{"id":22417,"date":"2021-08-11T15:46:14","date_gmt":"2021-08-11T14:46:14","guid":{"rendered":"https:\/\/www.n-able.com\/?p=22417"},"modified":"2022-06-10T18:07:19","modified_gmt":"2022-06-10T17:07:19","slug":"august-2021-patch-tuesday-servicing-stack-updates-and-a-point-and-print-reprieve","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/es\/blog\/august-2021-patch-tuesday-servicing-stack-updates-and-a-point-and-print-reprieve","title":{"rendered":"August 2021 Patch Tuesday: Servicing stack updates and a point and print reprieve\u00a0"},"content":{"rendered":"<p class=\"p2\">August saw a significant drop in the total number of vulnerabilities addressed in this month\u2019s Patch Tuesday. Considering there are only 44 vulnerabilities in the release and one vulnerability by an out-of-band update for <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34466\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">CVE-2021-34466<\/span><\/a>, the load on teams responsible for patching should be almost half what it was last month.<\/p>\n<p class=\"p2\">One notable item this month is a new <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/ADV990001\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">servicing stack update<\/span><\/a> everyone should make sure gets pushed. There will be a deeper dive down below, but some good news is that four of the vulnerabilities addressed by security updates this month tackle previous shortcomings with patches from as far back as March 2021. One of those vulnerabilities is associated with point and print. It should help tighten up security around abuse of print features in Windows but it may mean operational changes for some MSPs.<\/p>\n<h2 class=\"p3\">Microsoft vulnerabilities<\/h2>\n<p class=\"p2\">Microsoft has delivered patches for 44 vulnerabilities with eight marked as <i>Exploitation More Likely<\/i> and three as zero days with one of those marked as <i>Exploitation Detected<\/i>. With only seven marked as <i>Critical<\/i> it\u2019s worth thinking about which vulnerabilities to patch first and why. If you only rely on the critical severity rating you may leave vulnerabilities in place that are more likely to be exploited than critical vulnerabilities. Patching based on severity rating is easy and a default action for most teams, but prioritizing vulnerabilities based on their likelihood to create an unacceptable risk in your environment can help significantly improve your risk posture.<\/p>\n<table class=\"t1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p4\"><strong>CVE<\/strong><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\"><strong>Description<\/strong><\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p4\"><strong>Exploitability<\/strong><\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p4\"><strong>Severity<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-36948%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2021-36948\" target=\"_blank\" rel=\"noopener\">CVE-2021-36948<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Windows Update Medic Service Elevation of Privilege Vulnerability<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation Detected<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">High<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-36947%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2021-36947\" target=\"_blank\" rel=\"noopener\">CVE-2021-36947<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Windows Print Spooler Remote Code Execution Vulnerability<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">High<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-36942%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2021-36942\" target=\"_blank\" rel=\"noopener\">CVE-2021-36942<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Windows LSA Spoofing Vulnerability<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">High<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-36936%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2021-36936\" target=\"_blank\" rel=\"noopener\">CVE-2021-36936<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Windows Print Spooler Remote Code Execution Vulnerability<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">High<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-36934%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2021-36934\" target=\"_blank\" rel=\"noopener\">CVE-2021-36934<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Windows Elevation of Privilege Vulnerability<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">High<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34535%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2021-34535\" target=\"_blank\" rel=\"noopener\">CVE-2021-34535<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Remote Desktop Client Remote Code Execution Vulnerability<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">High<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34481%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2021-34481\" target=\"_blank\" rel=\"noopener\">CVE-2021-34481<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Windows Print Spooler Remote Code Execution Vulnerability<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">High<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34480%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2021-34480\" target=\"_blank\" rel=\"noopener\">CVE-2021-34480<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Scripting Engine Memory Corruption Vulnerability<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Medium<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-26432%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2021-26432\" target=\"_blank\" rel=\"noopener\">CVE-2021-26432<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Windows Services for NFS ONCRPC XDR Driver Remote Code Execution Vulnerability<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-26424%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2021-26424\" target=\"_blank\" rel=\"noopener\">CVE-2021-26424<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Windows TCP\/IP Remote Code Execution Vulnerability<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Critical<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 class=\"p9\">The end of print nightmares?