{"id":33324,"date":"2024-01-02T20:59:00","date_gmt":"2024-01-02T20:59:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=33324"},"modified":"2024-01-03T15:45:10","modified_gmt":"2024-01-03T15:45:10","slug":"vulnerability-recap-january-2-2024","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-2-2024\/","title":{"rendered":"Vulnerability Recap \u2013 1\/2\/2024 \u2013 Barracuda ESG, Apache OfBiz Vulnerabilities Persist"},"content":{"rendered":"\n<p>While the number of reported vulnerabilities sometimes decrease over the Christmas and New Year\u2019s holidays, active and potential exploits are no less threatening. During the past couple weeks, Google has seen multiple vulnerabilities, including a zero-day in Chrome. SonicWall researchers discovered that an Apache patch was incomplete, still permitting authentication bypass in open-source ERP software Apache OfBiz. And issues with Barracuda&#8217;s Email Secure Gateway persist, with an FBI safety warning about an older vulnerability still outstanding.<\/p>\n\n\n\n<p>Your IT and security teams should stay alert and aware during holidays, consistently patching known vulnerabilities and updating systems to the most recent versions of software. We&#8217;ve developed a list of recent vulnerabilities so your team can make any needed updates, including potential product removals.<\/p>\n\n\n<!-- ICP Plugin: Start --><div class=\"icp-list icp-list-main icp-list-body-horizontal row\">\n    \n        <!--\n            ICP Plugin - body horizontal\n            ----------\n            Category: \n            Count: 3\n            Country: HK\n        -->\n    <\/div><!-- ICP Plugin: End -->\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">December 22, 2023<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Google Chrome Zero-Day Could Lead to Remote Code Execution<\/h3>\n\n\n\n<p><strong>Type of attack:<\/strong> Zero-day remote code execution<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Researchers on Google&#8217;s threat analysis team found a zero-day vulnerability in Chrome&#8217;s instance of open-source web software WebRTC. The vulnerability is a severe heap buffer overflow issue that can lead to remote code execution. Google has already seen this vulnerability exploited in the wild.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Access to fix data is currently limited. <a href=\"https:\/\/chromereleases.googleblog.com\/2023\/12\/stable-channel-update-for-desktop_20.html?m=1\" target=\"_blank\" rel=\"noreferrer noopener\">Google announced an update<\/a> to the desktop stable channel to 120.0.6099.129 on December 20, 2023, which was expected to roll out over the coming days and weeks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">December 24, 2023<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Problems Continue for Barracuda&#8217;s Email Gateways<\/h3>\n\n\n\n<p><strong>Type of attack:<\/strong> Arbitrary code execution<\/p>\n\n\n\n<p><strong>The problem:<\/strong> We&#8217;ve mentioned <a href=\"https:\/\/www.esecurityplanet.com\/trends\/weekly-vulnerability-recap-august-28-2023-windows-ivanti-adobe-hit-by-flaws\/\">Barracuda&#8217;s Email Secure Gateway vulnerabilities<\/a> before, but now a new one is plaguing customers. Chinese-based threat actor group UNC4841 is suspected to be responsible for exploits of Spreadsheet::ParseExcel, a third-party open source Perl module. The threat actors used this software to deploy an Excel email attachment and attack ESG appliances.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Barracuda deployed a patch on December 22, 2023, to fix the exploited ESG appliances. On December 24, when Barracuda released the security notice, there was no remediation or patch available for <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2023-7101\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-7101<\/a>, the Spreadsheet::ParseExcel vulnerability, within the open-source library.<\/p>\n\n\n\n<p>Previous vulnerabilities have affected Barracuda ESG. In August 2023, the <a href=\"https:\/\/www.ic3.gov\/Media\/News\/2023\/230823.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">FBI recommended<\/a> that customers remove their Barracuda ESG appliances altogether after Barracuda discovered a zero-day remote command injection vulnerability in the ESG appliances. While Barracuda automatically rolled out the patch BNSF-36456 to all exploited appliances back in August, according to the FBI, the fix didn&#8217;t work \u2014 even patched appliances could still be exploited. If your team doesn&#8217;t already know, find out whether your appliances were compromised by CVE-2023-2868.