{"id":5088,"date":"2020-08-12T23:27:10","date_gmt":"2020-08-12T22:27:10","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5088"},"modified":"2022-06-10T18:17:03","modified_gmt":"2022-06-10T17:17:03","slug":"august-2020-patch-tuesday-no-emergencies-plenty-review","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/es\/blog\/august-2020-patch-tuesday-no-emergencies-plenty-review","title":{"rendered":"August 2020 Patch Tuesday\u2014No Emergencies but Plenty to Review"},"content":{"rendered":"<p>This Patch Tuesday follows the 2020 trend of 100+ vulnerabilities, but unlike last month, no major alarm bells to sound. August brings us fixes for 120 unique vulnerabilities, with 17 of them listed as \u201cCritical,\u201d with 97 listed as \u201cImportant.\u201d Only a handful are listed as \u201cLow\u201d or \u201cModerate.\u201d There are, however, a few listed as \u201cExploitation More Likely,\u201d and one is listed as \u201cExploitation Detected.\u201d This means it\u2019s still important to deploy patches in a timely manner and make sure your other layers of security are up to date and functioning properly. As always, we\u2019ll focus on the vulnerabilities listed as \u201cCritical\u201d and a few others that still need attention.<\/p>\n<h3>Operating systems<\/h3>\n<p><a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1472\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1472<\/a>\u00a0is a\u00a0<b>Netlogon Elevation of Privilege Vulnerability\u00a0<\/b>that could allow an attacker to gain Domain Administrator privileges if it were to send a specially crafted packet using the Netlogon Remote Protocol to a Domain Controller. It\u2019s listed as \u201cExploitation Less Likely\u201d by Microsoft.<\/p>\n<p>According to Microsoft, this fix will require two stages: this month\u2019s update and a follow-on update in Q1 of 2021 to enforce the changes being made to the secure channel connections. With this update, you\u2019ll see new Event IDs for systems that use the vulnerable connections and can enable enforcement now with a registry change. There\u2019s also a new Group Policy object that will allow you to make exceptions for non-compliant systems. Once the second phase is rolled out, the insecure connections will be refused, even for those systems you\u2019ve configured an exclusion for. In short, it\u2019s important to read the FAQ in the linked article and the accompanying documentation (supplied<a class=\"ext\" href=\"https:\/\/support.microsoft.com\/en-in\/help\/4557222\/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assoc\" target=\"_blank\" rel=\"noopener noreferrer\">\u00a0here<\/a>) to fully understand the implications of these changes. That way, you can be prepared when the enforcement phase comes next year. This vulnerability affects all Server Operating systems from 2008R2 up to current version, including Core versions.<\/p>\n<p>There are five vulnerabilities with the title\u00a0<b>Media Foundation Memory Corruption Vulnerability\u00a0<\/b>this month, with affected operating systems being slightly different.<\/p>\n<p><a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1477\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1477<\/a>,\u00a0<a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1379\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1379<\/a>, and\u00a0<a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1554\" target=\"_blank\" rel=\"noopener noreferrer\">CVE 2020-1554<\/a>\u00a0are Remote Code Execution vulnerabilities that could grant an attacker full control over the system if a user were tricked into opening a specially crafted document or visited a malicious webpage. They\u2019re both rated as \u201cExploitation Less Likely\u201d and affect Windows 7 up to the current version of Windows 10, including the corresponding Server versions.<\/p>\n<p><a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1492\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1492<\/a>\u00a0has the same description as above but only affects Windows 8.1 through the current version of Windows 10 and Server 2012R2 and above, including Core installations.<\/p>\n<p><a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1525\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1525<\/a>\u00a0only affects all versions of Windows 10 up to the current version, including Server versions.<\/p>\n<p><a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1560\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1560<\/a>\u00a0and\u00a0<a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1585\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1585<\/a>\u00a0are both titled\u00a0<b>Microsoft Windows Codecs Library Remote Code Execution Vulnerability.\u00a0<\/b>They address how images are handled in memory. This fixes an issue where a user could be tricked into opening the image file and granting the attacker access to the system. They\u2019re listed as \u201cExploitation Less Likely\u201d and affect Windows 10 from version 1709 up to the current version, including the corresponding Server editions.