{"id":6644,"date":"2021-02-10T17:05:14","date_gmt":"2021-02-10T17:05:14","guid":{"rendered":"https:\/\/www.n-able.com\/?p=6644"},"modified":"2024-05-14T16:09:02","modified_gmt":"2024-05-14T15:09:02","slug":"february-2021-patch-tuesday-many-exploitation-more-likely-and-update-netlogon-fix-last-year","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/es\/blog\/february-2021-patch-tuesday-many-exploitation-more-likely-and-update-netlogon-fix-last-year","title":{"rendered":"February 2021 Patch Tuesday: Many \u201cExploitation More Likely\u201d and an update to a Netlogon fix from last year"},"content":{"rendered":"<p>February continues the trend of less than 100 vulnerabilities, and there are a few that Microsoft has disclosed are likely to be targeted. All in all, this month there are 80 fixed vulnerabilities, with 11 of them listed as \u201cCritical,\u201d and 43 rated as \u201cImportant.\u201d All those listed \u201cCritical\u201d this month are in the operating system and developer tools, with none in browsers or other Microsoft applications.<\/p>\n<p>There are a few listed as \u201cExploitation More Likely,\u201d even though they are not labeled \u201cCritical\u201d by Microsoft. Let\u2019s start with the operating systems, then we will take a look at developer tools and some of the others that warrant extra attention this month.<\/p>\n<h2 class=\"h3\">Operating systems<\/h2>\n<p>Let\u2019s focus on the items that are listed with the highest CVSS scores. Four in total have a score of 9.8. Three of them are related to TCP\/IP communications, and Microsoft has released a\u00a0<a class=\"ext\" href=\"https:\/\/msrc-blog.microsoft.com\/2021\/02\/09\/multiple-security-updates-affecting-tcp-ip\/\" target=\"_blank\" rel=\"noopener noreferrer\">blog<\/a>\u00a0about them in case you want to read more.<\/p>\n<p>The first one is a\u00a0<b>Windows TCP\/IP Remote Code Execution Vulnerability,\u00a0<\/b><a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-24094\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2021-24094<\/a>. It is a packet assembly vulnerability in IPv6 for link-local addresses only. According to Microsoft, an attacker would have to be in the victim\u2019s network to exploit this vulnerability, since link-local addresses are not routable on the internet. The described workaround entails disabling packet reassembly on IPv6. This vulnerability is listed as \u201cExploitation More Likely\u201d and affects Windows 7 up to Windows 10 current version, including Server editions.<\/p>\n<p><a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-24074\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2021-24074<\/a>\u00a0is also titled\u00a0<b>Windows TCP\/IP Remote Code Execution Vulnerability.\u00a0<\/b>It affects IPv4 source routing on Windows 7 up to Windows 10 current version, including Server. It is a remote code execution vulnerability with no user interaction required. According to Microsoft, if you cannot update your system, there is a workaround to configure Windows to drop source routing requests instead of responding to them. The details can be found in the CVE link above.<\/p>\n<p>DNS servers need special attention this month because of\u00a0<a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-24078\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2021-24078<\/a>. This\u00a0<b>Windows DNS Server Remote Code Execution Vulnerability\u00a0<\/b>is also listed as \u201cExploitation More Likely.\u201d An attacker could remotely execute code on a Windows DNS server with no user interaction required. These types of vulnerabilities are more enticing to bad actors because the nature of DNS servers is that they are available and connected to all systems on the network. This affects Windows Server 2008 up to the current versions of Windows Server that are configured with the DNS server role.<\/p>\n<p>The final vulnerability with a 9.8 score is a\u00a0<b>Windows Fax Service Remote Code Execution Vulnerability,\u00a0<\/b><a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-24077\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2021-24077<\/a>. However, Microsoft lists this one as \u201cExploitation Less Likely.\u201d A bad actor could execute code on a system through the fax service with no user interaction. If you are not using the fax service, the fax and scan feature could be disabled on systems as a workaround. This vulnerability affects Windows 7 up to the current versions of Windows 10, including Server.<\/p>\n<p>The next two \u201cCritical\u201d vulnerabilities are listed with a CVSS score of 8.8.\u00a0<a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-24093\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2021-24093<\/a>\u00a0is a\u00a0<b>Windows Graphics Component Remote Code Execution Vulnerability\u00a0<\/b>that would allow an attacker to execute code on a a system if a user were to access a malicious website containing a specially crafted image. It affects all versions of Windows 10 and the corresponding Server versions.<\/p>\n<p><b>\u00a0<\/b>The\u00a0<b>Windows Local Spooler Remote Code Execution Vulnerability,\u00a0<\/b><a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-24088\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2021-24088<\/a>\u00a0is a remote vulnerability that could be exploited by a bad actor with no user interaction. This vulnerability affects Windows 7 up to Windows 10 including Server.<\/p>\n<p><a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-1722\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2021-1722<\/a>\u00a0is a\u00a0<b>Windows Fax Service Remote Code Execution Vulnerability\u00a0<\/b>that Microsoft has listed as \u201cExploitation Less Likely.\u201d Much like the other fax service vulnerability, the workaround is to disable the fax and scan feature on systems that do not use it.<\/p>\n<p><a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-24081\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2021-24081<\/a>\u00a0is titled\u00a0<b>Microsoft Windows Codecs Library Remote Code Execution Vulnerability.\u00a0<\/b>It is listed as \u201cExploitation Less Likely\u201d and requires access to the system to execute. It affects all Windows 10 versions including Server editions.<\/p>\n<p>The final \u201cCritical\u201d operating system vulnerability is a\u00a0<b>Windows Camera Codec Pack Remote Code Execution Vulnerability.\u00a0<\/b><a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-24091\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2021-24091<\/a>\u00a0is also a local vulnerability that requires no user interaction and affects Windows 10 systems, including Server.<\/p>\n<p>There are also two .NET Core vulnerabilities this month affecting .NET 5.0 and .NET Core 2.1 and 3.1. If you are developing using .NET, be sure to update as well.<\/p>\n<h2 class=\"h3\">Not \u201cCritical,\u201d but exploitation detected<\/h2>\n<p><a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-1732\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2021-1732<\/a>\u00a0is listed as \u201cImportant,\u201d but according to Microsoft is actively being exploited. It is a\u00a0<b>Windows Win32k Elevation of Privilege Vulnerability\u00a0<\/b>that would require an attacker to have direct access to a vulnerable system. These types of vulnerabilities are usually used in \u201cchained attacks\u201d once an attacker gains access to a system through another method.<\/p>\n<h2 class=\"h3\">\u201cImportant,\u201d but \u201cExploitation More Likely\u201d<\/h2>\n<p>Let\u2019s highlight a few vulnerabilities that are not \u201cCritical,\u201d but warrant attention since they are likely to be exploited, according to Microsoft.<\/p>\n<p><a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-1727\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2021-1727<\/a>\u00a0is a\u00a0<b>Windows Installer Elevation of Privilege Vulnerability\u00a0<\/b>that requires no user interaction. It does, however, require the attacker to have access to the affected system to successfully elevate privilege.<\/p>\n<p>Like several months previous, there is a\u00a0<b>Microsoft SharePoint Remote Code Execution Vulnerability,\u00a0<\/b><a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-24066\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2021-24066<\/a>, that would allow an attacker that had rights to upload an application to execute code on the SharePoint server. This vulnerability affects Microsoft SharePoint Foundation 2010 and 2013, as well as SharePoint Server 2019 and SharePoint Enterprise Server 2016.<\/p>\n<p>A final item of note in this month\u2019s batch of fixes is an update to\u00a0<a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-1472\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1472<\/a>. In August of last year, Microsoft released an update for a\u00a0<b>Netlogon Elevation of Privilege Vulnerability\u00a0<\/b>on Domain Controllers. This was a 10.0 CVSS score that affected systems that allowed insecure netlogon channels. At that time, the update introduced new logging and settings to ensure you had visibility into what devices were using insecure channels to connect. Now, as promised, they are rolling out the enforcement where secure channels are only allowed. For more information about how this may affect you, refer to their\u00a0<a class=\"ext\" href=\"https:\/\/support.microsoft.com\/kb\/4557222\" target=\"_blank\" rel=\"noopener noreferrer\">KB article<\/a>.<\/p>\n<p>So from a priority standpoint, I recommend focusing on your DNS servers as a priority, and then moving on to workstations and servers on a normal schedule. Then turn to updating SharePoint and then installing the other updates released this month for Microsoft Edge, Excel, Office, and Teams.<\/p>\n<p>As always, stay safe out there!<\/p>\n<p>&nbsp;<\/p>\n<p><em>Gill Langston is head security nerd for N&#8209;able. You can follow Gill on Twitter at\u00a0<a class=\"ext\" href=\"https:\/\/twitter.com\/cybersec_nerd\" target=\"_blank\" rel=\"noopener noreferrer\">@cybersec_nerd<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>February continues the trend of less than 100 vulnerabilities, and there are a few that Microsoft has disclosed are likely to be targeted. All in all, this month there are&#8230;<\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-6644","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>February 2021 Patch Tuesday: Many \u201cExploitation More Likely\u201d and an update to a Netlogon fix from last year - N-able<\/title>\n<meta name=\"description\" content=\"A review of February\u2019s Patch Tuesday releases from Microsoft, featuring 80 fixed vulnerabilities, with 11 of them listed as \u201cCritical,\u201d and 43 rated as \u201cImportant.\u201d\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/es\/blog\/february-2021-patch-tuesday-many-exploitation-more-likely-and-update-netlogon-fix-last-year\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"February 2021 Patch Tuesday: Many \u201cExploitation More Likely\u201d and an update to a Netlogon fix from last year - N-able\" \/>\n<meta property=\"og:description\" content=\"A review of February\u2019s Patch Tuesday releases from Microsoft, featuring 80 fixed vulnerabilities, with 11 of them listed as \u201cCritical,\u201d and 43 rated as \u201cImportant.\u201d\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/es\/blog\/february-2021-patch-tuesday-many-exploitation-more-likely-and-update-netlogon-fix-last-year\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-10T17:05:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-14T15:09:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Gill Langston\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gill Langston\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/february-2021-patch-tuesday-many-exploitation-more-likely-and-update-netlogon-fix-last-year#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/february-2021-patch-tuesday-many-exploitation-more-likely-and-update-netlogon-fix-last-year\"},\"author\":{\"name\":\"Gill Langston\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/ccb02e43837727da6ab962f5357e872a\"},\"headline\":\"February 2021 Patch Tuesday: Many \u201cExploitation More Likely\u201d and an update to a Netlogon fix from last year\",\"datePublished\":\"2021-02-10T17:05:14+00:00\",\"dateModified\":\"2024-05-14T15:09:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/february-2021-patch-tuesday-many-exploitation-more-likely-and-update-netlogon-fix-last-year\"},\"wordCount\":1077,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"articleSection\":[\"Head Nerds\",\"Patch Management\",\"Security\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/february-2021-patch-tuesday-many-exploitation-more-likely-and-update-netlogon-fix-last-year\",\"url\":\"https:\/\/www.n-able.com\/es\/blog\/february-2021-patch-tuesday-many-exploitation-more-likely-and-update-netlogon-fix-last-year\",\"name\":\"February 2021 Patch Tuesday: Many \u201cExploitation More Likely\u201d and an update to a Netlogon fix from last year - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es#website\"},\"datePublished\":\"2021-02-10T17:05:14+00:00\",\"dateModified\":\"2024-05-14T15:09:02+00:00\",\"description\":\"A review of February\u2019s Patch Tuesday releases from Microsoft, featuring 80 fixed vulnerabilities, with 11 of them listed as \u201cCritical,\u201d and 43 rated as \u201cImportant.\u201d\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/february-2021-patch-tuesday-many-exploitation-more-likely-and-update-netlogon-fix-last-year#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/es\/blog\/february-2021-patch-tuesday-many-exploitation-more-likely-and-update-netlogon-fix-last-year\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/february-2021-patch-tuesday-many-exploitation-more-likely-and-update-netlogon-fix-last-year#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/es\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"February 2021 Patch Tuesday: Many \u201cExploitation More Likely\u201d and an update to a Netlogon fix from last year\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/es#website\",\"url\":\"https:\/\/www.n-able.com\/es\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/es?