{"id":35007,"date":"2024-04-22T20:07:12","date_gmt":"2024-04-22T20:07:12","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=35007"},"modified":"2024-04-23T16:00:57","modified_gmt":"2024-04-23T16:00:57","slug":"vulnerability-recap-april-22-2024","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-22-2024\/","title":{"rendered":"Vulnerability Recap 4\/22\/24 \u2013 Cisco, Ivanti, Oracle &amp; More"},"content":{"rendered":"\n<p>Cisco, Ivanti, Oracle, and several others issued patches for a variety of serious vulnerabilities this week, many of them accompanied by proof-of-concepts (PoC) released by researchers. Once released, the PoC starts the clock for active attacks, especially for security tools, as demonstrated in active attacks on Palo Alto\u2019s PAN-OS vulnerability fixed the week before.<\/p>\n\n\n\n<p>Adam Maruyama, Field CTO of Garrison Technology, warns that \u201cattackers know the value of targeting cybersecurity software: they not only defuse the security mechanism, but also gain the elevated system privileges and network positioning that security solutions enjoy. Unless major security players [adopt] secure-by-design architectures, this trend will only accelerate due to platformization and consolidation.\u201d<\/p>\n\n\n\n<p>In an environment with many unpatched systems, prioritize the security tools expected to protect other systems. If updates can\u2019t be performed immediately, consider deploying additional security controls or at least disconnecting vulnerable devices from direct internet access.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">April 13, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Delinea Secret Server Patched After Researcher\u2019s Public Disclosure<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Authentication bypass.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> The simple object access protocol (SOAP) application programming interface (API) for Delinea\u2019s Secret Server privileged access management (PAM) failed to properly authenticate inputs that allowed privileged access to non-privileged users. The vulnerability initially affected the Delinea Platform, Secret Server Cloud, and Secret Server on-prem.<\/p>\n\n\n\n<p>Researcher Johnny Yu discovered the vulnerability in February and <a href=\"https:\/\/straightblast.medium.com\/all-your-secrets-are-belong-to-us-a-delinea-secret-server-authn-authz-bypass-adc26c800ad3\" target=\"_blank\" rel=\"noreferrer noopener\">published a proof of concept<\/a> on April 10th after no response to all attempts to responsibly disclose it. Delinea responded quickly to the public disclosure to <a href=\"https:\/\/trust.delinea.com\/?tcuUid=17aaf4ef-ada9-46d5-bf97-abd3b07daae3\" target=\"_blank\" rel=\"noreferrer noopener\">publish workarounds<\/a> on April 12th and issue patches on April 13th.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Delinea recommends upgrading instances of Secret Server if possible and also provides workarounds to block the vulnerability. They also published methods to check for indicators of compromise.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">April 15, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Juniper Issues Security Bulletins To Fix Junos OS and Junos OS Evolved<\/h3>\n\n\n\n<p><strong>Type of vulnerabilities:<\/strong> Cross-site scripting (XSS), malformed BGP tunnel encapsulation attribute (2), path traversal, and denial of service (DoS).<\/p>\n\n\n\n<p><strong>The problem:<\/strong> <a href=\"https:\/\/supportportal.juniper.net\/s\/global-search\/%40uri?language=en_US#sort=%40sfcec_community_publish_date_formula__c%20descending&amp;f:ctype=[Security%20Advisories]\" target=\"_blank\" rel=\"noreferrer noopener\">Junos issued five security bulletins<\/a> on April 15th for a variety of issues affecting the Junos OS and Junos OS Evolved network operating systems that run on Juniper Networks products. These medium and high vulnerabilities could allow the injection of webscript or HTML code, unauthorized file read, and crash systems. These fixes add to a dozen other security bulletins issued last week by Junos to fix third-party software vulnerabilities in Junos OS.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Upgrade Junos OS and Junos Evolved instances to fix all vulnerabilities. Both the XSS and path traversal flaws may be mitigated by limiting access to the J-Web interface and the XSS vulnerability can be avoided by disabling J-Web.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Widely-used PuTTY Utility Allows Recovery of Encryption Secret Keys<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Deterministic cryptographic number generation.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> The open-source PuTTY tool enables SSH, Telnet, and other network protocols used for remote server connections and file transfers. <a href=\"https:\/\/www.openwall.com\/lists\/oss-security\/2024\/04\/15\/6\" target=\"_blank\" rel=\"noreferrer noopener\">Openwall researchers discovered a flaw<\/a> in PuTTY versions 0.68 through 0.80 that didn\u2019t generate sufficiently random numbers for encryption keys, which could allow an attacker to fully recover keys and impersonate users after obtaining roughly 60 signatures.