U.S. govt reveals top security flaws exploited by Chinese hackers since 2020

Share post:

Top security agencies in the US have published the top security vulnerabilities exploited by the People’s Republic of China (PRC) hackers since 2020. NSA, CISA and FBI confirm once again that these Chinese-sponsored hackers are targeting U.S. and allied networks and technology companies in order to gain access and steal sensitive data.

Major flaws include: Apache Log4j (CVE-2021-44228) a remote code execution flaw; Pulse Connect Secure (CVE-2019-11510), an arbitrary file read flaw; GitLab CE/EE (CVE-2021-22205), a remote code execution bug; Atlassian (CVE-2022-26134), a remote code execution bug; Microsoft Exchange (CVE-2021-26855), a remote code execution bug; F5 Big-IP (CVE-2020-5902), a remote code execution flaw; VMware vCenter Server (CVE-2021-22005), an arbitrary file upload bug; Citrix ADC (CVE-2019-19781), a path traversal flaw; Cisco Hyperflex (CVE-2021-1407), a command line execution flaw; and Buffalo WSR (CVE-2021-20090), a relative path traversal flaw.

Others include Atlassian Confluence Server and Data Center (CVE-2021-26084), a remote code execution flaw; Hikvision Webserver (CVE-2021-36260), a command injection flaw; SitecoreXP (CVE-2021-42237), a remote code execution flaw; F5 Big-IP (CVE-2022-1388), a remote code execution flaw; Apache (CVE-2022-24112), an authentication bypass flaw; ZOHO (CVE-2021-40539), a remote code execution flaw; Microsoft (CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065) all remote code execution flaws; and Apache HTTP Server (CVE-2021-41773), a path traversal flaw.

The sources for this piece include an article in BleepingComputer.

SUBSCRIBE NOW

Related articles

North Korean hacker infiltrates US security vendor, loads malware

KnowBe4, a US-based security vendor, unknowingly hired a North Korean hacker who attempted to introduce malware into the...

CrowdStrike releases an update from initial Post Incident Review: Hashtag Trending Special Edition for Thursday July 25, 2024

Security vendor CrowdStrike released an update on from their initial Post Incident Review today. The first, and most surprising...

Security vendor CrowdStrike issues an update from their initial Post Incident Review

Security vendor CrowdStrike released an update from their initial Post Incident Review (PIR) today. The company's CEO has...

CrowdStrike CEO summoned by Homeland Security committee over software disaster

CrowdStrike CEO George Kurtz has been called to testify before the U.S. House Committee on Homeland Security following...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways