{"id":23803,"date":"2021-09-16T17:18:43","date_gmt":"2021-09-16T16:18:43","guid":{"rendered":"https:\/\/www.n-able.com\/?p=23803"},"modified":"2022-06-10T18:05:42","modified_gmt":"2022-06-10T17:05:42","slug":"september-2021-patch-tuesday-end-of-service-for-windows-10-2004-on-the-horizon","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/september-2021-patch-tuesday-end-of-service-for-windows-10-2004-on-the-horizon","title":{"rendered":"September 2021 Patch Tuesday: end of service for Windows 10 2004 on the horizon"},"content":{"rendered":"<p class=\"p3\">This Patch Tuesday brings a slightly higher number of vulnerability fixes than last month, but still not up to the levels of earlier in the year. Security patches for 60 vulnerabilities\u2014along with fixes for Microsoft Edge\u2014are a key part of this month\u2019s round of fixes from Microsoft. There are also some notable ones being addressed by Apple and Adobe worth covering.<\/p>\n<p class=\"p3\">We may have called it a little early in <a href=\"https:\/\/www.n-able.com\/blog\/august-2021-patch-tuesday-servicing-stack-updates-and-a-point-and-print-reprieve\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">last month\u2019s Patch Tuesday<\/span><\/a>, but it looks like PrintNightmare vulnerabilities have all been addressed. So for the moment, no more workarounds are needed for these\u2014just ensuring appropriate updates are in place should be enough.<\/p>\n<p class=\"p3\">Before we get into the details, let\u2019s take a moment to reflect on the scale of the patch management challenge MSPs face. WSUS, <a href=\"https:\/\/www.n-able.com\/features\/windows-patch-management?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">patch management from N&#8209;able<\/span><\/a>, and other tools have made it much easier to handle patching endpoints. This ease sometimes belies the complexity of matching specific updates to specific builds of OS, and then validating and reporting on those. This month, Microsoft has released fixes for 60 vulnerabilities, which represents a possibility of 1248 different combinations of patches for specific OS and software versions. A good patch management solution will make that manageable in your day-to-day operations. This also helps illustrates why the let-auto-update-handle-it approach can\u2019t keep up with an MSP\u2019s obligation to validate systems are properly updated and protected from known vulnerabilities. Trying to validate without a centralized solution is unachievable.<\/p>\n<h2 class=\"p5\">Microsoft vulnerabilities<\/h2>\n<p class=\"p3\">A total of 86 vulnerabilities were addressed this month by Microsoft. Within that we have two zero days, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-40444\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">CVE-2021-40444<\/span><\/a> and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-36968\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">CVE-2021-36968<\/span><\/a><span class=\"s1\">,<\/span> that received fixes. Both these vulnerabilities should be on your prioritization list, but CVE-2021-40444 should be on top because it is seeing active exploitation.<\/p>\n<p class=\"p3\">CVE-2021-40444 was an MSHTML vulnerability exploited by Microsoft Office documents with malicious ActiveX controls embedded. If you can\u2019t apply the appropriate <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/september-14-2021-kb5005633-monthly-rollup-cc6f560a-86da-4540-8bb1-df118fa45eb8\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">Monthly Rollup<\/span><\/a> or the <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/september-14-2021-kb5005615-security-only-update-78aa3b33-a4d9-49ad-bb28-1394943a3d7b\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">security-only<\/span><\/a> update, we have Microsoft\u2019s recommended workaround mitigation available in the Automation Cookbook as a service monitor for <a href=\"https:\/\/me.n-able.com\/s\/article\/CVE-2021-40444-Mitigation-NC?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">N&#8209;central<\/span><\/a><span class=\"s1\"><sup>\u00ae<\/sup><\/span> or a 24\/7\/DSC for <a href=\"https:\/\/me.n-able.com\/s\/article\/CVE-2021-36934-Mitigation-RMM?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">RMM<\/span><\/a>.<\/p>\n<p class=\"p3\">We may also be able to entertain the thought that PrintNightmare is over. <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-36958\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">CVE-2021-36958<\/span><\/a> received security updates that should fix any remaining PrintNightmare vulnerabilities not addressed in the previous security fixes provided by Microsoft. Since this is another actively exploited vulnerability, CVE-2021-36958 should also be on top of your prioritization list.<\/p>\n<h2 class=\"p5\">Vulnerability prioritization<\/h2>\n<p class=\"p3\">If you ask a room full of system admins how they prioritize which vulnerabilities should be patched first, you\u2019re likely to get more than one answer. However, most of those answers will include applying patches based on the severity rating given to it by the vendor. So almost everyone will agree that anything marked Critical should be patched ASAP, but Important and High may see days\u2014or even weeks\u2014of delay before they are applied. This unfortunately misses something many don\u2019t consider when prioritizing patches, which is the likelihood a vulnerability will be leveraged in attacks or if it\u2019s already part of current attacks. The table below shows not only Critical vulnerabilities, but also their current exploit status. The vulnerability marked as Important with Exploitation Detected is more likely to cause complications in an environment than one marked as Critical, but Exploitation Less Likely.