{"id":36777,"date":"2024-08-13T18:50:14","date_gmt":"2024-08-13T18:50:14","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=36777"},"modified":"2024-08-14T12:40:25","modified_gmt":"2024-08-14T12:40:25","slug":"vulnerability-recap-august-13-2024","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-13-2024\/","title":{"rendered":"Vulnerability Recap 8\/13\/24 \u2013 Old Vulnerabilities Unexpectedly Emerge"},"content":{"rendered":"\n<p>It\u2019s been a startling week in vulnerability news, mainly due to a few older vulnerabilities coming to light. While it doesn\u2019t look like they\u2019ve been exploited yet, threat actors may make a move now that the flaws have been publicized.<\/p>\n\n\n\n<p>The other major news \u2014 which could affect both businesses and individuals \u2014 is a zero-day vulnerability found in most major web browsers on both Mac and Linux machines. You\u2019ll want to update your computer as soon as you learn about this \u2014 I certainly did. Look at our rundown, and make sure your security teams are apprised of any relevant vulnerabilities from this past week\u2019s news.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">August 5, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Another Apache OfBiz Vulnerability to Watch<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Remote code execution.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-38856\" target=\"_blank\" rel=\"noreferrer noopener\">Last week<\/a>, I mentioned a path traversal vulnerability in the open-source framework Apache OfBiz that had been patched earlier in the year but was more recently being exploited. This new OfBiz flaw is a separate one. It\u2019s tracked as <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-38856\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-38856<\/a> and allows a threat actor to use a specifically created request to execute code on endpoints without authorization.<\/p>\n\n\n\n<p>The vulnerability has a CVSS severity rating of 9.8 and affects all versions of Apache OfBiz up to 18.12.14.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Upgrade to version 18.12.15.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">August 7, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">18-Year-Old Browser Flaw Requires Immediate Updates<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Zero-day code execution.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Researchers from application security vendor Oligo recently discovered a web browser vulnerability 18 years in the making. The flaw allows threat actors to fingerprint and identify browser users and to use an IP address of 0.0.0.0 to execute unauthorized code. The vulnerability applies to all major browsers running on macOS and Linux systems but not on Windows.<\/p>\n\n\n\n<p>\u201cPublic websites (like domains ending in .com) are able to communicate with services running on the local network (localhost) and potentially execute arbitrary code on the visitor\u2019s host by using the address 0.0.0.0 instead of localhost\/127.0.0.1,\u201d <a href=\"https:\/\/www.oligo.security\/blog\/0-0-0-0-day-exploiting-localhost-apis-from-the-browser\" target=\"_blank\" rel=\"noreferrer noopener\">Oligo researcher Avi Lumelsky said<\/a>.<\/p>\n\n\n\n<p>According to Oligo, the initial vulnerability, designed to identify browser users for legitimacy, also allows threat actors to fingerprint users by port-scanning them. By the time this was recognized as a major threat, it already existed in most browsers and would be quite challenging to solve, Lumelsky explained.&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>The fix:<\/strong> If you use Google Chrome, click the three vertical dots at the top of the right corner of the browser window. Select \u201cHelp\u201d and then \u201cAbout Google Chrome.\u201d From there, select the option to upgrade to a new browser. If you see \u201cRelaunch,\u201d click that, or Chrome may relaunch the browser automatically after closing the windows.<\/p>\n\n\n\n<p>If you use Safari, click the Apple icon to open the menu and choose \u201cSystem Settings.\u201d Select \u201cGeneral\u201d and then \u201cSoftware Update.\u201d Select \u201cUpdate Now\u201d if there\u2019s a new update available, and follow any further instructions.<\/p>\n\n\n\n<p>Microsoft Edge users should open the browser and select the three dots in the upper right-hand corner. Then, choose \u201cHelp and feedback\u201d and select \u201cAbout Microsoft Edge.\u201d If there are updates available, Edge should automatically perform them. Then, you\u2019ll need to restart Edge as prompted to apply those software updates.<\/p>\n\n\n\n<p>If you use Mozilla Firefox, open Firefox and select the three horizontal lines at the top right of the browser. Click \u201cHelp\u201d and then \u201cAbout Firefox,\u201d where Firefox will execute any available updates automatically. After the update process, select \u201cRestart to Update Firefox.\u201d<\/p>\n\n\n\n<p>For further details on updating your browsers, Fox News <a href=\"https:\/\/www.foxnews.com\/tech\/massive-security-flaw-puts-most-popular-browsers-risk-mac\" target=\"_blank\" rel=\"noreferrer noopener\">provides instructions here<\/a>.<\/p>\n\n\n\n<p><strong>If your security team has started to feel overwhelmed by tracking down vulnerability news, consider a scanning product that helps automate vulnerability tracking procedures. We\u2019ve selected the <a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-scanning-tools\/\">best vulnerability scanners for businesses<\/a> so you can pick a good option for your team.<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Sinkclose Vulnerability Affects 18 Years of Processors<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Improper validation and potentially arbitrary code execution.