{"id":33475,"date":"2024-01-08T21:04:41","date_gmt":"2024-01-08T21:04:41","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=33475"},"modified":"2024-01-08T22:50:26","modified_gmt":"2024-01-08T22:50:26","slug":"weekly-vulnerability-recap-january-8-2024","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/weekly-vulnerability-recap-january-8-2024\/","title":{"rendered":"VulnRecap 1\/8\/24 &#8211; Ivanti EPM &#038; Attacks on Old Apache Vulnerabilities"},"content":{"rendered":"\n<p>The new year brought few new vulnerabilities, and only Ivanti Endpoint Manager (EPM) and Kyber, the quantum resistant encryption algorithm, publicized new vulnerabilities or fixes. Unfortunately, most news derived from the active attacks on multiple older vulnerabilities, which threaten to expose organizations slow to patch.<\/p>\n\n\n\n<p>Speed remains critical to security, but more importantly, patching teams need to make progress with <a href=\"https:\/\/www.esecurityplanet.com\/networks\/patch-management\/\">patch<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-management\/\">vulnerability management<\/a>. No organization should remain vulnerable six months after vendors issue patches! Struggling teams should engage a <a href=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-managed-service-provider\/\">managed IT service provider<\/a> (MSP) to provide temporary or ongoing support to prevent expensive breaches.<\/p>\n\n\n\n<p>Here&#8217;s a roundup of the week&#8217;s major vulnerabilities that security teams should mitigate or patch.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">January 3, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">52% of Exposed SSH Servers Vulnerable to Terrapin Attack<\/h3>\n\n\n\n<p><strong>Type of attack:<\/strong> Secure Shell (SSH) vulnerability enables prefix truncation attacks.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> As <a href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-2-2024\/\">announced last week<\/a>, attackers able to intercept handshake processes can adjust sequence numbers to downgrade communication security and disable defenses against keystroke timing attacks.<\/p>\n\n\n\n<p>The ShadowServer threat monitoring platform subsequently <a href=\"https:\/\/www.shadowserver.org\/what-we-do\/network-reporting\/accessible-ssh-report\/\" target=\"_blank\" rel=\"noreferrer noopener\">scanned the internet<\/a> for vulnerable servers and detected nearly 11 million unique IP addresses worldwide comprising 52% of all scanned IPv4 and IPv6 addresses. The countries with the top vulnerabilities include the USA (3.3 million), China (1.3 million), and Germany (1 million).<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Update clients and servers. Researchers also provide a <a href=\"https:\/\/github.com\/RUB-NDS\/Terrapin-Scanner\" target=\"_blank\" rel=\"noreferrer noopener\">vulnerability scanner<\/a> on GitHub written in Go that can detect vulnerable servers.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">CISA Adds Chrome &amp; Perl Library Bugs to Active Exploitation List<\/h3>\n\n\n\n<p><strong>Type of attack:<\/strong> Arbitrary (ACE) and remote code execution (RCE) attacks that exploit data import\/export operations in Excel-related functions in web applications and denial of service (DOS) crashes or ACE\/RCE related to heap buffer overflows in Chrome.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> The US Cybersecurity and Infrastructure Security Agency (CISA) added two vulnerabilities to the Known Exploited Vulnerabilities (KEV) catalog. Government agencies have until January 23 to mitigate the issues or stop using affected products.<\/p>\n\n\n\n<p>Versions 0.65 and older of the Perl Spreadsheet::ParseExcel library (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-7101\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-7101<\/a>) contain a RCE vulnerability exploited by Chinese hackers, <a href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-2-2024\/\">as noted on December 24th<\/a>. Chrome web browsers experience heap buffer overflow (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-7024\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-7024<\/a>) in the WebRTC real-time communication coding that can crash chrome or allow for code execution.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> For CVE-2023-7101, update applications using Spreadsheet::ParseExcel to <a href=\"https:\/\/metacpan.org\/release\/JMCNAMARA\/Spreadsheet-ParseExcel-0.66\" target=\"_blank\" rel=\"noreferrer noopener\">version 0.66<\/a> and check for products issuing updates related to the issue such as <a href=\"https:\/\/www.barracuda.com\/company\/legal\/esg-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">Barracuda\u2019s Email Security Gateway Appliance<\/a>. For CVE-2023-7024, update to the latest version of Chrome.