{"id":33842,"date":"2024-02-05T20:06:35","date_gmt":"2024-02-05T20:06:35","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=33842"},"modified":"2024-02-05T20:06:37","modified_gmt":"2024-02-05T20:06:37","slug":"vulnerability-recap-february-5-2024","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-5-2024\/","title":{"rendered":"VulnRecap 2\/5\/24 \u2013 Azure, Apple, Ivanti, &amp; Mastodon at Risk"},"content":{"rendered":"\n<p>Critical multi-platform vulnerabilities impacting diverse systems dominated the past week\u2019s cybersecurity headlines. Juniper Networks released updates for the high-severity flaws in SRX and EX Series. A coding vulnerability in Microsoft&#8217;s Azure Pipelines affected 70,000 open-source projects. Linux distros faced a heap-based buffer overflow issue. Jenkins CLI exposed flaws in build systems, and Mastodon encountered a critical origin validation error.<\/p>\n\n\n\n<p>With the recent surge in critical vulnerabilities, organizations should regularly update and <a href=\"https:\/\/www.esecurityplanet.com\/networks\/patch-management\/\">patch<\/a> software, and perform routine <a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/\">vulnerability assessments<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/networks\/penetration-testing-vs-vulnerability-testing\/\">penetration testing<\/a>. Vendor risk management and collaboration within the industry further enhance your system\u2019s resiliency. Keep reading for further details on this week\u2019s vulnerabilities.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">January 29, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Juniper Releases Updates for Critical RCE Vulnerabilities&nbsp;<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Missing authentication flaw and cross-site scripting (XSS) vulnerability.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Juniper Networks&#8217; SRX and EX Series include high-severity weaknesses, particularly <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-21619\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-21619<\/a> (CVSS score: 5.3), a missing authentication vulnerability that exposes sensitive information, and <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-21620\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-21620<\/a> (CVSS score: 8.8), a cross-site scripting bug that allows arbitrary command execution. Both affect J-Web and all Junos OS versions. Exploiting these issues could provide a threat actor control over systems.<\/p>\n\n\n\n<p>The Known Exploited Vulnerabilities list also added the previously disclosed issues <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-36846\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-36846<\/a> and <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-36851\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-36851<\/a>, emphasizing the importance of immediate fix.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Juniper Networks has published <a href=\"https:\/\/supportportal.juniper.net\/s\/article\/2024-01-Out-of-Cycle-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Multiple-vulnerabilities-in-J-Web-have-been-addressed?language=en_US\" target=\"_blank\" rel=\"noreferrer noopener\">out-of-cycle fixes<\/a> for CVE-2024-21619 and CVE-2024-21620 \u2014\u00a0apply fixes to the identified versions. As a temporary remedy, disable J-Web or limit access to trusted hosts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">January 30, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Azure Pipelines Code Flaw Hits Open-Source Projects<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Code vulnerability in Microsoft&#8217;s Azure Pipelines.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Legit Security researchers <a href=\"https:\/\/www.legitsecurity.com\/blog\/azure-devops-zero-click-ci\/cd-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">discovered<\/a> a vulnerability in Azure Pipelines that affects approximately 70,000 open-source projects. Exploiting this issue enables hackers to introduce malicious code during testing, potentially exposing sensitive data. It&#8217;s triggered by contributions to build system projects and tricks the system into running test code in a live environment. This gets a severity score of 7.3 out of 10.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Microsoft already <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36561\" target=\"_blank\" rel=\"noreferrer noopener\">issued a fix<\/a> in October 2023 to address this vulnerability. It protects the customers who have received the most recent updates or have them installed automatically. The issue primarily affects the on-premise version of Azure Pipelines, requiring manual updates for security. Additionally, <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/devops\/release-notes\/2023\/pipelines\/sprint-226-update#centralized-control-for-building-prs-from-forked-github-repos\" target=\"_blank\" rel=\"noreferrer noopener\">Azure DevOps<\/a> now streamlines organization-level policy control for creating pull requests from forked GitHub projects.<\/p>\n\n\n\n<p>Neil Carpenter, principal technical evangelist at Orca Security, issued an advisement regarding Azure Pipelines and Jenkins CLI vulnerabilities:<\/p>\n\n\n\n<p><em>\u00a0&#8220;This [Azure Pipelines] disclosure and the Jenkins arbitrary file read vulnerability disclosed last week highlight that organizations need to focus not just on the security of their applications themselves but, also, the security of the infrastructure used to build and test the applications. Organizations should be sure they have solid plans for the security of CI\/CD pipelines and updating and monitoring DevOps infrastructure, and that they have clear response plans if a potential incident is found.&#8221;<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">January 31, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Apple Faces New Active Exploitation in Multiple OS&nbsp;<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Kernel flaw impacting iOS, iPadOS, macOS, tvOS, and watchOS.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-48618\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2022-48618<\/a> (CVSS score: 7.8) allows attackers with arbitrary read and write privileges to potentially overcome Pointer Authentication, which affects several Apple operating systems. Exploitation poses the possibility of unauthorized access and control over affected devices. Despite Apple&#8217;s December 2022 patch, the flaw&#8217;s public disclosure a year later exposes possible vulnerabilities in devices running versions prior to iOS 15.7.1, requiring immediate action.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Apply the issued <a href=\"https:\/\/support.apple.com\/en-us\/HT201222\" target=\"_blank\" rel=\"noreferrer noopener\">patches<\/a> starting December 13, 2022, by updating to iOS 16.2, iPadOS 16.2, macOS Ventura 13.1, tvOS 16.2, and watchOS 9.2. Given the reported vulnerability, federal civilian executive branch agencies should implement solutions by February 21, 2024. Additionally, Apple expanded fixes for a WebKit bug (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-23222\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-23222<\/a>) to include the Apple Vision Pro headset in visionOS 1.0.2.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Glibc Flaw Threatens Major Linux Distributions<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Heap-based buffer overflow vulnerability in the GNU C library.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> A recently discovered vulnerability (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-6246\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-6246<\/a>) in glibc&#8217;s __vsyslog_internal() function poses a serious threat to Linux systems, allowing local attackers to gain complete root access. This heap-based buffer overflow was accidentally introduced in glibc 2.37 in August 2022, and it affects major Linux distributions such as Debian, Ubuntu, and Fedora.<\/p>\n\n\n\n<p>Qualys, a cybersecurity firm, also <a href=\"https:\/\/blog.qualys.com\/vulnerabilities-threat-research\/2024\/01\/30\/qualys-tru-discovers-important-vulnerabilities-in-gnu-c-librarys-syslog\" target=\"_blank\" rel=\"noreferrer noopener\">uncovered<\/a> more issues (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-6779\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-6779<\/a> and <a href=\"https:\/\/ubuntu.com\/security\/CVE-2023-6780\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-6780<\/a>) in __vsyslog_internal(), as well as a qsort() bug that causes memory corruption and has affected all glibc versions since 1992.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Mitigate CVE-2023-6246 by updating glibc to a version released after the bug was introduced in glibc 2.37. Because of the greater impact, timely updates are critical. Address other vulnerabilities (CVE-2023-6779 and CVE-2023-6780) by regularly checking for glibc upgrades.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">February 1, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Jenkins CLI Vulnerability Enables RCE<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Arbitrary file read vulnerability that can allow RCE.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-23897\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-23897<\/a> reveals a significant vulnerability in the Jenkins CLI, allowing attackers to access files on the controller file system. This security issue stems from an apparently harmless CLI feature that grants unauthorized access to sensitive data and cryptographic keys. With a CVSS score of 9.8, the vulnerability allows remote code execution and other attacks.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Following the vulnerability patches <a href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-29-2024\/\">last week<\/a>, there&#8217;s a newly <a href=\"https:\/\/github.com\/binganao\/CVE-2024-23897\" target=\"_blank\" rel=\"noreferrer noopener\">updated Proof-of-Concept (PoC)<\/a> exploit for CVE-2024-23897 published on <a href=\"https:\/\/github.com\/binganao\/CVE-2024-23897\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub<\/a>. Users are strongly advised to update their installations to the latest version promptly to mitigate potential risks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Ivanti Discloses Two New High Severity Flaws, Releases Patch Updates<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Privilege escalation and server-side request forgery.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Ivanti warns of <a href=\"https:\/\/forums.ivanti.com\/s\/article\/CVE-2024-21888-Privilege-Escalation-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure?language=en_US\" target=\"_blank\" rel=\"noreferrer noopener\">two high-severity flaws<\/a> in Connect Secure and Policy Secure, one of which has been targeted for exploitation. <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-21888\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-21888<\/a> (CVSS score: 8.8) enables privilege escalation, whereas <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-21893\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-21893<\/a> (CVSS score: 8.2) discloses a server-side request forgery in SAML. There is no indication of CVE-2024-21888 impact so far, although CVE-2024-21893 exploitation is targeted and affects a small number of consumers. Ivanti predicts increased exploitation once the details become public.<\/p>\n\n\n\n<p>CISA published an <a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2024\/01\/30\/updated-new-software-updates-and-mitigations-defend-against-exploitation-ivanti-connect-secure-and\" target=\"_blank\" rel=\"noreferrer noopener\">advisory<\/a> outlining updated mitigations to prevent threat actors from exploiting vulnerabilities in Ivanti Connect Secure and Policy Secure Gateways on Ivanti devices.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Ivanti has <a href=\"https:\/\/www.ivanti.com\/blog\/security-update-for-ivanti-connect-secure-and-ivanti-policy-secure-gateways\" target=\"_blank\" rel=\"noreferrer noopener\">released patches<\/a> for high-risk issues in Connect Secure and Policy Secure. Apply patches to 9.1R14.4, 9.1R17.2, 9.1R18.3, 22.4R2.2, 22.5R1.1, and 22.6R1.3. To avoid threat actor persistence, they recommend doing a factory reset before patching. Import &#8220;mitigation.release.20240126.5.xml&#8221; as a temporary solution, but remain alert as exploitation may increase upon public publication.