{"id":36530,"date":"2024-07-22T19:27:49","date_gmt":"2024-07-22T19:27:49","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=36530"},"modified":"2024-07-25T17:01:57","modified_gmt":"2024-07-25T17:01:57","slug":"vulnerability-recap-july-22-2024","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-22-2024\/","title":{"rendered":"Vulnerability Recap 7\/22\/24 \u2013 CrowdStrike Issue Is One of Many"},"content":{"rendered":"\n<p>The failed CrowdStrike sensor update that affected Windows systems may have put those computers at risk, but this is just one potential vulnerability during an interesting week. SolarWinds recently patched 13 vulnerabilities, and Ivanti has fixed yet another flaw in its Endpoint Manager product. The CISA requires federal agencies to patch their instances of GeoServer by August 5, and Wiz recently reported on a major AI model training vulnerability.<\/p>\n\n\n\n<p>Regularly update your hardware and software to the most recent approved versions. Also, make sure your security team has a consistent schedule for monitoring industry news and vulnerabilities. This helps you stay on top of updates before threat actors have much time to exploit potential flaws in your infrastructure.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">July 1, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Early July Splunk Enterprise Vulnerability Should Be Patched Immediately<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Path traversal.&nbsp;<\/p>\n\n\n\n<p><strong>The problem:<\/strong> A vulnerability within Splunk&#8217;s Enterprise application allows an attacker to perform a path traversal on the \/modules\/messaging\/ endpoint in Windows installments of Splunk Enterprise. The vulnerability affects app versions below 9.2.2, 9.1.5, and 9.0.10. Splunk released the <a href=\"https:\/\/advisory.splunk.com\/advisories\/SVD-2024-0711\" target=\"_blank\" rel=\"noreferrer noopener\">notice for the vulnerability<\/a> at the beginning of July, but it&#8217;s now getting more attention.<\/p>\n\n\n\n<p>According to the security notice, &#8220;The vulnerability exists because the Python os.path.join function removes the drive letter from path tokens if the drive in the token matches the drive in the built path.&#8221;&nbsp;<\/p>\n\n\n\n<p>The vulnerability should not affect Splunk Enterprise on non-Windows operating systems, like Linux. A <a href=\"https:\/\/github.com\/bigb0x\/CVE-2024-36991\" target=\"_blank\" rel=\"noreferrer noopener\">proof of concept is available<\/a> on GitHub.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Splunk provides the following chart for fixed versions. Any version higher than 9.2.2, 9.1.5, and 9.0.10 also works.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240722-vulnerability-recap-july-22-2024-figure_a.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"332\" src=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240722-vulnerability-recap-july-22-2024-figure_a.jpg\" alt=\"Chart showing fix versions for Splunk Enterprise.\" class=\"wp-image-36533\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240722-vulnerability-recap-july-22-2024-figure_a.jpg 1000w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240722-vulnerability-recap-july-22-2024-figure_a-300x100.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240722-vulnerability-recap-july-22-2024-figure_a-768x255.jpg 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">July 15, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">CISA Requires Patches for GeoServer RCE Vulnerability<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Remote code execution.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> GeoServer, an open-source server for sharing and processing geospatial data, has a critical vulnerability in its GeoTools library API. When exploited, the flaw allows unauthenticated users to execute code remotely. According to the <a href=\"https:\/\/github.com\/geoserver\/geoserver\/security\/advisories\/GHSA-6jj6-gm7p-fcvv\" target=\"_blank\" rel=\"noreferrer noopener\">vulnerability notice<\/a>:<\/p>\n\n\n\n<p>&#8220;The GeoTools library API that GeoServer calls evaluates property\/attribute names for feature types in a way that unsafely passes them to the commons-jxpath library, which can execute arbitrary code when evaluating XPath expressions. This XPath evaluation is intended to be used only by complex feature types\u2026 but is incorrectly being applied to simple feature types as well, which makes this vulnerability apply to ALL GeoServer instances.&#8221;<\/p>\n\n\n\n<p>The Cybersecurity and Infrastructure Security Agency (CISA) has warned users of this vulnerability and now requires federal agencies to apply patches by August 5. It&#8217;s currently tracked as <a href=\"https:\/\/github.com\/geoserver\/geoserver\/security\/advisories\/GHSA-6jj6-gm7p-fcvv\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-36401<\/a>.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Update your GeoServer instance with version 2.23.6, 2.24.4, or 2.25.2, which contain a patch for the issue.<\/p>\n\n\n\n<p><strong>If your business needs dedicated and consistent vulnerability scanning, read our <a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-scanning-tools\/\">guide to the best scanners<\/a> next.