Chinese Attackers’ Favorite Flaws Prove Global Threats, Research Shows
Following the NSA’s list of 25 security flaws often weaponized by Chinese attackers, researchers evaluated how they’re used around the world.
The 25 vulnerabilities most commonly scanned for and targeted by Chinese nation-state attackers were exploited seven times more often than other flaws in the past six months, researchers report in their analysis of a list published by the US National Security Agency (NSA).
NSA officials released a cybersecurity advisory detailing vulnerabilities most frequently used in Chinese state-sponsored cyber activity, which they consider “one of the greatest threats” to US National Security Systems, US Defense Industrial Base, and Department of Defense information networks. This activity often employs a range of tactics to target networks for sensitive intellectual property and economic, political, and military data.
Most of the flaws on its list can be exploited to gain access to victim networks using products that are directly accessible from the Internet and can act as gateways into internal networks. Many of the products are popular; many are used for remote access or external Web services.
Check Point researchers curious about the global impact of these vulnerabilities turned to its threat intelligence tools to evaluate how they’re being weaponized. They found these attacks targeted 161 countries around the world, primarily in the US (500,000+ attacks) but also in Germany, the United Kingdom, Indonesia, and the Netherlands, their data shows.
“Following the NSA report, we wanted to see what’s going on worldwide on attacks targeting those vulnerabilities, as those are on high-profile products, such as Microsoft, Adobe, and the majority of them may have severe impact,” says Adi Ikan, group manager for Check Point’s network research and protection team.
Attacks were also seen across industries. Government and military targets were most common in attacks using these vulnerabilities, as were retail/wholesale, manufacturing, and finance. In the US, nearly 30% of attacks targeted government and military victims, which researchers say is 31% more compared with the rest of the world. Ikan notes government and military were also often targeted in Spain, Canada, and Denmark.
Three key reasons could explain the increased use of these flaws, he says. Some are easy to exploit — such as the remote code execution vulnerability in the Atlassian Confluence Server (CVE-2019-3396) — which increases the likelihood they’ll be exploited more often. Flaws that cause severe impact are more attractive to attackers, as are vulnerabilities in high-profile tools that could boost the number of potentially affected systems.
There were five flaws exploited more often than others. One of these was critical DrayTek Vigor Command Injection vulnerability CVE-2020-8515, which could allow remote code execution without authentication in DrayTek Vigor VPN routers. Microsoft Windows NTLM Authentication Bypass flaw (CVE-2019-1040) is a tampering vulnerability that exists in Windows when a man-in-the-middle attackers can bypass the NTLM Message Integrity Check (MIC) protection.
Check Point’s top five also included CVE-2019-19781, a bug in Citrix Application Delivery Controller and Gateway that could allow directory traversal and lead to remote code execution without credentials. An unauthenticated remote attacker could exploit Pulse Secure VPN flaw CVE-2019-11510 to do an arbitrary file reading and expose keys or passwords. A critical remote code execution flaw in F5 BIG-IP proxy/load balancer devices (CVE-2020-5902) could enable an attacker with access to the Traffic Management User Interface to execute commands.
If You Aren’t Patching, You Should Be
NSA officials urge public and private organizations to patch these vulnerabilities immediately.
“NSA recommends that critical system owners consider these actions a priority, in order to mitigate the loss of sensitive information that could impact U.S. policies, strategies, plans, and competitive advantage,” the advisory states. All network defenders are urged to take action.
Organizations should expect that credentials, accounts, software, and other data stolen or modified before a device was patched won’t be fixed by patching; therefore, password changes and account reviews should be regular. The NSA also advises disabling external management capabilities and setting up an out-of-band management network to mitigate risk, as well as blocking unused protocols at the network edge and disabling them in device configurations.
While these attacks can cause major damage and businesses are advised to apply these patches as quickly as possible, Ikan acknowledges it’s not always easy for organizations to stay updated with security fixes.
“[A] potential challenge that organizations may face when patching is related to the operational side,” he says. “It may require significant efforts and operation to patch all systems as ongoing efforts, especially in cases like patching all the computers within the organization.”
Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial … View Full Bio
Recommended Reading:
More Insights
Read More HERE