{"id":33791,"date":"2024-01-29T22:06:15","date_gmt":"2024-01-29T22:06:15","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=33791"},"modified":"2024-01-29T22:26:13","modified_gmt":"2024-01-29T22:26:13","slug":"vulnerability-recap-january-29-2024","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-29-2024\/","title":{"rendered":"VulnRecap 1\/29\/24 \u2013 Apple, Apache &amp; VMware Under Attack"},"content":{"rendered":"\n<p>In this week\u2019s urgent updates, Apple and VMware issued updates for zero-day flaws currently under attack, and researchers detected a rise in attacks on unpatched Apache and Atlassian Confluence servers. Meanwhile, the release of proof-of-concept code starts the countdown to attack on other critical vulnerabilities, including Cisco Enterprise Communication, Fortra GoAnywhere, and GitLab.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.esecurityplanet.com\/networks\/patch-management\/\">Patch management<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-management\/\">vulnerability management<\/a> remain critical, but they assume that other fundamental requirements, such as <a href=\"https:\/\/www.esecurityplanet.com\/products\/it-asset-management-software\/\">asset management<\/a>, remain in place. \u201cThe most significant risk for enterprises isn\u2019t the speed at which they are applying critical patches; it comes from not applying the patches on every asset,\u201d noted Brian Contos, CSO of <a href=\"https:\/\/www.sevcosecurity.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Sevco Security<\/a>. \u201cThe simple fact is that most organizations fail to maintain an up-to-date and accurate IT asset inventory.\u201d<\/p>\n\n\n\n<p>Continue reading below to learn more about this week\u2019s vulnerabilities, but don\u2019t forget to double-check IT asset inventories for accuracy.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">January 19, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Critical VMware vCenter Server Zero-Day Under Attack Since 2021<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Remote code execution (RCE) vulnerability.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> <a href=\"https:\/\/www.mandiant.com\/resources\/blog\/chinese-vmware-exploitation-since-2021\" target=\"_blank\" rel=\"noreferrer noopener\">Mandiant revealed<\/a> possible 2021 exploitation by Chinese espionage attackers for CVE-2023-34048, an out-of-bounds weakness in protocol implementation first publicly <a href=\"https:\/\/www.esecurityplanet.com\/trends\/weekly-vulnerability-recap-october-30-2023\/\">reported in October 2023<\/a>. Mandiant discovered that the VMware Directory Service crashes just prior to the attackers\u2019 backdoor installations enabled by RCE.<\/p>\n\n\n\n<p>The flaw requires no user interaction and affects all versions of VMware\u2019s vSphere product except the very latest versions. Detection of backdoors installed by this attack may be present in log files, but unless an organization keeps extensive log files, there may be no way to rule out compromise.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Update to the latest version of vSphere <a href=\"https:\/\/core.vmware.com\/resource\/vmsa-2023-0023-questions-answers#what-network-ports-should-be-restricted-as-part-of-a-mitigation\" target=\"_blank\" rel=\"noreferrer noopener\">as recommended by VMware<\/a>. There are no known workarounds.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">January 22, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Apple Fixes 16 Vulnerabilities, Including Exploited Zero Days<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> A type confusion issue enables arbitrary code execution (ACE) attacks.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Apple addressed multiple vulnerabilities, but zero-day vulnerability <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-23222\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-23222<\/a> leads the list. Although added to the known exploited vulnerability catalog, experts believe attackers used the WebKit vulnerability primarily on specific targets.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Update to the latest version of the Apple operating system, which is also made available to some <a href=\"https:\/\/support.apple.com\/en-us\/HT214062\" target=\"_blank\" rel=\"noreferrer noopener\">older iOS and iPadOS<\/a> versions.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Critical Apache ActiveMQ Vulnerability Under Active Attack<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> RCE vulnerability.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> <a href=\"https:\/\/www.trustwave.com\/en-us\/resources\/blogs\/spiderlabs-blog\/apache-activemq-vulnerability-leads-to-stealthy-godzilla-webshell\/\" target=\"_blank\" rel=\"noreferrer noopener\">Trustwave reported<\/a> a surge in Godzilla Webshell attacks concealed within unknown binary format files. Unpatched ActiveMQ instances still vulnerable to CVE-2023-46604 (which enabled ransomware attacks <a href=\"https:\/\/www.esecurityplanet.com\/threats\/weekly-vulnerability-recap-nov-6-2023\/\">last November<\/a>) will compile and execute the unknown binary and enable attackers to execute many different types of attacks.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Deploy the Apache security upgrades available since November 2023.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Attackers Prey Upon Outdated Atlassian Confluence Servers<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> RCE vulnerability.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Atlassian disclosed the critical-severity RCE vulnerability, <a href=\"https:\/\/confluence.atlassian.com\/kb\/faq-for-cve-2023-22527-1332810917.html\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-22527<\/a>, in Confluence Server and Data Center on January 16, 2024 and noted that only outdated versions would be affected. By January 22, the Shadowserver research team <a href=\"https:\/\/twitter.com\/Shadowserver\/status\/1749372138685915645\" target=\"_blank\" rel=\"noreferrer noopener\">reported over 600 IP addresses<\/a> testing for unpatched vulnerabilities. Soon after, <a href=\"https:\/\/twitter.com\/TheDFIRReport\/status\/1749066611678466205\" target=\"_blank\" rel=\"noreferrer noopener\">DFIR publicized<\/a> that following any success, some attackers will immediately attempt a cryptojacking exploit.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Update ASAP to the latest versions of Confluence Data Center or Confluence Data Center and Server.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">January 23, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">POC Released, 96% of Fortra GoAnywhere MFT Still Vulnerable<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Authentication bypass vulnerability can create new admin users on exposed admin portals.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Fortra <a href=\"https:\/\/www.fortra.com\/security\/advisory\/fi-2024-001\" target=\"_blank\" rel=\"noreferrer noopener\">disclosed CVE-2024-0204<\/a>, a critical vulnerability with a CVSS score rated 9.8\/10, to the public on January 23rd after issuing patches and notifying customers on December 7, 2023. Customers concerned about exploitation should analyze the admin user group for new or unknown users.<\/p>\n\n\n\n<p>Tenable estimates that <a href=\"https:\/\/www.tenable.com\/blog\/cve-2024-0204-fortra-goanywhere-mft-authentication-bypass-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">more than 96%<\/a> of GoAnywhere MFT instances remain unpatched after one month of patch availability. Unfortunately for those organizations, the <a href=\"https:\/\/www.horizon3.ai\/cve-2024-0204-fortra-goanywhere-mft-authentication-bypass-deep-dive\/\" target=\"_blank\" rel=\"noreferrer noopener\">Horizon3 research team released<\/a> a proof of concept and exploit code, which starts the clock for aggressive attack.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Apply the patches released in December 2023 ASAP. Additionally, Fortra recommends a four step remediation process:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Delete the affected InitialAccountSetup.xhmtl file<\/li>\n\n\n\n<li>Restart services<\/li>\n\n\n\n<li>Establish an empty IntitialAccountSetup.xhmtl file<\/li>\n\n\n\n<li>Restart services<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">January 24, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">5,300 Internet Exposed GitLab Accounts Remain Vulnerable to Takeover<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Account takeover from password-reset emails sent to unverified email addresses.&nbsp;<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Gitlab <a href=\"https:\/\/about.gitlab.com\/releases\/2024\/01\/11\/critical-security-release-gitlab-16-7-2-released\/\" target=\"_blank\" rel=\"noreferrer noopener\">issued a critical advisory<\/a> and patch on January 11, 2024 to publicize the fix and CVE-2023-7028, which earns the most dangerous 10\/10 CVSS score. As of January 24th, Shadowserver researchers still <a href=\"https:\/\/twitter.com\/Shadowserver\/status\/1750115947430416434\" target=\"_blank\" rel=\"noreferrer noopener\">detected 5,300<\/a> older and internet-exposed GitLab accounts.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> GitLab recommends immediate patching that will also fix three other vulnerabilities. However, the flaw does not bypass two-factor authentication (2FA), so implementation of MFA can provide initial remediation.<\/p>\n\n\n\n<p>To check for potential exploitation, Gilab recommends checking internal files:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>gitlab-rails\/production_json.log:<\/strong> Look for HTTP requests to the \/users\/password path with multiple email addresses in a JSON array.<\/li>\n\n\n\n<li><strong>gitlab-rails\/audit_json.log:<\/strong> Look for PasswordsController#create meta.caller.id entries where target_details include multiple email addresses in a JSON array.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Jenkins Command Line Vulnerability Permits RCE<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Arbitrary file read vulnerability that can allow RCE.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> The research team at Sonar <a href=\"https:\/\/www.sonarsource.com\/blog\/excessive-expansion-uncovering-critical-security-vulnerabilities-in-jenkins\/\" target=\"_blank\" rel=\"noreferrer noopener\">announced CVE-2024-23897<\/a>, a critical vulnerability in the Jenkins continuous integration\/continuous delivery (CI\/CD) automation software that automatically replaces \u201c@\u201d characters followed by a file path with the contents of the file at that path. Attackers can use this feature to read arbitrary files, delete items from Jenkins, or execute code remotely.<\/p>\n\n\n\n<p>Sonar also discovered a similar high severity cross-site WebSocket hijacking vulnerability that also uses the command line to execute ACE attacks if a victim clicks a link. Researchers published proof of concept code on GitHub on January 28, 2024 so attacks should begin shortly.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Update to Jenkins 2.442 (or LTS 2.426.3) that disables the \u201c@\u201d character feature. As a workaround, older versions of Jenkins can disable access to the command line interface.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">January 25, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Cisco Enterprise Communication Software Critical RCE Vulnerability<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> RCE attacks that possibly establish root access.