{"id":33639,"date":"2024-01-16T22:14:06","date_gmt":"2024-01-16T22:14:06","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=33639"},"modified":"2024-01-16T22:14:08","modified_gmt":"2024-01-16T22:14:08","slug":"vulnerability-recap-january-16-2024","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-16-2024\/","title":{"rendered":"VulnRecap 1\/16\/24 \u2013 Major Firewall Issues Persist"},"content":{"rendered":"\n<p>The past week and the long weekend have had plenty of vulnerabilities to keep your IT and security teams busy. Both SonicWall and Juniper Networks have seen vulnerabilities that allow remote code execution and denial-of service attacks.<\/p>\n\n\n\n<p>Keep an eye out for security announcements from your firewall vendors; it&#8217;s possible additional similar vulnerabilities will come to light. Continue to monitor all of your software for potential malicious behavior, but this week, monitor network appliances in particular.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">January 10, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Thousands of WordPress Sites Vulnerable to Malware Injection<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Cross-site scripting flaw in Popup Builder that allows a malware injection.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> WordPress plugin Popup Builder is vulnerable to exploitation through a flaw that allows attackers to perform administrator-level actions like installing new rogue plugins or creating new admin accounts. Researcher Marc Montpas from WPScan <a href=\"https:\/\/wpscan.com\/blog\/stored-xss-fixed-in-popup-builder-4-2-3\/\" target=\"_blank\" rel=\"noreferrer noopener\">discovered and reported this vulnerability<\/a> to the creators of the plugin.<\/p>\n\n\n\n<p>Security provider <a href=\"https:\/\/blog.sucuri.net\/2024\/01\/thousands-of-sites-with-popup-builder-compromised-by-balada-injector.html\" target=\"_blank\" rel=\"noreferrer noopener\">Sucuri has researched the malware<\/a> Balada Injector that takes advantage of this vulnerability and found that it&#8217;s compromised over 6,000 sites that have an old version of Popup Builder installed.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Popup Builder released version 4.2.3 with a patch for the vulnerability, but older versions are still being exploited. Update your instance of Popup Builder to 4.2.3 if you haven&#8217;t already. An existing injection can also be removed in the Custom JS or CSS section of Popup Builder; Sucuri offers instructions for doing this.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Juniper Networks SRX &amp; EX Series Compromised&nbsp;<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Remote code execution and denial-of-service attacks.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> <a href=\"https:\/\/supportportal.juniper.net\/s\/article\/2024-01-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Security-Vulnerability-in-J-web-allows-a-preAuth-Remote-Code-Execution-CVE-2024-21591?language=en_US\" target=\"_blank\" rel=\"noreferrer noopener\">Juniper Networks released a bulletin<\/a> about a remote code execution vulnerability in its SRX firewalls and EX switches. The issue is an out-of-bounds write vulnerability, according to Juniper. When exploited, it allows an unauthenticated attacker to execute remote code and a denial-of-service attack. The attacker would also obtain root privileges on the compromised firewall appliance.<\/p>\n\n\n\n<p>This vulnerability is tracked as <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-21591\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-21591<\/a>. Affected versions include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Junos OS versions earlier than 20.4R3-S9<\/li>\n\n\n\n<li>Junos OS 21.2 versions earlier than 21.2R3-S7<\/li>\n\n\n\n<li>Junos OS 21.3 versions earlier than 21.3R3-S5<\/li>\n\n\n\n<li>Junos OS 21.4 versions earlier than 21.4R3-S5<\/li>\n\n\n\n<li>Junos OS 22.1 versions earlier than 22.1R3-S4<\/li>\n\n\n\n<li>Junos OS 22.2 versions earlier than 22.2R3-S3<\/li>\n\n\n\n<li>Junos OS 22.3 versions earlier than 22.3R3-S2<\/li>\n\n\n\n<li>Junos OS 22.4 versions earlier than 22.4R2-S2, 22.4R3<\/li>\n<\/ul>\n\n\n\n<p><strong>The fix:<\/strong> Juniper Networks has the following Junos OS versions that fix the vulnerability:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>20.4R3-S9<\/li>\n\n\n\n<li>21.2R3-S7<\/li>\n\n\n\n<li>21.3R3-S5<\/li>\n\n\n\n<li>21.4R3-S5<\/li>\n\n\n\n<li>22.1R3-S4<\/li>\n\n\n\n<li>22.2R3-S3<\/li>\n\n\n\n<li>22.3R3-S2<\/li>\n\n\n\n<li>22.4R2-S2<\/li>\n\n\n\n<li>22.4R3<\/li>\n\n\n\n<li>23.2R1-S1<\/li>\n\n\n\n<li>23.2R2<\/li>\n\n\n\n<li>23.4R1<\/li>\n\n\n\n<li>All subsequent releases<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Ivanti Zero-Days Leave the Door Open for Command Injection&nbsp;<\/h3>\n\n\n\n<p><strong>Type of attack:<\/strong> Zero-day vulnerability potentially leading to authentication bypass and command injection.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Ivanti announced two vulnerabilities that affect Ivanti Connect Secure VPN and Ivanti Policy Secure products. Potential results of the exploits include authentication bypass and command injection. Versions 9.x and 22.x of both products are affected.