{"id":34957,"date":"2020-05-13T14:19:54","date_gmt":"2020-05-13T14:19:54","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31205\/DHS-CISA-And-FBI-Share-List-Of-Top-10-Most-Exploited-Vulnerabilities.html"},"modified":"2020-05-13T14:19:54","modified_gmt":"2020-05-13T14:19:54","slug":"dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\/","title":{"rendered":"DHS CISA And FBI Share List Of Top 10 Most Exploited Vulnerabilities"},"content":{"rendered":"<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2020\/05\/13\/5d58fd08-54ac-461b-a79f-a5904a0b672b\/vulnerability-code-binary.png\" class alt=\"vulnerability code binary\"><\/span><span class=\"credit\">Image: ZDNet<\/span><\/p>\n<p>Two US cyber-security agencies published this week a list of the top 10 most commonly exploited software vulnerabilities across the last four years, between 2016 and 2019.<\/p>\n<p><a href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/aa20-133a\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">The report<\/a>, authored by the Department of Homeland Security Cybersecurity and Infrastructure Security Agency (DHS CISA) and the Federal Bureau of Investigation (FBI), urges organizations in the public and private sector to apply necessary updates in order to prevent the most common forms of attacks encountered today.<\/p>\n<p>This includes attacks carried out by state-sponsored, non-state, and unattributed threat actors.<\/p>\n<p>US government officials argue that applying patches could degrade the cyber arsenal of foreign actors targeting US entities, as they&#8217;d have to invest resources into developing new exploits, rather then relying on old and tested bugs.<\/p>\n<p>&#8220;Exploitation of these vulnerabilities often requires fewer resources as compared with zero-day exploits for which no patches are available,&#8221; US officials said.<\/p>\n<p>&#8220;A concerted campaign to patch these vulnerabilities would introduce friction into foreign adversaries&#8217; operational tradecraft and force them to develop or acquire exploits that are more costly and less widely effective.&#8221;<\/p>\n<p>Other observations from the joint CISA &amp; FBI security alert include:<\/p>\n<ul>\n<li>The most commonly attacked was Microsoft&#8217;s Object Linking and Embedding (OLE), a technology that allows Office documents to embed content from other applications.<\/li>\n<li>OLE vulnerabilities like CVE-2017-11882, CVE-2017-0199, and CVE-2012-0158, were the most exploited bugs by foreign nation-state sponsored groups, from countries like China, Iran, North Korea, and Russia.<\/li>\n<li>Apache Struts was the second most attacked technology. This is in line with <a href=\"https:\/\/www.zdnet.com\/article\/wordpress-and-apache-struts-account-for-55-of-all-weaponized-vulnerabilities\/\" target=\"_blank\" rel=\"noopener noreferrer\">a recent RiskSense report<\/a>.<\/li>\n<li>The most commonly exploited vulnerabilities in 2020 were CVE-2019-19781 (bug in Citrix VPN appliances) and CVE-2019-11510 (bug in Pulse Secure VPN servers).<\/li>\n<li>During the coronavirus outbreak, many organizations shifting to work from home setups have <a href=\"https:\/\/www.zdnet.com\/article\/microsoft-office-365-us-issues-security-alert-over-rushed-remote-deployments\/\" target=\"_blank\" rel=\"noopener noreferrer\">misconfigured Office 365 deployments<\/a>.<\/li>\n<\/ul>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>The list of the top 10 most exploited vulnerabilities, in no particular order, is available below. It includes the likes of CVE-2017-11882, CVE-2017-0199, CVE-2017-5638, CVE-2012-0158, CVE-2019-0604, CVE-2017-0143, CVE-2018-4878, CVE-2017-8759, CVE-2015-1641, and CVE-2018-7600.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\/\" class=\"lazy\" alt=\"top-10-1.png\" data-original=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2020\/05\/13\/90675ba4-46ba-41be-ad66-cd2c4920de3c\/top-10-1.png\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2020\/05\/13\/90675ba4-46ba-41be-ad66-cd2c4920de3c\/top-10-1.png\" class alt=\"top-10-1.png\"><\/span><\/p>\n<p><\/noscript><br \/>\n<span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\/\" class=\"lazy\" alt=\"top-10-2.png\" data-original=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2020\/05\/13\/82d22ec1-92b8-446f-9de7-e23d31493535\/top-10-2.png\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2020\/05\/13\/82d22ec1-92b8-446f-9de7-e23d31493535\/top-10-2.png\" class alt=\"top-10-2.png\"><\/span><\/p>\n<p><\/noscript><br \/>\n<span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\/\" class=\"lazy\" alt=\"top-10-3.png\" data-original=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2020\/05\/13\/6455792d-1486-42a3-90e6-5be55039bc6f\/top-10-3.png\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2020\/05\/13\/6455792d-1486-42a3-90e6-5be55039bc6f\/top-10-3.png\" class alt=\"top-10-3.png\"><\/span><\/p>\n<p><\/noscript><\/p>\n<ul>\n<li>Vulnerable