<\/h2>\n<p class=\"p2\">With patches available this month to contend with CVE-2021-34481, hopefully we\u2019ll see a drop in vulnerabilities affecting Windows print services. One of the remediations that patches for CVE-2021-34481 removes the ability for non-administrators to install print drivers with the point and print feature. This likely means MSPs will have more support tickets for end users with printer-related issues since they will no longer be able to self-manage their printer setup in certain environments. If you have a need to roll back the protection this security update will apply, Microsoft has guidance on how <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/kb5005652-manage-new-point-and-print-default-driver-installation-behavior-cve-2021-34481-873642bf-2634-49c5-a23b-6d8e9a302872\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">here<\/span><\/a>.<\/p>\n<p class=\"p2\">The PetitPotam NTLM attack <a href=\"http:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-36942\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">CVE-2021-36942<\/span><\/a> also gets a fix so that\u2019s one less headline-making vulnerability to worry about once patches are applied.<\/p>\n<h2 class=\"p3\">Cumulative updates<\/h2>\n<p class=\"p2\"><span class=\"s1\"><a href=\"https:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=KB5005033\" target=\"_blank\" rel=\"noopener\">KB5005033<\/a><\/span> and <a href=\"https:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=KB5005031\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">KB5005031<\/span><\/a> cumulative updates were released with the typical previous security fixes included. Also included are a collection of non-security improvements related to game mode performance issues and power plan functions.<\/p>\n<h2 class=\"p3\">Servicing stack update<\/h2>\n<p class=\"p2\">Windows 10 21H1, Windows 10 20H2, Windows 10 2004, Windows 10 1909, and Windows 10 1809 all received a servicing stack update this month. They are marked as critical updates as they are needed to ensure proper Windows update functionality moving forward on those builds. Read more about servicing stack updates <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/deployment\/update\/servicing-stack-updates\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">here<\/span><\/a>.<\/p>\n<h2 class=\"p3\">Summary<\/h2>\n<p class=\"p2\">As always make sure you have established patching processes for evaluation, testing and pushing into production. With the new servicing stack update it\u2019s a good time to perform audits of your environments to ensure compliance with whatever your security controls dictate, and that patching will continue to work with as few issues as possible.<\/p>\n<p class=\"p2\">If you have traditionally only dealt with patches by applying them based on their severity now is the time to start including prioritization of patches for zero days, exploitation detected and exploitation more likely vulnerabilities in your <a href=\"https:\/\/www.n-able.com\/features\/windows-patch-management?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">patch management<\/span><\/a> routines.<\/p>\n<p class=\"p10\"><i>Lewis Pope is the head security nerd at N&#8209;able. You can follow him on:<\/i><\/p>\n<p class=\"p11\"><span class=\"s3\"><i>Twitter:\u00a0<\/i><a href=\"https:\/\/twitter.com\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s4\"><i>@cybersec_nerd<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p11\"><span class=\"s3\"><i>Linkedin:\u00a0<\/i><a href=\"https:\/\/www.linkedin.com\/in\/thesecuritypope\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s4\"><i>thesecuritypope<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p11\"><span class=\"s3\"><i>Twitch:\u00a0<\/i><a href=\"https:\/\/www.twitch.tv\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s4\"><i>cybersec_nerd<\/i><\/span><\/a><\/span><\/p>\n<p>&nbsp;<\/p>\n<p>\u00a9 2021 N&#8209;able Solutions ULC and N&#8209;able Technologies Ltd. All rights reserved.<\/p>\n<p>The N&#8209;able trademarks, service marks, and logos are the exclusive property of N&#8209;able Solutions ULC and N&#8209;able Technologies Ltd.\u00a0 All other trademarks are the property of their respective owners.<\/p>\n<p>This document is provided for informational purposes only. Information and views expressed in this document may change and\/or may not be applicable to you.\u00a0 N&#8209;able makes no warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information contained herein.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>August sees a far lighter load for teams responsible for patching, with just 44 vulnerabilities addressed, although there are some notable ones in there. Lewis Pope takes a closer look.<\/p>\n","protected":false},"author":62,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-22417","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>August 2021 Patch Tuesday: Servicing stack updates and a point and print reprieve\u00a0 - N-able<\/title>\n<meta name=\"description\" content=\"August sees a lighter load for teams responsible for patching, with just 44 vulnerabilities addressed, although there are some notable ones.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/es\/blog\/august-2021-patch-tuesday-servicing-stack-updates-and-a-point-and-print-reprieve\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"August 2021 Patch Tuesday: Servicing stack updates and a point and print reprieve\u00a0 - N-able\" \/>\n<meta property=\"og:description\" content=\"August sees a lighter load for teams responsible for patching, with just 44 vulnerabilities addressed, although there are some notable ones.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/es\/blog\/august-2021-patch-tuesday-servicing-stack-updates-and-a-point-and-print-reprieve\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-11T14:46:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-10T17:07:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope-white.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"720\" \/>\n\t<meta property=\"og:image:height\" content=\"356\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lewis Pope\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope-white.