{"id":32351,"date":"2023-10-16T20:38:23","date_gmt":"2023-10-16T20:38:23","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=32351"},"modified":"2023-10-23T20:13:09","modified_gmt":"2023-10-23T20:13:09","slug":"weekly-recap-oct-16-2023","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/weekly-recap-oct-16-2023\/","title":{"rendered":"Weekly Vulnerability Recap \u2013 October 16, 2023 \u2013 DDoS, Microsoft, Apple &#038; Linux Lead a Busy Week"},"content":{"rendered":"\n<p>The past week has been an eventful one for cybersecurity vulnerabilities, from record DDoS attacks and three Microsoft zero-days to vulnerabilities in Linux, Apple, Citrix, and other widely used technologies.<\/p>\n\n\n\n<p>About the only good news last week was that a much-hyped heap buffer overflow vulnerability in the widely used Curl file transfer tool turned out to be not as bad as feared, and reports of a possible zero day in the Signal encrypted messaging app turned out to be <a href=\"https:\/\/twitter.com\/signalapp\/status\/1713789255359619171\" target=\"_blank\" rel=\"noreferrer noopener\">just a rumor<\/a>.<\/p>\n\n\n\n<p>We cover all those vulnerabilities and more below. Together, they underscore the importance of <a href=\"https:\/\/www.esecurityplanet.com\/networks\/patch-management\/\">patching<\/a> \u2014 while acknowledging that prioritizing patches and inventorying all IT assets remain <a href=\"https:\/\/www.esecurityplanet.com\/applications\/patch-management-as-a-service\/\">major challenges<\/a> for even the best IT teams.<\/p>\n\n\n\n<p><strong>See also: Top <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\">Patch<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\">Vulnerability Management<\/a> tools<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">October 9, 2023<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">D-Link WiFi range extender susceptible to command injection attacks&nbsp;<\/h3>\n\n\n\n<p><strong>Type of attack:<\/strong> The vulnerability is a combination of a Denial of Service (DoS) attack and a Remote Command Injection attack.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> The main problem with the D-Link DAP-X1860 WiFi 6 range extender is its susceptibility to a vulnerability (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-45208\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-45208<\/a>) that allows attackers to execute remote commands and perform DoS attacks. Specifically, the extender fails to properly parse SSIDs containing a single tick (&#8216;) in the name, misinterpreting it as a command terminator. This flaw, <a href=\"https:\/\/www.redteam-pentesting.de\/en\/advisories\/rt-sa-2023-006\/-d-link-dap-x1860-remote-command-injection\" target=\"_blank\" rel=\"noreferrer noopener\">reported<\/a> by Germany-based Red Team Pentesting, allows attackers to inject malicious shell commands, leading to unauthorized remote access and potential control over the device. All processes on the extender, including injected commands, are executed with root privileges, making it a significant security concern.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> The vendor (D-Link) has not yet released a fix for the vulnerability despite being notified by the researchers. Users of D-Link DAP-X1860 extenders are advised to take precautions, such as limiting manual network scans, being suspicious of sudden disconnections, and turning off the extender when not in use. Additionally, isolating IoT devices and range extenders on a separate network from sensitive devices can help mitigate potential risks until a proper fix is provided by the vendor.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Remote Code Execution Threatens GNOME Linux Systems Through File Downloads<\/h3>\n\n\n\n<p><strong>Type of attack:<\/strong> A Remote Code Execution (RCE) vulnerability (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-43641\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-43641<\/a>) was found in the libcue library, a component integrated into the Tracker Miners file metadata indexer used in Linux distributions that run GNOME, such as Fedora and Ubuntu.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> A memory corruption vulnerability in the open-source libcue library was <a href=\"https:\/\/github.blog\/2023-10-09-coordinated-disclosure-1-click-rce-on-gnome-cve-2023-43641\/\" target=\"_blank\" rel=\"noreferrer noopener\">reported<\/a> by the GitHub Security Lab. This library parses cue sheet files and is incorporated into the Tracker Miners file metadata indexer, included by default in the most recent GNOME desktop environment releases. Tracker Miners can be fooled into processing a maliciously crafted CUE file when it automatically scans downloaded files to refresh the search index on GNOME Linux devices. This parsing procedure could allow libcue&#8217;s memory corruption weakness to be exploited, allowing attackers to execute arbitrary code on the vulnerable Linux machine. The bug allows for a 1-click RCE attack by requiring a user to mistakenly download and open a specially crafted.CUE file.