{"id":37094,"date":"2024-09-02T19:17:03","date_gmt":"2024-09-02T19:17:03","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=37094"},"modified":"2024-09-02T19:17:05","modified_gmt":"2024-09-02T19:17:05","slug":"vulnerability-recap-september-2-2024","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-september-2-2024\/","title":{"rendered":"Vulnerability Recap 9\/2\/24 \u2013 Big Companies Upgrade vs Risks"},"content":{"rendered":"\n<p>Several major companies identified and addressed significant security and vulnerability problems in last week&#8217;s vulnerability news. SonicWall dealt with a serious access control vulnerability that affected its firewall systems. Traccar fixed severe path traversal flaws in its GPS tracking software. Versa Networks responded to an unrestricted file upload flaw, and Apache resolved an incorrect authorization vulnerability in OFBiz ERP.<\/p>\n\n\n\n<p>Microsoft addressed an ASCII smuggling issue in 365 Copilot, and Google and Fortra issued critical security patches for actively exploited vulnerabilities in Chrome and FileCatalyst Workflow, respectively. To reduce the potential risks, update all impacted software to the most recent version and evaluate your system processes for potential modifications and security enhancements.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">August 26, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">SonicWall Identifies Access Control Vulnerability<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Improper access control.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-40766\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-40766<\/a>, a critical access control vulnerability with a 9.3 severity level, was discovered in SonicOS on SonicWall systems. This flaw has the potential to bring down the firewall or grant unauthorized access to resources. Devices running SonicWall Firewall Gen5, Gen6, and Gen 7 are vulnerable to network-based threats that require no user interaction or authentication.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Upgrade to <a href=\"https:\/\/psirt.global.sonicwall.com\/vuln-detail\/SNWLID-2024-0015\" target=\"_blank\" rel=\"noreferrer noopener\">SonicWall&#8217;s firmware updates<\/a> for Gen 5 (to version 5.9.2.14-13o), Gen 6 (to version 6.5.4.15.116n), and Gen 7 (to any version above 7.0.1-5035). Disable WAN management access or limit firewall management access to reliable sources if instant updates aren&#8217;t possible.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/09\/esp_20240902-vulnerability-recap-september-2-2024-figure_a.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"349\" src=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/09\/esp_20240902-vulnerability-recap-september-2-2024-figure_a.jpg\" alt=\"SonicWall's list of fixed software.\" class=\"wp-image-37096\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/09\/esp_20240902-vulnerability-recap-september-2-2024-figure_a.jpg 1000w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/09\/esp_20240902-vulnerability-recap-september-2-2024-figure_a-300x105.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2024\/09\/esp_20240902-vulnerability-recap-september-2-2024-figure_a-768x268.jpg 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/a><figcaption class=\"wp-element-caption\">SonicWall&#8217;s list of fixed software<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Traccar Fixes Path Traversal Vulnerabilities<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Path traversal.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Two major vulnerabilities, <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-24809\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-24809<\/a> (CVSS score: 8.5) and <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-31214\">CVE-2024-31214<\/a> (CVSS score: 9.7), were discovered in the Traccar GPS tracking system and affect versions 5.1 to 5.12. These path traversal weaknesses may allow unauthenticated attackers to drop malicious files. This can result in remote code execution under particular conditions, especially when you&#8217;ve permitted guest registration.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Traccar resolved these vulnerabilities in version 6, released in April 2024. It blocks self-registration by default, reducing the attack surface. Users should upgrade to <a href=\"https:\/\/www.traccar.org\/blog\/traccar-6-0\/\" target=\"_blank\" rel=\"noreferrer noopener\">Traccar 6<\/a> or higher to reduce the hazards. If you can&#8217;t update immediately, disable guest registration and unnecessary write access to prevent exploitation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Versa Networks Patches File Upload Vulnerability<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Unrestricted file upload.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Versa Networks recently fixed a zero-day vulnerability, <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-39717\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-39717<\/a>, in Versa Director, a platform for controlling SD-WAN. This vulnerability, which existed in the &#8220;Change Favicon&#8221; feature, enabled threat actors with administrative capabilities to deliver malicious files disguised as PNG images. An APT attacker exploited this vulnerability which affected clients who failed to comply with system hardening and firewall standards.