{"id":21775,"date":"2022-04-28T21:12:31","date_gmt":"2022-04-28T21:12:31","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=21775"},"modified":"2022-04-28T21:12:31","modified_gmt":"2022-04-28T21:12:31","slug":"top-exploited-vulnerabilities-2021","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/top-exploited-vulnerabilities-2021\/","title":{"rendered":"Cybersecurity Agencies Reveal the Top Exploited Vulnerabilities of 2021"},"content":{"rendered":"<p>U.S. cybersecurity agencies joined their counterparts around the globe to urge organizations to address the <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-117a\" target=\"_blank\" rel=\"noopener\">top 15 vulnerabilities<\/a> exploited in 2021.<\/p>\n<p>Topping the list were the <a href=\"https:\/\/www.esecurityplanet.com\/threats\/nation-state-ransomware-groups-apache-log4j\/\">Log4Shell vulnerability<\/a> and Microsoft bugs <a href=\"https:\/\/www.esecurityplanet.com\/threats\/microsoft-issues-proxyshell-advisory-after-attacks-begin\/\">ProxyShell<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/threats\/chinese-attackers-use-new-rootkit-against-windows-10\/\">ProxyLogon<\/a>. Microsoft occupied more than half the list, with Exchange Server accounting for eight of the vulnerabilities. VMware, Atlassian, Pulse Secure and Fortinet rounded out the list.<\/p>\n<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA), NSA and FBI joined their &#8220;Five Eyes&#8221; counterparts in issuing the alert: the Australian Cyber Security Centre (ACSC), the Canadian Centre for Cyber Security (CCCS), the New Zealand National Cyber Security Centre (NZ NCSC), and the UK\u2019s National Cyber Security Centre (NCSC UK).<\/p>\n<p>The advisory entails the top 15 Common Vulnerabilities and Exposures (CVEs) that were routinely exploited by malicious cyber actors in 2021, plus another 21 frequently exploited CVEs. The cybersecurity authorities urged organizations to immediately apply timely patches to their systems and implement a centralized patch management system in order to reduce their attack surface.<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\">Best Patch Management Software &amp; Tools<\/a><\/p>\n<h2>Web-Facing Systems at Risk<\/h2>\n<p>Malicious actors tend to focus on internet-facing systems to gain entry into a network, such as email and <a href=\"https:\/\/www.esecurityplanet.com\/products\/enterprise-vpn-solutions\/\">virtual private network (VPN)<\/a> servers, using exploits targeting <a href=\"https:\/\/www.esecurityplanet.com\/threats\/zero-day-threat\/\">newly disclosed vulnerabilities<\/a>.<\/p>\n<p>&#8220;U.S., Australian, Canadian, New Zealand, and UK cybersecurity authorities assess, in 2021, malicious cyber actors aggressively targeted newly disclosed critical software vulnerabilities against broad target sets, including public and private sector organizations worldwide,&#8221; said the advisory.<\/p>\n<p>It could be because of the malicious actors and security researchers releasing proof of concept (POC) exploits within two weeks of the initial disclosure of most of the top exploited bugs in 2021. However, some of the attacks were focused on older vulnerabilities patched years before, indicating that some organizations fail to update their systems even if they detect a patch.<\/p>\n<p>See the <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-secure-email-gateways\/\">Top Secure Email Gateways<\/a><\/p>\n<h2>Top 15 Routinely Exploited Vulnerabilities<\/h2>\n<p>The table below shows the top 15 vulnerabilities observed by the US, Australian, Canadian, New Zealand, and UK cybersecurity authorities, linked to National Vulnerability Database entries and associated malware.