Qualis TruRisk Report
Qualis TruRisk Report
QUALYS
TRURISK
RESEARCH
REPORT
On the State of Vulnerabilities, Top Exploits, and
Five Risk Facts Learned by Threat Analytics for
Improving Security Posture from 2022 Data
3 Foreword
TABLE OF
CONTENTS 4 Introduction
6 State of Vulnerabilities
8 CVE-2022-30190 — Follina
26 On-Premises Misconfigurations
28 Ransomware-Specific Misconfigurations
30 Recommendations
32 Qualys Products
34 About Qualys
Today’s cybersecurity tools, which solely focus on generating more and more detections
and alerts are not enough to help secure organizations. Organizations require assistance in
prioritizing the most severe vulnerabilities present in their critical assets and resolving them
before attackers exploit them. Additionally, they need a risk-based approach to quantify and
align cyber risk to their business and communicate effectively with their executives and boards.
Qualys’ passion and vision for helping companies minimize cyber risks has driven us to
innovate by launching VMDR with TruRisk and patch management on our platform. Over
the past 20+ years, we have operated a vast cloud platform that conducted 6+ billion scans,
managed 90+ million agents, and deployed 45+ million patches in 2022 alone. This large
pool of anonymized, real-time data allows us the opportunity to provide insights that assist
organizations in enhancing their security programs.
Our research team took a deep dive into our platform and its 13+ trillion anonymized data
points to determine which vulnerabilities cause the highest risk to organizations. This data,
overlayed with threat intelligence and original research conducted by The Qualys Threat
Research Unit (TRU), exposes the intricacies of threat actor activities and operations. With
vulnerability management, patching and endpoint detection and response (EDR) on a
single platform, our TRU researchers get valuable insights into how threat actors behave
pre and post-exploitation.
Defining risk is more important than ever in setting a cybersecurity strategy. Today’s
security teams must think holistically about attack paths, examine threat actor behaviors
to understand what could wreak the most havoc, and quickly control threat activity when a
breach occurs.
We encourage everyone – from practitioners to CISOs – to leverage the data and insights
in this report to support their security initiatives and help facilitate more profound
conversations with executives and board members that will enhance security posture. The
report offers a reliable resource for security practitioners seeking data-driven, real-world,
and actionable perspectives on vulnerabilities and trends critical to organizations across all
industries and sizes. We hope that these insights will assist your teams in overcoming those
seeking to harm your digital infrastructure.
Sumedh Thakar
President and CEO, Qualys
You can brush your teeth and floss every day, or you can risk cavities, or worse, and hope
a dentist can fix larger problems later. Using detection tools alone provides a diagnostic,
confirming a cavity — but still requires the painful path of extracting the infection. A
wise approach is to focus first on finding flaws and reducing risk. This strategy requires
understanding how vulnerabilities and misconfigurations are commonly leveraged and how
to reduce the mean time to remediation (MTTR). Which do you prefer: brushing your teeth or
being numbed by Novocain?
No matter the difference in size, geography or industry, a CISO’s number one job is to
manage cyber risk. Qualys helps organizations understand their risk exposure by providing
comprehensive information on their unique environments and associated risks — which, left
unattended, could upend their operations. Adversaries make it their business to understand
the vulnerabilities and weaknesses within their victims’ environments, which can shift the
balance of power and control in their favor, enabling cybercriminals to exploit vulnerabilities
that organizations may not be aware of. In this report, the Qualys Threat Research Unit (TRU)
investigates the primary techniques explored by adversaries to exploit vulnerabilities,
compromise systems and infiltrate organizations.
TRU works to secure and defend the digital world from threat actors who seed chaos and
erode trust in business operations. From building vulnerability signatures, to writing detection
rules, researching and finding zero-day threats, finding and reversing custom malware,
reducing attack surface exposure and other advanced threat research activities — TRU works
day and night to protect our customers’ cyber assets.
I hope this report offers you the same opportunity and direction that it offers me: to increase
awareness of what attackers are adding to their Swiss Army knife of tools so you can create
swift countermeasures. Above all, I want to inspire defenders by showing that their work does
make a difference!
Travis Smith
Vice President, Threat Research Unit, Qualys
Methodology
1. This report focuses on 163 unique Common Vulnerabilities and Exposures (CVEs) announced
in 2022, capable of introducing the highest level of risk to organizations across industries
and all sizes.
2. Anonymous detection statistics for the 163 CVEs were analyzed to establish their impact on
enterprise security and the potential for breaches.
3. Anonymous Web Application Security (WAS) data was examined, and detections were
mapped to the OWASP Top 10 application security risks.
4. Anonymous detections from Policy Compliance (PC) scans related to endpoint scans using
Center for Internet Security (CIS), Defense Information Systems Agency (DISA) Security
Technical Information Guides (STIGs), and Qualys Ransomware Protection policies to analyze
commonly failing controls.
5. Discovery of the most common failing controls was enabled by analysis of anonymous scan
detections from CIS Hardening Benchmarks for Amazon Web Services (AWS), Microsoft
Azure, and Google Cloud Platform (GCP).
