{"id":34427,"date":"2024-03-19T16:23:43","date_gmt":"2024-03-19T16:23:43","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=34427"},"modified":"2024-03-19T16:30:11","modified_gmt":"2024-03-19T16:30:11","slug":"vulnerability-recap-march-19-2024","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-19-2024\/","title":{"rendered":"Vulnerability Recap 3\/19\/24 \u2013 Microsoft, Fortinet &amp; More"},"content":{"rendered":"\n<p>Microsoft, as usual, led the pack in quantity for Patch Tuesday this March with fixes for nearly 59 vulnerabilities including two critical flaws. Patching teams may be busy with this anticipated work, but be sure to also address the off-schedule critical vulnerabilities that affect Fortinet, QNAP, Kubernetes, and WordPress plug-ins.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">March 8, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">150,000 Fortinet Secure Web Gateways Remain Exposed<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Arbitrary code execution (ACE).<\/p>\n\n\n\n<p><strong>The problem:<\/strong> The FortiOS SSL VPN feature vulnerability, CVE-2024-21762, <a href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-12-2024\/\">disclosed February 8th<\/a>, remains exposed to attack on nearly 150,000 devices according to the <a href=\"https:\/\/dashboard.shadowserver.org\/statistics\/combined\/time-series\/?date_range=7&amp;source=http_vulnerable&amp;source=http_vulnerable6&amp;tag=cve-2024-21762%2B&amp;style=stacked\" target=\"_blank\" rel=\"noreferrer noopener\">ShadowServer Foundation website<\/a>.\u00a0So far research sites, such as the <a href=\"https:\/\/viz.greynoise.io\/tags\/fortinet-fortios-fortiproxy-rce-cve-2024-21762-attempt?days=30\" target=\"_blank\" rel=\"noreferrer noopener\">GreyNoise exploit tracking site<\/a>, don\u2019t yet see active exploitation trends. CISA added the vulnerability to the <a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2024\/02\/09\/cisa-adds-one-known-exploited-vulnerability-catalog\" target=\"_blank\" rel=\"noreferrer noopener\">known exploited vulnerabilities<\/a> catalog over a month ago.\u00a0<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Fortinet advised users to disable SSL VPN until their FortiOS and FortiProxy deployments <a href=\"https:\/\/fortiguard.fortinet.com\/psirt\/FG-IR-24-015\" target=\"_blank\" rel=\"noreferrer noopener\">can be upgraded<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Frequent Ransomware Target QNAP Discloses 3 Vulnerabilities<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Improper authentication, injection vulnerability, SQL injection (SQLi).<\/p>\n\n\n\n<p><strong>The problem:<\/strong> QNAP <a href=\"https:\/\/www.qnap.com\/en\/security-advisory\/qsa-24-09\" target=\"_blank\" rel=\"noreferrer noopener\">disclosed three vulnerabilities<\/a> affecting several products: QTS, QuTS hero, QuTScloud, and myQNAPcloud. The critical vulnerability, CVE-2024-21899 with a CVSS score of 9.8, can allow remote and unauthorized users to compromise the network. The other two vulnerabilities, CVE-2024-21900 and CVE-2024-21901, only merit medium ratings because they require authentication.<\/p>\n\n\n\n<p>Ransomware gangs, notably Deadbolt, Checkmate, and Qlocker, actively targeted QNAP vulnerabilities in the past. With the disclosure of this vulnerability, they likely will develop new exploits so patching teams should move quickly. Not all patch management <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-service-providers\/\">services<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\">tools<\/a> extend to non-standard equipment such as QNAP network accessible storage (NAS) devices to be sure to verify patching of this vulnerability specifically.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> QNAP issued fixed versions of all products and recommended prompt upgrade. QTS, TuTS, and QuTScloud may be updated from the control panel, but the myQNAPcloud requires administrators to log in as administrator and search for myQNAPcloud in the App Center.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">March 11, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Update Patched RegistrationMagic WordPress Plug-in Now<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Privilege escalation<\/p>\n\n\n\n<p><strong>The problem:<\/strong> RegistrationMagic, a WordPress plug-in that helps build custom registration forms, enable user registration, process payments, and provide user login misses a capability check that permits attackers with at least subscriber-level access to gain admin privileges. A bug bounty participant <a href=\"https:\/\/www.wordfence.com\/blog\/2024\/03\/1313-bounty-awarded-for-privilege-escalation-vulnerability-patched-in-registrationmagic-wordpress-plugin\/\" target=\"_blank\" rel=\"noreferrer noopener\">revealed the flaw<\/a> during a Wordfence Bug Bounty Program Extravaganza last month.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Update to version 5.3.1.0 of RegistrationMagic plug-in promptly.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">March 12, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Microsoft Patch Tuesday Fixes 59 Vulnerabilities, Including 18 RCE<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> 24 elevation of privilege, 18 remote code execution (RCE), six information disclosure, six denial of service (DoS), three security feature bypass, and two spoofing vulnerabilities.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Microsoft patched 59 vulnerabilities including two critical and 57 important vulnerabilities. The release did not disclose any zero day vulnerabilities or active exploitations.