Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Five Eyes warns of rise in zero-day exploits

In a co-authored advisory released on November 14, 2024, the Five Eyes agencies detailed the top 15 most routinely exploited vulnerabilities

byKerem Gülen
November 14, 2024
in Cybersecurity, News
Home News Cybersecurity

The surge in exploits of zero-day vulnerabilities has become the “new normal,” according to a recent warning from the Five Eyes intelligence alliance—comprising the U.S., U.K., Canada, Australia, and New Zealand. Cybersecurity agencies report a significant increase in hackers targeting previously undisclosed vulnerabilities this year, marking a shift from the trend of exploiting older vulnerabilities that predominated in past years.

At the top of the list: CVE-2023-3519

In a co-authored advisory released on November 14, 2024, the Five Eyes agencies detailed the top 15 most routinely exploited vulnerabilities, highlighting that, for the first time since these annual reports began, most of the listed vulnerabilities were initially exploited as zero-days. At the top of the list is CVE-2023-3519, a remote code execution bug in Citrix’s networking product, NetScaler. This vulnerability, along with CVE-2023-4966—related to sensitive information leaks—underscores Citrix’s significant cyber security woes this year.

Cisco also found itself in the spotlight, occupying the third and fourth positions on the list with vulnerabilities in its IOS XE operating system. Critical issues allow attackers to create local accounts and subsequently elevate their privileges to root. Following closely in fifth place is Fortinet’s FortiOS, also affected by severe vulnerabilities enabling remote code execution through a heap-based buffer overflow. Meanwhile, the file transfer tool MOVEit rounds out the top six, with a SQL injection vulnerability that has proven popular with threat actors.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

Ollie Whitehouse, chief technology officer of the U.K.’s National Cyber Security Centre (NCSC), stated, “More routine initial exploitation of zero-day vulnerabilities represents the new normal which should concern end-user organizations and vendors alike as malicious actors seek to infiltrate networks.” In emphasizing the importance of proactive measures, he urged organizations to promptly apply patches and insist on secure-by-design products in the tech marketplace. The message is clear: vigilance in vulnerability management is crucial.

Organizations face a staggering challenge, particularly considering the high-profile list which includes vulnerabilities from well-known software systems. The impact of such breaches can be disastrous, as hackers gain access to sensitive networks and information. The exploitation of vulnerabilities like those in Citrix and Cisco not only risks significant data loss but could also undermine entire systems’ integrity.

Five Eyes warns of rise in zero-day exploits
For the first time since these annual reports began, most of the listed vulnerabilities were initially exploited as zero-days (Image credit)

Another notable entry is Atlassian’s Confluence, ranking seventh, which has a vulnerability allowing attackers to create admin-level accounts on affected servers. Hugely significant is the inclusion of the infamous Apache Log4j vulnerability, which ranks eighth. Despite being discovered in 2021, many organizations have yet to resolve this flaw, showcasing a troubling trend of inadequate patching practices.

Barracuda’s Email Security Gateway follows closely in ninth place due to its problematic input validation issues, popular with state-sponsored attackers. Zoho and PaperCut also made the list, reflecting the breadth of vulnerabilities affecting software across various sectors. Microsoft appears twice, with a 2020 netlogon protocol flaw sitting 12th and an Outlook issue escalating privileges at 14th—demonstrating that even tech giants grapple with legacy vulnerabilities.


Microsoft urges users to update Windows after zero-day vulnerabilities


Finally, open source file-sharing software, ownCloud, rounds out the list with a critical flaw allowing attackers to steal sensitive credentials. As these vulnerabilities persist, the Five Eyes agencies emphasize the importance for organizations to not only remain vigilant but to reinforce security measures from the development stage through to deployment.

Cyber attackers are not taking any breaks, and neither should organizations when safeguarding their digital environments. With the landscape of cyber threats evolving daily, understanding vulnerability trends and adapting swiftly is key to defending against exploitation effectively.


Featured image credit: Wesley Ford/Unsplash

Tags: Cybersecurity

Related Posts

Zoom announces AI Companion 3.0 at Zoomtopia

Zoom announces AI Companion 3.0 at Zoomtopia

September 19, 2025
Google Cloud adds Lovable and Windsurf as AI coding customers

Google Cloud adds Lovable and Windsurf as AI coding customers

September 19, 2025
Radware tricks ChatGPT’s Deep Research into Gmail data leak

Radware tricks ChatGPT’s Deep Research into Gmail data leak

September 19, 2025
Elon Musk’s xAI chatbot Grok exposed hundreds of thousands of private user conversations

Elon Musk’s xAI chatbot Grok exposed hundreds of thousands of private user conversations

September 19, 2025
Roblox game Steal a Brainrot removes AI-generated character, sparking fan backlash and a debate over copyright

Roblox game Steal a Brainrot removes AI-generated character, sparking fan backlash and a debate over copyright

September 19, 2025
DeepSeek releases R1 model trained for 4,000 on 512 H800 GPUs

DeepSeek releases R1 model trained for $294,000 on 512 H800 GPUs

September 19, 2025

LATEST NEWS

Zoom announces AI Companion 3.0 at Zoomtopia

Google Cloud adds Lovable and Windsurf as AI coding customers

Radware tricks ChatGPT’s Deep Research into Gmail data leak

Elon Musk’s xAI chatbot Grok exposed hundreds of thousands of private user conversations

Roblox game Steal a Brainrot removes AI-generated character, sparking fan backlash and a debate over copyright

DeepSeek releases R1 model trained for $294,000 on 512 H800 GPUs

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.