{"id":37011,"date":"2024-08-27T18:14:13","date_gmt":"2024-08-27T18:14:13","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=37011"},"modified":"2024-09-02T19:21:48","modified_gmt":"2024-09-02T19:21:48","slug":"vulnerability-recap-august-27-2024","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-27-2024\/","title":{"rendered":"Vulnerability Recap 8\/27\/24 \u2013 Wide Range of Vulnerabilities This Week"},"content":{"rendered":"\n<p>If you updated Chrome and SolarWinds Web Help Desk in the last couple of weeks due to vulnerabilities, get ready to update them again \u2014 each has a new flaw. Additionally, a popular WordPress plugin has a critical issue, and AWS\u2019s Application Load Balancer feature has a configuration vulnerability.<\/p>\n\n\n\n<p>As always, the best way to get flaws quickly patched is to scan for vulnerabilities frequently and have a plan for fixing and documenting them. Make sure your security teams know their specific role in that process, and have frequent conversations about vulnerabilities so everyone knows what\u2019s going on both in your infrastructure and in the industry overall.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">August 19, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Critical WordPress Vulnerability Jeopardizes Millions of Sites<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Privilege escalation.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> LiteSpeed Cache, a WordPress plugin designed to reduce caching speeds and optimize page loads, <a href=\"https:\/\/www.searchenginejournal.com\/wordpress-cache-plugin-vulnerability-affects-5-million-websites\/525149\/\" target=\"_blank\" rel=\"noreferrer noopener\">has a vulnerability<\/a> that affects at least 5 million WordPress instances. A member of security provider PatchStack\u2019s Alliance community discovered the vulnerability and reported it to PatchStack, who then notified LiteSpeed Technologies, the plugin\u2019s developer.<\/p>\n\n\n\n<p>The plugin has a feature that creates a temporary user to crawl sites and cache web pages. \u201cThe vulnerability exploits a user simulation feature in the plugin which is protected by a weak security hash that uses known values,\u201d <a href=\"https:\/\/patchstack.com\/articles\/critical-privilege-escalation-in-litespeed-cache-plugin-affecting-5-million-sites\" target=\"_blank\" rel=\"noreferrer noopener\">PatchStack said<\/a>. Unauthenticated users can exploit the weak hashes to escalate their privileges and upload malicious plugins or files.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Upgrade your LiteSpeed plugin to version 6.4.1, which includes the patch.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">August 20, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">AWS Application Load Balancer Sees Configuration Issues<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Configuration issue leading to authentication bypass.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Application detection and response provider Miggo discovered a configuration vulnerability in Amazon Web Services\u2019 Application Load Balancer (ALB) authentication feature. If an application is misconfigured as an ALB target group and is directly accessible, a threat actor could bypass ALB and use a shared public key server to set an arbitrary key ID, <a href=\"https:\/\/www.miggo.io\/resources\/uncovering-auth-vulnerability-in-aws-alb-albeast#story-time\" target=\"_blank\" rel=\"noreferrer noopener\">according to Liad Eliyahu <\/a>from Miggo. The threat has been nicknamed ALBeast.<\/p>\n\n\n\n<p>Aside from misconfiguration, misimplementation and issuer forgery also put AWS authentication processes at risk. \u201cUntil recently, the AWS ALB <a href=\"https:\/\/docs.aws.amazon.com\/elasticloadbalancing\/latest\/application\/listener-authenticate-users.html#user-claims-encoding\" target=\"_blank\" rel=\"noreferrer noopener\">user authentication docs<\/a> did not include guidance on validating a token\u2019s signer\u2014a crucial field for ensuring that the token was signed by the trusted ALB,\u201d Eliyahu said. \u201cWithout this validation, applications might trust an attacker-crafted token.\u201d An attacker could also forge an authentic token signed by ALBeast.<\/p>\n\n\n\n<p>Applications that are exposed to the internet are particularly vulnerable to this flaw.<\/p>\n\n\n\n<p>AWS updated its documentation after Miggo disclosed the vulnerability to its researchers. Now, an authentication signature needs to be verified and validated. AWS added new code that\u2019s designed to validate the signer \u2014 the ALB instance that signs the token \u2014 according to Miggo.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Comply with all relevant documentation from AWS \u2014 use the new code they\u2019ve provided to validate signatures. Miggo noted that AWS doesn\u2019t consider issue forgery a formal vulnerability and has decided to reach out to customers with suboptimal configurations instead of changing the entire ALB component.<\/p>\n\n\n\n<p><strong>Learning about vulnerabilities as soon as possible is critical to protect your computer systems and networks, but it can be difficult to do manually. I recommend using a <a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-scanning-tools\/\">comprehensive vulnerability scanning product<\/a> to find issues that must be fixed quickly.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">August 21, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Upgrade Chrome As Soon As Possible<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Type confusion.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> A bug in the V8 JavaScript and Web Assembly engine affects Google Chrome on personal computers. The vulnerability allows remote threat actors to <a href=\"https:\/\/www.foxnews.com\/tech\/urgent-chrome-update-you-cant-ignore-why-you-need-update-now\" target=\"_blank\" rel=\"noreferrer noopener\">use specifically crafted HTML pages<\/a> to exploit heap correction. They could potentially use the falsified HTML page to take control of your Chrome instance.