6+
• Physical
Billion IP Scans/Audits a Year
• Virtual
Active Scanners • Passive
50+
• Cloud/Container
Thousand Scanner appliances
• API
Cloud Agents
84 Million
Cloud Agents across servers,
endpoints, clouds & containers
• Cloud Agents
2+ Trillion
Security Events
collected in real time
Given the wide assortment of classifications and Common Vulnerability Scoring System (CVSS)
scores, not all 25,000 are created equal. Some are more dangerous than others based on their
malicious usage by threat actors or patch difficulty — and many are still unprioritized.
1988 — 2022
Within the universe of more than 192,000 known vulnerabilities, only a subset of those introduce
the most risk to the organization. While the absolute number of vulnerabilities causing risk might
be small, it is a dynamically evolving subset with older vulnerabilities getting new exploits regularly.
This makes it important to continuously monitor threat intelligence and focusing on vulnerabilities
that cause risk at any given point of time. By assessing cyber risk in terms of business risk,
individual organizations can put these astronomical numbers into perspective. This report
describes which are the most dangerous, categorizing them into one or more of the following:
Named Vulnerability Name was given to the vulnerability by security industry or media
2022
During 2022, the proportion of weaponized vulnerabilities among all published vulnerabilities
decreased. Nonetheless, numerous vulnerabilities from previous years were utilized for the first
time by threat actors or malware, resulting in weaponization. Throughout the year, a total of
539 such vulnerabilities from previous years were exploited in some capacity. Of the 539 newly
weaponized vulnerabilities, 118 were older than three years and were as old as CVE-2004-0210
which was published in August 2004.
Figure 4: Vulnerabilities published prior to 2022 which are now being exploited in 2022
What this shows is that threat actors are not only adopting new vulnerabilities which are new
and novel, they are also looking at exploiting vulnerabilities which remain unpatched within the
organizations they encounter. This highlights that organizations need to take into account the
threat landscape to fully understand how to prioritize vulnerabilities to address in their environments.
THREAT
RANSOM- MALWARE MTTR PATCH
CVE QVS CISA KEV ACTOR
WARE (COUNT) (DAYS) RATE
(COUNT)
CVE-2022-30190
Follina
This vulnerability poses a significant threat to organizations because an attacker can execute
arbitrary code via various applications such as Microsoft Word. The exploit leverages the built-
in Microsoft URL handlers to trigger the msdt.exe process, which can then be used to run
PowerShell commands. This allows Remote Code Execution (RCE), which can provide the ability
to install programs, access/modify data, or create new user accounts.
This vulnerability has been leveraged by at least 4 named threat actors and multiple malware
families. The notorious Fancy Bear and Wizard Spider groups are known to exploit this CVE, as
are the lesser known Luckycat and UAC-0098 groups. Some of the more well-known ransomware
families to leverage this vulnerability are Qakbot, Skeeyah, and Black Basta. While the U.S.
National Institute of Standards and Technology’s National Vulnerability Database (NVD)
published the Follina CVE on June 1, 2022, and was known to be weaponized in less than a day,
CISA did not add it to the KEV Catalog until 13 days following its disclosure on that month’s
Microsoft Patch Tuesday. During 2022, this CVE was detected 12.8 million times around the world
and patched on average in 28.1 days, reaching an effective patch rate of 91.21%.
This vulnerability was exploited by the Sparkling Goblin threat actors’ group, while also known
to be leveraged by two ransomware families — particularly the Cerber and AvosLocker variants.
While this CVE was detected only about 3,000 times, it poses significant risk due to the
information it stores, its exposure to the internet, and its ease of exploitation. This vulnerability
was added to the CISA KEV before being published by the NVD. This vulnerability is the second
slowest (behind the Sophos Firewall Authentication Bypass [CVE-2022-1040] vulnerability) for
remediations, being patched in 28.5 days with a 58.3% patch efficacy.
CVE-2022-22954
VMware Workspace ONE Server-Side Template Injection Vulnerability
This CVE is a remote code execution vulnerability arising from a server-side template injection in
the VMware Workspace ONE Access and Identity Manager. The vulnerability can be easily exploited
with a specially crafted HTTP request and poses a significant risk because anyone with network
access to a vulnerable instance can initiate this exploit to execute arbitrary code on the system.
Multiple vulnerabilities were discovered in VMware Workspace ONE in 2022 — five were
weaponized and two were added to the CISA KEV list, yet only one was leveraged by threat
actors and ransomware groups. This vulnerability was weaponized in less than a day and added
to the CISA KEV list within just three days following its disclosure. Only the Rocket Kitten group is
known to be exploiting this vulnerability in the wild. However multiple malware and ransomware
families do leverage this, particularly the RAR1Ransom and Clop families. Patching has been faster
for this vulnerability, within 14.3 days for an 87.3% patch efficacy.
CVE-2022-1040
Sophos Firewall Authentication Bypass
CVE-2022-1040 is an authentication bypass vulnerability in the user portal and web admin of the
Sophos Firewall running version v18.4 MR3 or older. Successful exploitation allows an attacker to
bypass authentication and gain unauthorized access to the firewall to execute arbitrary code.
