{"id":48795,"date":"2022-10-07T11:35:12","date_gmt":"2022-10-07T11:35:12","guid":{"rendered":"http:\/\/2ea9f1ca-7a2e-458a-aa79-18bfeb3072af"},"modified":"2022-10-07T11:35:12","modified_gmt":"2022-10-07T11:35:12","slug":"nsa-fbi-warning-beware-these-20-software-flaws-most-used-by-hackers","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/nsa-fbi-warning-beware-these-20-software-flaws-most-used-by-hackers\/","title":{"rendered":"NSA, FBI warning: Beware these 20 software flaws most used by hackers"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/7b1f6910bdbc3dbe1407ff0406451e77458cd986\/2022\/07\/29\/2d06a8d2-1505-437a-8aca-694590c19c18\/a-man-looking-at-his-laptop-with-concern.jpg?auto=webp&amp;width=768\" alt=\"a-man-looking-at-his-laptop-with-concern\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/10dc1c7100605d51f6a19a588ccbb3b7084ac472\/2022\/07\/29\/2d06a8d2-1505-437a-8aca-694590c19c18\/a-man-looking-at-his-laptop-with-concern.jpg?auto=webp&amp;width=1024\" alt=\"a-man-looking-at-his-laptop-with-concern\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/ce27145f97e5f88f42e36027c99faac322a30eb2\/2022\/07\/29\/2d06a8d2-1505-437a-8aca-694590c19c18\/a-man-looking-at-his-laptop-with-concern.jpg?auto=webp&amp;width=1200\" alt=\"a-man-looking-at-his-laptop-with-concern\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/ce27145f97e5f88f42e36027c99faac322a30eb2\/2022\/07\/29\/2d06a8d2-1505-437a-8aca-694590c19c18\/a-man-looking-at-his-laptop-with-concern.jpg?auto=webp&amp;width=1200\" alt=\"a-man-looking-at-his-laptop-with-concern\" height=\"800.7550731477112\" width=\"1200\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----><\/div>\n<p> <!----><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Image: Getty\/Deagreez<\/span><\/figcaption><\/figure>\n<p>The National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) have listed the top 20 software flaws that China-funded hackers have been using to compromise networks since 2020.&nbsp;<\/p>\n<p>The <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-279a\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">advisory<\/a> emphasizes that China-backed hackers actively target not just the networks of the US government and its allies but also software and hardware companies in the supply chain to steal intellectual property and gain access to sensitive networks. These hackers are an active threat to the IT and telecoms sector, the defense industrial base, and critical infrastructure owners and operators.&nbsp;<\/p>\n<p>&#8220;NSA, CISA, and FBI continue to assess [People&#8217;s Republic of China] PRC state-sponsored cyber activities as being one of the largest and most dynamic threats to U.S. government and civilian networks,&#8221; they note.&nbsp;<\/p>\n<p><strong>Also: <\/strong><a href=\"https:\/\/www.zdnet.com\/article\/white-house-warns-do-these-8-things-now-to-boost-your-security-ahead-of-potential-russian-cyberattacks\/\" rel=\"follow\">White House warns: Do these 8 things now to boost your security ahead of potential Russian cyberattacks<\/a><\/p>\n<p>CISA this week <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-277a\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">disclosed<\/a> that several state-backed hacking groups were active on defense industrial base enterprise networks after gaining access through their Microsoft Exchange Server infrastructure from around mid-January 2021. Exchange Server is <a href=\"https:\/\/www.zdnet.com\/article\/microsoft-new-exchange-server-zero-days-already-used-in-attacks-expect-more-to-come\/\" rel=\"follow\">now under attack by newly discovered flaws<\/a> similar to last year&#8217;s ProxyShell.<\/p>\n<p>Among the top 20 flaws used by China-backed hackers are four Microsoft Exchange Server flaws: CVE-2021-26855, a remote code execution bug, as well&nbsp;<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-26857\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">CVE-2021-26857<\/a>,&nbsp;<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-26858\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">CVE-2021-26858<\/a>, and&nbsp;<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-27065\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">CVE-2021-27065<\/a>. These are all part of the the Exchange Server ProxyLogon pre-authentication vulnerabilities disclosed in 2021. &nbsp;&nbsp;<\/p>\n<p>Microsoft in July warned these bugs&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/microsoft-warns-of-stealthy-backdoors-used-to-target-exchange-servers-email\/\" rel=\"follow\">were being used<\/a> in combination with malware tailored for networks using Microsoft&#8217;s Internet Information Services (IIS) web server to host Outlook on the web.