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Upgrade to PuTTY version 0.81 and revoke all existing encryption keys. Products that rely on the PuTTY code, including FileZilla, TortoiseGit, TortoiseSVN, and WinSCP, also need to be updated.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Unfixed PAN-OS Maximum-Critical Zero-Day Vulnerabilities Under Attack<\/h3>\n\n\n\n<p><strong>Type of attack:<\/strong> Command injection vulnerability.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Researchers at <a href=\"https:\/\/labs.watchtowr.com\/palo-alto-putting-the-protecc-in-globalprotect-cve-2024-3400\/\" target=\"_blank\" rel=\"noreferrer noopener\">watchTowr<\/a> and <a href=\"https:\/\/attackerkb.com\/topics\/SSTk336Tmf\/cve-2024-3400\/rapid7-analysis\" target=\"_blank\" rel=\"noreferrer noopener\">Rapid7<\/a> published exploits for <a href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-15-2024\/\">Palo Alto\u2019s zero-day<\/a> disclosed last week. Despite available patches, threat researcher Yutaka Sejiyama detected over <a href=\"https:\/\/twitter.com\/nekono_naha\/status\/1778716137582457301\" target=\"_blank\" rel=\"noreferrer noopener\">82,000 vulnerable firewalls exposed<\/a> to the internet early the next week, but by the end of the week, Shadowserver estimated the number to be reduced to <a href=\"https:\/\/twitter.com\/Shadowserver\/status\/1781246114089390292\" target=\"_blank\" rel=\"noreferrer noopener\">just over 22,000<\/a>.<\/p>\n\n\n\n<p>Researchers from GreyNoise began tracking unique IP addresses attempting to launch attacks on unpatched devices. The service saw as many as <a href=\"https:\/\/viz.greynoise.io\/tags\/palo-alto-pan-os-cve-2024-3400-rce-attempt?days=10\" target=\"_blank\" rel=\"noreferrer noopener\">10 IP addresses launched<\/a> in a single day and noted at least 15 observed malicious IPs.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Ideally, apply patches to exposed and vulnerable Palo Alto firewalls configured with GlobalProtect Gateway or GlobalProtect portal. Palo Alto <a href=\"https:\/\/security.paloaltonetworks.com\/CVE-2024-3400\" target=\"_blank\" rel=\"noreferrer noopener\">published workarounds<\/a> that require a Threat Prevention subscription, and previous mitigation advice to disable device telemetry is no longer valid.<\/p>\n\n\n\n<p><strong>To scan networks and applications for these and other vulnerabilities, consider using a <a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-scanning-tools\/\">vulnerability scanning tool<\/a>.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">April 16, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Leaky Command Line Interface in AWS and Google Cloud is Intentional<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Unauthorized information disclosure.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> The command line interface (CLI) for AWS and Google Cloud can allow attackers with CLI access to obtain passwords, user names, and other secrets used to access cloud repositories. <a href=\"https:\/\/orca.security\/resources\/blog\/leakycli-aws-google-cloud-command-line-tools-can-expose-sensitive-credentials-build-logs\/\" target=\"_blank\" rel=\"noreferrer noopener\">Orca Security disclosed the flaw<\/a>, called LeakyCLI, but both cloud providers declined to take action and assumed CLI can only be accessed in secure environments.<\/p>\n\n\n\n<p>A similar flaw disclosed last year to Microsoft, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-36052\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-36052<\/a>, earned a CVSS score of 8.6. Microsoft fixed this vulnerability in Azure CLI, making it unclear why Amazon and Google don\u2019t address the security issue.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Without an available fix, avoid storing secrets in environment variables. Instead, use secrets store services offered by the cloud providers.<\/p>\n\n\n\n<p><strong>Many vulnerability scanners fail to scan disputed vulnerabilities or insecure-by-design flaws. To read more about a similar issue, read <a href=\"https:\/\/www.esecurityplanet.com\/threats\/shadowray-ai-cybersecurity-lessons\/\">ShadowRay Vulnerability: 6 Lessons for AI &amp; Cybersecurity<\/a>.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">April 17, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Ivanti MDM Solution Patches 27 Vulnerabilities, Including 2 RCE Flaws<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> ACE with SYSTEM privilege, denial of service, heap-based buffer overflow, RCE, and read sensitive information from memory vulnerabilities.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> <a href=\"https:\/\/forums.ivanti.com\/s\/article\/Avalanche-6-4-3-Security-Hardening-and-CVEs-addressed?language=en_US\" target=\"_blank\" rel=\"noreferrer noopener\">Ivanti released an update<\/a> to their Avalanche mobile device management (MDM) product that fixed 27 vulnerabilities. The fixes include two critical heap-buffer-overflow vulnerabilities rated 9.8 out of 10 that could allow unauthorized users to execute RCE attacks.