{"id":18890,"date":"2021-07-28T21:48:08","date_gmt":"2021-07-28T21:48:08","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=18890"},"modified":"2021-07-28T23:36:33","modified_gmt":"2021-07-28T23:36:33","slug":"fbi-cisa-most-exploited-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/fbi-cisa-most-exploited-vulnerabilities\/","title":{"rendered":"FBI, CISA Reveal Most Exploited Vulnerabilities"},"content":{"rendered":"<p>The FBI and the U.S. Cybersecurity and Infrastructure Security Agency (CISA) joined counterparts in the UK and Australia today to announce the top 30 vulnerabilities exploited since the start of the pandemic.<\/p>\n<p>The list, a joint effort with the Australian Cyber Security Centre (ACSC) and the UK&#8217;s National Cyber Security Centre (NCSC), details vulnerabilities \u2013 primarily Common Vulnerabilities and Exposures (CVEs) \u2013 &#8220;routinely exploited by malicious cyber actors in 2020 and those being widely exploited thus far in 2021.&#8221;<\/p>\n<p>Many of the vulnerabilities are known ones for which patches exist, so they can typically be easily fixed. The agencies also recommended a centralized <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\">patch management system<\/a> to prevent such oversights going forward.<\/p>\n<p>Most of the vulnerabilities targeted in 2020 were disclosed during the last two years. &#8220;Cyber actor exploitation of more recently disclosed software flaws in 2020 probably stems, in part, from the expansion of remote work options amid the COVID-19 pandemic,&#8221; said a <a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/aa21-209a\" target=\"_blank\" rel=\"noopener\">CISA statement<\/a>. &#8220;The rapid shift and increased use of remote work options, such as <a href=\"https:\/\/www.esecurityplanet.com\/products\/enterprise-vpn-solutions\/\">virtual private networks (VPNs)<\/a> and cloud-based environments, likely placed additional burden on cyber defenders struggling to maintain and keep pace with routine software patching.&#8221;<\/p>\n<p>The widespread reliance on VPNs during the pandemic has led to calls for greater adoption of <a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\">zero trust principles<\/a> by governments and others. Zero trust has also been a cornerstone of the Biden Administration&#8217;s response to the <a href=\"https:\/\/www.esecurityplanet.com\/networks\/cisa-fbi-colonial-pipeline-ransomware\/\">Colonial Pipeline ransomware attack<\/a>.<\/p>\n<p>The Administration&#8217;s latest effort to protect critical infrastructure was also announced today. The <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2021\/07\/28\/national-security-memorandum-on-improving-cybersecurity-for-critical-infrastructure-control-systems\/\" target=\"_blank\" rel=\"noopener\">Industrial Control Systems Cybersecurity Initiative<\/a> is a voluntary, collaborative effort between the federal government and the critical infrastructure community to encourage and help with &#8220;deployment of technologies and systems that provide threat visibility, indications, detection, and warnings, and that facilitate response capabilities for cybersecurity in essential control system and operational technology networks.&#8221;<\/p>\n<h2>Biden Warns Cyber Attacks Could Lead to War<\/h2>\n<p>The announcements come the day after President Biden warned that cyber incidents could lead to a war.<\/p>\n<p>&#8220;You know, we&#8217;ve seen how cyber threats, including ransomware attacks, increasingly are able to cause damage and disruption to the real world,&#8221; Biden said in <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/speeches-remarks\/2021\/07\/27\/remarks-by-president-biden-at-the-office-of-the-director-of-national-intelligence\/\" target=\"_blank\" rel=\"noopener\">remarks at the National Counterterrorism Center<\/a>.\u00a0 &#8220;I can&#8217;t guarantee this, and you&#8217;re as informed as I am, but I think it&#8217;s more likely we&#8217;re going to end up \u2014 well, if we end up in a war, a real shooting war with a major power, it&#8217;s going to be as a consequence of a cyber breach of great consequence. \u00a0And it&#8217;s increasing exponentially \u2014 the capabilities.&#8221;<\/p>\n<h2>The Most Exploited Vulnerabilities<\/h2>\n<p>Here are the 12 most exploited vulnerabilities announced today. The announcement follows MITRE&#8217;s recently released list of the <a href=\"https:\/\/cwe.mitre.org\/top25\/archive\/2021\/2021_cwe_top25.html\" target=\"_blank\" rel=\"noopener\">25 most dangerous software weaknesses<\/a>.<\/p>\n<div align=\"left\">\n<table>\n<colgroup>\n<col style=\"width: 159px;\" \/>\n<col style=\"width: 261px;\" \/>\n<col style=\"width: 204px;\" \/><\/colgroup>\n<tbody>\n<tr style=\"height: 14.25pt;\">\n<td><strong>Vendor<\/strong><\/td>\n<td><strong>CVE<\/strong><\/td>\n<td><strong>Type<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 18pt;\">\n<td>Citrix<\/td>\n<td>CVE-2019-19781<\/td>\n<td>arbitrary code execution<\/td>\n<\/tr>\n<tr style=\"height: 18pt;\">\n<td>Pulse<\/td>\n<td>CVE 2019-11510<\/td>\n<td>arbitrary file reading<\/td>\n<\/tr>\n<tr style=\"height: 18pt;\">\n<td>Fortinet<\/td>\n<td>CVE 2018-13379<\/td>\n<td>path traversal<\/td>\n<\/tr>\n<tr style=\"height: 18pt;\">\n<td>F5- Big IP<\/td>\n<td>CVE 2020-5902<\/td>\n<td>remote code execution (RCE)<\/td>\n<\/tr>\n<tr style=\"height: 18pt;\">\n<td>MobileIron<\/td>\n<td>CVE 2020-15505<\/td>\n<td>RCE<\/td>\n<\/tr>\n<tr style=\"height: 18pt;\">\n<td>Microsoft<\/td>\n<td>CVE-2017-11882<\/td>\n<td>RCE<\/td>\n<\/tr>\n<tr style=\"height: 18pt;\">\n<td>Atlassian<\/td>\n<td>CVE-2019-11580<\/td>\n<td>RCE<\/td>\n<\/tr>\n<tr style=\"height: 18pt;\">\n<td>Drupal<\/td>\n<td>CVE-2018-7600<\/td>\n<td>RCE<\/td>\n<\/tr>\n<tr style=\"height: 18pt;\">\n<td>Telerik<\/td>\n<td>CVE 2019-18935<\/td>\n<td>RCE<\/td>\n<\/tr>\n<tr style=\"height: 18pt;\">\n<td>Microsoft<\/td>\n<td>CVE-2019-0604<\/td>\n<td>RCE<\/td>\n<\/tr>\n<tr style=\"height: 18pt;\">\n<td>Microsoft<\/td>\n<td>CVE-2020-0787<\/td>\n<td>elevation of privilege<\/td>\n<\/tr>\n<tr style=\"height: 18pt;\">\n<td>Netlogon<\/td>\n<td>CVE-2020-1472<\/td>\n<td>elevation of privilege<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>The agencies also urged organizations to prioritize these additional fixes:<\/p>\n<ul>\n<li><strong>Microsoft Exchange: <\/strong>CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065<\/li>\n<li><strong>Pulse Secure:<\/strong> CVE-2021-22893, CVE-2021-22894, CVE-2021-22899, and CVE-2021-22900<\/li>\n<li><strong>Accellion:<\/strong> CVE-2021-27101, CVE-2021-27102, CVE-2021-27103, CVE-2021-27104<\/li>\n<li><strong>VMware:<\/strong> CVE-2021-21985<\/li>\n<li><strong>Fortinet:<\/strong> CVE-2018-13379, CVE-2020-12812, and CVE-2019-5591<\/li>\n<\/ul>\n<p>Further reading: <a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\">Top Vulnerability Management Tools<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6d393de89c-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6d393de89c\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6d393de89c\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6d393de89c\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6d393de89c\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6d393de89c\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6d393de89c\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The FBI and the U.S. Cybersecurity and Infrastructure Security Agency (CISA) joined counterparts in the UK and Australia today to announce the top 30 vulnerabilities exploited since the start of the pandemic. The list, a joint effort with the Australian Cyber Security Centre (ACSC) and the UK&#8217;s National Cyber Security Centre (NCSC), details vulnerabilities \u2013 [&hellip;]<\/p>\n","protected":false},"author":163,"featured_media":18891,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[10990,3790],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[379],"class_list":["post-18890","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-critical-vulnerabilities","tag-cybersecurity","b2b_audience-awareness-and-consideration","b2b_product-threats-and-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>FBI, CISA Reveal Most Exploited Vulnerabilities | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Vulnerabilities affecting systems from well known vendors like Citrix, Fortinet, Microsoft, VMware and Atlassian are being exploited.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/fbi-cisa-most-exploited-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"FBI, CISA Reveal Most Exploited Vulnerabilities | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Vulnerabilities affecting systems from well known vendors like Citrix, Fortinet, Microsoft, VMware and Atlassian are being exploited.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/fbi-cisa-most-exploited-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-28T21:48:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-28T23:36:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Security-06-1088x725-2.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1088\" \/>\n\t<meta property=\"og:image:height\" content=\"725\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Paul Shread\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Paul Shread\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fbi-cisa-most-exploited-vulnerabilities\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fbi-cisa-most-exploited-vulnerabilities\/\"},\"author\":{\"name\":\"Paul Shread\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04\"},\"headline\":\"FBI, CISA Reveal Most Exploited Vulnerabilities\",\"datePublished\":\"2021-07-28T21:48:08+00:00\",\"dateModified\":\"2021-07-28T23:36:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fbi-cisa-most-exploited-vulnerabilities\/\"},\"wordCount\":572,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fbi-cisa-most-exploited-vulnerabilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Security-06-1088x725-2.jpeg\",\"keywords\":[\"critical vulnerabilities\",\"cybersecurity\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fbi-cisa-most-exploited-vulnerabilities\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/fbi-cisa-most-exploited-vulnerabilities\/\",\"name\":\"FBI, CISA Reveal Most Exploited Vulnerabilities | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fbi-cisa-most-exploited-vulnerabilities\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fbi-cisa-most-exploited-vulnerabilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Security-06-1088x725-2.jpeg\",\"datePublished\":\"2021-07-28T21:48:08+00:00\",\"dateModified\":\"2021-07-28T23:36:33+00:00\",\"description\":\"Vulnerabilities affecting systems from well known vendors like Citrix, Fortinet, Microsoft, VMware and Atlassian are being exploited.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fbi-cisa-most-exploited-vulnerabilities\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/fbi-cisa-most-exploited-vulnerabilities\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fbi-cisa-most-exploited-vulnerabilities\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Security-06-1088x725-2.jpeg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Security-06-1088x725-2.jpeg\",\"width\":1088,\"height\":725,\"caption\":\"cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/fbi-cisa-most-exploited-vulnerabilities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"FBI, CISA Reveal Most Exploited Vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04\",\"name\":\"Paul Shread\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg\",\"caption\":\"Paul Shread\"},\"description\":\"Former eSecurityPlanet Editor Paul Shread has covered nearly every aspect of enterprise technology in his 20+ years in IT journalism, including award-winning articles on endpoint security and virtual data centers. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds market analyst and cybersecurity certifications. In a previous life he worked for daily newspapers, including the Baltimore Sun, and spent 7 years covering the federal government. Al Haig once compared him to Bob Woodward (true story - just ask Google).\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/paul-shread-2\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"FBI, CISA Reveal Most Exploited Vulnerabilities | eSecurity Planet","description":"Vulnerabilities affecting systems from well known vendors like Citrix, Fortinet, Microsoft, VMware and Atlassian are being exploited.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/fbi-cisa-most-exploited-vulnerabilities\/","og_locale":"en_US","og_type":"article","og_title":"FBI, CISA Reveal Most Exploited Vulnerabilities | eSecurity Planet","og_description":"Vulnerabilities affecting systems from well known vendors like Citrix, Fortinet, Microsoft, VMware and Atlassian are being exploited.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/fbi-cisa-most-exploited-vulnerabilities\/","og_site_name":"eSecurity Planet","article_published_time":"2021-07-28T21:48:08+00:00","article_modified_time":"2021-07-28T23:36:33+00:00","og_image":[{"width":1088,"height":725,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Security-06-1088x725-2.jpeg","type":"image\/jpeg"}],"author":"Paul Shread","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Paul Shread","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/fbi-cisa-most-exploited-vulnerabilities\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/fbi-cisa-most-exploited-vulnerabilities\/"},"author":{"name":"Paul Shread","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04"},"headline":"FBI, CISA Reveal Most Exploited Vulnerabilities","datePublished":"2021-07-28T21:48:08+00:00","dateModified":"2021-07-28T23:36:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/fbi-cisa-most-exploited-vulnerabilities\/"},"wordCount":572,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/fbi-cisa-most-exploited-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Security-06-1088x725-2.jpeg","keywords":["critical vulnerabilities","cybersecurity"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/fbi-cisa-most-exploited-vulnerabilities\/","url":"https:\/\/www.esecurityplanet.com\/threats\/fbi-cisa-most-exploited-vulnerabilities\/","name":"FBI, CISA Reveal Most Exploited Vulnerabilities | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/fbi-cisa-most-exploited-vulnerabilities\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/fbi-cisa-most-exploited-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Security-06-1088x725-2.jpeg","datePublished":"2021-07-28T21:48:08+00:00","dateModified":"2021-07-28T23:36:33+00:00","description":"Vulnerabilities affecting systems from well known vendors like Citrix, Fortinet, Microsoft, VMware and Atlassian are being exploited.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/fbi-cisa-most-exploited-vulnerabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/fbi-cisa-most-exploited-vulnerabilities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/fbi-cisa-most-exploited-vulnerabilities\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Security-06-1088x725-2.jpeg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Security-06-1088x725-2.jpeg","width":1088,"height":725,"caption":"cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/fbi-cisa-most-exploited-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"FBI, CISA Reveal Most Exploited Vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04","name":"Paul Shread","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg","caption":"Paul Shread"},"description":"Former eSecurityPlanet Editor Paul Shread has covered nearly every aspect of enterprise technology in his 20+ years in IT journalism, including award-winning articles on endpoint security and virtual data centers. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds market analyst and cybersecurity certifications. In a previous life he worked for daily newspapers, including the Baltimore Sun, and spent 7 years covering the federal government. Al Haig once compared him to Bob Woodward (true story - just ask Google).","url":"https:\/\/www.esecurityplanet.com\/author\/paul-shread-2\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18890"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/163"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=18890"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18890\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/18891"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=18890"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=18890"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=18890"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=18890"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=18890"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=18890"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}