies, and an intensification of
ransomware attacks.
In the course of its daily work, Tenable’s SRT inspects data from hundreds of sources
in order to identify events relevant to our customers and the broader cybersecurity
industry. From this vantage point, the team is able to view the vulnerability and threat
landscapes holistically to help security professionals identify the trends that matter
most. This contextual view is essential for organizations looking to evolve from a reactive
cybersecurity posture to one focusing on preventive and proactive measures. We believe
Cybersecurity organizations are well beyond the point where vulnerability management can
be performed in a vacuum. It’s time to embrace exposure management, a relatively new
concept designed to transcend the limitations of siloed security programs. Building an
exposure management program involves bringing together data from tools associated with
vulnerability management, web application security, cloud security, identity security, attack
path analysis and attack surface management and analyzing it in context with your unique
mix of users and IT, operational technology (OT) and internet of things (IoT) assets so you can
execute a risk-based workflow. Exposure management also provides cybersecurity leaders
with the analysis they need to clearly explain the effectiveness of proactive, preventive
security programs in a language the business will understand.
Robert Huber
CSO and Head of Research,
Tenable
In a year marked by tense geopolitics, hacktivism, ransomware and attacks targeting critical
infrastructure — all alongside a turbulent macroeconomic environment — organizations
struggled to keep pace with the demands on their cybersecurity teams and resources.
Even as the world faced these challenges, events we observed throughout the year
represented a fairly typical year in cybersecurity. Attacks against critical infrastructure
remained a common concern. Ransomware continued to wreak havoc, even as some groups
had operations shuttered by law enforcement, collapsed under the weight of internal
power struggles or splintered into new groups. New vulnerabilities emerged and reliable
remediation posed challenges for defenders.
The constant evolution of the modern digital environment introduces new challenges for
security practitioners. Successful security programs must take a comprehensive approach
and understand where their most sensitive data and systems lay and what vulnerabilities or
misconfigurations pose the greatest risk. Given the brisk rate of digital transformation, a
complete understanding of your external attack surface is paramount.
With thousands of new vulnerabilities patched each year, only a small subset will ever see
active exploitation.
Ongoing risks, vulnerabilities and attacks within the software supply chain.
Known
1 Vulnerabilities
(2017-2021)
CVE-20XX-XXXX 2 Log4shell:
Apache Log4j
CVE-2021-44228
3 Follina: Microsoft
Support Diagnostic
Tool
CVE-2022-30190
4 Atlassian
Confluence Server
5 ProxyShell: and Data Center
Microsoft CVE-2022-26134
Exchange Server
CVE-2021-34473
Protect data by examining some of the common ways data breaches occur
and what your organization can do to prevent them.
In Section One, we explore the vulnerability landscape and notable events in 2022
including:
• The ongoing prominence of Microsoft Exchange Server vulnerabilities in attacks
In Section Two, we explore the events that shaped the threat landscape including:
• Nation state activity
• The sustained impact of ransomware and the evolution of the ecosystem and tactics
• Data breach events and key observations drawn from a compilation of publicly
available data
In Section Three, we provide a list of all the vulnerabilities discussed in the report,
including noteworthy vulnerabilities from these vendors:
Each year, tens of thousands of vulnerabilities are disclosed by members of the security community and
internal research teams at organizations around the world. These vulnerabilities are cataloged by the
National Vulnerability Database as Common Vulnerabilities and Exposures (CVEs). Over a five year period
from 2018 through 2022, the number of reported CVEs increased at an average annual growth rate of 26.3%.
There were 25,112 vulnerabilities reported in 2022 as of January 9, 2023, which represents a 14.4% increase
over the 21,957 reported in 2021 and a 287% increase over the 6,447 reported in 2016.
Attacks targeting vulnerabilities in Microsoft Exchange Server have been attributed to at least 10 unique ransomware groups or strains and
half a dozen advanced persistent threat (APT) operations. These vulnerabilities, frequently leading to privilege escalation or remote code
execution (RCE), are particularly useful for initial access to target networks.
Later in the year, GTSC Cybersecurity Technology Company Limited published information regarding two zero days in Microsoft Exchange
Server (CVE-2022-41040 and CVE-2022-41082) that it had seen exploited in the wild. These flaws were dubbed “ProxyNotShell” by the
We routinely
more difficult than it already is. We routinely advise organizations to focus on remediating
vulnerabilities undergoing active exploitation, but they cannot follow that advice without
On the other side of the coin, some vendors created problems through their own proactive
organizations behavior. In October, both Fortinet and OpenSSL caused confusion by preannouncing
to focus on
vulnerabilities. In both cases, the lack of accurate information available to the public led to
rampant speculation and burned resources as security teams were expected to respond
remediating and produce results in a vacuum of information. When vulnerabilities can be a critical
link in devastating attack chains, and miscommunication puts insurmountable stress on
vulnerabilities security and engineering teams, vendors must do better to provide quick, but accurate and
actionable information.
undergoing
active Supply chain vulnerabilities and attacks
The Log4Shell vulnerability, disclosed late in 2021, kicked off a second year of supply
exploitation, chain concerns. In the 2021 Threat Landscape Retrospective, we highlighted compromised
libraries and repositories and that trend continued through 2022. Python Packaging Index
but they libraries, Node Package Manager (npm), Javascript packages and WordPress plugins were
all compromised for various purposes — stealing passwords or login tokens, installing
cannot follow backdoors and exfiltrating sensitive data.
that advice While 2021 certainly saw significant vulnerabilities in and attacks against supply chains
— both software and physical — 2022 was more characterized by the vulnerabilities than
without the attacks. It felt as if every few months the industry was bracing for “the next Log4Shell.”
Rarely did the flaws touted as such match the severity of Log4Shell, but the effects they
effective had on defenders and DevOps teams were nearly as disruptive. Even with the less severe
remediation
vulnerabilities, organizations had to activate incident response playbooks to cope with
demands for information from customers and partners.
guidance from Since the 2020 incident targeting organizations via the SolarWinds Orion platform, it feels
vendors.
as if the cybersecurity industry is lurching from one watershed moment to another, with
security teams caught in the churn. This issue was apparent with the vulnerabilities in
OpenSSL (CVE-2022-3786 and CVE-2022-3602) addressed in early November.
The pre-announcement of the flaw as a critical vulnerability in a key building block of many
products and services understandably triggered high intensity responses across security
teams. However, the lack of actionable information during the intervening week, and the
truth of the lower severity, did not ease the pressure on teams to conjure answers and
outcomes. This was the most troubling example, but not the only one, of vulnerabilities
that exist on a sliding scale of severity and hype. Vulnerabilities in the Apache Commons
Text library (CVE-2022-42889, “Text4Shell”) and the Spring Framework (CVE-2022-22965,
“Spring4Shell”) both occupy positions on this scale.
Given the true severity and long term impact of Log4Shell and the incidents involving
SolarWinds and Kaseya, coupled with the inherent uncertainty of vulnerability disclosures,
these supply chain vulnerabilities will continue to cause major disruptions, even if they’re
never exploited. Until the industry develops better tactics for communicating and operating
with uncertainty, precious resources will be expended chasing the wrong vulnerabilities.
For 2022, our tracking of zero-day vulnerabilities includes flaws that prior to its public disclosure,
were exploited in the wild, as well as flaws that were publicly disclosed or has been publicly disclosed
prior to patches being made available or that do not have patches. prior to a patch being made
available. As soon as a
While zero-day vulnerabilities garner a lot of attention, these threats are rarely exploited zero day is disclosed and a
en masse and instead are used in limited targeted attacks. In many cases, these flaws patch is made available it, of
receive patches quickly and transition into the bucket of vulnerabilities we refer to as
course, joins the pantheon of
known vulnerabilities. Throughout 2022, as part of our analysis of publicly available vendor
advisories, disclosures and news articles, we identified 101 zero-day vulnerabilities. For known vulnerabilities.
contrast, we identified 105 zero-day vulnerabilities in 2021.
Other 10%
Firewall 2%
Remote Management
2%
Workspace Collaboration
Operating System 50% 2%
Content Management
System (CMS) 3%
Internet of
Things 3%
Email Client/Server 5%
In 2022, we observed stark changes in zero-day vulnerability trends. Unlike the previous two
years, where browser-based vulnerabilities led the pack, this year operating system
vulnerabilities surged to the top of the charts, accounting for over half of all zero-day
vulnerabilities.
Other 5%
Adobe 2%
Apple 32%
Citrix 2%
Mozilla 2%
Sophos 2%
Trend Micro 2%
Nooie 3%
Open Source 3%
Zimbra 3%
Fortinet 4%
Google 12%
Microsoft 28%
As in prior years, the platforms with the largest user base accounted for the greatest
number of vulnerabilities in 2022. Zero days in Apple products accounted for 31.7% of all
zero-day vulnerabilities, followed by Microsoft at 27.7%. Products from Apple and Microsoft
accounted for a combined total of 59.4% of all zero-day vulnerabilities disclosed in 2022.
2021 2022
32 23
- -28.1%
In 2021, 32 browser-based zero days were disclosed and Google’s Chrome browser
accounted for 17 of them. In 2022, browser-based zero days declined by nearly 30% (28.1%),
accounting for 23, nine of which were associated with Google Chrome. It is unclear as
to why there was a sharp decline in browser-based zero days, but one theory is that the
browser-based sandboxes have made it more difficult for attackers to exploit. Another
possibility is that threat actors are pivoting away from zero days and focusing their efforts
on known vulnerabilities that remain unpatched.
23%
Not Exploited
77%
Exploited
The vast majority (77.2%) of zero-day vulnerabilities disclosed in 2022 were exploited in the
wild. Yet, this is a 5.8% decrease compared to 2021, which saw 83% of disclosed zero days
exploited in the wild.
Of the 78 zero days exploited in the wild this year, the lion’s share exists in Apple, Microsoft
and Google products. Apple accounted for 37.2% of zero days exploited in the wild across
multiple products, including iOS, iPadOS and macOS, followed by Microsoft at 19.2%.
Google accounted for 15.4%, including Chrome and Android.
Microsoft 15
Google 12
Fortinet 4
Zimbra 3
Trend Micro 2
Sophos 2
Mozilla 2
Citrix 2
WordPress Plugin 1
SolarWinds 1
Open Source 1
Mitel 1
Cisco 1
Atlassian 1
Adobe 1
0 5 10 15 20 25 30 35
For starters, it’s relatively rare for a zero day to be exploited en masse prior to disclosure.
Such flaws are most often exploited in limited, targeted attacks. In other cases, zero days
are responsibly disclosed by cybersecurity researchers to vendors, who issue patches as
quickly as possible.
Apple is a case in point. Despite accounting for over a third of zero days exploited in the
wild, Apple products, to our knowledge, have not seen widespread exploitation of any zero
days in 2022.
On the other hand, CVE-2022-26134, a zero day in Atlassian Confluence Server and
Data Center, became one of our top five vulnerabilities in 2022 because we observed
a significant increase in exploitation after its disclosure in early June 2022. This
vulnerability, which was originally exploited in the wild as a zero day, was first disclosed
when Atlassian released the patch to address the issue. In the days that followed this
disclosure, exploitation increased as this flaw became a known vulnerability. This flaw
poses a significant threat to organizations using affected versions of Confluence Server
and Data Center.
It’s also important to recognize zero days are often used by attackers to pivot directly into
known flaws that are routinely exploited by threat actors of all types including ransomware
affiliates and APT groups. ProxyLogon (CVE-2021-26855), a zero day in Microsoft Exchange
Server that was disclosed and patched on March 2, 2021, is a prime example of a flaw that
started as a zero day and continues to be exploited over a year later by ransomware groups,
their affiliates and state-sponsored threat actors.
The bottom line? Vulnerabilities increase risk, whether or not they start as zero days. We
advise organizations to operate with a defensive posture by applying available patches for
known, exploited vulnerabilities sooner rather than later.
Zoho ManageEngine
CVE-2022-35405 Unauthenticated RCE 9.8
Password Manager Pro
VMware Workspace
Server-side template
CVE-2022-22954 ONE Access and Identity 9.8
injection
Manager
Zoho ManageEngine
CVE-2021-44077 Unauthenticated RCE 9.8
ServiceDesk Plus
Data security
While each CSP offers its own best practices, with tips on proper access controls, we
continue to observe data breaches caused by unsecured or improperly secured cloud
resources. This year, Microsoft disclosed that it had a misconfigured and unsecured Azure
endpoint that potentially allowed access to business transaction data of Microsoft and
prospective customers. The issue was reported to Microsoft by SOCRadar and highlights
that even CSPs are subject to misconfiguration mistakes.
The above examples illustrate how even massive CSPs owned by giant tech titans are not
immune from simple configuration mistakes. From our own analysis of publicly reported
data breaches, we found that over 3% of data breaches disclosed in 2022 resulted from an
unsecured database. These data breaches, collectively, exposed over 800 million records
across a variety of industry verticals.
With Kubernetes being such an attractive target for threat actors, the U.S. National
Security Agency (NSA) and CISA continue to provide updates to their joint technical report
on Kubernetes Hardening to help encourage secure practices and best practices for
Kubernetes deployments.
Microsoft Azure Synapse Analytics N/A Privilege Escalation N/A - Critical severity
Microsoft Azure Synapse Analytics N/A Hosts File Poisoning N/A - Low severity
With a lack of transparency around cloud vulnerabilities, users of these services are unlikely
to have a true understanding of the risk presented to their cloud resources. While some
vulnerabilities will get CVEs or security advisories, others may be silently fixed by a CSP.
These factors make evaluating the security posture of one provider over another a daunting
task for security professionals. As they continue to embrace the public cloud, organizations
need to plan ahead to ensure they are evaluating their own practices and that of their CSPs
to keep the focus on secure cloud deployments. It’s safe to assume that cloud services would
have a similar occurrence of vulnerabilities to their on-premises counterparts, but the lack
of transparency leaves cloud users in the dark about their risk exposure.
Analyzing the vulnerability landscape alone only tells part of the story.
We also need to understand the threat landscape: how attackers are
using those vulnerabilities, along with other tools and tactics, to target
enterprises, governments and nonprofits. Let’s explore the key features
of the threat landscape in 2022 and how defenders should meet these
latest challenges.
❝ The most troubling piece and really one I mentioned a moment ago is we continue
to see known vulnerabilities, for which we have patches available, used by even
sophisticated cyber actors to compromise American companies, to compromise
companies around the world. And [...] that makes it far easier for attackers than it
needs to be.❞
— Anne Neuberger, Deputy national security advisor for the Biden administration
In June, CISA, the NSA and the FBI issued a joint cybersecurity advisory detailing the use of
publicly known vulnerabilities by state-sponsored actors affiliated with the People’s Republic
of China (PRC). This was followed by a separate joint cybersecurity advisory (AA22-279A)
from the same agencies in October, detailing the Top 20 CVEs that have been actively
exploited by PRC state-sponsored cyber actors.
State-sponsored
Overlapping CVEs Product type
exploitation
CVE-2018-13379 SSL VPN Iran, Russia
We’ve covered many of the overlapping flaws in prior Threat Landscape reports, including
the trio of SSL VPN flaws and email server vulnerabilities like ProxyLogon. These types of
widely used products are routinely exploited each year by a variety of threat actors, including
these state-sponsored threat actors. There’s a clear way to stop these flaws from remaining
staples in attacker toolkits: Apply the available patches. We’d like to see these known
vulnerabilities disappear from future versions of this report.
problem compared to previous years. However, the data we analyzed for this year’s Threat Landscape
Report shows the frequency of ransomware attacks remaining on par with prior years.
continue to According to our analysis of publicly available breach data, 35.5% of breaches in 2022 were
the result of a ransomware attack, a 2.5% decrease from 2021.
get worse [...] At the Aspen Cyber Summit in November, Paul Abbate, deputy director at the FBI said that
We’ve seen a the agency has “only seen the problem continue to get worse” and has “seen a higher volume
of ransomware attacks and the financial losses are increasing as well.”
higher volume
of ransomware Not all ransomware attacks are made public
One of the ways we quantify ransomware attacks in our analysis is through news reports, and
attacks and the other is through entries on ransomware leak websites. On these websites, ransomware
groups threaten to publish stolen data from victim organizations. The one challenge with
the financial relying on leak website data is that there may be instances where an organization chooses
losses are
to pay the ransom demand before the group can post an entry on its leak website, making
metrics drawn from these sites somewhat unreliable.
increasing as Another challenge is that not all ransomware attacks are known to the public. In some
well.”
cases, businesses use careful generic language, such as “cyberattack” or “incident,” when
announcing a data breach or security event. Countries and affected sectors have different
reporting requirements, and there is no universal requirement for organizations to report the
— Paul Abbate, root cause of an incident, though some may choose to disclose that information. This makes
deputy director, FBI it challenging to truly quantify not just ransomware attacks, but breaches in general. So it’s
important to recognize that the true number of ransomware attacks over the last few years
has likely been significantly undercounted.
According to researchers at Advanced Intel, who were the first to report on Conti’s exit from
the ransomware ecosystem, Conti’s existing partnerships with other ransomware groups,
including ALPHV/BlackCat, Hive, AvosLocker and HelloKitty/FiveHands, allowed its members
to join those groups, where they offered assistance with development, pentesting, intelligence
and negotiations.
Independent members, whom Advanced Intel says are “loyal to Conti,” will likely operate
individually, possibly as affiliates for other groups. Finally, some former members of Conti have
transitioned to groups that focus purely on data exfiltration for extortion-only operations,
which includes groups like Karakurt, Black Basta and Blackbyte.
In the ransomware ecosystem, groups are not the constant; it’s the group members, including
affiliates, that remain a prominent fixture, which is why the long term impact of a ransomware
group’s demise is blunted.
