{"id":35128,"date":"2024-04-29T20:18:24","date_gmt":"2024-04-29T20:18:24","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=35128"},"modified":"2024-04-29T20:18:25","modified_gmt":"2024-04-29T20:18:25","slug":"vulnerability-recap-april-29-2024","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-29-2024\/","title":{"rendered":"Vulnerability Recap 4\/29\/24 \u2013 Cisco, Microsoft, Palo Alto &amp; More"},"content":{"rendered":"\n<p>Many of this week\u2019s disclosures involve new aspects of old vulnerabilities. Palo Alto\u2019s Pan-OS flaw impacts Siemens products and receives new remediation instructions. An old Microsoft Windows spooler flaw is added to the CISA KEV list, and the Cactus Ransomware gang currently pursues unfixed Qlik Sense servers with a vulnerability patched in September 2023.<\/p>\n\n\n\n<p>Both new and old vulnerabilities can enable an attacker with suitable skills to exploit them, regardless of the CVS score severity. It seems that many continue to struggle to keep up with patching and updating backlogs, which suggests that more organizations need outside help from patch management as a service or managed service providers (MSPs) to catch up.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">April 22, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">CISA Adds 2022 Windows Print Spooler Vulnerability to KEV Catalog<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Elevation of privilege.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Microsoft Threat Intelligence <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/04\/22\/analyzing-forest-blizzards-custom-post-compromise-tool-for-exploiting-cve-2022-38028-to-obtain-credentials\/\" target=\"_blank\" rel=\"noreferrer noopener\">published a report<\/a> on how a Russian threat group, known as APT28 or Forest Blizzard, used customized malware to exploit the <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2022-38028\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2022-38028<\/a> vulnerability in the Windows Print Spooler to gain elevated permissions. Although fixed in the October 2022 updates, Microsoft notes that the zero-day vulnerability may have been exploited as early as April 2019.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Microsoft fixed this vulnerability in their October 2022 patches, but didn\u2019t disclose active exploitation of the vulnerability until this month. The exploitation disclosure led the US Cybersecurity Infrastructure and Security Agency (CISA) to add the vulnerability to the <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" target=\"_blank\" rel=\"noreferrer noopener\">known exploited vulnerabilities (KEV) catalog<\/a>. Federal agencies have until May 14, 2024, to apply patches or disable vulnerable software.<\/p>\n\n\n\n<p><strong>Consider reading more about <a href=\"https:\/\/www.esecurityplanet.com\/products\/digital-forensics-software\/\">forensic tools and processes<\/a> to investigate attacks.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">April 23, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Palo Alto Updates Pan-OS Remediation &amp; Siemens RUGGEDCOM Impacted<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Command injection vulnerability.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> The CVSS 10.0\/10.0 Pan-OS vulnerability, <a href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-15-2024\/\">CVE-2024-3400<\/a>, makes this recap for the third <a href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-22-2024\/\">consecutive week<\/a> thanks to a new disclosure from Siemens and a revised remediation from Palo Alto. <a href=\"https:\/\/cert-portal.siemens.com\/productcert\/html\/ssa-750274.html\" target=\"_blank\" rel=\"noreferrer noopener\">Siemens issued a notice<\/a> that the RUGGEDCOM APE 1808, an industrial platform hardened for harsh physical environments, could come pre-installed with Palo Alto next generation firewalls vulnerable to the Pan-OS vulnerability.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Siemens recommends customers contact customer service for patches or apply mitigations: disable GlobalProtect gateway and GlobalProtect portal (disabled by default) or apply Threat Prevention subscription blocks.<\/p>\n\n\n\n<p><a href=\"https:\/\/knowledgebase.paloaltonetworks.com\/KCSArticleDetail?id=kA14u000000CrO6CAK\" target=\"_blank\" rel=\"noreferrer noopener\">Palo Alto also revised their remediation<\/a>, which now advises four potential levels of fixes (after installing the latest PAN-OS hotfix) based upon detected compromise levels:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Unsuccessful exploitation attempt:<\/strong> Create a master key and elect AES-256-GCM.<\/li>\n\n\n\n<li><strong>Vulnerability tested, 0-byte file created, no indication of unauthorized command injection:<\/strong> Perform the same remediation as exploit level 1.