<\/p>\n<div align=\"left\">\n<table>\n<colgroup>\n<col style=\"width: 124px;\" \/>\n<col style=\"width: 129px;\" \/>\n<col style=\"width: 204px;\" \/>\n<col style=\"width: 134px;\" \/><\/colgroup>\n<tbody>\n<tr style=\"height: 21.75pt;\">\n<td><strong>CVE<\/strong><\/td>\n<td><strong>Vulnerability<\/strong><\/td>\n<td><strong>Vendor and Product<\/strong><\/td>\n<td><strong>Type<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 35.8425pt;\">\n<td><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-44228\" target=\"_blank\" rel=\"noopener\">CVE-2021-44228<\/a><\/td>\n<td>Log4Shell<\/td>\n<td>Apache Log4j<\/td>\n<td>Remote code execution (RCE)<\/td>\n<\/tr>\n<tr style=\"height: 35.25pt;\">\n<td><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-40539\" target=\"_blank\" rel=\"noopener\">CVE-2021-40539<\/a><\/td>\n<td>&nbsp;<\/td>\n<td>Zoho ManageEngine AD SelfService Plus<\/td>\n<td>RCE<\/td>\n<\/tr>\n<tr style=\"height: 35.25pt;\">\n<td><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-34523\" target=\"_blank\" rel=\"noopener\">CVE-2021-34523<\/a><\/td>\n<td>ProxyShell<\/td>\n<td>Microsoft Exchange Server (MES)<\/td>\n<td>Elevation of privilege<\/td>\n<\/tr>\n<tr style=\"height: 35.25pt;\">\n<td><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-34473\" target=\"_blank\" rel=\"noopener\">CVE-2021-34473<\/a><\/td>\n<td>ProxyShell<\/td>\n<td>MES<\/td>\n<td>RCE<\/td>\n<\/tr>\n<tr style=\"height: 35.25pt;\">\n<td><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-31207\" target=\"_blank\" rel=\"noopener\">CVE-2021-31207<\/a><\/td>\n<td>ProxyShell<\/td>\n<td>MES<\/td>\n<td>Security feature bypass<\/td>\n<\/tr>\n<tr style=\"height: 35.25pt;\">\n<td><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-27065\" target=\"_blank\" rel=\"noopener\">CVE-2021-27065<\/a><\/td>\n<td>ProxyLogon<\/td>\n<td>MES<\/td>\n<td>RCE<\/td>\n<\/tr>\n<tr style=\"height: 35.25pt;\">\n<td><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-26858\" target=\"_blank\" rel=\"noopener\">CVE-2021-26858<\/a><\/td>\n<td>ProxyLogon<\/td>\n<td>MES<\/td>\n<td>RCE<\/td>\n<\/tr>\n<tr style=\"height: 35.25pt;\">\n<td><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-26857\" target=\"_blank\" rel=\"noopener\">CVE-2021-26857<\/a><\/td>\n<td>ProxyLogon<\/td>\n<td>MES<\/td>\n<td>RCE<\/td>\n<\/tr>\n<tr style=\"height: 35.25pt;\">\n<td><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-26855\" target=\"_blank\" rel=\"noopener\">CVE-2021-26855<\/a><\/td>\n<td>ProxyLogon<\/td>\n<td>MES<\/td>\n<td>RCE<\/td>\n<\/tr>\n<tr style=\"height: 48.75pt;\">\n<td><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-26084\" target=\"_blank\" rel=\"noopener\">CVE-2021-26084<\/a><\/p>\n<p>&nbsp;<\/td>\n<td>&nbsp;<\/td>\n<td>Atlassian Confluence Server and Data Center<\/td>\n<td>Arbitrary code execution<\/td>\n<\/tr>\n<tr style=\"height: 35.25pt;\">\n<td><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-21972\" target=\"_blank\" rel=\"noopener\">CVE-2021-21972<\/a><\/td>\n<td>&nbsp;<\/td>\n<td>VMware vSphere Client<\/td>\n<td>RCE<\/td>\n<\/tr>\n<tr style=\"height: 35.25pt;\">\n<td><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-1472\" target=\"_blank\" rel=\"noopener\">CVE-2020-1472<\/a><\/td>\n<td>ZeroLogon<\/td>\n<td>Microsoft Netlogon Remote Protocol (MS-NRPC)<\/td>\n<td>Elevation of privilege<\/td>\n<\/tr>\n<tr style=\"height: 35.25pt;\">\n<td><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-0688\" target=\"_blank\" rel=\"noopener\">CVE-2020-0688<\/a><\/td>\n<td>&nbsp;<\/td>\n<td>MES<\/td>\n<td>RCE<\/td>\n<\/tr>\n<tr style=\"height: 35.25pt;\">\n<td><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-11510\" target=\"_blank\" rel=\"noopener\">CVE-2019-11510<\/a><\/td>\n<td>&nbsp;<\/td>\n<td>Pulse Secure Pulse Connect Secure<\/td>\n<td>Arbitrary file reading<\/td>\n<\/tr>\n<tr style=\"height: 35.25pt;\">\n<td><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-13379\" target=\"_blank\" rel=\"noopener\">CVE-2018-13379<\/a><\/td>\n<td>&nbsp;<\/td>\n<td>Fortinet FortiOS and FortiProxy<\/td>\n<td>Path traversal<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<h2>Other Routinely Exploited Vulnerabilities<\/h2>\n<p>In addition to the 15 vulnerabilities listed in the table above, the alert also listed 21 additional security vulnerabilities identified by the cybersecurity agencies that were routinely exploited by malicious cyber actors in 2021.