<\/p>\n<table class=\"t1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\">CVE<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p6\">Description<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p7\">Exploitability<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p7\">Severity<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p8\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-40444%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2021-40444\" target=\"_blank\" rel=\"noopener\">CVE-2021-40444<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p9\">Microsoft MSHTML Remote Code Execution Vulnerability<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p9\">Exploitation Detected<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p6\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p8\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-38671%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2021-38671\" target=\"_blank\" rel=\"noopener\">CVE-2021-38671<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p9\">Windows Print Spooler Elevation of Privilege Vulnerability<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p9\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p6\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p13\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-38639%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2021-38639\" target=\"_blank\" rel=\"noopener\">CVE-2021-38639<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p9\">Win32k Elevation of Privilege Vulnerability<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p9\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p6\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p8\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-38633%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2021-38633\" target=\"_blank\" rel=\"noopener\">CVE-2021-38633<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p9\">Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p9\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p6\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p8\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-36975%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2021-36975\" target=\"_blank\" rel=\"noopener\">CVE-2021-36975<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p9\">Win32k Elevation of Privilege Vulnerability<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p9\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p6\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p8\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-36963%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2021-36963\" target=\"_blank\" rel=\"noopener\">CVE-2021-36963<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p9\">Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p9\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p6\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p8\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-36958%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2021-36958\" target=\"_blank\" rel=\"noopener\">CVE-2021-36958<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p9\">Windows Print Spooler Remote Code Execution Vulnerability<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p9\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p6\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p8\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-36955%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2021-36955\" target=\"_blank\" rel=\"noopener\">CVE-2021-36955<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p9\">Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p9\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p6\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p15\"><span class=\"s2\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-38647\" target=\"_blank\" rel=\"noopener\">CVE-2021-38647<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p16\">Open Management Infrastructure Remote Code Execution Vulnerability<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p6\">Exploitation Less Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p6\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p17\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-26435\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2021-26435<\/span><\/a><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p16\">Windows Scripting Engine Memory Corruption Vulnerability<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p6\">Exploitation Less Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p6\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p15\"><span class=\"s2\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-36965\" target=\"_blank\" rel=\"noopener\">CVE-2021-36965<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p16\">Windows WLAN AutoConfig Service Remote Code Execution Vulnerability<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p6\">Exploitation Less Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p6\">Critical<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 class=\"p5\">Cumulative updates<\/h2>\n<p class=\"p3\"><span class=\"s1\"><a href=\"https:\/\/support.microsoft.com\/topic\/292cf8ed-f97b-4cd8-9883-32b71e3e6b44\" target=\"_blank\" rel=\"noopener\">KB5005565<\/a><\/span> and <a href=\"https:\/\/support.microsoft.com\/topic\/c2535eb5-9e8a-4127-a923-0c6a643bba1d\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">KB5005566<\/span><\/a> cumulative updates were released with the typical previous security fixes included. Also included are some notable bug fixes\u2014one where Bluetooth headsets would only work for voice calls and another where external monitors connected to docking stations may not work after hibernation.