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Update to Avalanche 6.4.3 as soon as possible. Ivanti also publishes additional <a href=\"https:\/\/help.ivanti.com\/wl\/help\/en_US\/AVA\/6.3\/Avalanche\/Install\/installation.htm\" target=\"_blank\" rel=\"noreferrer noopener\">information regarding upgrade steps<\/a>, if needed.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Oracle Issues 441 Patches for 30 Products, Including 21 Critical Patches<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Authentication bypass, remote code execution (RCE), and more.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> <a href=\"https:\/\/www.oracle.com\/security-alerts\/cpuapr2024.html\" target=\"_blank\" rel=\"noreferrer noopener\">Oracle released 441 patches<\/a> for 30 products, including Oracle Commerce, Oracle MySQL, Oracle Financial Services Applications, and Oracle Communications. These updates address 239 separate CVEs, of which 21 were considered critical and 79 were considered to be high vulnerabilities. Oracle customers need to log in to read individual vulnerability and product details, but several of the critical vulnerabilities allow for RCE without authentication.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Oracle \u201cstrongly recommends\u201d that customers apply critical patches immediately. Some flaws may be reduced by blocking specific network protocols or removing privileged access to the tool. However, either option may break system functionality and aren\u2019t recommended as long term solutions.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Chrome &amp; Firefox Browsers\u2019 Latest Updates Fix High Severity Flaws<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Arbitrary code execution (ACE), object corruption, out of bounds reads, use-after-free defect, and more.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Google <a href=\"https:\/\/chromereleases.googleblog.com\/2024\/04\/stable-channel-update-for-desktop_16.html\" target=\"_blank\" rel=\"noreferrer noopener\">Chrome 124 fixed 23<\/a> security flaws and Mozilla <a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2024-18\/\" target=\"_blank\" rel=\"noreferrer noopener\">Firefox 125 fixed 15<\/a> vulnerabilities. Mozilla later <a href=\"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2024-19\/\" target=\"_blank\" rel=\"noreferrer noopener\">updated Firefox ESR 115.10<\/a>, which addressed nine of the same vulnerabilities in Firefox 125. The flaws could allow for a variety of attack effects that could crash systems, execute malicious code, or crash JavaScript code.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Most browsers will automatically update, but updates might require application restart to complete. Check for users who haven\u2019t updated their browser or restarted their computer for an extended period of time and force system or browser restart if necessary.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Cryptominers Exploit OpenMetadata Vulnerabilities to Hijack Kubernetes<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Authentication bypass.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/04\/17\/attackers-exploiting-new-critical-openmetadata-vulnerabilities-on-kubernetes-clusters\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft researchers discovered five vulnerabilities<\/a> (CVE-2024-28255, -28847, -28253, -28848, -28254) in the open-source OpenMetadata platform used to manage metadata across various data sources. These vulnerabilities, now fixed, could be used to bypass authentication and execute RCE in Kubernetes environments.<\/p>\n\n\n\n<p>The flaws could be used for a variety of exploits, such as using lateral movement to access external resources. However, most attackers observed exploiting the vulnerability hijacked the workload to mine for cryptocurrency.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Check clusters running OpenMetadata workloads and update the image to version 1.3.1 or later.<\/p>\n\n\n\n<p><strong>Consider reading more about <a href=\"https:\/\/www.esecurityplanet.com\/products\/container-and-kubernetes-security-vendors\/\">container and Kubernetes security tools<\/a>.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">April 18, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Cisco Integrated Management Controller Flaws Allows Root Privileges<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Command injection vulnerability.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> <a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-cimc-cmd-inj-mUx4c5AJ\" target=\"_blank\" rel=\"noreferrer noopener\">Cisco announced CVE-2024-20295<\/a> with a CVSS score of 8.8 out of 10 that could allow a local attacker to perform attacks using the command line interface embedded in the Cisco Integrated Management Controller. An associated proof of concept verifies that insufficient user-supplied input validation can allow attackers to elevate to root privileges.<\/p>\n\n\n\n<p>A similar flaw, <a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-cimc-cmd-inj-bLuPcb\" target=\"_blank\" rel=\"noreferrer noopener\">tracked as CVE-2024-20356<\/a>, was also announced and received a similarly high CVSS score of 8.7 out of 10. Both flaws require administrator level access to the tool.