<\/p>\n\n\n\n<p>The two critical vulnerabilities affect Windows Hyper-V. <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-21407\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-21407<\/a>, a remote code execution vulnerability, and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-21408\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-21408<\/a>, a denial of service vulnerability could allow an attacker to take full control or crash the Hyper-V service, respectively. Other notable patched vulnerabilities, all rated important, include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Azure Kubernetes Service <\/strong><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-21400\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>CVE-2024-21400<\/strong><\/a><strong>:<\/strong> Allows attackers to elevate privileges, steal credentials and is one of four Azure flaws patched.<\/li>\n\n\n\n<li><strong>Microsoft Defender <\/strong><a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-march-2024-patch-tuesday-fixes-60-flaws-18-rce-bugs\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>CVE-2024-20671<\/strong><\/a><strong>:<\/strong> Permits successful attackers to prevent Microsoft Defender from starting by exploiting this feature bypass vulnerability.<\/li>\n\n\n\n<li><strong>Microsoft Compressed Folder <\/strong><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-26185\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>CVE-2024-26185<\/strong><\/a><strong>:<\/strong> Only applies to Windows 11 where attackers could use specially crafted files or links to tamper with compressed folders.<\/li>\n\n\n\n<li><strong>Open Management Infrastructure <\/strong><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-21334\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>CVE-2024-21334<\/strong><\/a><strong>:<\/strong> Leads to a use-after-free vulnerability by exploiting this RCE with specially crafted requests.<\/li>\n\n\n\n<li><strong>Windows Print Spooler <\/strong><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-21433\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>CVE-2024-21433<\/strong><\/a><strong>:<\/strong> Permits successful attackers of this \u201cexploitation more likely\u201d vulnerability to elevate privileges and gain SYSTEM privileges.<\/li>\n\n\n\n<li><strong>Windows Kernel <\/strong><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2024-26182\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>CVE-2024-26182<\/strong><\/a><strong>:<\/strong> Gains SYSTEM privileges through successful exploitation; only one of five similar vulnerabilities to rate \u201cexploitation more likely.\u201d&nbsp;<\/li>\n\n\n\n<li><strong>Microsoft Office <\/strong><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-26199\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>CVE-2024-26199<\/strong><\/a><strong>:<\/strong> Enables elevation of privilege for any user without existing admin or elevated privileges and can lead to SYSTEM privileges.<\/li>\n<\/ul>\n\n\n\n<p><strong>The fix:<\/strong> Proceed with patching affected Microsoft products. Note that <a href=\"https:\/\/answers.microsoft.com\/en-us\/windowserver\/forum\/all\/has-anyone-gotten-issue-updating-cumulative-update\/3d466816-b24f-4868-b2ba-03d980a48dd2\" target=\"_blank\" rel=\"noreferrer noopener\">many admins find<\/a> that the cumulative update, KB5035849, will not properly install on Windows 10 and Windows Server Systems. Manual installation is possible, but the August 2021 servicing stack update (KB5005112) must be installed first.<\/p>\n\n\n\n<p><strong>Need help patching quickly? <a href=\"https:\/\/www.esecurityplanet.com\/applications\/patch-management-as-a-service\/\">Patch management-as-a-service<\/a> can boost the patching process.&nbsp;<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Adobe Patches Animate, Bridge, ColdFusion, Experience Manager, Lightroom, &amp; PremierPro<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> ACE, arbitrary system file read, memory leak, security feature bypass.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> <a href=\"https:\/\/helpx.adobe.com\/security\/security-bulletin.html\" target=\"_blank\" rel=\"noreferrer noopener\">Adobe issued<\/a> critical and important patches for five products: <a href=\"https:\/\/helpx.adobe.com\/security\/products\/animate\/apsb24-19.html\" target=\"_blank\" rel=\"noreferrer noopener\">Animate<\/a>, <a href=\"https:\/\/helpx.adobe.com\/security\/products\/bridge\/apsb24-15.html\" target=\"_blank\" rel=\"noreferrer noopener\">Bridge<\/a>, <a href=\"https:\/\/helpx.adobe.com\/security\/products\/coldfusion\/apsb24-14.html\" target=\"_blank\" rel=\"noreferrer noopener\">ColdFusion<\/a>, <a href=\"https:\/\/helpx.adobe.com\/security\/products\/lightroom\/apsb24-17.html\" target=\"_blank\" rel=\"noreferrer noopener\">Lightroom<\/a> for macOS, and <a href=\"https:\/\/helpx.adobe.com\/security\/products\/premiere_pro\/apsb24-12.html\" target=\"_blank\" rel=\"noreferrer noopener\">PremierePro<\/a>. It also released important and moderate updates for <a href=\"https:\/\/helpx.adobe.com\/security\/products\/experience-manager\/apsb24-05.html\" target=\"_blank\" rel=\"noreferrer noopener\">Adobe Experience Manager<\/a>.<\/p>\n\n\n\n<p>Adobe did not disclose any known exploits of these various vulnerabilities. However, their security incident response team recommends prioritizing the critical-level arbitrary system file read vulnerability patch for ColdFusion.