{"id":34968,"date":"2024-04-15T21:17:58","date_gmt":"2024-04-15T21:17:58","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=34968"},"modified":"2024-04-15T21:18:00","modified_gmt":"2024-04-15T21:18:00","slug":"vulnerability-recap-april-15-2024","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-15-2024\/","title":{"rendered":"Vulnerability Recap 4\/15\/24 \u2013 Palo Alto, Microsoft, Ivanti Exploits"},"content":{"rendered":"\n<p>Last week&#8217;s cybersecurity incidents revealed significant vulnerabilities across multiple platforms. Threats range from severe weaknesses in Ivanti\u2019s VPN appliances to zero-day exploits in popular software such as Palo Alto Networks&#8217; PAN-OS and Telegram&#8217;s Windows client. Typically, these vulnerabilities result in remote code execution or denial-of-service attacks, posing major dangers to users&#8217; data security.<\/p>\n\n\n\n<p>To mitigate these risks, users must promptly apply vendor-provided software patches and updates, as well as exercise vigilance when using online services and apps. You can strengthen your cybersecurity defenses by using reliable antivirus software, firewalls, intrusion detection systems, and virtual private networks (VPNs). Employ robust password management techniques, two-factor authentication (2FA), and regular backups of essential data.<\/p>\n\n\n\n<p><strong>In addition to securing internal assets, you also need to ensure SaaS data is protected. Check out our article on <a href=\"https:\/\/www.esecurityplanet.com\/cloud\/saas-security-checklist\/\">SaaS security checklist<\/a> and learn how to create one.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">April 8, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Multiple Vulnerabilities Discovered in LG WebOS Smart TVs<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Authorization bypass, privilege escalation, command injection.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Bitdefender researchers <a href=\"https:\/\/www.bitdefender.com\/blog\/labs\/vulnerabilities-identified-in-lg-webos\/\" target=\"_blank\" rel=\"noreferrer noopener\">discovered four vulnerabilities<\/a> in LG WebOS smart TVs that allowed unauthorized access and control. These issues affect over 91,000 exposed machines, putting them at risk of DDoS assaults, account theft, and malware infestations.<\/p>\n\n\n\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-6317\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-6317<\/a> allows for the bypass of permission procedures, enabling unauthorized users to be added. <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-6318\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-6318<\/a> permits privilege escalation to get root access. <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-6319\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-6319<\/a> enables the execution of arbitrary commands via music lyrics display. <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-6320\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-6320<\/a> permits authenticated command injection, allowing arbitrary command execution.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> LG issued security upgrades on March 22, 2024, which addressed the vulnerabilities. To reduce risks, users should update their LG WebOS smart TVs as soon as possible through Settings &gt; Support &gt; Software Update. It&#8217;s suggested that automatic updates be enabled.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Shadowserver Identifies Thousands of Vulnerable Ivanti VPN Appliances<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Remote code execution (RCE), denial-of-service (DoS).<\/p>\n\n\n\n<p><strong>The problem:<\/strong> The Shadowserver Foundation found approximately 16,000 internet-exposed Ivanti VPN appliances that could be affected by <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-21894\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-21894<\/a>, a high-severity heap overflow vulnerability that allows remote code execution. This vulnerability exists in all supported versions of Ivanti Connect Secure and Policy Secure.<\/p>\n\n\n\n<p>As of April 7, around 10,000 Ivanti <a href=\"https:\/\/www.esecurityplanet.com\/networks\/vpn-security\/\">VPN instances<\/a> were susceptible, predominantly in the United States, Japan, and other countries. However, it\u2019s unknown how many of them are legitimate Ivanti VPNs and how many are honeypots.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> On April 2, <a href=\"https:\/\/forums.ivanti.com\/s\/article\/SA-CVE-2024-21894-Heap-Overflow-CVE-2024-22052-Null-Pointer-Dereference-CVE-2024-22053-Heap-Overflow-and-CVE-2024-22023-XML-entity-expansion-or-XXE-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US\" target=\"_blank\" rel=\"noreferrer noopener\">Ivanti provided fixes<\/a> to address this problem and three other vulnerabilities. Ivanti encourages all users to update their instances with the most recent software fixes to reduce the risks associated with CVE-2024-21894 and other vulnerabilities. Furthermore, users should regularly monitor their environments for indicators of exploitation and take the appropriate actions to strengthen cybersecurity defenses.