Vulnerability Trends Summary

As part of our monthly vulnerability trends, this report shows the monthly top 10 trends on security vulnerabilities and how hackers, malware, and exploit kits are exploiting those vulnerabilities. To demonstrate, we assign vulnerability trends value as a percentage of how each vulnerability is significantly gaining the attention of cyber security communities, attackers, together with malware. In either case, companies can benefit from the report to have more cyber threat insights and relatively anticipate attacks wave that might target their public assets in the following months.

Subscribe to the monthly vulnerability digest report by clicking here.

Download the full vulnerability digest report by clicking here.

The following chart shows the trends.

Vulnerability Trends

In September 2020, we see different types of vulnerabilities are reported with less exploitability in those vulnerabilities. The Bluetooth Man-in-the-Middle vulnerability, CVE-2020-15802, gained almost 20% of overall September trends.

We mention, as a note, that NTLM ZoroLogon is already reported in August Vulnerability Digest.

The following table shows the details of the trends.

 

CVEVulnerabilityPublish DateExploitedTrends*
CVE-2020-15802Bluetooth Man-in-the-Middle09/09/2020No20%
CVE-2020-14386Privilege Escalation in Linux Kernel03/09/2020Yes17%
CVE-2020-16875RCE in Exchange Server11/09/2020Yes16%
CVE-2020-3569DoS in CISCO IOS XR01/09/2020Yes13%
CVE-2020-1968TLS Eavesdropping09/09/2020No11%
CVE-2020-13668XSS in Drupal16/09/2020No7%
CVE-2020-2037OS Command Injection in PAN-OS09/09/2020No5%
CVE-2020-24553XSS in GO02/09/2020Yes5%
CVE-2020-3495RCE in CISCO Jabber03/09/2020No4%
CVE-2020-1013Group Policy Update Elevation of Privilege08/09/2020Yes2%

Subscribe to the monthly vulnerability digest report by clicking here.

Download the full vulnerability digest report by clicking here.

 

1.CVE-2020-15802

Devices supporting Bluetooth before from 4.0 to 5.0 may allow man-in-the-middle attacks, known as BLURtooth. That might give unauthenticated user access to app or service on Bluetooth-powered devices like iOS and Android

CVSS Rate5.9 MEDIUM
ExploitedNo
Linkshttps://www.bluetooth.com/learn-about-bluetooth/bluetooth-technology/bluetooth-security/blurtooth/

2.CVE-2020-14386

A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes.

CVSS Rate7.8 HIGH
ExploitedYes
Linkshttps://seclists.org/oss-sec/2020/q3/146

3.CVE-2020-16875

A remote code execution vulnerability exists in Microsoft Exchange server that allows remote authenticated attacker to run arbitrary code in the server.

CVSS Rate7.2 HIGH
ExploitedYes
Linkshttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16875
https://packetstormsecurity.com/files/159210/Microsoft-Exchange-Server-DlpUtilsAddTenantDlpPolicy-Remote-Code-Execution.htm

4.CVE-2020-3569

Denial of Service in the Distance Vector Multicast Routing Protocol (DVMRP) feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to either immediately crash the Internet Group Management Protocol (IGMP) process or make it consume available memory and eventually crash.

CVSS Rate8.6 HIGH
ExploitedYes
Linkshttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-dvmrp-memexhdSmpdvfz

5.CVE-2020-1968

A flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. In such a case this would result in the attacker being able to eavesdrop on all encrypted communications sent over that TLS connection.

CVSS Rate3.7 LOW
ExploitedNo
Linkshttps://www.openssl.org/news/secadv/20200909.txt

6.CVE-2020-13668

Drupal 8 and 9 have a reflected cross-site scripting (XSS) vulnerability under certain circumstances. An attacker could leverage the way that HTML is rendered for affected forms in order to exploit the vulnerability

CVSS Rate8.8 HIGH
ExploitedNo
Linkshttps://www.drupal.org/sa-core-2020-009

7.CVE-2020-2037

An OS Command Injection vulnerability in the PAN-OS management interface that allows authenticated administrators to execute arbitrary OS commands with root privileges.

CVSS Rate7.2 HIGH
ExploitedNo
Linkshttps://security.paloaltonetworks.com/CVE-2020-2037

8.CVE-2020-24553

The CGI and FastCGI implementations in the Go standard library behave differently from the HTTP server implementation when serving content. This may lead to cross site scripting vulnerabilities even if uploaded data has been validated during upload.

CVSS Rate6.1 MEDIUM
ExploitedYes
Linkshttps://github.com/golang/go/issues/40928
http://seclists.org/fulldisclosure/2020/Sep/5

9.CVE-2020-3495

A vulnerability in Cisco Jabber for Windows could allow an authenticated, remote attacker to execute arbitrary code. The vulnerability is due to improper validation of message contents.

CVSS Rate8.8 HIGH
ExploitedNo
Linkshttps://tools.cisco.com/security/center/content

10.CVE-2020-1013

An elevation of privilege vulnerability exists when Microsoft Windows processes group policy updates. A remote attacker on the local network can launch a man-in-the-middle (MiTM) attack against the traffic passing between a domain controller and the target machine and gain elevated privileges on the target system

CVSS Rate8.1 HIGH
ExploitedYes
Linkshttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1013
https://www.gosecure.net/blog/2020/09/08/wsus-attacks-part-2-cve-2020-1013-a-windows-10-localprivilege-escalation-1-day/