Back on October 20, 2020, the United States National Security Agency (NSA) published a cybersecurity advisory about Chinese state-sponsored malicious cyber activity. This post we will be covering 5 of those vulnerabilities.
“Since these techniques include exploitation of publicly known vulnerabilities, it is critical that network defenders prioritize patching and mitigation efforts,” said the NSA advisory. It also recommended “critical system owners consider these actions a priority, in order to mitigate the loss of sensitive information that could impact U.S. policies, strategies, plans, and competitive advantage.”
A critical vulnerability (CVSS base score of 9.8) in various versions of DrayTek Vigor, a series of VPN routers.
A vulnerability (CVSS base score of 5.8) in various Microsoft Windows versions.
A critical vulnerability (CVSS base score of 9.8) in Citrix Application Delivery Controller (ADC) and Citrix Gateway
A critical vulnerability (CVSS base score of 10) in Pulse Connect Secure, the SSL VPN solution of Pulse Secure.
A critical vulnerability (CVSS base score of 9.8) in various versions of BIG-IP, popular F5 products.
Qualys VMDR Detection
vulnerabilities.vulnerability.cveIds: [CVE-2020-8515,CVE–2019–1040,CVE–2019–19781,CVE-2019-11510,CVE–2020–5902]
CISA recommends the following to protect assets from exploiting: