{"id":36628,"date":"2024-07-29T17:22:25","date_gmt":"2024-07-29T17:22:25","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=36628"},"modified":"2024-07-29T17:22:26","modified_gmt":"2024-07-29T17:22:26","slug":"vulnerability-recap-july-29-2024","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-29-2024\/","title":{"rendered":"Vulnerability Recap 7\/29\/24 \u2013 Multiple Old Security Flaws Reappear"},"content":{"rendered":"\n<p>In the aftermath of CrowdStrike\u2019s unique update failure that sparked a different type of security incident, standard vulnerability disclosures and patches proceed as usual. This week, we also saw some older issues return to light, including an Internet Explorer vulnerability first discovered in 2012. A Microsoft SmartScreen vulnerability from earlier this year resurfaced, and a Docker flaw from 2018 is still causing issues in a newer version of the software.<\/p>\n\n\n\n<p>If you\u2019re part of an IT or security team responsible for handling vulnerabilities, make sure your team has a way to be immediately updated when new issues arise. Having a clearly defined process for mitigating vulnerabilities decreases the opportunity threat actors have to exploit them.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">July 23, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">CISA Adds Two Vulnerabilities to Catalog<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Use-after-free and information disclosure.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> The Cybersecurity and Infrastructure Security Agency (CISA) just added two vulnerabilities to the <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" target=\"_blank\" rel=\"noreferrer noopener\">Known Exploited Vulnerabilities (KEV) catalog<\/a>. The first is a use-after-free vulnerability from 2012, tracked as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2012-4792\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2012-4792<\/a>, that affects Microsoft\u2019s Internet Explorer, a browser that\u2019s now rarely used.<\/p>\n\n\n\n<p>According to the catalog listing, the vulnerability \u201callows a remote attacker to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly allocated or (2) is deleted, as demonstrated by a CDwnBindInfo object.\u201d<\/p>\n\n\n\n<p>The second vulnerability is an information disclosure vulnerability within Twilio Authy\u2019s API. It\u2019s tracked as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-39891\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-39891<\/a> and allows an unauthenticated endpoint to accept requests with a phone number and respond with data about the phone number\u2019s registration status with Authy.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> The CISA recommends disabling Internet Explorer since it\u2019s an end-of-life product.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.twilio.com\/en-us\/changelog\/Security_Alert_Authy_App_Android_iOS\" target=\"_blank\" rel=\"noreferrer noopener\">Twilio recommends<\/a> that Authy users update their versions of the Android and iOS Authy apps to the most recent version, which has fixed the bug.<\/p>\n\n\n\n<p><strong>If your business needs a more consistent method of identifying vulnerabilities, consider a scanning product for your full IT infrastructure. Check out our <a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-scanning-tools\/\">list of the best vulnerability scanners<\/a> to see which one would be a good fit for your team.<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Fortinet Identifies Windows SmartScreen Security Bypass Issue<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Security bypass.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> A Fortinet-discovered Windows vulnerability could allow a remote threat actor to bypass Microsoft Windows SmartScreen security warnings and <a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/exploiting-cve-2024-21412-stealer-campaign-unleashed\" target=\"_blank\" rel=\"noreferrer noopener\">deliver maliciously crafted files<\/a>. Threat actors like Lumma Stealer have actively exploited this vulnerability over the past year, according to Fortinet. Researchers have observed a campaign that uses the vulnerability to download malicious executables.<\/p>\n\n\n\n<p>The vulnerability is tracked as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-21412\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-21412<\/a> and has an 8.1 CVSS score.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Mitigation strategies are more broad for this vulnerability \u2014 carefully scanning and verifying any sources before downloading files is at the top of the list. While I briefly mentioned this CVE in a <a href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-february-19-2024\/\">February vulnerability recap<\/a>, as part of a Microsoft Patch Tuesday effort, it looks like it\u2019s still being exploited despite the patch, given the new Fortinet research.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Docker Vulnerability First Originated in 2018<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Authorization bypass.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Some versions of Docker Engine have a critical authorization vulnerability. Docker Engine has a standard all-or-nothing authorization method by default, according to the <a href=\"https:\/\/www.docker.com\/blog\/docker-security-advisory-docker-engine-authz-plugin\/\" target=\"_blank\" rel=\"noreferrer noopener\">vendor\u2019s security notice<\/a>, but plugins like AuthZ are available to improve authorization security. However, attackers can bypass the plugin.