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">December 26, 2023<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">SonicWall Discovers Apache OfBiz Patch Was Incomplete<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Authentication bypass<\/p>\n\n\n\n<p><strong>The problem:<\/strong> SonicWall Capture Labs&#8217; threat research team <a href=\"https:\/\/blog.sonicwall.com\/en-us\/2023\/12\/sonicwall-discovers-critical-apache-ofbiz-zero-day-authbiz\/\" target=\"_blank\" rel=\"noreferrer noopener\">discovered an authentication bypass vulnerability<\/a>, tracked as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-51467\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-51467<\/a>, in Apache OfBiz software. Apache OfBiz is an open-source enterprise resource planning product that&#8217;s part of the software supply chain and appears in multiple other products, such as Atlassian JIRA.<\/p>\n\n\n\n<p>Previously, Apache had released a patch for <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-49070\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-49070<\/a>, a remote code execution vulnerability. But SonicWall&#8217;s researchers realized that the authentication bypass still existed in the patched version of OfBiz. According to SonicWall, an attacker could expose sensitive data or execute code arbitrarily if they exploit the authentication bypass.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> SonicWall recommends that all Apache OfBiz users update their software to version 18.12.11. SonicWall also developed the IPS signature IPS:15949, which is designed to detect exploitation of the OfBiz vulnerability.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">December 29, 2023<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Google Kubernetes Engine Vulnerability Allows Attackers to Escalate Privileges<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Privilege escalation<\/p>\n\n\n\n<p><strong>The problem:<\/strong> According to Google, an attacker could escalate their privileges in a Google Kubernetes cluster by compromising a Fluent Bit logging container and combining that with Anthos Service Mesh privileges. An exploit of Anthos Service Mesh privileges would only be relevant for Kubernetes clusters that have ASM enabled. Google released the <a href=\"https:\/\/cloud.google.com\/anthos\/clusters\/docs\/security-bulletins#gcp-2023-047\" target=\"_blank\" rel=\"noreferrer noopener\">initial vulnerability notice<\/a> on December 14. While Google isn&#8217;t yet aware of any active exploitation, the vulnerability should be patched immediately.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Google recommends manually upgrading your instance of Google Kubernetes Engine to one of the following or later:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>1.25.16-gke.1020000<\/li>\n\n\n\n<li>1.26.10-gke.1235000<\/li>\n\n\n\n<li>1.27.7-gke.1293000<\/li>\n\n\n\n<li>1.28.4-gke.1083000<\/li>\n<\/ul>\n\n\n\n<p>Also, for in-cluster Anthos Service Mesh, Google recommends a manual upgrade to one of the following versions:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>1.17.8-asm.8<\/li>\n\n\n\n<li>1.18.6-asm.2<\/li>\n\n\n\n<li>1.19.5-asm.4<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">January 1, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Windows Vulnerability Allows DLL Exploitation<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Bypassing privilege access requirements to exploit executables<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Researchers from Security Joes <a href=\"https:\/\/www.securityjoes.com\/post\/hide-and-seek-in-windows-closet-unmasking-the-winsxs-hijacking-hideout\" target=\"_blank\" rel=\"noreferrer noopener\">discovered a malicious code execution vulnerability<\/a> in Windows 10 and 11. According to the researchers, these executables are found in the normally trusted WinSxS folder.<\/p>\n\n\n\n<p>The technique that threat actors can use is Dynamic Link Library (DLL) search order hijacking. By bypassing the high privilege requirements, Security Joes said, a threat actor can exploit the executables to execute code in WinSxS and other Windows applications.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Security Joes recommends studying the relationships between parent-child binaries, particularly focusing on trusted binaries, to find strange processes that involve the WinSxS folder&#8217;s binaries. Additionally, Security Joes suggests examining legitimate binaries within the WinSxS folder that create strange or unexpected child processes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Terrapin Attack Discovered by German Researchers<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Secure Shell vulnerability that can lead to prefix truncation attacks<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Security researchers from Ruhr University Bochum in Germany found a Secure Shell (SSH) vulnerability that allows attackers to adjust sequence numbers during a handshake process and subtly remove client or server messages. This is a prefix truncation attack known as <a href=\"https:\/\/terrapin-attack.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Terrapin<\/a>. It downgrades communication security, potentially resulting in decreasingly secure client authentication.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> The researchers recommend updating clients and servers so those systems are less vulnerable to prefix truncation attacks. The researchers also provided their contact information in the report.