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">February 2, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Mastodon Vulnerability Poses Remote Account Impersonation Risks<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Critical origin validation error.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Mastodon, an open-source platform used to build self-hosted social networking services, identified a significant security flaw (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-23832\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-23832<\/a>, CVSS score: 9.4). It allows attackers to mimic and take control of any account on the decentralized social network due to inadequate origin validation. Vulnerable versions include pre-3.5.17, 4.0.x (pre-4.0.13), 4.1.x (pre-4.1.13), and 4.2.x (pre-4.2.5).<\/p>\n\n\n\n<p>This disclosure comes seven months after Mastodon <a href=\"https:\/\/github.com\/mastodon\/mastodon\/security\/advisories\/GHSA-9928-3cp5-93fm\" target=\"_blank\" rel=\"noreferrer noopener\">patched<\/a> two other severe problems (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-36460\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-36460<\/a> and <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-36459\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-36459<\/a>) that might be used by attackers to launch denial-of-service (DoS) or remote code execution.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> To address CVE-2024-23832, Mastodon recommends <a href=\"https:\/\/github.com\/mastodon\/mastodon\/releases\" target=\"_blank\" rel=\"noreferrer noopener\">upgrading<\/a> to versions 3.5.17, 4.0.13, 4.1.13, or 4.2.5. Admins must apply changes by February 15, 2024; however, Mastodon is withholding technical details to reduce the danger of exploitation. Individual administrators must ensure that their instances receive security updates on time due to the federated structure of the decentralized network.<\/p>\n\n\n\n<p><strong>Read next:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-january-29-2024\/\"><strong>VulnRecap 1\/29\/24 \u2013 Apple, Apache &amp; VMware Under Attack<\/strong><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\"><strong>6 Best Vulnerability Management Software &amp; Systems in 2024<\/strong><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-scanning-tools\/\"><strong>7 Best Vulnerability Scanning Tools &amp; Software for 2024<\/strong><\/a><\/li>\n<\/ul>\n\n\n<!-- ICP Plugin: Start --><div class=\"icp-list icp-list-main icp-list-body-top3 row\">\n    \n        <!--\n            ICP Plugin - body top3\n            ----------\n            Category: \n            Country: HK\n        -->\n    <\/div>\n<!-- ICP Plugin: End -->\n\n\n<div id=\"ta-campaign-widget-66d6fa42a24b7-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6fa42a24b7\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6fa42a24b7\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6fa42a24b7\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6fa42a24b7\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6fa42a24b7\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6fa42a24b7\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Discover the past week\u2019s critical vulnerabilities, spanning Azure, Apple, Ivanti, Mastodon, and more, as well as the recommended remediation measures. <\/p>\n","protected":false},"author":331,"featured_media":33843,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[],"b2b_audience":[],"b2b_industry":[],"b2b_product":[],"class_list":["post-33842","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Weekly Vulnerability Recap 2\/5\/24: Azure, Apple, Ivanti &amp; Mastodon<\/title>\n<meta name=\"description\" content=\"Discover the past week\u2019s vulnerabilities, spanning Azure, Apple, Ivanti, Mastodon, and more, as well as the recommended remediation measures.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-5-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Weekly Vulnerability Recap 2\/5\/24: Azure, Apple, Ivanti &amp; Mastodon\" \/>\n<meta property=\"og:description\" content=\"Discover the past week\u2019s vulnerabilities, spanning Azure, Apple, Ivanti, Mastodon, and more, as well as the recommended remediation measures.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-5-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-05T20:06:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-05T20:06:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240206-vulnerability-recap-february-5-2024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Maine Basan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Maine Basan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-5-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-5-2024\/\"},\"author\":{\"name\":\"Maine Basan\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/48c58015ca79ab3ed057abd7a52b2206\"},\"headline\":\"VulnRecap 2\/5\/24 \u2013 Azure, Apple, Ivanti, &amp; Mastodon at Risk\",\"datePublished\":\"2024-02-05T20:06:35+00:00\",\"dateModified\":\"2024-02-05T20:06:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-5-2024\/\"},\"wordCount\":1236,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-5-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240206-vulnerability-recap-february-5-2024.png\",\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-5-2024\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-5-2024\/\",\"name\":\"Weekly Vulnerability Recap 2\/5\/24: Azure, Apple, Ivanti & Mastodon\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-5-2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-5-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240206-vulnerability-recap-february-5-2024.png\",\"datePublished\":\"2024-02-05T20:06:35+00:00\",\"dateModified\":\"2024-02-05T20:06:37+00:00\",\"description\":\"Discover the past week\u2019s vulnerabilities, spanning Azure, Apple, Ivanti, Mastodon, and more, as well as the recommended remediation measures.