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">July 16, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Ivanti Fixes Another EPM Issue<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> SQL injection.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Ivanti recently released a <a href=\"https:\/\/forums.ivanti.com\/s\/article\/Security-Advisory-EPM-July-2024-for-EPM-2024?language=en_US\" target=\"_blank\" rel=\"noreferrer noopener\">security advisory<\/a> for an SQL injection vulnerability within Ivanti Endpoint Manager 2024 flat. If exploited, the vulnerability allows a threat actor on the same network as Endpoint Manager to execute code arbitrarily without being properly authenticated.&nbsp;<\/p>\n\n\n\n<p>The vulnerability is tracked as CVE-2024-37381 and has a severity rating of 8.4.&nbsp;<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Ivanti provides instructions for downloading a hot patch for EPM 2024 flat within the <a href=\"https:\/\/forums.ivanti.com\/s\/article\/Security-Advisory-EPM-July-2024-for-EPM-2024?language=en_US\" target=\"_blank\" rel=\"noreferrer noopener\">security advisory<\/a>:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Download the linked Security Hot Patch zip files.<\/li>\n\n\n\n<li>Make sure the two DLL files are unblocked.<\/li>\n\n\n\n<li>Replace the DLLs within the Core Server with the ones from the Hot Patch in the locations specified.<\/li>\n\n\n\n<li>If you use the PowerShell script, insert the hotpatch folder into directory C:\\Program Files\\LANDesk\\ManagementSuite\\. Use PowerShell as an admin and run JulyEPM2024HotPatch.ps1.<\/li>\n\n\n\n<li>Either reboot the Core Server or or close the EPM Console and run IISRESET so the new DLLs load properly.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">July 17, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Full Effect of Critical Cisco Vulnerability Unknown<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Form of authentication bypass.&nbsp;<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Cisco Smart Software Manager On-Prem (SSM On-Prem) has a critical vulnerability in its authentication mechanism. It&#8217;s a result of a faulty password change implementation procedure. If a device is affected by the vulnerability, an attacker can send specifically designed HTTP requests to that device.<\/p>\n\n\n\n<p>When exploited successfully, the vulnerability allows the attacker to use compromised privileges to access the target user interface or API. They can then change other users&#8217; passwords, including potential administrative credentials. Experts aren&#8217;t sure what could happen within the Cisco network once an attacker manages this, and Cisco hasn&#8217;t yet clarified this in a security bulletin.<\/p>\n\n\n\n<p>The vulnerability is tracked as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-20419\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-20419<\/a> and has a CVSS score of 10, the highest a vulnerability can receive.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> This vulnerability affects Cisco SSM versions 8-202206 and earlier. The first fixed release of the software is 8-202212; upgrade to this version of Cisco SSM as soon as possible. Cisco&#8217;s ongoing fixed releases within the <a href=\"https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-cssm-auth-sLw3uhUy\" target=\"_blank\" rel=\"noreferrer noopener\">security bulletin<\/a> for this vulnerability.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">SolarWinds Fixes 13 Issues in Access Rights Manager<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Multiple, including remote code execution.&nbsp;<\/p>\n\n\n\n<p><strong>The problem:<\/strong> <a href=\"https:\/\/www.solarwinds.com\/trust-center\/security-advisories\" target=\"_blank\" rel=\"noreferrer noopener\">SolarWinds has addressed 13 vulnerabilities<\/a> within its Access Rights Manager software, a user provisioning and access management tool for Active Directory and Azure AD. These include remote command injection, remote code execution, and traversal and information disclosure vulnerabilities. Of the 13, eight are critical and have a CVSS score of 9.6. Each has its own advisory notice from SolarWinds.\u00a0<\/p>\n\n\n\n<p>Combined, the vulnerabilities allow attackers to use SYSTEM privileges, leak data, and read and delete files arbitrarily without authentication.<\/p>\n\n\n\n<p>Trend Micro&#8217;s Zero Day Initiative partners with SolarWinds and helped it identify the vulnerabilities.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Download the fixed version of the software, Access Rights Manager 2024.3, to prevent exploitation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Wiz Report Reveals Weaknesses in SAP AI Core<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Arbitrary code execution using AI training models.&nbsp;<\/p>\n\n\n\n<p><strong>The problem:<\/strong> A <a href=\"https:\/\/www.wiz.io\/blog\/sapwned-sap-ai-vulnerabilities-ai-security\" target=\"_blank\" rel=\"noreferrer noopener\">report by security vendor Wiz<\/a> discusses isolation issues within AI platforms, particularly SAP AI Core. AI Core facilitates integrations with other cloud services like HANA to access customer data using cloud access keys, according to Wiz. The researchers&#8217; work revealed that they could move laterally and access private customer files and cloud account credentials using SAP&#8217;s legitimate AI training procedures.