Vulnerability Trends Summary

 

As part of our monthly vulnerability trends, this report shows the monthly top 10 trends on security vulnerabilities and how hackers, malware, and exploit kits are exploiting those vulnerabilities. To demonstrate, we assign vulnerability trends value as a percentage of how each vulnerability is significantly gaining the attention of cybersecurity communities, attackers, together with malware. In either case, companies can benefit from the report to have more cyber threat insights and relatively anticipate attacks wave that might target their public assets in the following months.

Subscribe to the monthly vulnerability digest report by clicking here.

The following chart shows the trends.

July 2021 Vulnerability Trends

In July 2021 we see that Windows Print Spooler service vulnerabilities continue to grab the attention of the cybersecurity community.

Other privilege escalation vulnerabilities with active exploits are detected on iOS, Chrome, and SolarWinds.

The following table shows the details of the trends.

CVEVulnerabilityPublish DateExploitedTrends*
CVE-2021-34527Print Spooler Service RCE in Windows02/07/2021Yes41%
CVE-2021-36934Privilege Escalation in Windows20/07/2021Yes16%
CVE-2021-34481Print Spooler Privilege Escalation15/07/2021No8%
CVE-2021-33909Privilege Escalation in Linux Kernel20/07/2021Yes8%
CVE-2021-30807Code Execution in Apple iOS26/07/2021Yes8%
CVE-2021-35211SolarWinds Serv-U Remote Code Execution12/07/2021Yes7%
CVE-2021-22555Privilege Escalation in Linux Netfilter07/07/2021Yes5%
CVE-2021-30563Code Execution in Chromium V8 Engine16/07/2021Yes3%
CVE-2021-33910DoS in Linux Systemd20/07/2021Yes2%
CVE-2021-32589RCE in FortiManager and FortiAnzlyzer19/07/2021No2%

Subscribe to the monthly vulnerability digest report by clicking here.

 

1. CVE-2021-34527 Print Spooler Service RCE in Windows

A remote code execution vulnerability exists in Print Spooler Service. This vulnerability is dubbed as PrintNightmare.

CVSS Rate8.8 High
ExploitedYes
Links

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34527

https://github.com/cube0x0/CVE-2021-1675

 

2. CVE-2021-36934 Privilege Escalation in Windows

Local privilege escalation in Windows due to failing on securing SAM file which contains secret hashes of local users.

CVSS Rate7.8 High
ExploitedYes
Links

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36934

https://github.com/GossiTheDog/HiveNightmare

 

3. CVE-2021-34481 Print Spooler Privilege Escalation

A privilege escalation vulnerability exists in Print Spooler Service which allows a local user to run code as SYSTEM.

CVSS Rate7.8 High
ExploitedNo
Links

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34481

 

 

4. CVE-2021-33909 Privilege Escalation in Linux Kernel 

An out-of-bounds write flaw was found in the Linux kernel’s seq_file in the Filesystem layer. This flaw allows a local attacker with a user privilege to gain access to out-of-bound memory, leading to a system crash or a leak of internal kernel information.

CVSS Rate7.8 High
Exploited

Yes

Linkshttps://blog.qualys.com/vulnerabilities-threat-research/2021/07/20/sequoia-a-local-privilege-escalation-vulnerability-in-linuxs-filesystem-layer-cve-2021-33909

 

5. CVE-2021-30807 Code Execution in Apple iOS 

A memory corruption bug exists in Apple iOS/iPadOS which allows code execution at the kernel level. An active exploit is detected for this vulnerability.

CVSS Rate7.5 High
Exploited

Yes

Linkshttps://support.apple.com/en-us/HT212623

 

6. CVE-2021-35211 SolarWinds Serv-U Remote Code Execution

Microsoft discovered an active remote code execution exploit that targets Serv-U Managed File Transfer and Serv-U Secure FTP.

CVSS Rate10.0 Critical
ExploitedYes
Links

https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35211

 

7. CVE-2021-22555 Privilege Escalation in Linux Netfilter

A vulnerability exists in the netfilter subsystem in the Linux kernel allows local users to gain privileges or cause a denial of service (heap memory corruption) via user namespace. 

CVSS Rate7.8 High
ExploitedYes
Links

https://github.com/google/security-research/security/advisories/GHSA-xxx5-8mvq-3528

 

8. CVE-2021-30563 Code Execution in Chromium V8 Engine

A code execution vulnerability in V8 engine the JavaScript engine of Chrom. This vulnerability is due to type confusion and n active exploited is detected.

CVSS Rate8.8 High
ExploitedYes
Linkshttps://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop.html

 

9. CVE-2021-33910 DoS in Linux Systemd

Stack exhaustion denial-of-service vulnerability exists in Linux systemd which allows an unprivileged user to exploit this vulnerability and crash systemd and hence the entire operating system.

CVSS Rate5.5 Medium
ExploitedNo
Linkshttps://blog.qualys.com/vulnerabilities-threat-research/2021/07/20/cve-2021-33910-denial-of-service-stack-exhaustion-in-systemd-pid-1

 

10. CVE-2021-32589 RCE in FortiManager and FortiAnalyzer

A Use After Free vulnerability in FortiManager and FortiAnalyzer fgfmsd daemon may allow a remote, non-authenticated attacker to execute unauthorized code as root via sending a specifically crafted request to the fgfm port of the targeted device.

CVSS Rate7.5 High
ExploitedNo
Linkshttps://www.fortiguard.com/psirt/FG-IR-21-067

 

ScanTitan is the leading website security portal that offers website vulnerability scanning, website malware scanning, uptime monitoring, cyber brand monitoring, defacement monitoring, and continuous threat monitoring and alerting.

Now you can find the latest Scantitan promotions through our official coupon store