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Check the individual security advisories or <a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/publicationListing.x\" target=\"_blank\" rel=\"noreferrer noopener\">the Cisco Security Advisories<\/a> page for the affected products and updated versions available. No workaround was provided for either issue.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">April 19, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">CrushFTP Reveals Exploited Zero-Day Vulnerability<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Information disclosure.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Unauthenticated and authenticated WebInterface users of the CrushFTP program can retrieve system files outside of the program\u2019s virtual file server. Exploitation of this flaw is happening now, and while originally reported by Airbus CERT, Crowdstrike also confirms witnessing active attacks.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> CrushFTP <a href=\"https:\/\/www.crushftp.com\/crush11wiki\/Wiki.jsp?page=Update\" target=\"_blank\" rel=\"noreferrer noopener\">recommends immediate upgrade<\/a> to version 11.1.0 or higher. However, customers using a DMZ in front of a CrushFTP instance won\u2019t be vulnerable to the flaw.<\/p>\n\n\n\n<p><strong>Read next:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-15-2024\/\"><strong>Vulnerability Recap 4\/15\/24 \u2013 Palo Alto, Microsoft, Ivanti Exploits<\/strong><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-management-as-a-service\/\"><strong>Vulnerability Management as a Service (VMaaS): Ultimate Guide<\/strong><\/a><\/li>\n<\/ul>\n\n\n<!-- ICP Plugin: Start --><div class=\"icp-list icp-list-main icp-list-body-top3 row\">\n    \n        <!--\n            ICP Plugin - body top3\n            ----------\n            Category: \n            Country: HK\n        -->\n    <\/div>\n<!-- ICP Plugin: End -->\n\n\n<div id=\"ta-campaign-widget-66d6d43ca0d7f-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6d43ca0d7f\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6d43ca0d7f\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6d43ca0d7f\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6d43ca0d7f\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6d43ca0d7f\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6d43ca0d7f\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Catch up on the vulnerabilities, updates, and workarounds announced for the week of April 22, 2024 from Cisco, Ivanti, Oracle, and more.<\/p>\n","protected":false},"author":271,"featured_media":35006,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[18145,3790,3414,4218,22929,32039],"b2b_audience":[33],"b2b_industry":[63],"b2b_product":[379],"class_list":["post-35007","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-cyber-threats-2","tag-cybersecurity","tag-network-security","tag-vulnerabilities","tag-vulnerability-management","tag-vulnerability-news","b2b_audience-awareness-and-consideration","b2b_industry-technology","b2b_product-threats-and-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Vulnerability Recap 4\/22\/24 \u2013 Cisco, Ivanti, Oracle &amp; More<\/title>\n<meta name=\"description\" content=\"Catch up on the vulnerabilities, updates, and workarounds announced for the week of April 22, 2024 from Cisco, Ivanti, Oracle, and more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-22-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerability Recap 4\/22\/24 \u2013 Cisco, Ivanti, Oracle &amp; More\" \/>\n<meta property=\"og:description\" content=\"Catch up on the vulnerabilities, updates, and workarounds announced for the week of April 22, 2024 from Cisco, Ivanti, Oracle, and more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-22-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-22T20:07:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-23T16:00:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240422-vulnerability-recap-april-22-2024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chad Kime\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chad Kime\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-22-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-22-2024\/\"},\"author\":{\"name\":\"Chad Kime\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\"},\"headline\":\"Vulnerability Recap 4\/22\/24 \u2013 Cisco, Ivanti, Oracle &amp; More\",\"datePublished\":\"2024-04-22T20:07:12+00:00\",\"dateModified\":\"2024-04-23T16:00:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-22-2024\/\"},\"wordCount\":1530,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-22-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240422-vulnerability-recap-april-22-2024.png\",\"keywords\":[\"cyber threats\",\"cybersecurity\",\"network security\",\"vulnerabilities\",\"Vulnerability Management\",\"vulnerability news\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-22-2024\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-22-2024\/\",\"name\":\"Vulnerability Recap 4\/22\/24 \u2013 Cisco, Ivanti, Oracle & More\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-22-2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-22-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240422-vulnerability-recap-april-22-2024.png\",\"datePublished\":\"2024-04-22T20:07:12+00:00\",\"dateModified\":\"2024-04-23T16:00:57+00:00\",\"description\":\"Catch up on the vulnerabilities, updates, and workarounds announced for the week of April 22, 2024 from Cisco, Ivanti, Oracle, and more.