This vulnerability is leveraged by two threat actors, LuckyCat and DriftingCloud, and is leveraged
by the Ragnarok ransomware family. Considering the target is a firewall device allowing direct
connection to the internet, this CVE poses a serious issue that requires urgent remediation. It
was added to CISA KEV six days after its publication to the NVD. Qualys found more than 6,000
vulnerable instances resolved on average in 70 days with a 34.7% patch efficacy.
11
1 SPEED IS THE KEY
RISK FACT 1
TO OUT-MANEUVERING
ADVERSARIES
The doubling of disclosed vulnerabilities over the last five years, the speed at which vulnerabilities
are weaponized, and the cyber talent shortage have left teams struggling to wade through a
mountain of vulnerabilities with no way to fix them all. Security teams need a systematic approach
to cut through the noise and prioritize fixing the most critical vulnerabilities that will reduce risk
and enable them to keep up with threat actors.
On average, weaponized vulnerabilities are patched within 30.6 days while only being patched
an average of 57.7% of the time. These same vulnerabilities are weaponized by attackers in 19.5
days on average. This means that attackers have 11.1 days of exploitation opportunities before
organizations begin patching. Arguably the remediation activity accelerates after weaponization
happens. Hence, it is very important to predict which vulnerabilities could be weaponized and
patch them as early as possible so an emergency drill can be avoided.
A defender’s mean time to remediation (MTTR) shows a slight change in how organizations
respond to urgent threats. Vulnerabilities known to be leveraged by named threat actors were
remediated eight days faster than those without association to known threat actors. But while
defenders are quick to address these, attackers are also quick to weaponize. Threat actors
were faster to leverage vulnerabilities that are known to be exploited or were cataloged on
CISA’s Known Exploited Vulnerabilities list when compared to those leveraged by malware
and ransomware.
Weaponized Vulns
Exploitation
Opportunities 40
Time to Weaponize
20 CIS
AK
Th EV
30.6 Days Mean Time
to Remediate 10
Ra
nso
re at
Ac
tors
mw
Ma are
0 lwa
57.7% Remediated Da
ys re
Vulnerabilities
Mean Time to Remediation Time to Weaponize
RISK FACT 1: SPEED IS THE KEY TO OUT-MANEUVERING ADVERSARIES | 2023 QUALYS TRURISK RESEARCH REPORT 12
Attribution of a vulnerability to a named threat actor is a time-consuming and extremely difficult
process. On average, attribution happens 95 days (about three months) after a vulnerability is
published and 74.3 days (about two and a half months) after the CVE is patched. Data suggests
that when a vulnerability is associated with a named threat actor, it does not necessarily lead
to faster patching due to various factors. Organizations often need more resources for their
cybersecurity teams, which means they prioritize patching based on criticality and active
exploitation, not necessarily on threat actor association. Patch management can be complex,
involving compatibility testing, scheduling downtime, and coordinating with multiple teams,
causing delays in patch deployment. Accurate attribution of a cyberattack to a specific threat
actor is complex, and uncertainty in attribution can affect patch prioritization. Additionally,
organizations might underestimate the risk associated with a vulnerability if they believe the
named threat actor is not targeting their industry or region, which may result in slower patch
deployment. Finally, patches for specific vulnerabilities may not be immediately available from
the vendor, causing delays in patching even when organizations are aware of the risk.
The analysis found that Microsoft Windows and Google Chrome represented every spot in the
top 10 most detected CVEs in 2022, as shown in Table 2. This makes sense since Windows and
Chrome are at the top in terms of market share for operating systems and browsers, respectively.
DETECTIONS MTTR
CVE TITLE
(MILLION) (DAYS)
RISK FACT 1: SPEED IS THE KEY TO OUT-MANEUVERING ADVERSARIES | 2023 QUALYS TRURISK RESEARCH REPORT 13
Visualizing the vulnerability data in scatter charts shows the full story. Figure 6 compares
the age (X-axis) of a vulnerability to the percentage remediated (Y-axis) — a vivid picture of
how organizations tackle these issues. The speed of remediation in Figure 6 varied wildly
across all vulnerabilities.
80%
60%
40%
Patch Rate
20%
0%
Filtering the scatter chart to represent the top detections — Windows and Chrome — shows a
definitive trendline of how organizations prioritize patching for the quickest result. As shown
in Figure 7, results leveled out around a 90% patch rate, which suggests that the patches are
deployed to approximately 90% of the organization’s infrastructure before the next wave of
monthly patching begins.
80%
60%
40%
Patch Rate
20%
0%
RISK FACT 1: SPEED IS THE KEY TO OUT-MANEUVERING ADVERSARIES | 2023 QUALYS TRURISK RESEARCH REPORT 14
The higher patch rate for weaponized Chrome/Windows vulnerabilities stems from two
reasons. First, the number of critical vulnerabilities these two products receive are significantly
higher than others, and organizations are quick to prioritize critical vulnerabilities that have
the potential to pose the most risk. Second, both Windows and Chrome patches are easily
automated — critical for allowing defenders the opportunity to catch up to the speed at which
threat actors operate.
However, removing Windows and Chrome shows a much different story (Fig. 8) with no clear
patterns in remediation prioritization for the remaining vulnerabilities. The extreme variations can
be attributed to factors such as an inability to automate patching (representative of patching
niche software, which is often more difficult), or security teams deciding that patching the
vulnerability is of little importance unless it is moved to CISA’s KEV list.