<\/p>\n\n\n\n<p><strong>Looking for an alternative method for secure remote access? Consider exploring <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/secure-access-for-remote-workers-rdp-vpn-vdi\/\">virtual desktop infrastructure<\/a>.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">April 9, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Critical Windows Command Injection Vulnerability in Rust Standard Library&nbsp;<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Command injection.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-24576\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-24576<\/a> impacts the Rust standard library on Windows, allowing unauthenticated attackers to run arbitrary commands using OS command and argument injection flaws. GitHub rates it critical, indicating that it poses a significant danger to Windows systems, with the ability for remote exploitation without any user interaction.<\/p>\n\n\n\n<p>Programs or dependencies that use untrusted arguments to invoke batch files on Windows versions prior to 1.77.2 are vulnerable. Other programming languages are also impacted, with patches and documentation changes in the works.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Rust published <a href=\"https:\/\/github.com\/rust-lang\/rust\/security\/advisories\/GHSA-q455-m56c-85mh\" target=\"_blank\" rel=\"noreferrer noopener\">version 1.77.2<\/a>, which improves argument escaping and modifies the Command API to address the problem. To prevent unexpected execution, move batch files to folders that aren\u2019t included in the PATH environment variable.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Microsoft Addresses Critical Vulnerability in AKS Confidential Containers<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Unauthenticated access, remote code execution.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Microsoft performed a significant patch that addresses at least 150 vulnerabilities, with a focus on <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-29990\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-29990<\/a>, which affects Azure Kubernetes Service (AKS) confidential containers. The exploit has a CVSS severity of 9\/10. This significant vulnerability allows unauthenticated attackers to take complete control of Azure Kubernetes clusters, allowing them to steal credentials and compromise sensitive containers.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Microsoft strongly recommends quick patching to mitigate the risks associated with CVE-2024-29990. Users should install the <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-29990\" target=\"_blank\" rel=\"noreferrer noopener\">most recent security patches<\/a> for Azure Kubernetes Service and constantly monitor their environments for evidence of unauthorized access or malicious behavior.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">April 10, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Fortinet Patches Critical RCE Vulnerabilities in FortiOS and Other Products<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> RCE, credential protection weakness, arbitrary file deletion, arbitrary command execution.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Fortinet has released updates for several vulnerabilities, including a major remote code execution problem in FortiClientLinux (<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-45590\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-45590<\/a>). This vulnerability enables unauthenticated remote attackers to execute arbitrary code via a code injection flaw.<\/p>\n\n\n\n<p>Other high-severity vulnerabilities include credential protection flaws (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-41677\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-41677<\/a>), arbitrary code execution in FortiClientMac (<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-45588\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-45588<\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-31492\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-31492<\/a>), and arbitrary file deletion\/command execution in FortiSandbox (<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-23671\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-23671<\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-21755\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-21755<\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-21756\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-21756<\/a>).<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Fortinet has published <a href=\"https:\/\/www.fortiguard.com\/psirt\/FG-IR-23-087\" target=\"_blank\" rel=\"noreferrer noopener\">updates<\/a> for the vulnerable products, including FortiClientLinux versions 7.2.1 and 7.0.11. Users are encouraged to rapidly upgrade their Fortinet appliances in order to mitigate the risks associated with these vulnerabilities.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">April 11, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Windows &amp; MacOS Face Risks in New MITRE Sub-Techniques Exploits<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> TCC manipulation, phantom DLL hijacking.