Minimize your digital risk by detecting data loss, securing your online brand, and reducing your attack surface.
A powerful, easy-to-use search engine that combines structured technical data with content from the open, deep, and dark web.
Digital Risk Protection
Read our new practical guide to reducing digital risk.
New report recognizes Digital Shadows for strongest current offering, strategy, and market presence of 14 vendors profiled
Read Full Report
One significant aspect of mitigating the risk posed by exploit kits is keeping software up-to-date. However, for some organizations, knowing what to patch as a priority can be difficult. Our latest whitepaper helps organizations to understand what vulnerabilities are most frequently targeted and helps them to prioritize their patching processes.
In order to assess the popularity of vulnerabilities (and in turn help organizations to prioritize their patching processes), it is possible to look at both the vulnerabilities that the exploit kits exploit, as well as how many times the vulnerabilities were mentioned alongside the exploit kits.
The vulnerability that had been implemented into the most exploit kits was shown to be CVE-2013-2551, which was a Microsoft Internet Explorer vulnerability affecting versions 6 through to 10. It allowed remote attackers to execute arbitrary code via a crafted website. The likely reason for this vulnerability being so widely exploited was that a proof of concept (POC) exploit had been made publicly available in May 2013, after it had been exploited at a prominent security conference the same year. The top 20 vulnerability findings are illustrated in Figure 1.
Figure 1 – A graph showing the number of exploit kits exploiting a given vulnerabilities
Figure 2 – Top 7 CVE numbers and description
Using a list of exploit kit names and searching the vulnerabilities researched in the report alongside them, it was possible to supplement the above findings. We used mentions of CVEs and exploit kits sourced from the dark web, including criminal forums, .onion and I2P domains, security researcher blogs and security vendor blog pages as part of this research. Figure 3 shows a strong correlation between how many exploit kits have exploited a vulnerability, and how frequently these are mentioned alongside each other.
Figure 3 – Comparison of top 10 vulnerabilities based on CVE mentions and exploit kits exploiting them
While these vulnerabilities are shown to be common across exploit kits, this is not exhaustive and will likely change in the future. Nevertheless, organizations can learn which vulnerabilities should definitely be patched as a priority. You can read more about the most popular exploit kits and the vulnerabilities they exploit in or white paper ‘In the business of exploitation’.