Vulnerability Trends Summary

As part of our monthly vulnerability trends, this report shows the monthly top 10 trends on security vulnerabilities and how hackers, malware, and exploit kits are exploiting those vulnerabilities. To demonstrate, we assign vulnerability trends value as a percentage of how each vulnerability is significantly gaining the attention of cyber security communities, attackers, together with malware. In either case, companies can benefit from the report to have more cyber threat insights and relatively anticipate attacks wave that might target their public assets in the following months.

Download the full vulnerability digest report by clicking here.

Subscribe to the monthly vulnerability digest report by clicking here.

The following chart shows the trends.

July 2020 Vulnerability Trends

 

In July 2020, we noticed that many vulnerabilities impacted edge appliances like published services, routers and application delivery appliances.

July most attracted vulnerability is an RCE in F5 BIG-IP appliance. This vulnerability has more than 40% of overall July trends. The next in line is Windows DNS Server RCE (CVE-2020-1350) which was published in Microsoft July patch Tuesday.

The following table shows the details of the trends.

CVEVulnerabilityPublish DateExploitedTrends*
CVE-2020-1206RCE in F5 BIG-IP Management Interface01/07/2020Yes47%
CVE-2020-2021RCE in Windows DNS Server14/07/2020Yes31%
CVE-2020-1301SAP NetWeaver Authentication Bypass14/07/2020Yes5%
CVE-2020-13777GRUB 2 BootHole Vulnerability29/07/2020No5%
CVE-2020-9859Cisco ASA File Traversal22/07/2020Yes4%
CVE-2020-0543RCE in Microsoft Sharepoint14/07/2020Yes3%
CVE-2020-1170Apache Guacamole Code Execution02/07/2020Yes2%
CVE-2020-3342Windows 10 Privilege Elevation14/07/2020Yes1%
CVE-2020-1299Citrix ADC unauthenticated access10/07/2020Yes1%
CVE-2020-5410RCE in Moxa Routers15/07/2020Yes1%

Download the full vulnerability digest report by clicking here.

Subscribe to the monthly vulnerability digest report by clicking here.

 

 

1.CVE-2020-5902

The Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has a Remote Code Execution (RCE) vulnerability in undisclosed pages.

CVSS Rate9.8 CRITICAL
ExploitedYes
Linkshttps://support.f5.com/csp/article/K52145254

https://github.com/Critical-Start/Team-Ares/tree/master/CVE-2020-5902

 

2.CVE-2020-1350

A remote code execution vulnerability exists in Windows Domain Name System servers when they fail to properly handle requests. This vulnerability is known as SIGRED.

CVSS Rate10.0 CRITICAL
ExploitedYes
Linkshttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1350

https://github.com/ZephrFish/CVE-2020-1350

 

3.CVE-2020-6287

SAP NetWeaver AS JAVA (LM Configuration Wizard), does not perform an authentication check which allows an attacker without prior authentication to execute configuration tasks to perform critical actions against the SAP Java system, including the ability to create an administrative user. This vulnerability known as SAP RECON.

CVSS Rate10.0 CRITICAL
ExploitedYes
Linkshttps://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552599675

https://github.com/chipik/SAP_RECON

 

4.CVE-2020-10713

A flaw was found in grub2, prior to version 2.06. An attacker may use the GRUB 2 flaw to hijack and tamper the GRUB verification process. This flaw also allows the bypass of Secure Boot protections. In order to load an untrusted or modified kernel, an attacker would first need to establish access to the system such as gaining physical access, obtain the ability to alter a pxe-boot network, or have remote access to a networked system with root access. This vulnerability is known as BootHole

CVSS RateN/A
ExploitedNo
Linkshttps://access.redhat.com/security/vulnerabilities/grub2bootloader

 

5.CVE-2020-3452

A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct directory traversal attacks and read sensitive files on a targeted system.

CVSS Rate7.5 HIGH
ExploitedYes
Linkshttps://tools.cisco.com/security/center/content

https://github.com/MrCl0wnLab/checker-cve2020-3452/

 

6.CVE-2020-1147

A remote code execution vulnerability exists in .NET Framework, Microsoft SharePoint, and Visual Studio when the software fails to check the source markup of XML file input.

CVSS Rate7.8 HIGH
ExploitedYes
Linkshttps://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-1147

https://packetstormsecurity.com/files/158694/SharePoint-DataSet-DataTable-Deserialization.html

 

7.CVE-2020-9498

Apache Guacamole 1.1.0 and older may mishandle pointers involved in processing data received via RDP static virtual channels. If a user connects to a malicious or compromised RDP server, a series of speciallycrafted PDUs could result in memory corruption, possibly allowing arbitrary code to be executed with the privileges of the running guacd process.

CVSS Rate6.7 MEDIUM
ExploitedYes
Linkshttps://lists.apache.org/thread.html/r26fb170edebff842c74aacdb1

https://cpr-zero.checkpoint.com/vulns/cprid-2144/

 

8.CVE-2020-1362

An elevation of privilege vulnerability exists in the way that the Windows WalletService handles objects in memory, aka ‘Windows WalletService Elevation of Privilege Vulnerability’.

CVSS Rate7.8 HIGH
ExploitedYes
Linkshttps://nvd.nist.gov/vuln/detail/CVE-2020-1362

https://github.com/Q4n/CVE-2020-1362

 

9.CVE-2020-8193

Improper access control in Citrix ADC and Citrix Gateway versions and Citrix SDWAN WAN-OP allows unauthenticated access to certain URL endpoints.

CVSS Rate6.5 MEDIUM
ExploitedYes
Linkshttps://support.citrix.com/article/CTX276688

https://github.com/jas502n/CVE-2020-8193

 

10.CVE-2020-14511

Malicious operation of the crafted web browser cookie may cause a stack-based buffer overflow in the system web server on the EDR-G902 and EDR-G903 Series Routers (versions prior to 5.4).

CVSS Rate9.8 CRITICAL
ExploitedYes
Linkshttps://www.moxa.com/en/support/support/security-advisory/edr-g902-g903-series-secure-routers-vulnerabilities

https://www.claroty.com/2020/07/15/cve-2020-1451