<\/p>\n<p>It includes multiple vulnerabilities that affect internet-facing systems, including Accellion File Transfer Appliance (FTA), Pulse Secure Pulse Connect Secure, and <a href=\"https:\/\/www.esecurityplanet.com\/threats\/misconfigured-mfa-printnightmare\/\">Windows Print Spooler<\/a>. Three of these vulnerabilities \u2014 CVE-2019-19781, CVE-2019-18935, and CVE-2017-11882 \u2014 were also <a href=\"https:\/\/www.esecurityplanet.com\/threats\/fbi-cisa-most-exploited-vulnerabilities\/\">routinely exploited in 2020<\/a>.<\/p>\n<div align=\"left\">\n<table>\n<colgroup>\n<col style=\"width: 179px;\" \/>\n<col style=\"width: 263px;\" \/>\n<col style=\"width: 182px;\" \/><\/colgroup>\n<tbody>\n<tr style=\"height: 28.75pt;\">\n<td><strong>CVE<\/strong><\/td>\n<td><strong>Vendor and Product<\/strong><\/td>\n<td><strong>Type<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 28.75pt;\">\n<td><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-42237\" target=\"_blank\" rel=\"noopener\">CVE-2021-42237<\/a><\/td>\n<td>Sitecore XP<\/td>\n<td>RCE<\/td>\n<\/tr>\n<tr style=\"height: 28.75pt;\">\n<td><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-35464\" target=\"_blank\" rel=\"noopener\">CVE-2021-35464<\/a><\/td>\n<td>ForgeRock OpenAM server<\/td>\n<td>RCE<\/td>\n<\/tr>\n<tr style=\"height: 28.75pt;\">\n<td><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-27104\" target=\"_blank\" rel=\"noopener\">CVE-2021-27104<\/a><\/td>\n<td>Accellion FTA<\/td>\n<td>OS command execution<\/td>\n<\/tr>\n<tr style=\"height: 28.75pt;\">\n<td><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-27103\" target=\"_blank\" rel=\"noopener\">CVE-2021-27103<\/a><\/td>\n<td>Accellion FTA<\/td>\n<td>Server-side request forgery<\/td>\n<\/tr>\n<tr style=\"height: 28.75pt;\">\n<td><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-27102\" target=\"_blank\" rel=\"noopener\">CVE-2021-27102<\/a><\/td>\n<td>Accellion FTA<\/td>\n<td>OS command execution<\/td>\n<\/tr>\n<tr style=\"height: 28.75pt;\">\n<td><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-27101\" target=\"_blank\" rel=\"noopener\">CVE-2021-27101<\/a><\/td>\n<td>Accellion FTA<\/td>\n<td>SQL injection<\/td>\n<\/tr>\n<tr style=\"height: 28.75pt;\">\n<td><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-21985\" target=\"_blank\" rel=\"noopener\">CVE-2021-21985<\/a><\/td>\n<td>VMware vCenter Server<\/td>\n<td>RCE<\/td>\n<\/tr>\n<tr style=\"height: 28.75pt;\">\n<td><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-20038\" target=\"_blank\" rel=\"noopener\">CVE-2021-20038<\/a><\/td>\n<td>SonicWall Secure Mobile Access (SMA)<\/td>\n<td>RCE<\/td>\n<\/tr>\n<tr style=\"height: 28.75pt;\">\n<td><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-40444\" target=\"_blank\" rel=\"noopener\">CVE-2021-40444<\/a><\/td>\n<td>Microsoft MSHTML<\/td>\n<td>RCE<\/td>\n<\/tr>\n<tr style=\"height: 28.75pt;\">\n<td><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-34527\" target=\"_blank\" rel=\"noopener\">CVE-2021-34527<\/a><\/td>\n<td>Microsoft Windows Print Spooler<\/td>\n<td>RCE<\/td>\n<\/tr>\n<tr style=\"height: 28.75pt;\">\n<td><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-3156\" target=\"_blank\" rel=\"noopener\">CVE-2021-3156<\/a><\/td>\n<td>Sudo<\/td>\n<td>Privilege escalation<\/td>\n<\/tr>\n<tr style=\"height: 28.75pt;\">\n<td><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-27852\" target=\"_blank\" rel=\"noopener\">CVE-2021-27852<\/a><\/td>\n<td>Checkbox Survey<\/td>\n<td>Remote arbitrary code execution<\/td>\n<\/tr>\n<tr style=\"height: 28.75pt;\">\n<td><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-22893\" target=\"_blank\" rel=\"noopener\">CVE-2021-22893<\/a><\/td>\n<td>Pulse Secure Pulse Connect Secure<\/td>\n<td>Remote arbitrary code execution<\/td>\n<\/tr>\n<tr style=\"height: 54.25pt;\">\n<td><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-20016\" target=\"_blank\" rel=\"noopener\">CVE-2021-20016<\/a><\/td>\n<td>SonicWall SSLVPN SMA100<\/td>\n<td>Improper SQL command neutralization, allowing for credential access<\/td>\n<\/tr>\n<tr style=\"height: 28.75pt;\">\n<td><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-1675\" target=\"_blank\" rel=\"noopener\">CVE-2021-1675<\/a><\/td>\n<td>Windows Print Spooler<\/td>\n<td>RCE<\/td>\n<\/tr>\n<tr style=\"height: 28.75pt;\">\n<td><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-2509\" target=\"_blank\" rel=\"noopener\">CVE-2020-2509<\/a><\/td>\n<td>QNAP