<\/p>\n\n\n\n<p><strong>Read next:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-scanning-tools\/\"><strong>Best Vulnerability Scanner Tools &amp; Software<\/strong><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-december-18-2023\/\"><strong>Weekly Vulnerability Recap \u2014 December 18, 2023 \u2014 JetBrains TeamCity Exploits Continue<\/strong><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-management-lifecycle\/\"><strong>Stages of the Vulnerability Management Lifecycle<\/strong><\/a><\/li>\n<\/ul>\n\n\n<div id=\"ta-campaign-widget-66d6fd458c7e2-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6fd458c7e2\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6fd458c7e2\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6fd458c7e2\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6fd458c7e2\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6fd458c7e2\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6fd458c7e2\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Discover which companies experienced breaches and exploited vulnerabilities during the holiday week in our vulnerability recap.<\/p>\n","protected":false},"author":238,"featured_media":33325,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[1970],"b2b_audience":[],"b2b_industry":[63],"b2b_product":[379],"class_list":["post-33324","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-vulnerability","b2b_industry-technology","b2b_product-threats-and-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Vulnerability Recap \u2013 1\/2\/2024 \u2013 Barracuda ESG, Apache OfBiz Vulnerabilities Persist<\/title>\n<meta name=\"description\" content=\"Discover which companies experienced breaches and exploited vulnerabilities during the holiday week in our vulnerability recap.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-2-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerability Recap \u2013 1\/2\/2024 \u2013 Barracuda ESG, Apache OfBiz Vulnerabilities Persist\" \/>\n<meta property=\"og:description\" content=\"Discover which companies experienced breaches and exploited vulnerabilities during the holiday week in our vulnerability recap.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-2-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-02T20:59:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-03T15:45:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240102-vulnerability-recap-january-2-2024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jenna Phipps\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jenna Phipps\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-2-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-2-2024\/\"},\"author\":{\"name\":\"Jenna Phipps\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb\"},\"headline\":\"Vulnerability Recap \u2013 1\/2\/2024 \u2013 Barracuda ESG, Apache OfBiz Vulnerabilities Persist\",\"datePublished\":\"2024-01-02T20:59:00+00:00\",\"dateModified\":\"2024-01-03T15:45:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-2-2024\/\"},\"wordCount\":977,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-2-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240102-vulnerability-recap-january-2-2024.png\",\"keywords\":[\"vulnerability\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-2-2024\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-2-2024\/\",\"name\":\"Vulnerability Recap \u2013 1\/2\/2024 \u2013 Barracuda ESG, Apache OfBiz Vulnerabilities Persist\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-2-2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-2-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240102-vulnerability-recap-january-2-2024.png\",\"datePublished\":\"2024-01-02T20:59:00+00:00\",\"dateModified\":\"2024-01-03T15:45:10+00:00\",\"description\":\"Discover which companies experienced breaches and exploited vulnerabilities during the holiday week in our vulnerability recap.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-2-2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-2-2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-2-2024\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240102-vulnerability-recap-january-2-2024.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240102-vulnerability-recap-january-2-2024.png\",\"width\":1400,\"height\":900,\"caption\":\"Image: weerapat1003\/Adobe Stock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-2-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerability Recap \u2013 1\/2\/2024 \u2013 Barracuda ESG, Apache OfBiz Vulnerabilities Persist\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb\",\"name\":\"Jenna Phipps\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg\",\"caption\":\"Jenna Phipps\"},\"description\":\"Jenna Phipps is a staff writer for eSecurity Planet and has years of experience in B2B technical content writing. She covers security practices, vulnerabilities, data protection, and the top products in the cybersecurity industry. She also writes about the importance of cybersecurity technologies and training in business environments, as well as the role that security plays in data storage and management. When Jenna's not writing about security, you can find her reading, shopping, eating smoothie bowls, or spending time with friends.