10 Known Exploited Vulnerabilities in Maritime Environment
- Offshore Cyber

- Jun 4, 2024
- 2 min read

Malicious cyber actors, including nation-states, use a vast range of tactics, techniques, and procedures to deliver effects and extort organizations withing the maritime environment for financial gain or economic disruption. Below, we will provide a brief overview of 10 known exploited vulnerabilities (KEVs) that have targeted the maritime environment within the last year, as well as a few case study / examples throughout.
Key Terms:
CVE = Common Vulnerabilities and Exposures – A list of publicly known cybersecurity vulnerabilities. Format is as follows:

CVSS = Common Vulnerability Scoring System – An industry standard for assessing the severity of the computer system security vulnerabilities. 10 being most severe.
CWE = Common Weakness Enumeration – A list of common software and hardware weaknesses that exist in a computer system. They are categorized to help describe weaknesses using a common language. A single record can contain and provide information about multiple vulnerabilities.
Example: 4 out of the 10 KEVs below are categorized in CWE-20: Improper Input Validation
10 Known Exploited Vulnerabilities in the Maritime Environment:
1. Microsoft WinVerifyTrust function Remote Code Execution
2. “BlueKeep” Microsoft Windows Remote Desktop Remote Code Execution Vulnerability
3. Microsoft SMBv1 Remote Code Execution/Information Disclosure Vulnerability (multiple CVEs)
4. Apache HTTP Server-Side Request Forgery (SSRF)
5. Apache Tomcat Improper Privilege Management “GhostCat” Vulnerability
6. Apache Tomcat Remote Code Execution Vulnerability
7. Apache Log4j2 Remote Code Execution Vulnerability
8. Apache HTTP Server Privilege Escalation Vulnerability
9. Apache HTTP Server-Side Request Forgery (SSRF)
10. PHP FastCGI Process Manager (FPM) Buffer Overflow Vulnerability

The critical vulnerabilities discussed, including Microsoft WinVerifyTrust, BlueKeep, SMBv1, Apache Tomcat, Apache Log4j2, and Apache HTTP Server, highlight the persistent and evolving threats to cybersecurity. These vulnerabilities enable attackers to execute arbitrary code, escalate privileges, and manipulate servers, leading to unauthorized access, data breaches, and system disruptions. In the maritime environment, where operational continuity and data integrity are paramount, the exploitation of such vulnerabilities can have catastrophic consequences, affecting navigation, communication, and cargo management systems.
Given the interconnected nature of maritime systems and their reliance on robust IT infrastructure, it is crucial to be aware of these vulnerabilities and deploy effective mitigation strategies. Failure to address these security gaps can result in significant financial losses, operational downtime, and damage to reputation. Staying informed about the latest threats and implementing timely updates and security measures are essential steps to safeguard maritime operations from cyber threats.
For detailed guidance on how to mitigate these vulnerabilities, please read our latest blog post: Top 10 Essential Cybersecurity Strategies for Maritime Operations


