• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Compliance, IT Infrastructure, Network Security, News

Patch These Heavily Exploited Vulnerabilities Now

Vulnerabilities in Citrix, Pulse, Microsoft and Fortinet products are among the most commonly exploited, according to federal agencies.

July 28, 2021 Zachary Comeau Leave a Comment

Exploited Vulnerabilities
Gorodenkoff/stock.adobe.com

When a vendor or security researcher discloses a vulnerability in an IT product, organizations should be quick to apply the patch or implement a secure workaround to protect networks from bad actors that are quick to exploit that vulnerability.

When those vulnerabilities are in widely used products from popular vendors like Citrix, Pulse, Microsoft and Fortinet, updating and applying the patch is even more critical as vulnerabilities in products from those vendors were among the most exploited in 2020, according to new findings from an international group of federal agencies.

In a new advisory, the U.S. Cybersecurity and Infrastructure Agency (CISA), the U.S. Federal Bureau of Investigation, The Australian Cyber Security Centre and the U.K. National Cybersecurity Center listed the most targeted vulnerabilities in 2020

According to the agencies, cloud-based solutions, VPNs and other remote work technologies made up the four most targeted vulnerabilities last year as many VPN gateway devices remained unpatched due to the growth of remote work making it difficult to patch devices.

Vulnerabilities in the Citrix Application Delivery Controller and Gateway 10.5, 11.1, 12.0, 12.1, and 13 was the most exploited vulnerability last year, the agencies said. The flaw is an arbitrary code execution vulnerability that allows an attacker to take control of an affected system.

“Nation-state and criminal cyber actors most likely favor using this vulnerability because it is easy to exploit, Citrix servers are widespread, and exploitation enables the actors to perform unauthorized RCE on a target system,” the agencies said.

Read Next: You Need To Look Out For These Software Vulns

Coupled with an arbitrary file reading vulnerability in Pulse Connect Secure VPN, the two vulnerabilities were among the most targeted by nation-state hackers, and they are still being exploited, agencies say.

Others singled out include a path traversal flaw in Fortinet FortiOS, MobileIron Core & Connector and a remote code execution vulnerability in FS-Big IP.

For a look at the top 12 most exploited vulnerabilities from 2020, check out the table from CISA below:

Vendor CVE Type
Citrix CVE-2019-19781 arbitrary code execution
Pulse CVE 2019-11510 arbitrary file reading
Fortinet CVE 2018-13379 path traversal
F5- Big IP CVE 2020-5902 remote code execution (RCE)
MobileIron CVE 2020-15505 RCE
Microsoft CVE-2017-11882 RCE
Atlassian CVE-2019-11580 RCE
Drupal CVE-2018-7600 RCE
Telerik CVE 2019-18935 RCE
Microsoft CVE-2019-0604 RCE
Microsoft CVE-2020-0787 elevation of privilege
Netlogon CVE-2020-1472 elevation of privilege

 

In addition to 2020, 2021 has also been a busy one for IT and cybersecurity professionals when it comes to patch management as more critical vulnerabilities have been discovered.

The agencies singled out several vulnerabilities in Microsoft Exchange (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065), Pulse Secure (CVE-2021-22893, CVE-2021-22894, CVE-2021-22899, and CVE-2021-22900), Accellion (CVE-2021-27101, CVE-2021-27102, CVE-2021-27103, CVE-2021-27104), VMWare (CVE-2021-21985) and Fortinet (: CVE-2018-13379, CVE-2020-12812, and CVE-2019-5591).

If you use any of those products, make sure they are all upgraded to the latest versions with fixes for those security issues.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: software vulnerabilities

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • URI catchbox 1 Catchbox Plus: The Mic Solution That Finally Gave…
  • Engaging virtual meeting with diverse participants discussing creative ideas in a bright office space during daylight hours Diversified Survey: Workplace AV Tech is Falling Short,…

Free downloadable guide you may like:

  • Practical Design Guide for Office SpacesPractical Design Guide for Office Spaces

    Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-face time with co-workers. When designing the office spaces — and meeting spaces in particular — enabling that connection between co-workers is crucial. But introducing the right collaboration technology in meeting spaces can […]

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.