A key feature in the threat landscape of 2022 was the increased prevalence of extortion-only
attacks. In such attacks, threat actors access target networks with the specific purpose of
exfiltrating sensitive data to hold for ransom or sell on the dark web, without deploying any
of the encryption malware that gives ransomware its name. Groups taking an extortion-only
These groups often deployed more “simplistic” tactics, relying on phishing, spamming
multifactor authentication (MFA) and exploiting help desk services to gain access to target
environments. As with their ransomware counterparts, extortion-only groups seek access
to high privileged accounts through Active Directory (AD), abusing flaws, misconfigurations
and features of the ubiquitous Microsoft identity and access management tool. They also
target cloud resources to support attack infrastructure and to access sensitive data.
Organizations cannot afford to ignore these threat actors because they appear “less
sophisticated.” Their attacks can be just as disruptive as ransomware and represent
considerable risk to ongoing operations and organizational reputation. Additionally, the
more sophisticated ransomware groups have even adopted extortion-only habits as an
evolution of their playbooks.
The following guidance will help organizations defend against attacks from extortion groups:
• Strengthen password policies: avoid SMS-based MFA; ensure strong password use;
leverage passwordless authentication
• Find and patch known exploited vulnerabilities that could allow attackers to elevate
privileges and exfiltrate sensitive data
This information is based on publicly available sources including news outlets and vendor blog
posts and may not reflect all the new ransomware or extortion groups.
The exploitation of these flaws, combined with a variety of tools leveraged by ransomware
groups to collect vital AD information, highlight the importance of identifying indicators
of exposure and indicators of attack within your AD environments. By hardening AD
against ransomware attacks, organizations can hinder these groups’ attempts to encrypt
and exfiltrate stolen data for leverage and allow your organization to operate from a
position of defense.
Our analysis of these breach incidents is performed on a best-effort basis and is not
intended to be a fully exhaustive list of all the breaches reported throughout this time
period. Based on our past examination of breach data, we recognize that the disclosure
process for breaches takes time and, therefore, some breaches may not be made public
until months or years after the incident occurs. Additionally, we must also acknowledge
that some industries and geographic
locations have varying or sometimes even
no reporting requirements or central
authority for reporting. This makes
obtaining a comprehensive global view of
the breaches that occurred over this time DATA POINT 2021 2022
period nearly impossible.
Total records exposed 40,000,000,000 2,296,941,687
In 2022, the breach events we analyzed
resulted in the exposure of 2.29 billion Total files exposed 1,800,000,000 389,127,450
records, a marked decrease compared
to 2021, where 40 billion records Total data exposed 260 Terabytes 257 Terabytes
were exposed. This was matched by a
comparable decline in the number of
files exposed in 2022 — 389 million — a
figure which includes both documents
and emails. Despite the
steep decline in records
and files exposed, the
total volume of data
exposed as part of breach events in 2022 remained flat at 257 Terabytes, compared with 260
Terabytes in 2021.
Of the 1,335 breach events tracked in 2022, 88.2% of the impacted organizations reported
that records were exposed. However, 45% did not disclose a number of records exposed,
while for 6.1% of breaches the impacted organizations could not confirm whether or not
records were exposed.
Totals 2,296,941,687
More than two thirds (68%) of records exposed originated from organizations located in
Asia-Pacific (APAC). Organizations in North America (NAM) and Europe, Middle East, and
Africa (EMEA) accounted for a combined 31% of records exposed. In some instances, it
was unclear what region an organization was located in, so we categorized such breach
events as Unknown/Global. Finally, breach events in Latin America (LATAM) accounted for
just 0.02% of records exposed. We speculate this stark difference has more to do with the
different breach reporting requirements in LATAM countries, compared to NAM, APAC and
EMEA, than an appreciable difference in attacker activities in the various regions.
Other 11%
Insider Threat/Former
Employee 2%
Ransomware 35%
Misdirected
Communication 2%
Unknown 3%
Unsecured Database 3%
Vulnerability 4%
App Misconfiguration 5%
Unspecified
Cyberattack 25% Email Compromise/Phishing 9%
In 2022, ransomware remained the most common root cause for breaches at organizations,
accounting for 35.4% of all breach events. This is a slight decrease compared to 2021, in
which ransomware represented 38% of all breach events.
Lapsus$ 2%
BlackCat/ALPHV/Noberus
5%
Conti 5%
Other 18%
Vice Society 6%
When reviewing all of the breach events linked to ransomware or extortion attacks, we
classified nearly half (36.4%) as “Unknown,” as we could not identify any specific details
about the ransomware or extortion group responsible for these attacks. We also attempted
to cross-reference these attacks against data leak sites on the dark web associated with
both ransomware and extortion groups. However, we weren’t able to tie them to a specific
group. Because there are no reporting requirements for ransomware attacks, these types of
details are often left out.
Outside of the Unknown category, the LockBit ransomware group dominated ransomware
attacks in 2022, accounting for 9.9% of the ransomware breach events we analyzed. LockBit
rebranded itself from 2.0 to 3.0, so this figure is all inclusive of both iterations. Other groups
on this list include the Hive ransomware group (7.5%), Vice Society (6.3%) and BlackCat/
ALPHV (5.1%). Other, which comprises 37 other groups, collectively were responsible for
17.8% of the remaining ransomware/extortion incidents in 2022.
Despite the notorious Conti ransomware group closing up shop in May 2022, it was
responsible for 5.5% of ransomware breach events we analyzed. For more information on
Conti, please refer to the previous section on ransomware.
In 2022,
Retail Trade 62
Professional, Scientific and Technical Services 62
healthcare
Finance and Insurance 55
Technology 49
was the
Cryptocurrency 42
Arts, Entertainment, and Recreation 41
Oil/Gas/Energy 32
#1 sector Transportation and Warehousing 26
Manufacturing 25
targeted by Non-Profit
Accomodation and Food Services
21
20
ransomware Telecommunication
Media/News
17
15
attacks Automotive
Travel
12
10
breaches. Infrastructure
Law Enforcement
8
7
Hospitality 7
Agriculture, Forestry, Fishing and Hunting 7
Unknown 6
Real Estate 5
Biotechnology 5
Mining (except Oil and Gas) 4
Legal 3
Construction 3
Adult Content
Unsurprisingly, healthcare 2 assistance remains the industry sector with the largest
and social
number of breach events, accounting
0 for 35.4%
100 of all breach
200 events
300we analyzed.
400 This is a
500
sharp increase from 2021, where 24% of breach events were attributed to healthcare.
Theft of Equipment 2%
Negligence 2%
Unknown 2%
Misdirected
Communication 2%
Insider Threat/Former
Employee 3%
App Misconfiguration
7%
Ransomware 29%
Email Compromise/Phishing 17%
Nearly a third of all healthcare breach events we tracked in 2022 were attributed to
unspecified cyberattacks, followed by ransomware at nearly 29.2%. This represents a 7%
decrease compared to 2021, which saw ransomware accounting for 36.2% of healthcare
breaches. In 2022, 16.5% of breaches in the healthcare sector were the result of email
compromise/phishing.
Other 5%
Ransomware 41% Insider Threat/Former
Employee 2%
Misdirected
Communication 2%
Unknown 2%
Email Compromise/
Phishing 3%
Negligence 3%
App Misconfiguration
4%
Unspecified Cyberattack
Unsecured Database
20% 4%
Vulnerability 6% Hacktivism 6%
Email Compromise/Phishing 3%
Vulnerability 41% Hijacking (BGP, Domain, DNS)
2%
Insider Threat/Former
Employee 2%
Unknown 2%
Website Skimmer 2%
Ransomware 5%
Unspecified Cyberattack
14%
Cryptocurrency-Specific
Vector 29%
Over two-thirds (69.1%) of breach events in the cryptocurrency space were the result of
vulnerabilities or of a root cause we refer to as a “cryptocurrency-specific vector,” which
includes things unique to this space, like flash loan attacks and pricing oracle manipulation.
Over $1.2 billion stolen in cryptocurrency breach events was attributed to these two root causes.
Unknown $160,000,000
Total $2,407,625,000
3. Bitmart $200,000,000
4. Beanstalk $182,000,000
5. Wintermute $160,000,000
6. Nomad $156,000,000
Note: The dollar figures here are representative of the value at the time the breach events
occurred, and due to the price fluctuation around various cryptocurrencies, may be cited
differently across various news sources.
For cybercriminals, breaches targeting the cryptocurrency space are likely to be their most
profitable endeavors outside of ransomware.
Known flaws assets in your environment are exposed to the vulnerabilities listed in this report
as soon as possible.
remain one of Ignore the hype and focus on assessing your environment. The
the biggest
2020 incident at SolarWinds and the 2021 Log4Shell vulnerability have had a
lasting impact on how the industry reacts to supply chain issues. Researchers,
risks in the journalists and, by extension, executives and boards are consumed with waiting for
the “next Log4Shell” to drop. Instead of focusing on the branding of a vulnerability
vulnerability or the rumors surrounding it, organizations must examine the specific details of
vulnerabilities, when available, to assess the true potential impact, rather than
landscape speculative. The key to protecting your networks is the ability to quickly appraise
every facet of your environment to identify all assets and assess your code base.
Tenable Research has released over 180,000 plugins and leads the industry on CVE coverage.
