Vulnerability Trends Summary
As part of our monthly vulnerability trends, this report shows the monthly top 10 trends on security vulnerabilities and how hackers, malware, and exploit kits are exploiting those vulnerabilities. To demonstrate, we assign vulnerability trends value as a percentage of how each vulnerability is significantly gaining the attention of cybersecurity communities, attackers, together with malware. In either case, companies can benefit from the report to have more cyber threat insights and relatively anticipate attacks wave that might target their public assets in the following months.
Subscribe to the monthly vulnerability digest report by clicking here.
The following chart shows the trends.
In July 2021 we see that Windows Print Spooler service vulnerabilities continue to grab the attention of the cybersecurity community.
Other privilege escalation vulnerabilities with active exploits are detected on iOS, Chrome, and SolarWinds.
The following table shows the details of the trends.
CVE | Vulnerability | Publish Date | Exploited | Trends* |
CVE-2021-34527 | Print Spooler Service RCE in Windows | 02/07/2021 | Yes | 41% |
CVE-2021-36934 | Privilege Escalation in Windows | 20/07/2021 | Yes | 16% |
CVE-2021-34481 | Print Spooler Privilege Escalation | 15/07/2021 | No | 8% |
CVE-2021-33909 | Privilege Escalation in Linux Kernel | 20/07/2021 | Yes | 8% |
CVE-2021-30807 | Code Execution in Apple iOS | 26/07/2021 | Yes | 8% |
CVE-2021-35211 | SolarWinds Serv-U Remote Code Execution | 12/07/2021 | Yes | 7% |
CVE-2021-22555 | Privilege Escalation in Linux Netfilter | 07/07/2021 | Yes | 5% |
CVE-2021-30563 | Code Execution in Chromium V8 Engine | 16/07/2021 | Yes | 3% |
CVE-2021-33910 | DoS in Linux Systemd | 20/07/2021 | Yes | 2% |
CVE-2021-32589 | RCE in FortiManager and FortiAnzlyzer | 19/07/2021 | No | 2% |
Subscribe to the monthly vulnerability digest report by clicking here.
1. CVE-2021-34527 Print Spooler Service RCE in Windows
A remote code execution vulnerability exists in Print Spooler Service. This vulnerability is dubbed as PrintNightmare.
CVSS Rate | 8.8 High |
Exploited | Yes |
Links | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34527https://github.com/cube0x0/CVE-2021-1675 |
2. CVE-2021-36934 Privilege Escalation in Windows
Local privilege escalation in Windows due to failing on securing SAM file which contains secret hashes of local users.
CVSS Rate | 7.8 High |
Exploited | Yes |
Links | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36934https://github.com/GossiTheDog/HiveNightmare |
3. CVE-2021-34481 Print Spooler Privilege Escalation
A privilege escalation vulnerability exists in Print Spooler Service which allows a local user to run code as SYSTEM.
CVSS Rate | 7.8 High |
Exploited | No |
Links | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34481 |
4. CVE-2021-33909 Privilege Escalation in Linux Kernel
An out-of-bounds write flaw was found in the Linux kernel’s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash or a leak of internal kernel information.
CVSS Rate | 7.8 High |
Exploited | Yes |
Links | https://blog.qualys.com/vulnerabilities-threat-research/2021/07/20/sequoia-a-local-privilege-escalation-vulnerability-in-linuxs-filesystem-layer-cve-2021-33909 |
5. CVE-2021-30807 Code Execution in Apple iOS
A memory corruption bug exists in Apple iOS/iPadOS which allows code execution at the kernel level. An active exploit is detected for this vulnerability.
CVSS Rate | 7.5 High |
Exploited | Yes |
Links | https://support.apple.com/en-us/HT212623 |
6. CVE-2021-35211 SolarWinds Serv-U Remote Code Execution
Microsoft discovered an active remote code execution exploit that targets Serv-U Managed File Transfer and Serv-U Secure FTP.
CVSS Rate | 10.0 Critical |
Exploited | Yes |
Links | https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35211Microsoft discovers threat actor targeting SolarWinds Serv-U software with 0-day exploithttps://www.microsoft.com/security/blog/2021/07/13/microsoft-discovers-threat-actor-targeting-solarwinds-serv-u-software-with-0-day-exploit/embed/#?secret=NvQm7JdfbO |
7. CVE-2021-22555 Privilege Escalation in Linux Netfilter
A vulnerability exists in the netfilter subsystem in the Linux kernel allows local users to gain privileges or cause a denial of service (heap memory corruption) via user namespace.
CVSS Rate | 7.8 High |
Exploited | Yes |
Links | https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528 |
8. CVE-2021-30563 Code Execution in Chromium V8 Engine
A code execution vulnerability in V8 engine the JavaScript engine of Chrom. This vulnerability is due to type confusion and n active exploited is detected.
CVSS Rate | 8.8 High |
Exploited | Yes |
Links | https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop.html |
9. CVE-2021-33910 DoS in Linux Systemd
Stack exhaustion denial-of-service vulnerability exists in Linux systemd which allows an unprivileged user to exploit this vulnerability and crash systemd and hence the entire operating system.
CVSS Rate | 5.5 Medium |
Exploited | No |
Links | https://blog.qualys.com/vulnerabilities-threat-research/2021/07/20/cve-2021-33910-denial-of-service-stack-exhaustion-in-systemd-pid-1 |
10. CVE-2021-32589 RCE in FortiManager and FortiAnalyzer
A Use After Free vulnerability in FortiManager and FortiAnalyzer fgfmsd daemon may allow a remote, non-authenticated attacker to execute unauthorized code as root via sending a specifically crafted request to the fgfm port of the targeted device.
CVSS Rate | 7.5 High |
Exploited | No |
Links | https://www.fortiguard.com/psirt/FG-IR-21-067 |
ScanTitan is the leading website security portal that offers website vulnerability scanning, website malware scanning, uptime monitoring, cyber brand monitoring, defacement monitoring, and continuous threat monitoring and alerting.
Now you can find the latest Scantitan promotions through our official coupon store.