<\/p>\n<p><a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1574\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1574<\/a>\u00a0has the same description as above but only affects Windows 10 version 1909 and 2004.<\/p>\n<p>Next up is\u00a0<a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1339\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1339<\/a>, a\u00a0<b>Windows Media Remote Code Execution Vulnerability\u00a0<\/b>in Windows 7 up to the current version of Windows 10 (including all Server versions). It\u2019s a remote code execution vulnerability that would grant an attacker full rights to a system if the user were to open a document or visit a webpage.<\/p>\n<p><a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1046\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1046<\/a>\u00a0is a\u00a0<b>.NET Framework Remote Code Execution Vulnerability\u00a0<\/b>that would require an attacker to upload a specially crafted file to a web application that used one of the affected versions of .Net Framework. The vulnerability affects .Net Framework 2.0 SP2, 3.5, 3.5.1, 4.7.2, and 4.8 on all supported operating systems.<\/p>\n<h3>Browsers<\/h3>\n<p>There are a few that need some attention here, as there are \u201cExploitation More Likely\u201d ratings and one \u201cExploitation Detected\u201d in this month\u2019s browser patches.<\/p>\n<p><a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1380\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1380<\/a>\u00a0is a\u00a0<b>Scripting Engine Memory Corruption Vulnerability\u00a0<\/b>in Internet Explorer 11 on all supported operating systems. It\u2019s a remote code execution vulnerability that can be triggered if a user visits a malicious website. Microsoft indicates there are active attacks against this vulnerability with the \u201cExploitation Detected\u201d rating, so browsers should get special attention this month.<\/p>\n<p>Another\u00a0<b>Scripting Engine Memory Corruption Vulnerability<\/b>,\u00a0<a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1570\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1570<\/a>\u00a0, found in Internet Explorer 11 on all supported operating systems, and Internet Explorer 9 on Server 2008, is listed as \u201cExploitation More Likely.\u201d<\/p>\n<p>The final\u00a0<b>Scripting Engine Memory Corruption Vulnerability\u00a0<\/b>this month affects Edge. This one,\u00a0<a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1555\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1555<\/a>, is in the EdgeHTML version of the Edge browser, on all versions of Windows 10 that support it. It\u2019s listed as \u201cExploitation Less Likely.\u201d<\/p>\n<p>Another \u201cExploitation More Likely\u201d rating goes to\u00a0<a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1567\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1567<\/a>, a\u00a0<b>MSHTML Engine Remote Code Execution Vulnerability\u00a0<\/b>in IE11. This vulnerability requires the user to be tricked into editing a file and would grant the same privileges as the logged-on user.<\/p>\n<p>The last \u201cCritical\u201d browser vulnerability is\u00a0<a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1568\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1568<\/a>, the\u00a0<b>Microsoft Edge PDF Remote Code Execution Vulnerability\u00a0<\/b>in the Edge-HTML version of Microsoft Edge. This vulnerability grants an attacker the same rights as the logged-on user if the user were to access a malicious PDF or a website that hosted it. It\u2019s listed as \u201cExploitation Less Likely.\u201d<\/p>\n<h3>Other applications<\/h3>\n<p>The final \u201cCritical\u201d is a\u00a0<b>Microsoft Outlook Memory Corruption Vulnerability<\/b>.\u00a0<a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1483\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1483<\/a>\u00a0is a remote code execution vulnerability that would grant the same rights as the user if they were to access a file or visit a website that hosts the file. Microsoft states in the article that this vulnerability is rated as \u201cCritical\u201d mainly because the Preview Pane in Outlook is an attack vector\u2014meaning the user wouldn\u2019t have to fully open the attached document to be vulnerable. This vulnerability affects Microsoft 365 Apps for Enterprise, Microsoft Office 2019, and Outlook 2010 through 2016.<\/p>\n<h3>Not listed as \u201cCritical,\u201d but deserves attention<\/h3>\n<p>During my reviews, I occasionally run across an \u201cImportant\u201d vulnerability that is rated as \u201cExploitation More Likely\u201d or \u201cExploit Detected.\u201d I assume they\u2019re not listed as \u201cCritical\u201d because they\u2019re not remote code execution and require access to the vulnerable systems. However, sometimes one of these \u201cImportant\u201d vulnerabilities can end up as part of a multi-stage attack.