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> <a href=\"https:\/\/github.com\/lipnitsk\/libcue\/security\/advisories\/GHSA-5982-x7hv-r9cj\" target=\"_blank\" rel=\"noreferrer noopener\">Debian<\/a>, <a href=\"https:\/\/lists.fedoraproject.org\/archives\/list\/package-announce@lists.fedoraproject.org\/message\/XUS4HTNGGGUIFLYSKTODCRIOXLX5HGV3\/\" target=\"_blank\" rel=\"noreferrer noopener\">Fedora<\/a> and the <a href=\"https:\/\/github.com\/lipnitsk\/libcue\/security\/advisories\/GHSA-5982-x7hv-r9cj\" target=\"_blank\" rel=\"noreferrer noopener\">libcue<\/a> project have all issued fixes that users should apply.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Mirai DDoS malware version adds 13 router vulnerabilities to its list of targets<\/h3>\n\n\n\n<p><strong>Type of attack:<\/strong> DDoS (Distributed Denial of Service) attack<\/p>\n\n\n\n<p><strong>The problem:<\/strong> DDoS malware botnet IZ1H9 based on Mirai targeting routers from various manufacturers such as D-Link, Zyxel, TP-Link, and TOTOLINK; in all, Fortinet <a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/Iz1h9-campaign-enhances-arsenal-with-scores-of-exploits\" target=\"_blank\" rel=\"noreferrer noopener\">found<\/a> about 30 vulnerabilities targeted across 9 product families. The botnet compromises these devices and enlists them in its DDoS swarm by exploiting several vulnerabilities in them. Once infiltrated, these devices are used to perform DDoS assaults against specific targets as instructed by the botnet&#8217;s operators. Because of the botnet&#8217;s capacity to target a broad variety of devices and vulnerabilities, it poses a substantial danger capable of delivering enormous DDoS assaults.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Users are advised to promptly apply patches and updates and to always change default credentials.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">October 10, 2023<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Record DDoS Attacks Traced to HTTP\/2 Flaw, Hits All Web Servers<\/h3>\n\n\n\n<p><strong>Type of attack:<\/strong> DDoS attacks more than five times larger than the previous record were jointly revealed by Cloudflare, Google and AWS.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> A vulnerability in the HTTP\/2 protocol dubbed \u201cRapid Reset\u201d that affects almost all web servers and tracked as <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2023-44487\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-44487<\/a> was blamed for the attacks.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> More than 100 advisories and patches have been issued so far and can be found in the CVE listing. For full coverage, see <a href=\"https:\/\/www.esecurityplanet.com\/threats\/rapid-reset-ddos-attack-http2-servers\/\">\u2018Rapid Reset\u2019 DDoS Attack Hits HTTP\/2 Web Servers<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Microsoft Patch Tuesday Addresses 103 CVEs<\/h3>\n\n\n\n<p><strong>Type of attack:<\/strong> Zero-days and other vulnerabilities.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Microsoft\u2019s Patch Tuesday for October 2023 covers a total of 103 CVEs, including three zero-day vulnerabilities affecting WordPad, Skype and the HTTP\/2 \u201cRapid Reset\u201d DDoS vulnerability, plus 9 critical Layer 2 tunneling vulnerabilities.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> The CVEs and associated patches are detailed in <a href=\"https:\/\/www.esecurityplanet.com\/threats\/patch-tuesday-october-2023\/\">October 2023 Patch Tuesday Includes Three Zero-Days Flaws<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">High-Risk Vulnerability in Citrix NetScaler Exposes Sensitive Data<\/h3>\n\n\n\n<p><strong>Type of attack:<\/strong> A combination of vulnerabilities in Citrix NetScaler ADC and NetScaler Gateway, leading to potential sensitive information disclosure and denial of service (DoS) attacks.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Two main issues were detected in Citrix NetScaler:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-4966\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-4966<\/a> (Sensitive Information Disclosure):<\/strong> This significant vulnerability causes Citrix NetScaler ADC and NetScaler Gateway equipment to disclose sensitive information. Although no specifics regarding the type of the exposed information were revealed, the defect potentially exposes important data. The vulnerability may be exploited remotely without requiring elevated access, human interaction, or a high level of complexity. The appliance must be configured as a Gateway or a AAA virtual server to be susceptible.<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2023-4967\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-4967<\/a> (Denial of Service):<\/strong> CVE-2023-4967, a high-severity issue (CVSS score: 8.2), has similar requirements and can possibly cause a denial of service (DoS) on vulnerable devices.