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> This zero-day has been added to CISA&#8217;s Catalog of Known Exploited Vulnerabilities. Versa Networks advises clients to update their Versa Director installations to the <a href=\"https:\/\/versa-networks.com\/blog\/versa-security-bulletin-update-on-cve-2024-39717-versa-director-dangerous-file-type-upload-vulnerability\/\" target=\"_blank\" rel=\"noreferrer noopener\">most recent version<\/a> to mitigate CVE-2024-39717. Furthermore, users should evaluate and follow the suggested system hardening and firewall rules. To check for exploitation, look for suspicious files in the <strong>\/var\/versa\/vnms\/web\/custom_logo\/<\/strong> folder.<\/p>\n\n\n\n<p><strong>Explore how to <a href=\"https:\/\/www.esecurityplanet.com\/threats\/zero-day-threat\/\">prepare for zero-day threats<\/a>. See how it works and the best practices for organizations to mitigate these attacks.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">August 27, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Apache Encounters Incorrect Authorization Vulnerability in OFBiz ERP<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Incorrect authorization.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Apache OFBiz, an open-source enterprise resource planning (ERP) system, contains a critical security weakness (<a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-38856\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-38856<\/a>) with a CVSS score of 9.8, which allows unauthenticated attackers to execute remote code via a Groovy payload. This vulnerability, now actively exploited in the wild, affects systems used by big corporations worldwide, possibly compromising their sensitive operations.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> To mitigate CVE-2024-38856, update Apache OFBiz to version <a href=\"https:\/\/ofbiz.apache.org\/download.html\" target=\"_blank\" rel=\"noreferrer noopener\">18.12.15<\/a>. Federal agencies must roll out the revisions by September 17, 2024.<\/p>\n\n\n\n<p>In his expert commentary regarding the issue, Greg Fitzgerald, co-founder of Sevco Security, warns that &#8220;even when patches are applied, a more insidious threat exists if companies have lost track of vulnerable instances.&#8221; Fitzgerald emphasizes an accurate IT asset inventory, citing that many assets remain uncovered by enterprise patch management and vulnerability management systems.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Microsoft Resolves ASCII Smuggling Vulnerability in 365 Copilot<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> ASCII smuggling.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> A recently patched <a href=\"https:\/\/learn.microsoft.com\/en-us\/microsoft-copilot-studio\/publication-fundamentals-publish-channels?tabs=web\" target=\"_blank\" rel=\"noreferrer noopener\">vulnerability in Microsoft 365 Copilot<\/a> allowed attackers to obtain sensitive user information via ASCII smuggling. Attackers could employ invisible Unicode characters to conceal harmful material in hyperlinks and exfiltrate data such as MFA codes. The exploit chain featured prompt injection and automatic tool invocation to find sensitive documents.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Microsoft rectified the vulnerability after disclosure in January 2024. Enterprises should activate data loss prevention and other security controls to limit hazards in AI technologies such as Copilot. Assess your risk tolerance to avoid data breaches from Copilots and safeguard bots with authentication measures.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Google Reveals Actively Exploited Chrome Flaw in V8 Engine<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Inappropriate implementation bug.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Google addressed an actively exploited security flaw in its Chrome browser, known as <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-7965\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-7965<\/a>. The vulnerability occurs from an incorrect implementation error in the V8 JavaScript and WebAssembly engines, which allows remote attackers to exploit heap corruption using crafted HTML pages.&nbsp;<\/p>\n\n\n\n<p>The bug was found by a security researcher named TheDog. Google hasn&#8217;t provided precise data about the assaults, but it has confirmed that the vulnerability is being actively exploited in the wild.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Google recommends <a href=\"https:\/\/chromereleases.googleblog.com\/2024\/08\/stable-channel-update-for-desktop_21.html\" target=\"_blank\" rel=\"noreferrer noopener\">updating Chrome<\/a> to versions 128.0.6613.84\/.85 for Windows and macOS, and 128.0.6613.84 for Linux. This update handles the actively exploited CVE-2024-7965 vulnerability in the V8 engine, preventing heap corruption attacks using manipulated HTML pages.