{"id":33982,"date":"2024-02-12T22:39:46","date_gmt":"2024-02-12T22:39:46","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=33982"},"modified":"2024-02-12T22:48:47","modified_gmt":"2024-02-12T22:48:47","slug":"vulnerability-recap-february-12-2024","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-12-2024\/","title":{"rendered":"VulnRecap 2\/12\/24: Ivanti, JetBrains, Fortinet, Linux Issues"},"content":{"rendered":"\n<p>This week saw some repeat products from previous vulnerability recaps, such as Ivanti Policy Secure and JetBrains TeamCity servers. One of the most notable vulnerabilities for this week is Fortinet&#8217;s critical FortiOS issue, which affects Fortinet products that use the affected versions of the network operating system. Make sure your security teams consistently check vendor bulletins for vulnerability announcements so your business can stay on top of all threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">February 5, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">JetBrains TeamCity Saga Continues with Another Server Vulnerability&nbsp;<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Authentication bypass by an unauthenticated attacker.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> JetBrains has discovered yet another vulnerability, affecting multiple TeamCity on-premises servers. This vulnerability can allow an unauthenticated attacker who has HTTP(S) TeamCity server access to bypass authentication checks and gain administrative control of that TeamCity server, <a href=\"https:\/\/blog.jetbrains.com\/teamcity\/2024\/02\/critical-security-issue-affecting-teamcity-on-premises-cve-2024-23917\/\" target=\"_blank\" rel=\"noreferrer noopener\">according to JetBrains<\/a>. The vulnerability is tracked as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-23917\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-23917<\/a>.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> According to JetBrains, the vulnerability affects TeamCity on-prem versions 2017.1 through 2023.11.2. JetBrains fixed it in version 2023.11.3 and continues to encourage users to update servers to the most recent version.<\/p>\n\n\n\n<p>JetBrains also announced that it had already patched TeamCity Cloud Servers and verified that they hadn&#8217;t been attacked.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">February 6, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Linux Vulnerability Comes on Heels of Last Week&#8217;s Announcement<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Remote code execution.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Linux distributions have seen a new vulnerability, a remote code execution in the Shim software Secure Boot process. This code exists in all software that uses Secure Boot, like SUSE, Red Hat, and Debian. The RCE vulnerability is tracked as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-40547\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-40547<\/a> and has a severity rating of 8.3. This is not to be confused with last week&#8217;s heap-based buffer overflow vulnerability.<\/p>\n\n\n\n<p>Attackers can use man-in-the-middle techniques to exploit the vulnerability. They could also locally exploit CVE-2023-40547 if they had sufficient privileges or could manipulate PXE to chain-load a vulnerable shim bootloader, <a href=\"https:\/\/eclypsium.com\/blog\/the-real-shim-shady-how-cve-2023-40547-impacts-most-linux-systems\/\" target=\"_blank\" rel=\"noreferrer noopener\">according to researchers at Eclypsium<\/a>.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> For mitigation, <a href=\"https:\/\/access.redhat.com\/security\/cve\/CVE-2023-40547\" target=\"_blank\" rel=\"noreferrer noopener\">Red Hat recommends<\/a> configuring the boot order of the server to &#8216;disable&#8217; or skipping the network boot process.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Orca Publishes Study on Issues in Azure HDInsight Third Parties<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Privilege escalation and denial of service.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Microsoft Azure&#8217;s HDInsight product has multiple third-party services with recently discovered vulnerabilities, including Apache Spark, Kafka, and Hadoop. Orca Security published a <a href=\"https:\/\/orca.security\/resources\/blog\/azure-hd-insight-vulnerabilities-privilege-escalation\/\" target=\"_blank\" rel=\"noreferrer noopener\">blog post about the vulnerabilities<\/a> \u2014 its researchers discovered and reported the issues in Fall 2023, and Microsoft quickly patched them. Orca has now released further research information.<\/p>\n\n\n\n<p>The Apache products had three known vulnerabilities, two potentially leading to privilege escalation and one a potential cause of Regex denial of service. Both vulnerabilities affected authenticated users of Apache Oozie and Apache Ambari.