<\/li>\n<\/ul>\n\n\n\n<p><strong>The fix:<\/strong> Citrix patched these flaws by issuing updated versions of the affected products. The remedy entails applying security updates to the following versions:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>14.1-8.50 and later NetScaler ADC and NetScaler Gateway<\/li>\n\n\n\n<li>NetScaler ADC and NetScaler Gateway 13.1-49.15, as well as subsequent 13.1 versions<\/li>\n\n\n\n<li>NetScaler ADC and NetScaler Gateway 13.0-92.19, as well as subsequent 13.0 versions<\/li>\n\n\n\n<li>NetScaler ADC 13.1-FIPS 13.1-37.164 and subsequent 13.1-FIPS releases<\/li>\n\n\n\n<li>NetScaler ADC 12.1-FIPS 12.1-55.300 and subsequent 12.1-FIPS releases<\/li>\n\n\n\n<li>NetScaler ADC 12.1-NDcPP 12.1-55.300 and subsequent 12.1-NDcPP releases<\/li>\n<\/ul>\n\n\n\n<p>Version 12.1, which has reached its end of life (EOL), will no longer be maintained, thus users are encouraged to update to a more recent, actively supported edition to guarantee continuous security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">October 12, 2023<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Curl vulnerability falls short of expectations<\/h3>\n\n\n\n<p><strong>Type of attack:<\/strong> The Curl file transfer tool contains a high-severity vulnerability known as a &#8220;Heap Buffer Overflow,&#8221; which was identified as <a href=\"https:\/\/curl.se\/docs\/CVE-2023-38545.html\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-38545<\/a>. A heap buffer overflow is a type of software vulnerability where a program writes more data to a block of memory, or buffer, than it can hold.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> A heap buffer overflow flaw in Curl&#8217;s SOCKS5 proxy protocol implementation causes this vulnerability. When software permits more data to be written to an allocated memory space than it can contain, a heap buffer overflow occurs. Overwriting contiguous memory areas can result in program crashes and, in certain situations, remote code execution (RCE) attacks.<\/p>\n\n\n\n<p>The issue was first classified as a major threat; however, it was later discovered to have particular prerequisites for exploitation, making it less critical than previously thought. The issue only affects Curl clients who are set to utilize a SOCKS5 proxy and have automatic redirections enabled.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> A vulnerability in curl version 8.4.0 was fixed by addressing a heap buffer overflow issue in the SOCKS5 proxy protocol implementation. Users are advised to upgrade to patch the flaw and protect their systems from potential exploitation. The vulnerability required specific conditions, including SOCKS5 proxies and slow connections to the remote site. Security researchers and developers using SOCKS5 proxies for legitimate purposes were potential targets. The practical exploitation of the vulnerability was complex and required careful crafting.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Apple patches iOS Kernel zero-day vulnerability on older iPhones<\/h3>\n\n\n\n<p><strong>Type of attack:<\/strong> The first type of attack is the Privilege Escalation Vulnerability <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-42824\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-42824<\/a> vulnerability allows local attackers to elevate privileges on vulnerable iPhones and iPads by exploiting a weakness in the XNU kernel. The second is the Heap Buffer Overflow Vulnerability CVE-2023-5217 vulnerability causes a heap buffer overflow within the VP8 encoding of the libvpx video codec library.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Privilege Escalation CVE-2023-42824 and Heap Buffer Overflow CVE-2023-5217 are vulnerabilities in the XNU kernel and libvpx video codec library. The former allows local attackers to gain escalated privileges on iPhones and iPads, potentially compromising the entire system. The latter allows remote code execution, allowing attackers to run malicious code without user consent or knowledge. Both vulnerabilities are crucial for system security.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Apple has addressed two vulnerabilities in its iOS and iPadOS software. The first, Privilege Escalation CVE-2023-42824, was fixed in iOS 16.7.1 and iPadOS 16.7.1 by improving checks in the XNU kernel. The second, Heap Buffer Overflow CVE-2023-5217, was addressed in the libvpx video codec library by releasing patches for iOS and iPadOS. These patches included security measures to prevent heap buffer overflows, preventing arbitrary code execution. Both vulnerabilities require users to update their devices to the latest versions, as regular software updates are crucial for protecting against known vulnerabilities and potential exploits.<\/p>\n\n\n\n<p>Last week&#8217;s vulnerability recap can be found here: <a href=\"https:\/\/www.esecurityplanet.com\/threats\/weekly-recap-oct-9-2023\/\">Weekly Vulnerability Recap \u2013 October 9, 2023 \u2013 Zero-Days Strike Android, Microsoft, Apple, Cisco &amp; More<\/a><\/p>\n\n\n\n<p><strong>Also read:<\/strong> <a href=\"https:\/\/www.esecurityplanet.com\/compliance\/patch-management-policy\/\">Patch Management Policy: Steps, Benefits and a Free Template<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d7048ca693f-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d7048ca693f\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d7048ca693f\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d7048ca693f\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d7048ca693f\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d7048ca693f\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d7048ca693f\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft, Apple, and Linux all had major vulnerabilities brought to light last week. Discover how they affect you.