CSA Provides Common Vulnerability Exploited by China State-Sponsored Hackers – A Complete List

The CISA has recently published a joint CSA with the NSA and the FBI about the top CVEs that are exploited by the threat actors since 2020 and the threat actors are Chinese state-sponsored.

Chinese cyber threat actors are still exploiting known vulnerabilities of US and allied networks for the purpose of stealing intellectual property from tech companies.

CSA’s mission is to inform all the agencies under federal and state governments about these CVEs. Primarily focusing on the individuals and organizations that are involved in critical infrastructure.

CVEs used by Chinese state-sponsored cyber actors

PRC state-sponsored cyber activities are being assessed by the NSA, CISA, and FBI. Among the most significant and dynamic threats to the U.S. government and civilian infrastructure are state-sponsored actors with ties to the PRC.

EHA

Here below we have mentioned all the CVEs that are most used by the Chinese state-sponsored threat actors since 2020:-

In order to gain access to web-facing applications, state-sponsored threat actors continue to use VPNs as a means of obscuring their activities.

It should be noted that a number of the CVEs listed above allow for unauthorized access to sensitive networks to be gained by the actors in a stealthy manner.

Mitigations

Organizations are encouraged by the NSA, CISA, and FBI to apply these recommendations mentioned below as soon as possible:-

  • Ensure that your systems are up to date and patched.
  • In conjunction with other exploited vulnerabilities within the CSA, patches should be prioritized in order to address these vulnerabilities.
  • Multifactor authentication should be used whenever possible in order to avoid phishing attacks.
  • Ensure that your passwords are strong and unique at all times.
  • At the network edge, block obsolete or unused protocols in order to safeguard the network. 
  • Make sure that your end-of-life equipment is upgraded or replaced as soon as possible.
  • Make a move toward a security model based on Zero Trust. 
  • Monitor the log files of Internet-facing systems for anomalous activity and enable robust logging of those systems.

Cyber Attack with Zero Trust Networking – Download Free E-Book

BALAJI is a Former Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.