QTS and QuTS hero<\/td>\n<td>Remote arbitrary code execution<\/td>\n<\/tr>\n<tr style=\"height: 41.5pt;\">\n<td><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-19781\" target=\"_blank\" rel=\"noopener\">CVE-2019-19781<\/a><\/td>\n<td>Citrix Application Delivery Controller (ADC) and Gateway<\/td>\n<td>Arbitrary code execution<\/td>\n<\/tr>\n<tr style=\"height: 28.75pt;\">\n<td><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-18935\" target=\"_blank\" rel=\"noopener\">CVE-2019-18935<\/a><\/td>\n<td>Progress Telerik UI for ASP.NET AJAX<\/td>\n<td>Code execution<\/td>\n<\/tr>\n<tr style=\"height: 28.75pt;\">\n<td><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-0171\" target=\"_blank\" rel=\"noopener\">CVE-2018-0171<\/a><\/td>\n<td>Cisco IOS Software and IOS XE Software<\/td>\n<td>Remote arbitrary code execution<\/td>\n<\/tr>\n<tr style=\"height: 28.75pt;\">\n<td><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-11882\" target=\"_blank\" rel=\"noopener\">CVE-2017-11882<\/a><\/td>\n<td>Microsoft Office<\/td>\n<td>RCE<\/td>\n<\/tr>\n<tr style=\"height: 28.75pt;\">\n<td><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-0199\" target=\"_blank\" rel=\"noopener\">CVE-2017-0199<\/a><\/td>\n<td>Microsoft Office<\/td>\n<td>RCE<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<h2>Mitigation Measures<\/h2>\n<p>The advisory also includes some mitigation measures to reduce the risk associated with the most abused flaws detailed above. It suggests that companies should use a centralized patch management system while regularly updating their software, applications, operating systems, and firmware on IT network assets. They should also enforce <a href=\"https:\/\/www.esecurityplanet.com\/applications\/mfa-advantages-and-weaknesses\/\">multifactor authentication (MFA)<\/a> for all users, without exception, and must review, validate, or remove privileged accounts in a timely manner (annually at a minimum).<\/p>\n<p>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/products\/privileged-access-management-pam-software\/\">Best Privileged Access Management (PAM) Software<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6fe1a7f4a8-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6fe1a7f4a8\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6fe1a7f4a8\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6fe1a7f4a8\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6fe1a7f4a8\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6fe1a7f4a8\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6fe1a7f4a8\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>U.S. cybersecurity agencies joined their counterparts around the globe to urge organizations to address the top 15 vulnerabilities exploited in 2021. Topping the list were the Log4Shell vulnerability and Microsoft bugs ProxyShell and ProxyLogon. Microsoft occupied more than half the list, with Exchange Server accounting for eight of the vulnerabilities. VMware, Atlassian, Pulse Secure and [&hellip;]<\/p>\n","protected":false},"author":286,"featured_media":21683,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[18145,3790],"b2b_audience":[33,35],"b2b_industry":[],"b2b_product":[382,31780],"class_list":["post-21775","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-cyber-threats-2","tag-cybersecurity","b2b_audience-awareness-and-consideration","b2b_audience-implementation-and-support","b2b_product-application-security-vulnerability-management","b2b_product-patch-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Agencies Reveal the Top Exploited Vulnerabilities of 2021 | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Log4Shell, ProxyLogon, and Atlassian bugs top the list of routinely exploited vulnerabilities in 2021. Here&#039;s what to do.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/top-exploited-vulnerabilities-2021\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Agencies Reveal the Top Exploited Vulnerabilities of 2021 | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Log4Shell, ProxyLogon, and Atlassian bugs top the list of routinely exploited vulnerabilities in 2021. Here&#039;s what to do.