2021 Top Routinely Exploited Vulnerabilities
2021 Top Routinely Exploited Vulnerabilities
U.S. organizations: all organizations should report incidents and anomalous activity to CISA 24/7 Operations
Center at [email protected] or (888) 282-0870 and/or to the FBI via your local FBI field office or the FBI’s 24/7
CyWatch at (855) 292-3937 or [email protected]. When available, please include the following information
regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type
of equipment used for the activity; the name of the submitting company or organization; and a designated point
of contact. For NSA client requirements or general cybersecurity inquiries, contact
[email protected]. Australian organizations: visit cyber.gov.au or call 1300 292 371 (1300
CYBER 1) to report cybersecurity incidents and access alerts and advisories. Canadian organizations: report
incidents by emailing CCCS at [email protected]. New Zealand organizations: report cyber security
incidents to [email protected] or call 04 498 7654. United Kingdom organizations: report a significant
cyber security incident: ncsc.gov.uk/report-an-incident (monitored 24 hours) or, for urgent assistance, call 03000
200 973.
This document is marked TLP:WHITE. Disclosure is not limited. Sources may use TLP:WHITE when information
carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public
release. Subject to standard copyright rules, TLP:WHITE information may be distributed without restriction.
For more information on the Traffic Light Protocol, see cisa.gov/tlp.
TLP: WHITE
UNCLASSIFIED / NON CLASSIFIÉ
TECHNICAL DETAILS
Key Findings
Globally, in 2021, malicious cyber actors targeted internet-facing systems, such as email servers and
virtual private network (VPN) servers, with exploits of newly disclosed vulnerabilities. For most of the
top exploited vulnerabilities, researchers or other actors released proof of concept (POC) code within
two weeks of the vulnerability’s disclosure, likely facilitating exploitation by a broader range of
malicious actors.
To a lesser extent, malicious cyber actors continued to exploit publicly known, dated software
vulnerabilities—some of which were also routinely exploited in 2020 or earlier. The exploitation of
older vulnerabilities demonstrates the continued risk to organizations that fail to patch software in a
timely manner or are using software that is no longer supported by a vendor.
vulnerability quickly became one of the most routinely exploited vulnerabilities after a POC
was released within a week of its disclosure. Attempted mass exploitation of this vulnerability
was observed in September 2021.
Three of the top 15 routinely exploited vulnerabilities were also routinely exploited in 2020: CVE-
2020-1472, CVE-2018-13379, and CVE-2019-11510. Their continued exploitation indicates that many
organizations fail to patch software in a timely manner and remain vulnerable to malicious cyber
actors.
Table 1: Top 15 Routinely Exploited Vulnerabilities in 2021
MITIGATIONS
Vulnerability and Configuration Management
• Update software, operating systems, applications, and firmware on IT network assets in a
timely manner. Prioritize patching known exploited vulnerabilities, especially those CVEs
identified in this CSA, and then critical and high vulnerabilities that allow for remote code
execution or denial-of-service on internet-facing equipment. For patch information on CVEs
identified in this CSA, refer to the appendix.
o If a patch for a known exploited or critical vulnerability cannot be quickly applied,
implement vendor-approved workarounds.
• Use a centralized patch management system.
• Replace end-of-life software, i.e., software that is no longer supported by the vendor. For
example, Accellion FTA was retired in April 2021.
• Organizations that are unable to perform rapid scanning and patching of internet-facing
systems should consider moving these services to mature, reputable cloud service providers
(CSPs) or other managed service providers (MSPs). Reputable MSPs can patch
applications—such as webmail, file storage, file sharing, and chat and other employee
collaboration tools—for their customers. However, as MSPs and CSPs expand their client
organization's attack surface and may introduce unanticipated risks, organizations should
proactively collaborate with their MSPs and CSPs to jointly reduce that risk. For more
information and guidance, see the following resources.
o CISA Insights Risk Considerations for Managed Service Provider Customers
o CISA Insights Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized
Businesses
o ACSC advice on How to Manage Your Security When Engaging a Managed Service
Provider
Note: see CISA Capacity Enhancement Guide – Implementing Strong Authentication and ACSC
guidance on Implementing Multi-Factor Authentication for more information on hardening
authentication systems.
• Continuously monitor the attack surface and investigate abnormal activity that may indicate
lateral movement of a threat actor or malware.
o Use security tools, such as endpoint detection and response (EDR) and security
information and event management (SIEM) tools. Consider using an information
technology asset management (ITAM) solution to ensure your EDR, SIEM,
vulnerability scanner etc., are reporting the same number of assets.
o Monitor the environment for potentially unwanted programs.