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">August 28, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Fortra Patches Critical Access Flaw in FileCatalyst Workflow<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Credential exposure.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> Fortra fixed a major vulnerability in FileCatalyst Workflow (<a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-6633\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-6633<\/a>) with a CVSS score of 9.8. The vulnerability stems from a static password used for the HSQL database, which allows remote attackers to acquire administrative privileges. This default credential vulnerability jeopardizes program security, integrity, and availability. The issue was made public on July 2, 2024.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Fortra has published a <a href=\"https:\/\/www.fortra.com\/security\/advisories\/product-security\/fi-2024-011\" target=\"_blank\" rel=\"noreferrer noopener\">patch for FileCatalyst Workflow<\/a> 5.1.7 and later, which addresses the static password issue. Update to this version to mitigate CVE-2024-6633 and fix the high-severity SQL injection bug (CVE-2024-6632) in the setup process.<\/p>\n\n\n\n<p><strong><a href=\"https:\/\/www.esecurityplanet.com\/threats\/cookie-theft\/\">Cookie theft<\/a> is another method attackers use to expose your credentials. Reduce this risk, learn how to prevent unauthorized access to your browser, and discover some ways to identify and recover from stolen credential attacks.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">August 29, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">AVTECH IP Cameras Exploited via Old Command Injection Flaw<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Command injection.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-7029\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-7029<\/a> (CVSS score: 8.7) is a command injection vulnerability in AVTECH IP cameras that permits remote code execution (RCE) using the brightness feature. Threat actors exploited this weakness to incorporate devices into botnets, affecting devices running firmware versions up to FullImg-1023-1007-1011-1009. It was publicly <a href=\"https:\/\/www.fortra.com\/security\/advisories\/product-security\/fi-2024-011\" target=\"_blank\" rel=\"noreferrer noopener\">published<\/a> in August 2024.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Currently, no patch is available for this issue. Users must examine their camera firmware and seek alternative or extra security steps to reduce risk.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">August 30, 2024<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Threat Actors Leverage Atlassian Confluence Flaw for Crypto Mining<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Remote code execution.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2023-22527\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-22527<\/a>, a severe RCE vulnerability in Atlassian Confluence Data Center and Server, enables unauthenticated remote code execution. Threat actors use this vulnerability to deploy XMRig miners, target SSH endpoints, and sustain persistence via cron jobs. Exploitation attempts increased significantly between June and July 2024.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> To fix CVE-2023-22527, immediately update the Atlassian Confluence Data Center and Server to the <a href=\"https:\/\/jira.atlassian.com\/browse\/CONFSERVER-93833\" target=\"_blank\" rel=\"noreferrer noopener\">newest versions<\/a>. This patch addresses the major vulnerability and prevents future exploitation, protecting you against unauthorized remote code execution and illegal cryptocurrency mining.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Exploited Chrome Flaw Triggers Rootkit Deployment<\/h3>\n\n\n\n<p><strong>Type of vulnerability:<\/strong> Type confusion.<\/p>\n\n\n\n<p><strong>The problem:<\/strong> <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-7971\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-7971<\/a> is a high-severity type confusion vulnerability in Chrome&#8217;s V8 engine that North Korean actors exploited to execute code remotely. This resulted in the deployment of the FudModule rootkit. Victims of social engineering risked compromised systems and probable data theft.<\/p>\n\n\n\n<p><strong>The fix:<\/strong> Google <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/08\/30\/north-korean-threat-actor-citrine-sleet-exploiting-chromium-zero-day\/\" target=\"_blank\" rel=\"noreferrer noopener\">addressed<\/a> this flaw, eliminating the risk of remote code execution. To respond to CVE-2024-7971, update Chrome and other Chromium-based browsers to the latest version. Update Windows to solve associated vulnerabilities such as <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-38106\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-38106 to avoid further exploitation and rootkit installation<\/a>.