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jphipps\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerability Recap \u2013 1\/2\/2024 \u2013 Barracuda ESG, Apache OfBiz Vulnerabilities Persist","description":"Discover which companies experienced breaches and exploited vulnerabilities during the holiday week in our vulnerability recap.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-2-2024\/","og_locale":"en_US","og_type":"article","og_title":"Vulnerability Recap \u2013 1\/2\/2024 \u2013 Barracuda ESG, Apache OfBiz Vulnerabilities Persist","og_description":"Discover which companies experienced breaches and exploited vulnerabilities during the holiday week in our vulnerability recap.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-2-2024\/","og_site_name":"eSecurity Planet","article_published_time":"2024-01-02T20:59:00+00:00","article_modified_time":"2024-01-03T15:45:10+00:00","og_image":[{"width":1400,"height":900,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240102-vulnerability-recap-january-2-2024.png","type":"image\/png"}],"author":"Jenna Phipps","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jenna Phipps","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-2-2024\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-2-2024\/"},"author":{"name":"Jenna Phipps","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb"},"headline":"Vulnerability Recap \u2013 1\/2\/2024 \u2013 Barracuda ESG, Apache OfBiz Vulnerabilities Persist","datePublished":"2024-01-02T20:59:00+00:00","dateModified":"2024-01-03T15:45:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-2-2024\/"},"wordCount":977,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-2-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240102-vulnerability-recap-january-2-2024.png","keywords":["vulnerability"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-2-2024\/","url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-2-2024\/","name":"Vulnerability Recap \u2013 1\/2\/2024 \u2013 Barracuda ESG, Apache OfBiz Vulnerabilities Persist","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-2-2024\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-2-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240102-vulnerability-recap-january-2-2024.png","datePublished":"2024-01-02T20:59:00+00:00","dateModified":"2024-01-03T15:45:10+00:00","description":"Discover which companies experienced breaches and exploited vulnerabilities during the holiday week in our vulnerability recap.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-2-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-2-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-2-2024\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240102-vulnerability-recap-january-2-2024.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240102-vulnerability-recap-january-2-2024.png","width":1400,"height":900,"caption":"Image: weerapat1003\/Adobe Stock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-2-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Vulnerability Recap \u2013 1\/2\/2024 \u2013 Barracuda ESG, Apache OfBiz Vulnerabilities Persist"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb","name":"Jenna Phipps","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg","caption":"Jenna Phipps"},"description":"Jenna Phipps is a staff writer for eSecurity Planet and has years of experience in B2B technical content writing. She covers security practices, vulnerabilities, data protection, and the top products in the cybersecurity industry. She also writes about the importance of cybersecurity technologies and training in business environments, as well as the role that security plays in data storage and management. When Jenna's not writing about security, you can find her reading, shopping, eating smoothie bowls, or spending time with friends.","url":"https:\/\/www.esecurityplanet.com\/author\/jphipps\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/33324"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/238"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=33324"}],"version-history":[{"count":8,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/33324\/revisions"}],"predecessor-version":[{"id":33335,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/33324\/revisions\/33335"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/33325"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=33324"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=33324"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=33324"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=33324"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=33324"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=33324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}