The team is focused on diverse work that makes up the foundations of vulnerability
management: writing plugins for vulnerability and asset detection; developing audit and
compliance checks; improving VM automation.
Additional Credits:
Susan Nunziata, Senior Director of Editorial & Content
About Tenable
Tenable® is the Exposure Management company. More than 40,000 organizations around
the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®,
Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to
see and secure any digital asset on any computing platform. Tenable customers include
approximately 60 percent of the Fortune 500, approximately 40 percent of the Global 2000,
and large government agencies. Learn more at tenable.com.
Adobe
CVE-2022-24086 is an improper input validation vulnerability which can lead to remote code execution (RCE) by an
unauthenticated attacker. Adobe was aware of limited in-the-wild exploitation targeting Adobe Commerce merchants
at the time the patch was released.
CVE-2022-24087 is an improper input validation vulnerability which can lead to RCE by an unauthenticated attacker.
Unlike CVE-2022-24086, CVE-2022-24087 was not found to have been exploited in the wild.
CVE-2022-0070 and CVE-2022-0071 are vulnerabilities in the Apache Log4j Hot Patch Service produced by Amazon
Web Services caused by the ability to execute commands with unnecessary privileges.
NO-CVE-ID: A XML External Entity (XXE) vulnerability found in the AWS CloudFormation service. When exploited, the
vulnerability allows attackers to get file and credential disclosure primitives which can be used to leak sensitive files in
vulnerable machines.
Name: BreakingFormation
NO-CVE-ID: An information disclosure vulnerability in AWS Glue. When the vulnerability is exploited, the attacker can
access credentials for AWS service accounts, giving them full access to the internal service API. Combining this exploit
with a misconfiguration in the API, attackers are able to escalate privileges to unrestricted access to all resources in
the region.
Name: Superglue
CVE-2021-31805 is a forced Object-Graph Navigation Language (OGNL) evaluation vulnerability in Apache Struts that
may lead to RCE. This is a secondary fix for CVE-2020-17530 because the initial patch was incomplete.
CVE-2021-44228 is a RCE vulnerability in Apache Log4j 2. An unauthenticated, remote attacker could exploit this flaw
by sending a specially crafted request to a server running a vulnerable version of log4j. The crafted request uses a Java
Naming and Directory Interface (JNDI) injection via a variety of services including:
• Lightweight Directory Access Protocol • Remote Method Invocation
• Secure LDAP • Domain Name Service
If the vulnerable server uses Log4j to log requests, the exploit will then request a malicious payload over JNDI through
one of the services above from an attacker-controlled server. Successful exploitation could lead to RCE.
Name: Log4Shell
CVE-2021-44521 is a code injection vulnerability in Apache Cassandra. In order to exploit this vulnerability, certain non-
default configuration requirements are needed. Successful exploitation would allow an attacker to escape the sandbox
and achieve RCE.
CVE-2022-42889 is an unsafe script evaluation vulnerability in the default interpolators in the Apache Commons
Text StringSubstitutor class. An attacker can exploit this vulnerability by passing a specially crafted string containing
untrusted data, commonly through a user input field, that is interpolated by the StringSubstitutor class. Successful
exploitation would result in arbitrary code execution or cause an application to perform arbitrary lookup to an attacker
controlled remote server.
Name: Text4Shell
Apple
CVE-2021-1789 is a type confusion vulnerability in iOS, iPadOS, macOS, tvOS and watchOS. A vulnerable device that
visits or processes a specially crafted web page could grant an attacker arbitrary code execution privileges. According
to Google’s Threat Analysis Group (TAG), this vulnerability was exploited in the wild as part of an attack chain that
includes CVE-2021-30869.
CVE-2021-30869 is a type confusion vulnerability in iOS, iPadOS and macOS. A malicious application containing exploit
code could gain arbitrary code execution with kernel privileges.
CVE-2022-22587 is a memory corruption issue in the IOMobileFrameBuffer in macOS, iOS and iPadOS. A malicious
application could exploit the flaw to gain arbitrary code execution with kernel privileges.
CVE-2022-22588 is a resource exhaustion issue in iOS and iPadOS. An attacker could exploit this vulnerability when an
iOS or iPadOS device tries to process a maliciously named HomeKit accessory. Successful exploitation could lead to a
denial of service (DoS) condition.
Name: doorLock
CVE-2022-22594 is a cross-origin issue in the IndexDB API for WebKit Storage. Exploitation of this flaw would allow a
website to track sensitive user information.
CVE-2022-22620 is a use after free vulnerability issue affecting macOS, iOS and iPadOS. A malicious website could be
used to gain arbitrary code execution. Apple was aware of in-the-wild exploitation of this flaw at the time the patch was
released.
CVE-2022-22674 is an out-of-bounds read issue in the Intel Graphics Driver for macOS. An attacker could exploit this
vulnerability to read memory from the kernel.
CVE-2022-22675 is an out-of-bounds write vulnerability in AppleAVD in macOS and watchOS that was exploited in the
wild. An attacker could exploit this vulnerability by using a specially crafted application to read kernel memory.
CVE-2022-32893 is an out-of-bounds write issue in Apple’s WebKit web browser engine in iOS, iPadOS and macOS. An
attacker could exploit this vulnerability by socially engineering a target into visiting a website containing malicious web
content. Successful exploitation could result in arbitrary code execution.
CVE-2022-32894 and CVE-2022-32917 are out-of-bounds write issues in the iOS, iPadOS and macOS kernel. An
attacker could exploit this flaw by convincing a victim to open a specially crafted application containing malicious code.
Successful exploitation could result in arbitrary code execution with kernel privileges.
CVE-2022-42827 is an out-of-bounds write vulnerability affecting the iOS and iPadOS kernel which could allow arbitrary
code execution with kernel privileges.
CVE-2022-42856 is a type confusion vulnerability in Apple’s WebKit web browser engine in macOS, iOS, iPadOS, tvOS
and Safari. An attacker could exploit this vulnerability by socially engineering a target into visiting a website containing
malicious web content. Successful exploitation could result in arbitrary code execution.
Arm
CVE-2022-23960 is a cache speculation vulnerability where malicious code uses the shared branch history to influence
mispredicted branches within the victim’s hardware. This technique can be used to cause cache allocation, which allows
an attacker to access data that should not be accessible.
Name: Spectre-BHB
Atlassian
CVE-2022-26134 is an OGNL injection vulnerability in Atlassian Confluence Server and Data Center. An unauthorized,
remote attacker could exploit this vulnerability by sending a specially crafted HTTP request to a vulnerable Confluence
Server or Data Center instance. Successful exploitation would result in arbitrary code execution.
CVE-2022-26136 is an arbitrary servlet filter bypass vulnerability in multiple Atlassian products. An unauthenticated,
remote attacker could exploit this vulnerability by sending a specially crafted HTTP request to bypass a variety of
Servlet filters used by first- and third-party applications.
CVE-2022-26137 is a servlet filter invocation vulnerability in multiple Atlassian products. An unauthenticated, remote
attacker could exploit this vulnerability by sending a specially crafted HTTP request to bypass the servlet filter used to
respond to Cross-Origin Resource Sharing (CORS) requests.
CVE-2022-26138 is a hardcoded password vulnerability in the Questions for Confluence App for Confluence Server
and Confluence Data Center. The application creates a default user account with elevated privileges. An attacker with
knowledge of the hardcoded password could exploit the flaw to gain access to Confluence and access any pages that
the ‘confluence-users’ group has access to.
CVE-2020-3153 is an uncontrolled search path vulnerability in the Cisco AnyConnect Secure Mobility Client for
Windows. An authenticated, local attacker with valid Windows credentials could exploit this vulnerability using a
malicious file copied to a system directory. Successful exploitation would allow an attacker to copy the malicious files
to locations on the Windows system that have system level privileges.
CVE-2020-3433 is a DLL hijacking vulnerability in the Cisco AnyConnect Secure Mobility Client for Windows. An
authenticated, local attacker with valid Windows credentials could exploit this vulnerability through a specially crafted
IPC message to the AnyConnect process. Successful exploitation would grant arbitrary code execution privileges as
SYSTEM.
CVE-2022-20624 is a DoS vulnerability in the Cisco Fabric Services over IP (CFSoIP) feature found in Cisco’s NX-OS
software. An unauthenticated, remote attacker could exploit the flaw by sending specially crafted CFSoIP packets to a
vulnerable device. Successful exploitation would result in a DoS condition.
CVE-2022-20821 is an open port vulnerability in the Cisco IOS XR software health check remote patient monitor. An
unauthenticated, remote attacker could exploit the flaw by connecting to the Redis instance over the open port and
write to the in-memory database or container filesystem and retrieve database information.
Citrix
CVE-2019-19781 is a directory traversal vulnerability in the Citrix Application Delivery Controller (ADC) and Gateway
product. An unauthenticated, remote attacker could exploit the vulnerability by sending a specially crafted request
containing a directory traversal string to the vulnerable Citrix endpoint. Successful exploitation would grant an attacker
the ability to execute arbitrary code. It was featured as one of the top five vulnerabilities in the 2020 Threat Landscape
Retrospective.