<\/li>\n\n\n\n<li><strong>A file is found copied to a location accessible via web request (typically running_config.xml):<\/strong> Perform a Private Data Reset of the device.<\/li>\n\n\n\n<li><strong>Interactive command execution evidence detected (shell-based back doors, introduction of code, etc.):<\/strong> Perform a Factory Reset and reconfigure the device.<\/li>\n<\/ol>\n\n\n\n<p>Warning: Performing the last two fixes will destroy data and eliminate the possibility to capture forensic artifacts. Destruction of forensic artifacts will prevent incident response investigations and criminal investigations, and could affect cybersecurity insurance processes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">10.0 Flowmon Vulnerability Threatens a Small Number of Huge Customers<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Command injection vulnerability.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> <a href=\"https:\/\/support.kemptechnologies.com\/hc\/en-us\/articles\/24878235038733-CVE-2024-2389-Flowmon-critical-security-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">Progress Software released patches<\/a> to fix <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-2389\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-2389<\/a> in their Flowmon network performance and security software tool. In a proof of concept <a href=\"https:\/\/rhinosecuritylabs.com\/research\/cve-2024-2389-in-progress-flowmon\/\" target=\"_blank\" rel=\"noreferrer noopener\">published by Rhino Security<\/a>, a specially crafted application programming interface (API) command allows system commands without authentication and permits full compromise of the Flowmon server with root permissions.<\/p>\n\n\n\n<p>Although web vulnerability search engines <a href=\"https:\/\/www.shodan.io\/search?query=flowmon\" target=\"_blank\" rel=\"noreferrer noopener\">such as Shodan<\/a> show less than 100 servers exposed to the internet, Flowmon\u2019s customers tend to be the largest enterprises like KIA, Orange, TDK, and Volkswagen. This network software uses full access to the network to function, so a compromise of the server provides attackers with enormous access to the enterprise.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Patch Flowmon immediately to version 11.1.14 or 12.3.5 and upgrade all Flowmon modules to the latest available versions. There is no workaround available, and the published proof of concept will probably allow attacks in the near future.<\/p>\n\n\n\n<p><strong>Attackers can easily exploit 10.0 vulnerabilities, so be prepared and <a href=\"https:\/\/www.esecurityplanet.com\/networks\/incident-response\/\">develop an incident response plan<\/a>.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">April 24, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Cisco Patches Firewall Vulnerabilities Actively Exploited for Espionage<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Command injection vulnerability, denial of service, persistent local code execution.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Members of the Cisco Talos and Duo Security Research team uncovered zero-day flaws, named <a href=\"https:\/\/blog.talosintelligence.com\/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices\/\" target=\"_blank\" rel=\"noreferrer noopener\">Arcane Door<\/a>, actively exploited by state actors to exfiltrate network data through Adaptive Security Appliances (ASAs) and Firepower Threat Defense. The initial access remains unknown, but indicators of compromise include gaps in logging, unexpected reboots, and access by a set of IP addresses suspected to be controlled by the adversary.<\/p>\n\n\n\n<p>Cisco suspects the attacker began exploitation as early as July 2023, and the UK, Canadian, and Australian cybersecurity agencies issued a <a href=\"https:\/\/www.cyber.gc.ca\/en\/news-events\/cyber-activity-impacting-cisco-asa-vpns\" target=\"_blank\" rel=\"noreferrer noopener\">joint advisory<\/a>. Cisco\u2019s announcement and the advisory explains how attackers used the flaws to exfiltrate device configuration files, disable system logging, and modify configuration to provide authorized direct access for attacker-controlled devices.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Cisco\u2019s event notice recommends immediate upgrade of affected devices. To check for signs of compromise, Cisco <a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/resources\/asa_ftd_attacks_event_response\" target=\"_blank\" rel=\"noreferrer noopener\">recommends a process<\/a> to collect data for review by Cisco\u2019s Technical Assistance Center.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Google Patches One Critical &amp; Two High-Severity Chrome Bugs<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Out-of-bounds read, type confusion, use-after-free.