Joint Advisory Lists Top Routinely Exploited Vulnerabilities

Robinson+Cole Data Privacy + Security Insider
Contact

On November 12, 2024, the Cybersecurity and Infrastructure Security Agency, the Federal Bureau of Investigation, and the National Security Agency, along with its security partners in Australia, Canada, New Zealand, and the United Kingdom, issued the cybersecurity advisory “2023 Top Routinely Exploited Vulnerabilities,” outlining top vulnerabilities impacting companies across the free world.

The advisory states that threat actors “exploited more zero-day vulnerabilities to compromise enterprise networks in 2023 compared to 2022, allowing them to conduct operations against high priority targets.”

The advisory “strongly encourage[s] vendors, designers, developers, and end-user organizations to implement the following recommendations, and those found within the Mitigations section of this advisory, to reduce the risk of compromise by malicious cyber actors.”

Some high-level tips include:

  • Vendors, designers, and developers. Implement secure by design and default principles and tactics to reduce the prevalence of vulnerabilities in your software.

> Follow the SP 800-218 Secure Software Development Framework (SSDF) and implement secure by design practices into each stage of the software development life cycle (SDLC). Establish a coordinated vulnerability disclosure program that includes processes to determine root causes of discovered vulnerabilities.

> Prioritize secure by default configurations, such as eliminating default passwords and not requiring additional configuration changes to enhance product security.

> Ensure that published CVEs include the proper CWE field, identifying the root cause of the vulnerability.

  • End-user organizations:

> Apply timely patches to systems.
Note: If CVEs identified in this advisory have not been patched, check for signs of compromise before patching.

> Implement a centralized patch management system.

> Use security tools such as endpoint detection and response (EDR), web application firewalls, and network protocol analyzers.

> Ask your software providers to discuss their secure by design program, provide links to information about how they are working to remove classes of vulnerabilities, and to set secure default settings.

The Advisory provides additional resources on technical findings and a list of the top exploited vulnerabilities. IT professionals may wish to consider this guidance and follow its recommendations.

[View source.]

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations. Attorney Advertising.

© Robinson+Cole Data Privacy + Security Insider

Written by:

Robinson+Cole Data Privacy + Security Insider
Contact
more
less

PUBLISH YOUR CONTENT ON JD SUPRA NOW

  • Increased visibility
  • Actionable analytics
  • Ongoing guidance

Robinson+Cole Data Privacy + Security Insider on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide