{"id":36698,"date":"2024-08-05T19:51:02","date_gmt":"2024-08-05T19:51:02","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=36698"},"modified":"2024-08-05T19:51:02","modified_gmt":"2024-08-05T19:51:02","slug":"vulnerability-recap-august-05-2024","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-05-2024\/","title":{"rendered":"Vulnerability Recap 8\/5\/24 \u2013 Already-Fixed Flaws Are Still Targeted"},"content":{"rendered":"\n<p>This week, some recently patched vulnerabilities got attention because they\u2019re still being exploited, including Apache OfBiz and VMware eSXI hypervisors. The lesson? Even if patches are available, many vulnerabilities are still alive and well within the applications and systems where they originated. That\u2019s a warning to every security team to patch flaws as soon as you learn about a fix because threat actors often exploit them long after being patched.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">July 31, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Mirai Botnet Targets Apache OfBiz&nbsp;<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Path traversal.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Apache OfBiz, a Java-based framework for developing enterprise resource planning (ERP) apps, had a path traversal vulnerability in May of this year. The update released for the flaw, which affected OFBiz versions before 18.12.13, fixed the issue. Recently, researcher Johannes Ulrich <a href=\"https:\/\/isc.sans.edu\/diary\/Increased%20Activity%20Against%20Apache%20OFBiz%20CVE-2024-32113\/31132\" target=\"_blank\" rel=\"noreferrer noopener\">has seen increased activity<\/a> against the vulnerability. In particular, the Mirai Botnet has been attacking it.<\/p>\n\n\n\n<p>The flaw is tracked as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-32113\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-32113<\/a>. Ulrich explained the attacker\u2019s process when exploiting the vulnerability:<\/p>\n\n\n\n<p>\u201cThe directory traversal is easily triggered by inserting a semicolon. All an attacker has to find is a URL they can access and append a semicolon followed by a restricted URL. The exploit URL we currently see is:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">\/webtools\/control\/forgotPassword;\/ProgramExport<\/pre>\n\n\n\n<div style=\"height:1em\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>&#8220;forgotPassword&#8221; does not require any authentication and is public. &#8220;ProgramExport&#8221; is interesting because it allows arbitrary code execution.\u201d<\/p>\n\n\n\n<p>The threat actor would have to use a POST request to exploit the flaw sufficiently, Ulrich said, but they don\u2019t automatically need a request body.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Upgrade your instance of Apache OfBiz to \u200b\u200bversion 18.12.13.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Android Weakness Exploited by Malware for Over Two Years<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Read permission given to malicious applications on Android devices.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Researchers at mobile security firm Zimperium <a href=\"https:\/\/www.zimperium.com\/blog\/unmasking-the-sms-stealer-targeting-several-countries-with-deceptive-apps\/\" target=\"_blank\" rel=\"noreferrer noopener\">discovered a malware campaign<\/a> against Android devices in 2022 and have continued to track the malware since then. The campaign is SMS stealing, targeted at one-time passwords sent through text, so threat actors can use them to access accounts that they aren\u2019t authorized to access.<\/p>\n\n\n\n<p>The zLabs team has identified more than 107,000 malware samples throughout its research of over two years. They found that typically, a victim is fooled into sideloading an application onto the phone through a falsified app store or a similar tactic, and the application requests read permission for SMS messages on the device, which Android allows. Once the malware is on the Android device, it hides in wait and monitors SMS messages, looking for OTPs in particular.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> There is currently no clear patch or redirect from the vendor. Zimperium mentions the importance of increasing enterprise mobile security measures. If you have an Android device, I recommend using an email address to receive one-time passwords instead of a phone number whenever possible.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Apple Fixes Multiple Vulnerabilities in Siri<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Access to sensitive information via voice prompts.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> The mobile security issues continue, this time with Apple. The vendor recently patched vulnerabilities in Apple Watch, iPadOS, and iOS that could allow a threat actor to take sensitive data from a locked mobile device. Four of the vulnerabilities were related to Siri, Apple\u2019s voice assistant. Malwarebytes released a <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/07\/apple-fixes-siri-vulnerabilities-that-could-have-allowed-sensitive-data-theft-from-locked-device-update-now\" target=\"_blank\" rel=\"noreferrer noopener\">security notice<\/a> emphasizing the dangers of Siri\u2019s ability to respond to voice commands from a locked device screen.<\/p>\n\n\n\n<p>\u201cApple has restricted these options to stop an attacker with physical access from being able to access contacts from the lock screen and access other sensitive user data,\u201d Malwarebytes said.