The year 2022 was a very eventful year from a cybersecurity perspective. It began with an assault of ravaging attacks from all fronts by the Conti ransomware group, followed by numerous attacks worldwide by threat actors targeting institutions across all sectors—from healthcare to storage. We noticed that cyber attacks played a more significant role in 2022, setting the stage for the ongoing Russia-Ukraine war. DDoS attacks became ubiquitous and cyber insurance budgets escalated.

Looking back at the year that was, Secuin experts have put together a list of the top vulnerabilities that trended on the surface web and were sought out by attackers. We have made an in-depth analysis of why these vulnerabilities are serious and why they trended. 

Top 10 Google Trend CVEs

Here are the top 10 trending CVEs of 2022, based on the number of times these vulnerabilities topped the search charts.

CVE

Affected Platform

Trending Index1

In CISA KEV?

CVE-2016-4117

Adobe Flash Player

100

Yes

CVE-2020-10749

Multiple vendor products

100

No

CVE-2020-5953

Insyde (InsydeH2O), Siemens firmware versions

100

No

CVE-2021-42785

TightVNC (TightVNC) 

100

No

CVE-2009-1151

phpMyAdmin (phpMyAdmin)

100

Yes

CVE-2014-3523

Apache HTTP Server

100

No

CVE-2017-11825

Microsoft Office

100

No

CVE-2017-7659

Apache HTTP Server

100

No

CVE-2018-20783

PHP (PHP), openSUSE (Leap)

100

No

CVE-2020-7598

Substack (Minimist), openSUSE (Leap)

100

No

1Trending Index (ranging from 1 to 100, where 100 is the maximum search interest) is the relative popularity of the vulnerability during the time period for which the trend is being measured. 

Our analysis of the top trending vulnerabilities presents the following interesting observations:

  • 2 CVEs have ransomware and APT group associations.

  • 2 CVEs are marked as heavily exploited by CISA.

  • 1 CVE has both RCE and PE exploits.

  • 1 CVE has a pentester framework available.

  • 6 CVEs are old vulnerabilities belonging to 2019 and earlier.

  • There are 2 critical and 2 medium-severity vulnerabilities on the list by CVSS rating, the rest being high.

Of the lot, below are our top callouts.

  • CVE-2016-4117 in Adobe Flash Player is associated with four ransomware groups (CryptXXX, Mole, Cerber, and Cyborg) and six APT groups (BlackOasis, Cobalt Group,  APT29, Kimsuky, PROMETHIUM, and Lazarus Group). APT29 (Nobelium/Cozy Bear), Kimsuky, and the Lazarus Group have been some of the most destructive groups of 2022, making this vulnerability highly dangerous.

  • CVE-2009-1151 in phpMyAdmin is targeted by two APT groups – Sea Turtle and Emennet Pasargad and affects over 41 products. This vulnerability is capable of being exploited for remote code execution, privilege escalation, and compromising web applications, compounding its impact. The vulnerability also has a pentester framework available, simplifying the installation, packaging, and application in pentesting engagements, an exemplification of the advanced capabilities that this vulnerability offers to attackers.

Both these vulnerabilities rightly feature on the CISA KEV catalog—a warning for organizations that they are heavily exploited vulnerabilities and likely to be targeted repeatedly by attackers. 

A Risk Perspective

  • Our Vulnerability Intelligence platform, Securin VI, gives CVE-2009-1151 a critical Definitive-VRS (D-VRS)2 rating of 9.72 as it has many APT group associations and a large number of public exploit codes available, among other factors. 

  • CVE-2016-4117 receives a high D-VRS2 rating on the Securin VI platform.

  • Of the 10 vulnerabilities trending on Google in 2022, three of them—CVE-2009-1151, CVE-2016-4117, and CVE-2021-42785— have maximum P-VRS3 scores of 38.46 indicating that hackers are scouting for exposed instances of these vulnerabilities.

2Definitive-VRS or D-VRS is the Vulnerability Risk Score (VRS) ranging from 0 to 10 assigned to every vulnerability based on its CVE attributes, CVSS rating, ransomware, and APT associations, exploit code availability, past exploitation, and trending factors.

3Predictive-VRS or P-VRS is a predictive indicator for the likelihood of exploitability of every vulnerability. Ranging from 1 to 38.4615, P-VRS considers factors such as CVE chatter on the deep and dark web, vulnerability interest in hacker forums, exploitation in the wild, and mentions in the news and social media to provide early warnings to organizations about vulnerabilities that pose a threat.

Other Noteworthy Trending Vulnerabilities

Although not part of the top 10 trending vulnerabilities on Google, we call out few noteworthy vulnerabilities that trended in 2022.

Vulnerability

Affected Platform

CVSS

D-VRS

P-VRS

Exploitation in the Wild

In CISA KEV?