<\/p>\n\n\n\n<p><strong>Read next:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-august-27-2024\/\"><strong>Vulnerability Recap 8\/27\/24: SolarWinds, Chrome, AWS<\/strong><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-management\/\"><strong>Vulnerability Management: Definition, Process &amp; Tools<\/strong><\/a><\/li>\n<\/ul>\n\n\n<!-- ICP Plugin: Start --><div class=\"icp-list icp-list-main icp-list-body-top3 row\">\n    \n        <!--\n            ICP Plugin - body top3\n            ----------\n            Category: \n            Country: HK\n        -->\n    <\/div>\n<!-- ICP Plugin: End -->\n\n\n<div id=\"ta-campaign-widget-66d6c4f8013ff-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6c4f8013ff\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6c4f8013ff\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6c4f8013ff\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6c4f8013ff\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6c4f8013ff\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6c4f8013ff\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Last week&#8217;s vulnerability news cover companies\u2019 response to address flaws. See the updates now.<\/p>\n","protected":false},"author":331,"featured_media":37095,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[],"b2b_audience":[33],"b2b_industry":[63],"b2b_product":[379],"class_list":["post-37094","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","b2b_audience-awareness-and-consideration","b2b_industry-technology","b2b_product-threats-and-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Vulnerability Recap 9\/2\/24: Big Companies Upgrade vs Risks<\/title>\n<meta name=\"description\" content=\"Last week&#039;s vulnerability news cover companies\u2019 response to address flaws. See the updates now.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-september-2-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerability Recap 9\/2\/24: Big Companies Upgrade vs Risks\" \/>\n<meta property=\"og:description\" content=\"Last week&#039;s vulnerability news cover companies\u2019 response to address flaws. See the updates now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-september-2-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-02T19:17:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-02T19:17:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/09\/esp_20240902-vulnerability-recap-september-2-2024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Maine Basan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Maine Basan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-september-2-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-september-2-2024\/\"},\"author\":{\"name\":\"Maine Basan\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/48c58015ca79ab3ed057abd7a52b2206\"},\"headline\":\"Vulnerability Recap 9\/2\/24 \u2013 Big Companies Upgrade vs Risks\",\"datePublished\":\"2024-09-02T19:17:03+00:00\",\"dateModified\":\"2024-09-02T19:17:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-september-2-2024\/\"},\"wordCount\":1354,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-september-2-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/09\/esp_20240902-vulnerability-recap-september-2-2024.png\",\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-september-2-2024\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-september-2-2024\/\",\"name\":\"Vulnerability Recap 9\/2\/24: Big Companies Upgrade vs Risks\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-september-2-2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-september-2-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/09\/esp_20240902-vulnerability-recap-september-2-2024.png\",\"datePublished\":\"2024-09-02T19:17:03+00:00\",\"dateModified\":\"2024-09-02T19:17:05+00:00\",\"description\":\"Last week's vulnerability news cover companies\u2019 response to address flaws. See the updates now.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-september-2-2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-september-2-2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-september-2-2024\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/09\/esp_20240902-vulnerability-recap-september-2-2024.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/09\/esp_20240902-vulnerability-recap-september-2-2024.png\",\"width\":1400,\"height\":900,\"caption\":\"Image: Askha\/Adobe Stock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-september-2-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerability Recap 9\/2\/24 \u2013 Big Companies Upgrade vs Risks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/48c58015ca79ab3ed057abd7a52b2206\",\"name\":\"Maine Basan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/HH50049850_Maine_Basan-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/HH50049850_Maine_Basan-150x150.jpg\",\"caption\":\"Maine Basan\"},\"description\":\"Maine is an eSecurity Planet writer with a foundation in eLearning content development, research, and academic CRM implementation. She studied BA Communication Arts at the University of the Philippines. She now leverages her communication experiences as a writer and product analyst, engaging the B2B audience with insights into cybersecurity trends and solutions. Off the clock, Maine\u2019s probably immersed in her spreadsheets, organizing her life or planning her next K-pop concert and beach getaways.