(May 15, 2020) – The Cybersecurity and Infrastructure Security Agency, the Federal Bureau of Investigation, and the broader U.S. Government are providing technical guidance to advise IT security professionals at public and private sector organizations to place an increased priority on patching the most commonly known vulnerabilities exploited by sophisticated foreign cyber actors.
This alert provides details on vulnerabilities routinely exploited by foreign cyber actors—primarily Common Vulnerabilities and Exposures to help organizations reduce the risk of these foreign threats. Foreign cyber actors continue to exploit publicly known—and often dated—software vulnerabilities against broad target sets, including public and private sector organizations. Exploitation of these vulnerabilities often requires fewer resources as compared with zero-day exploits for which no patches are available.
The public and private sectors could help to alleviate some foreign cyber threats to U.S. interests through an increased effort to patch their systems and implement programs to keep system patching up to date. A concerted campaign to patch these vulnerabilities would introduce friction into foreign adversaries' operational tradecraft and force them to develop or acquire exploits that are more costly and less widely effective. A concerted patching campaign also would bolster network security by focusing scarce defensive resources on the observed activities of foreign adversaries.
Visit the U.S. Department of Homeland Security's website for Malware Initial Finding Reports and Malware Analysis reports associated with the CVEs in this alert.