{"id":36364,"date":"2024-07-08T18:21:48","date_gmt":"2024-07-08T18:21:48","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=36364"},"modified":"2024-07-08T18:21:50","modified_gmt":"2024-07-08T18:21:50","slug":"vulnerability-recap-july-8-2024","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-8-2024\/","title":{"rendered":"Vulnerability Recap 7\/8\/24 \u2013 Intel, Cisco &amp; More Face Risks"},"content":{"rendered":"\n<p>Last week, critical vulnerability news surfaced across many platforms, with the majority of events occurring just before the Fourth of July. These vulnerabilities affected diverse areas, including network infrastructure, software libraries, IoT devices, and even CPUs.<\/p>\n\n\n\n<p>OpenSSH resolved a signal handler race problem, Juniper Networks managed an authentication bypass, and CocoaPods faced supply chain attack concerns. Cisco discovered a command injection issue, while a side-channel attack exposed Intel CPUs. Rockwell Automation handled RCE issues. Traeger addressed unauthorized controls on IoT grills before July 4th. If you&#8217;re compromised, apply patches and additional mitigating methods right away.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">July 1, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">OpenSSH Releases Security Updates to Address RCE<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Signal handler race condition in OpenSSH server.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-6387\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-6387<\/a> is a signal handler race issue within OpenSSH&#8217;s server (sshd) that affects glibc-based Linux systems. It supports unauthenticated remote code execution with root privileges. This bug impacts OpenSSH versions 8.5p1 through 9.7p1. It&#8217;s a regression of an 18-year-old flaw (CVE-2006-5051) that was reintroduced in October 2020.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> <a href=\"https:\/\/www.openwall.com\/lists\/oss-security\/2024\/07\/01\/12\" target=\"_blank\" rel=\"noreferrer noopener\">OpenSSH issued updates<\/a> to address CVE-2024-6387. Implement these changes immediately. To reduce risk, restrict SSH access via network controls, enforce segmentation, and do extensive regression testing to avoid known vulnerabilities from resurfacing. Regularly update and follow secure development methods, particularly in open-source projects.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Juniper Networks Addresses Authentication Bypass Vulnerability<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Authentication bypass using an alternate path.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-2973\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-2973<\/a> is a severe authentication bypass vulnerability in Juniper Networks&#8217; Session Smart Router and Conductor that affects high-availability redundancy deployments. It has a CVSS score of 10.0. The vulnerability allows attackers to circumvent authentication and obtain complete control of the compromised devices. It&#8217;s discovered during internal testing and affects many router versions.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Juniper Networks has published automatic fixes for vulnerable devices managed using MIST Cloud. Update your routers to the most recent versions (<a href=\"https:\/\/www.juniper.net\/documentation\/us\/en\/software\/session-smart-router\/docs\/about_releases\/\" target=\"_blank\" rel=\"noreferrer noopener\">5.6.15, 6.1.9-lts, 6.2.5-sts<\/a>). To protect your network devices from potential risks, apply patches on a regular basis and keep their firmware up to date.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">CocoaPods Patches Vulnerabilities to Prevent Supply Chain Attacks<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Authentication bypass and insecure email verification.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Three critical CocoaPods vulnerabilities (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-38366\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-38366<\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-38367\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-38367<\/a>, and <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-38368\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-38368<\/a>) enabled attackers to claim unclaimed pods, alter packages, and execute arbitrary code on the Trunk server. These vulnerabilities put iOS and macOS apps at risk of serious supply chain attacks. Issues occurred from unsecure email verification and a defective parcel claim process that dates back to 2014.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> <a href=\"https:\/\/github.com\/CocoaPods\/CocoaPods\/security\/advisories\/GHSA-x2x4-g675-qg7c\" target=\"_blank\" rel=\"noreferrer noopener\">CocoaPods fixed<\/a> these flaws and reset all user sessions since October 2023. Make sure to update to the most recent CocoaPods version and constantly check your dependencies for any unapproved modifications. To avoid similar vulnerabilities, your organization should enhance their email verification processes and employ safe development standards.<\/p>\n\n\n\n<p><strong>Boost your organization\u2019s permissions security by using an identity and access management solution. Read our guide to see the <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-iam-software\/\">best IAM solutions<\/a> available, including their strengths, weaknesses, cost, and more.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">July 2, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Velvet Ant Exploits Zero-Day Flaw in Cisco NX-OS Software<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Command injection.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-20399\">CVE-2024-20399<\/a> is a command injection vulnerability in Cisco NX-OS Software that enables authorized local attackers to run arbitrary commands as root. China\u2019s Velvet Ant hackers used this vulnerability to launch custom malware, hack into vulnerable computers, and upload files without generating syslog notifications. It affects various Cisco Nexus switches, and the fundamental cause is insufficient validation of CLI command parameters.