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.mandiant.com\/resources\/blog\/suspected-apt-targets-ivanti-zero-day\" target=\"_blank\" rel=\"noreferrer noopener\">Security researchers from Mandiant discovered<\/a> the vulnerability and identified active exploits of it, perpetrated by a threat actor that Mandiant is tracking as UNC5221. This threat actor has deployed at least five malware families using the Ivanti products.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Ivanti is currently developing patches for the vulnerabilities. In the meantime, they&#8217;ve offered a mitigation strategy: Users can import the file <strong>mitigation.release.20240107.1.xml<\/strong> through the download portal. Follow <a href=\"https:\/\/forums.ivanti.com\/s\/article\/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US\" target=\"_blank\" rel=\"noreferrer noopener\">this page<\/a> for updates on patches.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Privilege Escalation Vulnerability Affects Microsoft SharePoint&nbsp;<\/h3>\n\n\n\n<p><strong>Type of attack:<\/strong> <a href=\"https:\/\/www.esecurityplanet.com\/networks\/privilege-escalation-attack\/\">Privilege escalation attack<\/a>.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> The United States Cybersecurity and Infrastructure Security Agency (CISA) <a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2024\/01\/10\/cisa-adds-one-known-exploited-vulnerability-catalog\" target=\"_blank\" rel=\"noreferrer noopener\">has announced a vulnerability<\/a> in Microsoft SharePoint that allows a threat actor to escalate their privileges on the network. Microsoft provided patches for the vulnerability last year, but it&#8217;s still being exploited, according to the CISA.<\/p>\n\n\n\n<p>The vulnerability can be tracked as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-29357\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-29357<\/a>.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Look at Microsoft&#8217;s <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2023-29357\" target=\"_blank\" rel=\"noreferrer noopener\">Patch Tuesday update from last June<\/a> to find patch information for the SharePoint vulnerability.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">January 11, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Smart Thermostat from Bosch Puts Offices in Danger<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Malicious commands sent from an attacker to the thermostat, including potentially replacing firmware with rogue code.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Technology company Bosch has a thermostat, the BCC100, that&#8217;s <a href=\"https:\/\/www.bitdefender.com\/blog\/labs\/vulnerabilities-identified-in-bosch-bcc100-thermostat\/\" target=\"_blank\" rel=\"noreferrer noopener\">vulnerable to firmware replacement<\/a> from a threat actor. Bitdefender discovered this vulnerability and first reported it to Bosch in August 2023. The report didn&#8217;t become publicly available until January 11.<\/p>\n\n\n\n<p>The microcontroller of the thermostat is unable to distinguish between legitimate messages from the cloud server and falsified messages from TCP port 8899 on the local area network. According to Bitdefender, the thermostat does not validate the authenticity of a new firmware update.<\/p>\n\n\n\n<p>The danger of compromised IoT devices is that threat actors could move laterally from a compromised thermostat onto a business&#8217;s computer systems if the thermostat resides in the same office as the network.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Bitdefender offers a smart home scanner app to locate vulnerable IoT devices. While it&#8217;s designed for home use, your business can use it to search for vulnerabilities in your office smart devices. If you have the BCC100 installed, either replace it or segment it on its own network.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">January 15, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Hundreds of Thousands of SonicWall Firewalls Could Be Exploited&nbsp;<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Possible denial-of-service attack and remote code execution by an unauthenticated attacker.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> SonicWall&#8217;s series 6 and 7 next-gen firewalls are susceptible to vulnerabilities that can result in denial of service attacks and remote code execution. <a href=\"https:\/\/bishopfox.com\/blog\/its-2024-and-over-178-000-sonicwall-firewalls-are-publicly-exploitable\" target=\"_blank\" rel=\"noreferrer noopener\">According to researchers at Bishop Fox<\/a>, they scanned firewalls with management consoles that are exposed to the internet and learned that 76% of the firewalls were vulnerable to at least one flaw.&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-22274\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2022-22274<\/a> is a stack-based buffer overflow vulnerability in SonicOS, the firewall&#8217;s operating system. When exploited, it can allow a threat actor to launch a denial-of-service attack and potentially also execute remote code. <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-0656\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-0656<\/a> is the same vulnerability at its root, but it was announced a year later. The code occurs in a different place and was discovered at a different time, so it&#8217;s considered a separate vulnerability.