CVE-2022-27510 is an authentication bypass vulnerability in Citrix ADC and Gateway. It was assigned a CVSSv3 score
of 9.8 and is labeled as Critical. In its bulletin, Citrix noted that this vulnerability affects appliances that have enabled
secure socket layer virtual private network (SSL VPN) functionality or are being used as an Independent Computing
Architecture Proxy with authentication. Authentication bypass vulnerabilities like this one could be exploited by an
attacker as an initial access vector into a network
CVE-2022-27518 is a RCE vulnerability impacting Citrix ADC or Citrix Gateway when configured as a Security Assertion
Markup Language (SAML) service provider (SP) or a SAML identity provider (IdP). The vulnerability is rated as critical and
can be exploited by a remote, unauthenticated attacker to execute arbitrary code. CVE-2022-27518 was given a CVSSv3
score of 9.8.
F5
CVE-2020-5902 is a critical directory traversal vulnerability in the traffic management user interface (TMUI) of the BIG-
IP product line, which includes a variety of solutions both software and hardware-based. An unauthenticated, remote
attacker could send a specially crafted request to a vulnerable BIG-IP device containing a directory traversal character
sequence (e.g. “..;/”) to exploit the vulnerability. Successful exploitation would give an attacker the ability to execute
arbitrary system commands, create or delete files, or disable services on the vulnerable host. It was featured as one of
the top five vulnerabilities in the 2020 Threat Landscape Retrospective.
CVE-2022-1388 is an authentication bypass vulnerability in the REST component of BIG-IP’s iControl API that was
assigned a CVSSv3 score of 9.8. The iControl REST API is used for the management and configuration of BIG-IP devices.
CVE-2022-1388 could be exploited by an unauthenticated attacker with network access to the management port or self
IP addresses of devices that use BIG-IP. Exploitation would allow the attacker to execute arbitrary system commands,
create and delete files and disable services.
Fortinet
CVE-2018-13379 is an unauthenticated information disclosure vulnerability in FortiOS SSL VPNs. This arbitrary file read
vulnerability allows attackers to read the contents of a session file that contains a username and plaintext password.
This is achieved by sending a specially crafted request to the vulnerable FortiOS SSL VPN. Attackers could then
leverage this information to authenticate to the SSL VPN.
CVE-2022-40684 is a critical authentication bypass vulnerability that received a CVSSv3 score of 9.6. By sending
specially crafted HTTP or HTTPS requests to a vulnerable target, a remote attacker with access to the management
interface could perform administrator operations.
CVE-2022-42475 is a heap-based buffer overflow in several versions of FortiOS that received a CVSSv3 score of 9.3.
A remote, unauthenticated attacker could exploit this vulnerability with a specially crafted request and gain code
execution.
CVE-2021-22600 and CVE-2021-39793 are elevation of privilege (EoP) vulnerabilities in Google’s Upstream Kernel
for Android. It was assigned a severity score of Moderate. According to Google, these vulnerabilities have been under
limited, targeted exploitation.
CVE-2022-0609 is a use-after-free vulnerability in the Animation engine of Google Chrome. It was reported by Google’s
Threat Analysis Group and has been exploited in the wild.
CVE-2022-1096 is a type confusion vulnerability in the V8 engine for Google Chrome. It was reported by Anonymous and
has been exploited in the wild.
CVE-2022-1364 is a type confusion vulnerability in the V8 engine for Google Chrome. It was reported by Google’s Threat
Analysis Group and has been exploited in the wild.
CVE-2022-2294 is a heap-based buffer overflow vulnerability in the Web Real-Time Communications (WebRTC)
component of Chromium.
CVE-2022-2856 is an improper input validation vulnerability in Google Chrome. This vulnerability was reported by
Google’s Threat Analysis Group as having been exploited in the wild.
CVE-2022-3075 is an insufficient data validation vulnerability in the Mojo IPC system in Google Chrome. The
vulnerability was reported by an Anonymous researcher and confirmed to have been exploited in the wild.
CVE-2022-3723 is a type confusion vulnerability in the V8 engine for Google Chrome. It was reported by researchers at
Avast and has been exploited in the wild.
CVE-2022-4135 is a heap buffer overflow vulnerability in Google Chrome’s GPU. It was reported by Google’s Threat
Analysis Group and has been exploited in the wild.
CVE-2022-4262 is a type confusion vulnerability in the V8 engine for Google Chrome. It was reported by Google’s Threat
Analysis Group and has been exploited in the wild.
Magnitude Simba
CVE-2022-29972 is an improper validation of authentication token vulnerability in the Magnitude Simba Amazon
Redshift ODBC and JDBC drivers. A local, authenticated attacker could exploit this vulnerability to execute remote
commands.
Name: SynLapse
Microsoft
CVE-2017-11882 is a memory corruption vulnerability in the Equation Editor component of Microsoft Office that
could lead to RCE and received a CVSSv3 score of 7.8. It has been exploited in attacks by diverse threat actors and is
incorporated into some of the top malware strains.
CVE-2018-0798 is a memory corruption vulnerability in the Equation Editor component of Microsoft Office that could
lead to RCE and received a CVSSv3 score of 8.8. Exploitation could allow arbitrary code execution in the context of the
user who interacted with a specially crafted file or website.
CVE-2018-0802 is a memory corruption vulnerability in the Equation Editor component of Microsoft Office that could
lead to RCE and received a CVSSv3 score of 8.6. Exploitation could allow arbitrary code execution in the context of the
user who interacted with a specially crafted file or website.
CVE-2020-0688 is a validation key vulnerability due to the generation of static cryptographic keys that could lead to
RCE. The vulnerability was reported to the Zero Day Initiative and was subsequently disclosed to Microsoft. Soon after
the vulnerability was disclosed in 2020, reports began to emerge that threat actors were utilizing the flaw in the wild.
CVE-2020-1472 is an EoP vulnerability in Microsoft’s Netlogon Remote Protocol. This protocol is used to maintain
relationships of domain controllers (DCs) within and across domains. Critically, MS-NRPC is also used to manage
account changes for DCs, like passwords. The flaw exists because of a flaw in how MS-NRPC implements AES-CFB8
encryption. Because this is a local privilege escalation flaw, an attacker needs to be on the same local area network as
their target. Active Directory is a target of serious concern with Zerologon. If an attacker was able to exploit it against
AD, they could impersonate any machine on the network, reset the domain controller’s administrator password or
launch ransomware attacks against the entire network.
Name: Zerologon
CVE-2021-26855 is a server-side request forgery (SSRF) vulnerability dubbed ProxyLogon by Orange Tsai, the
researcher credited with its discovery. An unauthenticated, remote attacker could exploit this flaw by sending a
specially crafted HTTP request to a vulnerable Exchange Server that accepts untrusted connections over port 443.
Successful exploitation of this flaw would allow the attacker to authenticate to the targeted Exchange Server. It was
featured as one of the top five vulnerabilities in the 2021 Threat Landscape Retrospective.
Name: ProxyLogon
CVE-2021-26857 is an insecure deserialization vulnerability. Specifically, the flaw resides in the Exchange Unified
Messaging Service, which enables voicemail functionality in addition to other features. To exploit this flaw, an
attacker would need to be authenticated to the vulnerable Exchange Server with administrator privileges, potentially
by exploiting another vulnerability first. Successful exploitation would grant the attacker arbitrary code execution
privileges as SYSTEM.
CVE-2021-26858 and CVE-2021-27065 are arbitrary file write vulnerabilities. These flaws are post-authentication,
meaning an attacker would first need to authenticate to the vulnerable Exchange Server before they could exploit them.
This could be achieved by exploiting CVE-2021-26855 or by using stolen administrator credentials. Once authenticated,
an attacker could arbitrarily write to any paths on the vulnerable server.
CVE-2021-34473, a RCE vulnerability; CVE-2021-34523, an EoP vulnerability; and CVE-2021-31207, a feature bypass
make up the vulnerability chain named ProxyShell. By chaining these vulnerabilities, an attacker could execute arbitrary
commands on vulnerable Exchange servers on port 443.
Name: ProxyShell
CVE-2021-36942 is a Windows Local Security Authority (LSA) Spoofing Vulnerability that was patched in August in
relation to the PetitPotam NTLM relay attack disclosed by Gilles Lionel. The exploit could be used to force domain
controllers to authenticate with an attacker-controlled destination. Roughly a month after disclosure, ransomware
groups were seen exploiting this attack. The patch for CVE-2021-36942 only partially patched the issue. Microsoft
published general mitigation guidance for defending against NTLM Relay Attacks. The LockFile ransomware has
chained Microsoft Exchange vulnerabilities with PetitPotam to take over domain controllers.
Name: PetitPotam
CVE-2021-40444 is a RCE vulnerability in Microsoft’s MSHTML (Trident) platform, Microsoft’s proprietary browser engine.
To exploit this vulnerability, an attacker would need to create a specially crafted Microsoft Office document containing
a malicious ActiveX control and use social engineering techniques to convince their target to open the document. The
impact of this vulnerability would be more significant in cases where the recipient has administrative privileges.
