SlideShare a Scribd company logo
SecPod Labs Intelligence Series
2022 Annual Vulnerability
Report Insights
Webcasts
Host – Sakshi Dhiman
Veerendra GG and Pooja Shetty
Security Intelligence Team
TODAY’S
AGENDA 2023 Vulnerability Predictions
Questions and Answers
Top Vulnerabilities of 2022
02
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
SecPod’s Security Coverage
Annual Vulnerability Report
 Vulnerabilities Discovered January - December 2022
 Top Vulnerabilities
 Top Affected Products
 SecPod’s Security Coverage
 Key Insights and Predictions
03
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
Key Findings
From SecPod’s
Research
04
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
26288
Vulnerabilities
discovered in 2022
191
Vulnerabilities wildly
exploited
37
Zero Day Vulnerabilities
124
Malware Exploiting
Vulnerabilities
Vulnerability Trend 2022
05
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
Vulnerabilities
Discovered in 2022
06
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
Vulnerability
Severity
Distribution Based
on CVSSv3
07
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
Top 10 Affected
Operating Systems
08
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
Top 10 Affected
Applications
09
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
Top Vulnerabilities of 2022
01
0
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
Products Affected
 Remote PHP Code Execution
 Web shell deployment
 Remote access trojan (RAT)
Adobe Commerce versions
2.4.3-p1 and earlier and 2.3.7-
p2 and earlier
CVE ID
CVE-2022-24086
Unauthenticated Remote Code Execution in Adobe Commerce
11
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
Impact
Products Affected
 An authentication bypass
vulnerability allows remote code
execution.
Sophos Firewall v18.5 MR3
(18.5.3) and older
CVE ID
CVE-2022-1040
An Authentication Bypass Vulnerability in Sophos Firewall
12
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
Impact
Products Affected

 Once privilege escalation is
achieved attackers use it for further
deploying malware, accessing
confidential information.
 This could allow them to spread
laterally inside the network, create
new administrator users, and run
privileged command
 The vulnerability was under active
exploitation
Windows 10 1809 and above
including servers
CVE ID
CVE-2022-21882
Local Privilege Escalation Vulnerability in Microsoft Windows
13
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
Impact
Products Affected
 Type confusion vulnerability in
Apple's Webkit web browser
browsing engine. This bug was
actually reported and initially fixed
in 2013. In 2016 the fix was
regressed
 The vulnerability was under active
exploitation
Safari 15.3, iOS 15.3, macOS
12.2 and earlier
CVE ID
CVE-2022-42856
Type confusion vulnerability in Apple's Webkit web browser engine.
14
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
Impact
Products Affected
 StringSubstitutor interpolator is not
as widely used as the string
substitution in Log4j, which led to
Log4Shell.
 The severity is Critical due to the
easy exploitability and the huge
potential impacts in terms of
confidentiality, integrity and
availability.
Apache Commons Text Library
CVE ID
CVE-2022-42889
Text4shell RCE in String Substitutor interpolator class in Apache
Commons Text Library
15
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
Impact
Products Affected
 The issue results from the lack of
validating the existence of an object
prior to performing operations on
the object
Linux kernel: before 5.15.61
CVE ID
CVE-2022-47939
Linux Kernel ksmbd Critical Use-After-Free Remote Code Execution
Vulnerability
16
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
Impact
SecPod’s Security Intelligence Coverage in 2022
7
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
 Total CVEs Covered: 22597
 Zero-day CVEs Covered: 34
 CISA Vulnerability Coverage:
741/868
 Total Misconfigurations covered:
2938
 Total MVEs Covered: 124
Posture Anomaly Computation
Rules
 75+ rules to discover anomalies,
outliers, and aberrations in IT
infrastructure
Common Remediation Enumeration
(CRE) Coverage
 Application Patches: 1152
 Third-party patches: 802
 Misconfiguration patches: 2812
 OS Patches: All Latest Versions
CVE Coverage Based on
Platforms
 Windows: 1380
 Linux: 8074
 macOS: 2416
2022’s Milestones
18
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
24-30 hours is the average time taken to
support latest vulnerabilities
85% of Microsoft & Apple security advisories
were covered within 30 hours
100% of discovered Zero Days were covered
86.4% of the Zero days can be fixed using
SanerNow (except Mobile and Network devices)
1.1+ billion scans performed in 2022
99.999645%scan accuracy rate achieved
2023 Vulnerability
Predictions
19
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
QUESTIONS?
20
Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
ACHIEVE CYBER HYGIENE
TRY SANERNOW FREE
For enquiries, contact us at:
Email: info@secpod.com | Tech Support: support@secpod.com
Phone: (+1) 918 625 3023 (US) | (+91) 80 4121 4020 (IN)
WWW.SECPOD.COM
To request a free trial account, visit our website or email
us at info@secpod.com

