The Sensor Intel Series is created in partnership with Efflux, who maintains a globally distributed network of sensors from which we derive attack telemetry.
Introduction
Welcome back to the Sensor Intelligence Series, our recurring monthly summary of vulnerability intelligence based on distributed passive sensor data. It’s a little bit surprising to realize that we’ve been publishing this series since August of 2022. In honor of that, and since it’s the end of the year as far as our available data goes, we’ll spend a little time zooming way out and looking at what the most common type of scanning traffic we saw across all of 2023.
But first, let’s look at the new things we’ve found, and what the overall picture looks like for December 2023.
Six New CVEs in the Data
This month, we found evidence of six more CVEs in our data. That’s a lot more than we have generally found in a single month, which is at least somewhat down to some new techniques we’re using to sift through this data more efficiently. We decided it might be better to split these out into a bullet list for easier reading:
- CVE-2015-8813 – A SSRF vector in the url parameter of the Umbraco web content management system.
- CVE-2019-12987 and CVE-2019-12988 – Remote, unauthenticated command injection vulnerabilities in the Citrix SD-WAN Center.
- CVE-2021-23394 – A remote, unauthenticated code execution vulnerability in the Studio-42 elFinder open-source file manager.
- CVE-2022-21587 – A remote, unauthenticated arbitrary file upload vulnerability in Oracle E-Business Suite (EBS)
- CVE-2022-26134 – A OGNL injection vulnerability in Confluence Server and Confluence Data Center.
As is usual, these are all remote, unauthenticated vulnerabilities that allow for code execution and related means to gain access to compute resources on the targets, which makes sense for the sort of scanning we see.
December Vulnerabilities by the Numbers
Figure 1 shows the traffic for the top 10 CVEs in December. CVE-2022-24847, an RCE in the open-source GeoServer software, and CVE-2022-22947, an RCE in the Spring Cloud Gateway product, continue to hold the top two spots as they did in November. CVE-2020-11625, a vulnerability in AvertX Cameras that allows for username enumeration, continued rising from last month, and ends up in the third position. CVE-2020-8958, a Guangzhou router command injection vulnerability, has thus continued to fall in position, as it did last month and the month before that. October’s top seen vulnerability, CVE-2017-9841, an RCE in PHPUnit, now 5 years old, comes in fifth this month. Overall traffic in the CVEs we track dropped again as it did in November, although not by very much.
Table 1 shows traffic for December, change in traffic from November, CVSS v3.x score, and EPSS scores for the CVEs and other vulnerabilities we’re tracking, if they showed up in the last two months.
CVE Number | December Traffic | Change from November | CVSS v3.x | EPSS Score |
CVE-2022-24847 | 2439 | 34 | 7.2 | 0.00098 |
CVE-2022-22947 | 2131 | 129 | 10 | 0.97494 |
CVE-2020-11625 | 1620 | 0 | 5.3 | 0.00126 |
CVE-2020-8958 | 1383 | -397 | 7.2 | 0.74227 |
CVE-2017-9841 | 1361 | -378 | 9.8 | 0.97484 |
CVE-2022-42475 | 1197 | -27 | 9.8 | 0.38376 |
CVE-2022-41040 | 1133 | -250 | 9.8 | 0.95098 |
CVE-2020-0618 | 523 | 63 | 8.8 | 0.97407 |
CVE-2021-28481 | 269 | -95 | 9.8 | 0.04508 |
CVE-2021-40539 | 263 | 88 | 9.8 | 0.97412 |
CVE-2014-2908 | 249 | -15 | NA | 0.00594 |