80%
60%
40%
Patch Rate
20%
0%
RISK FACT 1: SPEED IS THE KEY TO OUT-MANEUVERING ADVERSARIES | 2023 QUALYS TRURISK RESEARCH REPORT 15
2 AUTOMATION IS THE
RISK FACT 2
DIFFERENCE BETWEEN
SUCCESS AND FAILURE
Automation across security infrastructure has become a necessity for every cyber arsenal. It
allows organizations to eliminate manual and tedious tasks, which ultimately reduces the time
and effort it takes to remediate vulnerabilities and frees up security staff to address more
pressing concerns. Qualys Patch Management customers deployed more than 45 million
patches, highlighting the shift in organizations migrating to more automated means to combat
threat actors.
Most weaponized vulnerabilities discussed in the body of this study were in Chrome or Windows,
due to the high prevalence of that browser and operating system. The mean time to remediation
for these products globally is 17.4 days (about 2 and a half weeks) with an effective patch rate of
82.9%. Windows and Chrome are patched twice as fast and twice as often as other applications.
40 80% 82.9%
30 30.6 60%
Days
20 40% 42.3%
17.4
Days
10 20%
0 0%
Days
Windows All Windows All
+ Chrome + Chrome
Figure 9: MTTR vs. Patch Rate for Chrome in Windows Vulnerabilities in 2022
RISK FACT 2: AUTOMATION IS THE DIFFERENCE BETWEEN SUCCESS AND FAILURE | 2023 QUALYS TRURISK RESEARCH REPORT 16
Time to Remediation Patch Rate
40 80%
30 60%
20 40%
10 20%
0 0%
Days
W
A
IS
IS
am
am
P
ea
ea
T
T
A
A
p
p
ed
ed
K
K
o
o
E
E
ni
ni
V
V
V
V
ze
ze
ul
ul
ns
ns
d
d
Non-Windows + Chrome Windows + Chrome
Figure 10: MTTR vs. Patch Rate for Chrome in Windows Vulnerabilities in 2022
Chrome and Windows comprise one-third of the weaponized vulnerabilities dataset, with 75%
of these leveraged by named threat actors. Knowing these are prime risk vectors, organizations
typically patch them first and most thoroughly.
The study reveals patches that are known to have the opportunity to be deployed automatically
were deployed 45% more often and 36% faster than those of a manual nature. Vulnerabilities
that were automatable with a patch management solution have a mean time to remediation of
25.5 days; where manually patched vulnerabilities were remediated in 39.8 days. The patch rate
for the automatable set was 72.5% compared to 49.8% for those in the manual set. The extreme
variations can be attributed to factors such as an inability to automate patching.
40 100%
39.8
Days
80%
30
72.5%
25.5
Days 60%
20
49.8%
40%
10
20%
0 0%
Days
Automated Manual Automated Manual
RISK FACT 2: AUTOMATION IS THE DIFFERENCE BETWEEN SUCCESS AND FAILURE | 2023 QUALYS TRURISK RESEARCH REPORT 17
3 INITIAL ACCESS
RISK FACT 3
BROKERS ATTACK WHAT
ORGANIZATIONS IGNORE
A growing trend in the threat actor landscape is a category called Initial Access Brokers (IABs),
sometimes called “affiliates.” TRU research shows the initial access point for IABs will follow one
of multiple paths. In Figure 12, the top lane is where IABs seek to exploit the perimeter devices of
their intended target, such as firewalls and web applications. IABs seek misconfigurations such as
default passwords or exposed services to find a way in or exploit vulnerabilities for unpatched
systems. Another path is leveraging valid credentials and gaining direct access to the environment.
IABs will either attempt to steal the credentials, buy them in the dark web, which were stolen
from other breaches, or guess/brute force the passwords. By leveraging valid accounts, the threat
actor can move around the environment with more stealth than relying on exploitation.
Exploit
Sell or
Leverage Perimeter
Access Devices
Misconfig
Victim
Org
Initial
Valid Active
Access Credentials Directory
Broker *Stolen or Guessed
Finally, there are phishing attacks. IABs do not always stand up their own infrastructure to deploy
requisite tooling. Instead, they breach trusted organizations just as they would attack perimeter
devices of an intended victim. This beachhead allows the IAB attacker to upload malware — and
deliver it via phishing to the intended target. Access then allows hunting for valuable data, such
as access to Active Directory or finding the target company’s crown jewels.
Acquisition of this information is then sold to another criminal gang or used by the attacker
themselves. The motive is to deliver and profit from ransomware. During 2022, there were 17 new
CVEs added to the IAB toolkit (see Table 3).