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Update to iOS 17.6 or iPadOS 17.6 if you haven\u2019t already.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">August 1, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Rockwell Automation Flaw Has Been Fixed<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Security bypass.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Security research firm Claroty found a vulnerability in Rockwell Automation ControlLogix 1756 devices that allowed an attacker to bypass Rockwell\u2019s trusted slot feature. This capability is designed to enforce security on the devices and block communications on the local chassis if they happen on untrusted paths.<\/p>\n\n\n\n<p>Claroty <a href=\"https:\/\/claroty.com\/team82\/research\/bypassing-rockwell-automation-logix-controllers-local-chassis-security-protection\" target=\"_blank\" rel=\"noreferrer noopener\">wrote in its report<\/a>, \u201cThe vulnerability we found, before it was fixed, allowed an attacker to jump between local backplane slots within a 1756 chassis using CIP routing, traversing the security boundary meant to protect the CPU from untrusted cards.\u201d<\/p>\n\n\n\n<p>The threat actor needs network access to exploit the vulnerability in the devices. If successfully exploited, the threat actor could bypass the controls and send commands to the PLC CPU, Claroty said. The vulnerability affects ControlLogix, GuardLogix, and 1756 ControlLogix I\/O modules.<\/p>\n\n\n\n<p>Claroty disclosed the vulnerability to Rockwell, which then fixed the flaw.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Rockwell Automation <a href=\"https:\/\/www.rockwellautomation.com\/en-us\/trust-center\/security-advisories\/advisory.SD1682.html\" target=\"_blank\" rel=\"noreferrer noopener\">provided the following table<\/a> with the fixed firmware versions for each affected product.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240805-vulnerability-recap-august-05-2024-figure_a.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"747\" src=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240805-vulnerability-recap-august-05-2024-figure_a.jpg\" alt=\"Table showing fixed firmware versions for each affected product from Rockwell Automation.\" class=\"wp-image-36700\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240805-vulnerability-recap-august-05-2024-figure_a.jpg 800w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240805-vulnerability-recap-august-05-2024-figure_a-300x280.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240805-vulnerability-recap-august-05-2024-figure_a-768x717.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/a><\/figure>\n\n\n\n<div style=\"height:1em\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>If your team needs more consistent vulnerability information in a faster timeframe, check out our picks for the <a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-scanning-tools\/\">best vulnerability scanners<\/a>, which can help you more quickly identify what to patch and protect.<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">VMware eSXI Vulnerability Still Being Exploited<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Authentication bypass.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> A vulnerability affecting VMware eSXI hypervisors was patched recently but has seen multiple ransomware exploits. If a threat actor has sufficient Active Directory permissions, they could get full access to the eSXI host if it had previously been configured to use Active Directory to manage users. According to NIST\u2019s National Vulnerability Database, the threat actor would recreate the eSXI Admin group on AD after it was deleted.<\/p>\n\n\n\n<p>Microsoft researchers discovered the vulnerability and <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/07\/29\/ransomware-operators-exploit-esxi-hypervisor-vulnerability-for-mass-encryption\/\" target=\"_blank\" rel=\"noreferrer noopener\">announced it in a research report<\/a> last week. They disclosed the vulnerability to VMware through a <a href=\"https:\/\/www.microsoft.com\/en-us\/msrc\/cvd?rtc=2\" target=\"_blank\" rel=\"noreferrer noopener\">coordinated vulnerability disclosure<\/a> (CVD).\u00a0<\/p>\n\n\n\n<p>eSXI hypervisors sometimes host virtual machines, which may support critical workloads and servers. Microsoft said, \u201cIn a ransomware attack, having full administrative permission on an ESXi hypervisor can mean that the threat actor can encrypt the file system, which may affect the ability of the hosted servers to run and function. It also allows the threat actor to access hosted VMs and possibly to exfiltrate data or move laterally within the network.\u201d<\/p>\n\n\n\n<p>The vulnerability is tracked as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-37085\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-37085<\/a>. It has a CVSS score of 7.2 from NIST and a base score of 6.8 from VMware.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Make sure you\u2019ve patched any eSXI hypervisors, and also use two-factor authentication to make it harder for threat actors to gain unauthorized access.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">August 5, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Windows Security Features Have Multiple Flaws<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Security bypass.