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Update software using patches from the relevant download center, download page, or link in the instructions for each software.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Cisco Fixes Vulnerabilities In IOS XR, Secure Client &amp; SD-WAN vManage<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Four DoS, a feed injection, a privilege escalation, three protection bypass, and an unauthenticated REST API access vulnerability.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Cisco announced <a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-vmanage-unauthapi-sphCLYPA\" target=\"_blank\" rel=\"noreferrer noopener\">patches for 10 vulnerabilities<\/a> (one critical, four high, five medium) affecting its IOS XR Software, SD-WAN vMaange, and Secure Client products. The notable critical vulnerability, <a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-vmanage-unauthapi-sphCLYPA\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-20214<\/a>, allows an attacker to bypass authentication validation for the SD-WAN vManage REST API to gain read and limited write permissions to SD-WAN vManage.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> None of the critical or high vulnerabilities and only two of the medium vulnerabilities have available workarounds. Cisco recommends updating to patched versions of the products.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">March 13, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Fortinet Patches FortiClient Enterprise Management Server RCE Bug<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> SQL injection (SQLi) and remote code execution (RCE).<\/p>\n\n\n\n<p><strong>The problem:<\/strong> A SQLi vulnerability in the FortiClient Enterprise Management Server\u2019s DB2 Administration Server potentially enables RCE with SYSTEM privileges through specially crafted packets. The vulnerability, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-48788\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-48788<\/a>, earns a critical CVSS score of 9.8 because low-complexity attacks will exploit unpatched servers without user interaction and allow the attacker to execute unauthorized code or commands.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Fortinet recommends an update of the FortiClientEMS and didn\u2019t publish any potential workarounds. Upgrade FortiClientEMS versions 7.0.1 through 7.0.10 to 7.0.11 or above and upgrade versions 7.2.0 through 7.2.2 to version 7.2.3.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Windows Kubernetes Clusters Vulnerable to Command Injection&nbsp;<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Command injection attack.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Timer Peled, an Akamai security researcher, <a href=\"https:\/\/www.akamai.com\/blog\/security-research\/kubernetes-local-volumes-command-injection-vulnerability-rce-system-privileges\" target=\"_blank\" rel=\"noreferrer noopener\">uncovered a high-severity vulnerability<\/a>, <a href=\"https:\/\/github.com\/kubernetes\/kubernetes\/issues\/121879\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-5528<\/a>, rated CVSS 7.2 which fails to sanitize input and permits an attacker to perform command injection attacks to apply malicious YAML files onto the cluster and execute code on cluster endpoints. This vulnerability affects default Kubernetes installations in on-prem Windows and Azure Kubernetes Service that use an in-tree storage plug-in.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Upgrade to Kubernetes versions 1.28.4 or later to fix the flaw. For those unable to patch quickly, Akamai\u2019s blog provides an OPA rule to add to detect and block potential attacks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Vulnerable ChatGPT Plug-ins Open Account Takeover Opportunities<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Improper validation and authentication.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> <a href=\"https:\/\/salt.security\/blog\/security-flaws-within-chatgpt-extensions-allowed-access-to-accounts-on-third-party-websites-and-sensitive-data\" target=\"_blank\" rel=\"noreferrer noopener\">Salt Labs researchers<\/a> studying ChatGPT plug-in processes discovered three different flaws with significant validation and authentication issues. One flaw allowed a malicious attacker to intercept plug-in requests and replace valid plug-ins with malicious code.<\/p>\n\n\n\n<p>A second vulnerability fails to perform proper user authentication and permits user impersonation that can lead to ChatGPT account takeover. The final flaw uses 0Auth redirection to steal user credentials by inserting a malicious URL between the user and ChatGPT.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> The researchers publish workarounds, but ChatGPT also fixed the flaws, so users should update their applications to pick up the revised plug-in code.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Discontinued WordPress Plug-ins Expose Over 10,000 Sites<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Privilege escalation.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> <a href=\"https:\/\/www.wordfence.com\/blog\/2024\/03\/critical-vulnerability-remains-unpatched-in-two-permanently-closed-miniorange-wordpress-plugins-1250-bounty-awarded\/\" target=\"_blank\" rel=\"noreferrer noopener\">Wordfence disclosed two vulnerabilities<\/a> discovered in their bug bounty program within discontinued WordPress plug-ins for the miniOrgange Malware Scanner and Web Application Firewall. The vulnerability enables unauthenticated attackers to update the user password to grant themselves admin privileges and the plug-ins show more than 10,000 active installations.