<\/p>\n","protected":false},"author":318,"featured_media":32352,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[2369,3790,3414,23006,730,4218,5277],"b2b_audience":[35],"b2b_industry":[],"b2b_product":[382,402,404,31780,31782,31775,396],"class_list":["post-32351","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-cloud-security","tag-cybersecurity","tag-network-security","tag-patch-management","tag-security","tag-vulnerabilities","tag-web-security","b2b_audience-implementation-and-support","b2b_product-application-security-vulnerability-management","b2b_product-ddos","b2b_product-hackers","b2b_product-patch-management","b2b_product-threat-intelligence","b2b_product-web-applications-security","b2b_product-wireless-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Weekly Vulnerability Recap \u2013 October 16, 2023 \u2013 Apple &amp; Linux Vulnerabilities<\/title>\n<meta name=\"description\" content=\"Microsoft, Apple, and Linux all had major vulnerabilities brought to light last week. Discover how they affect you.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/weekly-recap-oct-16-2023\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Weekly Vulnerability Recap \u2013 October 16, 2023 \u2013 Apple &amp; Linux Vulnerabilities\" \/>\n<meta property=\"og:description\" content=\"Microsoft, Apple, and Linux all had major vulnerabilities brought to light last week. Discover how they affect you.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/weekly-recap-oct-16-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-16T20:38:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-23T20:13:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/10\/esp_20231016-weekly-recap-oct-16-2023.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kaye Timonera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kaye Timonera\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/weekly-recap-oct-16-2023\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/weekly-recap-oct-16-2023\/\"},\"author\":{\"name\":\"Kaye Timonera\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/fe08088ba462401e4aea214869e2fc2f\"},\"headline\":\"Weekly Vulnerability Recap \u2013 October 16, 2023 \u2013 DDoS, Microsoft, Apple &#038; Linux Lead a Busy Week\",\"datePublished\":\"2023-10-16T20:38:23+00:00\",\"dateModified\":\"2023-10-23T20:13:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/weekly-recap-oct-16-2023\/\"},\"wordCount\":1566,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/weekly-recap-oct-16-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/10\/esp_20231016-weekly-recap-oct-16-2023.jpg\",\"keywords\":[\"cloud security\",\"cybersecurity\",\"network security\",\"Patch Management\",\"security\",\"vulnerabilities\",\"Web security\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/weekly-recap-oct-16-2023\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/weekly-recap-oct-16-2023\/\",\"name\":\"Weekly Vulnerability Recap \u2013 October 16, 2023 \u2013 Apple & Linux Vulnerabilities\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/weekly-recap-oct-16-2023\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/weekly-recap-oct-16-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/10\/esp_20231016-weekly-recap-oct-16-2023.jpg\",\"datePublished\":\"2023-10-16T20:38:23+00:00\",\"dateModified\":\"2023-10-23T20:13:09+00:00\",\"description\":\"Microsoft, Apple, and Linux all had major vulnerabilities brought to light last week. Discover how they affect you.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/weekly-recap-oct-16-2023\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/weekly-recap-oct-16-2023\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/weekly-recap-oct-16-2023\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/10\/esp_20231016-weekly-recap-oct-16-2023.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/10\/esp_20231016-weekly-recap-oct-16-2023.jpg\",\"width\":1400,\"height\":900,\"caption\":\"Image: Kiattisak\/Adobe Stock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/weekly-recap-oct-16-2023\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Weekly Vulnerability Recap \u2013 October 16, 2023 \u2013 DDoS, Microsoft, Apple &#038; Linux Lead a Busy Week\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/fe08088ba462401e4aea214869e2fc2f\",\"name\":\"Kaye Timonera\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/kathryn-timonera-150x150.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/kathryn-timonera-150x150.png\",\"caption\":\"Kaye Timonera\"},\"description\":\"eSecurity Planet and Datamation writer Kathryn Pearl Timonera has covered a wide range of industries in her career, including technology, cybersecurity, e-commerce, programming, aviation, finance, insurance, and business, and she managed the marketing team of a full stack development online school. After starting her career as a teacher, Kathryn now applies her talent for presenting information to technology and cybersecurity professionals.