<\/p>\n\n\n\n<p>The vulnerability is tracked as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-7971\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-7971<\/a>. It exists in versions of Chrome prior to 128.0.6613.84.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> <a href=\"https:\/\/chromereleases.googleblog.com\/2024\/08\/stable-channel-update-for-desktop_21.html\" target=\"_blank\" rel=\"noreferrer noopener\">Chrome stable channel updates<\/a> from Google include 128.0.6613.84\/.85 for Windows and Mac devices and 128.0.6613.84 for Linux machines. To update to these versions:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Open the Chrome browser and select the three vertical dots in the right corner.<\/li>\n\n\n\n<li>Click Help.<\/li>\n\n\n\n<li>Click About Chrome.<\/li>\n\n\n\n<li>If Chrome checks for updates and finds one, it will update the browser. Select Relaunch after it updates.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"text-transform:none\">August 23, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Another SolarWinds Web Help Desk Flaw Emerges<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Hardcoded credential.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Last week, I mentioned a <a href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-20-2024\/\">Java deserialization flaw<\/a> in SolarWinds Web Help Desk. This week, researchers have discovered another vulnerability in WHD, this one a hardcoded credential issue. If exploited, it allows an unauthenticated remote user to access the Web Help Desk\u2019s controls and modify its data. Zach Hanley of Horizon3.ai discovered and reported the vulnerability.&nbsp;<\/p>\n\n\n\n<p>The flaw is tracked as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-28987\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-28987<\/a> and has a CVSS score of 9.1.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> <a href=\"https:\/\/support.solarwinds.com\/SuccessCenter\/s\/article\/SolarWinds-Web-Help-Desk-12-8-3-Hotfix-2\" target=\"_blank\" rel=\"noreferrer noopener\">SolarWinds has released a hotfix<\/a>, 12.8.3 number 2, that solves both last week\u2019s remote code execution vulnerability and this week\u2019s credential one.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">CISA Adds Versa Director Vulnerability to Catalog<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Dangerous file type upload vulnerability.&nbsp;<\/p>\n\n\n\n<p>The problem: Versa Networks\u2019 Director product has GUI customization options available for users who have Provider-Data-Center-Admin or Provider-Data-Center-System-Admin permissions. <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-39717\" target=\"_blank\" rel=\"noreferrer noopener\">According to NIST<\/a>, a malicious user with those privileges could use the \u201cChange Favicon\u201d option within the GUI to upload a malicious file that has a .png extension.<\/p>\n\n\n\n<p>The file would masquerade as an image file, according to NIST. The exploit is only possible after a user with the correct privileges has logged into the Versa Director GUI successfully. Versa Networks noted that managed service providers are likely to be the main targets.<\/p>\n\n\n\n<p>The vulnerability is tracked as <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-39717\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-39717<\/a> and has a severity rating of 6.6.<\/p>\n\n\n\n<p>The <a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2024\/08\/23\/cisa-adds-one-known-exploited-vulnerability-catalog-versa-networks-director\" target=\"_blank\" rel=\"noreferrer noopener\">CISA has added this vulnerability<\/a> to its catalog of Known Exploited Vulnerabilities (KEV). It has a High severity rating. According to NIST, Versa Networks is aware of one instance where the vulnerability was exploited because the customer didn\u2019t implement older firewall guidelines.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> To remediate CVE-2024-39717, upgrade to one of the following updated versions, with links to the download page provided by Versa Networks:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>21.2.3:<\/strong> <a href=\"https:\/\/support.versa-networks.com\/support\/solutions\/articles\/23000024323-release-21-2-3\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/support.versa-networks.com\/support\/solutions\/articles\/23000024323-release-21-2-3<\/a><\/li>\n\n\n\n<li><strong>22.1.2:<\/strong> <a href=\"https:\/\/support.versa-networks.com\/support\/solutions\/articles\/23000025680-release-22-1-2\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/support.versa-networks.com\/support\/solutions\/articles\/23000025680-release-22-1-2<\/a><\/li>\n\n\n\n<li><strong>22.1.3: <\/strong><a href=\"https:\/\/support.versa-networks.com\/support\/solutions\/articles\/23000026033-release-22-1-3\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/support.versa-networks.com\/support\/solutions\/articles\/23000026033-release-22-1-3<\/a><\/li>\n\n\n\n<li><strong>22.1.4:<\/strong> Not affected.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Additionally, follow all of <a href=\"https:\/\/versa-networks.com\/blog\/versa-security-bulletin-update-on-cve-2024-39717-versa-director-dangerous-file-type-upload-vulnerability\/\" target=\"_blank\" rel=\"noreferrer noopener\">Versa Networks\u2019<\/a> firewall guidelines and hardening best practices.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-transform:none\">Double RCE Vulnerabilities Affect GPS Tracking Tool Traccar<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Path traversal leading to potential remote code execution.