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/hdinsight\/hdinsight-release-notes\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft has released patches<\/a> for all three vulnerabilities \u2014 <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-38156\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-36419<\/a>, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-38156\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-38156<\/a>, and the Regex DoS vulnerability, which doesn&#8217;t have an assigned CVE number.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">February 8, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">FortiOS Sees Critical Vulnerability in SSL VPN Functionality<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Arbitrary code execution by an unauthenticated user.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Fortinet disclosed a vulnerability in its SSL VPN feature within FortiOS, the operating system that manages its next-generation firewall products. The vulnerability is an out-of-bounds write issue that, when exploited, could permit a remote unauthenticated attacker to execute arbitrary code through specific HTTP requests.<\/p>\n\n\n\n<p>The vulnerability is tracked as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-21762\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-21762<\/a> and has a critical severity rating. Fortinet warns that it&#8217;s potentially being exploited in the wild.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Fortinet told users to disable SSL VPN. It also emphasized that &#8216;disable webmode&#8217; won&#8217;t solve the problem and isn\u2019t a legitimate workaround.<\/p>\n\n\n\n<p>Fortinet provides the following upgrade information for affected versions:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>FortiOS 7.4 (versions 7.4.0 through 7.4.2): 7.4.3 or above<\/li>\n\n\n\n<li>FortiOS 7.2 (versions 7.2.0 through 7.2.6): 7.2.7 or above<\/li>\n\n\n\n<li>FortiOS 7.0 (versions 7.0.0 through 7.0.13): 7.0.14 or above<\/li>\n\n\n\n<li>FortiOS 6.4 (versions 6.4.0 through 6.4.14): 6.4.15 or above<\/li>\n\n\n\n<li>FortiOS 6.2 (versions 6.2.0 through 6.2.15): 6.2.16 or above<\/li>\n\n\n\n<li>FortiOS 6.0 (all versions of 6.0): Migrate to fixed release of FortiOS<\/li>\n<\/ul>\n\n\n\n<p>Fortinet also offers <a href=\"https:\/\/fortiguard.fortinet.com\/psirt\/FG-IR-24-015\" target=\"_blank\" rel=\"noreferrer noopener\">upgrade information for FortiProxy<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">There&#8217;s a New Ivanti Vulnerability in Connect Secure &amp; Policy Secure<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Resource access by an unauthenticated attacker.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Ivanti&#8217;s encountered multiple issues the last couple of months, and now a new <a href=\"https:\/\/forums.ivanti.com\/s\/article\/CVE-2024-22024-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure?language=en_US\" target=\"_blank\" rel=\"noreferrer noopener\">Connect Secure and Policy Secure vulnerability<\/a> has reared its head. The vulnerability allows an unauthenticated attacker to access restricted resources through an XML external entity or XXE vulnerability in the SAML component of the affected versions of Policy Secure, Connect Secure, and ZTA gateways.<\/p>\n\n\n\n<p>The vulnerability is tracked as <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-22024\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-22024<\/a> and has a CVSS severity rating of 8.3.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Ivanti has released patches for the following product versions:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Connect Secure 9.1R14.5&nbsp;<\/li>\n\n\n\n<li>Connect Secure 9.1R17.3&nbsp;<\/li>\n\n\n\n<li>Connect Secure 9.1R18.4&nbsp;<\/li>\n\n\n\n<li>Connect Secure 22.4R2.3&nbsp;<\/li>\n\n\n\n<li>Connect Secure 22.5R1.2&nbsp;<\/li>\n\n\n\n<li>Connect Secure 22.5R2.3&nbsp;<\/li>\n\n\n\n<li>Connect Secure 22.6R2.2<\/li>\n\n\n\n<li>Policy Secure 9.1R17.3&nbsp;<\/li>\n\n\n\n<li>Policy Secure9.1R18.4&nbsp;<\/li>\n\n\n\n<li>Policy Secure 22.5R1.2<\/li>\n\n\n\n<li>ZTA gateway 22.5R1.6<\/li>\n\n\n\n<li>ZTA gateway 22.6R1.5&nbsp;<\/li>\n\n\n\n<li>ZTA gateway 22.6R1.7<\/li>\n<\/ul>\n\n\n\n<p><strong>Read next:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-5-2024\/\"><strong>VulnRecap 2\/5\/24 \u2014 Azure, Apple, Ivanti, &amp; Mastodon at Risk<\/strong><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\"><strong>6 Best Vulnerability Management Software &amp; Systems in 2024<\/strong><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-scanning-tools\/\"><strong>7 Best Vulnerability Scanning Tools &amp; Software for 2024<\/strong><\/a><\/li>\n<\/ul>\n\n\n<!-- ICP Plugin: Start --><div class=\"icp-list icp-list-main icp-list-body-top3 row\">\n    \n        <!