{"id":19570,"date":"2021-06-10T17:23:52","date_gmt":"2021-06-10T16:23:52","guid":{"rendered":"https:\/\/www.n-able.com\/?p=19570"},"modified":"2022-06-10T18:08:43","modified_gmt":"2022-06-10T17:08:43","slug":"june-2021-patch-tuesday-6-in-the-wild-exploits-to-patch","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/june-2021-patch-tuesday-6-in-the-wild-exploits-to-patch","title":{"rendered":"June 2021 Patch Tuesday: 6 In-the-wild exploits to patch"},"content":{"rendered":"<p class=\"p3\">While we have another reprieve this month in terms of total count of vulnerabilities addressed by Microsoft, we do have an increase in zero day vulnerabilities and some notable Adobe updates. This is the second month in a row we\u2019ve seen roughly half the normal number of vulnerabilities addressed by Microsoft\u2014down from last month\u2019s 55 vulnerabilities to just 50\u2014but the increase in zero day vulnerabilities to six is, of course, a concern.<\/p>\n<p class=\"p3\">The six zero day vulnerabilities plus one more from Microsoft should be at the top of your priority list, along with some Adobe Acrobat and Reader vulnerabilities that allow arbitrary code execution simply by opening a document.<\/p>\n<h2 class=\"p4\">Microsoft vulnerabilities<\/h2>\n<p class=\"p3\">This month Microsoft brings a smaller total count of patches, but more actively exploited vulnerabilities than usual. There are six listed as being under active exploitation with a seventh zero day vulnerability that isn\u2019t reported as being under active exploitation but is listed as \u201cExploitation More Likely.\u201d<\/p>\n<ul class=\"ul1\">\n<li class=\"li5\"><span class=\"s1\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31955\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2021-31955<\/span><\/a><\/span>\u2014Windows Kernel Information Disclosure Vulnerability<\/li>\n<li class=\"li5\"><span class=\"s1\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31956\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2021-31956<\/span><\/a><\/span>\u2014Windows NTFS Elevation of Privilege Vulnerability<\/li>\n<li class=\"li5\"><span class=\"s1\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-33739\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">CVE-2021-33739<\/span><\/a><\/span>\u2014Microsoft DWM Core Library Elevation of Privilege Vulnerability<\/li>\n<li class=\"li5\"><span class=\"s1\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-33742\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2021-33742<\/span><\/a><\/span>\u2014Windows MSHTML Platform Remote Code Execution Vulnerability<\/li>\n<li class=\"li5\"><span class=\"s1\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31199\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2021-31199<\/span><\/a><\/span>\u2014Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability<\/li>\n<li class=\"li5\"><span class=\"s1\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31201\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2021-31201<\/span><\/a><\/span>\u2014Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability<\/li>\n<li class=\"li5\"><span class=\"s1\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31968\" target=\"_blank\" rel=\"noopener\"><span class=\"s4\">CVE-2021-31968<\/span><\/a><\/span>\u2014Windows Remote Desktop Services Denial of Service Vulnerability<\/li>\n<\/ul>\n<p class=\"p5\">Two additional vulnerabilities of note are <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-31962\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\">CVE-2021-31962<\/span><\/a>, the Kerberos AppContainer Security feature Bypass Vulnerability, with a CVSS of 9.4, and <a href=\"https:\/\/msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-31985\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\">CVE-2021-31985<\/span><\/a>, Microsoft Defender Remote Code Execution with a CVSS of 7.8. While both are marked as \u201cExploitation Less Likely,\u201d once leveraged they could be one of the more damaging vulnerabilities for domain environments.<\/p>\n<h2 class=\"p4\">Cumulative updates<\/h2>\n<p class=\"p3\">KB5003637 for Windows 10 2004 and Windows 10 20H2, and KB5003635 for Windows 10 1909 were released this month. Both apply security fixes and a collection of bug fixes. Nothing too special of note aside from improvements to performance associated with file management and non-descript security improvements for human input devices.<\/p>\n<h2 class=\"p4\">Third-party vulnerabilities: Adobe<\/h2>\n<p class=\"p3\">This month there are more vulnerabilities related to Adobe than last month. CVE-2021-28554, CVE-2021-28554, CVE-2021-28552, and CVE-2021-28632 are all related to Adobe Reader and Acrobat. They all carry CVSS 7.8 scores and all can allow for arbitrary code execution. Make sure these are on your radar and be sure to update Reader DC to 20.21.005.20148 and Adobe Reader 2020 to 2020.004.30005.