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> <a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-cucm-rce-bWNzQcUm\" target=\"_blank\" rel=\"noreferrer noopener\">Cisco announced CVE-2024-20253<\/a>, with a CVSS score of 9.9\/10, within the Unified Communications and Contact Center Solutions (UC\/CC) that provide integrated voice, video, and messaging services.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Cisco primarily recommends application of the free software updates for potentially vulnerable products. While no workarounds exist, access control lists may be established on intermediary devices to restrict access to the specific ports for deployed services and mitigate attacks on vulnerable systems.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">WatchGuard EPDR, Panda Dome, &amp; Panda AD360 Driver Vulnerabilities<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> <a href=\"https:\/\/news.sophos.com\/en-us\/2024\/01\/25\/multiple-vulnerabilities-discovered-in-widely-used-security-driver\/\" target=\"_blank\" rel=\"noreferrer noopener\">Sophos researchers discovered<\/a> three vulnerabilities: pool memory corruption, out-of-bounds-read, and arbitrary read.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> WatchGuard confirmed these three vulnerabilities in WatchGuard Endpoint Protection, Detection, and Response (EPDR), Panda Dome, and Panda Adaptive Defense 360. The pool memory corruption vulnerability, <a href=\"https:\/\/www.watchguard.com\/wgrd-psirt\/advisory\/wgsa-2024-00001\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-6330<\/a> (CVE 6.4), does not authenticate registry information, which could lead to kernel memory pool overflow, denial of service conditions, and possibly ACE with system-level privileges.<\/p>\n\n\n\n<p>Similarly, out-of-bounds vulnerability <a href=\"https:\/\/www.watchguard.com\/wgrd-psirt\/advisory\/wgsa-2024-00002\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-6331<\/a> (CVSS 6.4) can create a denial of service condition and allow ACE with system-level privileges. The lower risk arbitrary read vulnerability <a href=\"https:\/\/www.watchguard.com\/wgrd-psirt\/advisory\/wgsa-2024-00003\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-6332<\/a> (CVSS 4.1) could allow users with admin privileges to leak data from kernel memory,&nbsp;<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Although not high severity, attackers will find potential denial of service attacks attractive because they could disable local endpoint protection. WatchGuard recommends updating to the most recent versions of the products to eliminate the vulnerabilities.<\/p>\n\n\n\n<p><strong>Read next:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-22-2024\/\"><strong>VulnRecap 1\/22\/24 \u2013 Watch Chrome, Ivanti, Citrix Issues<\/strong><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-scanning-tools\/\"><strong>Best Vulnerability Scanner Tools &amp; Software<\/strong><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-management-as-a-service\/\"><strong>Vulnerability Management as a Service (VMaaS): Ultimate Guide<\/strong><\/a><\/li>\n<\/ul>\n\n\n<!-- ICP Plugin: Start --><div class=\"icp-list icp-list-main icp-list-body-top3 row\">\n    \n        <!--\n            ICP Plugin - body top3\n            ----------\n            Category: \n            Country: HK\n        -->\n    <\/div>\n<!-- ICP Plugin: End -->\n\n\n<div id=\"ta-campaign-widget-66d6d521eedac-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6d521eedac\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6d521eedac\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6d521eedac\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6d521eedac\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6d521eedac\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6d521eedac\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Discover major vulnerabilities from the past week, including issues with Apple, Apache, and VMware as well as remediation recommendations.<\/p>\n","protected":false},"author":271,"featured_media":33792,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[],"b2b_audience":[],"b2b_industry":[],"b2b_product":[],"class_list":["post-33791","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Weekly Vulnerability Recap 1\/29\/24: Apple, Apache, &amp; VMware<\/title>\n<meta name=\"description\" content=\"Discover major vulnerabilities from the past week, including issues with Apple, Apache, and VMware as well as remediation recommendations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-29-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Weekly Vulnerability Recap 1\/29\/24: Apple, Apache, &amp; VMware\" \/>\n<meta property=\"og:description\" content=\"Discover major vulnerabilities from the past week, including issues with Apple, Apache, and VMware as well as remediation recommendations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-29-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-29T22:06:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-29T22:26:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240129-vulnerability-recap-january-29-2024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chad Kime\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chad Kime\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-29-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-29-2024\/\"},\"author\":{\"name\":\"Chad Kime\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\"},\"headline\":\"VulnRecap 1\/29\/24 \u2013 Apple, Apache &amp; VMware Under