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> North Korean threat actors use new exploitation tactics of MITRE sub-techniques on Windows and macOS, including TCC modification and Phantom Dynamic Link Library (DLL) hijacking. <a href=\"https:\/\/attack.mitre.org\/groups\/\" target=\"_blank\" rel=\"noreferrer noopener\">The Lazarus Group and APT41<\/a> are suspected of using these approaches to compromise system integrity for espionage.<\/p>\n\n\n\n<p>TCC manipulation targets macOS and bypasses application permission constraints. Phantom DLL hijacking exploits non-existent DLL files in Windows, allowing malicious DLLs to run unnoticed by the operating system.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> TCC manipulation requires maintaining system integrity protection (SIP) and limiting app permissions. Phantom DLL hijacking can be prevented by adopting monitoring systems, proactive application restrictions, and blocking remote DLL loading until Windows handles phantom DLLs.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Palo Alto Networks Addresses Firewall Disruption Flaws<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Denial-of-service, firewall disruption, data processing vulnerability.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Palo Alto Networks announced PAN-OS patches that addressed many critical vulnerabilities that might interrupt firewalls. <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-3384\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-3385<\/a> allows unauthenticated attackers to reboot hardware firewalls using specially crafted packets, affecting the PA-5400 and PA-7000 devices. <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-3384\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-3384<\/a> and <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-3382\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-3382<\/a> allow remote DoS attacks against PAN-OS firewalls. <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-3383\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-3383<\/a> is another severe vulnerability that affects user access control via Cloud Identity Engine (CIE) data processing.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> <a href=\"https:\/\/security.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Palo Alto Networks\u2019 update<\/a> resolved these vulnerabilities involving decryption, user impersonation, and third-party components. They recommend applying these updates promptly to mitigate the risks associated with these vulnerabilities.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">April 12, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Critical Zero-Day Vulnerability Exploited in Palo Alto&#8217;s PAN-OS Software<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Command injection, remote code execution.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Another Palo Alto Networks\u2019 incident last week disclosed a significant zero-day vulnerability, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-3400\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-3400<\/a>, in PAN-OS software&#8217;s GlobalProtect gateway. This vulnerability allows unauthenticated attackers to run arbitrary code with root access. Palo Alto also warned of this active exploitation by threat actors using the RCE to breach firewalls.<\/p>\n\n\n\n<p>While both cases involve vulnerabilities in Palo Alto Networks&#8217; PAN-OS software, the first incident focuses on high-severity vulnerabilities, such as denial-of-service problems, whilst the second incident exposes a severe zero-day vulnerability that allows remote code execution.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Palo Alto Networks aims to deploy <a href=\"https:\/\/security.paloaltonetworks.com\/CVE-2024-3400\" target=\"_blank\" rel=\"noreferrer noopener\">fixes for affected PAN-OS<\/a> 10.2, 11.0, and 11.1 versions on April 14th. Meanwhile, clients should enable particular threat prevention measures or temporarily disable the impacted functionalities.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Telegram Addresses Source Code Typo That May Lead To RCE<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Potential remote code execution.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> On April 9, rumors circulated about a zero-day vulnerability in Telegram&#8217;s Windows app that enabled the automated running of Python programs. Telegram first <a href=\"https:\/\/twitter.com\/telegram\/status\/1777677055837995151\" target=\"_blank\" rel=\"noreferrer noopener\">denied the claims via X<\/a> (formerly Twitter). However, the next day, a proof-of-concept exploit surfaced, revealing a typo in Telegram&#8217;s source code. This error, notably in the file extension handling, enabled Python scripts to run without notice when clicked, potentially leading to RCE attacks.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> In <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/telegram-fixes-windows-app-zero-day-used-to-launch-python-scripts\/\" target=\"_blank\" rel=\"noreferrer noopener\">Telegram\u2019s statement via BleepingComputer<\/a>, while they claimed that the bug wasn\u2019t a zero-click flaw, they\u2019ve released a server-side fix that appends <em>&#8220;.untrusted&#8221;<\/em> to <em>.pyzw<\/em> files, causing Windows to alert users for action rather than automatically executing. Future client-side upgrades will contain more security features to address similar problems.