{"id":18907,"date":"2021-08-02T20:34:04","date_gmt":"2021-08-02T23:34:04","guid":{"rendered":"https:\/\/www.ethicalhacker.com.br\/site\/?p=18907"},"modified":"2021-08-02T21:17:57","modified_gmt":"2021-08-03T00:17:57","slug":"30-principais-vulnerabilidades-criticas-de-seguranca-mais-exploradas-por-hackers","status":"publish","type":"post","link":"https:\/\/www.ethicalhacker.com.br\/site\/2021\/08\/exploits\/30-principais-vulnerabilidades-criticas-de-seguranca-mais-exploradas-por-hackers\/","title":{"rendered":"As 30 principais vulnerabilidades cr\u00edticas de seguran\u00e7a mais exploradas por hackers"},"content":{"rendered":"\n<p style=\"text-align: justify;\"><span class=\"\">Ag\u00eancias de intelig\u00eancia na Austr\u00e1lia, no Reino Unido e nos EUA emitiram um comunicado conjunto na quarta-feira detalhando as vulnerabilidades mais exploradas em 2020 e 2021, mais uma vez demonstrando como os agentes de amea\u00e7as s\u00e3o capazes de transformar rapidamente as falhas divulgadas publicamente em suas vantagens.<\/span><\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\"><span class=\"goog-text-highlight\">&#8220;Os cibern\u00e9ticos continuam a explorar vulnerabilidades de software publicamente conhecidas e muitas vezes datadas\u00a0 contra amplos conjuntos de alvos, incluindo organiza\u00e7\u00f5es do setor p\u00fablico e privado em todo o mundo&#8221;, a Ag\u00eancia de Seguran\u00e7a de Infraestrutura e Ciberseguran\u00e7a dos EUA (CISA), o Australian Cyber \u200b\u200bSecurity Center (ACSC), <\/span><span class=\"goog-text-highlight\">o National Cyber \u200b\u200bSecurity Center (NCSC) do Reino Unido e o Federal Bureau of Investigation (FBI) dos Estados Unidos <\/span><span class=\"goog-text-highlight\">.<\/span><\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\">&#8220;No entanto, entidades em todo o mundo podem mitigar as vulnerabilidades listadas neste relat\u00f3rio aplicando os patches dispon\u00edveis em seus sistemas e implementando um sistema de gerenciamento de patches centralizado.&#8221;<\/p>\n<p>\u00a0<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" title=\"Security Vulnerabilities\" src=\"https:\/\/thehackernews.com\/images\/-_sUoUckANJU\/YQJlBsicySI\/AAAAAAAADX0\/BEDLvJhwqzYImk1o5ewZhnKeXxnoL0D0wCLcBGAsYHQ\/s728-e1000\/Security-Vulnerabilities.jpg\" alt=\"Security Vulnerabilities\" width=\"565\" height=\"295\" border=\"0\" data-original-height=\"380\" data-original-width=\"728\" \/><\/p>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\"><span class=\"\">As 30 principais vulnerabilidades abrangem uma ampla gama de software, incluindo trabalho remoto, redes privadas virtuais (VPNs) e tecnologias baseadas em nuvem, que cobrem um amplo espectro de produtos da Microsoft, VMware, Pulse Secure, Fortinet, Accellion, Citrix, F5 Big IP, Atlassian e Drupal.<\/span><\/p>\n<div class=\"ad_two clear\" style=\"text-align: justify;\"><center class=\"cf\">\n<p>\u00a0<\/p>\n<p style=\"text-align: left;\">As falhas mais rotineiramente exploradas em 2020 s\u00e3o as seguintes :<\/p>\n<ul>\n<li style=\"text-align: left;\"><a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=pt&amp;ajax=1&amp;elem=1&amp;se=1&amp;u=https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-19781\" target=\"_blank\" rel=\"noopener\"><strong><span class=\"\">CVE-2019-19781<\/span><\/strong><\/a><span class=\"\"> (pontua\u00e7\u00e3o CVSS: 9,8) &#8211; Citrix Application Delivery Controller (ADC) e vulnerabilidade de passagem de diret\u00f3rio de gateway;<\/span><\/li>\n<li style=\"text-align: left;\"><a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=pt&amp;ajax=1&amp;elem=1&amp;se=1&amp;u=https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-11510\" target=\"_blank\" rel=\"noopener\"><strong><span class=\"\">CVE-2019-11510<\/span><\/strong><\/a><span class=\"\"> (pontua\u00e7\u00e3o CVSS: 10.0) &#8211; Vulnerabilidade de leitura de arquivo arbitr\u00e1rio do Pulse Connect Secure;<\/span><\/li>\n<li style=\"text-align: left;\"><a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=pt&amp;ajax=1&amp;elem=1&amp;se=1&amp;u=https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-13379\" target=\"_blank\" rel=\"noopener\"><strong>CVE-2018-13379<\/strong><\/a> (pontua\u00e7\u00e3o CVSS: 9,8) &#8211; Vulnerabilidade de passagem de caminho Fortinet FortiOS levando a vazamento de arquivo do sistema;<\/li>\n<li style=\"text-align: left;\"><a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=pt&amp;ajax=1&amp;elem=1&amp;se=1&amp;u=https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-5902\" target=\"_blank\" rel=\"noopener\"><strong>CVE-2020-5902<\/strong><\/a> (pontua\u00e7\u00e3o CVSS: 9,8) &#8211; Vulnerabilidade de execu\u00e7\u00e3o remota de c\u00f3digo F5 BIG-IP;<\/li>\n<li style=\"text-align: left;\"><a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=pt&amp;ajax=1&amp;elem=1&amp;se=1&amp;u=https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-15505\" target=\"_blank\" rel=\"noopener\"><strong>CVE-2020-15505<\/strong><\/a> (pontua\u00e7\u00e3o CVSS: 9,8) &#8211; Vulnerabilidade de execu\u00e7\u00e3o remota de c\u00f3digo MobileIron Core &amp; Connector;<\/li>\n<li style=\"text-align: left;\"><a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=pt&amp;ajax=1&amp;elem=1&amp;se=1&amp;u=https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-0688\" target=\"_blank\" rel=\"noopener\"><strong>CVE-2020-0688<\/strong><\/a> (pontua\u00e7\u00e3o CVSS: 8.8) &#8211; Vulnerabilidade de corrup\u00e7\u00e3o de mem\u00f3ria do Microsoft Exchange;<\/li>\n<li style=\"text-align: left;\"><a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=pt&amp;ajax=1&amp;elem=1&amp;se=1&amp;u=https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-3396\" target=\"_blank\" rel=\"noopener\"><strong>CVE-2019-3396<\/strong><\/a> (pontua\u00e7\u00e3o CVSS: 9,8) &#8211; Vulnerabilidade de execu\u00e7\u00e3o remota de c\u00f3digo do Atlassian Confluence Server;<\/li>\n<li style=\"text-align: left;\"><a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=pt&amp;ajax=1&amp;elem=1&amp;se=1&amp;u=https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-11882\" target=\"_blank\" rel=\"noopener\"><strong>CVE-2017-11882<\/strong><\/a> (pontua\u00e7\u00e3o CVSS: 7,8) &#8211; Vulnerabilidade de corrup\u00e7\u00e3o de mem\u00f3ria do Microsoft Office;<\/li>\n<li style=\"text-align: left;\"><a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=pt&amp;ajax=1&amp;elem=1&amp;se=1&amp;u=https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-11580\" target=\"_blank\" rel=\"noopener\"><strong>CVE-2019-11580<\/strong><\/a> (pontua\u00e7\u00e3o CVSS: 9,8) &#8211; vulnerabilidade de execu\u00e7\u00e3o remota de c\u00f3digo do Atlassian Crowd e Crowd Data Center;<\/li>\n<li style=\"text-align: left;\"><a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=pt&amp;ajax=1&amp;elem=1&amp;se=1&amp;u=https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-7600\" target=\"_blank\" rel=\"noopener\"><strong>CVE-2018-7600<\/strong><\/a> (pontua\u00e7\u00e3o CVSS: 9,8) &#8211; Vulnerabilidade de execu\u00e7\u00e3o remota de c\u00f3digo Drupal;<\/li>\n<li style=\"text-align: left;\"><a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=pt&amp;ajax=1&amp;elem=1&amp;se=1&amp;u=https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-18935\" target=\"_blank\" rel=\"noopener\"><strong>CVE-2019-18935<\/strong><\/a> (pontua\u00e7\u00e3o CVSS: 9.8) &#8211; Vulnerabilidade de desserializa\u00e7\u00e3o do Telerik .NET resultando em execu\u00e7\u00e3o remota de c\u00f3digo;<\/li>\n<li style=\"text-align: left;\"><a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=pt&amp;ajax=1&amp;elem=1&amp;se=1&amp;u=https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-0604\" target=\"_blank\" rel=\"noopener\"><strong>CVE-2019-0604<\/strong><\/a> (pontua\u00e7\u00e3o CVSS: 9.8) &#8211; Vulnerabilidade de execu\u00e7\u00e3o remota de c\u00f3digo do Microsoft SharePoint;<\/li>\n<li style=\"text-align: left;\"><a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=pt&amp;ajax=1&amp;elem=1&amp;se=1&amp;u=https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-0787\" target=\"_blank\" rel=\"noopener\"><strong>CVE-2020-0787<\/strong><\/a> (pontua\u00e7\u00e3o CVSS: 7,8) &#8211; Vulnerabilidade de eleva\u00e7\u00e3o de privil\u00e9gio do Windows Background;Intelligent Transfer Service (BITS);<\/li>\n<li style=\"text-align: left;\"><a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=pt&amp;ajax=1&amp;elem=1&amp;se=1&amp;u=https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-1472\" target=\"_blank\" rel=\"noopener\"><strong>CVE-2020-1472<\/strong><\/a> (pontua\u00e7\u00e3o CVSS: 10.0) -Vulnerabilidade de eleva\u00e7\u00e3o de privil\u00e9gio do Windows Netlogon.