RISK FACT 3: INITIAL ACCESS BROKERS ATTACK WHAT ORGANIZATIONS IGNORE | 2023 QUALYS TRURISK RESEARCH REPORT 18
CVE TITLE
CVE-2022-22963 VMware Tanzu Spring Cloud Function Remote Code Execution Vulnerability
PHP Everywhere <= 2.0.3 included functionality that allowed execution of PHP
CVE-2022-24663 Code Snippets
PHP Everywhere <= 2.0.3 included functionality that allowed execution of PHP
CVE-2022-24664 Code Snippets
PHP Everywhere <= 2.0.3 included functionality that allowed execution of PHP
CVE-2022-24665 Code Snippets
CVE-2022-26134 Atlassian Confluence Server and Data Center Remote Code Execution Vulnerability
CVE-2022-31626 PHP RCE When Using pdo_mysql Extension with mysqlnd Driver
CVE-2022-41343 registerFont in FontMetrics.php in Dompdf before 2.0.1 allows remote file inclusion
Table 3: New Exploits Using Initial Access Brokers (IABs) During 2022
RISK FACT 3: INITIAL ACCESS BROKERS ATTACK WHAT ORGANIZATIONS IGNORE | 2023 QUALYS TRURISK RESEARCH REPORT 19
None of the vulnerabilities in Table 3 are related to Windows or Chrome. Many of these affect
perimeter devices or applications encountered when an IAB attacker attempts initial access.
Remediation timelines for these CVEs are much worse than for Windows and Chrome. IAB
vulnerabilities have a mean time to remediation of 45.5 days, compared to 17.4 days for Windows
and Chrome. The patch rates are also lower, patched at a rate of 68.3% compared to 82.9% for
Windows and Chrome.
50 80% 82.9%
45.5
Days
40
60%
68.3%
30
40%
20 17.4
Days
20%
10
0 0%
Days
Windows IAB Windows IAB
+ Chrome + Chrome
This data shows that because organizations are getting quicker at patching Windows and
Chrome, threat actors — especially IABs — are forced to leverage vulnerabilities outside of the
“big two.” The data also suggests that when defenders control the narrative, threat actors are
forced to switch their tactics, techniques, and procedures to more challenging attack paths.
When this happens, threat actors tend to make more mistakes, create more noise, and generate
more detection opportunities for defenders.
RISK FACT 3: INITIAL ACCESS BROKERS ATTACK WHAT ORGANIZATIONS IGNORE | 2023 QUALYS TRURISK RESEARCH REPORT 20
4 MISCONFIGURATIONS
RISK FACT 4
STILL PREVALENT IN
WEB APPLICATIONS
The Open Web Application Security Project (OWASP) Top 10 is a list of the most common
and most critical vulnerabilities that can impact a web application. Security experts rely on the
OWASP Top 10 when talking about web app security. The list helps developers prioritize and
understand what to fix to make their applications more secure. Remarkably, while the Top 10’s
vulnerabilities incur minor repositioning from year to year, most have maintained a persistent
presence since the Top 10 was first published in 2003!
This study included anonymized detections in 2022 from the Qualys Web Application Scanner,
which globally scanned 370,000 web applications and correlated data against the OWASP
Top 10. The scans revealed more than 25 million vulnerabilities, 33% of which were classified
as OWASP Category A05: Misconfiguration. These misconfiguration vulnerabilities provided
malicious actors with the capability to spread malware in about 24,000 web applications.
370,000
Web Applications
Scanned
25M
Vulnerabilities
Found
33%
Category A05:
Misconfiguration
Figure 14: OWASP Top Vulnerability Discovered in 2022 by Web Application Scanning
RISK FACT 4: MISCONFIGURATIONS STILL PREVALENT IN WEB APPLICATIONS | 2023 QUALYS TRURISK RESEARCH REPORT 21
Detection Count 0 1M 2M 3M 4M 5M 6M 7M 8M 9M
A02 Cryptography
A03 Injection
A05 Misconfiguration
Figure 15: OWASP Top 10 Vulnerabilities Discovered in 2022 by Web Application Scanning
Misconfigurations largely entail improper controls used to protect web applications. Oftentimes
this occurs when security best practices are not followed, such as not changing default
permissions or passwords. Another type of misconfiguration can be applications that share
too much information, such as detailed stack traces for errors. By not following security
best practices, these web applications are vulnerable to a variety of attacks. For example,
sophisticated attackers may use information disclosed in a verbose stack trace to identify
web application technologies and mount a more advanced attack to breach a site. Even a
simple error, such as not disabling directory listings, can trigger long-term issues if personally
identifiable information (PII) is inadvertently exposed through misconfigurations.
The other top-detected categories are A02: Cryptographic Failures, A01: Broken Access Control,
and A03: Injection. Cryptographic Failures can expose sensitive data by weak cryptographic
controls (or worse, no cryptography). Misconfigurations enabling these attacks can cause session
hijacking, stolen user credentials, and attacks against other data at rest or in transit.
Broken Access Control errors leverage violations of permission rights to gain access to web
applications or resources. Examples include forced browsing to pages behind authentication
or unauthorized privilege escalation for authenticated users. In some cases, access control
is completely missing, such as the Optus data breach, where malicious actors discovered an
unprotected API endpoint that allowed access to over 10 million customer records.
RISK FACT 4: MISCONFIGURATIONS STILL PREVALENT IN WEB APPLICATIONS | 2023 QUALYS TRURISK RESEARCH REPORT 22
Finally, the injection category is the culprit of many common web application attacks, such
as SQL and command injection attacks, Cross-Site Scripting (XSS), and Cross-Site Request
Forgeries (CSRF). Many of these attack techniques have existed since the first web applications
switched to dynamic content in the late 1990s. While the mechanics of these attacks are still
evolving, the bedrock error of improper or unsanitized user input has plagued web application
security for decades.