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Google released new Chrome versions for Windows, Mac, and Linux to fix multiple security issues and chose to <a href=\"https:\/\/chromereleases.googleblog.com\/2024\/04\/stable-channel-update-for-desktop_24.html\" target=\"_blank\" rel=\"noreferrer noopener\">highlight three critical to high vulnerabilities<\/a> reported by security researchers. The critical exploit type bug, CVE-2024-4058, could be exploited for arbitrary code execution (ACE) or sandbox escapes.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> For those with Chrome updates automatically enabled, make sure that all users restart their browsers. For manual updates, perform updates promptly.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Broadcom Patches Brocade SANnav Flaw 19 Months After Discovery<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Password storage.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> The Brocade management application for storage area networks (SANs), SANnav, operates as a virtual machine that lacks built-in firewalls and can be manipulated into sending credentials via clear-text (HTTP). The latest update addresses 18 vulnerabilities discovered by <a href=\"https:\/\/pierrekim.github.io\/blog\/2024-04-24-brocade-sannav-18-vulnerabilities.html#insecure-sannav-access\" target=\"_blank\" rel=\"noreferrer noopener\">researcher Pierre Barre (AKA: Pierre Kim)<\/a>, who disclosed that he brought these issues to Broadcom 19 months ago.<\/p>\n\n\n\n<p>The report timeline reveals that Brocade rejected penetration tests performed in August 2022 and February 2023 because they hadn\u2019t been on the latest version of their software. Only after additional testing in May 2023 did Brocade accept the vulnerabilities existed, but did not issue patches until December 2023. Broadcom further embargoed publishing CVEs, security bulletins, or disclosure of Brocade Fibre Channel siteches until April 2024.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> <a href=\"https:\/\/support.broadcom.com\/web\/ecx\/support-content-notification\/-\/external\/content\/SecurityAdvisories\/0\/23238\" target=\"_blank\" rel=\"noreferrer noopener\">Broadcom support recommends<\/a> upgrading to Brocade v2.3.1, v2.3.0a, and later releases.<\/p>\n\n\n\n<p><strong>Having trouble keeping up with patches? Try <a href=\"https:\/\/www.esecurityplanet.com\/applications\/patch-management-as-a-service\/\">patch management as a service<\/a> (PMaaS).<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">April 25, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">WP Automatic Plugin for WordPress Actively Exploited to Hijack Websites<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> SQL injection.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Attackers actively seek to exploit vulnerability <a href=\"https:\/\/wpscan.com\/blog\/new-malware-campaign-targets-wp-automatic-plugin\/\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-27956<\/a>, with a CVSS score of 9.8\/10, in the WP-Automatic plugin. <a href=\"https:\/\/wpscan.com\/blog\/new-malware-campaign-targets-wp-automatic-plugin\/\" target=\"_blank\" rel=\"noreferrer noopener\">WPScan explains the exploitation<\/a> process, which starts with a SQL injection attack that executes unauthorized database queries to create new admin-level user accounts on the WordPress websites. Then attackers can upload malicious plugins, web shells, backdoors, and even rename the WP-Automatic file to prevent exploitation by rival attackers.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Immediately update the plugin to version 3.92.1.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Unfixed September 2023 Qlik Sense Vulns Under Ransomware Attack<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Arbitrary code execution.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> The Qlik Sense business intelligence software issued <a href=\"https:\/\/community.qlik.com\/t5\/Official-Support-Articles\/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows\/ta-p\/2110801\" target=\"_blank\" rel=\"noreferrer noopener\">patches in August 2023<\/a> and <a href=\"https:\/\/community.qlik.com\/t5\/Official-Support-Articles\/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows\/ta-p\/2120325\" target=\"_blank\" rel=\"noreferrer noopener\">September 2023<\/a> for vulnerabilities that could allow ACE. Arctic Wolf <a href=\"https:\/\/arcticwolf.com\/resources\/blog\/qlik-sense-exploited-in-cactus-ransomware-campaign\/\" target=\"_blank\" rel=\"noreferrer noopener\">warned of a Cactus ransomware campaign<\/a> against these vulnerabilities at the end of November, yet Fox-IT still <a href=\"https:\/\/blog.fox-it.com\/2024\/04\/25\/sifting-through-the-spines-identifying-potential-cactus-ransomware-victims\/\" target=\"_blank\" rel=\"noreferrer noopener\">detected over 3,000 vulnerable servers<\/a> this April.&nbsp;<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Update the software as soon as possible to avoid ransomware attacks.