Chinese state-sponsored cyber actors exploit publicly known vulnerabilities in popular software to gain access to networks. The document lists vulnerabilities in products like Pulse Secure VPNs, F5 BIG-IP, Citrix ADC and Gateway, Microsoft Windows, and others that are being actively exploited. It is critical for network defenders to prioritize patching known vulnerabilities and implementing mitigations like disabling unnecessary services and enabling robust logging.