<\/li>\n<li>\u00a0<\/li>\n<\/ul>\n<div class=\"ad_two clear\"><center>\n<p style=\"text-align: left;\">A lista de vulnerabilidades que estiveram sob ataque ativo at\u00e9 agora em 2021 est\u00e1 listada abaixo:<\/p>\n<ul style=\"text-align: left;\">\n<li><a href=\"https:\/\/thehackernews-com.translate.goog\/2021\/03\/urgent-4-actively-exploited-0-day-flaws.html?_x_tr_sl=auto&amp;_x_tr_tl=pt&amp;_x_tr_hl=pt&amp;_x_tr_pto=ajax,elem\" target=\"_blank\" rel=\"noopener\">Microsoft Exchange Server<\/a> : <a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=pt&amp;ajax=1&amp;elem=1&amp;se=1&amp;u=https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-26855\" target=\"_blank\" rel=\"noopener\">CVE-2021-26855<\/a> , <a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=pt&amp;ajax=1&amp;elem=1&amp;se=1&amp;u=https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-26857\" target=\"_blank\" rel=\"noopener\">CVE-2021-26857<\/a> , <a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=pt&amp;ajax=1&amp;elem=1&amp;se=1&amp;u=https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-26858\" target=\"_blank\" rel=\"noopener\">CVE-2021-26858<\/a> e <a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=pt&amp;ajax=1&amp;elem=1&amp;se=1&amp;u=https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-27065\" target=\"_blank\" rel=\"noopener\">CVE-2021-27065<\/a> (tamb\u00e9m conhecido como &#8220;ProxyLogon&#8221;);<\/li>\n<li><a href=\"https:\/\/thehackernews-com.translate.goog\/2021\/05\/new-high-severity-vulnerability.html?_x_tr_sl=auto&amp;_x_tr_tl=pt&amp;_x_tr_hl=pt&amp;_x_tr_pto=ajax,elem\" target=\"_blank\" rel=\"noopener\">Pulse segure<\/a> : <a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=pt&amp;ajax=1&amp;elem=1&amp;se=1&amp;u=https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-22893\" target=\"_blank\" rel=\"noopener\">CVE-2021-22893<\/a> , <a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=pt&amp;ajax=1&amp;elem=1&amp;se=1&amp;u=https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-22894\" target=\"_blank\" rel=\"noopener\">CVE-2021-22894<\/a> , <a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=pt&amp;ajax=1&amp;elem=1&amp;se=1&amp;u=https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-22899\" target=\"_blank\" rel=\"noopener\">CVE-2021-22899<\/a> e <a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=pt&amp;ajax=1&amp;elem=1&amp;se=1&amp;u=https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-22900\" target=\"_blank\" rel=\"noopener\">CVE-2021-22900;<\/a><\/li>\n<li><a href=\"https:\/\/thehackernews-com.translate.goog\/2021\/03\/extortion-gang-breaches-cybersecurity.html?_x_tr_sl=auto&amp;_x_tr_tl=pt&amp;_x_tr_hl=pt&amp;_x_tr_pto=ajax,elem\" target=\"_blank\" rel=\"noopener\">Accellion<\/a> : <a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=pt&amp;ajax=1&amp;elem=1&amp;se=1&amp;u=https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-27101\" target=\"_blank\" rel=\"noopener\">CVE-2021-27101<\/a> , <a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=pt&amp;ajax=1&amp;elem=1&amp;se=1&amp;u=https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-27102\" target=\"_blank\" rel=\"noopener\">CVE-2021-27102<\/a> , <a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=pt&amp;ajax=1&amp;elem=1&amp;se=1&amp;u=https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-27103\" target=\"_blank\" rel=\"noopener\">CVE-2021-27103<\/a> e <a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=pt&amp;ajax=1&amp;elem=1&amp;se=1&amp;u=https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-27104\" target=\"_blank\" rel=\"noopener\">CVE-2021-27104;<\/a><\/li>\n<li><a href=\"https:\/\/thehackernews-com.translate.goog\/2021\/06\/alert-critical-rce-bug-in-vmware.html?