<\/p>\n<p class=\"p5\">End of service for Windows 10 2004<\/p>\n<p class=\"p3\">Joining previous Windows builds that hit EoS this year, Windows 10 2004 will no longer receive security updates after December 14, 2021. That\u2019s only three months to plan for transition to newer builds. If you don\u2019t already have arrangements in place, then today is the day to start.<\/p>\n<h2 class=\"p5\">Apple<\/h2>\n<p class=\"p3\">Apple released security updates for iOS to fix zero-day vulnerabilities that are currently seeing attacks in the wild. If you are managing iOS devices, getting these in place should be a top priority since the vulnerabilities are being leveraged by nation-state backed actors. Check Apple\u2019s recent <a href=\"https:\/\/support.apple.com\/en-us\/HT201222\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">security advisories<\/span><\/a> for more information.<\/p>\n<h2 class=\"p5\">Summary<\/h2>\n<p class=\"p3\">As always, make sure you have established patching processes for evaluation, testing, and pushing into production. With the new, available Servicing Stack Updates, it\u2019s a good time to audit your environments to ensure compliance with your security controls, and that patching will continue to work with as few issues as possible.<\/p>\n<p class=\"p3\">If you have traditionally only dealt with patches by applying them based on their severity, now is the time to start including prioritization of patches for Zero-Day, Exploitation Detected, and Exploitation More Likely vulnerabilities in your <a href=\"https:\/\/www.n-able.com\/features\/windows-patch-management?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">patch management<\/span><\/a> routines.<\/p>\n<p class=\"p19\"><i>Lewis Pope is the Head Security Nerd at N&#8209;able. You can follow him on:<\/i><\/p>\n<p class=\"p20\"><span class=\"s4\"><i>Twitter:\u00a0<\/i><a href=\"https:\/\/twitter.com\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\"><i>@cybersec_nerd<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p20\"><span class=\"s4\"><i>LinkedIn:\u00a0<\/i><a href=\"https:\/\/www.linkedin.com\/in\/thesecuritypope\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\"><i>thesecuritypope<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p20\"><span class=\"s4\"><i>Twitch:\u00a0<\/i><a href=\"https:\/\/www.twitch.tv\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\"><i>cybersec_nerd<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p19\">\u00a9 2021 N&#8209;able Solutions ULC and N&#8209;able Technologies Ltd. All rights reserved.<\/p>\n<p class=\"p19\">The N&#8209;able trademarks, service marks, and logos are the exclusive property of N&#8209;able Solutions ULC and N&#8209;able Technologies Ltd.\u00a0 All other trademarks are the property of their respective owners.<\/p>\n<p class=\"p19\">This document is provided for informational purposes only. Information and views expressed in this document may change and\/or may not be applicable to you.\u00a0 N&#8209;able makes no warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information contained herein.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>September sees a modest increase in vulnerability fixes on last month, with Apple, Adobe, and PrintNightmare getting notable attention. Lewis Pope takes a deep dive into this month\u2019s fixes.<\/p>\n","protected":false},"author":62,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-23803","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>September 2021 Patch Tuesday: end of service for Windows 10 2004 on the horizon - N-able<\/title>\n<meta name=\"description\" content=\"September sees a modest increase in vulnerability fixes on last month, with Apple, Adobe, and PrintNightmare getting notable attention.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/september-2021-patch-tuesday-end-of-service-for-windows-10-2004-on-the-horizon\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"September 2021 Patch Tuesday: end of service for Windows 10 2004 on the horizon - N-able\" \/>\n<meta property=\"og:description\" content=\"September sees a modest increase in vulnerability fixes on last month, with Apple, Adobe, and PrintNightmare getting notable attention.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/september-2021-patch-tuesday-end-of-service-for-windows-10-2004-on-the-horizon\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-16T16:18:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-10T17:05:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"720\" \/>\n\t<meta property=\"og:image:height\" content=\"356\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lewis Pope\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lewis Pope\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"5\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/september-2021-patch-tuesday-end-of-service-for-windows-10-2004-on-the-horizon#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/september-2021-patch-tuesday-end-of-service-for-windows-10-2004-on-the-horizon\"},\"author\":{\"name\":\"Lewis