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lewis Pope\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/august-2021-patch-tuesday-servicing-stack-updates-and-a-point-and-print-reprieve#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/august-2021-patch-tuesday-servicing-stack-updates-and-a-point-and-print-reprieve\"},\"author\":{\"name\":\"Lewis Pope\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\"},\"headline\":\"August 2021 Patch Tuesday: Servicing stack updates and a point and print reprieve\u00a0\",\"datePublished\":\"2021-08-11T15:46:14+01:00\",\"dateModified\":\"2022-06-10T17:07:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/august-2021-patch-tuesday-servicing-stack-updates-and-a-point-and-print-reprieve\"},\"wordCount\":801,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"articleSection\":[\"Head Nerds\",\"Patch Management\",\"Security\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/august-2021-patch-tuesday-servicing-stack-updates-and-a-point-and-print-reprieve\",\"url\":\"https:\/\/www.n-able.com\/es\/blog\/august-2021-patch-tuesday-servicing-stack-updates-and-a-point-and-print-reprieve\",\"name\":\"August 2021 Patch Tuesday: Servicing stack updates and a point and print reprieve\u00a0 - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es#website\"},\"datePublished\":\"2021-08-11T15:46:14+01:00\",\"dateModified\":\"2022-06-10T17:07:19+00:00\",\"description\":\"August sees a lighter load for teams responsible for patching, with just 44 vulnerabilities addressed, although there are some notable ones.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/august-2021-patch-tuesday-servicing-stack-updates-and-a-point-and-print-reprieve#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/es\/blog\/august-2021-patch-tuesday-servicing-stack-updates-and-a-point-and-print-reprieve\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/august-2021-patch-tuesday-servicing-stack-updates-and-a-point-and-print-reprieve#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Head Nerds\",\"item\":\"https:\/\/www.n-able.com\/es\/blog\/category\/head-nerds-es\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"August 2021 Patch Tuesday: Servicing stack updates and a point and print reprieve\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/es#website\",\"url\":\"https:\/\/www.n-able.com\/es\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/es?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/es#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/es\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\",\"name\":\"Lewis Pope\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"caption\":\"Lewis Pope\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"August 2021 Patch Tuesday: Servicing stack updates and a point and print reprieve\u00a0 - N-able","description":"August sees a lighter load for teams responsible for patching, with just 44 vulnerabilities addressed, although there are some notable ones.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/es\/blog\/august-2021-patch-tuesday-servicing-stack-updates-and-a-point-and-print-reprieve","og_locale":"es_ES","og_type":"article","og_title":"August 2021 Patch Tuesday: Servicing stack updates and a point and print reprieve\u00a0 - N-able","og_description":"August sees a lighter load for teams responsible for patching, with just 44 vulnerabilities addressed, although there are some notable ones.","og_url":"https:\/\/www.n-able.com\/es\/blog\/august-2021-patch-tuesday-servicing-stack-updates-and-a-point-and-print-reprieve","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2021-08-11T14:46:14+00:00","article_modified_time":"2022-06-10T17:07:19+00:00","og_image":[{"width":720,"height":356,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope-white.jpg","type":"image\/jpeg"}],"author":"Lewis Pope","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope-white.jpg","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"Lewis Pope","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/es\/blog\/august-2021-patch-tuesday-servicing-stack-updates-and-a-point-and-print-reprieve#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/es\/blog\/august-2021-patch-tuesday-servicing-stack-updates-and-a-point-and-print-reprieve"},"author":{"name":"Lewis Pope","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae"},"headline":"August 2021 Patch Tuesday: Servicing stack updates and a point and print reprieve\u00a0","datePublished":"2021-08-11T15:46:14+01:00","dateModified":"2022-06-10T17:07:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/august-2021-patch-tuesday-servicing-stack-updates-and-a-point-and-print-reprieve"},"wordCount":801,"publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"articleSection":["Head Nerds","Patch Management","Security"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/es\/blog\/august-2021-patch-tuesday-servicing-stack-updates-and-a-point-and-print-reprieve","url":"https:\/\/www.n-able.com\/es\/blog\/august-2021-patch-tuesday-servicing-stack-updates-and-a-point-and-print-reprieve","name":"August 2021 Patch Tuesday: Servicing stack updates and a point and print reprieve\u00a0 - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/es#website"},"datePublished":"2021-08-11T15:46:14+01:00","dateModified":"2022-06-10T17:07:19+00:00","description":"August sees a lighter load for teams responsible for patching, with just 44 vulnerabilities addressed, although there are some notable ones.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/es\/blog\/august-2021-patch-tuesday-servicing-stack-updates-and-a-point-and-print-reprieve#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/es\/blog\/august-2021-patch-tuesday-servicing-stack-updates-and-a-point-and-print-reprieve"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/es\/blog\/august-2021-patch-tuesday-servicing-stack-updates-and-a-point-and-print-reprieve#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Head Nerds","item":"https:\/\/www.n-able.com\/es\/blog\/category\/head-nerds-es"},{"@type":"ListItem","position":2,"name":"August 2021 Patch Tuesday: Servicing stack updates and a point and print reprieve\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/es#website","url":"https:\/\/www.n-able.com\/es","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/es?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/es#organization","name":"N-able","url":"https:\/\/www.n-able.com\/es","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae","name":"Lewis Pope","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","caption":"Lewis Pope"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/22417","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/comments?post=22417"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/22417\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/media?parent=22417"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}