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> <a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-nxos-cmd-injection-xD9OhyOP\" target=\"_blank\" rel=\"noreferrer noopener\">Cisco issued patches<\/a> for CVE-2024-20399. Administrators should apply these updates as soon as possible and conduct frequent reviews of access controls and monitoring processes. To detect and mitigate these vulnerabilities, use stronger logging and centralized log analysis. To avoid attacks like this, properly validate CLI commands and make sure your administrative credentials are safe.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Intel CPUs Vulnerable to \u2018Indirector\u2019 that Leaks Sensitive Information<\/h3>\n\n\n\n<p><strong>Type of vulnerability or attack:<\/strong> Side-channel attack via branch target injection.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Modern Intel CPUs, such as Raptor Lake and Alder Lake, are vulnerable to a new side-channel attack dubbed Indirector. This vulnerability occurs in the indirect branch predictor (IBP) and branch target buffer (BTB). It enables attackers to launch <a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/software-security-guidance\/advisory-guidance\/branch-target-injection.html\" target=\"_blank\" rel=\"noreferrer noopener\">branch target injection (BTI)<\/a> attacks. Using these hardware components, attackers can defeat existing defenses such as Spectre v2 (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2017-5715\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2017-5715<\/a>) and leak sensitive data through speculative execution.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Intel analyzed the findings and concluded that existing mitigations, including <a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/announcement\/intel-security-announcement-2024-07-02-001.html\" target=\"_blank\" rel=\"noreferrer noopener\">IBRS, eIBRS, and BHI<\/a>, are effective against Indirector attacks. Users should make sure to enable these mitigations. To improve security against side-channel attacks, securely use <a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/software-security-guidance\/technical-documentation\/indirect-branch-predictor-barrier.html\" target=\"_blank\" rel=\"noreferrer noopener\">indirect branch predictor barrier (IBPB)<\/a> and enhance the branch prediction unit (BPU) with more complicated tags, encryption, and randomization.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">July 3, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Threat Actors Exploit MSHTML Flaw to Deploy MerkSpy Surveillance Tool<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Remote code execution.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> A Microsoft MSHTML vulnerability, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-40444\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-40444<\/a>, was exploited to distribute the MerkSpy surveillance program. The attack starts with a malicious Word document providing a fictitious job description, which leads to remote code execution.<\/p>\n\n\n\n<p>This downloads an HTML file (&#8220;olerender.html&#8221;), which contains shellcode that downloads and runs more malware. MerkSpy collects sensitive information, observes actions, and builds persistence, affecting users in Canada, India, Poland, and the United States.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Microsoft already released a <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-40444\" target=\"_blank\" rel=\"noreferrer noopener\">patch for CVE-2021-40444<\/a> in September 2021. Update your systems with the latest security patches. Educate your employees on how to recognize phishing attempts and implement robust security measures, such as advanced endpoint protection and regular security audits, to detect and prevent such attacks. Improve your monitoring and logging security so that you can respond to unusual activity quickly.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Microsoft Reveals Security Flaws in PanelView Plus Devices<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Remote code execution and denial-of-service (DoS).<\/p>\n\n\n\n<p><strong>The problem:<\/strong> <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/07\/02\/vulnerabilities-in-panelview-plus-devices-could-lead-to-remote-code-execution\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft discovers two vulnerabilities<\/a> in Rockwell Automation PanelView Plus. These vulnerabilities, known as CVE-2023-2071 and CVE-2023-29464, enable remote, unauthenticated attackers to execute arbitrary code and create DoS circumstances.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-2071\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-2071<\/a> exploits insufficient input validation to upload and load malicious DLLs, resulting in remote code execution. <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-29464\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-29464<\/a> uses similar input validation flaws to access memory data and send larger packets, resulting in a DoS. These flaws affect FactoryTalk View Machine Edition (versions 13.0, 12.0, and previous) and FactoryTalk Linx (versions 6.30, 6.20, and previous).<\/p>\n\n\n\n<p><strong>The fix:<\/strong> <a href=\"https:\/\/www.rockwellautomation.com\/en-us\/trust-center\/security-advisories.html\" target=\"_blank\" rel=\"noreferrer noopener\">Rockwell Automation issued recommendations<\/a> addressing these issues, urging users to update to the most recent versions of FactoryTalk View Machine Edition and FactoryTalk Linx. To minimize risks, patch your systems as soon as possible. Additional safeguards include network segmentation, firewalls to restrict external access, and network traffic monitoring for anomalous activities.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Multiple Vulnerabilities Found in Traeger Grills with D2 Wi-Fi Controller<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Insufficient authorization control and remote command execution.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> <a href=\"https:\/\/bishopfox.com\/resources\/traeger-vulnerability-explainer\" target=\"_blank\" rel=\"noreferrer noopener\">Nick Cerne of Bishop Fox<\/a> discovered several security issues in Traeger grills that used the D2 Wi-Fi Controller. These flaws enable remote attackers to execute actions, including collecting grill information and shutting the device off.<\/p>\n\n\n\n<p>The critical weakness (CVSS score: 7.1) concerns insufficient authorization constraints in the API for grill registration, allowing attackers to remotely change the grill&#8217;s temperature and operational status. Exploiting these vulnerabilities can lead to food spoilage, as proved by researchers who raised the grill temperature from 165\u00b0F to 500\u00b0F.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Traeger has enabled automated firmware updates for grills using the D2 Wi-Fi Controller. This ensures that all affected grills connected to the Internet receive the necessary updates without requiring user intervention. For grill owners, make sure to <a href=\"https:\/\/www.traeger.com\/status\">update your devices<\/a>. To avoid unauthorized access, secure your networks, monitor device activity, and turn off grills when they&#8217;re not in use.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">July 5, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Ghostscript Vulnerability Threatens Web Applications &amp; Services<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Format string bug and remote code execution.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Ghostscript&#8217;s format string issue (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-29510\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-29510<\/a>) allows remote attackers to execute arbitrary code by bypassing the -dSAFER sandbox. Ghostscript is widely used for document processing. Its vulnerability affects web applications, allowing file manipulation and RCE without user input.<\/p>\n\n\n\n<p><strong>The fix:<\/strong>&nbsp; Ghostscript already published <a href=\"https:\/\/www.ghostscript.com\/releases\/index.html\" target=\"_blank\" rel=\"noreferrer noopener\">version 10.03.1<\/a> in April 2024 to address CVE-2024-29510. To ensure system security, update to the newest version. Monitor automated operations utilizing Ghostscript for vulnerabilities and install security fixes as soon as possible to avoid exploitation.<\/p>\n\n\n\n<p><strong>Read next:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-1-2024\/\"><strong>Vulnerability Recap 7\/1\/24: Apple, GitLab, AI Platforms at Risk<\/strong><\/a><strong>&nbsp;<\/strong><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-scanning-tools\/\"><strong>Best Vulnerability Scanning Tools &amp; Software<\/strong><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/compliance\/patch-management-policy\/\"><strong>Patch Management Policy: Definition, Steps &amp; Benefits<\/strong><\/a><strong>&nbsp;<\/strong><\/li>\n<\/ul>\n\n\n<!-- ICP Plugin: Start --><div class=\"icp-list icp-list-main icp-list-body-top3 row\">\n    \n        <!--\n            ICP Plugin - body top3\n            ----------\n            Category: \n            Country: HK\n        -->\n    <\/div>\n<!-- ICP Plugin: End -->\n\n\n<div id=\"ta-campaign-widget-66d6df08c1b59-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6df08c1b59\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6df08c1b59\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6df08c1b59\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6df08c1b59\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6df08c1b59\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6df08c1b59\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Discover critical vulnerability news that occurred during the Fourth of July week. Explore the patches done by the key platforms affected.<\/p>\n","protected":false},"author":331,"featured_media":36365,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[],"b2b_audience":[33],"b2b_industry":[63],"b2b_product":[379],"class_list":["post-36364","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","b2b_audience-awareness-and-consideration","b2b_industry-technology","b2b_product-threats-and-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Vulnerability Recap 7\/8\/24: Intel, Cisco &amp; More Face Risks<\/title>\n<meta name=\"description\" content=\"Discover critical vulnerability news that occurred during the Fourth of July week. Explore the patches done by the key platforms affected.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-8-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerability Recap 7\/8\/24: Intel, Cisco &amp; More Face Risks\" \/>\n<meta property=\"og:description\" content=\"Discover critical vulnerability news that occurred during the Fourth of July week. Explore the patches done by the key platforms affected.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-8-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-08T18:21:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-08T18:21:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240708-vulnerability-recap-july-8-2024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Maine Basan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Maine Basan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-8-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-8-2024\/\"},\"author\":{\"name\":\"Maine Basan\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/48c58015ca79ab3ed057abd7a52b2206\"},\"headline\":\"Vulnerability Recap 7\/8\/24 \u2013 Intel, Cisco &amp; More Face Risks\",\"datePublished\":\"2024-07-08T18:21:48+00:00\",\"dateModified\":\"2024-07-08T18:21:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-8-2024\/\"},\"wordCount\":1386,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-8-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240708-vulnerability-recap-july-8-2024.png\",\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-8-2024\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-8-2024\/\",\"name\":\"Vulnerability Recap 7\/8\/24: Intel, Cisco & More Face Risks\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-8-2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-8-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240708-vulnerability-recap-july-8-2024.png\",\"datePublished\":\"2024-07-08T18:21:48+00:00\",\"dateModified\":\"2024-07-08T18:21:50+00:00\",\"description\":\"Discover critical vulnerability news that occurred during the Fourth of July week. Explore the patches done by the key platforms affected.