<\/p>\n<p class=\"p3\">There are a total of 41 vulnerabilities over 10 different products this month, so if you have Adobe products in your environments you should check <a href=\"https:\/\/helpx.adobe.com\/security.html\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\">here<\/span><\/a> for more.<\/p>\n<h2 class=\"p4\">Browsers<\/h2>\n<p class=\"p3\">June 4 saw Microsoft Edge stable channel update to 91.0.864.41 to address <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-33741\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\">CVE-2021-33741<\/span><\/a>.<\/p>\n<p class=\"p3\">Google Chrome also saw an update to 91.0.4472.101 to deal with <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-30551\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\">CVE-2021-30551<\/span><\/a>, which bad actors used as part of a <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/google-fixes-sixth-chrome-zero-day-exploited-in-the-wild-this-year\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\">chain attack<\/span><\/a> that also leveraged CVE-2021-33742. While this chain attack isn\u2019t seeing widespread use, it will likely propagate as more threat groups reverse engineer or gain access to PoCs.<\/p>\n<h2 class=\"p4\">Summary<\/h2>\n<p class=\"p3\">As always there is plenty to do following another Patch Tuesday. Microsoft has several zero day vulnerabilities that should get immediate attention but those can be addressed easily by patch management within N&#8209;able<sup>\u2122<\/sup> RMM or N&#8209;central<sup>\u00ae<\/sup> set to approval on <i>Critical<\/i> severity. Chrome should also get a little extra attention this month to make sure it\u2019s updated. Schedule reboots prior to patch windows or run an automated task prior to patch windows to stop Chrome processes; that will improve your success rate when applying Chrome updates via third-party patching.<\/p>\n<p class=\"p7\"><i>Lewis Pope is the Head Security Nerd at N&#8209;able. You can follow him on:<\/i><\/p>\n<p class=\"p8\"><span class=\"s6\"><i>Twitter:\u00a0<\/i><a href=\"https:\/\/twitter.com\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s7\"><i>@cybersec_nerd<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p8\"><span class=\"s6\"><i>Linkedin:\u00a0<\/i><a href=\"https:\/\/www.linkedin.com\/in\/thesecuritypope\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s7\"><i>thesecuritypope<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p9\"><span class=\"s6\"><i>Twitch:\u00a0<\/i><a href=\"https:\/\/www.twitch.tv\/cybersec_nerd\"><span class=\"s8\"><i>cybersec_nerd<\/i><\/span><\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft highlights six zero day vulnerabilities in this month\u2019s Patch Tuesday. Lewis Pope looks at these and more on today\u2019s blog.<\/p>\n","protected":false},"author":62,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-19570","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>June 2021 Patch Tuesday: 6 In-the-wild exploits to patch - N-able<\/title>\n<meta name=\"description\" content=\"Microsoft highlights six zero day vulnerabilities in this month\u2019s Patch Tuesday. Lewis Pope looks at these and more on today\u2019s blog.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/june-2021-patch-tuesday-6-in-the-wild-exploits-to-patch\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"June 2021 Patch Tuesday: 6 In-the-wild exploits to patch - N-able\" \/>\n<meta property=\"og:description\" content=\"Microsoft highlights six zero day vulnerabilities in this month\u2019s Patch Tuesday. Lewis Pope looks at these and more on today\u2019s blog.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/june-2021-patch-tuesday-6-in-the-wild-exploits-to-patch\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-10T16:23:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-10T17:08:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope-white.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"720\" \/>\n\t<meta property=\"og:image:height\" content=\"356\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lewis Pope\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope-white.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lewis Pope\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"3\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/june-2021-patch-tuesday-6-in-the-wild-exploits-to-patch#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/june-2021-patch-tuesday-6-in-the-wild-exploits-to-patch\"},\"author\":{\"name\":\"Lewis Pope\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\"},\"headline\":\"June 2021 Patch Tuesday: 6 In-the-wild exploits to patch\",\"datePublished\":\"2021-06-10T17:23:52+01:00\",\"dateModified\":\"2022-06-10T17:08:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/june-2021-patch-tuesday-6-in-the-wild-exploits-to-patch\"},\"wordCount\":600,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"articleSection\":[\"Head Nerds\",\"Patch Management\",\"Security\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/june-2021-patch-tuesday-6-in-the-wild-exploits-to-patch\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/june-2021-patch-tuesday-6-in-the-wild-exploits-to-patch\",\"name\":\"June 2021 Patch Tuesday: 6 In-the-wild exploits to patch - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2021-06-10T17:23:52+01:00\",\"dateModified\":\"2022-06-10T17:08:43+00:00\",\"description\":\"Microsoft highlights six zero day vulnerabilities in this month\u2019s Patch Tuesday. Lewis Pope looks at these and more on today\u2019s blog.