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> This week, we have not one but two 18-year-old vulnerabilities: researchers at IOActive <a href=\"https:\/\/ioactive.com\/article\/sinkclose-flaw-in-hundreds-of-millions-of-amd-chips-allows-deep-virtually-unfixable-infections\/\" target=\"_blank\" rel=\"noreferrer noopener\">discovered a flaw<\/a> in AMD central processing units that has existed in processors made as early as 2006. It\u2019s only just now been discovered and is known as Sinkclose. If exploited, the vulnerability would allow a threat actor to execute their own code within the processor\u2019s firmware using System Management Mode (SMM). This can happen even when SMM is locked.<\/p>\n\n\n\n<p>To successfully complete the attack, the malicious program would need to have access to\u00a0 ring0, which is the layer of the firmware with the highest privileges and with access to the system kernel. The threat actor must get there first before they can exploit this flaw; this could be part of the reason it hasn\u2019t been heavily exploited. The vulnerability is tracked as <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=2023-31315\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-31315<\/a> and has a CVSS score of 7.5.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> AMD will patch some of its processors but not all; check out <a href=\"https:\/\/www.amd.com\/en\/resources\/product-security\/bulletin\/amd-sb-7014.html\" target=\"_blank\" rel=\"noreferrer noopener\">AMD\u2019s security bulletin<\/a> for a list of hardware that will receive a patch.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Windows Downgrade Attack Puts Operating System in Danger<\/h3>\n\n\n\n<p><strong>Type of attack:<\/strong> OS version rollback.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> A recently discovered flaw in Windows systems allows threat actors to roll operating systems back to older versions that have vulnerabilities in them. The researcher who discovered the flaw six months ago, Alon Leviev, <a href=\"https:\/\/www.blackhat.com\/us-24\/briefings\/schedule\/index.html?_gl=1*1jz1mvp*_gcl_au*MTgxMDYyNzI1NS4xNzIzMDk0MTkw#windows-downdate-downgrade-attacks-using-windows-updates-38963\" target=\"_blank\" rel=\"noreferrer noopener\">presented his findings<\/a> at the Black Hat conference last week. He was able to use the Windows Updates function to create OS downgrading updates and bypass the verification steps typically required for a system update.<\/p>\n\n\n\n<p>\u201cArmed with these capabilities, we managed to downgrade critical OS components, including DLLs, drivers, and even the NT kernel,\u201d Leviev said. \u201cAfterwards, the OS reported it&#8217;s fully updated, unable to install future updates, with recovery and scanning tools unable to detect issues.\u201d<\/p>\n\n\n\n<p>The vulnerability also applied to Microsoft Hyper-V, the vendor\u2019s hypervisor for supporting virtual environments. Leviev was able to downgrade Hyper-V, as well as the Isolated User Mode process within Windows Credential Guard.<\/p>\n\n\n\n<p>In this scenario, a computer that appears to be fully patched could actually be running an older operating system with multiple open vulnerabilities.<\/p>\n\n\n\n<p>Microsoft hasn\u2019t officially spoken on the vulnerability, but it published advisories for <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-38202\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-38202<\/a> and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21302\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-21302<\/a> around the same time that Leviev presented at Black Hat.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> The vendor currently offers no solution. If your business uses Windows, restrict administrative privileges as much as you can and require password resets as soon as possible.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">August 10, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Google Quick Share Has 10 Flaws on Windows<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong>&nbsp;<\/p>\n\n\n\n<p><strong>The problem:<\/strong> SafeBreach researchers <a href=\"https:\/\/www.safebreach.com\/blog\/rce-attack-chain-on-quick-share\" target=\"_blank\" rel=\"noreferrer noopener\">discovered 10 different vulnerabilities<\/a> in Google Quick Share, a wireless data transfer utility. When put together, some of them could lead to remote code execution attacks against Quick Share on Windows machines. This potential attack chain is now known as QuickShell.<\/p>\n\n\n\n<p>The vulnerabilities included remote unauthorized file writes, remote forced Wi-Fi connection, and remote denial-of-service. According to SafeBreach, Google has fixed all the vulnerabilities and issued two CVEs: <a href=\"https:\/\/www.cve.org\/cverecord?id=CVE-2024-38271\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-38271<\/a> and <a href=\"https:\/\/www.cve.org\/cverecord?id=CVE-2024-38272\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-38272<\/a>.<\/p>\n\n\n\n<p>According to the researchers, a significant portion of the application code resides in an open-source repository, which could make it a valuable target for threat actors.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Google has fixed the flaws, so update your Android, Windows, and Chrome systems to the most recent versions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">August 12, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">OpenSSH Flaw Opens the Door for RCE<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Remote code execution.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> OpenSSH, a network utilities suite based on the Secure Shell protocol, has a signal safety flaw, according to researchers at FreeBSD. FreeBSD, an open-source operating system project, released a security bulletin about the vulnerability, which occurs in a signal handler in sshd(8). According to the researchers, the logging function that the handler calls isn\u2019t automatically async-signal-safe.