QUALYS ID TITLE
Once exploited, web applications themselves can become tools of malicious actors via web
malware. A survey of Qualys Web Malware Detection scans identified nearly 65,000 instances of
malware in the dataset of 200,000 external-facing web applications used by Qualys customers.
For these, adversaries inserted custom source code to infect client browsers with the goal of
skimming payment card information, stealing credentials, mining cryptocurrency, sending users
to blacklisted sites, and other nefarious actions. These attacks brought reputational damage and
downstream implications to the organization and website visitors.
RISK FACT 4: MISCONFIGURATIONS STILL PREVALENT IN WEB APPLICATIONS | 2023 QUALYS TRURISK RESEARCH REPORT 23
5 INFRASTRUCTURE
RISK FACT 5
MISCONFIGURATIONS
OPEN THE DOOR
TO RANSOMWARE
Misconfigurations – errors that are unintended actions by an internal party — make up a large
part of weaknesses in web applications and are one of the top reasons for data breaches. This is
evidenced by the regular cadence of news around data leakage because of storage buckets or
databases that were mistakenly left accessible without passwords or encryption.
100%
80%
60%
40%
20%
0%
Configuration
C
IA
S3
C
D
ig
on
om
lo
PC
S
S
ud
Q
fig
pu
ue
Tr
te
ry
ai
En
l
gi
ne
Figure 16: AWS Control Pass Rates in 2022
Although protecting the entire bucket is crucial, it is also essential to safeguard the files stored
in the bucket from being publicly accessible. Unfortunately, only 40% of organizations are
currently utilizing preventative controls to prevent files from being accessed publicly. This
leaves a significant portion of S3 buckets at risk of being misconfigured and exposes sensitive
data to potential breaches. Therefore, it is crucial to educate organizations and individuals on
the importance of proper configuration and security measures for S3 buckets to prevent data
exfiltration and potential security incidents.
RISK FACT 5: MISCONFIGURATIONS OPEN THE DOOR TO RANSOMWARE | 2023 QUALYS TRURISK RESEARCH REPORT 24
100%
80%
60%
40%
20%
0%
Configuration
Lo
SQ
St
A
IA
om
ir
ct
et
pp
zu
zu
or
Test Pass Rate
gg
tu
L
iv
w
re
re
ag
pu
Se
al
in
it
or
SQ
y
e
g
te
rv
k
D
Lo
et
Se
ic
L
En
e
rv
gi
or
ic
n
k
es
e
Figure 17: GCP Control Pass Rates in 2022
Within GCP, the data shows concerns with BigQuery configurations. The large cloud datasets
housed in BigQuery are often used for AI/ML model training, which can contain sensitive
information that could be exposed like S3’s scenario described above. During 2022, 99% of the
checks passed, ensuring that BigQuery datasets are not anonymously or publicly available.
Another observation is the failure to utilize customer-managed keys to encrypt data. On GCP,
cloud service provider keys are used for encryption only 1% of the time. Not using customer-
managed keys for encryption can pose a significant risk to the security of your data. While it’s
better to encrypt data using cloud service provider (CSP) keys than not to encrypt it at all, this
method does not provide significantly stronger protection. If your data is encrypted using CSP
keys and any of your identities are compromised, threat actors can use those privileges to gain
access to your encrypted data. However, if you use your own encryption key, it adds an additional
layer of protection. In this case, the threat actor would need access to the encryption key to
decrypt the data.
From a security perspective, it is highly recommended to use customer-managed keys for encryption.
By doing so, you maintain complete control over the encryption process and can ensure that your
data remains secure. With customer-managed keys, you can encrypt your data with your own
unique key, making it much more difficult for unauthorized individuals to access your sensitive
information. Therefore, it’s crucial to prioritize using customer-managed keys for encryption to
minimize the risks of data breaches and ensure the highest level of security for your data.
100%
80%
60%
40%
20%
0%
Configuration
Ku
PS
Se
St
V
M
irt
et
et
yS
on
or
ua
ag
Q
L
ito
rit
rn
or
or
L
l
Se
e
y
et
M
r
k
Se
A
rv
ac
Se
W
es
cc
rv
en
er
at
hi
cu
Se
er
ou
te
ne
ch
r
rv
nt
ity
er
ic
G
e
ro
up
RISK FACT 5: MISCONFIGURATIONS OPEN THE DOOR TO RANSOMWARE | 2023 QUALYS TRURISK RESEARCH REPORT 25
Similarly with Microsoft Azure, encryption is a group of controls that often fails. The Disks
category has two checks failing 99% of its scans. These two settings are: “Ensure that ‘OS and
Data’ disks are encrypted with Customer Managed Key” and “Ensure that all unattached VM
disks are encrypted.” Besides SQL Database Encryption (97.8% passing) and Web Apps using
the latest version of TLS (85.4% passing), encryption checks are failing more than half of the
time across the board.
On-Premises Misconfigurations
Security practitioners must also assess risks for on-premises misconfigurations. Qualys Cloud
Platform controls enable the assessment of more than 100,000 potential misconfigurations
that could weaken cloud security. Urgent attention should be given to the most prevalent
misconfigurations. During 2022, the top 10 failing controls (see Table 5) were for password
settings, user permissions, and protocols for Windows Updates.