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/june-2021-patch-tuesday-6-in-the-wild-exploits-to-patch#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/june-2021-patch-tuesday-6-in-the-wild-exploits-to-patch\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/june-2021-patch-tuesday-6-in-the-wild-exploits-to-patch#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Head Nerds\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/head-nerds-de\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"June 2021 Patch Tuesday: 6 In-the-wild exploits to patch\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\",\"name\":\"Lewis Pope\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"caption\":\"Lewis Pope\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"June 2021 Patch Tuesday: 6 In-the-wild exploits to patch - N-able","description":"Microsoft highlights six zero day vulnerabilities in this month\u2019s Patch Tuesday. Lewis Pope looks at these and more on today\u2019s blog.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/june-2021-patch-tuesday-6-in-the-wild-exploits-to-patch","og_locale":"de_DE","og_type":"article","og_title":"June 2021 Patch Tuesday: 6 In-the-wild exploits to patch - N-able","og_description":"Microsoft highlights six zero day vulnerabilities in this month\u2019s Patch Tuesday. Lewis Pope looks at these and more on today\u2019s blog.","og_url":"https:\/\/www.n-able.com\/de\/blog\/june-2021-patch-tuesday-6-in-the-wild-exploits-to-patch","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2021-06-10T16:23:52+00:00","article_modified_time":"2022-06-10T17:08:43+00:00","og_image":[{"width":720,"height":356,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope-white.jpg","type":"image\/jpeg"}],"author":"Lewis Pope","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope-white.jpg","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"Lewis Pope","Gesch\u00e4tzte Lesezeit":"3\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/june-2021-patch-tuesday-6-in-the-wild-exploits-to-patch#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/june-2021-patch-tuesday-6-in-the-wild-exploits-to-patch"},"author":{"name":"Lewis Pope","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae"},"headline":"June 2021 Patch Tuesday: 6 In-the-wild exploits to patch","datePublished":"2021-06-10T17:23:52+01:00","dateModified":"2022-06-10T17:08:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/june-2021-patch-tuesday-6-in-the-wild-exploits-to-patch"},"wordCount":600,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"articleSection":["Head Nerds","Patch Management","Security"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/june-2021-patch-tuesday-6-in-the-wild-exploits-to-patch","url":"https:\/\/www.n-able.com\/de\/blog\/june-2021-patch-tuesday-6-in-the-wild-exploits-to-patch","name":"June 2021 Patch Tuesday: 6 In-the-wild exploits to patch - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2021-06-10T17:23:52+01:00","dateModified":"2022-06-10T17:08:43+00:00","description":"Microsoft highlights six zero day vulnerabilities in this month\u2019s Patch Tuesday. Lewis Pope looks at these and more on today\u2019s blog.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/june-2021-patch-tuesday-6-in-the-wild-exploits-to-patch#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/june-2021-patch-tuesday-6-in-the-wild-exploits-to-patch"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/june-2021-patch-tuesday-6-in-the-wild-exploits-to-patch#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Head Nerds","item":"https:\/\/www.n-able.com\/de\/blog\/category\/head-nerds-de"},{"@type":"ListItem","position":2,"name":"June 2021 Patch Tuesday: 6 In-the-wild exploits to patch"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae","name":"Lewis Pope","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","caption":"Lewis Pope"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/19570","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=19570"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/19570\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=19570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}