<\/p>\n\n\n\n<p>The researchers were also able to successfully use cluster administrator privileges on the SAP AI Core Kubernetes cluster.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Wiz reported the vulnerabilities to SAP, which fixed them. Wiz also states that no customer data was compromised. Because training AI models naturally involves running arbitrary code, vulnerabilities are often baked into the AI training process. A long-term fix would mean setting more careful guardrails on this process and doing better sandboxing and isolation, according to Wiz.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">July 19, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Failed CrowdStrike Update Creates Opportunity for Hackers<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> General possibility of exploit when Windows systems are down.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> While this isn&#8217;t a specific type of vulnerability or software issue, the update failure of CrowdStrike&#8217;s Falcon Sensor last Friday did create the possibility for Windows systems to be attacked while weak. The attempted update to Falcon Sensor created an endless update cycle and the &#8220;blue screen of death,&#8221; which caused Windows systems globally to crash.<\/p>\n\n\n\n<p>CrowdStrike stated that the issue was not a cyberattack. Its CEO, George Kurtz, initially posted on LinkedIn about the nature of the event \u2014 saying that it wasn&#8217;t a security incident \u2014 and received significant pushback for this statement. While the issue was a software error rather than an attack, it did create a security incident that could lower defenses on Windows systems.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> CrowdStrike isolated the incident and has worked to fix it. <a href=\"https:\/\/www.youtube.com\/watch?v=Bn5eRUaMZXk\" target=\"_blank\" rel=\"noreferrer noopener\">It published a video<\/a> for remote users to self-remediate their Windows laptop if the device is still having issues with the blue screen of death.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">July 22, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Open-Source Platform BOINC Spoofed by Threat Actors<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Malware payloads.&nbsp;<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Managed security provider Huntress <a href=\"https:\/\/www.huntress.com\/blog\/fake-browser-updates-lead-to-boinc-volunteer-computing-software\" target=\"_blank\" rel=\"noreferrer noopener\">recently published a report<\/a> on SocGholish malware behavior. SocGholish is now delivering AsyncRAT and Berkeley Open Infrastructure Network Computing Client (BOINC) payloads to victims.<\/p>\n\n\n\n<p>BOINC is an open-source platform for volunteer computing. &#8220;The intention is to use &#8216;donated&#8217; computer resources to contribute to the work of various legitimate science projects,&#8221; the Huntress researchers said. Malicious installations of BOINC look like they might route to a legitimate BOINC server that&#8217;s actually a different address. Huntress reports that it hasn&#8217;t yet noticed the infected hosts executing malicious activity.<\/p>\n\n\n\n<p>This vulnerability does not reside within BOINC; rather, it&#8217;s a type of malware that installs malicious versions of BOINC. It is less a standard software vulnerability than a method by which threat actors deliver malicious payloads using open-source software.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Huntress provides the following indicators of compromise and file indicators:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240722-vulnerability-recap-july-22-2024-figure_b.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"430\" src=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240722-vulnerability-recap-july-22-2024-figure_b.jpg\" alt=\"Chart showing indicators of compromise and file indicators.\" class=\"wp-image-36532\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240722-vulnerability-recap-july-22-2024-figure_b.jpg 1000w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240722-vulnerability-recap-july-22-2024-figure_b-300x129.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240722-vulnerability-recap-july-22-2024-figure_b-768x330.jpg 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<div style=\"height:1em\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240722-vulnerability-recap-july-22-2024-figure_c.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"526\" src=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240722-vulnerability-recap-july-22-2024-figure_c.jpg\" alt=\"Chart showing indicators of compromise and file indicators.\" class=\"wp-image-36531\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240722-vulnerability-recap-july-22-2024-figure_c.jpg 1000w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240722-vulnerability-recap-july-22-2024-figure_c-300x158.