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Upon disclosure, miniOrange simply closed the plug-ins permanently and no patch will be released. Delete these plug-ins from WordPress sites immediately.<\/p>\n\n\n\n<p><strong>Read more about how <a href=\"https:\/\/www.esecurityplanet.com\/networks\/website-vulnerability-scanners\/\">websites and application vulnerability scanners<\/a> can proactively help development teams catch issues.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">March 18, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Critical DDoS Vulnerability Exposed in Kubernetes Delivery Tool, Argo CD&nbsp;<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Cache overflow, unsafe array handling, DoS.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> The Kubernetes security specialist KTrust discovered a <a href=\"https:\/\/www.ktrust.io\/post\/unveiling-new-vulnerabilities-in-argocd-a-ktrust-research-insight\" target=\"_blank\" rel=\"noreferrer noopener\">trio of vulnerabilities<\/a> in ArgoCD, a top GitOps continuous delivery tool for Kubernetes. The vulnerabilities allow for attackers to brute force cache overflows to bypass security measures, crash the application or cause in-memory data loss due to unsafe array handling, and cause DoS by exploiting unsafe array modification in multithreaded environments.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> No workaround is available for these issues; however, Argo CD released patches so update quickly and keep in mind their <a href=\"https:\/\/argo-cd.readthedocs.io\/en\/stable\/operator-manual\/upgrading\/overview\/\" target=\"_blank\" rel=\"noreferrer noopener\">Upgrade Overview<\/a> to avoid issues.<\/p>\n\n\n\n<p><strong>Read next:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-11-2024\/\"><strong>VulnRecap 3\/11\/24 \u2013 JetBrains &amp; Atlassian Issues Persist<\/strong><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-do-a-vulnerability-scan\/\"><strong>How to Perform a Vulnerability Scan<\/strong><\/a><\/li>\n<\/ul>\n\n\n<!-- ICP Plugin: Start --><div class=\"icp-list icp-list-main icp-list-body-top3 row\">\n    \n        <!--\n            ICP Plugin - body top3\n            ----------\n            Category: \n            Country: HK\n        -->\n    <\/div>\n<!-- ICP Plugin: End -->\n\n\n<div id=\"ta-campaign-widget-66d6eb382b203-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6eb382b203\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6eb382b203\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6eb382b203\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6eb382b203\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6eb382b203\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6eb382b203\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Discover major vulnerabilities from the past week, including attacks on Microsoft, Fortinet, QNAP, and more with remediation recommendations.<\/p>\n","protected":false},"author":271,"featured_media":34426,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[3790,23006,5173,730,22929,10917],"b2b_audience":[],"b2b_industry":[],"b2b_product":[31780],"class_list":["post-34427","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-cybersecurity","tag-patch-management","tag-patch-tuesday","tag-security","tag-vulnerability-management","tag-vulnerability-scanning","b2b_product-patch-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Vulnerability Recap 3\/19\/24: Microsoft, Fortinet &amp; More<\/title>\n<meta name=\"description\" content=\"Discover major vulnerabilities from the past week, including attacks on Microsoft, Fortinet, and more with remediation recommendations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-19-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerability Recap 3\/19\/24: Microsoft, Fortinet &amp; More\" \/>\n<meta property=\"og:description\" content=\"Discover major vulnerabilities from the past week, including attacks on Microsoft, Fortinet, and more with remediation recommendations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-19-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-19T16:23:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-19T16:30:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/03\/esp_20240318-vulnerability-recap-march-18-2024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chad Kime\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chad Kime\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-19-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-19-2024\/\"},\"author\":{\"name\":\"Chad Kime\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\"},\"headline\":\"Vulnerability Recap 3\/19\/24 \u2013 Microsoft, Fortinet &amp; More\",\"datePublished\":\"2024-03-19T16:23:43+00:00\",\"dateModified\":\"2024-03-19T16:30:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-19-2024\/\"},\"wordCount\":1475,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-19-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/03\/esp_20240318-vulnerability-recap-march-18-2024.png\",\"keywords\":[\"cybersecurity\",\"Patch Management\",\"Patch Tuesday\",\"security\",\"Vulnerability Management\",\"vulnerability scanning\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-19-2024\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-19-2024\/\",\"name\":\"Vulnerability Recap 3\/19\/24: Microsoft, Fortinet & More\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-19-2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-19-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/03\/esp_20240318-vulnerability-recap-march-18-2024.png\",\"datePublished\":\"2024-03-19T16:23:43+00:00\",\"dateModified\":\"2024-03-19T16:30:11+00:00\",\"description\":\"Discover major vulnerabilities from the past week, including attacks on Microsoft, Fortinet, and more with remediation recommendations.