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-5-2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-5-2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-5-2024\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240206-vulnerability-recap-february-5-2024.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240206-vulnerability-recap-february-5-2024.png\",\"width\":1400,\"height\":900,\"caption\":\"Image: CROCOTHERY\/Adobe Stock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-5-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"VulnRecap 2\/5\/24 \u2013 Azure, Apple, Ivanti, &amp; Mastodon at Risk\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/48c58015ca79ab3ed057abd7a52b2206\",\"name\":\"Maine Basan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/HH50049850_Maine_Basan-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/HH50049850_Maine_Basan-150x150.jpg\",\"caption\":\"Maine Basan\"},\"description\":\"Maine is an eSecurity Planet writer with a foundation in eLearning content development, research, and academic CRM implementation. She studied BA Communication Arts at the University of the Philippines. She now leverages her communication experiences as a writer and product analyst, engaging the B2B audience with insights into cybersecurity trends and solutions. Off the clock, Maine\u2019s probably immersed in her spreadsheets, organizing her life or planning her next K-pop concert and beach getaways.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/mbasan\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Weekly Vulnerability Recap 2\/5\/24: Azure, Apple, Ivanti & Mastodon","description":"Discover the past week\u2019s vulnerabilities, spanning Azure, Apple, Ivanti, Mastodon, and more, as well as the recommended remediation measures.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-5-2024\/","og_locale":"en_US","og_type":"article","og_title":"Weekly Vulnerability Recap 2\/5\/24: Azure, Apple, Ivanti & Mastodon","og_description":"Discover the past week\u2019s vulnerabilities, spanning Azure, Apple, Ivanti, Mastodon, and more, as well as the recommended remediation measures.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-5-2024\/","og_site_name":"eSecurity Planet","article_published_time":"2024-02-05T20:06:35+00:00","article_modified_time":"2024-02-05T20:06:37+00:00","og_image":[{"width":1400,"height":900,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240206-vulnerability-recap-february-5-2024.png","type":"image\/png"}],"author":"Maine Basan","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Maine Basan","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-5-2024\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-5-2024\/"},"author":{"name":"Maine Basan","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/48c58015ca79ab3ed057abd7a52b2206"},"headline":"VulnRecap 2\/5\/24 \u2013 Azure, Apple, Ivanti, &amp; Mastodon at Risk","datePublished":"2024-02-05T20:06:35+00:00","dateModified":"2024-02-05T20:06:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-5-2024\/"},"wordCount":1236,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-5-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240206-vulnerability-recap-february-5-2024.png","articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-5-2024\/","url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-5-2024\/","name":"Weekly Vulnerability Recap 2\/5\/24: Azure, Apple, Ivanti & Mastodon","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-5-2024\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-5-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240206-vulnerability-recap-february-5-2024.png","datePublished":"2024-02-05T20:06:35+00:00","dateModified":"2024-02-05T20:06:37+00:00","description":"Discover the past week\u2019s vulnerabilities, spanning Azure, Apple, Ivanti, Mastodon, and more, as well as the recommended remediation measures.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-5-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-5-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-5-2024\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240206-vulnerability-recap-february-5-2024.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240206-vulnerability-recap-february-5-2024.png","width":1400,"height":900,"caption":"Image: CROCOTHERY\/Adobe Stock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-5-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"VulnRecap 2\/5\/24 \u2013 Azure, Apple, Ivanti, &amp; Mastodon at Risk"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/48c58015ca79ab3ed057abd7a52b2206","name":"Maine Basan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/HH50049850_Maine_Basan-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/HH50049850_Maine_Basan-150x150.jpg","caption":"Maine Basan"},"description":"Maine is an eSecurity Planet writer with a foundation in eLearning content development, research, and academic CRM implementation. She studied BA Communication Arts at the University of the Philippines. She now leverages her communication experiences as a writer and product analyst, engaging the B2B audience with insights into cybersecurity trends and solutions. Off the clock, Maine\u2019s probably immersed in her spreadsheets, organizing her life or planning her next K-pop concert and beach getaways.","url":"https:\/\/www.esecurityplanet.com\/author\/mbasan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/33842"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/331"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=33842"}],"version-history":[{"count":9,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/33842\/revisions"}],"predecessor-version":[{"id":33866,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/33842\/revisions\/33866"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/33843"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=33842"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=33842"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=33842"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=33842"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=33842"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=33842"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}