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-22-2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-22-2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-22-2024\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240422-vulnerability-recap-april-22-2024.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240422-vulnerability-recap-april-22-2024.png\",\"width\":1400,\"height\":900,\"caption\":\"Image: RareStock\/Adobe Stock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-22-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerability Recap 4\/22\/24 \u2013 Cisco, Ivanti, Oracle &amp; More\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\",\"name\":\"Chad Kime\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"caption\":\"Chad Kime\"},\"description\":\"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerability Recap 4\/22\/24 \u2013 Cisco, Ivanti, Oracle & More","description":"Catch up on the vulnerabilities, updates, and workarounds announced for the week of April 22, 2024 from Cisco, Ivanti, Oracle, and more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-22-2024\/","og_locale":"en_US","og_type":"article","og_title":"Vulnerability Recap 4\/22\/24 \u2013 Cisco, Ivanti, Oracle & More","og_description":"Catch up on the vulnerabilities, updates, and workarounds announced for the week of April 22, 2024 from Cisco, Ivanti, Oracle, and more.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-22-2024\/","og_site_name":"eSecurity Planet","article_published_time":"2024-04-22T20:07:12+00:00","article_modified_time":"2024-04-23T16:00:57+00:00","og_image":[{"width":1400,"height":900,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240422-vulnerability-recap-april-22-2024.png","type":"image\/png"}],"author":"Chad Kime","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Chad Kime","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-22-2024\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-22-2024\/"},"author":{"name":"Chad Kime","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9"},"headline":"Vulnerability Recap 4\/22\/24 \u2013 Cisco, Ivanti, Oracle &amp; More","datePublished":"2024-04-22T20:07:12+00:00","dateModified":"2024-04-23T16:00:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-22-2024\/"},"wordCount":1530,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-22-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240422-vulnerability-recap-april-22-2024.png","keywords":["cyber threats","cybersecurity","network security","vulnerabilities","Vulnerability Management","vulnerability news"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-22-2024\/","url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-22-2024\/","name":"Vulnerability Recap 4\/22\/24 \u2013 Cisco, Ivanti, Oracle & More","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-22-2024\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-22-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240422-vulnerability-recap-april-22-2024.png","datePublished":"2024-04-22T20:07:12+00:00","dateModified":"2024-04-23T16:00:57+00:00","description":"Catch up on the vulnerabilities, updates, and workarounds announced for the week of April 22, 2024 from Cisco, Ivanti, Oracle, and more.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-22-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-22-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-22-2024\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240422-vulnerability-recap-april-22-2024.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240422-vulnerability-recap-april-22-2024.png","width":1400,"height":900,"caption":"Image: RareStock\/Adobe Stock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-22-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Vulnerability Recap 4\/22\/24 \u2013 Cisco, Ivanti, Oracle &amp; More"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9","name":"Chad Kime","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","caption":"Chad Kime"},"description":"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.","url":"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/35007"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/271"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=35007"}],"version-history":[{"count":4,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/35007\/revisions"}],"predecessor-version":[{"id":35022,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/35007\/revisions\/35022"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/35006"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=35007"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=35007"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=35007"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=35007"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=35007"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=35007"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}