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/mbasan\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerability Recap 9\/2\/24: Big Companies Upgrade vs Risks","description":"Last week's vulnerability news cover companies\u2019 response to address flaws. See the updates now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-september-2-2024\/","og_locale":"en_US","og_type":"article","og_title":"Vulnerability Recap 9\/2\/24: Big Companies Upgrade vs Risks","og_description":"Last week's vulnerability news cover companies\u2019 response to address flaws. See the updates now.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-september-2-2024\/","og_site_name":"eSecurity Planet","article_published_time":"2024-09-02T19:17:03+00:00","article_modified_time":"2024-09-02T19:17:05+00:00","og_image":[{"width":1400,"height":900,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/09\/esp_20240902-vulnerability-recap-september-2-2024.png","type":"image\/png"}],"author":"Maine Basan","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Maine Basan","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-september-2-2024\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-september-2-2024\/"},"author":{"name":"Maine Basan","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/48c58015ca79ab3ed057abd7a52b2206"},"headline":"Vulnerability Recap 9\/2\/24 \u2013 Big Companies Upgrade vs Risks","datePublished":"2024-09-02T19:17:03+00:00","dateModified":"2024-09-02T19:17:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-september-2-2024\/"},"wordCount":1354,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-september-2-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/09\/esp_20240902-vulnerability-recap-september-2-2024.png","articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-september-2-2024\/","url":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-september-2-2024\/","name":"Vulnerability Recap 9\/2\/24: Big Companies Upgrade vs Risks","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-september-2-2024\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-september-2-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/09\/esp_20240902-vulnerability-recap-september-2-2024.png","datePublished":"2024-09-02T19:17:03+00:00","dateModified":"2024-09-02T19:17:05+00:00","description":"Last week's vulnerability news cover companies\u2019 response to address flaws. See the updates now.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-september-2-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-september-2-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-september-2-2024\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/09\/esp_20240902-vulnerability-recap-september-2-2024.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2024\/09\/esp_20240902-vulnerability-recap-september-2-2024.png","width":1400,"height":900,"caption":"Image: Askha\/Adobe Stock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/vulnerability-recap-september-2-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Vulnerability Recap 9\/2\/24 \u2013 Big Companies Upgrade vs Risks"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/48c58015ca79ab3ed057abd7a52b2206","name":"Maine Basan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/HH50049850_Maine_Basan-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/HH50049850_Maine_Basan-150x150.jpg","caption":"Maine Basan"},"description":"Maine is an eSecurity Planet writer with a foundation in eLearning content development, research, and academic CRM implementation. She studied BA Communication Arts at the University of the Philippines. She now leverages her communication experiences as a writer and product analyst, engaging the B2B audience with insights into cybersecurity trends and solutions. Off the clock, Maine\u2019s probably immersed in her spreadsheets, organizing her life or planning her next K-pop concert and beach getaways.","url":"https:\/\/www.esecurityplanet.com\/author\/mbasan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/37094"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/331"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=37094"}],"version-history":[{"count":2,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/37094\/revisions"}],"predecessor-version":[{"id":37098,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/37094\/revisions\/37098"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/37095"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=37094"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=37094"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=37094"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=37094"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=37094"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=37094"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}