More Related Content

PPTX
2022 December Patch Tuesday
PPTX
Mind the gap_cpx2022_moti_sagey_final
PDF
May Patch Tuesday
PDF
Français Patch Tuesday - Mai
PDF
Patch Tuesday Italia Luglio
PPTX
Uncovering Vulnerabilities Beyond Software Vulnerabilities
PPTX
How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?
PDF
Français Patch Tuesday - juillet
2022 December Patch Tuesday
Mind the gap_cpx2022_moti_sagey_final
May Patch Tuesday
Français Patch Tuesday - Mai
Patch Tuesday Italia Luglio
Uncovering Vulnerabilities Beyond Software Vulnerabilities
How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?
Français Patch Tuesday - juillet

Similar to Annual Vulnerability Report Insights - 2022 (20)

PDF
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
PPTX
How to Implement Organization Wide Cyber Hygiene?
PDF
July Patch Tuesday
PDF
Patch Tuesday de julio
PDF
Patch Tuesday Italia Settembre
PPTX
2023 May Patch Tuesday
PPTX
Analyse Patch Tuesday - mai
PPTX
How to securely manage endpoints using SanerNow
PDF
March Patch Tuesday
PDF
September Patch Tuesday
PDF
Français Patch Tuesday - Septembre
PDF
August Patch Tuesday
PDF
Français Patch Tuesday – Octobre
PDF
Patch Tuesday de Septiembre
PPTX
Cyber security course in Kerala , Kochi
PDF
Français Patch Tuesday - Mars
PDF
Computer Security by Paul Krzyzanowski 2022
PPTX
2023 Ottobre Patch Tuesday
PPTX
2023 Ottobre Patch Tuesday
PDF
2023 October Patch Tuesday
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
How to Implement Organization Wide Cyber Hygiene?
July Patch Tuesday
Patch Tuesday de julio
Patch Tuesday Italia Settembre
2023 May Patch Tuesday
Analyse Patch Tuesday - mai
How to securely manage endpoints using SanerNow
March Patch Tuesday
September Patch Tuesday
Français Patch Tuesday - Septembre
August Patch Tuesday
Français Patch Tuesday – Octobre
Patch Tuesday de Septiembre
Cyber security course in Kerala , Kochi
Français Patch Tuesday - Mars
Computer Security by Paul Krzyzanowski 2022
2023 Ottobre Patch Tuesday
2023 Ottobre Patch Tuesday
2023 October Patch Tuesday
Ad

More from SecPod (15)

PPTX
Cybersecurity Strategies for Effective Attack Surface Reduction
PPTX
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
PPTX
Align Your ITSM and SecOps Strategy for Unstoppable IT
PDF
Uncover Vulnerabilities Beyond Software Vulnerabilities
PPTX
ProxyLogon - MS Exchange Server Vulnerabilities - JS Edited.pptx
PPTX
How can SMEs combat cyberattacks through automated vulnerability management?
PPTX
Security automation architecture principles for effective vulnerability manag...
PPTX
How to Achieve NIST Compliance using SanerNow?
PPTX
How Mid Size Enterprises Can Automate Vulnerability Management and Prevent Cy...
PPTX
How to effectively monitor and manage IT assets in real-time using SanerNow
PPTX
How to implement security compliance with SanerNow
PPTX
The Art of Managing and Securing Endpoints with SanerNow Patch Management
PPTX
The Art of Managing and Securing Endpoints
PPTX
Cybersecurity Strategies for Effective Attack Surface Reduction
PPTX
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
Cybersecurity Strategies for Effective Attack Surface Reduction
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
Align Your ITSM and SecOps Strategy for Unstoppable IT
Uncover Vulnerabilities Beyond Software Vulnerabilities
ProxyLogon - MS Exchange Server Vulnerabilities - JS Edited.pptx
How can SMEs combat cyberattacks through automated vulnerability management?
Security automation architecture principles for effective vulnerability manag...
How to Achieve NIST Compliance using SanerNow?
How Mid Size Enterprises Can Automate Vulnerability Management and Prevent Cy...
How to effectively monitor and manage IT assets in real-time using SanerNow
How to implement security compliance with SanerNow
The Art of Managing and Securing Endpoints with SanerNow Patch Management
The Art of Managing and Securing Endpoints
Cybersecurity Strategies for Effective Attack Surface Reduction
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
Ad

Recently uploaded (20)

PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
sap open course for s4hana steps from ECC to s4
PDF
KodekX | Application Modernization Development
PDF
Electronic commerce courselecture one. Pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Spectroscopy.pptx food analysis technology
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Big Data Technologies - Introduction.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
cuic standard and advanced reporting.pdf
Unlocking AI with Model Context Protocol (MCP)
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
sap open course for s4hana steps from ECC to s4
KodekX | Application Modernization Development
Electronic commerce courselecture one. Pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
MYSQL Presentation for SQL database connectivity
Chapter 3 Spatial Domain Image Processing.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Programs and apps: productivity, graphics, security and other tools
The AUB Centre for AI in Media Proposal.docx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Spectral efficient network and resource selection model in 5G networks
Spectroscopy.pptx food analysis technology
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Big Data Technologies - Introduction.pptx
Network Security Unit 5.pdf for BCA BBA.
cuic standard and advanced reporting.pdf