Ensure 'User Account Control: Behavior of the elevation prompt for standard users'
is set to 'Automatically deny elevation requests' 9.77%
Ensure 'Select when Quality Updates are received' is set to 'Enabled: 0 days' 10.50%
Ensure 'Configure Automatic Updates: Scheduled install day' is set to '0 - Every day' 18.11%
Ensure 'Deny log on through Remote Desktop Services' to include 'Guests, Local account' 28.94%
Ensure 'Maximum password age' is set to '60 or fewer days, but not 0' 36.75%
RISK FACT 5: MISCONFIGURATIONS OPEN THE DOOR TO RANSOMWARE | 2023 QUALYS TRURISK RESEARCH REPORT 26
Linking Misconfigurations to Ransomware
In a joint effort between the MITRE Center for Threat Informed Defense and participating
organizations, security controls were linked to MITRE ATT&CK Techniques and Mitigations to
better understand their security coverage against threats outlined in the ATT&CK knowledge
base. For this study, TRU examined all controls failing more than 50% of their scans and the
associated MITRE ATT&CK techniques linked to those specific controls.
Exploitation of
Remote Services Brute Force
Remote Desktop
Data Destruction Protocol
For cloud misconfigurations, the top three techniques associated with failing controls were
T1210: Exploitation of Remote Services, T1485: Data Destruction, and T1530: Data from Cloud
Storage Object. This indicates misconfigurations in the cloud are exposing organizations
to exploitation, encryption, and exfiltration. These three techniques describe exactly how
ransomware operates today.
Failing on-premises misconfigurations are associated with T1110: Brute Force, T1021.001:
Remote Desktop Protocol, and T1548: Abuse Elevation Control Mechanism. When combined,
these enable an attacker using guessed or stolen passwords to log into an exposed Remote
Desktop Protocol (RDP) machine and elevate their privileges. This is a primary attack vector
for Initial Access Brokers as an entry point into their intended victims.
RISK FACT 5: MISCONFIGURATIONS OPEN THE DOOR TO RANSOMWARE | 2023 QUALYS TRURISK RESEARCH REPORT 27
Ransomware-Specific Misconfigurations
Configuration checks to prevent ransomware are useful when using the Qualys Best Practice
Controls for Reducing Risk Related to Malware/Ransomware policy. During 2022, these
misconfigurations failed half of their scans with a pass rate of 49.4%. Surprisingly, nearly a quarter
of the tests received a 100% pass rate, which is great news. Failing misconfigurations are
associated with enabling threat actors to move laterally within an organization.
The study applied this ransomware policy to a default installation of Windows 10 to compare it
to the overall status across the anonymized data analyzed for this report. A default Windows 10
installation had a passing rate of 34%, so Qualys users have improved their security posture by
an average of 15 percentage points.
TRU’s evaluation discovered there are five settings securely configured in a default Windows
10 installation with a fail rate of more than 50%, meaning many organizations have intentionally
misconfigured these settings. The top two failing controls were settings specific to Attack
Surface Reduction, which indicates organizations are likely relying on other security tools to help
prevent phishing-related attacks. The remaining three are password and RDP settings, which
align with the overall failure rates of on-premises controls; these allow passwords to be used
longer and changed less often while exposing RDP. While a valuable tool for administrators,
there is potential for abuse — especially if connected directly to the internet.
Ensure 'Configure Attack Surface Reduction rules' is set to 'Enabled' 8.05% Phishing Attacks
Ensure 'Maximum password age' is set to '60 or fewer days, but not 0' 15.75% Password Stealing
Ensure 'Enforce password history' is set to '24 or more password(s)' 28.95% Password Stealing
The good news is there are more settings that organizations are intentionally configuring
correctly. These include 16 settings that are misconfigured by default — settings that organizations
are correctly configuring more than 50% of the time to be more secure. We can see quite a few
configurations dealing with passwords, even though a few are intentionally misconfigured. At
a high level, many of these are dealing with brute force/password stealing and lateral movement.
Controls such as Universal Naming Convention (UNC) paths, Network Access, and Windows
Firewall will reduce the ability of threat actors to laterally move within the environment. The
password settings enable protections to prevent a threat actor from successfully achieving brute
force of passwords by increasing the complexity and having thresholds automatically locking out
the process upon invalid login attempts.
RISK FACT 5: MISCONFIGURATIONS OPEN THE DOOR TO RANSOMWARE | 2023 QUALYS TRURISK RESEARCH REPORT 28
CONTROL TITLE PASS RATE IMPACT
Ensure LAPS AdmPwd GPO Extension / CSE is installed 54.35% Password Stealing
Ensure 'User Account Control: Admin Approval Mode for the Built-in
55.24% Escalating Privileges
Administrator account' is set to 'Enabled'
Ensure 'Minimum password age' is set to '1 or more day(s)' 57.80% Password Stealing
Ensure 'Enable Local Admin Password Management' is set to 'Enabled' 61.61% Password Stealing
Ensure 'Password must meet complexity requirements' is set to 'Enabled' 67.09% Password Stealing
Ensure 'Account lockout duration' is set to '15 or more minute(s)' 94.23% Password Stealing
Table 7: Pass Rates for 16 Default Settings in Windows 10 that Are Intentionally Configured Correctly
RISK FACT 5: MISCONFIGURATIONS OPEN THE DOOR TO RANSOMWARE | 2023 QUALYS TRURISK RESEARCH REPORT 29
RECOMMENDATIONS
30
Recommendations
Threat actors remained highly adaptable in 2022, constantly tweaking their tactics, techniques
and procedures to achieve their objectives. As we prepare for 2023 and beyond, defenders
must evolve alongside the changing threat landscape and take action to reduce and manage
risk in their environments. With our research yielding five of the most severe Risk Facts faced by
organizations, below are immediate practices that security teams can implement to increase the
resilience of their organization:
Be wary of externally facing systems which are exploited for initial access.