CVE-2022-21836 is a spoofing vulnerability affecting Windows certificates which has received a 7.8 CVSSv3 score. An
attacker could utilize compromised certificates to bypass the Windows Platform Binary Table binary verification. While
exploitation is rated as less likely, Microsoft states that the flaw was publicly disclosed. The compromised certificates
known to Microsoft have been added to the Windows kernel driver block list and Microsoft offers additional guidance in
its security advisory.
CVE-2022-21839 is an uncontrolled resource consumption vulnerability in the Windows Event Tracing Discretionary
Access Control List. A local attacker could exploit this vulnerability to cause a DoS condition.
CVE-2022-21874 is a RCE in the Windows Security Center API that received a CVSSv3 score of 7.8. This vulnerability
requires user interaction to exploit and the attack vector is local.
CVE-2022-21882 is an EoP vulnerability in the Win32k system driver. A local, authenticated attacker could exploit this
vulnerability to elevate privileges.
CVE-2022-21907 is a RCE vulnerability in the Internet Information Services component of Microsoft operating systems:
Windows 10, Windows Server 2022 and Windows Server 2019. The vulnerability can be exploited by sending a specially
crafted HTTP request to a vulnerable target, leading to a DoS which may be chained with other vulnerabilities leading to
RCE.
CVE-2022-21919 is an EoP vulnerability in the Windows User Profile Service. To exploit this vulnerability, an attacker
would need to have established a foothold on the vulnerable system through social engineering, a separate exploit or
malware. Successful exploitation would give an attacker elevated privileges on the vulnerable system.
CVE-2022-21971 is a RCE vulnerability in Windows Runtime. An attacker could exploit this vulnerability by convincing
a target to open a specially crafted document file containing malicious code. Successful exploitation would grant the
attacker arbitrary code execution privileges.
CVE-2022-21989 is an EoP vulnerability in the Windows Kernel. According to Microsoft Exploitability Index rating, this
vulnerability is more likely to be exploited. The advisory noted that an attacker needs to take additional actions prior to
exploitation of this vulnerability, which is evident by the “High” rating for “Attack Complexity” in the CVSSv3 score of 7.8.
CVE-2022-21990 is a RCE vulnerability in Microsoft’s Remote Desktop Client. To exploit the flaw, an attacker would need
to convince a user to connect to an attacker-controlled Remote Desktop server.
CVE-2022-22047 is an EoP vulnerability in the Windows Client Server Run-Time Subsystem. This type of vulnerability
is likely to have been used as part of post-compromise activity, once an attacker has gained access to the targeted
system and run a specially crafted application.
CVE-2022-22713 is a DoS vulnerability impacting Windows Hyper-V. According to Microsoft’s description, exploitation
of the vulnerability requires an attacker to win a race condition giving it a high complexity rating and a CVSSv3 score of
5.6. It was publicly disclosed prior to a patch being available.
CVE-2022-24459 is an EoP vulnerability affecting the Windows Fax and Scan service. The vulnerability carries a
CVSSv3 score of 7.8 and can be exploited by a local, authenticated attacker. While the severity and requirements for
exploitation would typically be less concerning, this vulnerability was publicly disclosed.
CVE-2022-24512 is a RCE vulnerability in Microsoft .NET and Visual Studio. According to Microsoft, exploitation of this
flaw requires that “a user trigger the payload in the application.”
CVE-2022-24521 is an EoP vulnerability in the Windows Common Log File System Driver. An attacker that has already
gained access to a vulnerable system could exploit this vulnerability by running a specially crafted application.
Successful exploitation would give the attacker the ability to run processes in an elevated context.
CVE-2022-26809 is a critical RCE vulnerability in the Remote Procedure Call (RPC) runtime. An unauthenticated,
remote attacker could exploit this vulnerability by sending a specially crafted RPC call to a host.
CVE-2022-26904 is an EoP vulnerability in the Windows User Profile service. The attack complexity for this flaw is
considered high because it requires an attacker to win a race condition. Successful exploitation would allow an attacker
to gain privileged access for a lower privileged account.
CVE-2022-26923 is an EoP vulnerability in Microsoft Active Directory Certificate Services (AD CS). An attacker with low
privileges on a vulnerable system with AD CS running could exploit this by running a specially crafted script. Successful
exploitation would allow the attacker to elevate from a low-privileged user to domain administrator.
CVE-2022-26925 is a spoofing vulnerability in the Windows LSA that was exploited in the wild. An unauthenticated
attacker could coerce domain controllers to authenticate to an attacker-controller server using NTLM.
CVE-2022-30137 is an EoP vulnerability in Microsoft Azure Service Fabric for Linux. A local, authenticated attacker
could exploit the vulnerability to escalate privileges to gain root privileges on a node. Successful exploitation could
potentially result in the compromise of all of the nodes within a cluster.
Name: FabricScape
CVE-2022-30190 is a RCE vulnerability in Microsoft Windows Support Diagnostic Tool (MSDT) that impacts several
versions of Microsoft Office, including patched versions of Office 2019 and 2021. The vulnerability exists due to the way
Microsoft Windows Support Diagnostic Tool (MSDT) is called using the URL protocol from certain applications. Because
of the way this vulnerability is exploited, Microsoft lists the attack vector as “local,” but an attacker leveraging this flaw
would likely be remote.
Name: Follina
CVE-2022-30216 is an authentication coercion vulnerability in Microsoft Windows Server due to an off-by-one error
found in a procedure of the security callback. According to researchers, an attacker could exploit this vulnerability by
combining it with a New Technology LAN Manager (NTLM) relay attack against AD CS.
CVE-2022-33675 is an EoP vulnerability in the Microsoft Azure Site Recovery Suite. The cause of the vulnerability
is incorrect permissions in one of the software’s installation folders. An attacker could leverage this vulnerability by
hijacking DLLs stored in this folder, leading to malicious code running with SYSTEM privileges.
CVE-2022-34713 is a RCE vulnerability in MSDT. An attacker could exploit this flaw by using social engineering to
convince a target to open a malicious document or open a link that downloads a malicious file. It was first disclosed by
researcher Imre Rad in January 2020. Following the discovery of the Follina vulnerability (CVE-2022-30190), Microsoft
re-evaluated Rad’s findings and patched this flaw.
Name: DogWalk
CVE-2022-37969 is an EoP vulnerability in the Windows Common Log File System Driver. According to Microsoft, this
vulnerability has been exploited in the wild and has been publicly disclosed prior to a patch being available. This is a
post-exploitation vulnerability, meaning it can be exploited after an attacker has gained access to a vulnerable target
system via other means, including exploiting a separate vulnerability or through social engineering.
CVE-2022-37981 is a DoS vulnerability in the Microsoft Windows Event Logging Service. According to Microsoft,
the availability is set to Low on this flaw because while performance can be interrupted and/or reduced,” the vendor
advisory noted that an attacker “cannot fully deny service.”
Name: OverLog
CVE-2022-41033 is an EoP vulnerability in the Windows COM+ Event System Service, which enables system event
notifications for COM+ component services. An authenticated attacker could exploit this vulnerability to elevate
privileges on a vulnerable system and gain SYSTEM privileges.
CVE-2022-41040 is a SSRF vulnerability in Microsoft Exchange Server. An authenticated attacker could exploit this
vulnerability by leveraging stolen credentials for any Exchange Server user account.
Name: ProxyNotShell
CVE-2022-41043 is an information disclosure vulnerability in Microsoft Office for Mac. Exploitation of this flaw requires
an attacker to have gained local access to the vulnerable host. It was publicly disclosed prior to a patch being made
available.
CVE-2022-41073 is an EoP vulnerability affecting the Windows Print Spooler service. The vulnerability carries a CVSSv3
score of 7.8 and discovery was credited to Microsoft Threat Intelligence Center. This flaw has been exploited in the wild,
according to Microsoft, and could allow a low privileged user to gain SYSTEM level privileges.
CVE-2022-41082 is a RCE vulnerability. An authenticated attacker could exploit this vulnerability by leveraging stolen
credentials for any Exchange Server user account. It can be chained together with CVE-2022-41040.
Name: ProxyNotShell
CVE-2022-41091 is a security feature bypass vulnerability affecting Windows Mark of the Web (MoTW). MoTW is a
security feature used to tag files downloaded from the internet and prevent them from performing certain actions. Files
flagged with MoTW would be opened in Protected View in Microsoft Office — prompting users with a security warning
banner asking them to confirm the document is trusted by selecting Enable content. A malicious actor could craft a file
that could bypass MoTW, “resulting in a limited loss of integrity and availability of security features such as Protected
View.”
CVE-2022-41125 is an EoP vulnerability in the Windows Cryptography Next Generation (CNG) Key Isolation Service used
for Windows cryptographic support and operations. With a CVSSv3 score of 7.8, successful exploitation would allow an
attacker to gain SYSTEM privileges
CVE-2022-41128 is a critical vulnerability impacting the JScript9 scripting language in Windows operating systems.
The vulnerability can be used to drop malware on a target by directing the user to navigate to a malicious website that
exploits the weakness.
CVE-2022-44698 is a security feature bypass vulnerability in the Windows operating system. MoTW vulnerability
that prevents specially crafted downloads from being marked as being from the web, which affects the integrity
and availability of security features that utilize MoTW tagging. Successful exploitation prevents SmartScreen from
performing a reputation check on the downloaded file. This could lead to a known malicious executable not alerting
users that the file may be malicious.
NO-CVE-ID: A critical cross-account vulnerability was discovered in Azure Automation service. No CVE identifier was
assigned for this vulnerability. An unauthorized user could send a specially crafted request to a special identity endpoint
and obtain tokens belonging to other users/organizations.
Name: AutoWarp
NO-CVE-ID: A cross-account authentication bypass vulnerability using a forged certificate was discovered in Microsoft
Azure’s PostgreSQL engine. When chained with a privilege escalation vulnerability, an attacker could gain unauthorized
access to read other customers’ PostgreSQL databases.
Name: #ExtraReplica
NO-CVE-ID: A privilege escalation vulnerability was discovered in Microsoft Azure’s PostgreSQL engine. When chained
with a cross-account authentication bypass vulnerability, an attacker could gain unauthorized access to read other
customers’ PostgreSQL databases.
Name: #ExtraReplica
Mitel
CVE-2022-29499 is an improper input validation vulnerability in MiVoice Connect, a component of the Mitel Service
Appliance. An unauthenticated, remote attacker could exploit this vulnerability to gain RCE privileges within the context
of the Service Appliance.
Mozilla
CVE-2022-26485 is a use-after-free vulnerability in Mozilla Firefox in the way that parameters are processed through
Extensible Stylesheet Language Transformations (XSLT). When an XSLT parameter is removed during processing, it
could result in an exploitable use-after-free. Mozilla said it has received reports that this flaw has been exploited in the
wild.
CVE-2022-26486 is a use-after-free vulnerability in Mozilla Firefox in the WebGPU IPC framework. Use-after-free and
sandbox escape is possible when the framework receives an unexpected message. Mozilla said it has received reports
that this flaw has been exploited in the wild.
Okta
CVE-2022-24295 is a command injection vulnerability in Okta Advanced Server Access Client for Windows. Successful
exploitation of this vulnerability could give an attacker RCE privileges.
Open Source
Argo CD
CVE-2022-24348 is a path traversal vulnerability in Argo CD. In order to exploit this flaw, an attacker with permissions
to create or update Applications that can either guess or has knowledge of the full path to a file containing valid YAML,
could create a malicious Helm chart to consume YAML as value files.
CRI-O
CVE-2022-0811 is a vulnerability in CRI-O v1.19 container runtime. For this vulnerability to be exploited, the attacker
must have rights to deploy a pod on a Kubernetes cluster. When exploited, it allows for container escape and gaining
root access on the host, letting the attacker move freely in the cluster.
Name: cr8escape
Horde Webmail
NO-CVE-ID: Horde Webmail contains a stored cross-site scripting (XSS) vulnerability that was not assigned a CVE
identifier. To exploit this flaw, an attacker can send a specially crafted email to a user using a vulnerable version of
Horde Webmail. Even if they preview the email, the exploit will be triggered.
CVE-2021-3996 is a flaw in the libmount library of util-linux. When leveraged, this flaw could allow unmounting of
certain FUSE filesystems by unprivileged, local attackers. Target filesystems must be world-writable or in a world-
writable directory. Exploitation of this flaw may cause DoS to applications using these filesystems.
CVE-2021-3997 is an uncontrollable recursion flaw in systemd-tmpfiles. The flaw can cause a DoS when too many
directories are created in /tmp at boot time.
CVE-2021-3998 is a flaw in the realpath() function of glibc that can cause information leakage or sensitive data
disclosure.
CVE-2021-3999 is an off-by-one buffer overflow and underflow vulnerability in glibc. If the buffer size is 1, a local
attacker could leverage the vulnerability to execute arbitrary code or elevate their privileges.
CVE-2022-0185 is a heap-based buffer overflow found in the Filesystem Context functionality of the Linux kernel. When
exploited, this vulnerability can lead to an unprivileged user escalating their privileges.
CVE-2022-0492 is an improper authentication vulnerability in the Linux kernel. It requires specific configuration to
facilitate exploitation, which could allow an attacker to escape a container and escalate privileges.
CVE-2022-0847 is an improper initialization vulnerability in the Linux kernel. The flaw resides in the new pipe_buffer,
which can lead to the improper preservation of permissions.
Name: DirtyPipe
CVE-2022-29799 is a directory traversal vulnerability found in the networkd-dispatcher unit of the Linux kernel. The
cause of the vulnerability is the lack of function sanitization by the OperationalState and AdministrtiveState networkd-
dispatcher leading to escape from the “/etc/networkd-dispatcher” directory.
Name: Nimbuspwn
OpenSSL
CVE-2022-3602 is a buffer overflow vulnerability in OpenSSL caused by a function that verifies x.509 certificates.
Preannounced as a critical vulnerability, this rating was later downgraded to “high” after it was determined that it would
not likely cause RCE. However it is still possible that when exploited in uncommon environments to achieve RCE.
CVE-2022-3786 is a buffer overflow vulnerability in OpenSSL caused by a function that verifies x.509 certificates. As
the attacker cannot control overflown data, but only the length of data passed to the function, it is unlikely that this
vulnerability will lead to RCE if exploited.
PrestaShop
CVE-2022-31181 is a SQL injection vulnerability in PrestaShop CMS. According to developers, it is used as part of a
“previously unknown vulnerability chain” to gain RCE on PrestaShop installations.
Redis
CVE-2022-0543 is a vulnerability in Redis on Debian-specific (Debian, Ubuntu) distributions of Linux that use the Lua
engine. An attacker could exploit this vulnerability to escape the Lua sandbox to achieve RCE.
WSO2
CVE-2022-29464 is an unrestricted arbitrary file upload vulnerability in various WSO2 products. An unauthenticated,
remote attacker could exploit the vulnerability by uploading a specially crafted Jakarta Server Pages file to a vulnerable
server.
SQLite
CVE-2022-35737 is an improper validation of array index vulnerability in SQLite. The vulnerability impacts applications
using SQLite’s Library API. It can be exploited when passing large string inputs (2GB, for example) to an application or
program using a vulnerable version of SQLite that uses printf functions.
CVE-2020-14882 is an unauthenticated RCE flaw in the console component of Oracle WebLogic Server. Oracle
described the flaw as easily exploitable and assigned it a CVSSv3 score of 9.8. Successful exploitation would allow an
unauthenticated attacker to compromise the Oracle WebLogic server over HTTP and take complete control of the host.
CVE-2022-21500 is a vulnerability within Oracle E-Business Suite 12.2 which allows an unauthenticated attacker with
network access to access critical data. Authentication is required for a successful attack, however the user may be self-
registered.
CVE-2022-0028 is a reflected amplification DoS vulnerability in the Palo Alto Networks PAN-OS URL filtering policy
due to a misconfiguration. An attacker could exploit this flaw to perform a DoS attack that would obfuscate the source
of the attack, making it appear as though it was originating from a Palo Alto Networks device, such as its PA-Series
(hardware), VM-Series (virtual) or CN-Series (container) firewall.
PolKit
CVE-2021-4034 is an EoP vulnerability in PolKit’s pkexec, a command line tool included in most Linux distributions by
default. Successful exploitation would give an unprivileged, local attacker root privileges on the vulnerable system.
Name: PwnKit
PTC
CVE-2022-25246 is a hard-coded credentials vulnerability in the UltraVNC installation of Axeda products. The affected
products are Axeda agent and Axeda Desktop Server for Windows. If exploited, this vulnerability can lead to RCE on the
target machine.
Name: Access:7
CVE-2022-25247 is a RCE vulnerability found in Axeda agent and Axeda Desktop Server for Windows. If leveraged, an
attacker can send certain commands to a specific port, without authentication. This can then lead to full file system
access and RCE.
Name: Access:7
CVE-2022-25248 is an information disclosure vulnerability in the ERemoteServer.exe service of Axeda Agent and
Axeda Desktop Server For Windows products. When an attacker connects to a specific port on a target running these
products, the products return the event log for the specific service associated with that port.
Name: Access:7
CVE-2022-25249 is a directory traversal vulnerability in Axeda Agent and Axeda Desktop Server For Windows. The
vulnerability grants a remote, unauthenticated attacker read access on the file system of the target via the web server.
Name: Access:7
CVE-2022-25250 is a missing authentication for critical function vulnerability in the Axeda Agent and Axeda Desktop
Server For Windows products. An attacker can leverage this vulnerability to remotely shut down a specific service on
the target.
Name: Access:7
CVE-2022-25251 is a missing authentication vulnerability in the Axeda Agent and Axeda Desktop Server For
Windows products. This vulnerability can allow an attacker to send XML messages to a specific port without proper
authentication, allowing the attacker to access and edit the program’s configuration.
Name: Access:7
CVE-2022-25252 is an improper check for unusual or exceptional conditions vulnerability in the Axeda Agent and Axeda
Desktop Server For Windows products. This vulnerability can be leveraged by an unauthenticated attacker to crash the
program.