<\/p>\n\n\n\n<p>\u201cThe signal handler is invoked when a client does not authenticate within the LoginGraceTime seconds (120 by default),\u201d FreeBSD said in its notice. \u201cThis signal handler executes in the context of the sshd(8)&#8217;s privileged code, which is not sandboxed and runs with full root privileges.\u201d<\/p>\n\n\n\n<p>If exploited, the vulnerability allows a threat actor to execute remote code as root in OpenSSH. This affects the safety of OpenSSH\u2019s encryption and transport security features.<\/p>\n\n\n\n<p>The vulnerability is tracked as <a href=\"https:\/\/www.tenable.com\/cve\/CVE-2024-7589\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-7589<\/a> and has a CVSS score of 7.4.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> FreeBSD instructs users to upgrade their system to a supported FreeBSD stable or release \/ security branch (releng) from after the date the flaw was fixed. After you\u2019ve upgraded, restart sshd. FreeBSD provides more <a href=\"https:\/\/www.freebsd.org\/security\/advisories\/FreeBSD-SA-24:08.openssh.asc\" target=\"_blank\" rel=\"noreferrer noopener\">specific upgrade details<\/a> as well.<\/p>\n\n\n\n<p><strong>Read next:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-05-2024\/\"><strong>Vulnerability Recap 8\/5\/24 \u2013 Already-Fixed Flaws Are Still Targeted<\/strong><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\"><strong>Best Vulnerability Management Software &amp; Systems in 2024<\/strong><\/a><\/li>\n<\/ul>\n\n\n<!-- ICP Plugin: Start --><div class=\"icp-list icp-list-main icp-list-body-top3 row\">\n    \n        <!--\n            ICP Plugin - body top3\n            ----------\n            Category: \n            Country: HK\n        -->\n    <\/div>\n<!-- ICP Plugin: End -->\n\n\n<div id=\"ta-campaign-widget-66d6dec7e5382-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6dec7e5382\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6dec7e5382\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6dec7e5382\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6dec7e5382\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6dec7e5382\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6dec7e5382\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s been a startling week in vulnerability news, mainly due to a few older vulnerabilities coming to light. While it doesn\u2019t look like they\u2019ve been exploited yet, threat actors may make a move now that the flaws have been publicized. The other major news \u2014 which could affect both businesses and individuals \u2014 is a [&hellip;]<\/p>\n","protected":false},"author":238,"featured_media":36778,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[],"b2b_audience":[33],"b2b_industry":[63],"b2b_product":[379],"class_list":["post-36777","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","b2b_audience-awareness-and-consideration","b2b_industry-technology","b2b_product-threats-and-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Vulnerability Recap 8\/13\/24: Windows, OpenSSH, Apache<\/title>\n<meta name=\"description\" content=\"It\u2019s been a startling week in vulnerability news, mainly due to a few older vulnerabilities coming to light. While it doesn\u2019t look like they\u2019ve been\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-13-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerability Recap 8\/13\/24: Windows, OpenSSH, Apache\" \/>\n<meta property=\"og:description\" content=\"It\u2019s been a startling week in vulnerability news, mainly due to a few older vulnerabilities coming to light. While it doesn\u2019t look like they\u2019ve been\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-13-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-13T18:50:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-14T12:40:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240813-vulnerability-recap-august-12-2024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jenna Phipps\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jenna Phipps\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-13-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-13-2024\/\"},\"author\":{\"name\":\"Jenna Phipps\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb\"},\"headline\":\"Vulnerability Recap 8\/13\/24 \u2013 Old Vulnerabilities Unexpectedly Emerge\",\"datePublished\":\"2024-08-13T18:50:14+00:00\",\"dateModified\":\"2024-08-14T12:40:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-13-2024\/\"},\"wordCount\":1418,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-13-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240813-vulnerability-recap-august-12-2024.png\",\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-13-2024\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-13-2024\/\",\"name\":\"Vulnerability Recap 8\/13\/24: Windows, OpenSSH, Apache\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-13-2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-13-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240813-vulnerability-recap-august-12-2024.png\",\"datePublished\":\"2024-08-13T18:50:14+00:00\",\"dateModified\":\"2024-08-14T12:40:25+00:00\",\"description\":\"It\u2019s been a startling week in vulnerability news, mainly due to a few older vulnerabilities coming to light. While it doesn\u2019t look like they\u2019ve been\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-13-2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-13-2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-13-2024\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240813-vulnerability-recap-august-12-2024.