Thursday, April 18, 2024

NSA Released Top 5 Vulnerabilities That Exploited by Russian Hackers to Hack US Based Networks

The cybersecurity and Infrastructure Security Agency (CISA) along with The National Security Agency (NSA), and the FBI has recently, released an advisory together about ongoing Russian Foreign Intelligence Service (SVR) exploitation of five publicly known vulnerabilities.

Mitigation against these vulnerabilities is critically important as U.S based networks are constantly scanned, targeted, and exploited by Russian state-sponsored threat actors.

The news pronounced that this advisory is continuously targetting five vulnerabilities in attacks against U.S. organizations and interests.

Not only this after knowing all the details regarding the advisory NSA said that they got the information that the Russian SVR is using the vulnerabilities to hack USA Govt. Networks.

The vulnerabilities were used against services that are being faced by the public, and the main motive of the threat actors was to obtain authentication credentials.

Once the threat actors get the details they can easily compromise the networks of US corporate and also the government networks.

Vulnerabilities Exploited

  • CVE-2018-13379: In this vulnerability, the threat actors can easily download all the files through HTTP resource requests.
  • CVE-2019-9670: This is a vulnerability of XML External Entity injection (XXE).
  • CVE-2019-11510: Through this vulnerability, the threat actors can send a specific crafted Uniform Resource Identifier (URI) so that they can perform an arbitrary file read.
  • CVE-2019-19781: This is a Directory traversal vulnerability, and it generally enables the threat actors to perform the arbitrary code.
  • CVE-2020-4006: It is a command injection vulnerability, that enables and threat actors to execute commands with unrestricted dues on the operating system.


Some mitigations were mentioned by the experts in this joint advisory, and here they are mentioned below:-

  • Always, keep the systems updated and patch soon after the patches are released.
  • Remember to disable external management abilities so that you can easily set up the management network.
  • Always, allow the robust logging of Internet-facing services and authentication functions.
  • Remember to block expire or redundant protocols that are present at the network edge and break them in device configurations.

The cybersecurity experts declared that the joint advisory clearly pronounces that the Russian SVR has been using a proper mixture of these vulnerabilities in their attacks.

However, the analysts have suggested that every administrator must install the security updates that are being associated with the updates as soon as possible. 

Moreover, the mitigations that were mentioned above should be maintained and followed carefully by the administrators. Not only this but the NSA, CISA, and FBI have recognized all partners of private as well as public sectors for inclusive and collaborative efforts.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.


Latest articles

Xiid SealedTunnel: Unfazed by Yet Another Critical Firewall Vulnerability (CVE-2024-3400)

In the wake of the recent disclosure of a critical vulnerability (CVE-2024-3400) affecting a...

Cerber Linux Ransomware Exploits Atlassian Servers to Take Full Control

Security researchers at Cado Security Labs have uncovered a new variant of the Cerber...

FGVulDet – New Vulnerability Detector to Analyze Source Code

Detecting source code vulnerabilities aims to protect software systems from attacks by identifying inherent...

North Korean Hackers Abuse DMARC To Legitimize Their Emails

DMARC is targeted by hackers as this serves to act as a preventative measure...

L00KUPRU Ransomware Attackers discovered in the wild

A new variant of the Xorist ransomware, dubbed L00KUPRU, has been discovered in the...

Oracle Releases Biggest Security Update in 2024 – 372 Vulnerabilities Are Fixed – Update Now!

Oracle has released its April 2024 Critical Patch Update (CPU), addressing 372 security vulnerabilities...

Outlook Login Panel Themed Phishing Attack Evaded All Antivirus Detections

Cybersecurity researchers have uncovered a new phishing attack that has bypassed all antivirus detections.The...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.


Mastering WAAP/WAF ROI Analysis

As the importance of compliance and safeguarding critical websites and APIs grows, Web Application and API Protection (WAAP) solutions play an integral role.
Key takeaways include:

  • Pricing models
  • Cost Estimation
  • ROI Calculation

Related Articles