Threat actors will persistently seek entry points in perimeter devices, with any exposed
web application posing an immense level of risk. To mitigate this threat, organizations must
reduce their unnecessary attack surface — e.g., the threat from “unknown unknowns” — as
much as possible, by continuously monitoring their external attack surface, tracking changes
and receiving notifications when new, unknown assets or critical issues are found and
keeping systems up to date.
Web applications are a prime target for gaining a foothold or staging attacks.
Web apps often process or store sensitive information that threat actors would find valuable.
Even non-critical systems can serve as a launch pad for an attack or store malicious tools for
malicious campaigns against secondary victims. Therefore, scanning web applications for
vulnerabilities and configuration issues is crucial to prevent attackers from exploiting them.
Multi-Vector EDR
qualys.com/try/endpoint-detection-response
TotalCloud
qualys.com/try/totalcloud
Patch Management
qualys.com/try/patch-management
The Threat Research Unit (TRU) is the research arm of Qualys. The TRU
team’s focus is devoted to vulnerability, compliance, malware, and threat
actor research with the goal of providing world-class security intelligence,
detection data, and guidance for the Qualys Cloud Platform.
New technologies are revolutionizing lives and economies around the world. Cyberthreats are
growing at a similar pace, endangering access to the services that improve lives everywhere. By
empowering customers and stakeholders for IT, security and compliance with TRU research and
insights, together we can secure and defend the digital world from bad actors who create chaos
and erode trust. We are the Qualys Threat Research Unit. Our shield is your shield.
ABOUT QUALYS THREAT RESEARCH UNIT (TRU) | 2023 QUALYS TRURISK RESEARCH REPORT 33
About Qualys
ABOUT QUALYS Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of disruptive cloud-based
security, compliance and IT solutions with more than 10,000 subscription customers worldwide,
including a majority of the Forbes Global 100 and Fortune 100. Qualys helps organizations
streamline and automate their security and compliance solutions onto a single platform for
greater agility, better business outcomes, and substantial cost savings.
The Qualys Cloud Platform leverages a single agent to continuously deliver critical security
intelligence while enabling enterprises to automate the full spectrum of vulnerability detection,
compliance, and protection for IT systems, workloads and web applications across on premises,
endpoints, servers, public and private clouds, containers, and mobile devices. Founded in 1999
as one of the first SaaS security companies, Qualys has strategic partnerships and seamlessly
integrates its vulnerability management capabilities into security offerings from cloud service
providers, including Amazon Web Services, the Google Cloud Platform and Microsoft Azure,
along with a number of leading managed service providers and global consulting organizations.
For more information, please visit qualys.com.
Qualys, Qualys VMDR® and the Qualys logo are proprietary trademarks of Qualys, Inc. All other
products or names may be trademarks of their respective companies.
Learn More:
Follow Us:
The report is provided “as is.” Except to the extent prohibited by law, or to the extent any statutory rights apply that
cannot be excluded, limited or waived, we and our affiliates and licensors (a) make no representations or warranties
of any kind, whether express, implied, statutory or otherwise regarding the content of this report, and (b) disclaim all
warranties, including any implied or express warranties of merchantability, satisfactory quality, fitness for a particular
purpose, non-infringement, or quiet enjoyment.
CONTRIBUTORS TO THE 2023 QUALYS TRURISK RESEARCH REPORT | 2023 QUALYS TRURISK RESEARCH REPORT 35
APPENDIX A
36
CVE LISTING QUALYS ID
CVE-2021-4034
TITLE
95
CVE-2022-22963 VMware Tanzu Spring Cloud Function Remote Code Execution Vulnerability 95
CVE-2022-24734 MyBB Admin Control Code Injection Remote Code Execution Vulnerability 75
iRZ Mobile Router Cross Site Request Forgery Remote Code Execution
CVE-2022-27226 72
Vulnerability
Citrix Application Delivery Controller (ADC) and Gateway Authentication
CVE-2022-27518 95
Bypass Vulnerability
CVE-2022-31460 Meeting Owl Pro and Whiteboard Owl Hard-Coded Credentials Vulnerability 95
CVE-2022-32917 Apple iOS, iPadOS, and macOS Remote Code Execution Vulnerability 95
CVE-2022-36804 Atlassian Bitbucket Server and Data Center Command Injection Vulnerability 95
CVE-2022-41622 BIG-IP and BIG-IQ iControl SOAP Cross-Site Request Forgery Vulnerability 75