<\/p>\n\n\n\n<p>Users should be careful when accessing files, upgrade Telegram Desktop as soon as any patch becomes available, and report any potential vulnerabilities via its bug bounty program.<\/p>\n\n\n\n<p><strong>Read next:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-8-2024\/\"><strong>Vulnerability Recap 4\/8\/24 \u2013 Google, HTTP\/2 Join Ivanti<\/strong><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/networks\/open-source-vulnerability-scanners\/\"><strong>6 Top Open-Source Vulnerability Scanners &amp; Tools<\/strong><\/a><\/li>\n<\/ul>\n\n\n<!-- ICP Plugin: Start --><div class=\"icp-list icp-list-main icp-list-body-top3 row\">\n    \n        <!--\n            ICP Plugin - body top3\n            ----------\n            Category: \n            Country: HK\n        -->\n    <\/div>\n<!-- ICP Plugin: End -->\n\n\n<div id=\"ta-campaign-widget-66d6d5ea86d22-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6d5ea86d22\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6d5ea86d22\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6d5ea86d22\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6d5ea86d22\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6d5ea86d22\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6d5ea86d22\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Discover last week\u2019s major vulnerability news and fixes from Palo Alto, Ivanti, Telegram, Microsoft, and more.<\/p>\n","protected":false},"author":331,"featured_media":34973,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[],"b2b_audience":[33],"b2b_industry":[63],"b2b_product":[379],"class_list":["post-34968","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","b2b_audience-awareness-and-consideration","b2b_industry-technology","b2b_product-threats-and-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Vulnerability Recap 4\/15\/24: Palo Alto, Microsoft, Ivanti Exploits<\/title>\n<meta name=\"description\" content=\"Discover last week\u2019s major vulnerability news and fixes from Palo Alto, Ivanti, Telegram, Microsoft, and more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-15-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerability Recap 4\/15\/24: Palo Alto, Microsoft, Ivanti Exploits\" \/>\n<meta property=\"og:description\" content=\"Discover last week\u2019s major vulnerability news and fixes from Palo Alto, Ivanti, Telegram, Microsoft, and more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-15-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-15T21:17:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-15T21:18:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240415-vulnerability-recap-april-15-2024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Maine Basan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Maine Basan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-15-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-15-2024\/\"},\"author\":{\"name\":\"Maine Basan\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/48c58015ca79ab3ed057abd7a52b2206\"},\"headline\":\"Vulnerability Recap 4\/15\/24 \u2013 Palo Alto, Microsoft, Ivanti Exploits\",\"datePublished\":\"2024-04-15T21:17:58+00:00\",\"dateModified\":\"2024-04-15T21:18:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-15-2024\/\"},\"wordCount\":1406,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-15-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240415-vulnerability-recap-april-15-2024.png\",\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-15-2024\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-15-2024\/\",\"name\":\"Vulnerability Recap 4\/15\/24: Palo Alto, Microsoft, Ivanti Exploits\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-15-2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-15-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240415-vulnerability-recap-april-15-2024.png\",\"datePublished\":\"2024-04-15T21:17:58+00:00\",\"dateModified\":\"2024-04-15T21:18:00+00:00\",\"description\":\"Discover last week\u2019s major vulnerability news and fixes from Palo Alto, Ivanti, Telegram, Microsoft, and more.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-15-2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-15-2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-15-2024\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240415-vulnerability-recap-april-15-2024.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240415-vulnerability-recap-april-15-2024.png\",\"width\":1400,\"height\":900,\"caption\":\"Image: janews094\/Adobe Stock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-15-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerability Recap 4\/15\/24 \u2013 Palo Alto, Microsoft, Ivanti Exploits\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/48c58015ca79ab3ed057abd7a52b2206\",\"name\":\"Maine Basan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/HH50049850_Maine_Basan-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/HH50049850_Maine_Basan-150x150.jpg\",\"caption\":\"Maine Basan\"},\"description\":\"Maine is an eSecurity Planet writer with a foundation in eLearning content development, research, and academic CRM implementation. She studied BA Communication Arts at the University of the Philippines. She now leverages her communication experiences as a writer and product analyst, engaging the B2B audience with insights into cybersecurity trends and solutions. Off the clock, Maine\u2019s probably immersed in her spreadsheets, organizing her life or planning her next K-pop concert and beach getaways.