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240722-vulnerability-recap-july-22-2024-figure_c-768x404.jpg 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<div style=\"height:1em\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>While it&#8217;s rare for businesses to use BOINC, watch for any attempted installations of it, which could indicate an attack, according to Huntress.<\/p>\n\n\n\n<p><strong>Read next:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-15-2024\/\"><strong>Vulnerability Recap 7\/15\/24 \u2014 Industry Patches vs Flaw Exploits<\/strong><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\"><strong>Best Vulnerability Management Software &amp; Systems in 2024<\/strong><\/a><\/li>\n<\/ul>\n\n\n<!-- ICP Plugin: Start --><div class=\"icp-list icp-list-main icp-list-body-top3 row\">\n    \n        <!--\n            ICP Plugin - body top3\n            ----------\n            Category: \n            Country: HK\n        -->\n    <\/div>\n<!-- ICP Plugin: End -->\n\n\n<div id=\"ta-campaign-widget-66d6deec93233-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6deec93233\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6deec93233\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6deec93233\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6deec93233\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6deec93233\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6deec93233\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The failed CrowdStrike sensor update that affected Windows systems may have put those computers at risk, but this is just one potential vulnerability during an interesting week. SolarWinds recently patched 13 vulnerabilities, and Ivanti has fixed yet another flaw in its Endpoint Manager product. The CISA requires federal agencies to patch their instances of GeoServer [&hellip;]<\/p>\n","protected":false},"author":238,"featured_media":36529,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[],"b2b_audience":[33],"b2b_industry":[63],"b2b_product":[379],"class_list":["post-36530","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","b2b_audience-awareness-and-consideration","b2b_industry-technology","b2b_product-threats-and-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Vulnerability Recap 7\/22\/24: CrowdStrike, Cisco, SolarWinds<\/title>\n<meta name=\"description\" content=\"Among this week&#039;s vulnerabilities is the CrowdStrike sensor update that sent Windows computers haywire, as well as SolarWinds and Cisco issues.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-22-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerability Recap 7\/22\/24: CrowdStrike, Cisco, SolarWinds\" \/>\n<meta property=\"og:description\" content=\"Among this week&#039;s vulnerabilities is the CrowdStrike sensor update that sent Windows computers haywire, as well as SolarWinds and Cisco issues.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-22-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-22T19:27:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-25T17:01:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240722-vulnerability-recap-july-22-2024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jenna Phipps\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jenna Phipps\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-22-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-22-2024\/\"},\"author\":{\"name\":\"Jenna Phipps\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb\"},\"headline\":\"Vulnerability Recap 7\/22\/24 \u2013 CrowdStrike Issue Is One of Many\",\"datePublished\":\"2024-07-22T19:27:49+00:00\",\"dateModified\":\"2024-07-25T17:01:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-22-2024\/\"},\"wordCount\":1479,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-22-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240722-vulnerability-recap-july-22-2024.png\",\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-22-2024\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-22-2024\/\",\"name\":\"Vulnerability Recap 7\/22\/24: CrowdStrike, Cisco, SolarWinds\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-22-2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-22-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240722-vulnerability-recap-july-22-2024.png\",\"datePublished\":\"2024-07-22T19:27:49+00:00\",\"dateModified\":\"2024-07-25T17:01:57+00:00\",\"description\":\"Among this week's vulnerabilities is the CrowdStrike sensor update that sent Windows computers haywire, as well as SolarWinds and Cisco issues.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-22-2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-22-2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-22-2024\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240722-vulnerability-recap-july-22-2024.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240722-vulnerability-recap-july-22-2024.png\",\"width\":1400,\"height\":900,\"caption\":\"Open red virtual lock among blue closed locks.