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/ktimonera\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Weekly Vulnerability Recap \u2013 October 16, 2023 \u2013 Apple & Linux Vulnerabilities","description":"Microsoft, Apple, and Linux all had major vulnerabilities brought to light last week. Discover how they affect you.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/weekly-recap-oct-16-2023\/","og_locale":"en_US","og_type":"article","og_title":"Weekly Vulnerability Recap \u2013 October 16, 2023 \u2013 Apple & Linux Vulnerabilities","og_description":"Microsoft, Apple, and Linux all had major vulnerabilities brought to light last week. Discover how they affect you.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/weekly-recap-oct-16-2023\/","og_site_name":"eSecurity Planet","article_published_time":"2023-10-16T20:38:23+00:00","article_modified_time":"2023-10-23T20:13:09+00:00","og_image":[{"width":1400,"height":900,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/10\/esp_20231016-weekly-recap-oct-16-2023.jpg","type":"image\/jpeg"}],"author":"Kaye Timonera","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Kaye Timonera","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/weekly-recap-oct-16-2023\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/weekly-recap-oct-16-2023\/"},"author":{"name":"Kaye Timonera","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/fe08088ba462401e4aea214869e2fc2f"},"headline":"Weekly Vulnerability Recap \u2013 October 16, 2023 \u2013 DDoS, Microsoft, Apple &#038; Linux Lead a Busy Week","datePublished":"2023-10-16T20:38:23+00:00","dateModified":"2023-10-23T20:13:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/weekly-recap-oct-16-2023\/"},"wordCount":1566,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/weekly-recap-oct-16-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/10\/esp_20231016-weekly-recap-oct-16-2023.jpg","keywords":["cloud security","cybersecurity","network security","Patch Management","security","vulnerabilities","Web security"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/weekly-recap-oct-16-2023\/","url":"https:\/\/www.esecurityplanet.com\/threats\/weekly-recap-oct-16-2023\/","name":"Weekly Vulnerability Recap \u2013 October 16, 2023 \u2013 Apple & Linux Vulnerabilities","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/weekly-recap-oct-16-2023\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/weekly-recap-oct-16-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/10\/esp_20231016-weekly-recap-oct-16-2023.jpg","datePublished":"2023-10-16T20:38:23+00:00","dateModified":"2023-10-23T20:13:09+00:00","description":"Microsoft, Apple, and Linux all had major vulnerabilities brought to light last week. Discover how they affect you.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/weekly-recap-oct-16-2023\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/weekly-recap-oct-16-2023\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/weekly-recap-oct-16-2023\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/10\/esp_20231016-weekly-recap-oct-16-2023.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/10\/esp_20231016-weekly-recap-oct-16-2023.jpg","width":1400,"height":900,"caption":"Image: Kiattisak\/Adobe Stock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/weekly-recap-oct-16-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Weekly Vulnerability Recap \u2013 October 16, 2023 \u2013 DDoS, Microsoft, Apple &#038; Linux Lead a Busy Week"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/fe08088ba462401e4aea214869e2fc2f","name":"Kaye Timonera","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/kathryn-timonera-150x150.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/kathryn-timonera-150x150.png","caption":"Kaye Timonera"},"description":"eSecurity Planet and Datamation writer Kathryn Pearl Timonera has covered a wide range of industries in her career, including technology, cybersecurity, e-commerce, programming, aviation, finance, insurance, and business, and she managed the marketing team of a full stack development online school. After starting her career as a teacher, Kathryn now applies her talent for presenting information to technology and cybersecurity professionals.","url":"https:\/\/www.esecurityplanet.com\/author\/ktimonera\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/32351"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/318"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=32351"}],"version-history":[{"count":3,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/32351\/revisions"}],"predecessor-version":[{"id":32538,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/32351\/revisions\/32538"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/32352"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=32351"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=32351"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=32351"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=32351"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=32351"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=32351"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}