New research from Recorded Future claims that hackers are exploiting many of the same security vulnerabilities as last year, demonstrating how failure to apply security updates is leaving organizations vulnerable to attack. 

Researchers analyzed the top vulnerabilities, exploit kits and malware attacks used by attackers in 2019 and found that six of the most commonly exploited vulnerabilities were repeats from 2018. All of these repeated vulnerabilities are related to Microsoft products, with a total of eight of the top ten vulnerabilities related to Microsft software like Internet Explorer and Microsoft Office products. 

The two other most common vulnerabilities target Adobe Flash Player. One vulnerability - CVE-2018-15982 - was the most commonly exploited vulnerability of 2019. This vulnerability was assigned a Common Vulnerability Scoring System (CVSS) score of 10 when it first emerged and was patched in December 2018. 

The next two most commonly exploited vulnerabilities were both repeats from 2018. Last year's number one, CVE-2018-8174, fell to the number two spot. This vulnerability in Internet Explorer, known commonly as Double Kill released for the vulnerability in May 2018, but given the volume of exploitation, there is still a large number of users who have not applied it. 

The third most commonly exploited vulnerability, CVE-2017-11882, is a vulnerability in Microsoft Office that was disclosed back in December 2016 that allows hackers to conduct remote code execution attacks. This vulnerability has been associated with Emotet, one of the world's most prolific botnets. 

Vulnerabilities like CVE-2012-0158 are particularly alarming considering the critical bug in Microsoft Office was patched almost eight years ago. This big can also be exploited to conduct remote code execution attacks. 

CVE-2015-2419 is the sixth most commonly exploited vulnerability. This bug allows attackers to execute arbitrary code through Internet Explorer and has been known about since 2015. 

Here's the list of the ten most commonly exploited vulnerabilities according to Recorded Future: 

  1. CVE-2018-15982 – Adobe Flash Player
  2. CVE-2018-8174 – Microsoft Internet Explorer
  3. CVE-2017-11882 – Microsoft Office
  4. CVE-2018-4878 – Adobe Flash Player
  5. CVE-2019-0752 – Microsoft Internet Explorer
  6. CVE-2017-0199 – Microsoft Office
  7. CVE-2015-2419 – Microsoft Internet Explorer
  8. CVE-2018-20250 – Microsoft WinRAR
  9. CVE-2017-8750 – Microsoft Internet Explorer
  10. CVE-2012-0158 – Microsoft Office

All of the vulnerabilities on this list have received patches, but there are still organizations that are ignoring the updates and leaving the backdoor open for cybercriminals. The most effective way to protect networks from these vulnerabilities is to ensure that all products, especially Microsoft ones, are up to date with the latest security patches.

NNT suggests implementing a robust System Hardening and Vulnerability Management solution coupled with intelligent change control to help fight the persistence of vulnerabilities.  Any configuration changes, be it through patching or other system maintenance, may introduce vulnerabilities, so visibility and control of changes is an essential security best practice.

>> Read our latest whitepaper The Problem with Running Outdated Softwareto learn how to protect your organization. 

>> Read our latest article Is Patching a Double-Edged Sword? with Security Magazine

NNT Suite of Products

change tracker gen7r2 logo

Combine industry leading Device Hardening, File Integrity Monitoring, Change Control, Configuration Management & Compliance Management into one easy to use solution that can scale to the most demanding environments!

fastcloud logo

Automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology) Integrity Assurance.

log tracker logo logo

Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds.

vulnerability tracker logo

Continuously scan and identify vulnerabilities with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

USA Offices
NNT logo New Net Technologies LLC
Naples
Suite #10115, 9128 Strada Place
Naples, Florida, 34108
Atlanta
1175 Peachtree St NE
Atlanta, Georgia, 30361.

Tel: (844) 898-8358
email [email protected]
UK Office
NNT logo New Net Technologies Ltd
Rivers Lodge, West Common
Harpenden, Hertfordshire
AL5 2JD

Tel: 01582 287310
email [email protected]
CIS benchmarking SEWP Cybersecurity 500Sans Institute Now Certified IBM Security
Copyright 2020, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.