US National Security Agency released a list detailing the 25 vulnerabilities most commonly exploited by “government” hacker groups in China.
All these vulnerabilities are well known and patches have been released for them long ago. Alas, not all users and companies update their software on time, and exploits are also freely available for these bugs.
The NSA notes that many of these problems are exploited not only by Chinese hackers, but are part of the arsenal of ransomware operators, smaller hack groups, and other “government” hackers, including those from Russia and Iran.
“Most of the vulnerabilities listed below can be exploited to gain initial access to victim networks using products that are directly accessible from the Internet and act as gateways to internal networks,” - NSA
Few exploits listed in the Document
- [Login to see the link] : Traffic Management User Interface (TMUI) on proxy servers and F5 BIG-IP load balancers is vulnerable to an RCE bug that allows remote execution of arbitrary code and complete compromise of the device.
- [Login to see the link] , [Login to see the link] , [Login to see the link] : another set of bugs in gateways and Citrix ADCs. These problems are also dangerous for SDWAN WAN-OP. Vulnerabilities allow unauthenticated access to certain URL endpoints and lead to information disclosure of low privileged users.
- [Login to see the link] : An RCE vulnerability in MobileIron MDM that allows remote attackers to execute arbitrary code and take over remote servers.
- [Login to see the link] (aka SIGRed): RCE vulnerability on Windows Domain Name System servers, which boils down to the fact that they cannot properly process requests.
- [Login to see the link] : A vulnerability found in the Cisco IOS XR Software implementation of the Cisco Discovery Protocol allows an unauthenticated, nearby attacker to execute arbitrary code or force a reboot of a vulnerable device.
- [Login to see the link] : DrayTek Vigor devices allow remote code execution as root (without authentication) using shell metacharacters.
You can read more in the following Document Released by [Login to see the link]
[Login to see the link]