&nbsp;<\/p>\n<p>Other commonly used flaws include those in Apache Log4Shell, and flaws in code-hosting site GitLab, F5&#8217;s network gear, VPN endpoints, and popular server products from VMware, Cisco, and Citrix.&nbsp;<\/p>\n<p>All the bugs are publicly known and present a risk for organizations that haven&#8217;t applied available firmware and software updates.&nbsp;<\/p>\n<p>The GitLab and <a href=\"https:\/\/www.zdnet.com\/article\/us-cybercom-says-mass-exploitation-of-atlassian-confluence-vulnerability-ongoing-and-expected-to-accelerate\/\" rel=\"follow\">Atlassian Confluence bugs<\/a> stand out as examples of hackers targeting developer and IT operations tools.&nbsp; &nbsp;<\/p>\n<p>&#8220;These state-sponsored actors continue to use virtual private networks (VPNs) to obfuscate their activities and target web-facing applications to establish initial access,&#8221; CISA notes.&nbsp;<\/p>\n<p>Many of the top 20 vulnerabilities &#8220;allow the actors to surreptitiously gain unauthorized access into sensitive networks, after which they seek to establish persistence and move laterally to other internally connected networks,&#8221; it added.&nbsp;<\/p>\n<p>The agencies recommend patching systems, using multi-factor authentication, disabling unused protocols at the network edge, ditching end-of-life devices, adopting a model that trusts no person, device or app, and enabling logging of internet-facing systems. &nbsp;<\/p>\n<p>The top flaws used since 2020 are listed in the table below.<\/p>\n<table>\n<tbody readability=\"2\">\n<tr>\n<td>\n<p><strong>Vendor<\/strong><\/p>\n<\/td>\n<td>\n<p><strong>CVE<\/strong><\/p>\n<\/td>\n<td>\n<p><strong>Vulnerability Type<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p>Apache Log4j<\/p>\n<\/td>\n<td>\n<p>CVE-2021-44228<\/p>\n<\/td>\n<td>\n<p>Remote Code Execution<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p>Pulse Connect Secure<\/p>\n<\/td>\n<td>\n<p>CVE-2019-11510<\/p>\n<\/td>\n<td>\n<p>Arbitrary File Read<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p>GitLab CE\/EE<\/p>\n<\/td>\n<td>\n<p>CVE-2021-22205<\/p>\n<\/td>\n<td>\n<p>Remote Code Execution<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p>Atlassian<\/p>\n<\/td>\n<td>\n<p>CVE-2022-26134<\/p>\n<\/td>\n<td>\n<p>Remote Code Execution<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p>Microsoft Exchange<\/p>\n<\/td>\n<td>\n<p>CVE-2021-26855<\/p>\n<\/td>\n<td>\n<p>Remote Code Execution<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p>F5 Big-IP<\/p>\n<\/td>\n<td>\n<p>CVE-2020-5902<\/p>\n<\/td>\n<td>\n<p>Remote Code Execution<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p>VMware vCenter Server<\/p>\n<\/td>\n<td>\n<p>CVE-2021-22005<\/p>\n<\/td>\n<td>\n<p>Arbitrary File Upload&nbsp;<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p>Citrix ADC<\/p>\n<\/td>\n<td>\n<p>CVE-2019-19781<\/p>\n<\/td>\n<td>\n<p>Path Traversal<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p>Cisco Hyperflex<\/p>\n<\/td>\n<td>\n<p>CVE-2021-1497<\/p>\n<\/td>\n<td>\n<p>Command Line Execution<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p>Buffalo WSR<\/p>\n<\/td>\n<td>\n<p>CVE-2021-20090<\/p>\n<\/td>\n<td>\n<p>Relative Path Traversal<\/p>\n<\/td>\n<\/tr>\n<tr readability=\"3\">\n<td readability=\"5\">\n<p>Atlassian Confluence Server and Data Center<\/p>\n<\/td>\n<td>\n<p>CVE-2021-26084<\/p>\n<\/td>\n<td>\n<p>Remote Code Execution<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p>Hikvision Webserver<\/p>\n<\/td>\n<td>\n<p>CVE-2021-36260<\/p>\n<\/td>\n<td>\n<p>Command Injection<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p>Sitecore XP<\/p>\n<\/td>\n<td>\n<p>CVE-2021-42237<\/p>\n<\/td>\n<td>\n<p>Remote Code Execution<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p>F5 Big-IP<\/p>\n<\/td>\n<td>\n<p>CVE-2022-1388<\/p>\n<\/td>\n<td>\n<p>Remote Code Execution<\/p>\n<\/td>\n<\/tr>\n<tr