Name: Access:7
CVE-2019-11510 is an unauthenticated arbitrary file disclosure vulnerability in Pulse Connect Secure SSL VPN, formerly
known as Juniper SSL VPN. It received a CVSSv3 score of 10.0. It was featured as one of the top five vulnerabilities in
the 2020 Threat Landscape Retrospective and has been exploited by several nation state and APT groups.
RARLAB
CVE-2022-30333 is a directory traversal vulnerability in the archive extraction tool known as UnRAR by RARLAB. An
attacker could exploit this vulnerability against vulnerable Zimbra Collaboration Suite instances by sending a specially
crafted email to a vulnerable target containing a malicious RAR attachment. No user interaction is required to exploit
this flaw, because Zimbra will extract the malicious RAR file, which would be processed by the underlying UnRAR library.
SAP
CVE-2022-22532 is a HTTP request smuggling vulnerability in the SAP Internet Communication Manager (ICM). It does
not require authentication or user interaction to exploit. In more complex scenarios, an attacker could leverage this
flaw for RCE.
Name: ICMAD
CVE-2022-22533 is a memory leak in the memory pipe management of the SAP ICM that could lead to DoS. An attacker
could exploit this flaw using specially crafted HTTP(S) requests to consume all MPI resources.
Name: ICMAD
CVE-2022-22536 is a memory pipe desynchronization vulnerability in the SAP ICM. An unauthenticated remote attacker
could exploit the vulnerability using a simple HTTP request and achieve full system takeover.
Name: ICMAD
CVE-2021-35247 is an improper input validation vulnerability in the Serv-U web login screen. It was exploited by
attackers in January 2022 in order to propagate attacks using the Log4j vulnerabilities.
SonicWall
CVE-2021-20038 is an unauthenticated stack-based buffer overflow vulnerability in SMA100 Apache httpd server’s
mod_cgi module environment variables that could lead to RCE as a ‘nobody’ user in the appliance.
CVE-2022-22274 is a stack-based buffer overflow vulnerability in SonicOS. An unauthenticated, remote attacker could
exploit this flaw to trigger a DoS and potentially achieve code execution in products like SonicWall Firewalls.
Sophos
CVE-2022-1040 is an authentication bypass vulnerability in the Sophos Firewall User Portal and Webadmin. Successful
exploitation would result in RCE. Sophos reported that this vulnerability has been exploited in the wild.
CVE-2022-3236 is a code injection vulnerability in the User Portal and Webadmin of the Sophos Firewall. An
unauthenticated attacker could exploit this vulnerability by sending specially crafted requests to the User Portal or
Webadmin of the Sophos Firewall that is externally accessible. Successful exploitation would allow for RCE.
CVE-2022-26871 is an arbitrary file upload vulnerability in Trend Micro Apex Central (in both on-premises and as-a-
service). Successful exploitation could grant an attacker RCE.
CVE-2022-40139 is an improper validation vulnerability in the “rollback” functionality, which is used to revert Apex One
agents to older versions. The vulnerability exists because Apex One agents are able to download unverified components,
which could lead to code execution. While this vulnerability can only be exploited by an attacker with access to the Apex
One administrative console, there have been reports of active exploitation.
VMware
CVE-2021-39144 is a RCE vulnerability in XStream, an open source library used for object serialization. This vulnerability
was originally patched on August 22, 2021 in XStream version 1.4.18. VMware Cloud Foundation uses XStream for
input serialization in its Network Security Virtualization for vSphere (NSX-V) solution. An attacker could exploit this
vulnerability by targeting an unauthenticated endpoint in NSX-V to gain RCE privileges as root.
CVE-2022-22948 is a local information disclosure vulnerability in vCenter Server. An authenticated, local attacker with
low-privileged user access to a vulnerable vCenter Server could exploit this flaw to obtain sensitive information. This
vulnerability is likely to be paired with other VMware vCenter Server bugs as part of an attack chain.
CVE-2022-22954 is a server-side template injection vulnerability in the VMware Workspace ONE Access and Identity
Manager. An unauthenticated attacker with network access could exploit this vulnerability by sending a specially crafted
request to a vulnerable VMware Workspace ONE or Identity Manager.
CVE-2022-22955 and CVE-2022-22956 are authentication bypass vulnerabilities in the OAuth 2.0 Access Control
Services (ACS) framework within VMware Workspace ONE. An unauthenticated attacker could send specially
crafted requests to vulnerable and exposed OAuth2.0 endpoints in VMware Workspace ONE in order to successfully
authenticate to the Workspace ONE instance.
CVE-2022-22957 and CVE-2022-22958 are authenticated RCE vulnerabilities in VMware Workspace ONE Access,
Identity Manager and vRealize Automation. An attacker with administrative access can exploit these flaws by triggering
the deserialization of untrusted data through malicious JDBC URI.
CVE-2022-22963 is a RCE vulnerability in the routing functionality Spring Cloud Function. An attacker could exploit this
flaw with a specially crafted HTTP request using the spring expression language.
CVE-2022-22965 is a RCE vulnerability in the Spring Framework. It is a patch bypass of CVE-2010-1622. This
vulnerability has several prerequisites for exploitation, including that applications must be running Java Development
Kit version 9 or higher and use Apache Tomcat as the Servlet container.
Name: Spring4Shell
CVE-2022-22972 and CVE-2022-31656 are authentication bypass vulnerabilities in VMware Workspace ONE Access,
Identity Manager and vRealize Automation that affects local domain users. In order to exploit this vulnerability, a remote
attacker capable of accessing the respective user interface could bypass the authentication for these various products.
CVE-2022-22973 is a local privilege escalation vulnerability in the VMware Workspace ONE Access and Identity
Manager. In order to exploit this vulnerability, an attacker would need to have local access to the vulnerable instances of
Workspace ONE Access and Identity Manager. Successful exploitation would allow an attacker to gain “root” privileges.
WatchGuard
CVE-2022-23176 is a privilege escalation vulnerability in WatchGuard Firebox and XTM appliances. When exploited,
this vulnerability could allow an authenticated, yet unprivileged, remote attacker access with a privileged management
session via exposed management access. This vulnerability was exploited by Russian threat actor Sandworm, according
to CISA.
WordPress Plugin
CVE-2022-3180 is an unauthenticated privilege escalation vulnerability in the premium WordPress plugin called
WPGateway. An unauthenticated attacker could exploit this vulnerability to insert a malicious administrator onto a
vulnerable WordPress site, enabling them to take over the site.
CVE-2022-24682 is an XSS vulnerability in the Zimbra Calendar feature in Zimbra Collaboration Suite. An attacker could
exploit this vulnerability by placing a specially crafted JavaScript HTML containing executable code inside of element
attributes. This code would be injected into the document after being unescaped.
CVE-2022-41352 is an unpatched RCE vulnerability in Zimbra Collaboration Suite discovered in the wild due to active
exploitation. The vulnerability is due to the method (cpio) in which Zimbra’s antivirus engine (Amavis) scans inbound
emails. This vulnerability, CVE-2022-41352 is effectively identical to CVE-2022-30333 but leverages a different file
format. It is also a byproduct of a much older (unfixed) vulnerability, CVE-2015-1197.
CVE-2021-40539 is a REST API authentication bypass vulnerability in ManageEngine ADSelfService Plus. A remote,
unauthenticated attacker could exploit this vulnerability by sending a specially crafted request to a vulnerable host.
Successful exploitation would grant an attacker RCE. CVE-2021-40539 has been exploited to deploy webshells and
establish persistence in target environments.
CVE-2022-35405 is an unauthenticated RCE vulnerability in Zoho ManageEngine Password Manager Pro and PAM360.
Zoho ManageEngine Access Manager Plus is also affected, but requires an attacker to be authenticated.
Zoom
CVE-2022-28751 is a local privilege escalation vulnerability in the Zoom Client for Meetings on macOS. The vulnerability
resides due to an issue in the update process due to a package signature validation issue. A local, authenticated
attacker with low privileges could exploit the vulnerability to elevate to root privileges.
CVE-2022-28756 is a local privilege escalation vulnerability in the Zoom Client for Meetings on macOS. The vulnerability
resides in the auto-update process of the Zoom Client. A local, authenticated attacker with low privileges could exploit
the vulnerability to elevate to root privileges. The fix for this vulnerability addresses CVE-2022-28751.
CVE-2022-28762 is a misconfigured debugging port in Zoom Apps in the Zoom Client for Meetings for macOS. A local
attacker could exploit this vulnerability by connecting to the debugging port and control the Zoom apps running in the
Zoom client.
COPYRIGHT 2023 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, NESSUS, ALSID, INDEGY, LUMIN, ASSURE, AND LOG CORRELATION ENGINE ARE REGISTERED
TRADEMARKS OF TENABLE, INC. OR ITS AFFILIATES. TENABLE.SC, TENABLE.OT, TENABLE.AD, EXPOSURE.AI AND TENABLE.ASM ARE TRADEMARKS OF TENABLE, INC. OR ITS
AFFILIATES. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.