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">January 4, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Ivaniti Endpoint Manager (EPM) Vulnerability Could Expose Data<\/h3>\n\n\n\n<p><strong>Type of attack:<\/strong> <a href=\"https:\/\/www.esecurityplanet.com\/threats\/how-to-prevent-sql-injection-attacks\/\">SQL injection<\/a> (SQLi) vulnerability permits an RCE attack allows the hijack of enrolled devices or even the core server. This attack requires network access, and the complexity of exploitation leads to a 3.0 rating.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Ivanti announced <a href=\"https:\/\/forums.ivanti.com\/s\/article\/SA-2023-12-19-CVE-2023-39336?language=en_US\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-39336<\/a> that affects all versions of EPM prior to and including 2022 SU4. Attackers with internal network access can execute SQLi to retrieve information without verification that can enable control over machines running the EPM agent or on a server configured to use Microsoft SQL Express and running Ivanti EPM.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Update to 2022 Service Update 5.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">January 5, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Attackers Target Unpatched Apache RocketMQ NameServers<\/h3>\n\n\n\n<p><strong>Type of attack:<\/strong> Critical RCE vulnerability in unpatched or partially patched RocketMQ services.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> The ShadowServer Foundation logs <a href=\"https:\/\/dashboard.shadowserver.org\/statistics\/combined\/time-series\/?date_range=30&amp;source=honeypot&amp;tag=rocketmq-scan&amp;group_by=geo&amp;style=stacked\" target=\"_blank\" rel=\"noreferrer noopener\">show hundreds<\/a> of hosts scanning for exposed RocketMQ systems still vulnerable to the original critical RCE vulnerability, CVE-2023-33246, <a href=\"https:\/\/www.esecurityplanet.com\/threats\/weekly-vulnerability-recap-sept-4-2023\/\">patched earlier<\/a> in 2023. However, the patch <a href=\"https:\/\/www.openwall.com\/lists\/oss-security\/2023\/07\/12\/1\" target=\"_blank\" rel=\"noreferrer noopener\">didn\u2019t fully solve<\/a> the vulnerability, leading to a second announced vulnerability, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-37582\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-37582<\/a>, rated 9.8\/10.0 for severity.<\/p>\n\n\n\n<p>Apache released patches for both of these vulnerabilities in July 2023, yet over six months later, attackers still search for potential victims. This should lend some urgency to patch systems affected by this flaw or the incomplete <a href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-2-2024\/\">OfBiz Patch covered last week<\/a>.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> <a href=\"https:\/\/lists.apache.org\/thread\/m614czxtpvlztd7mfgcs2xcsg36rdbnc\" target=\"_blank\" rel=\"noreferrer noopener\">Update<\/a> to Apache NameServer version 5.1.2 or later, RocketMQ 5.x or 4.9.7 or above.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">January 7, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Some Quantum Encryption Vulnerable to KyberSlash Attacks<\/h3>\n\n\n\n<p><strong>Type of attack:<\/strong> Timing-based attack on Kyber Encryption implementations can expose <a href=\"https:\/\/www.esecurityplanet.com\/networks\/encryption\/\">encryption<\/a> keys.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Researchers at <a href=\"https:\/\/cryspen.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cryspen<\/a> discovered that some services allow multiple operation requests toward the same encryption key pair. The Kyber key decapsulation process uses division operations, and timing-based attacks \u2014 dubbed <a href=\"http:\/\/kyberslash.cr.yp.to\/faq.html\" target=\"_blank\" rel=\"noreferrer noopener\">KyberSlash<\/a> \u2014 can allow the encryption key to be determined in as many as two out of three attacks.<\/p>\n\n\n\n<p>Researchers reported the first vulnerability, KyberSlash1, to Kyber\u2019s developers in November 2023 and discovered KyberSlash2 in December. The Kyber development team patched both vulnerabilities promptly, but not all projects and tools incorporating patches patched as quickly.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> First, check the <a href=\"https:\/\/kyberslash.cr.yp.to\/libraries.html\" target=\"_blank\" rel=\"noreferrer noopener\">list of projects impacted<\/a> by the issue and their current status. The vulnerability does not impact some libraries and tools, and some libraries fully patched for all known vulnerabilities. For unpatched libraries and tools that could leak a secret key, consider altering implementations to suspend multiple operation requests or switch tools and libraries to fully patched options.<\/p>\n\n\n\n<p><strong>Read next:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-2-2024\/\"><strong>Vulnerability Recap \u2013 1\/2\/2024 \u2013 Barracuda ESG, Apache OfBiz Vulnerabilities Persist<\/strong><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/networks\/external-vs-internal-vulnerability-scan\/\"><strong>External vs Internal Vulnerability Scans: Difference Explained<\/strong><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/networks\/tips-for-stronger\/\"><strong>Tips for Stronger Encryption<\/strong><\/a><\/li>\n<\/ul>\n\n\n<!