readability=\"3\">\n<td>\n<p>Apache<\/p>\n<\/td>\n<td>\n<p>CVE-2022-24112<\/p>\n<\/td>\n<td readability=\"5\">\n<p>Authentication Bypass by Spoofing<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p>ZOHO<\/p>\n<\/td>\n<td>\n<p>CVE-2021-40539<\/p>\n<\/td>\n<td>\n<p>Remote Code Execution<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p>Microsoft<\/p>\n<\/td>\n<td>\n<p>CVE-2021-26857<\/p>\n<\/td>\n<td>\n<p>Remote Code Execution<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p>Microsoft<\/p>\n<\/td>\n<td>\n<p>CVE-2021-26858<\/p>\n<\/td>\n<td>\n<p>Remote Code Execution<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p>Microsoft<\/p>\n<\/td>\n<td>\n<p>CVE-2021-27065<\/p>\n<\/td>\n<td>\n<p>Remote Code Execution<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p>Apache HTTP Server<\/p>\n<\/td>\n<td>\n<p>CVE-2021-41773<\/p>\n<\/td>\n<td>\n<p>Path Traversal<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/nsa-fbi-warning-beware-these-20-software-flaws-most-used-by-hackers\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>China-backed hackers like to use these flaws, so you need to make sure they are patched, says FBI, NSA and CISA.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-48795","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NSA, FBI warning: Beware these 20 software flaws most used by hackers 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/nsa-fbi-warning-beware-these-20-software-flaws-most-used-by-hackers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NSA, FBI warning: Beware these 20 software flaws most used by hackers 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/nsa-fbi-warning-beware-these-20-software-flaws-most-used-by-hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-07T11:35:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/ce27145f97e5f88f42e36027c99faac322a30eb2\/2022\/07\/29\/2d06a8d2-1505-437a-8aca-694590c19c18\/a-man-looking-at-his-laptop-with-concern.jpg?auto=webp&amp;width=1200\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-fbi-warning-beware-these-20-software-flaws-most-used-by-hackers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-fbi-warning-beware-these-20-software-flaws-most-used-by-hackers\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"NSA, FBI warning: Beware these 20 software flaws most used by hackers\",\"datePublished\":\"2022-10-07T11:35:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-fbi-warning-beware-these-20-software-flaws-most-used-by-hackers\\\/\"},\"wordCount\":618,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-fbi-warning-beware-these-20-software-flaws-most-used-by-hackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/ce27145f97e5f88f42e36027c99faac322a30eb2\\\/2022\\\/07\\\/29\\\/2d06a8d2-1505-437a-8aca-694590c19c18\\\/a-man-looking-at-his-laptop-with-concern.jpg?auto=webp&amp;width=1200\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-fbi-warning-beware-these-20-software-flaws-most-used-by-hackers\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-fbi-warning-beware-these-20-software-flaws-most-used-by-hackers\\\/\",\"name\":\"NSA, FBI warning: Beware these 20 software flaws most used by hackers 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-fbi-warning-beware-these-20-software-flaws-most-used-by-hackers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-fbi-warning-beware-these-20-software-flaws-most-used-by-hackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/ce27145f97e5f88f42e36027c99faac322a30eb2\\\/2022\\\/07\\\/29\\\/2d06a8d2-1505-437a-8aca-694590c19c18\\\/a-man-looking-at-his-laptop-with-concern.jpg?auto=webp&amp;width=1200\",\"datePublished\":\"2022-10-07T11:35:12+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-fbi-warning-beware-these-20-software-flaws-most-used-by-hackers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-fbi-warning-beware-these-20-software-flaws-most-used-by-hackers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-fbi-warning-beware-these-20-software-flaws-most-used-by-hackers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/ce27145f97e5f88f42e36027c99faac322a30eb2\\\/2022\\\/07\\\/29\\\/2d06a8d2-1505-437a-8aca-694590c19c18\\\/a-man-looking-at-his-laptop-with-concern.jpg?auto=webp&amp;width=1200\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/ce27145f97e5f88f42e36027c99faac322a30eb2\\\/2022\\\/07\\\/29\\\/2d06a8d2-1505-437a-8aca-694590c19c18\\\/a-man-looking-at-his-laptop-with-concern.jpg?auto=webp&amp;width=1200\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-fbi-warning-beware-these-20-software-flaws-most-used-by-hackers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NSA, FBI