_x_tr_sl=auto&amp;_x_tr_tl=pt&amp;_x_tr_hl=pt&amp;_x_tr_pto=ajax,elem\" target=\"_blank\" rel=\"noopener\">VMware<\/a> : <a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=pt&amp;ajax=1&amp;elem=1&amp;se=1&amp;u=https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-21985\" target=\"_blank\" rel=\"noopener\">CVE-2021-21985;<\/a><\/li>\n<li style=\"text-align: justify;\">Fortinet: <a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=pt&amp;ajax=1&amp;elem=1&amp;se=1&amp;u=https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-13379\" target=\"_blank\" rel=\"noopener\">CVE-2018-13379<\/a> , <a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=pt&amp;ajax=1&amp;elem=1&amp;se=1&amp;u=https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-12812\" target=\"_blank\" rel=\"noopener\">CVE-2020-12812<\/a> e <a href=\"https:\/\/translate.google.com\/website?sl=auto&amp;tl=pt&amp;ajax=1&amp;elem=1&amp;se=1&amp;u=https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-5591\" target=\"_blank\" rel=\"noopener\">CVE-2019-5591.<\/a><\/li>\n<\/ul>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\">O desenvolvimento tamb\u00e9m vem uma semana depois que o MITER publicou uma lista dos 25 principais erros de software &#8220;mais perigosos&#8221; que podem levar a vulnerabilidades s\u00e9rias que podem ser exploradas por um advers\u00e1rio para assumir o controle de um sistema afetado, obter informa\u00e7\u00f5es confidenciais ou causar uma nega\u00e7\u00e3o na condi\u00e7\u00e3o de servi\u00e7o.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\"><span class=\"\">&#8220;O alerta [&#8230;] coloca o poder nas m\u00e3os de cada organiza\u00e7\u00e3o para corrigir as vulnerabilidades mais comuns, tais como dispositivos VPN de gateway n\u00e3o corrigidas&#8221;, conforme Paulo Chichester, Director NCSC de Opera\u00e7\u00f5es,\u00a0<\/span><span class=\"\"> enquanto incitando a necessidade de priorizar patch para minimizar o risco de ser explorado por agentes mal-intencionados.<\/span><\/p>\n<p>\u00a0<\/p>\n<\/center><\/div>\n<\/center><\/div>\n<p style=\"text-align: left;\">Este artigo \u00e9 uma tradu\u00e7\u00e3o de: <a href=\"https:\/\/thehackernews.com\/2021\/07\/top-30-critical-security.html\" target=\"_blank\" rel=\"noopener\">https:\/\/thehackernews.com\/2021\/07\/top-30-critical-security.html<\/a><\/p>\n<div class=\"ad_two clear\"><center class=\"cf\">\n<p style=\"text-align: left;\">\u00a0<\/p>\n<\/center><\/div>\n\n\n\n\n","protected":false},"excerpt":{"rendered":"<p>Ag\u00eancias de intelig\u00eancia na Austr\u00e1lia, no Reino Unido e nos EUA emitiram um comunicado conjunto na quarta-feira detalhando as vulnerabilidades mais exploradas em 2020 e 2021, mais uma vez demonstrando como os agentes de amea\u00e7as s\u00e3o capazes de transformar rapidamente as falhas divulgadas publicamente em suas vantagens. \u00a0 &#8220;Os cibern\u00e9ticos continuam a explorar vulnerabilidades de [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":18911,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[89,100,21],"tags":[],"class_list":["post-18907","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-basico","category-diversos","category-exploits"],"_links":{"self":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/18907","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/comments?post=18907"}],"version-history":[{"count":13,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/18907\/revisions"}],"predecessor-version":[{"id":18924,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/18907\/revisions\/18924"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media\/18911"}],"wp:attachment":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media?parent=18907"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/categories?post=18907"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/tags?post=18907"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}