<\/p>\n\n\n\n<p><strong>Read next:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-22-2024\/\"><strong>Vulnerability Recap 4\/22\/24 \u2013 Cisco, Ivanti, Oracle &amp; More<\/strong><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-ransomware-removal-tools\/\"><strong>Best Ransomware Protection &amp; Removal Tools<\/strong><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-managed-service-provider\/\"><strong>Managed IT Service Providers (MSPs): A Fast Way to Secure IT<\/strong><\/a><\/li>\n<\/ul>\n\n\n<!-- ICP Plugin: Start --><div class=\"icp-list icp-list-main icp-list-body-top3 row\">\n    \n        <!--\n            ICP Plugin - body top3\n            ----------\n            Category: \n            Country: HK\n        -->\n    <\/div>\n<!-- ICP Plugin: End -->\n\n\n\n<p><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6e436c059c-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6e436c059c\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6e436c059c\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6e436c059c\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6e436c059c\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6e436c059c\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6e436c059c\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Catch up on the vulnerabilities, updates, and workarounds preceding the week of April 29, 2024, from Cisco, Microsoft, Palo Alto, and more.<\/p>\n","protected":false},"author":271,"featured_media":35130,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[3790,23006,4218,22929],"b2b_audience":[33],"b2b_industry":[63],"b2b_product":[379],"class_list":["post-35128","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-cybersecurity","tag-patch-management","tag-vulnerabilities","tag-vulnerability-management","b2b_audience-awareness-and-consideration","b2b_industry-technology","b2b_product-threats-and-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Vulnerability Recap 4\/29\/24: Cisco, Microsoft, Palo Alto &amp; More<\/title>\n<meta name=\"description\" content=\"Catch up on the vulnerabilities, updates, and workarounds preceding the week of April 29, 2024, from Cisco, Microsoft, Palo Alto, and more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-29-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerability Recap 4\/29\/24: Cisco, Microsoft, Palo Alto &amp; More\" \/>\n<meta property=\"og:description\" content=\"Catch up on the vulnerabilities, updates, and workarounds preceding the week of April 29, 2024, from Cisco, Microsoft, Palo Alto, and more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-29-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-29T20:18:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-29T20:18:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240429-vulnerability-recap-april-29-2024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chad Kime\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chad Kime\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-29-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-29-2024\/\"},\"author\":{\"name\":\"Chad Kime\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\"},\"headline\":\"Vulnerability Recap 4\/29\/24 \u2013 Cisco, Microsoft, Palo Alto &amp; More\",\"datePublished\":\"2024-04-29T20:18:24+00:00\",\"dateModified\":\"2024-04-29T20:18:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-29-2024\/\"},\"wordCount\":1301,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-29-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240429-vulnerability-recap-april-29-2024.png\",\"keywords\":[\"cybersecurity\",\"Patch Management\",\"vulnerabilities\",\"Vulnerability Management\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-29-2024\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-29-2024\/\",\"name\":\"Vulnerability Recap 4\/29\/24: Cisco, Microsoft, Palo Alto & More\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-29-2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-29-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240429-vulnerability-recap-april-29-2024.png\",\"datePublished\":\"2024-04-29T20:18:24+00:00\",\"dateModified\":\"2024-04-29T20:18:25+00:00\",\"description\":\"Catch up on the vulnerabilities, updates, and workarounds preceding the week of April 29, 2024, from Cisco, Microsoft, Palo Alto, and more.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-29-2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-29-2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-29-2024\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240429-vulnerability-recap-april-29-2024.