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Microsoft Windows\u2019 Smart Screen and Smart App Control features have a number of security issues, which <a href=\"https:\/\/www.elastic.co\/security-labs\/dismantling-smart-app-control\" target=\"_blank\" rel=\"noreferrer noopener\">Elastic Security Labs reported<\/a> earlier today. These flaws can lead to \u201cinitial access with no security warnings and minimal user interaction,\u201d according to the researchers. No security popups or warnings will alert users that the attacker has gotten access, either, making this challenging to detect.<\/p>\n\n\n\n<p>Smart Screen examines web pages for potential security issues and sends a warning notice to users if it finds one. Smart App Control predicts whether an application is safe to run on the computer system where it\u2019s installed and blocks it if not.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Elastic Security Labs recommends that teams carefully study downloads happening on their computer system and avoid relying only on OS security features.<\/p>\n\n\n\n<p><strong>Read next:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-july-29-2024\/\"><strong>Vulnerability Recap 7\/29\/24 \u2014 Multiple Old Security Flaws Reappear<\/strong><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\"><strong>Best Vulnerability Management Software &amp; Systems in 2024<\/strong><\/a><\/li>\n<\/ul>\n\n\n<!-- ICP Plugin: Start --><div class=\"icp-list icp-list-main icp-list-body-top3 row\">\n    \n        <!--\n            ICP Plugin - body top3\n            ----------\n            Category: \n            Country: HK\n        -->\n    <\/div>\n<!-- ICP Plugin: End -->\n\n\n<div id=\"ta-campaign-widget-66d6cd72943b8-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6cd72943b8\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6cd72943b8\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6cd72943b8\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6cd72943b8\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6cd72943b8\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6cd72943b8\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>This week, some recently patched vulnerabilities got attention because they\u2019re still being exploited, including Apache OfBiz and VMware eSXI hypervisors. The lesson? Even if patches are available, many vulnerabilities are still alive and well within the applications and systems where they originated. That\u2019s a warning to every security team to patch flaws as soon as [&hellip;]<\/p>\n","protected":false},"author":238,"featured_media":36699,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[],"b2b_audience":[33],"b2b_industry":[63],"b2b_product":[379],"class_list":["post-36698","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","b2b_audience-awareness-and-consideration","b2b_industry-technology","b2b_product-threats-and-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Vulnerability Recap 8\/5\/24: Windows, VMware, Android, Apple<\/title>\n<meta name=\"description\" content=\"This week, some recently patched vulnerabilities got attention because they\u2019re still being exploited, including Apache OfBiz and VMware eSXI hypervisors.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-05-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerability Recap 8\/5\/24: Windows, VMware, Android, Apple\" \/>\n<meta property=\"og:description\" content=\"This week, some recently patched vulnerabilities got attention because they\u2019re still being exploited, including Apache OfBiz and VMware eSXI hypervisors.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-05-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-05T19:51:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240805-vulnerability-recap-august-05-2024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jenna Phipps\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jenna Phipps\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-05-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-05-2024\/\"},\"author\":{\"name\":\"Jenna Phipps\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb\"},\"headline\":\"Vulnerability Recap 8\/5\/24 \u2013 Already-Fixed Flaws Are Still Targeted\",\"datePublished\":\"2024-08-05T19:51:02+00:00\",\"dateModified\":\"2024-08-05T19:51:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-05-2024\/\"},\"wordCount\":1191,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-05-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240805-vulnerability-recap-august-05-2024.png\",\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-05-2024\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-05-2024\/\",\"name\":\"Vulnerability Recap 8\/5\/24: Windows, VMware, Android, Apple\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-05-2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-05-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240805-vulnerability-recap-august-05-2024.png\",\"datePublished\":\"2024-08-05T19:51:02+00:00\",\"dateModified\":\"2024-08-05T19:51:02+00:00\",\"description\":\"This week, some recently patched vulnerabilities got attention because they\u2019re still being exploited, including Apache OfBiz and VMware eSXI hypervisors.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-05-2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-05-2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-05-2024\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240805-vulnerability-recap-august-05-2024.