CISA, NSA, & FBI Release List of 15 Most Exploited Vulnerabilities in 2023

The Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and Federal Bureau of Investigation (FBI) have jointly released a critical cybersecurity advisory detailing the 15 most routinely exploited vulnerabilities in 2023.

This collaborative effort, which also involved cybersecurity agencies from Australia, Canada, New Zealand, and the United Kingdom, aims to alert organizations to the most pressing cyber threats and provide guidance on mitigating these risks.

The advisory reveals a concerning trend: malicious actors exploited more zero-day vulnerabilities to compromise enterprise networks in 2023 compared to the previous year. This shift allowed cybercriminals to conduct operations against high-priority targets with increased effectiveness.

Google News

Topping the list is CVE-2023-3519, a vulnerability affecting Citrix NetScaler ADC and NetScaler Gateway. This flaw allows unauthenticated users to cause a stack buffer overflow, potentially leading to remote code execution.

Free Ultimate Continuous Security Monitoring Guide - Download Here (PDF)

Other critical vulnerabilities include CVE-2023-4966 (also affecting Citrix products), CVE-2023-20198 and CVE-2023-20273 (both impacting Cisco IOS XE), and CVE-2023-27997 (affecting Fortinet FortiOS and FortiProxy SSL-VPN).

The list also includes the infamous Log4Shell vulnerability (CVE-2021-44228), which continues to be exploited despite being disclosed in December 2021. This underscores the persistence of certain vulnerabilities and the importance of timely patching.

Here’s a table summarizing the 15 critical vulnerabilities most routinely exploited in 2023, based on the information provided in the advisory:

CVEVendorProduct(s)Vulnerability Type
CVE-2023-3519CitrixNetScaler ADC, NetScaler GatewayCode Injection
CVE-2023-4966CitrixNetScaler ADC, NetScaler GatewayBuffer Overflow
CVE-2023-20198CiscoIOS XE Web UIPrivilege Escalation
CVE-2023-20273CiscoIOS XEWeb UI Command Injection
CVE-2023-27997FortinetFortiOS, FortiProxy SSL-VPNHeap-Based Buffer Overflow
CVE-2023-34362ProgressMOVEit TransferSQL Injection
CVE-2023-22515AtlassianConfluence Data Center and ServerBroken Access Control
CVE-2021-44228 (Log4Shell)ApacheLog4j2Remote Code Execution (RCE)
CVE-2023-2868Barracuda NetworksESG ApplianceImproper Input Validation
CVE-2022-47966ZohoManageEngine Multiple ProductsRemote Code Execution
CVE-2023-27350PaperCutMF/NGImproper Access Control
CVE-2020-1472MicrosoftNetlogonPrivilege Escalation
CVE-2023-42793JetBrainsTeamCityAuthentication Bypass
CVE-2023-23397MicrosoftOffice OutlookPrivilege Escalation
CVE-2023-49103ownCloudgraphapiInformation Disclosure

The agencies strongly urge vendors, developers, and end-user organizations to implement a range of mitigations. For software creators, recommendations include adopting secure-by-design principles, implementing robust testing environments, and establishing coordinated vulnerability disclosure programs.

End-user organizations are advised to apply timely patches, implement centralized patch management systems, and utilize advanced security tools such as endpoint detection and response (EDR) solutions.

CISA Director Jen Easterly emphasized the critical nature of this advisory, stating, “This joint effort highlights the global nature of cyber threats and the need for international cooperation in cybersecurity. We urge all organizations to review this advisory and take immediate action to secure their systems.”

The advisory also provides detailed technical information on each vulnerability, including the affected products, vulnerability types, and associated Common Weakness Enumerations (CWEs).

This comprehensive approach aims to equip cybersecurity professionals with the knowledge needed to prioritize their defense strategies effectively.

As cyber threats continue to evolve, this collaborative advisory serves as a crucial resource for organizations worldwide. By focusing on these top exploited vulnerabilities, businesses, and government entities can better allocate their cybersecurity resources and strengthen their overall security posture against the most pressing digital threats of 2023.

Run private, Real-time Malware Analysis in both Windows & Linux VMs. Get a 14-day free trial with ANY.RUN!

Guru Baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.