• Reduce third-party applications and unique system/application builds; provide exceptions only
if required to support business critical functions.
• Implement application allowlisting.
RESOURCES
• For the top vulnerabilities exploited in 2020, see joint CSA Top Routinely Exploited
Vulnerabilities
• For the top exploited vulnerabilities 2016 through 2019, see joint CSA Top 10 Routinely
Exploited Vulnerabilities.
• See the appendix for additional partner resources on the vulnerabilities mentioned in this CSA.
DISCLAIMER
The information in this report is being provided “as is” for informational purposes only. CISA, the FBI,
NSA, ACSC, CCCS, NZ NCSC, and NCSC-UK do not endorse any commercial product or service,
including any subjects of analysis. Any reference to specific commercial products, processes, or
services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply
endorsement, recommendation, or favoring.
PURPOSE
This document was developed by U.S., Australian, Canadian, New Zealand, and UK cybersecurity
authorities in furtherance of their respective cybersecurity missions, including their responsibilities to
develop and issue cybersecurity specifications and mitigations.
REFERENCES
[1] CISA’s Apache Log4j Vulnerability Guidance
TLP: WHITE
TLP:WHITE Product ID: AA22-117A
CVE-2021-21985 VMware vCenter Server 7.0, 6.7, VMware Advisory CCCS VMware Security
6.5 VMSA-2021-0010 Advisory
Cloud Foundation
(vCenter Server) 4.x
and 3.x
CVE-2021-21972 VMware vCenter Server 7.0, 6.7, VMware Advisory ACSC Alert VMware
6.5 VMSA-2021-0002 vCenter Server plugin
remote code execution
Cloud Foundation
vulnerability
(vCenter Server) 4.x
and 3.x CCCS VMware Security
Advisory
CCCS Alert APT Actors
Target U.S. and Allied
Networks - Update 1
CVE-2021-20038 SonicWall SMA 100 Series (SMA SonicWall Security ACSC Alert Remote
200, 210, 400, 410, Advisory SNWLID- code execution
500v), versions 2021-0026 vulnerability present in
10.2.0.8-37sv, 10.2.1.1- SonicWall SMA 100
19sv, 10.2.1.2-24sv series appliances
TLP: WHITE
TLP:WHITE Product ID: AA22-117A
CVE-2021-44228 Apache Log4j, all versions from Log4j: Apache Log4j CISA webpage Apache
2.0-beta9 to 2.14.1 Security Vulnerabilities Log4j Vulnerability
Guidance
For other affected For additional
vendors and products, information, see joint CCCS Active
see CISA's GitHub CSA: Mitigating exploitation of Apache
repository. Log4Shell and Other Log4j vulnerability -
Log4j-Related Update 7
Vulnerabilities
CVE-2021-40539 Zoho ManageEngine ADSelfService Plus Zoho ManageEngine: Joint CSA APT Actors
version 6113 and prior ADSelfService Plus Exploiting Newly
6114 Security Fix Identified Vulnerability
Release in ManageEngine
ADSelfService Plus
CCCS Zoho Security
Advisory
CVE-2021-40444 Microsoft Multiple Windows Microsoft Security
products; see Microsoft Update Guide:
Security Update Guide: MSHTML Remote Code
MSHTML Remote Code
TLP: WHITE
TLP:WHITE Product ID: AA22-117A
TLP: WHITE
TLP:WHITE Product ID: AA22-117A
TLP: WHITE
TLP:WHITE Product ID: AA22-117A
TLP: WHITE
TLP:WHITE Product ID: AA22-117A
TLP: WHITE
TLP:WHITE Product ID: AA22-117A
TLP: WHITE
TLP:WHITE Product ID: AA22-117A
TLP: WHITE
TLP:WHITE Product ID: AA22-117A
CVE-2019-11510 Pulse Secure Pulse Connect Secure Pulse Secure: SA44101 CISA Alert Continued
8.2 before 8.2R12.1, 8.3 - 2019-04: Out-of-Cycle Exploitation of Pulse
Advisory: Multiple
TLP: WHITE
TLP:WHITE Product ID: AA22-117A
TLP: WHITE
TLP:WHITE Product ID: AA22-117A
TLP: WHITE
TLP:WHITE Product ID: AA22-117A
TLP: WHITE