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-8-2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-8-2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-8-2024\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240708-vulnerability-recap-july-8-2024.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240708-vulnerability-recap-july-8-2024.png\",\"width\":1400,\"height\":900,\"caption\":\"Image: CoffeeeCraze\/Adobe Stock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-8-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerability Recap 7\/8\/24 \u2013 Intel, Cisco &amp; More Face Risks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/48c58015ca79ab3ed057abd7a52b2206\",\"name\":\"Maine Basan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/HH50049850_Maine_Basan-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/HH50049850_Maine_Basan-150x150.jpg\",\"caption\":\"Maine Basan\"},\"description\":\"Maine is an eSecurity Planet writer with a foundation in eLearning content development, research, and academic CRM implementation. She studied BA Communication Arts at the University of the Philippines. She now leverages her communication experiences as a writer and product analyst, engaging the B2B audience with insights into cybersecurity trends and solutions. Off the clock, Maine\u2019s probably immersed in her spreadsheets, organizing her life or planning her next K-pop concert and beach getaways.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/mbasan\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerability Recap 7\/8\/24: Intel, Cisco & More Face Risks","description":"Discover critical vulnerability news that occurred during the Fourth of July week. Explore the patches done by the key platforms affected.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-8-2024\/","og_locale":"en_US","og_type":"article","og_title":"Vulnerability Recap 7\/8\/24: Intel, Cisco & More Face Risks","og_description":"Discover critical vulnerability news that occurred during the Fourth of July week. Explore the patches done by the key platforms affected.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-8-2024\/","og_site_name":"eSecurity Planet","article_published_time":"2024-07-08T18:21:48+00:00","article_modified_time":"2024-07-08T18:21:50+00:00","og_image":[{"width":1400,"height":900,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240708-vulnerability-recap-july-8-2024.png","type":"image\/png"}],"author":"Maine Basan","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Maine Basan","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-8-2024\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-8-2024\/"},"author":{"name":"Maine Basan","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/48c58015ca79ab3ed057abd7a52b2206"},"headline":"Vulnerability Recap 7\/8\/24 \u2013 Intel, Cisco &amp; More Face Risks","datePublished":"2024-07-08T18:21:48+00:00","dateModified":"2024-07-08T18:21:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-8-2024\/"},"wordCount":1386,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-8-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240708-vulnerability-recap-july-8-2024.png","articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-8-2024\/","url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-8-2024\/","name":"Vulnerability Recap 7\/8\/24: Intel, Cisco & More Face Risks","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-8-2024\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-8-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240708-vulnerability-recap-july-8-2024.png","datePublished":"2024-07-08T18:21:48+00:00","dateModified":"2024-07-08T18:21:50+00:00","description":"Discover critical vulnerability news that occurred during the Fourth of July week. Explore the patches done by the key platforms affected.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-8-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-8-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-8-2024\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240708-vulnerability-recap-july-8-2024.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240708-vulnerability-recap-july-8-2024.png","width":1400,"height":900,"caption":"Image: CoffeeeCraze\/Adobe Stock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-8-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Vulnerability Recap 7\/8\/24 \u2013 Intel, Cisco &amp; More Face Risks"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/48c58015ca79ab3ed057abd7a52b2206","name":"Maine Basan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/HH50049850_Maine_Basan-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/HH50049850_Maine_Basan-150x150.jpg","caption":"Maine Basan"},"description":"Maine is an eSecurity Planet writer with a foundation in eLearning content development, research, and academic CRM implementation. She studied BA Communication Arts at the University of the Philippines. She now leverages her communication experiences as a writer and product analyst, engaging the B2B audience with insights into cybersecurity trends and solutions. Off the clock, Maine\u2019s probably immersed in her spreadsheets, organizing her life or planning her next K-pop concert and beach getaways.","url":"https:\/\/www.esecurityplanet.com\/author\/mbasan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/36364"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/331"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=36364"}],"version-history":[{"count":9,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/36364\/revisions"}],"predecessor-version":[{"id":36376,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/36364\/revisions\/36376"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/36365"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=36364"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=36364"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=36364"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=36364"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=36364"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=36364"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}