Ethical Hacking Report 2022
Ethical Hacking Report 2022
Hacking
2022
Repor t
2,859 ways we hacked
our clients in 2022
www.citadelo.com
Management
summary
2,859 VULNERABILITIES
found in total
388 PROJECTS
tested in 2022
8 VULNERABILITIES
found in every project on average
5 NEW PROJECTS
tested per week on average
2,5 CRITICAL
vulnerability found in 50% of projects analyzed
1 HIGH
vulnerability found in every project on average
1 MEDIUM
vulnerability found in every project on average
Introduction
Over the years, Citadelo has performed thousands of one critical vulnerability, and medium - to high-level
security assessments and penetration tests globally. vulnerabilities were found in nearly every project tested.
This first-hand testing experience and the extensive
sample size have allowed us to gain unique insights into These results confirm the absolute necessity for
the current state of cyber security and the prevalence comprehensive penetration testing for any IT project,
of various vulnerabilities across different types of IT regardless of vertical. The frequency and sophistication
projects. of cyber-attacks are constantly on the rise and
penetration testing and full-stack security assessments
While different project types experienced varying levels are more crucial than ever in 2022.
of vulnerabilities due to a variety of factors, on average
50% of projects tested in 2022 suffered from at least
How we got our numbers
This report analyzes the risks identified in projects tested All figures are directly taken from our own testing
by Citadelo during 2022. The statistics we gathered from procedures, without any information from external
our own first-hand testing of over 388 projects revealed sources. Retests were not included in the figures, as they
a total of 2,859 vulnerabilities of varying criticality. We would influence the results and decrease the perceived
performed penetration tests on an average of 8 projects prevalence of certain risks.
per week and found an average of 7 vulnerabilities in
every project.
Types of vulnerabilities
In Citadelo’s penetration testing and full-stack security analysis, we identify a full range of risks, from suggested best
practices to critical vulnerabilities. We use the following risk types to categorize the vulnerabilities we identify:
NOTE
Deviation from best practices that should be corrected to ensure optimal security (missing headers, verbose errors)
LOW
Vulnerabilities that present low technical impact or have very low likelihood but should not be left exposed
MEDIUM
Vulnerabilities that present a considerable technical risk to projects and should be dealt with asap (SSRF, 2FA bypass)
HIGH
Vulnerabilities that present a very serious technical risk to projects and require swift resolution (e.g. XSS, XXE)
CRITICAL Vulnerabilities that present immediate and potentially disastrous technical risks to projects (e.g. SQL injection, RCE,
code/command injection, authentication bypass)
The following chart gives a full overview of the tests performed by Citadelo in 2022:
Critical 48 4 10 19 27 16 4 158
3,9%
11,5%
Note 6,3% decrease
CO M PA R E D TO 2 0 2 1
Low 12,5% increase
12,3%
48% Medium 35,5% increase
1400
1200
1206
1000
800
600 715
400
469
200 311
158
0
As a rule of thumb, the less critical the risk, the more frequently it is likely to be exposed in any given project type.
On average, Note risks made up the highest proportion of vulnerabilities identified at 48%. These types of risks are
still highly advisable to resolve but do not present an immediate threat to projects. Critical risks, on the other hand,
made up just 4% of the vulnerabilities identified. However, these types of risks represent immediate threats to projects
and must be remedied as quickly as possible.
Common risks
by project type
Of the projects we tested, web-based projects (websites or APIs) were by far the most common, comprising over 49,1%
of all projects. Mobile app projects were the next most common types, at 15,3%, followed closely by continuously
rising Cloud at 14,5%. While Infrastructure projects were at 11,9%, the API stayed low at 6,6%. Social engineering
together with other projects tested was largely made up of desktop apps, ATMs, and social engineering projects and
rounded up to approximately 2,5%.
The following is a breakdown of the different types of projects and vulnerabilities most commonly associated
with each type of project:
OTHER + SOCIAL
ENGINEERING
CLOUD
2%
15%
12% 49%
INFRA
WEB
15%
7%
MOBILE
API
WEB
In the modern, digital age, websites and web projects cyber-attacks. Clients undertaking internal infrastructure
are by far the most common, and suffer the most projects must be aware of the risks involved and
vulnerabilities of any other project type. continue to test the security of their infrastructure to
avoid exposing critical vulnerabilities, even without a
direct connection to the Internet.
API
CLOUD
We tested significantly fewer solely API-based projects,
as APIs are nearly always tested with a web interface, and
Similarly to internal infrastructure projects, clients
thus most projects that included an API were grouped in
undertaking cloud projects suffer from a false sense
with the “Web” project category. Since the subset of API
of security that led to a higher number of critical
vulnerabilities does not include client-side vulnerabilities
vulnerabilities. The misguided beliefs that the audits
and consists of less common vulnerabilities like (e.g.
and penetration testing commonly provided alongside
XSS or JSON), the average number of vulnerabilities
cloud services are sufficient, and that the lack of
identified was much lower than with web projects.
exposure of services to the Internet guarantees higher
security, led clients to overlook critical vulnerabilities
that were subsequently revealed in our testing.
MOBILE
INFRASTRUCTURE
Please consult the table below for a full breakdown of the industries tested in 2021:
TECHNOLOGY INFRASTRUCTURE
RETAIL
7%
AND FOOD
7% HEALTHCARE
33%
FINANCE
Conclusion
The over 2,859 vulnerabilities we found present a snap- more vulnerabilities inevitably emerge. Whether it be
shot of the current state of cybersecurity and the impor- internal infrastructure applications assuming they are
tance of penetration testing in 2023. While less serious safe because they are not connected to the Internet, or
errors made up the vast majority of vulnerabilities, the cloud service applications that assume the internal au-
158 critical vulnerabilities discovered could have result- dits of their providers are sufficient, the overarching les-
ed in catastrophic consequences had they not been im- son from this data is that you can never be too careful.
mediately remedied. Comprehensive penetration testing from experienced
agencies like Citadelo is an essential component of any
Above all, an important common theme was highlight- security solution, and its importance will only increase in
ed by our data: whenever the importance of security or the years to come.
penetration testing is overlooked or underestimated,
Tomáš ZAŤKO
CITADELO CEO
Hackers
on your side
Feeling vulnerable?
Let’s hack-proof your business.
Contact us at: [email protected]
www.citadelo.com