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Open-source GPS tracking solution Traccar has two path traversal vulnerabilities that could allow unauthenticated threat actors to execute code remotely. According to Horizon3.ai researcher Naven Sunkavally, <a href=\"https:\/\/www.horizon3.ai\/attack-research\/disclosures\/traccar-5-remote-code-execution-vulnerabilities\/\" target=\"_blank\" rel=\"noreferrer noopener\">Traccar is vulnerable<\/a> when guest registration is enabled, which is its default configuration.<\/p>\n\n\n\n<p>Traccar allows users to register their devices to be tracked, and Traccar shows their location when the devices communicate with the Traccar server. In version 5.1 of the solution, an image upload feature allows users to upload a picture of their device, but Traccar\u2019s code has vulnerabilities in managing image file uploads.<\/p>\n\n\n\n<p>The first vulnerability is tracked as <a href=\"https:\/\/github.com\/traccar\/traccar\/security\/advisories\/GHSA-vhrw-72f6-gwp5\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-24809<\/a> and has a CVSS score of 8.5, with a high rating. The second is tracked as <a href=\"https:\/\/github.com\/traccar\/traccar\/security\/advisories\/GHSA-3gxq-f2qj-c8v9\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-31214<\/a> and has a critical CVSS score of 9.7. Both allow remote code execution if exploited.<\/p>\n\n\n\n<p>\u201cThe net result of CVE-2024-31214 and CVE-2024-24809 is that an attacker can place files with arbitrary content anywhere on the file system,\u201d Sunkavally said. \u201cHowever, an attacker only has partial control over the filename.\u201d The filename has to be a particular structure for the attackers to be successful.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Sunkavally recommends upgrading to Traccar 6. Alternatively, you can switch the registration setting to false so user self-registration isn\u2019t automatically enabled.<\/p>\n\n\n\n<p><strong>Read next:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-20-2024\/\"><strong>Vulnerability Recap 8\/20\/24 \u2013 Microsoft Has the Spotlight This Week<\/strong><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\"><strong>Best Vulnerability Management Software &amp; Systems<\/strong><\/a><\/li>\n<\/ul>\n\n\n<!-- ICP Plugin: Start --><div class=\"icp-list icp-list-main icp-list-body-top3 row\">\n    \n        <!--\n            ICP Plugin - body top3\n            ----------\n            Category: \n            Country: HK\n        -->\n    <\/div>\n<!-- ICP Plugin: End -->\n\n\n<div id=\"ta-campaign-widget-66d6c562950b5-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6c562950b5\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6c562950b5\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6c562950b5\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6c562950b5\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6c562950b5\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6c562950b5\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>This week\u2019s recap includes new SolarWinds and Chrome vulnerabilities, as well as flaws in AWS, Versa Networks, and Traccar capabilities.<\/p>\n","protected":false},"author":238,"featured_media":37012,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[],"b2b_audience":[33],"b2b_industry":[63],"b2b_product":[379],"class_list":["post-37011","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","b2b_audience-awareness-and-consideration","b2b_industry-technology","b2b_product-threats-and-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Vulnerability Recap 8\/27\/24: SolarWinds, Chrome, AWS<\/title>\n<meta name=\"description\" content=\"This week\u2019s recap includes new SolarWinds and Chrome vulnerabilities, as well as flaws in AWS, Versa Networks, and Traccar capabilities.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-27-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerability Recap 8\/27\/24: SolarWinds, Chrome, AWS\" \/>\n<meta property=\"og:description\" content=\"This week\u2019s recap includes new SolarWinds and Chrome vulnerabilities, as well as flaws in AWS, Versa Networks, and Traccar capabilities.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-27-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-27T18:14:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-02T19:21:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240827-vulnerability-recap-august-27-2024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jenna Phipps\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jenna Phipps\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-27-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-27-2024\/\"},\"author\":{\"name\":\"Jenna Phipps\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb\"},\"headline\":\"Vulnerability Recap 8\/27\/24 \u2013 Wide Range of Vulnerabilities This Week\",\"datePublished\":\"2024-08-27T18:14:13+00:00\",\"dateModified\":\"2024-09-02T19:21:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-27-2024\/\"},\"wordCount\":1288,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-27-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240827-vulnerability-recap-august-27-2024.png\",\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-27-2024\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-27-2024\/\",\"name\":\"Vulnerability Recap 8\/27\/24: SolarWinds, Chrome, AWS\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-27-2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-27-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240827-vulnerability-recap-august-27-2024.png\",\"datePublished\":\"2024-08-27T18:14:13+00:00\",\"dateModified\":\"2024-09-02T19:21:48+00:00\",\"description\":\"This week\u2019s recap includes new SolarWinds and Chrome vulnerabilities, as well as flaws in AWS, Versa Networks, and Traccar capabilities.