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/top-exploited-vulnerabilities-2021\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-28T21:12:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/cyber-attacks-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sunny Yadav\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sunny Yadav\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/top-exploited-vulnerabilities-2021\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/top-exploited-vulnerabilities-2021\/\"},\"author\":{\"name\":\"Sunny Yadav\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/e0a1187060905629a5334c30c87841df\"},\"headline\":\"Cybersecurity Agencies Reveal the Top Exploited Vulnerabilities of 2021\",\"datePublished\":\"2022-04-28T21:12:31+00:00\",\"dateModified\":\"2022-04-28T21:12:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/top-exploited-vulnerabilities-2021\/\"},\"wordCount\":796,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/top-exploited-vulnerabilities-2021\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/cyber-attacks-scaled.jpg\",\"keywords\":[\"cyber threats\",\"cybersecurity\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/top-exploited-vulnerabilities-2021\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/top-exploited-vulnerabilities-2021\/\",\"name\":\"Cybersecurity Agencies Reveal the Top Exploited Vulnerabilities of 2021 | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/top-exploited-vulnerabilities-2021\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/top-exploited-vulnerabilities-2021\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/cyber-attacks-scaled.jpg\",\"datePublished\":\"2022-04-28T21:12:31+00:00\",\"dateModified\":\"2022-04-28T21:12:31+00:00\",\"description\":\"Log4Shell, ProxyLogon, and Atlassian bugs top the list of routinely exploited vulnerabilities in 2021. Here's what to do.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/top-exploited-vulnerabilities-2021\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/top-exploited-vulnerabilities-2021\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/top-exploited-vulnerabilities-2021\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/cyber-attacks-scaled.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/cyber-attacks-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"hacking techniques\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/top-exploited-vulnerabilities-2021\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Agencies Reveal the Top Exploited Vulnerabilities of 2021\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/e0a1187060905629a5334c30c87841df\",\"name\":\"Sunny Yadav\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/06\/Sunny_Photo-150x150.jpeg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/06\/Sunny_Photo-150x150.jpeg\",\"caption\":\"Sunny Yadav\"},\"description\":\"Sunny is a contributing writer for eSecurity Planet with a bachelor's degree in technology and years of experience writing for reputed cybersecurity publications. He mostly writes about cyberattacks, cryptography, data protection, and threats and vulnerabilities. Sunny also covers security policies and governance along with endpoint and mobile security. When he's not burning the midnight oil, you can find Sunny cleaning his house, shopping for things he doesn't need, or harassing his friends to read The Wheel of Time.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/sunny-yadav\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Agencies Reveal the Top Exploited Vulnerabilities of 2021 | eSecurity Planet","description":"Log4Shell, ProxyLogon, and Atlassian bugs top the list of routinely exploited vulnerabilities in 2021. Here's what to do.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/top-exploited-vulnerabilities-2021\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Agencies Reveal the Top Exploited Vulnerabilities of 2021 | eSecurity Planet","og_description":"Log4Shell, ProxyLogon, and Atlassian bugs top the list of routinely exploited vulnerabilities in 2021. Here's what to do.