Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    2024-07-26: Jasper Wildfire Phishing Potentials

    May 5, 2026

    Top 10 VulnCheck Research Blogs of 2023 | Blog

    May 5, 2026

    Juniper Networks security advisory (AV26-424)

    May 5, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»Top 10 VulnCheck Research Blogs of 2023 | Blog
    News

    Top 10 VulnCheck Research Blogs of 2023 | Blog

    adminBy adminMay 5, 2026No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email



    As we head into 2024, we’re looking back at the interesting vulnerability research that VulnCheck published throughout 2023. Over the last year, we’ve shared a range of impactful research, but our favorite research falls into one of two camps:

    1. Novel or new exploitation
    2. Exploitation in the wild

    With our last blog of 2023, we highlight the top 10 VulnCheck research blogs that fall into those categories and describe why we believe they were, and still are, impactful.

    The security community often relies on researchers to develop proof of concept exploits. Defenders use these exploits to help implement appropriate countermeasures. In this group of blogs, VulnCheck developed new exploits and exploitation methods that changed how defenders protected their networks.

    In Executing from Memory Using ActiveMQ CVE-2023-46604, VulnCheck introduced a new method of exploiting CVE-2023-46604 that allowed attackers to execute arbitrary code without touching the filesystem or executing external programs, thereby avoiding detections.

    In Fileless Remote Code Execution on Juniper Firewalls, VulnCheck introduced a new method of exploiting CVE-2023-36845 that, again, allowed attackers to execute arbitrary code without touching the filesystem or executing external programs. We also published a version scanner and found that, at the time, 80% of Juniper routers remained unpatched.

    In Exploitation of Openfire CVE-2023-32315, VulnCheck introduced a new method of exploiting CVE-2023-32315 that avoided creating a new user, another technique to avoid detection. We also shared that around half of internet-facing Openfire instances remained vulnerable. Finally, we shared Suricata rules that would detect our novel exploitation techniques.

    In Exploiting MikroTik RouterOS Hardware with CVE-2023-30799, VulnCheck shares details on the development of an exploit for CVE-2023-30799 affecting MikroTik routers. At the time of publication, more than 900,000 routers were vulnerable.

    In PaperCut Exploitation – A Different Path to Code Execution, VulnCheck shared a different exploitation for CVE-2023-27350. VulnCheck found a new HTTP endpoint to trigger code execution, and instead of using java.exe like others, we used python3 (Linux) and ftp.exe (Windows) to establish a reverse shell. We also shared proof of concept code and Suricata rules to detect the new attack.

    In A Different Payload for CVE-2022-47966, VulnCheck once again demonstrated a new memory-resident attack, this time for CVE-2022-47966 affecting a wide range of ManageEngine products. VulnCheck also examined some good (and bad!) public detections for CVE-2022-47966.

    Exploitation in the wild is probably the most important topic for the security community. In the following blogs, VulnCheck discovered exploitation in the wild or assessed the likelihood of exploitation in the wild.

    In Exposing RocketMQ CVE-2023-33246 Payloads, VulnCheck was able to extract exploit payloads from exploited hosts on the internet. The result was the ability to identify multiple attackers and their unique approaches to exploitation. This blog pre-dated CVE-2023-33246’s inclusion on the CISA KEV list.

    In Widespread Cisco IOS XE Implants in the Wild, VulnCheck broke the news that there were thousands of implanted Cisco IOS XE devices on the internet. We also shared the scanner we used to scan the internet.

    9. Assessing Potential Exploitation of Sophos Firewall and CVE-2022-3236

    In Assessing Potential Exploitation of Sophos Firewall and CVE-2022-3236, VulnCheck is the first to publish exploit details for CVE-2022-3236, and, after a scan of the internet, explain why the firewall is highly unlikely to be a mass-exploitation target.

    In Looking for CVE-2023-43261 in the Real World, VulnCheck found evidence that cellular routers, often used in ICS networks, affected by CVE-2023-43261 had been widely exploited in the wild. We also discovered that the CVE description did not accurately describe all the affected models and versions.

    2023 was a wild year for vulnerabilities and exploitation. Hopefully, our research and insights had a positive impact on the community. Happy holidays! You’ll see many new payloads from us next year.

    Are you interested in the vulnerabilities that actually matter? Do you want to track the vulnerabilities attackers are exploiting in the wild? If so, VulnCheck’s Exploit & Vulnerability Intelligence is for you. Register and demo our data today.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleJuniper Networks security advisory (AV26-424)
    Next Article 2024-07-26: Jasper Wildfire Phishing Potentials
    admin
    • Website

    Related Posts

    News

    The Resilient Spirit of the SLTT Cybersecurity Community

    May 5, 2026
    News

    The AI Hard Drive Shortage Is Making It More Expensive and Harder to Archive the Internet

    May 5, 2026
    News

    DAEMON Tools trojanized in supply-chain attack to deploy backdoor

    May 5, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Catchy & Intriguing

    March 17, 202674 Views

    The Essential Guide to Removing Computer Infections: Step-by-Step Remedies

    March 20, 202623 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Catchy & Intriguing

    March 17, 202674 Views

    The Essential Guide to Removing Computer Infections: Step-by-Step Remedies

    March 20, 202623 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views
    Our Picks

    2024-07-26: Jasper Wildfire Phishing Potentials

    May 5, 2026

    Top 10 VulnCheck Research Blogs of 2023 | Blog

    May 5, 2026

    Juniper Networks security advisory (AV26-424)

    May 5, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.