<\/p>\n<p>It seems that may the case with\u00a0<a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1464\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1464<\/a>\u00a0, a\u00a0<b>Windows Spoofing Vulnerability\u00a0<\/b>that could allow an attacker to bypass security features in the operating system and load malicious files. This vulnerability is listed as \u201cExploitation Detected,\u201d meaning it\u2019s been seen in the wild. It affects Windows 7 up to the current version of Windows 10, including Server operating systems.<\/p>\n<p><a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1529\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1529<\/a>\u00a0is a\u00a0<b>Windows GDI Elevation of Privilege Vulnerability\u00a0<\/b>that requires a user to log on to the system it would affect. It\u2019s an \u201cElevation of Privilege\u201d vulnerability that could be used as part of a multi-stage attack once an actor gains access to an affected system.<\/p>\n<h3>Summary<\/h3>\n<p>While there are no issues this month that warrant an emergency patch cycle, I recommend focusing on workstations first because of the browser vulnerabilities under active attack and also the spoofing vulnerability. Next, spend some time reading and reviewing the details for the\u00a0<b>Netlogon Elevation of Privilege Vulnerability<\/b>\u00a0at the beginning of this article so you\u2019re ready to implement the changes with as few surprises as possible. Also, ensure your Office patches are up-to-date. Then focus on server patching at the next available patch window.<\/p>\n<p>As I stated in the introduction, almost all the patches and vulnerabilities listed in this month are \u201cCritical\u201d or \u201cImportant,\u201d and very few are listed as \u201cLow\u201d or \u201cModerate.\u201d In the current threat landscape, it\u2019s important to ensure all systems are patched and up-to-date on a regular schedule and that other layers of security in your environment are functioning and up-to-date.<\/p>\n<p>As always, let\u2019s stay safe out there!<\/p>\n<p>&nbsp;<\/p>\n<p><em>Gill Langston is head security nerd for SolarWinds MSP. You can follow Gill on Twitter at\u00a0<a class=\"ext\" href=\"https:\/\/twitter.com\/cybersec_nerd\" target=\"_blank\" rel=\"noopener noreferrer\">@cybersec_nerd<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Find out what&#039;s in August 2020&#039;s Patch Tuesday releases, with 120 unique vulnerabilities of which 17 are listed as \u201cCritical\u201d.<\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5088","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>August 2020 Patch Tuesday\u2014No Emergencies but Plenty to Review - N-able<\/title>\n<meta name=\"description\" content=\"Find out what&#039;s in August 2020&#039;s Patch Tuesday releases, with 120 unique vulnerabilities of which 17 are listed as \u201cCritical\u201d.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/es\/blog\/august-2020-patch-tuesday-no-emergencies-plenty-review\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"August 2020 Patch Tuesday\u2014No Emergencies but Plenty to Review - N-able\" \/>\n<meta property=\"og:description\" content=\"Find out what&#039;s in August 2020&#039;s Patch Tuesday releases, with 120 unique vulnerabilities of which 17 are listed as \u201cCritical\u201d.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/es\/blog\/august-2020-patch-tuesday-no-emergencies-plenty-review\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-12T22:27:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-10T17:17:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Gill Langston\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gill Langston\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/august-2020-patch-tuesday-no-emergencies-plenty-review#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/august-2020-patch-tuesday-no-emergencies-plenty-review\"},\"author\":{\"name\":\"Gill Langston\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/ccb02e43837727da6ab962f5357e872a\"},\"headline\":\"August 2020 Patch Tuesday\u2014No Emergencies but Plenty to Review\",\"datePublished\":\"2020-08-12T23:27:10+01:00\",\"dateModified\":\"2022-06-10T17:17:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/august-2020-patch-tuesday-no-emergencies-plenty-review\"},\"wordCount\":1317,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"articleSection\":[\"Head Nerds\",\"Patch Management\",\"Security\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/august-2020-patch-tuesday-no-emergencies-plenty-review\",\"url\":\"https:\/\/www.n-able.com\/es\/blog\/august-2020-patch-tuesday-no-emergencies-plenty-review\",\"name\":\"August 2020 Patch Tuesday\u2014No Emergencies but Plenty to Review - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es#website\"},\"datePublished\":\"2020-08-12T23:27:10+01:00\",\"dateModified\":\"2022-06-10T17:17:03+00:00\",\"description\":\"Find out what's in August 2020's Patch Tuesday releases, with 120 unique vulnerabilities of which 17 are listed as \u201cCritical\u201d.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/august-2020-patch-tuesday-no-emergencies-plenty-review#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/es\/blog\/august-2020-patch-tuesday-no-emergencies-plenty-review\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/august-2020-patch-tuesday-no-emergencies-plenty-review#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/es\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"August 2020 Patch Tuesday\u2014No Emergencies but Plenty to Review\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/es#website\",\"url\":\"https:\/\/www.n-able.com\/es\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/es?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/es#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/es\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/ccb02e43837727da6ab962f5357e872a\",\"name\":\"Gill Langston\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g\",\"caption\":\"Gill Langston\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"August 2020 Patch Tuesday\u2014No Emergencies but Plenty to Review - N-able","description":"Find out what's in August 2020's Patch Tuesday releases, with 120 unique vulnerabilities of which 17 are listed as \u201cCritical\u201d.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/es\/blog\/august-2020-patch-tuesday-no-emergencies-plenty-review","og_locale":"es_ES","og_type":"article","og_title":"August 2020 Patch Tuesday\u2014No Emergencies but Plenty to Review - N-able","og_description":"Find out what's in August 2020's Patch Tuesday releases, with 120 unique vulnerabilities of which 17 are listed as \u201cCritical\u201d.","og_url":"https:\/\/www.n-able.com\/es\/blog\/august-2020-patch-tuesday-no-emergencies-plenty-review","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-08-12T22:27:10+00:00","article_modified_time":"2022-06-10T17:17:03+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"Gill Langston","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"Gill Langston","Tiempo de lectura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/es\/blog\/august-2020-patch-tuesday-no-emergencies-plenty-review#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/es\/blog\/august-2020-patch-tuesday-no-emergencies-plenty-review"},"author":{"name":"Gill Langston","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/ccb02e43837727da6ab962f5357e872a"},"headline":"August 2020 Patch Tuesday\u2014No Emergencies but Plenty to Review","datePublished":"2020-08-12T23:27:10+01:00","dateModified":"2022-06-10T17:17:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/august-2020-patch-tuesday-no-emergencies-plenty-review"},"wordCount":1317,"publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"articleSection":["Head Nerds","Patch Management","Security"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/es\/blog\/august-2020-patch-tuesday-no-emergencies-plenty-review","url":"https:\/\/www.n-able.com\/es\/blog\/august-2020-patch-tuesday-no-emergencies-plenty-review","name":"August 2020 Patch Tuesday\u2014No Emergencies but Plenty to Review - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/es#website"},"datePublished":"2020-08-12T23:27:10+01:00","dateModified":"2022-06-10T17:17:03+00:00","description":"Find out what's in August 2020's Patch Tuesday releases, with 120 unique vulnerabilities of which 17 are listed as \u201cCritical\u201d.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/es\/blog\/august-2020-patch-tuesday-no-emergencies-plenty-review#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/es\/blog\/august-2020-patch-tuesday-no-emergencies-plenty-review"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/es\/blog\/august-2020-patch-tuesday-no-emergencies-plenty-review#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/es\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"August 2020 Patch Tuesday\u2014No Emergencies but Plenty to Review"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/es#website","url":"https:\/\/www.n-able.com\/es","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/es?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/es#organization","name":"N-able","url":"https:\/\/www.n-able.com\/es","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/ccb02e43837727da6ab962f5357e872a","name":"Gill Langston","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g","caption":"Gill Langston"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/5088","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/comments?post=5088"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/5088\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/media?parent=5088"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}