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240429-vulnerability-recap-april-29-2024.png\",\"width\":1400,\"height\":900,\"caption\":\"Image: Marcos Silva\/Adobe Stock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-29-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerability Recap 4\/29\/24 \u2013 Cisco, Microsoft, Palo Alto &amp; More\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9\",\"name\":\"Chad Kime\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg\",\"caption\":\"Chad Kime\"},\"description\":\"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerability Recap 4\/29\/24: Cisco, Microsoft, Palo Alto & More","description":"Catch up on the vulnerabilities, updates, and workarounds preceding the week of April 29, 2024, from Cisco, Microsoft, Palo Alto, and more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-29-2024\/","og_locale":"en_US","og_type":"article","og_title":"Vulnerability Recap 4\/29\/24: Cisco, Microsoft, Palo Alto & More","og_description":"Catch up on the vulnerabilities, updates, and workarounds preceding the week of April 29, 2024, from Cisco, Microsoft, Palo Alto, and more.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-29-2024\/","og_site_name":"eSecurity Planet","article_published_time":"2024-04-29T20:18:24+00:00","article_modified_time":"2024-04-29T20:18:25+00:00","og_image":[{"width":1400,"height":900,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240429-vulnerability-recap-april-29-2024.png","type":"image\/png"}],"author":"Chad Kime","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Chad Kime","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-29-2024\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-29-2024\/"},"author":{"name":"Chad Kime","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9"},"headline":"Vulnerability Recap 4\/29\/24 \u2013 Cisco, Microsoft, Palo Alto &amp; More","datePublished":"2024-04-29T20:18:24+00:00","dateModified":"2024-04-29T20:18:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-29-2024\/"},"wordCount":1301,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-29-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240429-vulnerability-recap-april-29-2024.png","keywords":["cybersecurity","Patch Management","vulnerabilities","Vulnerability Management"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-29-2024\/","url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-29-2024\/","name":"Vulnerability Recap 4\/29\/24: Cisco, Microsoft, Palo Alto & More","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-29-2024\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-29-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240429-vulnerability-recap-april-29-2024.png","datePublished":"2024-04-29T20:18:24+00:00","dateModified":"2024-04-29T20:18:25+00:00","description":"Catch up on the vulnerabilities, updates, and workarounds preceding the week of April 29, 2024, from Cisco, Microsoft, Palo Alto, and more.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-29-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-29-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-29-2024\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240429-vulnerability-recap-april-29-2024.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/04\/esp_20240429-vulnerability-recap-april-29-2024.png","width":1400,"height":900,"caption":"Image: Marcos Silva\/Adobe Stock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-april-29-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Vulnerability Recap 4\/29\/24 \u2013 Cisco, Microsoft, Palo Alto &amp; More"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/86e8ee2d3bc71af07dbe303d16f17dc9","name":"Chad Kime","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/08\/2023-Kime-HeadShot-150x150.jpg","caption":"Chad Kime"},"description":"eSecurity Planet lead writer Chad Kime covers a variety of security, compliance, and risk topics. Before joining the site, Chad studied electrical engineering at UCLA, earned an MBA from USC, managed 200+ ediscovery cases, and helped market a number of IT and cybersecurity products, then transitioned into technical writing policies and penetration test reports for MSPs and MSSPs. In his free time, Chad enjoys walks on the beach with his wife, annoying his children, and trying to carve out time for movies, books, video games, and bike rides.","url":"https:\/\/www.esecurityplanet.com\/author\/chad-kime\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/35128"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/271"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=35128"}],"version-history":[{"count":12,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/35128\/revisions"}],"predecessor-version":[{"id":35157,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/35128\/revisions\/35157"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/35130"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=35128"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=35128"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=35128"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=35128"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=35128"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=35128"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}