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240805-vulnerability-recap-august-05-2024.png\",\"width\":1400,\"height\":900,\"caption\":\"Image: Dragon Claws\/Adobe Stock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-05-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerability Recap 8\/5\/24 \u2013 Already-Fixed Flaws Are Still Targeted\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb\",\"name\":\"Jenna Phipps\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg\",\"caption\":\"Jenna Phipps\"},\"description\":\"Jenna Phipps is a staff writer for eSecurity Planet and has years of experience in B2B technical content writing. She covers security practices, vulnerabilities, data protection, and the top products in the cybersecurity industry. She also writes about the importance of cybersecurity technologies and training in business environments, as well as the role that security plays in data storage and management. When Jenna's not writing about security, you can find her reading, shopping, eating smoothie bowls, or spending time with friends.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jphipps\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerability Recap 8\/5\/24: Windows, VMware, Android, Apple","description":"This week, some recently patched vulnerabilities got attention because they\u2019re still being exploited, including Apache OfBiz and VMware eSXI hypervisors.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-05-2024\/","og_locale":"en_US","og_type":"article","og_title":"Vulnerability Recap 8\/5\/24: Windows, VMware, Android, Apple","og_description":"This week, some recently patched vulnerabilities got attention because they\u2019re still being exploited, including Apache OfBiz and VMware eSXI hypervisors.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-05-2024\/","og_site_name":"eSecurity Planet","article_published_time":"2024-08-05T19:51:02+00:00","og_image":[{"width":1400,"height":900,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240805-vulnerability-recap-august-05-2024.png","type":"image\/png"}],"author":"Jenna Phipps","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jenna Phipps","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-05-2024\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-05-2024\/"},"author":{"name":"Jenna Phipps","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb"},"headline":"Vulnerability Recap 8\/5\/24 \u2013 Already-Fixed Flaws Are Still Targeted","datePublished":"2024-08-05T19:51:02+00:00","dateModified":"2024-08-05T19:51:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-05-2024\/"},"wordCount":1191,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-05-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240805-vulnerability-recap-august-05-2024.png","articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-05-2024\/","url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-05-2024\/","name":"Vulnerability Recap 8\/5\/24: Windows, VMware, Android, Apple","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-05-2024\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-05-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240805-vulnerability-recap-august-05-2024.png","datePublished":"2024-08-05T19:51:02+00:00","dateModified":"2024-08-05T19:51:02+00:00","description":"This week, some recently patched vulnerabilities got attention because they\u2019re still being exploited, including Apache OfBiz and VMware eSXI hypervisors.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-05-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-05-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-05-2024\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240805-vulnerability-recap-august-05-2024.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240805-vulnerability-recap-august-05-2024.png","width":1400,"height":900,"caption":"Image: Dragon Claws\/Adobe Stock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-05-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Vulnerability Recap 8\/5\/24 \u2013 Already-Fixed Flaws Are Still Targeted"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb","name":"Jenna Phipps","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg","caption":"Jenna Phipps"},"description":"Jenna Phipps is a staff writer for eSecurity Planet and has years of experience in B2B technical content writing. She covers security practices, vulnerabilities, data protection, and the top products in the cybersecurity industry. She also writes about the importance of cybersecurity technologies and training in business environments, as well as the role that security plays in data storage and management. When Jenna's not writing about security, you can find her reading, shopping, eating smoothie bowls, or spending time with friends.","url":"https:\/\/www.esecurityplanet.com\/author\/jphipps\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/36698"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/238"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=36698"}],"version-history":[{"count":4,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/36698\/revisions"}],"predecessor-version":[{"id":36704,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/36698\/revisions\/36704"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/36699"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=36698"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=36698"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=36698"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=36698"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=36698"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=36698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}