Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Frequently Asked Questions About Chinese State-Sponsored Actors Compromising Global Networks



Research Special Operations State Sponsored activity frequently asked questions blog header image

An analysis of Tenable telemetry data shows that the vulnerabilities being exploited by Chinese state-sponsored actors remain unremediated on a considerable number of devices, posing major risk to the organizations that have yet to successfully address these flaws.

Background

Tenable’s Research Special Operations (RSO) team has compiled this blog to answer Frequently Asked Questions (FAQ) regarding state-sponsored threat actor activity associated with the People’s Republic of China (PRC).

On August 27, the National Security Agency (NSA) published a joint cybersecurity advisory (CSA) authored and co-authored by a number of security agencies from the United States, Australia, Canada, New Zealand, United Kingdom, Czech Republic, Finland, Germany, Italy, Japan, the Netherlands, Poland and Spain. This CSA provides guidance on PRC state-sponsored threat actor activity and provides tactics, techniques and procedures (TTPs) utilized by these advanced persistent threat (APT) actors. These malicious actors have routinely targeted critical infrastructure, including telecommunications providers, but have also been observed attacking government, transportation, military and lodging entities. While the CSA provides some vulnerabilities exploited by these actors, it’s clear that this is not an exhaustive list and organizations need to continue to be vigilant in addressing known and exploitable vulnerabilities which are often abused for initial access to a victims network.

Joint Cybersecurity Advisory authoring agencies and partners

FAQ

Is this activity associated with Salt Typhoon?

The CSA states that the associated activity “partially overlaps” with Salt Typhoon (also known as OPERATOR PANDA, RedMike, UNC5807, GhostEmperor and more), however, it does not specifically attribute this activity to any one threat actor.

We published a blog post in January 2025 about Salt Typhoon, analyzing the vulnerabilities used by this threat actor. The overlap between the CVEs confirmed to be used by Salt Typhoon and this CSA includes a pair of Ivanti Connect and Policy Secure vulnerabilities, CVE-2023-46805 and CVE-2024-21887, which are used as part of an exploit chain.

As the threat activity discussed in the recent CSA is more generally attributed to PRC state-sponsored actors, we recommend reviewing the blogs we have published on Volt Typhoon and the top 20 CVEs exploited by PRC state-sponsored actors. These blogs include CVEs known to be used by PRC actors, notably including Fortinet firewalls, Microsoft Exchange server and other applications and devices that are referenced in the CSA.

What are the vulnerabilities known to have been exploited in these attacks?

According to the CSA, the Chinese state-sponsored threat actors are having “considerable success exploiting publicly known common vulnerabilities and exposures (CVEs)” with the following CVEs being listed as used by these threat actors to gain initial access:

CVEDescriptionCVSSv3VPR
CVE-2024-21887Ivanti Connect Secure and Ivanti Policy Secure Command Injection Vulnerability9.110
CVE-2023-46805Ivanti Connect Secure and Ivanti Policy Secure Authentication Bypass Vulnerability8.26.7
CVE-2024-3400Command Injection Vulnerability in the GlobalProtect Gateway feature of PAN-OS1010
CVE-2023-20273Cisco IOS XE Web UI Command Injection Vulnerability7.28.4
CVE-2023-20198Cisco IOS XE Web UI Elevation of Privilege Vulnerability109.9
CVE-2018-0171Cisco IOS and IOS XE Smart Install Remote Code Execution (RCE) Vulnerability9.89.2

*Please note: Tenable’s Vulnerability Priority Rating (VPR) scores are calculated nightly. This blog post was published on August 29 and reflects VPR at that time.

Are there proofs-of-concept (PoCs) available for/these vulnerabilities?

Yes, all of the vulnerabilities referenced in the CSA have PoCs available.

Are patches or mitigations available for these CVEs?

Yes, each of the vendors for these products has released patches and, in many cases, mitigation guidance that may be used if immediate patching is not feasible. However, given that these vulnerabilities have been exploited in the wild, many of them over several years, full remediation of these vulnerabilities should be completed as soon as possible.

CVEAffected ProductVendor Advisory
CVE-2024-21887 and CVE-2023-46805Ivanti Connect Secure and Ivanti Policy SecureAdvisory
CVE-2024-3400Palo Alto PAN-OSAdvisory
CVE-2023-20273 and CVE-2023-20198Cisco IOS XE

Advisory

Cisco Talos Blog

CVE-2018-0171Cisco IOS and IOS XEAdvisory

How many devices remain vulnerable to these six CVEs?

From an analysis of Tenable telemetry data, we found that a significant number of devices remain unremediated and pose a major risk to the organizations that have yet to successfully patch. As noted in the CSA, these “APT actors may target edge devices regardless of who owns a particular device.” Even in cases where an impacted entity is not a target of interest, these actors may still use compromised devices to conduct additional attacks on targeted networks.

In our analysis, we found that Cisco devices had surprisingly significant counts of unpatched devices. For CVE-2023-20273 and CVE-2023-20198, 40% of devices remain unmitigated, while 58% of devices scanned remain vulnerable to CVE-2018-0171.

In stark contrast, only around 14% of devices have yet to remediate CVE-2024-21887 and CVE-2023-46805. For Palo Alto devices, only around 3% of devices have yet been patched for CVE-2024-3400.

Given the mixed remediation rates amongst these six CVEs, it’s imperative that organizations quickly mitigate these threats and ensure their devices are fully up to date. As the CSA notes, these threat actors are not reliant on zero-day vulnerabilities, but rather continue to target known and exploitable vulnerabilities on edge devices in order to gain initial access to their victims' networks.

Have any of these CVEs been classified under Tenable’s Vulnerability Watch?

Yes, we have classified several of the CVEs referenced in this CSA under our Vulnerability Watch:

CVEVulnerability Watch StatesFirst EstablishedLast Established
CVE-2024-21887Vulnerability of Concern2024-01-102024-08-28
CVE-2023-46805Vulnerability of Concern2024-01-102025-02-05
CVE-2024-3400Vulnerability of Interest, Vulnerability of Concern2024-04-122024-08-28
CVE-2018-0171Vulnerability of Interest2025-08-212025-08-27

CVE-2023-20273 and CVE-2023-20198 were not classified prior to the publication of this CSA, as we began our Vulnerability Watch classifications at the start of 2024. We have been publishing Cyber Exposure Alert content since late 2018, and published a blog post for CVE-2023-20198 and CVE-2023-20273 on the same day the advisory was released. We recently added CVE-2018-0171 following an FBI alert.

As a result of this CSA, we have classified all six CVEs as Vulnerabilities Being Monitored. For more information about Vulnerability Watch, please visit our blog, Reducing Remediation Time Remains a Challenge: How Tenable Vulnerability Watch Can Help.

Have any of these CVEs been added to the CISA KEV?

Yes, each of these CVEs has been featured in the Cybersecurity and Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog.

CVEDate AddedRemediation Due Date
CVE-2024-218871/10/20241/22/2024
CVE-2023-468051/10/20241/22/2024
CVE-2024-34004/12/20244/19/2024
CVE-2023-2027310/23/202310/27/2023
CVE-2023-2019810/16/202310/20/2023
CVE-2018-017111/3/20215/3/2022

Has Tenable released any product coverage for these vulnerabilities?

Yes, plugin coverage is available for each of these CVEs. A list of Tenable plugins for these vulnerabilities can be found on their individual CVE pages:

This link will display all available plugins for these vulnerabilities, including upcoming plugins in our Plugins Pipeline.

In addition to these CVEs, we also recommend scanning with plugin ID 105161 to identify if Cisco Smart Install is enabled on any Cisco devices in your network. As noted in the CSA, disabling the Cisco Smart Install feature is highly recommended. In an update to the security advisory for CVE-2018-0171 on August 20, 2025, Cisco noted that they are ”aware of continued exploitation activity of the vulnerability that is described in this advisory and strongly recommends that customers assess their systems and upgrade to a fixed software release as soon as possible.

Tenable Attack Path Analysis techniques

The following are a list of associated Tenable Attack Path Analysis techniques for the TTPs discussed in the CSA:

MITRE ATT&CK IDDescriptionTenable Attack Path techniques
T1040Network SniffingT1040_Windows
T1068Exploitation for Privilege EscalationT1068_Windows
T1082System Information DiscoveryT1082
T1098.004Account ManipulationT1098.004
T1190Exploit Public-Facing Application

T1190_Aws

T1190_WAS

T1048.003Exfiltration over Alternative ProtocolT1048.003_Windows
T1059.006Command and Scripting Interpreter: Python"T1059.006_Windows

Tenable Identity Exposure Indicators of Exposure and Indicators of Attack

The following are a list of Indicators of Exposure and Indicators of Attack for Tenable Identity Exposure:

Additional MITRE ATT&CK Resources

MITRE ATT&CK IDDescriptionProduct
T1190Exploit Public-Facing ApplicationTenable Web App Scanning
T1595Active ScanningTenable Attack Surface Management

Get more information

Join Tenable's Research Special Operations (RSO) Team on the Tenable Community.

Learn more about Tenable One, the Exposure Management Platform for the modern attack surface.


Cybersecurity news you can use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.