Citrix XML Buffer Overflow | 249 | -15 | NA | |
CVE-2019-18935 | 173 | -4 | 9.8 | 0.94618 |
2018 JAWS Web Server Vuln | 135 | -588 | NA | |
CVE-2021-26855 | 132 | -157 | 9.8 | 0.97486 |
CVE-2021-44228 | 104 | 60 | 10 | 0.97454 |
CVE-2020-25078 | 85 | 83 | 7.5 | 0.80702 |
CVE-2021-26084 | 80 | 65 | 9.8 | 0.97235 |
CVE-2021-26086 | 59 | 12 | 5.3 | 0.54993 |
CVE-2018-13379 | 46 | -147 | 9.8 | 0.97305 |
CVE-2018-10561 | 29 | -42 | 9.8 | 0.97166 |
CVE-2021-22986 | 0 | -5 | 9.8 | 0.97435 |
CVE-2022-1388 | 28 | 15 | 9.8 | 0.97334 |
CVE-2017-18368 | 26 | 11 | 9.8 | 0.97521 |
CVE-2021-3129 | 26 | -4 | 9.8 | 0.97482 |
CVE-2019-9082 | 24 | 11 | 8.8 | 0.97454 |
CVE-2017-1000226 | 23 | -19 | 5.3 | 0.00127 |
CVE-2014-2321 | 19 | 17 | NA | 0.96364 |
CVE-2022-21587 | 19 | 17 | 9.8 | 0.96538 |
NETGEAR-MOZI | 18 | -31 | NA | |
CVE-2020-25213 | 15 | -17 | 9.8 | 0.97381 |
CVE-2018-9995 | 13 | -17 | 9.8 | 0.92532 |
CVE-2022-22965 | 11 | -6 | 9.8 | 0.97424 |
CVE-2020-9757 | 9 | 3 | 9.8 | 0.96928 |
CVE-2022-26134 | 9 | 5 | 9.8 | 0.97523 |
CVE-2022-40684 | 8 | -41 | 9.8 | 0.95976 |
CVE-2020-17496 | 7 | -9 | 9.8 | 0.97413 |
CVE-2018-20062 | 5 | 5 | 9.8 | 0.96823 |
CVE-2020-3452 | 5 | 0 | 7.5 | 0.97529 |
CVE-2018-17246 | 4 | 1 | 9.8 | 0.96827 |
CVE-2018-7600 | 4 | 2 | 9.8 | 0.9756 |
CVE-2019-12725 | 4 | -4 | 9.8 | 0.9634 |
CVE-2019-9670 | 4 | 4 | 9.8 | 0.97216 |
CVE-2021-21985 | 4 | 2 | 9.8 | 0.9738 |
CVE-2008-2052 | 3 | 3 | NA | 0.00151 |
CVE-2018-7700 | 3 | 3 | 8.8 | 0.73235 |
CVE-2015-3897 | 2 | 2 | NA | 0.83225 |
CVE-2020-17506 | 2 | 1 | 9.8 | 0.96414 |
CVE-2020-25506 | 2 | 2 | 9.8 | 0.97424 |
CVE-2020-7961 | 2 | -2 | 9.8 | 0.97342 |
CVE-2021-29203 | 2 | -2 | 9.8 | 0.95733 |
CVE-2021-33564 | 2 | -2 | 9.8 | 0.07998 |
CVE-2021-41277 | 2 | 2 | 10 | 0.06768 |
CVE-2023–25157 | 2 | 0 | 9.8 | |
CVE-2008-6668 | 1 | 1 | NA | 0.00359 |
CVE-2012-4940 | 1 | 1 | NA | 0.14071 |
CVE-2015-8813 | 1 | 1 | 8.2 | 0.00511 |
CVE-2017-0929 | 1 | 1 | 7.5 | 0.00753 |
CVE-2017-11511 | 1 | 0 | 7.5 | 0.3318 |
CVE-2017-11512 | 1 | 0 | 7.5 | 0.97175 |
CVE-2017-17731 | 1 | -1 | 9.8 | 0.11468 |
CVE-2017-9506 | 1 | 1 | 6.1 | 0.00575 |
CVE-2018-1000600 | 1 | 1 | 8.8 | 0.95625 |
CVE-2018-18775 | 1 | 1 | 6.1 | 0.00157 |
CVE-2019-12987 | 1 | 1 | 9.8 | 0.97297 |
CVE-2019-12988 | 1 | 1 | 9.8 | 0.97297 |
CVE-2019-2767 | 1 | 1 | 7.2 | 0.14972 |
CVE-2019-8982 | 1 | -1 | 9.8 | 0.02146 |
CVE-2020-13167 | 1 | 0 | 9.8 | 0.97405 |
CVE-2020-15505 | 1 | 0 | 9.8 | 0.97516 |
CVE-2020-17505 | 1 | 1 | 8.8 | 0.96502 |
CVE-2020-28188 | 1 | 1 | 9.8 | 0.97279 |
CVE-2020-7796 | 1 | 1 | 9.8 | 0.72496 |
CVE-2021-20167 | 1 | 1 | 8 | 0.94785 |
CVE-2021-21315 | 1 | 1 | 7.8 | 0.96949 |
CVE-2021-23394 | 1 | -1 | 9.8 | 0.01541 |
CVE-2021-25369 | 1 | -1 | 6.2 | 0.00118 |
CVE-2021-31589 | 1 | 1 | 6.1 | 0.00286 |
CVE-2021-32172 | 1 | -1 | 9.8 | 0.26253 |
CVE-2021-33357 | 1 | 1 | 9.8 | 0.96582 |
CVE-2021-3577 | 1 | 1 | 8.8 | 0.96865 |
CVE-2022-1040 | 1 | -1 | 9.8 | 0.97031 |
CVE-2022-35914 | 1 | -1 | 9.8 | 0.96852 |
Targeting Trends
To better assess rapid changes in attack traffic, Figure 2 shows a bump plot, which plots both traffic volume and changes in rank. The 12 CVEs (with one category combining two difficult to distinguish CVEs, CVE-2022-41040 and CVE-2021-34473) shown here represent the top five for each of the twelve months. Notable in this month’s plot, as previously mentioned, is the rise of both CVE-2022-24847 and CVE-2022-22947 over the last two months.