-- ICP Plugin: Start --><div class=\"icp-list icp-list-main icp-list-body-horizontal row\">\n    \n        <!--\n            ICP Plugin - body horizontal\n            ----------\n            Category: \n            Count: 3\n            Country: HK\n        -->\n    <\/div><!-- ICP Plugin: End -->\n\n\n<div id=\"ta-campaign-widget-66d6e682ae823-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6e682ae823\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6e682ae823\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6e682ae823\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6e682ae823\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6e682ae823\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6e682ae823\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Discover what vulnerabilities were exploited in the first week of 2024 \u2014 including new and existing ones from Ivanti, Apache, and more.<\/p>\n","protected":false},"author":271,"featured_media":33476,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[3351,32030,860,32029,23006,31995,32031,22929,10917],"b2b_audience":[],"b2b_industry":[],"b2b_product":[],"class_list":["post-33475","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-apache","tag-arbitrary-code-execution","tag-encryption","tag-ivanti","tag-patch-management","tag-quantum-encryption","tag-sqli","tag-vulnerability-management","tag-vulnerability-scanning"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Weekly VulnRecap - January 8, 2024<\/title>\n<meta name=\"description\" content=\"Discover what vulnerabilities were exploited in the first week of 2024 \u2014 including new and existing ones from Ivanti, Apache, and more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/weekly-vulnerability-recap-january-8-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Weekly VulnRecap - January 8, 2024\" \/>\n<meta property=\"og:description\" content=\"Discover what vulnerabilities were exploited in the first week of 2024 \u2014 including new and existing ones from Ivanti, Apache, and more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/weekly-vulnerability-recap-january-8-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-08T21:04:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-08T22:50:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240108-weekly-vulnerability-recap-January-8-2024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chad Kime\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chad Kime\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/weekly-vulnerability-recap-january-8-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/weekly-vulnerability-recap-january-8-2024\/\"},\"author\":{\"name\":\"Chad Kime\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\"},\"headline\":\"VulnRecap 1\/8\/24 &#8211; Ivanti EPM &#038; Attacks on Old Apache Vulnerabilities\",\"datePublished\":\"2024-01-08T21:04:41+00:00\",\"dateModified\":\"2024-01-08T22:50:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/weekly-vulnerability-recap-january-8-2024\/\"},\"wordCount\":851,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/weekly-vulnerability-recap-january-8-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240108-weekly-vulnerability-recap-January-8-2024.png\",\"keywords\":[\"Apache\",\"arbitrary code execution\",\"encryption\",\"Ivanti\",\"Patch Management\",\"quantum encryption\",\"sqli\",\"Vulnerability Management\",\"vulnerability scanning\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/weekly-vulnerability-recap-january-8-2024\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/weekly-vulnerability-recap-january-8-2024\/\",\"name\":\"Weekly VulnRecap - January 8, 2024\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/weekly-vulnerability-recap-january-8-2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/weekly-vulnerability-recap-january-8-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240108-weekly-vulnerability-recap-January-8-2024.png\",\"datePublished\":\"2024-01-08T21:04:41+00:00\",\"dateModified\":\"2024-01-08T22:50:26+00:00\",\"description\":\"Discover what vulnerabilities were exploited in the first week of 2024 \u2014 including new and existing ones from Ivanti, Apache, and more.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/weekly-vulnerability-recap-january-8-2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/weekly-vulnerability-recap-january-8-2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/weekly-vulnerability-recap-january-8-2024\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240108-weekly-vulnerability-recap-January-8-2024.