Top 5 most dangerous remote execution vulnerabilities in early 2020, some even automatically infect other computers without users knowing.
Remote Code Execution (RCE) is the most dangerous type of vulnerability, allowing hackers to take control of the application server, which can take important data from the organization or do it. springboard to strike deeper into the enterprise system.
Here are the top 5 dangerous RCE vulnerabilities newly discovered since the beginning of 2020, evaluated by the expert of Vietnam cybersecurity corporation based on the complexity, popularity and impact scale of these holes. this gap.

I. CVE 2019-2725: Remote code execution vulnerability on ORACLE WebLogic
Specifically, this security flaw is in the WLS9-ASYNC component on Oracle's Weblogic server that allows an attacker to import malicious XML data via specially designed paths without any permission, from it can gain access and execute arbitrary code on the Weblogic server.
This vulnerability is easily exploited by an attacker, since anyone with HTTP access to the WebLogic server can execute an attack. Moreover, it does not need user interaction, such as opening attachments or clicking on malicious links, to download malicious code. Therefore, this error has a CVSS score of 9.8 / 10.
II. CVE 2020-0796: Remote code execution flaw on Windows SMB protocol
CVE 2020-0796 (RCE) is considered to be the most serious vulnerability when hackers can execute malicious code remotely without authentication on Windows 10, and can automatically infect other computers. .
SMB (Server Message Block) runs on port 445, is a network protocol that supports file sharing, web browsing, printing and network communication. This vulnerability is also known as SMBGhost, and stems from the way SMBv3 handles queries of the compression header, allowing remote attackers to execute malicious code on the server or client with privileges across the System.

III. CVE 2020-1938: Ghostcat vulnerability reads and inserts files on Apache Tomcat
CVE-2020-1938, also known as Ghostcat, is a flaw in Apache Tomcat's AJP (JavaServer Pages) protocol - a free and open source web server software, used to run programming web applications. in java language. This hole has a score of 9.8 / 10, the highest level.
According to VSEC Network Security Corporation experts, Ghostcat vulnerabilities have been discovered in all versions (9.x / 8.x / 7.x / 6.x) of Apache Tomcat released throughout. Over the past 13 years, and it is particularly serious that exploit codes have appeared and been shared widely on the internet, from which hackers can search and deploy hacking methods to the web server. easily.
IV. CVE-2020-7961 Unreliable data structure conversion vulnerability on Liferay
CVE-2020-7961 is a data structure conversion error on the Liferay platform - a widely used open source portal. This vulnerability allows attackers to take advantage of the data structure conversion functions that Liferay uses to insert malicious code, gain full control of the application and execute remote code to the server, perform actions. such as changing the look of websites, stealing data, .
This red hole exists on earlier versions of Liferay 7.2.1 CE GA2 and currently Liferay has released timely patches in versions Liferay Portal 7.1 GA4, 7.0 GA7 and 6.2 GA6.

V. CVE-2019-11469: SQL Injection vulnerability in ManageEngine Application Manager (MEAM)
The SQL Injection vulnerability exists in enterprise system management applications using ManageEngine Application Manager version 14072 and earlier, allowing an attacker to enter data into a website's database via parameters. send to server.
Hackers will take advantage of this vulnerability to gain control of the server by adding an administrator account with the highest permissions. Because ManageEngine requires logon access to the monitored servers, hackers can easily hijack the entire server infrastructure, extract critical data, and install malicious code across the system.
Currently, the vulnerabilities in these software and platforms have been patched by the developer, so if using them, VSEC recommends that businesses update to the latest version soon, as well as to disable the feature modules that are causing these vulnerabilities.
To help businesses understand the nature and dangers of each type of vulnerability, at the same time, they can check for themselves whether the system encounters the above-mentioned vulnerabilities and detail how to fix them if any. VSEC experts have also compiled a guide package, available free of charge at: https://vsec.com.vn/
You should read it
- The security flaw threatens more than 2 billion Google Chrome users
- How to enable / disable the Security tab of files and folders on Windows?
- Warning of dangerous vulnerabilities on WinRAR, users should uninstall or upgrade to a new version
- Internet Explorer has vulnerabilities, unused users are still hacked
- Secure Mac network services
- Test on database security P6
- Detect security holes in both AMD's Ryzen and Threadripper chips
- 7 mistakes make Internet security at risk
May be interested
- Access and control remote Windows computers via Mac OS X systemcomputers using windows xp professional, and some versions of windows vista or 7 (except home, basic and starter) can be remotely controlled via the remote desktop connection feature. this process allows others to log in and use windows-based computers as if sitting directly next to them ...
- Instructions for activating and using Remote Desktop on Windows 10 computersremote desktop protocol (rpd) feature is integrated on windows operating system since windows xp pro version. this feature allows users to easily connect and control a computer or another device remotely.
- Use Remote Desktop to access remote computers via the Internetin this article, we will show you how to use the remote desktop feature in windows xp, vista, and windows 7, windows 8, and windows 10 to access and control remote computers via a network connection.
- Ways to access and control your computer remotelyaccessing and controlling remote computers helps users a lot in their work and study. the following article the network administrator will show you 3 simple ways to access and control your computer on another computer.
- Manual Samsung TV remote most detailedthanks to the tv remote, you can control all the functions of the tv and support smart tv off and on features, using apps and keyboard operations on the smart tv.
- 6 ways scammers use TikTok to infect users' devices with malwareif you love scrolling through tiktok, beware of scams that can infect your device with malware.
- Use iPhone to control remote presentationsthrough the keynote application and wireless connectivity, presentations on mac computers can be remotely controlled by iphone, ipad, and intuitive experience.
- Configuration steps for multiple Users to remotely connect to Windows Server 2016 using Remote Desktopwith remote desktop connection, windows users can easily connect and work remotely. however, if you want to allow many people to connect at the same time to a windows server computer, how to do it?
- Introduction to Network Access Protection (Part 1)one aspect of network security that annoys many administrators is the inability to control the configuration of remote computers. although a company's network may be working safely, there is nothing to prevent remote users from accessing the network through a computer that has been infected or not.
- Control remote computers with Chrome web browserto access and control remote computers, you will think of teamviewer, vnc software ... but with chrome remote desktop, all you need is a running chrome browser to be able to control and share your screen. the following article will guide you through the basic steps to do this.