Pope\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\"},\"headline\":\"September 2021 Patch Tuesday: end of service for Windows 10 2004 on the horizon\",\"datePublished\":\"2021-09-16T17:18:43+01:00\",\"dateModified\":\"2022-06-10T17:05:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/september-2021-patch-tuesday-end-of-service-for-windows-10-2004-on-the-horizon\"},\"wordCount\":1063,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"articleSection\":[\"Head Nerds\",\"Patch Management\",\"Security\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/september-2021-patch-tuesday-end-of-service-for-windows-10-2004-on-the-horizon\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/september-2021-patch-tuesday-end-of-service-for-windows-10-2004-on-the-horizon\",\"name\":\"September 2021 Patch Tuesday: end of service for Windows 10 2004 on the horizon - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2021-09-16T17:18:43+01:00\",\"dateModified\":\"2022-06-10T17:05:42+00:00\",\"description\":\"September sees a modest increase in vulnerability fixes on last month, with Apple, Adobe, and PrintNightmare getting notable attention.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/september-2021-patch-tuesday-end-of-service-for-windows-10-2004-on-the-horizon#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/september-2021-patch-tuesday-end-of-service-for-windows-10-2004-on-the-horizon\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/september-2021-patch-tuesday-end-of-service-for-windows-10-2004-on-the-horizon#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"September 2021 Patch Tuesday: end of service for Windows 10 2004 on the horizon\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\",\"name\":\"Lewis Pope\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"caption\":\"Lewis Pope\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"September 2021 Patch Tuesday: end of service for Windows 10 2004 on the horizon - N-able","description":"September sees a modest increase in vulnerability fixes on last month, with Apple, Adobe, and PrintNightmare getting notable attention.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/september-2021-patch-tuesday-end-of-service-for-windows-10-2004-on-the-horizon","og_locale":"de_DE","og_type":"article","og_title":"September 2021 Patch Tuesday: end of service for Windows 10 2004 on the horizon - N-able","og_description":"September sees a modest increase in vulnerability fixes on last month, with Apple, Adobe, and PrintNightmare getting notable attention.","og_url":"https:\/\/www.n-able.com\/de\/blog\/september-2021-patch-tuesday-end-of-service-for-windows-10-2004-on-the-horizon","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2021-09-16T16:18:43+00:00","article_modified_time":"2022-06-10T17:05:42+00:00","og_image":[{"width":720,"height":356,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope.jpg","type":"image\/jpeg"}],"author":"Lewis Pope","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope.jpg","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"Lewis Pope","Gesch\u00e4tzte Lesezeit":"5\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/september-2021-patch-tuesday-end-of-service-for-windows-10-2004-on-the-horizon#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/september-2021-patch-tuesday-end-of-service-for-windows-10-2004-on-the-horizon"},"author":{"name":"Lewis Pope","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae"},"headline":"September 2021 Patch Tuesday: end of service for Windows 10 2004 on the horizon","datePublished":"2021-09-16T17:18:43+01:00","dateModified":"2022-06-10T17:05:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/september-2021-patch-tuesday-end-of-service-for-windows-10-2004-on-the-horizon"},"wordCount":1063,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"articleSection":["Head Nerds","Patch Management","Security"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/september-2021-patch-tuesday-end-of-service-for-windows-10-2004-on-the-horizon","url":"https:\/\/www.n-able.com\/de\/blog\/september-2021-patch-tuesday-end-of-service-for-windows-10-2004-on-the-horizon","name":"September 2021 Patch Tuesday: end of service for Windows 10 2004 on the horizon - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2021-09-16T17:18:43+01:00","dateModified":"2022-06-10T17:05:42+00:00","description":"September sees a modest increase in vulnerability fixes on last month, with Apple, Adobe, and PrintNightmare getting notable attention.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/september-2021-patch-tuesday-end-of-service-for-windows-10-2004-on-the-horizon#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/september-2021-patch-tuesday-end-of-service-for-windows-10-2004-on-the-horizon"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/september-2021-patch-tuesday-end-of-service-for-windows-10-2004-on-the-horizon#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/de\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"September 2021 Patch Tuesday: end of service for Windows 10 2004 on the horizon"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae","name":"Lewis Pope","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","caption":"Lewis Pope"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/23803","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=23803"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/23803\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=23803"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}