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240108-weekly-vulnerability-recap-January-8-2024.png\",\"width\":1400,\"height\":900,\"caption\":\"Image: Ar_TH\/Adobe Stock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/weekly-vulnerability-recap-january-8-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"VulnRecap 1\/8\/24 &#8211; Ivanti EPM &#038; Attacks on Old Apache Vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\",\"name\":\"Chad Kime\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"caption\":\"Chad Kime\"},\"description\":\"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Weekly VulnRecap - January 8, 2024","description":"Discover what vulnerabilities were exploited in the first week of 2024 \u2014 including new and existing ones from Ivanti, Apache, and more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/weekly-vulnerability-recap-january-8-2024\/","og_locale":"en_US","og_type":"article","og_title":"Weekly VulnRecap - January 8, 2024","og_description":"Discover what vulnerabilities were exploited in the first week of 2024 \u2014 including new and existing ones from Ivanti, Apache, and more.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/weekly-vulnerability-recap-january-8-2024\/","og_site_name":"eSecurity Planet","article_published_time":"2024-01-08T21:04:41+00:00","article_modified_time":"2024-01-08T22:50:26+00:00","og_image":[{"width":1400,"height":900,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240108-weekly-vulnerability-recap-January-8-2024.png","type":"image\/png"}],"author":"Chad Kime","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Chad Kime","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/weekly-vulnerability-recap-january-8-2024\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/weekly-vulnerability-recap-january-8-2024\/"},"author":{"name":"Chad Kime","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9"},"headline":"VulnRecap 1\/8\/24 &#8211; Ivanti EPM &#038; Attacks on Old Apache Vulnerabilities","datePublished":"2024-01-08T21:04:41+00:00","dateModified":"2024-01-08T22:50:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/weekly-vulnerability-recap-january-8-2024\/"},"wordCount":851,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/weekly-vulnerability-recap-january-8-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240108-weekly-vulnerability-recap-January-8-2024.png","keywords":["Apache","arbitrary code execution","encryption","Ivanti","Patch Management","quantum encryption","sqli","Vulnerability Management","vulnerability scanning"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/weekly-vulnerability-recap-january-8-2024\/","url":"https:\/\/www.esecurityplanet.com\/threats\/weekly-vulnerability-recap-january-8-2024\/","name":"Weekly VulnRecap - January 8, 2024","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/weekly-vulnerability-recap-january-8-2024\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/weekly-vulnerability-recap-january-8-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240108-weekly-vulnerability-recap-January-8-2024.png","datePublished":"2024-01-08T21:04:41+00:00","dateModified":"2024-01-08T22:50:26+00:00","description":"Discover what vulnerabilities were exploited in the first week of 2024 \u2014 including new and existing ones from Ivanti, Apache, and more.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/weekly-vulnerability-recap-january-8-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/weekly-vulnerability-recap-january-8-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/weekly-vulnerability-recap-january-8-2024\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240108-weekly-vulnerability-recap-January-8-2024.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240108-weekly-vulnerability-recap-January-8-2024.png","width":1400,"height":900,"caption":"Image: Ar_TH\/Adobe Stock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/weekly-vulnerability-recap-january-8-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"VulnRecap 1\/8\/24 &#8211; Ivanti EPM &#038; Attacks on Old Apache Vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9","name":"Chad Kime","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","caption":"Chad Kime"},"description":"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.","url":"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/33475"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/271"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=33475"}],"version-history":[{"count":5,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/33475\/revisions"}],"predecessor-version":[{"id":33483,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/33475\/revisions\/33483"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/33476"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=33475"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=33475"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=33475"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=33475"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=33475"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=33475"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}