{"id":34078,"date":"2024-02-19T22:04:04","date_gmt":"2024-02-19T22:04:04","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=34078"},"modified":"2024-02-20T17:23:38","modified_gmt":"2024-02-20T17:23:38","slug":"vulnerability-recap-february-19-2024","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-19-2024\/","title":{"rendered":"VulnRecap 2\/19\/24 \u2013 News from Microsoft, Zoom, &amp; SolarWinds"},"content":{"rendered":"\n<p>While this week was a little light on vulnerability news, it&#8217;s still been significant, with Microsoft&#8217;s Patch Tuesday happening as well as updates for major products, like Zoom. Akira ransomware vulnerabilities have also surfaced in older Cisco products, and SolarWinds patched some remote code execution flaws in its Access Rights Manager product.<\/p>\n\n\n\n<p>Your IT teams should regularly check your vendors&#8217; security bulletins for any vulnerability news or updates. Also keep an eye on the last few weeks&#8217; vulnerability recaps, especially because we&#8217;ve seen repeat products that continue to be exploited.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">February 13, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Zoom Fixes Critical Vulnerability in Windows Products<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Improper input validation.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Zoom <a href=\"https:\/\/www.zoom.com\/en\/trust\/security-bulletin\/ZSB-24008\/\" target=\"_blank\" rel=\"noreferrer noopener\">recently patched a flaw<\/a> that affected three of its Windows-facing software products: Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows. The vulnerability, an improper input validation flaw, could permit unauthenticated users to access a network and then escalate their privileges.<\/p>\n\n\n\n<p>The vulnerability CVE is <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-24691\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-24691<\/a>. It&#8217;s rated as critical, with a score of 9.6.<\/p>\n\n\n\n<p>Zoom&#8217;s security bulletin listed the following affected products:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Zoom Desktop Client for Windows before version 5.16.5<\/li>\n\n\n\n<li>Zoom VDI Client for Windows before version 5.16.10 (excluding 5.14.14 and 5.15.12)<\/li>\n\n\n\n<li>Zoom Rooms Client for Windows before version 5.17.0<\/li>\n\n\n\n<li>Zoom Meeting SDK for Windows before version 5.16.5<\/li>\n<\/ul>\n\n\n\n<p><strong>The fix:<\/strong> The most recent version of the Zoom client fixes this vulnerability. Users can download it manually by navigating to Zoom&#8217;s <a href=\"https:\/\/zoom.us\/download\" target=\"_blank\" rel=\"noreferrer noopener\">download page<\/a>, or automatically by opting to download the latest version when Zoom prompts them to do so.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Microsoft Patch Tuesday Fixes 73 Vulnerabilities<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Multiple vulnerabilities, including remote code execution and privilege escalation.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Microsoft patched 73 vulnerabilities in its most recent Patch Tuesday event, which occurs every month. Among the vulnerabilities is <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-21412\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-21412<\/a>, an Internet Shortcut Files flaw that allows an unauthenticated attacker to send a malicious file to a user. It bypasses Internet Shortcut Files&#8217; security measures.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Review Microsoft&#8217;s <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2024-Feb\" target=\"_blank\" rel=\"noreferrer noopener\">list of released updates<\/a> and associated CVEs to determine which products need to be patched. For CVE-2024-21412 specifically, a user has to click the link for the attack to occur. Ensure that team members don&#8217;t open links without verifying directly with the sender.<\/p>\n\n\n\n<p><strong>Does your business need a quick, reliable way to find vulnerabilities? Read our picks for the <a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-scanning-tools\/\">best vulnerability scanning tools<\/a> for quality products and key features to consider.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">February 15, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Akira Ransomware Affects Old Vulnerability in Cisco Products<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Remote unauthenticated access and potential credential data theft.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Researchers at cybersecurity company Truesec <a href=\"https:\/\/www.truesec.com\/hub\/blog\/akira-ransomware-and-exploitation-of-cisco-anyconnect-vulnerability-cve-2020-3259\" target=\"_blank\" rel=\"noreferrer noopener\">uncovered data<\/a> that indicated Akira ransomware might be exploiting an old vulnerability within Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD). Appliances with affected software must have Anyconnect SSL VPN enabled on whichever interface is exposed to the internet for an attack to occur.