10 Most Exploited Software From 2016 To 2020

10 most exploited Software from 2016 to 2020

US CERT has published the list of top 10 vulnerabilities that have been exploited between 2016 and 2020. Based on that, we have prepared the list of affected software and the methods using which the vulnerabilities have been exploited. This article is divided into two parts. In the Part 1 we have mentioned the list of top 7 software that have been exploited between 2016 and 2019, along with their vulnerabilities. In the Part 2 we have mentioned the list of top 3 software that have been exploited in first quarter of 2020.

Part 1 – Most exploited software between 2016-2019

1. Microsoft Office

CVE-2017-11882 and CVE-2017-0199 are two exploited vulnerabilities that affected Microsoft Office 2007 products the most. The malware like Loki, FormBook and Pony/FAREIT have been used to exploit the CVE-2017-11882 vulnerability. By using a specially crafted Office file, attackers executed code remotely, and gained user privileges to perform undesirable activities.

Read more about CVE-2017-11882

Similarly, malware have been used to exploit the remote code execution vulnerability CVE-2017-0199 in Microsoft Office. Through an infected Office file, attackers got control of the system, modified system data and installed malicious programs.

Read more about CVE-2017-0199

CVE-2015-1641 is another vulnerability which allowed hacking into a system through a crafted Microsoft Office file. It’s nicknamed “Microsoft Office Memory Corruption Vulnerability”. And hackers have used RTF documents to benefit from the vulnerability.

Read more about CVE-2015-1641

A code injection vulnerability CVE-2017-8759 in the WSDL parser module has also been exploited to inject arbitrary code during the parsing of SOAP WSDL definition contents. Attackers used it to download and execute VB scripts containing PowerShell commands.

Read more about CVE-2017-8759

2. Microsoft Office 2003 to 2010 and Internet Explorer

Some ActiveX controls have allowed attackers to execute code using a fabricated website or Office document. This vulnerability is numbered CVE-2012-0158, and the malware called Dridex have been used to exploit it. Attackers distributed the malware through spam emails and persuaded users to open the attachments. These attachments varied from compressed files to documents like DOC or PDF. And those files contained links or macros to download the malware.

Read more about CVE-2012-0158

3. Microsoft Server Message Block 1.0 (SMBv1)

CVE-2017-0143 and CVE-2017-0144 are two remote code execution vulnerability which have been exploited in Microsoft Server Message Block 1.0 (SMBv1). Various versions of Windows OS, from Windows 7 to Windows 10, have been affected due to this vulnerability. Devices running Windows Server 2003 to Windows Server 2016 have also been affected. The WannaCry ransomware used this exploit worldwide to attack unpatched computers. It targeted the SMBv1 server to execute malicious code on the target server.

Read more about CVE-2017-0143

The, the remote code execution vulnerability CVE-2017-0144 was found in the way the SMBv1 server handled certain requests. The EternalBlue exploit kits have been used to send maliciously engineered message packets and execute the code to access the target server.

Read more about CVE-2017-0144

4. Adobe Flash Player

The hackers exploited the CVE-2018-4878 vulnerability in Adobe Flash Player to execute arbitrary code in the infected system. In most cases, malicious Flash embedded Microsoft Excel documents were distributed via wild in a massive Malspam campaign. And those cyber attackers lured users into opening the files or web pages with embedded Flash content. A malware called DOGCALL has been used to exploit that critical flaw in Adobe Flash Player prior to version 28.0.0.161.

Read more about CVE-2018-4878

5. Apache Struts 2

The Jakarta Multipart parser in Apache Struts 2 had a flaw in exception handling, known as the CVE-2017-5638 vulnerability. The incorrect exception handling and error-message system allowed hackers to execute commands during file-upload attempts.

Hackers have used the JexBoss tool to exploit such vulnerabilities. JexBoss automates all the phases of a cyber-attack, and upon successful execution, a hacker can take almost complete control of the affected web server.

The cybercriminals executed commands via crafted Content-Type, Content-Disposition, or Content-Length HTTP headers. And Apache Struts versions 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 have been affected because of the CVE-2017-5638 vulnerability.