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-19-2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-19-2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-19-2024\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/03\/esp_20240318-vulnerability-recap-march-18-2024.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/03\/esp_20240318-vulnerability-recap-march-18-2024.png\",\"width\":1400,\"height\":900,\"caption\":\"Image: kras99\/Adobe Stock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-19-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerability Recap 3\/19\/24 \u2013 Microsoft, Fortinet &amp; More\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\",\"name\":\"Chad Kime\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"caption\":\"Chad Kime\"},\"description\":\"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerability Recap 3\/19\/24: Microsoft, Fortinet & More","description":"Discover major vulnerabilities from the past week, including attacks on Microsoft, Fortinet, and more with remediation recommendations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-19-2024\/","og_locale":"en_US","og_type":"article","og_title":"Vulnerability Recap 3\/19\/24: Microsoft, Fortinet & More","og_description":"Discover major vulnerabilities from the past week, including attacks on Microsoft, Fortinet, and more with remediation recommendations.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-19-2024\/","og_site_name":"eSecurity Planet","article_published_time":"2024-03-19T16:23:43+00:00","article_modified_time":"2024-03-19T16:30:11+00:00","og_image":[{"width":1400,"height":900,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/03\/esp_20240318-vulnerability-recap-march-18-2024.png","type":"image\/png"}],"author":"Chad Kime","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Chad Kime","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-19-2024\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-19-2024\/"},"author":{"name":"Chad Kime","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9"},"headline":"Vulnerability Recap 3\/19\/24 \u2013 Microsoft, Fortinet &amp; More","datePublished":"2024-03-19T16:23:43+00:00","dateModified":"2024-03-19T16:30:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-19-2024\/"},"wordCount":1475,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-19-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/03\/esp_20240318-vulnerability-recap-march-18-2024.png","keywords":["cybersecurity","Patch Management","Patch Tuesday","security","Vulnerability Management","vulnerability scanning"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-19-2024\/","url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-19-2024\/","name":"Vulnerability Recap 3\/19\/24: Microsoft, Fortinet & More","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-19-2024\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-19-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/03\/esp_20240318-vulnerability-recap-march-18-2024.png","datePublished":"2024-03-19T16:23:43+00:00","dateModified":"2024-03-19T16:30:11+00:00","description":"Discover major vulnerabilities from the past week, including attacks on Microsoft, Fortinet, and more with remediation recommendations.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-19-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-19-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-19-2024\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/03\/esp_20240318-vulnerability-recap-march-18-2024.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/03\/esp_20240318-vulnerability-recap-march-18-2024.png","width":1400,"height":900,"caption":"Image: kras99\/Adobe Stock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-march-19-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Vulnerability Recap 3\/19\/24 \u2013 Microsoft, Fortinet &amp; More"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9","name":"Chad Kime","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","caption":"Chad Kime"},"description":"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.","url":"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/34427"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/271"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=34427"}],"version-history":[{"count":8,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/34427\/revisions"}],"predecessor-version":[{"id":34444,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/34427\/revisions\/34444"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/34426"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=34427"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=34427"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=34427"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=34427"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=34427"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=34427"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}