<\/p>\n\n\n\n<p>The vulnerability, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-3259\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-3259<\/a>, was first discovered in May 2020. It allows remote unauthenticated threat actors to steal data from a device&#8217;s memory, including credential data. On Thursday, February 15, the Cybersecurity and Infrastructure Security Agency <a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2024\/02\/15\/cisa-adds-two-known-exploited-vulnerabilities-catalog\" target=\"_blank\" rel=\"noreferrer noopener\">added the vulnerability to its catalog<\/a> after reports that it might be actively exploited again.<\/p>\n\n\n\n<p>Akira is a particularly dangerous brand of ransomware. Palo Alto&#8217;s <a href=\"https:\/\/unit42.paloaltonetworks.com\/unit-42-ransomware-leak-site-data-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\">Unit 42 research team said<\/a> that Akira led the number of ransomware posts from new leak sites in 2023. Akira also has potential ties to Conti, another ransomware group, through cryptocurrency transactions, according to Unit 42.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Cisco provides upgrade recommendations for the following affected versions:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240219-vulnerability-recap-february-19-2024-cisco_asa_software.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"648\" src=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240219-vulnerability-recap-february-19-2024-cisco_asa_software.jpg\" alt=\"Cisco ASA Software infotable.\" class=\"wp-image-34082\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240219-vulnerability-recap-february-19-2024-cisco_asa_software.jpg 1200w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240219-vulnerability-recap-february-19-2024-cisco_asa_software-300x162.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240219-vulnerability-recap-february-19-2024-cisco_asa_software-1024x553.jpg 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240219-vulnerability-recap-february-19-2024-cisco_asa_software-768x415.jpg 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/a><figcaption class=\"wp-element-caption\">Cisco ASA Software infotable<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"1003\" src=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240219-vulnerability-recap-february-19-2024-cisco_ftd_software.jpg\" alt=\"Cisco FTD Software infotable.\" class=\"wp-image-34081\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240219-vulnerability-recap-february-19-2024-cisco_ftd_software.jpg 1200w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240219-vulnerability-recap-february-19-2024-cisco_ftd_software-300x251.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240219-vulnerability-recap-february-19-2024-cisco_ftd_software-1024x856.jpg 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240219-vulnerability-recap-february-19-2024-cisco_ftd_software-768x642.jpg 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><figcaption class=\"wp-element-caption\">Cisco FTD Software infotable<\/figcaption><\/figure>\n\n\n\n<p>Truesec recommends:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Implementing MFA wherever possible, especially on client VPN connections<\/li>\n\n\n\n<li>Changing passwords, secrets, and preshared keys<\/li>\n\n\n\n<li>Enabling logging<\/li>\n\n\n\n<li>Patching the software to a nonvulnerable version<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">February 16, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">SolarWinds Patches 5 RCE Vulnerabilities in Access Rights Manager<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Remote code execution.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> SolarWinds recently patched five remote code execution vulnerabilities in its Access Rights Manager product, which provisions, deprovisions, and manages employee access rights. Three of the vulnerabilities have a critical CVE rating. The vulnerabilities affect version v2023.2 of Access Rights Manager. SolarWinds recently fixed the vulnerabilities.<\/p>\n\n\n\n<p>Amongst the flaws were deserialization of untrusted data RCE, directory traversal RCE, and traversal RCE. The CVEs are <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-23477\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-40057<\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-23476\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-23476<\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-23477\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-23477<\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-23478\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-23478<\/a>, and <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-23479\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-23479<\/a>.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Upgrade all older versions of Access Rights Manager to 2023.2.3, which fixes all five of the RCE vulnerabilities.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">February 19, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">ExpressVPN Split Tunneling Disabled after Discovered Vulnerability<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> DNS traffic leak.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> A VPN expert recently gave Express VPN a tip about its split tunneling feature, which allows some traffic to pass through the VPN and blocks other traffic. The DNS traffic wasn&#8217;t traveling to the ExpressVPN servers like it was supposed to, but instead to a third-party server. The vulnerability exists in ExpressVPN Version 12 for Windows. ExpressVPN <a href=\"https:\/\/www.expressvpn.com\/blog\/windows-app-dns-requests\/\" target=\"_blank\" rel=\"noreferrer noopener\">temporarily disabled split tunneling<\/a> on that platform.