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Bishop Fox provides a <a href=\"https:\/\/github.com\/BishopFox\/CVE-2022-22274_CVE-2023-0656\" target=\"_blank\" rel=\"noreferrer noopener\">test script<\/a> that engineers can use to determine if their firewall instance is vulnerable. In their analysis, the researchers also gave examples of vulnerable code versus safe code. If your device is vulnerable, Bishop Fox recommends disconnecting the management interface from the internet and updating the appliance&#8217;s firmware to the most recent version.<\/p>\n\n\n\n<p><strong>Read next:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/weekly-vulnerability-recap-january-8-2024\/\"><strong>VulnRecap 1\/82024 \u2013 Ivanti EPM &amp; Attacks on Old Apache Vulnerabilities<\/strong><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-scanning-tools\/\"><strong>Best Vulnerability Scanner Tools &amp; Software<\/strong><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-management-lifecycle\/\"><strong>Stages of the Vulnerability Management Lifecycle<\/strong><\/a><\/li>\n<\/ul>\n\n\n<!-- ICP Plugin: Start --><div class=\"icp-list icp-list-main icp-list-body-horizontal row\">\n    \n        <!--\n            ICP Plugin - body horizontal\n            ----------\n            Category: \n            Count: 3\n            Country: HK\n        -->\n    <\/div><!-- ICP Plugin: End -->\n\n\n<div id=\"ta-campaign-widget-66d6dc1785438-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6dc1785438\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6dc1785438\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6dc1785438\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6dc1785438\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6dc1785438\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6dc1785438\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Discover what vulnerabilities were exposed last week, including ones from major providers like SonicWall and Juniper Networks.<\/p>\n","protected":false},"author":238,"featured_media":33640,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[],"b2b_audience":[],"b2b_industry":[],"b2b_product":[],"class_list":["post-33639","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Weekly VulnRecap - January 16, 2024<\/title>\n<meta name=\"description\" content=\"Discover what vulnerabilities were exposed last week, including ones from major providers like SonicWall and Juniper Networks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-16-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Weekly VulnRecap - January 16, 2024\" \/>\n<meta property=\"og:description\" content=\"Discover what vulnerabilities were exposed last week, including ones from major providers like SonicWall and Juniper Networks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-16-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-16T22:14:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-16T22:14:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240116-vulnerability-recap-january-16-2024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jenna Phipps\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jenna Phipps\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-16-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-16-2024\/\"},\"author\":{\"name\":\"Jenna Phipps\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb\"},\"headline\":\"VulnRecap 1\/16\/24 \u2013 Major Firewall Issues Persist\",\"datePublished\":\"2024-01-16T22:14:06+00:00\",\"dateModified\":\"2024-01-16T22:14:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-16-2024\/\"},\"wordCount\":1102,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-16-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240116-vulnerability-recap-january-16-2024.png\",\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-16-2024\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-16-2024\/\",\"name\":\"Weekly VulnRecap - January 16, 2024\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-16-2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-16-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240116-vulnerability-recap-january-16-2024.png\",\"datePublished\":\"2024-01-16T22:14:06+00:00\",\"dateModified\":\"2024-01-16T22:14:08+00:00\",\"description\":\"Discover what vulnerabilities were exposed last week, including ones from major providers like SonicWall and Juniper Networks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-16-2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-16-2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-16-2024\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240116-vulnerability-recap-january-16-2024.