Overall Scanning Traffic Changes
We now look at the overall level of scan traffic we received, to place the above data in context. December saw a decline in total traffic of 5.8% from November, in part attributable to the decrease in scanning for CVE-2016-4945 and CVE-2020-8958.
The full details of the changes in scanning traffic over the last 12 months are shown in the following table.
Month | % change from previous month |
Jan-23 | 5.6% |
Feb-23 | -15.5% |
Mar-23 | -22.4% |
Apr-23 | 37.3% |
May-23 | -0.9% |
Jun-23 | -0.3% |
Jul-23 | 20.1% |
Aug-23 | -27.9% |
Sep-23 | 5.1% |
Oct-23 | -5.8% |
Nov-23 | -0.2% |
Dec-23 | -5.8% |
Long Term Trends
Because Figure 2 only shows high-traffic CVEs, Figure 3 shows traffic for all the CVEs and vulnerabilities we have tracked.
As can be seen below, none of the CVEs and vulnerabilities we’re currently tracking fell off steeply or rose steeply in December, assuming they were present at all in the December data.
25 CVEs which had not appeared in the data for months reappeared this month, which is more than is usually seen.
Zooming Out to Look at 2023
One of the questions we frequently get asked about this data is about attribution, that is, who is doing the scanning. This is a difficult question, because it is quite well understood that many threat actors take great pains to do at least a bit of obfuscation of their activities, and in a situation like this may very well chose to use proxy networks or cloud providers to conceal the origins of their scanning.
However, there are some interesting details that emerge when looking at the entirety of the scan data we have from 2023. In terms of “top talkers” by ASN, we find the following.
Source ASN | Source Country | % of total traffic in 2023 |
202306 | Russia | 7.27% |
196645 | Ukraine | 4.97% |
14061 | United States | 4.63% |
14061 | Canada | 3.54% |
14061 | Singapore | 2.83% |
6939 | United States | 2.58% |
16276 | France | 2.57% |
63949 | United States | 2.32% |
16276 | Canada | 2.10% |
14618 | United States | 1.90% |
ASN 202306 is assigned to HostGlobal.Plus Ltd, a hosting company, and 196645 is Hostpro Lab LLC, another hosting company. 14061 is Digital Ocean, and 6939 is Hurricane Electric, LLC. Even a quick look at this data seems to indicate that most scanning traffic is generated out of hosting provider networks at least in our dataset.
There may be several reasons for this. Provisioning VPS infrastructure to perform scanning is relatively easy and can be done on many hosting providers using false information for the account. Further, it is less likely that targets will wish to block large ranges of hosting provider IP space as this might lead to the blocking of legitimate sites.
It’s important to note that even though in the above table 7.27% of all the scanning traffic we observed in 2023 originated from IPs geolocated to Russia, this does not mean that this is evidence of Russian state sponsored activity, only that this hosting provider (which has IP space in both Russia and the UK) has been used by some set of scanners to provide their infrastructure.
Digging in further, we can see that the scans originating from ASN202306 have a relativel small set of target URLs, the top 20 of which are shown below.
Scanned URL | % of observed traffic from ASN 202306 |
/.env | 12.0% |
/.aws/credentials | 11.5% |
/.aws/config | 11.3% |
/aws/credentials | 11.1% |
/test.php | 8.2% |
/phpinfo | 8.0% |
/credentials | 6.6% |
/_profiler/phpinfo | 4.3% |
/phpinfo.php | 4.3% |
/info.php | 4.2% |
/laravel/.env | 3.7% |
/demo/.env | 3.7% |
/web/.env | 3.7% |
/admin/.env | 1.4% |
/backend/.env | 1.4% |
/app/.env | 1.4% |
/admin/config.php | 0.6% |
/.env.local | 0.4% |
/.env.backup | 0.4% |
/.env.save | 0.4% |
As can be seen above, the scanning from the most active ASN in our data is almost entirely concerned with finding leaked credentials and other sensitive data.
Conclusions
We again reiterate that our sensors are passive, and they do not respond to requests, nor do they pretend to be any specific platform or software stack. They are simply an open socket on port 80 and 443, with just enough of a webserver to be able to record the requests made to them and negotiate any required TLS connection. They do not have DNS names, although it’s certainly possible they may once have had them. Sometimes IP blocks are reassigned, and old DNS records remain that continue to point to them.
As we noted above, attribution is a somewhat difficult question. We certainly can tell where the majority of scanning activity comes from, but only at the level of IP and associated ASN, which is not enough to make a connection to a specific group, especially as the majority of scanning traffic we observe originates from large hosting providers.
For those new to the Sensor Intelligence Series, we will conclude by repeating some old but valid observations. We see a continuing focus on IoT and router vulnerabilities, as well as easy, essentially one-request remote code execution vulnerabilities. These typically result in the installation of malware, crypto miners, and DDoS bots. Additionally, we see continuous scanning activity that might be most accurately described as reconnaissance; the identification of attack surface, exposed files, and other materials that attackers hope to leverage to enable further attacks.