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-22-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerability Recap 7\/22\/24 \u2013 CrowdStrike Issue Is One of Many\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb\",\"name\":\"Jenna Phipps\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg\",\"caption\":\"Jenna Phipps\"},\"description\":\"Jenna Phipps is a staff writer for eSecurity Planet and has years of experience in B2B technical content writing. She covers security practices, vulnerabilities, data protection, and the top products in the cybersecurity industry. She also writes about the importance of cybersecurity technologies and training in business environments, as well as the role that security plays in data storage and management. When Jenna's not writing about security, you can find her reading, shopping, eating smoothie bowls, or spending time with friends.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jphipps\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerability Recap 7\/22\/24: CrowdStrike, Cisco, SolarWinds","description":"Among this week's vulnerabilities is the CrowdStrike sensor update that sent Windows computers haywire, as well as SolarWinds and Cisco issues.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-22-2024\/","og_locale":"en_US","og_type":"article","og_title":"Vulnerability Recap 7\/22\/24: CrowdStrike, Cisco, SolarWinds","og_description":"Among this week's vulnerabilities is the CrowdStrike sensor update that sent Windows computers haywire, as well as SolarWinds and Cisco issues.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-22-2024\/","og_site_name":"eSecurity Planet","article_published_time":"2024-07-22T19:27:49+00:00","article_modified_time":"2024-07-25T17:01:57+00:00","og_image":[{"width":1400,"height":900,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240722-vulnerability-recap-july-22-2024.png","type":"image\/png"}],"author":"Jenna Phipps","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jenna Phipps","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-22-2024\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-22-2024\/"},"author":{"name":"Jenna Phipps","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb"},"headline":"Vulnerability Recap 7\/22\/24 \u2013 CrowdStrike Issue Is One of Many","datePublished":"2024-07-22T19:27:49+00:00","dateModified":"2024-07-25T17:01:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-22-2024\/"},"wordCount":1479,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-22-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240722-vulnerability-recap-july-22-2024.png","articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-22-2024\/","url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-22-2024\/","name":"Vulnerability Recap 7\/22\/24: CrowdStrike, Cisco, SolarWinds","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-22-2024\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-22-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240722-vulnerability-recap-july-22-2024.png","datePublished":"2024-07-22T19:27:49+00:00","dateModified":"2024-07-25T17:01:57+00:00","description":"Among this week's vulnerabilities is the CrowdStrike sensor update that sent Windows computers haywire, as well as SolarWinds and Cisco issues.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-22-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-22-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-22-2024\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240722-vulnerability-recap-july-22-2024.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240722-vulnerability-recap-july-22-2024.png","width":1400,"height":900,"caption":"Open red virtual lock among blue closed locks."},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-22-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Vulnerability Recap 7\/22\/24 \u2013 CrowdStrike Issue Is One of Many"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb","name":"Jenna Phipps","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg","caption":"Jenna Phipps"},"description":"Jenna Phipps is a staff writer for eSecurity Planet and has years of experience in B2B technical content writing. She covers security practices, vulnerabilities, data protection, and the top products in the cybersecurity industry. She also writes about the importance of cybersecurity technologies and training in business environments, as well as the role that security plays in data storage and management. When Jenna's not writing about security, you can find her reading, shopping, eating smoothie bowls, or spending time with friends.","url":"https:\/\/www.esecurityplanet.com\/author\/jphipps\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/36530"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/238"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=36530"}],"version-history":[{"count":7,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/36530\/revisions"}],"predecessor-version":[{"id":36618,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/36530\/revisions\/36618"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/36529"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=36530"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=36530"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=36530"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=36530"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=36530"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=36530"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}