--\n            ICP Plugin - body top3\n            ----------\n            Category: \n            Country: HK\n        -->\n    <\/div>\n<!-- ICP Plugin: End -->\n\n\n<div id=\"ta-campaign-widget-66d6ceba2a34d-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6ceba2a34d\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6ceba2a34d\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6ceba2a34d\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6ceba2a34d\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6ceba2a34d\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6ceba2a34d\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>See the latest vulnerability news. Discover the top vulnerabilities from the past week \u2014 including Ivanti and JetBrains\u2019 continued problems.<\/p>\n","protected":false},"author":238,"featured_media":33983,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[1970],"b2b_audience":[33],"b2b_industry":[63],"b2b_product":[375],"class_list":["post-33982","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-vulnerability","b2b_audience-awareness-and-consideration","b2b_industry-technology","b2b_product-security-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Weekly Vulnerability Recap 2\/12\/24: Continued Ivanti, JetBrains Issues<\/title>\n<meta name=\"description\" content=\"See the latest vulnerability news. Discover the top vulnerabilities from the past week \u2014 including Ivanti and JetBrains\u2019 continued problems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-12-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Weekly Vulnerability Recap 2\/12\/24: Continued Ivanti, JetBrains Issues\" \/>\n<meta property=\"og:description\" content=\"See the latest vulnerability news. Discover the top vulnerabilities from the past week \u2014 including Ivanti and JetBrains\u2019 continued problems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-12-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-12T22:39:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-12T22:48:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240212-vulnerability-recap-february-12-2024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jenna Phipps\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jenna Phipps\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-12-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-12-2024\/\"},\"author\":{\"name\":\"Jenna Phipps\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb\"},\"headline\":\"VulnRecap 2\/12\/24: Ivanti, JetBrains, Fortinet, Linux Issues\",\"datePublished\":\"2024-02-12T22:39:46+00:00\",\"dateModified\":\"2024-02-12T22:48:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-12-2024\/\"},\"wordCount\":825,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-12-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240212-vulnerability-recap-february-12-2024.png\",\"keywords\":[\"vulnerability\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-12-2024\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-12-2024\/\",\"name\":\"Weekly Vulnerability Recap 2\/12\/24: Continued Ivanti, JetBrains Issues\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-12-2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-12-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240212-vulnerability-recap-february-12-2024.png\",\"datePublished\":\"2024-02-12T22:39:46+00:00\",\"dateModified\":\"2024-02-12T22:48:47+00:00\",\"description\":\"See the latest vulnerability news. Discover the top vulnerabilities from the past week \u2014 including Ivanti and JetBrains\u2019 continued problems.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-12-2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-12-2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-12-2024\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240212-vulnerability-recap-february-12-2024.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240212-vulnerability-recap-february-12-2024.png\",\"width\":1400,\"height\":900,\"caption\":\"Image: Sergey Nivens\/Adobe Stock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-12-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"VulnRecap 2\/12\/24: Ivanti, JetBrains, Fortinet, Linux Issues\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb\",\"name\":\"Jenna Phipps\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg\",\"caption\":\"Jenna Phipps\"},\"description\":\"Jenna Phipps is a staff writer for eSecurity Planet and has years of experience in B2B technical content writing. She covers security practices, vulnerabilities, data protection, and the top products in the cybersecurity industry. She also writes about the importance of cybersecurity technologies and training in business environments, as well as the role that security plays in data storage and management. When Jenna's not writing about security, you can find her reading, shopping, eating smoothie bowls, or spending time with friends.