It builds on previous NSA, CISA, and FBI reporting to inform federal and state, local, tribal, and territorial (SLTT) government critical infrastructure (CI), including the Defense Industrial Base (DIB) and private sector organizations about notable trends and persistent tactics, techniques, and procedures (TTPs).Įntities can mitigate the vulnerabilities listed in this advisory by applying the available patches to their systems, replacing end-of-life infrastructure, and implementing a centralized patch management program. This joint Cybersecurity Advisory was coauthored by the National Security Agency (NSA), the Cybersecurity and Infrastructure Security Agency (CISA), and the Federal Bureau of Investigation (FBI). The advisory details the targeting and compromise of major telecommunications companies and network service providers and the top vulnerabilities-primarily Common Vulnerabilities and Exposures (CVEs)-associated with network devices routinely exploited by the cyber actors since 2020. These actors use the network to exploit a wide variety of targets worldwide, including public and private sector organizations. This joint Cybersecurity Advisory describes the ways in which People’s Republic of China (PRC) state-sponsored cyber actors continue to exploit publicly known vulnerabilities in order to establish a broad network of compromised infrastructure. Implement a centralized patch management system.Disable unnecessary ports and protocols.Original release date: J| Last revised: June 8, 2022