\u00a0<\/p>\n\n\n\n<p>The split tunneling feature will remain inactive until ExpressVPN engineers have time to research and mitigate the issue, according to the vendor. ExpressVPN first published the bulletin about this vulnerability early in February but updated it in the middle of the month.<\/p>\n\n\n\n<p>If teams need to use the split tunneling feature, they can use Version 10 of ExpressVPN, which doesn&#8217;t have the same flaw.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> ExpressVPN disabled split tunneling in Version 12, so it&#8217;ll no longer be an issue for that product.<\/p>\n\n\n\n<p><strong>Read next:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-5-2024\/\"><strong>VulnRecap 2\/12\/24 \u2014 Ivanti, JetBrains, Fortinet, Linux Issues<\/strong><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\"><strong>6 Best Vulnerability Management Software &amp; Systems in 2024<\/strong><\/a><\/li>\n<\/ul>\n\n\n<!-- ICP Plugin: Start --><div class=\"icp-list icp-list-main icp-list-body-top3 row\">\n    \n        <!--\n            ICP Plugin - body top3\n            ----------\n            Category: \n            Country: HK\n        -->\n    <\/div>\n<!-- ICP Plugin: End -->\n\n\n<div id=\"ta-campaign-widget-66d6f258c3f98-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6f258c3f98\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6f258c3f98\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6f258c3f98\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6f258c3f98\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6f258c3f98\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6f258c3f98\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Discover major security vulnerabilities from the last week, as well as remediation suggestions for IT and security teams.<\/p>\n","protected":false},"author":238,"featured_media":34080,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[1970,32039],"b2b_audience":[33],"b2b_industry":[63],"b2b_product":[379],"class_list":["post-34078","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-vulnerability","tag-vulnerability-news","b2b_audience-awareness-and-consideration","b2b_industry-technology","b2b_product-threats-and-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Weekly Vulnerability Recap 2\/19\/24: Microsoft, Zoom, SolarWinds<\/title>\n<meta name=\"description\" content=\"Discover major security vulnerabilities from the last week, as well as remediation suggestions for IT and security teams.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-19-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Weekly Vulnerability Recap 2\/19\/24: Microsoft, Zoom, SolarWinds\" \/>\n<meta property=\"og:description\" content=\"Discover major security vulnerabilities from the last week, as well as remediation suggestions for IT and security teams.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-19-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-19T22:04:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-20T17:23:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240219-vulnerability-recap-february-19-2024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jenna Phipps\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jenna Phipps\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-19-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-19-2024\/\"},\"author\":{\"name\":\"Jenna Phipps\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb\"},\"headline\":\"VulnRecap 2\/19\/24 \u2013 News from Microsoft, Zoom, &amp; SolarWinds\",\"datePublished\":\"2024-02-19T22:04:04+00:00\",\"dateModified\":\"2024-02-20T17:23:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-19-2024\/\"},\"wordCount\":920,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-19-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240219-vulnerability-recap-february-19-2024.png\",\"keywords\":[\"vulnerability\",\"vulnerability news\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-19-2024\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-19-2024\/\",\"name\":\"Weekly Vulnerability Recap 2\/19\/24: Microsoft, Zoom, SolarWinds\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-19-2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-19-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240219-vulnerability-recap-february-19-2024.png\",\"datePublished\":\"2024-02-19T22:04:04+00:00\",\"dateModified\":\"2024-02-20T17:23:38+00:00\",\"description\":\"Discover major security vulnerabilities from the last week, as well as remediation suggestions for IT and security teams.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-19-2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-19-2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-19-2024\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240219-vulnerability-recap-february-19-2024.