<\/p>\n\n\n\n<p>According to Docker, \u201cAn attacker could exploit a bypass using an API request with Content-Length set to 0, causing the Docker daemon to forward the request without the body to the AuthZ plugin, which might approve the request incorrectly if not set to deny by default.\u201d<\/p>\n\n\n\n<p>This vulnerability was actually discovered in 2018 and fixed in 2019. However, the fix was excluded from Docker v19.03, a flaw that researchers recently discovered. Docker released patches for the vulnerability on July 23. It\u2019s tracked as <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-41110\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-41110<\/a> and has a CVSS score of 10.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Docker provided the following table to show affected versions and the versions you should upgrade to if you currently have one that\u2019s vulnerable.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240729-vulnerability-recap-july-29-2024-figure_a.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"153\" src=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240729-vulnerability-recap-july-29-2024-figure_a.jpg\" alt=\"Table showing the affected and patched versions from Docker.\" class=\"wp-image-36630\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240729-vulnerability-recap-july-29-2024-figure_a.jpg 1000w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240729-vulnerability-recap-july-29-2024-figure_a-300x46.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240729-vulnerability-recap-july-29-2024-figure_a-768x118.jpg 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">BIND Database Vulnerability Could Lead to DoS Attacks<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Multiple, including assertion failure and CPU overload.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Documented by the CISA, the Internet Systems Consortium (ISC) has released security bulletins for four different vulnerabilities that affect ISC\u2019s Berkeley Internet Name Domain (BIND) 9. If exploited, the flaws could lead to a denial-of-service type of attack. All vulnerabilities have a CVSS score of 7.5.<\/p>\n\n\n\n<p>The vulnerabilities are as follows:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-4076\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>CVE-2024-4076<\/strong><\/a><strong>:<\/strong> Client queries that trigger serving stale data and require lookups in local authoritative zone data could lead to assertion failure.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-1975\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>CVE-2024-1975<\/strong><\/a><strong>:<\/strong> A stream of SIG(0) signed requests could overrun the computer system\u2019s available CPU resources.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-1737\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>CVE-2024-1737<\/strong><\/a><strong>:<\/strong> Resolver caches and authoritative zone databases with large numbers of RRs could slow the BIND database\u2019s performance significantly.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-0760\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>CVE-2024-0760<\/strong><\/a><strong>:<\/strong> Excessive DNS requests via TCP to the BIND server could overwhelm it and make it unstable.<\/li>\n<\/ul>\n\n\n\n<p><strong>The fix:<\/strong> Look at each vulnerability\u2019s notice to determine if your version of BIND is vulnerable and upgrade it to the recommended version if needed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">July 24, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Tenable Uncovers Google Cloud Vulnerability<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Privilege escalation.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Researchers at Tenable discovered a vulnerability within the Cloud Functions and Cloud Build services in Google Cloud Platform. In these serverless compute and continuous integration and deployment services, a user who creates a new Cloud Function also triggers a backend process by default, <a href=\"https:\/\/www.tenable.com\/blog\/confusedfunction-a-privilege-escalation-vulnerability-impacting-gcp-cloud-functions\" target=\"_blank\" rel=\"noreferrer noopener\">Tenable said<\/a>.<\/p>\n\n\n\n<p>\u201cThis process, among other things, attaches a <a href=\"https:\/\/cloud.google.com\/build\/docs\/cloud-build-service-account\" target=\"_blank\" rel=\"noreferrer noopener\">default Cloud Build service account<\/a> to the Cloud Build instance that is created as part of the function\u2019s deployment,\u201d the security notice explained. \u201cThis process happens in the background and isn\u2019t something that ordinary users would be aware of.\u201d<\/p>\n\n\n\n<p>The service account allows the user to have permissions that they shouldn\u2019t have by default. A threat actor could use this access to escalate their privileges to the default account, and in some cases, this could affect other cloud services like Cloud Storage and Container Registry.<\/p>\n\n\n\n<p>After Tenable notified Google Cloud Platform, GCP performed some level of remediation for Cloud Build accounts that were created after mid-June 2024. However, Cloud Build service accounts created prior to the fix have the same privileges as before, so the vulnerability still exists in older instances.