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240813-vulnerability-recap-august-12-2024.png\",\"width\":1400,\"height\":900,\"caption\":\"Image: Marcos Silva\/Adobe Stock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-13-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerability Recap 8\/13\/24 \u2013 Old Vulnerabilities Unexpectedly Emerge\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb\",\"name\":\"Jenna Phipps\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg\",\"caption\":\"Jenna Phipps\"},\"description\":\"Jenna Phipps is a staff writer for eSecurity Planet and has years of experience in B2B technical content writing. She covers security practices, vulnerabilities, data protection, and the top products in the cybersecurity industry. She also writes about the importance of cybersecurity technologies and training in business environments, as well as the role that security plays in data storage and management. When Jenna's not writing about security, you can find her reading, shopping, eating smoothie bowls, or spending time with friends.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jphipps\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerability Recap 8\/13\/24: Windows, OpenSSH, Apache","description":"It\u2019s been a startling week in vulnerability news, mainly due to a few older vulnerabilities coming to light. While it doesn\u2019t look like they\u2019ve been","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-13-2024\/","og_locale":"en_US","og_type":"article","og_title":"Vulnerability Recap 8\/13\/24: Windows, OpenSSH, Apache","og_description":"It\u2019s been a startling week in vulnerability news, mainly due to a few older vulnerabilities coming to light. While it doesn\u2019t look like they\u2019ve been","og_url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-13-2024\/","og_site_name":"eSecurity Planet","article_published_time":"2024-08-13T18:50:14+00:00","article_modified_time":"2024-08-14T12:40:25+00:00","og_image":[{"width":1400,"height":900,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240813-vulnerability-recap-august-12-2024.png","type":"image\/png"}],"author":"Jenna Phipps","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jenna Phipps","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-13-2024\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-13-2024\/"},"author":{"name":"Jenna Phipps","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb"},"headline":"Vulnerability Recap 8\/13\/24 \u2013 Old Vulnerabilities Unexpectedly Emerge","datePublished":"2024-08-13T18:50:14+00:00","dateModified":"2024-08-14T12:40:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-13-2024\/"},"wordCount":1418,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-13-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240813-vulnerability-recap-august-12-2024.png","articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-13-2024\/","url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-13-2024\/","name":"Vulnerability Recap 8\/13\/24: Windows, OpenSSH, Apache","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-13-2024\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-13-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240813-vulnerability-recap-august-12-2024.png","datePublished":"2024-08-13T18:50:14+00:00","dateModified":"2024-08-14T12:40:25+00:00","description":"It\u2019s been a startling week in vulnerability news, mainly due to a few older vulnerabilities coming to light. While it doesn\u2019t look like they\u2019ve been","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-13-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-13-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-13-2024\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240813-vulnerability-recap-august-12-2024.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240813-vulnerability-recap-august-12-2024.png","width":1400,"height":900,"caption":"Image: Marcos Silva\/Adobe Stock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-13-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Vulnerability Recap 8\/13\/24 \u2013 Old Vulnerabilities Unexpectedly Emerge"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb","name":"Jenna Phipps","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg","caption":"Jenna Phipps"},"description":"Jenna Phipps is a staff writer for eSecurity Planet and has years of experience in B2B technical content writing. She covers security practices, vulnerabilities, data protection, and the top products in the cybersecurity industry. She also writes about the importance of cybersecurity technologies and training in business environments, as well as the role that security plays in data storage and management. When Jenna's not writing about security, you can find her reading, shopping, eating smoothie bowls, or spending time with friends.","url":"https:\/\/www.esecurityplanet.com\/author\/jphipps\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/36777"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/238"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=36777"}],"version-history":[{"count":3,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/36777\/revisions"}],"predecessor-version":[{"id":36784,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/36777\/revisions\/36784"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/36778"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=36777"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=36777"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=36777"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=36777"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=36777"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=36777"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}