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/es#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/es\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/ccb02e43837727da6ab962f5357e872a\",\"name\":\"Gill Langston\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g\",\"caption\":\"Gill Langston\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"February 2021 Patch Tuesday: Many \u201cExploitation More Likely\u201d and an update to a Netlogon fix from last year - N-able","description":"A review of February\u2019s Patch Tuesday releases from Microsoft, featuring 80 fixed vulnerabilities, with 11 of them listed as \u201cCritical,\u201d and 43 rated as \u201cImportant.\u201d","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/es\/blog\/february-2021-patch-tuesday-many-exploitation-more-likely-and-update-netlogon-fix-last-year","og_locale":"es_ES","og_type":"article","og_title":"February 2021 Patch Tuesday: Many \u201cExploitation More Likely\u201d and an update to a Netlogon fix from last year - N-able","og_description":"A review of February\u2019s Patch Tuesday releases from Microsoft, featuring 80 fixed vulnerabilities, with 11 of them listed as \u201cCritical,\u201d and 43 rated as \u201cImportant.\u201d","og_url":"https:\/\/www.n-able.com\/es\/blog\/february-2021-patch-tuesday-many-exploitation-more-likely-and-update-netlogon-fix-last-year","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2021-02-10T17:05:14+00:00","article_modified_time":"2024-05-14T15:09:02+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"Gill Langston","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"Gill Langston","Tiempo de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/es\/blog\/february-2021-patch-tuesday-many-exploitation-more-likely-and-update-netlogon-fix-last-year#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/es\/blog\/february-2021-patch-tuesday-many-exploitation-more-likely-and-update-netlogon-fix-last-year"},"author":{"name":"Gill Langston","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/ccb02e43837727da6ab962f5357e872a"},"headline":"February 2021 Patch Tuesday: Many \u201cExploitation More Likely\u201d and an update to a Netlogon fix from last year","datePublished":"2021-02-10T17:05:14+00:00","dateModified":"2024-05-14T15:09:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/february-2021-patch-tuesday-many-exploitation-more-likely-and-update-netlogon-fix-last-year"},"wordCount":1077,"publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"articleSection":["Head Nerds","Patch Management","Security"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/es\/blog\/february-2021-patch-tuesday-many-exploitation-more-likely-and-update-netlogon-fix-last-year","url":"https:\/\/www.n-able.com\/es\/blog\/february-2021-patch-tuesday-many-exploitation-more-likely-and-update-netlogon-fix-last-year","name":"February 2021 Patch Tuesday: Many \u201cExploitation More Likely\u201d and an update to a Netlogon fix from last year - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/es#website"},"datePublished":"2021-02-10T17:05:14+00:00","dateModified":"2024-05-14T15:09:02+00:00","description":"A review of February\u2019s Patch Tuesday releases from Microsoft, featuring 80 fixed vulnerabilities, with 11 of them listed as \u201cCritical,\u201d and 43 rated as \u201cImportant.\u201d","breadcrumb":{"@id":"https:\/\/www.n-able.com\/es\/blog\/february-2021-patch-tuesday-many-exploitation-more-likely-and-update-netlogon-fix-last-year#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/es\/blog\/february-2021-patch-tuesday-many-exploitation-more-likely-and-update-netlogon-fix-last-year"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/es\/blog\/february-2021-patch-tuesday-many-exploitation-more-likely-and-update-netlogon-fix-last-year#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/es\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"February 2021 Patch Tuesday: Many \u201cExploitation More Likely\u201d and an update to a Netlogon fix from last year"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/es#website","url":"https:\/\/www.n-able.com\/es","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/es?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/es#organization","name":"N-able","url":"https:\/\/www.n-able.com\/es","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/ccb02e43837727da6ab962f5357e872a","name":"Gill Langston","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g","caption":"Gill Langston"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/6644","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/comments?post=6644"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/6644\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/media?parent=6644"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}