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240116-vulnerability-recap-january-16-2024.png\",\"width\":1400,\"height\":900,\"caption\":\"Image: NicoElNino\/Adobe Stock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-16-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"VulnRecap 1\/16\/24 \u2013 Major Firewall Issues Persist\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb\",\"name\":\"Jenna Phipps\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg\",\"caption\":\"Jenna Phipps\"},\"description\":\"Jenna Phipps is a staff writer for eSecurity Planet and has years of experience in B2B technical content writing. She covers security practices, vulnerabilities, data protection, and the top products in the cybersecurity industry. She also writes about the importance of cybersecurity technologies and training in business environments, as well as the role that security plays in data storage and management. When Jenna's not writing about security, you can find her reading, shopping, eating smoothie bowls, or spending time with friends.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jphipps\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Weekly VulnRecap - January 16, 2024","description":"Discover what vulnerabilities were exposed last week, including ones from major providers like SonicWall and Juniper Networks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-16-2024\/","og_locale":"en_US","og_type":"article","og_title":"Weekly VulnRecap - January 16, 2024","og_description":"Discover what vulnerabilities were exposed last week, including ones from major providers like SonicWall and Juniper Networks.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-16-2024\/","og_site_name":"eSecurity Planet","article_published_time":"2024-01-16T22:14:06+00:00","article_modified_time":"2024-01-16T22:14:08+00:00","og_image":[{"width":1400,"height":900,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240116-vulnerability-recap-january-16-2024.png","type":"image\/png"}],"author":"Jenna Phipps","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jenna Phipps","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-16-2024\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-16-2024\/"},"author":{"name":"Jenna Phipps","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb"},"headline":"VulnRecap 1\/16\/24 \u2013 Major Firewall Issues Persist","datePublished":"2024-01-16T22:14:06+00:00","dateModified":"2024-01-16T22:14:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-16-2024\/"},"wordCount":1102,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-16-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240116-vulnerability-recap-january-16-2024.png","articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-16-2024\/","url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-16-2024\/","name":"Weekly VulnRecap - January 16, 2024","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-16-2024\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-16-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240116-vulnerability-recap-january-16-2024.png","datePublished":"2024-01-16T22:14:06+00:00","dateModified":"2024-01-16T22:14:08+00:00","description":"Discover what vulnerabilities were exposed last week, including ones from major providers like SonicWall and Juniper Networks.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-16-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-16-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-16-2024\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240116-vulnerability-recap-january-16-2024.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240116-vulnerability-recap-january-16-2024.png","width":1400,"height":900,"caption":"Image: NicoElNino\/Adobe Stock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-16-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"VulnRecap 1\/16\/24 \u2013 Major Firewall Issues Persist"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb","name":"Jenna Phipps","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg","caption":"Jenna Phipps"},"description":"Jenna Phipps is a staff writer for eSecurity Planet and has years of experience in B2B technical content writing. She covers security practices, vulnerabilities, data protection, and the top products in the cybersecurity industry. She also writes about the importance of cybersecurity technologies and training in business environments, as well as the role that security plays in data storage and management. When Jenna's not writing about security, you can find her reading, shopping, eating smoothie bowls, or spending time with friends.","url":"https:\/\/www.esecurityplanet.com\/author\/jphipps\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/33639"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/238"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=33639"}],"version-history":[{"count":5,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/33639\/revisions"}],"predecessor-version":[{"id":33649,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/33639\/revisions\/33649"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/33640"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=33639"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=33639"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=33639"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=33639"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=33639"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=33639"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}