Read more about CVE-2017-5638

6. Drupal

A remote code execution vulnerability CVE-2018-7600 within subsystems of Drupal 7.x and 8.x allowed an attacker to run commands on the affected Drupal installations.

The Kitty ransomware have been used to exploit this vulnerability. The aim had been to take over the affected Drupal website, and compromise the internal network and server.

Apart from compromising the web application, Kitty also targeted the visitors of the affected website and infected their operating system and the stored files.

Read more about CVE-2018-7600

7. Microsoft SharePoint 2006 to 2019

The CVE-2019-0604 vulnerability in Microsoft SharePoint applications resulted in failure to check the source mark-ups of application packages. And many attackers actively exploited this critical flaw by uploading specially crafted application packages to infected SharePoint installations.

Upon successful exploitation, the attackers could run arbitrary code. Read more about CVE-2019-0604

Part 2 – Most exploited software in 2020

1. Pulse Connect Secure and Pulse Policy Secure

Due to a critical flaw (CVE-2019-11510), a remote attacker could get a remote arbitrary file access on the Pulse Connect Secure and Pulse Policy Secure gateways.

REvil ransomware was used to take advantage of this network device vulnerability. It allowed unauthorized remote attacker with network access via HTTPS to send fabricated URI (Uniform Resource Identifier) to exploit the vulnerability.

The CVE-2019-11510 vulnerability affected a range of Pulse Connect Secure applications including versions 9.0R1 – 9.0R3.3, 8.3R1 – 8.3R7, 8.2R1 – 8.2R12 and 8.1R1 – 8.1R15. The affected Pulse Policy Secure applications were from versions 5.1 to 5.4 and 9.0

Read more about CVE-2019-11510

2. Citrix Application Delivery Controller and Gateway

A vulnerability CVE-2019-19781 in Citrix Application Delivery Controller (Citrix ADC) allowed cybercriminals to attack a device and execute code remotely.

One of the techniques used by attackers involved creating an XML file that uses directory traversal, and executing it through a Perl script. And the cybercriminals exploited the vulnerability by providing malicious content to such scripts.

The attackers, thus, gained access to information stored in the hacked devices. Various devices with Citrix ADC and Citrix Gateway version 10.5, 11.1, 12.0, 12.1 and 13.0 were attacked by exploiting the CVE-2019-19781 vulnerability. Citrix further mentioned that the vulnerability also affected Citrix SD-WAN. The Citrix SD-WAN WANOP edition has Citrix ADC as a load balancer, and targeted hacking attempts thus, affected it too.

Read more about CVE-2019-19781

6. Microsoft O365

In the wake of coronavirus crisis and global lockdown, many organizations started using Microsoft Office 365 and other cloud collaboration services. Cybersecurity and Infrastructure Security Agency (CISA) saw instances where the organizations ignored many security recommendations and preventive measures.

And the ignorance resulted in increased vulnerability to outsiders getting unauthorised access to the data stored in those cloud services.

Disabled Unified Audit Log and alerts and the absence of multi-factor authentication in admin accounts were among the security flaws observed by CISA. You can read more about it in AR19-133A:Microsoft Office 365 Security Observations report.

Conclusion

Software vulnerabilities can wreak havoc on the application, on the OS and on the device too. They can allow hackers to take control of data and disrupt any business.

That’s why Payatu insists on implementing stringent cybersecurity measures. You must be prepared to defend your business against any hacking attempts.

So, make sure you undertake regular comprehensive security assessment on all your critical business applications.

Subscribe to our Newsletter
Subscription Form
DOWNLOAD THE DATASHEET

Fill in your details and get your copy of the datasheet in few seconds

CTI Report
DOWNLOAD THE EBOOK

Fill in your details and get your copy of the ebook in your inbox

Ebook Download
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download ICS Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Cloud Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download IoT Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Code Review Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Red Team Assessment Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download AI/ML Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download DevSecOps Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Product Security Assessment Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Mobile Sample Report
DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Web App Sample Report

Let’s make cyberspace secure together!

Requirements

Connect Now Form

What our clients are saying!

Trusted by