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240219-vulnerability-recap-february-19-2024.png\",\"width\":1400,\"height\":900,\"caption\":\"Image: Ar_TH\/Adobe Stock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-19-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"VulnRecap 2\/19\/24 \u2013 News from Microsoft, Zoom, &amp; SolarWinds\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb\",\"name\":\"Jenna Phipps\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg\",\"caption\":\"Jenna Phipps\"},\"description\":\"Jenna Phipps is a staff writer for eSecurity Planet and has years of experience in B2B technical content writing. She covers security practices, vulnerabilities, data protection, and the top products in the cybersecurity industry. She also writes about the importance of cybersecurity technologies and training in business environments, as well as the role that security plays in data storage and management. When Jenna's not writing about security, you can find her reading, shopping, eating smoothie bowls, or spending time with friends.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jphipps\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Weekly Vulnerability Recap 2\/19\/24: Microsoft, Zoom, SolarWinds","description":"Discover major security vulnerabilities from the last week, as well as remediation suggestions for IT and security teams.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-19-2024\/","og_locale":"en_US","og_type":"article","og_title":"Weekly Vulnerability Recap 2\/19\/24: Microsoft, Zoom, SolarWinds","og_description":"Discover major security vulnerabilities from the last week, as well as remediation suggestions for IT and security teams.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-19-2024\/","og_site_name":"eSecurity Planet","article_published_time":"2024-02-19T22:04:04+00:00","article_modified_time":"2024-02-20T17:23:38+00:00","og_image":[{"width":1400,"height":900,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240219-vulnerability-recap-february-19-2024.png","type":"image\/png"}],"author":"Jenna Phipps","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jenna Phipps","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-19-2024\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-19-2024\/"},"author":{"name":"Jenna Phipps","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb"},"headline":"VulnRecap 2\/19\/24 \u2013 News from Microsoft, Zoom, &amp; SolarWinds","datePublished":"2024-02-19T22:04:04+00:00","dateModified":"2024-02-20T17:23:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-19-2024\/"},"wordCount":920,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-19-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240219-vulnerability-recap-february-19-2024.png","keywords":["vulnerability","vulnerability news"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-19-2024\/","url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-19-2024\/","name":"Weekly Vulnerability Recap 2\/19\/24: Microsoft, Zoom, SolarWinds","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-19-2024\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-19-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240219-vulnerability-recap-february-19-2024.png","datePublished":"2024-02-19T22:04:04+00:00","dateModified":"2024-02-20T17:23:38+00:00","description":"Discover major security vulnerabilities from the last week, as well as remediation suggestions for IT and security teams.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-19-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-19-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-19-2024\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240219-vulnerability-recap-february-19-2024.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/02\/esp_20240219-vulnerability-recap-february-19-2024.png","width":1400,"height":900,"caption":"Image: Ar_TH\/Adobe Stock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-19-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"VulnRecap 2\/19\/24 \u2013 News from Microsoft, Zoom, &amp; SolarWinds"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb","name":"Jenna Phipps","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg","caption":"Jenna Phipps"},"description":"Jenna Phipps is a staff writer for eSecurity Planet and has years of experience in B2B technical content writing. She covers security practices, vulnerabilities, data protection, and the top products in the cybersecurity industry. She also writes about the importance of cybersecurity technologies and training in business environments, as well as the role that security plays in data storage and management. When Jenna's not writing about security, you can find her reading, shopping, eating smoothie bowls, or spending time with friends.","url":"https:\/\/www.esecurityplanet.com\/author\/jphipps\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/34078"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/238"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=34078"}],"version-history":[{"count":6,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/34078\/revisions"}],"predecessor-version":[{"id":34101,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/34078\/revisions\/34101"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/34080"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=34078"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=34078"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=34078"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=34078"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=34078"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=34078"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}