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jphipps\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Weekly Vulnerability Recap 2\/12\/24: Continued Ivanti, JetBrains Issues","description":"See the latest vulnerability news. Discover the top vulnerabilities from the past week \u2014 including Ivanti and JetBrains\u2019 continued problems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-12-2024\/","og_locale":"en_US","og_type":"article","og_title":"Weekly Vulnerability Recap 2\/12\/24: Continued Ivanti, JetBrains Issues","og_description":"See the latest vulnerability news. Discover the top vulnerabilities from the past week \u2014 including Ivanti and JetBrains\u2019 continued problems.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-12-2024\/","og_site_name":"eSecurity Planet","article_published_time":"2024-02-12T22:39:46+00:00","article_modified_time":"2024-02-12T22:48:47+00:00","og_image":[{"width":1400,"height":900,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240212-vulnerability-recap-february-12-2024.png","type":"image\/png"}],"author":"Jenna Phipps","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jenna Phipps","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-12-2024\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-12-2024\/"},"author":{"name":"Jenna Phipps","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb"},"headline":"VulnRecap 2\/12\/24: Ivanti, JetBrains, Fortinet, Linux Issues","datePublished":"2024-02-12T22:39:46+00:00","dateModified":"2024-02-12T22:48:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-12-2024\/"},"wordCount":825,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-12-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240212-vulnerability-recap-february-12-2024.png","keywords":["vulnerability"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-12-2024\/","url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-12-2024\/","name":"Weekly Vulnerability Recap 2\/12\/24: Continued Ivanti, JetBrains Issues","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-12-2024\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-12-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240212-vulnerability-recap-february-12-2024.png","datePublished":"2024-02-12T22:39:46+00:00","dateModified":"2024-02-12T22:48:47+00:00","description":"See the latest vulnerability news. Discover the top vulnerabilities from the past week \u2014 including Ivanti and JetBrains\u2019 continued problems.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-12-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-12-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-12-2024\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240212-vulnerability-recap-february-12-2024.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240212-vulnerability-recap-february-12-2024.png","width":1400,"height":900,"caption":"Image: Sergey Nivens\/Adobe Stock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-12-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"VulnRecap 2\/12\/24: Ivanti, JetBrains, Fortinet, Linux Issues"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb","name":"Jenna Phipps","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg","caption":"Jenna Phipps"},"description":"Jenna Phipps is a staff writer for eSecurity Planet and has years of experience in B2B technical content writing. She covers security practices, vulnerabilities, data protection, and the top products in the cybersecurity industry. She also writes about the importance of cybersecurity technologies and training in business environments, as well as the role that security plays in data storage and management. When Jenna's not writing about security, you can find her reading, shopping, eating smoothie bowls, or spending time with friends.","url":"https:\/\/www.esecurityplanet.com\/author\/jphipps\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/33982"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/238"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=33982"}],"version-history":[{"count":8,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/33982\/revisions"}],"predecessor-version":[{"id":33993,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/33982\/revisions\/33993"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/33983"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=33982"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=33982"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=33982"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=33982"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=33982"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=33982"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}