CVE-2016-5734

phpMyAdmin

Critical

Critical

Critical

True

No

CVE-2012-3152

Oracle (Fusion Middleware)

Medium

Critical

Critical

True

Yes

CVE-2021-0920

Google (Android), Debian (Linux)

Medium

Medium

Critical

True

Yes

CVE-2020-14578

Multiple vendor products

Medium

Medium

Critical

True

No

The above list of vulnerabilities makes for a compelling study. The CVEs flagged are all of diverse complexities ranging from those already in the CISA KEV catalog, ones with maximum D-VRS/P-VRS scores, to those exploited in the wild. All these factors contribute to a vulnerability being a ‘risk’ to an organization and highlights the importance of a wholesome risk analysis.

Special Callouts:

  • CVE-2016-5734 ( phpMyAdmin) is a code injection vulnerability that results from improper control of code generation. The CVE has exploit codes that can be used for remote code execution, privilege escalation, or web app exploitation, making it a highly sought-out vulnerability by attackers with malicious intent.

  • CVE-2012-3152 (Oracle Fusion Middleware) is a 2012 vulnerability that only has a CVSS V2 score. However, it has five exploit codes available in the public domain, which can be used to remotely execute custom code and exploit web applications as well. The vulnerability has previously been exploited by the Volatile Cedar APT group and thus, Securin VRS rates it as being of critical severity.

A 360-degree analysis of vulnerabilities is important to understand which vulnerabilities could pose a threat to an enterprise at any given point in time and cannot be decided as a function of any one parameter alone.

Top 10 Popular CVEs of 2022

We also observed some vulnerabilities were pet favorites of threat actors and repeatedly kept popping on and off our threat actor radar in the past year. While these do not make the top 10 cut purely based on trending counts, these vulnerabilities fall under the high/critical bracket on Securin VI and are ones organizations must be wary of.

Below, we present the top 10 popular vulnerabilities, which have been called out by Securin multiple times in blogs and reports. All ten are in the CISA KEV catalog, and have maxed out on their P-VRS scores—a sign that there continues to be a lot of interest in these vulnerabilities from malicious actors.

Only the Fortinet FortiOS vulnerability (CVE-2018-13379) has no remote code execution nor privilege escalation capabilities by itself—although it has a heavy exposure count and multiple threat associations. The other nine have critical D-VRS severity ratings, highlighting the possible impact these vulnerabilities could have if exploited. 

Vulnerability Name

CVE Identifier

Exploit Type4

D-VRS

P-VRS

Affected Platform

Ransomware Associations

APT Group Associations

CISA KEV?

ProxyShell

CVE-2021-34473

CVE-2021-34523

CVE-2021-31207

RCE, PE, WebApp

Critical

Critical

Microsoft Exchange Server

12+ 

7+ 

Yes

Log4Shell

CVE-2021-44228

RCE, DoS, WebApp

Critical

Critical

Multiple vendor-products

10 

Yes

ProxyLogon

CVE-2021-26855

RCE, PE, WebApp

Critical

Critical

Microsoft Exchange Server

15

Yes

Fortinet FortiOS

CVE-2018-13379

WebApp

High

Critical

Fortinet FortiOS

7

10

Yes

Equation Editor RCE

CVE-2017-11882

RCE, WebApp

Critical

Critical

Microsoft Office

8

23

Yes

Zerologon

CVE-2020-1472

PE, DoS, WebApp

Critical

Critical

Multiple vendor-products

9

8

Yes

Follina

CVE-2022-30190

RCE, WebApp

Critical

Critical

Microsoft Windows and Server versions

1

5

Yes

Office/Word RCE

CVE-2017-0199

RCE, WebApp

Critical

Critical

Microsoft Office, Windows and Server versions

5

17

Yes

Print Nightmare

CVE-2021-34527

RCE, DoS

Critical

Critical

Microsoft Windows and Server versions

5

2

Yes

4Exploit Type refers to the different types of exploits associated with these vulnerabilities, as described below:

  • RCE: Remote Code Execution

  • PE: Privilege Escalation

  • DoS: Denial of Service

  • WebApp : Exploitation of Web Applications

Interestingly, on mapping these vulnerabilities to their MITRE ATT&CK Techniques, Tactics, and Procedures, we observed that all of them can be exploited for gaining initial access into vulnerable networks or allow for execution of custom code. 

  • ProxyShell, Log4Shell, ProxyLogon, Fortinet, and PrintNightmare vulnerabilities can be mapped to initial access via exploitation of public-facing applications or external remote services.

  • The ZeroLogon can be exploited for code execution and privilege escalation.

  • The Follina, Office RCE, and Equation RCE vulnerabilities allow for initial access via spearphishing using malicious files and allow for exploitation for code execution.

It is worthy to note that all the above vulnerabilities are present in popular products and are regularly used in personal and organizational tech stacks. As instances of these vulnerabilities being open to the Internet are extremely high, they provide easy entry points to adversaries, if they are not addressed thoroughly. 

Share This Post On