Products: Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1<\/li>\n<li>Associated Malware: JexBoss<\/li>\n<li>Mitigation: Upgrade to Struts 2.3.32 or Struts 2.5.10.1<\/li>\n<li>More Detail:\n<\/li>\n<\/ul>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\/\" class=\"lazy\" alt=\"top-10-4.png\" data-original=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/2020\/05\/13\/5d11abc6-7518-4dd9-9b57-2ced91be6c2d\/top-10-4.png\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/2020\/05\/13\/5d11abc6-7518-4dd9-9b57-2ced91be6c2d\/top-10-4.png\" class alt=\"top-10-4.png\"><\/span><\/p>\n<p><\/noscript><\/p>\n<ul>\n<li>Vulnerable Products: Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Office 2003 Web Components SP3; SQL Server 2000 SP4, 2005 SP4, and 2008 SP2, SP3, and R2; BizTalk Server 2002 SP1; Commerce Server 2002 SP4, 2007 SP2, and 2009 Gold and R2; Visual FoxPro 8.0 SP1 and 9.0 SP2; and Visual Basic 6.0<\/li>\n<li>Associated Malware: Dridex<\/li>\n<li>Mitigation: Update affected Microsoft products with the latest security patches<\/li>\n<li>More Detail:\n<\/li>\n<li>IOCs: <a href=\"https:\/\/www.us-cert.gov\/ncas\/analysis-reports\/ar20-133i\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">https:\/\/www.us-cert.gov\/ncas\/analysis-reports\/ar20-133i<\/a>, <a href=\"https:\/\/www.us-cert.gov\/ncas\/analysis-reports\/ar20-133j\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">https:\/\/www.us-cert.gov\/ncas\/analysis-reports\/ar20-133j<\/a>, <a href=\"https:\/\/www.us-cert.gov\/ncas\/analysis-reports\/ar20-133k\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">https:\/\/www.us-cert.gov\/ncas\/analysis-reports\/ar20-133k<\/a>, <a href=\"https:\/\/www.us-cert.gov\/ncas\/analysis-reports\/ar20-133l\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">https:\/\/www.us-cert.gov\/ncas\/analysis-reports\/ar20-133l<\/a>, <a href=\"https:\/\/www.us-cert.gov\/ncas\/analysis-reports\/ar20-133n\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">https:\/\/www.us-cert.gov\/ncas\/analysis-reports\/ar20-133n<\/a>, <a href=\"https:\/\/www.us-cert.gov\/ncas\/analysis-reports\/ar20-133o\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">https:\/\/www.us-cert.gov\/ncas\/analysis-reports\/ar20-133o<\/a><\/li>\n<\/ul>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\/\" class=\"lazy\" alt=\"top-10-5.png\" data-original=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2020\/05\/13\/b635dcce-11f2-44da-89e6-fe44120b869b\/top-10-5.png\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2020\/05\/13\/b635dcce-11f2-44da-89e6-fe44120b869b\/top-10-5.png\" class alt=\"top-10-5.png\"><\/span><\/p>\n<p><\/noscript><br \/>\n<span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\/\" class=\"lazy\" alt=\"top-10-6.png\" data-original=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2020\/05\/13\/c8da765b-794b-4c0c-b269-f51f94c089a0\/top-10-6.png\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2020\/05\/13\/c8da765b-794b-4c0c-b269-f51f94c089a0\/top-10-6.png\" class alt=\"top-10-6.png\"><\/span><\/p>\n<p><\/noscript><\/p>\n<ul>\n<li>Vulnerable Products: Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016<\/li>\n<li>Associated Malware: Multiple using the EternalSynergy and EternalBlue Exploit Kit<\/li>\n<li>Mitigation: Update affected Microsoft products with the latest security patches<\/li>\n<li>More Detail: <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-0143\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-0143<\/a><\/li>\n<\/ul>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\/\" class=\"lazy\" alt=\"top-10-7.png\" data-original=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2020\/05\/13\/89e1c007-f7c7-4a1c-861c-ba84623e44ad\/top-10-7.png\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2020\/05\/13\/89e1c007-f7c7-4a1c-861c-ba84623e44ad\/top-10-7.png\" class alt=\"top-10-7.png\"><\/span><\/p>\n<p><\/noscript><br \/>\n<span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\/\" class=\"lazy\" alt=\"top-10-8.png\" data-original=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2020\/05\/13\/ca93daf8-aa0c-41ab-9435-e3deccade649\/top-10-8.png\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2020\/05\/13\/ca93daf8-aa0c-41ab-9435-e3deccade649\/top-10-8.png\" class alt=\"top-10-8.png\"><\/span><\/p>\n<p><\/noscript><br \/>\n<span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\/\" class=\"lazy\" alt=\"top-10-9.png\" data-original=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2020\/05\/13\/348eb8e3-66d2-4e9f-a5a3-1a1d8cd0d793\/top-10-9.png\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2020\/05\/13\/348eb8e3-66d2-4e9f-a5a3-1a1d8cd0d793\/top-10-9.png\" class alt=\"top-10-9.png\"><\/span><\/p>\n<p><\/noscript><\/p>\n<ul>\n<li>Vulnerable Products: Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word for Mac 2011, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, and Office Web Apps Server 2010 SP2 and 2013 SP1<\/li>\n<li>Associated Malware: Toshliph, UWarrior<\/li>\n<li>Mitigation: Update affected Microsoft products with the latest security patches<\/li>\n<li>More Detail: <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2015-1641\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2015-1641<\/a><\/li>\n<li>IOCs: <a href=\"https:\/\/www.us-cert.gov\/ncas\/analysis-reports\/ar20-133m\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">https:\/\/www.us-cert.gov\/ncas\/analysis-reports\/ar20-133m<\/a><\/li>\n<\/ul>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\/\" class=\"lazy\" alt=\"top-10-10.png\" data-original=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2020\/05\/13\/b6296de3-4610-4c3f-967b-bfbaa5ebafdf\/top-10-10.png\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2020\/05\/13\/b6296de3-4610-4c3f-967b-bfbaa5ebafdf\/top-10-10.png\" class alt=\"top-10-10.png\"><\/span><\/p>\n<p><\/noscript><\/p>\n<ul>\n<li>Vulnerable Products: Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1<\/li>\n<li>Associated Malware: Kitty<\/li>\n<li>Mitigation: Upgrade to the most recent version of Drupal 7 or 8 core.<\/li>\n<li>More Detail: <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-7600\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-7600<\/a><\/li>\n<\/ul>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31205\/DHS-CISA-And-FBI-Share-List-Of-Top-10-Most-Exploited-Vulnerabilities.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":34958,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[8647],"class_list":["post-34957","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackergovernmentusaflawfbi"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DHS CISA And FBI Share List Of Top 10 Most Exploited Vulnerabilities 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DHS CISA And FBI Share List Of Top 10 Most Exploited Vulnerabilities 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-13T14:19:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities.png\" \/>\n\t<meta property=\"og:image:width\" content=\"863\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"DHS CISA And FBI Share List Of Top 10 Most Exploited Vulnerabilities\",\"datePublished\":\"2020-05-13T14:19:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\\\/\"},\"wordCount\":650,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities.png\",\"keywords\":[\"headline,hacker,government,usa,flaw,fbi\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\\\/\",\"name\":\"DHS CISA And FBI Share List Of Top 10 Most Exploited Vulnerabilities 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities.png\",\"datePublished\":\"2020-05-13T14:19:54+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities.png\",\"width\":863,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,government,usa,flaw,fbi\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackergovernmentusaflawfbi\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"DHS CISA And FBI Share List Of Top 10 Most Exploited Vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DHS CISA And FBI Share List Of Top 10 Most Exploited Vulnerabilities 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\/","og_locale":"en_US","og_type":"article","og_title":"DHS CISA And FBI Share List Of Top 10 Most Exploited Vulnerabilities 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-05-13T14:19:54+00:00","og_image":[{"width":863,"height":400,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"DHS CISA And FBI Share List Of Top 10 Most Exploited Vulnerabilities","datePublished":"2020-05-13T14:19:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\/"},"wordCount":650,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities.png","keywords":["headline,hacker,government,usa,flaw,fbi"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\/","url":"https:\/\/www.threatshub.org\/blog\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\/","name":"DHS CISA And FBI Share List Of Top 10 Most Exploited Vulnerabilities 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities.png","datePublished":"2020-05-13T14:19:54+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities.png","width":863,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/dhs-cisa-and-fbi-share-list-of-top-10-most-exploited-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,government,usa,flaw,fbi","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackergovernmentusaflawfbi\/"},{"@type":"ListItem","position":3,"name":"DHS CISA And FBI Share List Of Top 10 Most Exploited Vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34957","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=34957"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34957\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/34958"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=34957"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=34957"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=34957"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}