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Tenable recommends replacing each cloud function\u2019s Cloud Build service account with a least privilege service account.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">July 26, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Telerik Support Servers Open to Remote Code Execution<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Deserialization flaw.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Progress Software has released a notice warning Telerik Support Server users of a deserialization vulnerability within certain versions of the software. When exploited, the vulnerability allows a threat actor to execute code remotely. Versions prior to 2024 Q2 (10.1.24.709) are affected.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Upgrade your instance of Telerik Support Server to <a href=\"https:\/\/www.telerik.com\/support\/whats-new\/report-server\/release-history\/progress-telerik-report-server-2024-q2-10-1-24-709\" target=\"_blank\" rel=\"noreferrer noopener\">2024 Q2 (10.1.24.709)<\/a>; according to Progress, this is the only way to mitigate the issue.<\/p>\n\n\n\n<p><strong>Read next:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-22-2024\/\"><strong>Vulnerability Recap 7\/22\/24 \u2013 CrowdStrike Issue Is One of Many<\/strong><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\"><strong>Best Vulnerability Management Software &amp; Systems in 2024<\/strong><\/a><\/li>\n<\/ul>\n\n\n<!-- ICP Plugin: Start --><div class=\"icp-list icp-list-main icp-list-body-top3 row\">\n    \n        <!--\n            ICP Plugin - body top3\n            ----------\n            Category: \n            Country: HK\n        -->\n    <\/div>\n<!-- ICP Plugin: End -->\n\n\n<div id=\"ta-campaign-widget-66d6dedbacb1b-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6dedbacb1b\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6dedbacb1b\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6dedbacb1b\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6dedbacb1b\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6dedbacb1b\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6dedbacb1b\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>This week\u2019s vulnerabilities include multiple issues from previous years. Read more about the flaws your team needs to patch as soon as possible.<\/p>\n","protected":false},"author":238,"featured_media":36629,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[],"b2b_audience":[33],"b2b_industry":[63],"b2b_product":[379],"class_list":["post-36628","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","b2b_audience-awareness-and-consideration","b2b_industry-technology","b2b_product-threats-and-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Vulnerability Recap 7\/29\/24: Fortinet, Tenable Spot Flaws<\/title>\n<meta name=\"description\" content=\"This week\u2019s vulnerabilities include multiple issues from previous years. Read more about the flaws your team needs to patch as soon as possible.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-29-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerability Recap 7\/29\/24: Fortinet, Tenable Spot Flaws\" \/>\n<meta property=\"og:description\" content=\"This week\u2019s vulnerabilities include multiple issues from previous years. Read more about the flaws your team needs to patch as soon as possible.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-29-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-29T17:22:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-29T17:22:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240729-vulnerability-recap-july-29-2024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jenna Phipps\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jenna Phipps\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-29-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-29-2024\/\"},\"author\":{\"name\":\"Jenna Phipps\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb\"},\"headline\":\"Vulnerability Recap 7\/29\/24 \u2013 Multiple Old Security Flaws Reappear\",\"datePublished\":\"2024-07-29T17:22:25+00:00\",\"dateModified\":\"2024-07-29T17:22:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-29-2024\/\"},\"wordCount\":1156,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-29-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240729-vulnerability-recap-july-29-2024.png\",\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-29-2024\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-29-2024\/\",\"name\":\"Vulnerability Recap 7\/29\/24: Fortinet, Tenable Spot Flaws\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-29-2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-29-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240729-vulnerability-recap-july-29-2024.png\",\"datePublished\":\"2024-07-29T17:22:25+00:00\",\"dateModified\":\"2024-07-29T17:22:26+00:00\",\"description\":\"This week\u2019s vulnerabilities include multiple issues from previous years. Read more about the flaws your team needs to patch as soon as possible.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-29-2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-29-2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-29-2024\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240729-vulnerability-recap-july-29-2024.