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/mbasan\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerability Recap 4\/15\/24: Palo Alto, Microsoft, Ivanti Exploits","description":"Discover last week\u2019s major vulnerability news and fixes from Palo Alto, Ivanti, Telegram, Microsoft, and more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-15-2024\/","og_locale":"en_US","og_type":"article","og_title":"Vulnerability Recap 4\/15\/24: Palo Alto, Microsoft, Ivanti Exploits","og_description":"Discover last week\u2019s major vulnerability news and fixes from Palo Alto, Ivanti, Telegram, Microsoft, and more.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-15-2024\/","og_site_name":"eSecurity Planet","article_published_time":"2024-04-15T21:17:58+00:00","article_modified_time":"2024-04-15T21:18:00+00:00","og_image":[{"width":1400,"height":900,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240415-vulnerability-recap-april-15-2024.png","type":"image\/png"}],"author":"Maine Basan","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Maine Basan","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-15-2024\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-15-2024\/"},"author":{"name":"Maine Basan","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/48c58015ca79ab3ed057abd7a52b2206"},"headline":"Vulnerability Recap 4\/15\/24 \u2013 Palo Alto, Microsoft, Ivanti Exploits","datePublished":"2024-04-15T21:17:58+00:00","dateModified":"2024-04-15T21:18:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-15-2024\/"},"wordCount":1406,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-15-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240415-vulnerability-recap-april-15-2024.png","articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-15-2024\/","url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-15-2024\/","name":"Vulnerability Recap 4\/15\/24: Palo Alto, Microsoft, Ivanti Exploits","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-15-2024\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-15-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240415-vulnerability-recap-april-15-2024.png","datePublished":"2024-04-15T21:17:58+00:00","dateModified":"2024-04-15T21:18:00+00:00","description":"Discover last week\u2019s major vulnerability news and fixes from Palo Alto, Ivanti, Telegram, Microsoft, and more.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-15-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-15-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-15-2024\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240415-vulnerability-recap-april-15-2024.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240415-vulnerability-recap-april-15-2024.png","width":1400,"height":900,"caption":"Image: janews094\/Adobe Stock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-15-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Vulnerability Recap 4\/15\/24 \u2013 Palo Alto, Microsoft, Ivanti Exploits"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/48c58015ca79ab3ed057abd7a52b2206","name":"Maine Basan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/HH50049850_Maine_Basan-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/HH50049850_Maine_Basan-150x150.jpg","caption":"Maine Basan"},"description":"Maine is an eSecurity Planet writer with a foundation in eLearning content development, research, and academic CRM implementation. She studied BA Communication Arts at the University of the Philippines. She now leverages her communication experiences as a writer and product analyst, engaging the B2B audience with insights into cybersecurity trends and solutions. Off the clock, Maine\u2019s probably immersed in her spreadsheets, organizing her life or planning her next K-pop concert and beach getaways.","url":"https:\/\/www.esecurityplanet.com\/author\/mbasan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/34968"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/331"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=34968"}],"version-history":[{"count":3,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/34968\/revisions"}],"predecessor-version":[{"id":34976,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/34968\/revisions\/34976"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/34973"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=34968"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=34968"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=34968"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=34968"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=34968"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=34968"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}