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-27-2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-27-2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-27-2024\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240827-vulnerability-recap-august-27-2024.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240827-vulnerability-recap-august-27-2024.png\",\"width\":1400,\"height\":900,\"caption\":\"Image: Michael Traitov\/Adobe Stock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-27-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerability Recap 8\/27\/24 \u2013 Wide Range of Vulnerabilities This Week\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb\",\"name\":\"Jenna Phipps\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg\",\"caption\":\"Jenna Phipps\"},\"description\":\"Jenna Phipps is a staff writer for eSecurity Planet and has years of experience in B2B technical content writing. She covers security practices, vulnerabilities, data protection, and the top products in the cybersecurity industry. She also writes about the importance of cybersecurity technologies and training in business environments, as well as the role that security plays in data storage and management. When Jenna's not writing about security, you can find her reading, shopping, eating smoothie bowls, or spending time with friends.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jphipps\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerability Recap 8\/27\/24: SolarWinds, Chrome, AWS","description":"This week\u2019s recap includes new SolarWinds and Chrome vulnerabilities, as well as flaws in AWS, Versa Networks, and Traccar capabilities.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-27-2024\/","og_locale":"en_US","og_type":"article","og_title":"Vulnerability Recap 8\/27\/24: SolarWinds, Chrome, AWS","og_description":"This week\u2019s recap includes new SolarWinds and Chrome vulnerabilities, as well as flaws in AWS, Versa Networks, and Traccar capabilities.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-27-2024\/","og_site_name":"eSecurity Planet","article_published_time":"2024-08-27T18:14:13+00:00","article_modified_time":"2024-09-02T19:21:48+00:00","og_image":[{"width":1400,"height":900,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240827-vulnerability-recap-august-27-2024.png","type":"image\/png"}],"author":"Jenna Phipps","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jenna Phipps","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-27-2024\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-27-2024\/"},"author":{"name":"Jenna Phipps","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb"},"headline":"Vulnerability Recap 8\/27\/24 \u2013 Wide Range of Vulnerabilities This Week","datePublished":"2024-08-27T18:14:13+00:00","dateModified":"2024-09-02T19:21:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-27-2024\/"},"wordCount":1288,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-27-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240827-vulnerability-recap-august-27-2024.png","articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-27-2024\/","url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-27-2024\/","name":"Vulnerability Recap 8\/27\/24: SolarWinds, Chrome, AWS","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-27-2024\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-27-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240827-vulnerability-recap-august-27-2024.png","datePublished":"2024-08-27T18:14:13+00:00","dateModified":"2024-09-02T19:21:48+00:00","description":"This week\u2019s recap includes new SolarWinds and Chrome vulnerabilities, as well as flaws in AWS, Versa Networks, and Traccar capabilities.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-27-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-27-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-27-2024\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240827-vulnerability-recap-august-27-2024.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/08\/esp_20240827-vulnerability-recap-august-27-2024.png","width":1400,"height":900,"caption":"Image: Michael Traitov\/Adobe Stock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-27-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Vulnerability Recap 8\/27\/24 \u2013 Wide Range of Vulnerabilities This Week"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb","name":"Jenna Phipps","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg","caption":"Jenna Phipps"},"description":"Jenna Phipps is a staff writer for eSecurity Planet and has years of experience in B2B technical content writing. She covers security practices, vulnerabilities, data protection, and the top products in the cybersecurity industry. She also writes about the importance of cybersecurity technologies and training in business environments, as well as the role that security plays in data storage and management. When Jenna's not writing about security, you can find her reading, shopping, eating smoothie bowls, or spending time with friends.","url":"https:\/\/www.esecurityplanet.com\/author\/jphipps\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/37011"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/238"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=37011"}],"version-history":[{"count":4,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/37011\/revisions"}],"predecessor-version":[{"id":37100,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/37011\/revisions\/37100"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/37012"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=37011"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=37011"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=37011"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=37011"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=37011"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=37011"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}