Attack\",\"datePublished\":\"2024-01-29T22:06:15+00:00\",\"dateModified\":\"2024-01-29T22:26:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-29-2024\/\"},\"wordCount\":1231,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-29-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240129-vulnerability-recap-january-29-2024.png\",\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-29-2024\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-29-2024\/\",\"name\":\"Weekly Vulnerability Recap 1\/29\/24: Apple, Apache, & VMware\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-29-2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-29-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240129-vulnerability-recap-january-29-2024.png\",\"datePublished\":\"2024-01-29T22:06:15+00:00\",\"dateModified\":\"2024-01-29T22:26:13+00:00\",\"description\":\"Discover major vulnerabilities from the past week, including issues with Apple, Apache, and VMware as well as remediation recommendations.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-29-2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-29-2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-29-2024\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240129-vulnerability-recap-january-29-2024.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240129-vulnerability-recap-january-29-2024.png\",\"width\":1400,\"height\":900,\"caption\":\"Image: Who is Danny\/Adobe Stock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-29-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"VulnRecap 1\/29\/24 \u2013 Apple, Apache &amp; VMware Under Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\",\"name\":\"Chad Kime\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"caption\":\"Chad Kime\"},\"description\":\"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Weekly Vulnerability Recap 1\/29\/24: Apple, Apache, & VMware","description":"Discover major vulnerabilities from the past week, including issues with Apple, Apache, and VMware as well as remediation recommendations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-29-2024\/","og_locale":"en_US","og_type":"article","og_title":"Weekly Vulnerability Recap 1\/29\/24: Apple, Apache, & VMware","og_description":"Discover major vulnerabilities from the past week, including issues with Apple, Apache, and VMware as well as remediation recommendations.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-29-2024\/","og_site_name":"eSecurity Planet","article_published_time":"2024-01-29T22:06:15+00:00","article_modified_time":"2024-01-29T22:26:13+00:00","og_image":[{"width":1400,"height":900,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240129-vulnerability-recap-january-29-2024.png","type":"image\/png"}],"author":"Chad Kime","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Chad Kime","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-29-2024\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-29-2024\/"},"author":{"name":"Chad Kime","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9"},"headline":"VulnRecap 1\/29\/24 \u2013 Apple, Apache &amp; VMware Under Attack","datePublished":"2024-01-29T22:06:15+00:00","dateModified":"2024-01-29T22:26:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-29-2024\/"},"wordCount":1231,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-29-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240129-vulnerability-recap-january-29-2024.png","articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-29-2024\/","url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-29-2024\/","name":"Weekly Vulnerability Recap 1\/29\/24: Apple, Apache, & VMware","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-29-2024\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-29-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240129-vulnerability-recap-january-29-2024.png","datePublished":"2024-01-29T22:06:15+00:00","dateModified":"2024-01-29T22:26:13+00:00","description":"Discover major vulnerabilities from the past week, including issues with Apple, Apache, and VMware as well as remediation recommendations.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-29-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-29-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-29-2024\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240129-vulnerability-recap-january-29-2024.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/01\/esp_20240129-vulnerability-recap-january-29-2024.png","width":1400,"height":900,"caption":"Image: Who is Danny\/Adobe Stock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-29-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"VulnRecap 1\/29\/24 \u2013 Apple, Apache &amp; VMware Under Attack"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9","name":"Chad Kime","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","caption":"Chad Kime"},"description":"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.","url":"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/33791"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/271"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=33791"}],"version-history":[{"count":4,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/33791\/revisions"}],"predecessor-version":[{"id":33799,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/33791\/revisions\/33799"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/33792"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=33791"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=33791"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=33791"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=33791"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=33791"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=33791"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}