Annual Vulnerability Report Insights - 2022

  • 1. SecPod Labs Intelligence Series 2022 Annual Vulnerability Report Insights Webcasts Host – Sakshi Dhiman Veerendra GG and Pooja Shetty Security Intelligence Team
  • 2. TODAY’S AGENDA 2023 Vulnerability Predictions Questions and Answers Top Vulnerabilities of 2022 02 Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY SecPod’s Security Coverage
  • 3. Annual Vulnerability Report  Vulnerabilities Discovered January - December 2022  Top Vulnerabilities  Top Affected Products  SecPod’s Security Coverage  Key Insights and Predictions 03 Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
  • 4. Key Findings From SecPod’s Research 04 Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY 26288 Vulnerabilities discovered in 2022 191 Vulnerabilities wildly exploited 37 Zero Day Vulnerabilities 124 Malware Exploiting Vulnerabilities
  • 5. Vulnerability Trend 2022 05 Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
  • 6. Vulnerabilities Discovered in 2022 06 Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
  • 7. Vulnerability Severity Distribution Based on CVSSv3 07 Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
  • 8. Top 10 Affected Operating Systems 08 Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
  • 9. Top 10 Affected Applications 09 Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
  • 10. Top Vulnerabilities of 2022 01 0 Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
  • 11. Products Affected  Remote PHP Code Execution  Web shell deployment  Remote access trojan (RAT) Adobe Commerce versions 2.4.3-p1 and earlier and 2.3.7- p2 and earlier CVE ID CVE-2022-24086 Unauthenticated Remote Code Execution in Adobe Commerce 11 Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY Impact
  • 12. Products Affected  An authentication bypass vulnerability allows remote code execution. Sophos Firewall v18.5 MR3 (18.5.3) and older CVE ID CVE-2022-1040 An Authentication Bypass Vulnerability in Sophos Firewall 12 Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY Impact
  • 13. Products Affected   Once privilege escalation is achieved attackers use it for further deploying malware, accessing confidential information.  This could allow them to spread laterally inside the network, create new administrator users, and run privileged command  The vulnerability was under active exploitation Windows 10 1809 and above including servers CVE ID CVE-2022-21882 Local Privilege Escalation Vulnerability in Microsoft Windows 13 Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY Impact
  • 14. Products Affected  Type confusion vulnerability in Apple's Webkit web browser browsing engine. This bug was actually reported and initially fixed in 2013. In 2016 the fix was regressed  The vulnerability was under active exploitation Safari 15.3, iOS 15.3, macOS 12.2 and earlier CVE ID CVE-2022-42856 Type confusion vulnerability in Apple's Webkit web browser engine. 14 Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY Impact
  • 15. Products Affected  StringSubstitutor interpolator is not as widely used as the string substitution in Log4j, which led to Log4Shell.  The severity is Critical due to the easy exploitability and the huge potential impacts in terms of confidentiality, integrity and availability. Apache Commons Text Library CVE ID CVE-2022-42889 Text4shell RCE in String Substitutor interpolator class in Apache Commons Text Library 15 Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY Impact
  • 16. Products Affected  The issue results from the lack of validating the existence of an object prior to performing operations on the object Linux kernel: before 5.15.61 CVE ID CVE-2022-47939 Linux Kernel ksmbd Critical Use-After-Free Remote Code Execution Vulnerability 16 Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY Impact
  • 17. SecPod’s Security Intelligence Coverage in 2022 7 Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY  Total CVEs Covered: 22597  Zero-day CVEs Covered: 34  CISA Vulnerability Coverage: 741/868  Total Misconfigurations covered: 2938  Total MVEs Covered: 124 Posture Anomaly Computation Rules  75+ rules to discover anomalies, outliers, and aberrations in IT infrastructure Common Remediation Enumeration (CRE) Coverage  Application Patches: 1152  Third-party patches: 802  Misconfiguration patches: 2812  OS Patches: All Latest Versions CVE Coverage Based on Platforms  Windows: 1380  Linux: 8074  macOS: 2416
  • 18. 2022’s Milestones 18 Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY 24-30 hours is the average time taken to support latest vulnerabilities 85% of Microsoft & Apple security advisories were covered within 30 hours 100% of discovered Zero Days were covered 86.4% of the Zero days can be fixed using SanerNow (except Mobile and Network devices) 1.1+ billion scans performed in 2022 99.999645%scan accuracy rate achieved
  • 19. 2023 Vulnerability Predictions 19 Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
  • 20. QUESTIONS? 20 Copyright © 2008 - 2022 SecPod Technologies - AUTHORISED USE ONLY
  • 21. ACHIEVE CYBER HYGIENE TRY SANERNOW FREE For enquiries, contact us at: Email: info@secpod.com | Tech Support: support@secpod.com Phone: (+1) 918 625 3023 (US) | (+91) 80 4121 4020 (IN) WWW.SECPOD.COM To request a free trial account, visit our website or email us at info@secpod.com