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240729-vulnerability-recap-july-29-2024.png\",\"width\":1400,\"height\":900,\"caption\":\"Image: RareStock\/Adobe Stock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-29-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerability Recap 7\/29\/24 \u2013 Multiple Old Security Flaws Reappear\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb\",\"name\":\"Jenna Phipps\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg\",\"caption\":\"Jenna Phipps\"},\"description\":\"Jenna Phipps is a staff writer for eSecurity Planet and has years of experience in B2B technical content writing. She covers security practices, vulnerabilities, data protection, and the top products in the cybersecurity industry. She also writes about the importance of cybersecurity technologies and training in business environments, as well as the role that security plays in data storage and management. When Jenna's not writing about security, you can find her reading, shopping, eating smoothie bowls, or spending time with friends.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jphipps\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerability Recap 7\/29\/24: Fortinet, Tenable Spot Flaws","description":"This week\u2019s vulnerabilities include multiple issues from previous years. Read more about the flaws your team needs to patch as soon as possible.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-29-2024\/","og_locale":"en_US","og_type":"article","og_title":"Vulnerability Recap 7\/29\/24: Fortinet, Tenable Spot Flaws","og_description":"This week\u2019s vulnerabilities include multiple issues from previous years. Read more about the flaws your team needs to patch as soon as possible.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-29-2024\/","og_site_name":"eSecurity Planet","article_published_time":"2024-07-29T17:22:25+00:00","article_modified_time":"2024-07-29T17:22:26+00:00","og_image":[{"width":1400,"height":900,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240729-vulnerability-recap-july-29-2024.png","type":"image\/png"}],"author":"Jenna Phipps","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jenna Phipps","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-29-2024\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-29-2024\/"},"author":{"name":"Jenna Phipps","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb"},"headline":"Vulnerability Recap 7\/29\/24 \u2013 Multiple Old Security Flaws Reappear","datePublished":"2024-07-29T17:22:25+00:00","dateModified":"2024-07-29T17:22:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-29-2024\/"},"wordCount":1156,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-29-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240729-vulnerability-recap-july-29-2024.png","articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-29-2024\/","url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-29-2024\/","name":"Vulnerability Recap 7\/29\/24: Fortinet, Tenable Spot Flaws","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-29-2024\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-29-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240729-vulnerability-recap-july-29-2024.png","datePublished":"2024-07-29T17:22:25+00:00","dateModified":"2024-07-29T17:22:26+00:00","description":"This week\u2019s vulnerabilities include multiple issues from previous years. Read more about the flaws your team needs to patch as soon as possible.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-29-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-29-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-29-2024\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240729-vulnerability-recap-july-29-2024.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/07\/esp_20240729-vulnerability-recap-july-29-2024.png","width":1400,"height":900,"caption":"Image: RareStock\/Adobe Stock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-29-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Vulnerability Recap 7\/29\/24 \u2013 Multiple Old Security Flaws Reappear"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb","name":"Jenna Phipps","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg","caption":"Jenna Phipps"},"description":"Jenna Phipps is a staff writer for eSecurity Planet and has years of experience in B2B technical content writing. She covers security practices, vulnerabilities, data protection, and the top products in the cybersecurity industry. She also writes about the importance of cybersecurity technologies and training in business environments, as well as the role that security plays in data storage and management. When Jenna's not writing about security, you can find her reading, shopping, eating smoothie bowls, or spending time with friends.","url":"https:\/\/www.esecurityplanet.com\/author\/jphipps\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/36628"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/238"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=36628"}],"version-history":[{"count":2,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/36628\/revisions"}],"predecessor-version":[{"id":36632,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/36628\/revisions\/36632"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/36629"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=36628"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=36628"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=36628"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=36628"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=36628"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=36628"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}