warning: Beware these 20 software flaws most used by hackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NSA, FBI warning: Beware these 20 software flaws most used by hackers 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/nsa-fbi-warning-beware-these-20-software-flaws-most-used-by-hackers\/","og_locale":"en_US","og_type":"article","og_title":"NSA, FBI warning: Beware these 20 software flaws most used by hackers 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/nsa-fbi-warning-beware-these-20-software-flaws-most-used-by-hackers\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-10-07T11:35:12+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/ce27145f97e5f88f42e36027c99faac322a30eb2\/2022\/07\/29\/2d06a8d2-1505-437a-8aca-694590c19c18\/a-man-looking-at-his-laptop-with-concern.jpg?auto=webp&amp;width=1200","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/nsa-fbi-warning-beware-these-20-software-flaws-most-used-by-hackers\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/nsa-fbi-warning-beware-these-20-software-flaws-most-used-by-hackers\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"NSA, FBI warning: Beware these 20 software flaws most used by hackers","datePublished":"2022-10-07T11:35:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/nsa-fbi-warning-beware-these-20-software-flaws-most-used-by-hackers\/"},"wordCount":618,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/nsa-fbi-warning-beware-these-20-software-flaws-most-used-by-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/ce27145f97e5f88f42e36027c99faac322a30eb2\/2022\/07\/29\/2d06a8d2-1505-437a-8aca-694590c19c18\/a-man-looking-at-his-laptop-with-concern.jpg?auto=webp&amp;width=1200","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/nsa-fbi-warning-beware-these-20-software-flaws-most-used-by-hackers\/","url":"https:\/\/www.threatshub.org\/blog\/nsa-fbi-warning-beware-these-20-software-flaws-most-used-by-hackers\/","name":"NSA, FBI warning: Beware these 20 software flaws most used by hackers 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/nsa-fbi-warning-beware-these-20-software-flaws-most-used-by-hackers\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/nsa-fbi-warning-beware-these-20-software-flaws-most-used-by-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/ce27145f97e5f88f42e36027c99faac322a30eb2\/2022\/07\/29\/2d06a8d2-1505-437a-8aca-694590c19c18\/a-man-looking-at-his-laptop-with-concern.jpg?auto=webp&amp;width=1200","datePublished":"2022-10-07T11:35:12+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/nsa-fbi-warning-beware-these-20-software-flaws-most-used-by-hackers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/nsa-fbi-warning-beware-these-20-software-flaws-most-used-by-hackers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/nsa-fbi-warning-beware-these-20-software-flaws-most-used-by-hackers\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/ce27145f97e5f88f42e36027c99faac322a30eb2\/2022\/07\/29\/2d06a8d2-1505-437a-8aca-694590c19c18\/a-man-looking-at-his-laptop-with-concern.jpg?auto=webp&amp;width=1200","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/ce27145f97e5f88f42e36027c99faac322a30eb2\/2022\/07\/29\/2d06a8d2-1505-437a-8aca-694590c19c18\/a-man-looking-at-his-laptop-with-concern.jpg?auto=webp&amp;width=1200"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/nsa-fbi-warning-beware-these-20-software-flaws-most-used-by-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"NSA, FBI warning: Beware these 20 software flaws most used by hackers"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48795","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=48795"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48795\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=48795"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=48795"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=48795"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}