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/top-exploited-vulnerabilities-2021\/","og_site_name":"eSecurity Planet","article_published_time":"2022-04-28T21:12:31+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/cyber-attacks-scaled.jpg","type":"image\/jpeg"}],"author":"Sunny Yadav","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Sunny Yadav","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/top-exploited-vulnerabilities-2021\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/top-exploited-vulnerabilities-2021\/"},"author":{"name":"Sunny Yadav","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/e0a1187060905629a5334c30c87841df"},"headline":"Cybersecurity Agencies Reveal the Top Exploited Vulnerabilities of 2021","datePublished":"2022-04-28T21:12:31+00:00","dateModified":"2022-04-28T21:12:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/top-exploited-vulnerabilities-2021\/"},"wordCount":796,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/top-exploited-vulnerabilities-2021\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/cyber-attacks-scaled.jpg","keywords":["cyber threats","cybersecurity"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/top-exploited-vulnerabilities-2021\/","url":"https:\/\/www.esecurityplanet.com\/threats\/top-exploited-vulnerabilities-2021\/","name":"Cybersecurity Agencies Reveal the Top Exploited Vulnerabilities of 2021 | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/top-exploited-vulnerabilities-2021\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/top-exploited-vulnerabilities-2021\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/cyber-attacks-scaled.jpg","datePublished":"2022-04-28T21:12:31+00:00","dateModified":"2022-04-28T21:12:31+00:00","description":"Log4Shell, ProxyLogon, and Atlassian bugs top the list of routinely exploited vulnerabilities in 2021. Here's what to do.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/top-exploited-vulnerabilities-2021\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/top-exploited-vulnerabilities-2021\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/top-exploited-vulnerabilities-2021\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/cyber-attacks-scaled.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/cyber-attacks-scaled.jpg","width":2560,"height":1707,"caption":"hacking techniques"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/top-exploited-vulnerabilities-2021\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Agencies Reveal the Top Exploited Vulnerabilities of 2021"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/e0a1187060905629a5334c30c87841df","name":"Sunny Yadav","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/06\/Sunny_Photo-150x150.jpeg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/06\/Sunny_Photo-150x150.jpeg","caption":"Sunny Yadav"},"description":"Sunny is a contributing writer for eSecurity Planet with a bachelor's degree in technology and years of experience writing for reputed cybersecurity publications. He mostly writes about cyberattacks, cryptography, data protection, and threats and vulnerabilities. Sunny also covers security policies and governance along with endpoint and mobile security. When he's not burning the midnight oil, you can find Sunny cleaning his house, shopping for things he doesn't need, or harassing his friends to read The Wheel of Time.","url":"https:\/\/www.esecurityplanet.com\/author\/sunny-yadav\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/21775"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/286"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=21775"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/21775\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/21683"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=21775"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=21775"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=21775"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=21775"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=21775"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=21775"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}