{"id":6594,"date":"2020-12-10T15:37:59","date_gmt":"2020-12-10T15:37:59","guid":{"rendered":"https:\/\/www.n-able.com\/?p=6594"},"modified":"2022-06-10T18:14:13","modified_gmt":"2022-06-10T17:14:13","slug":"december-2020-patch-tuesday-quieter-finish-busy-year-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/fr\/blog\/december-2020-patch-tuesday-quieter-finish-busy-year-vulnerabilities","title":{"rendered":"December 2020 Patch Tuesday\u2014A quiet(er) finish to a busy year in vulnerabilities"},"content":{"rendered":"<p>This is the final Patch Tuesday of 2020, a year full of 100+ vulnerabilities fixed in almost every month. As with many things in December, it is a little quieter. There were roughly half as many vulnerabilities this month, and none that have active attacks or require emergency patching; I am sure that comes as a relief to many of you as things start to wind down for the holidays.<\/p>\n<p>All in all, there were only 58 total vulnerabilities listed as fixed in released updates, with 9 of them \u201cCritical\u201d and 46 as \u201cImportant\u201d. As always, we will look at the \u201cCritical\u201d vulnerabilities and a few that are labeled as \u201cImportant\u201d that may warrant some attention. There is only one each in the Operating Systems and Browser categories, and a few each in the usual suspects of Exchange and SharePoint, and two in Dynamics.<\/p>\n<h2 class=\"h3\">Operating Systems<\/h2>\n<p>The only \u201cCritical\u201d in Operating Systems this month is\u00a0<a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-17095\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-17095<\/a>. It is a\u00a0<b>Hyper-V Remote Code Execution Vulnerability\u00a0<\/b>that we sometimes refer to as Hyper-V escape vulnerabilities. According to Microsoft, an attacker could run an application on the guest operating system that would allow them to execute code on the host system. No user interaction is required. This type of attack could allow an attacker to move laterally throughout an environment once they got access to a guest VM on a host. This has a CVSS score of 8.5 but is listed as \u201cExploitation Less Likely\u201d by Microsoft, and as of this writing there was only unproven exploit code.<\/p>\n<h2 class=\"h3\">Browsers<\/h2>\n<p>The lone browser \u201cCritical\u201d is a\u00a0<b>Chakra Scripting Engine Memory Corruption Vulnerability,\u00a0<\/b><a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-17131\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-17131<\/a>. This vulnerability would require a user to interact with a malicious website. The vulnerability would grant the attacker full access to the target system. Microsoft lists this vulnerability as \u201cExploitation Less Likely\u201d. It affects the \u201cEdge-HTML\u201d version of Microsoft Edge on all supported versions of Windows 10 including Server versions.<\/p>\n<h2 class=\"h3\">Other Applications<\/h2>\n<h4 class=\"h4\">SHAREPOINT<\/h4>\n<p>There are two \u201cCritical\u201d vulnerabilities in SharePoint this month, both with the title\u00a0<b>Microsoft SharePoint Remote Code Execution Vulnerability.\u00a0<\/b>They have slightly different descriptions but are similar in nature.\u00a0<a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-17118\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-17118<\/a>\u00a0is listed as \u201cExploitation More Likely\u201d with a Low attack complexity, but with user interaction required to execute. According to Microsoft, there are no active attacks, but there is confirmed proof-of-concept code.\u00a0<a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-17121\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-17121<\/a>\u00a0is similar but requires no user interaction to execute. This vulnerability is only listed as \u201cUnproven Proof-of-Concept\u201d but is still listed as Exploitation More Likely. These vulnerabilities affect SharePoint Foundation 2010 and 2013, SharePoint Enterprise Server 2016, and SharePoint Server 2019.<\/p>\n<h4 class=\"h4\">EXCHANGE SERVER<\/h4>\n<p>There are three vulnerabilities in Exchange this month, all with the title\u00a0<b>Microsoft Exchange Remote Code Execution Vulnerability<\/b>. They are all listed as \u201cExploitation Less Likely\u201d<b>.\u00a0<\/b>The first one,\u00a0<a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-17117\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-17117<\/a>\u00a0requires no user interaction, and is listed as a network vulnerability.\u00a0The next two have one of the highest CVSS score this month, both at 9.1.\u00a0<a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-17132\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-17132<\/a>\u00a0and\u00a0<a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-17142\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-17142<\/a>\u00a0both would allow a remote attacker to run a specially crafted cmdlet to execute code on the Exchange server. The affected versions are Microsoft Exchange 2013, 2016, and 2019. This is especially concerning since on-premises Exchange servers are required to be visible on the network, meaning an attacker that could execute code on the Exchange server would likely have access to the rest of the target network. Even though it is listed as \u201cExploitation Less Likely\u201d, I would give your on-premises Exchange server extra attention this month to ensure it is updated as soon as possible. For those running Microsoft 365, no worries, since Microsoft updates the environment themselves.<\/p>\n<h4 class=\"h4\">MICROSOFT DYNAMICS 365<\/h4>\n<p>There are two vulnerabilities with the title\u00a0<b>Microsoft Dynamics 365 for Finance and Operations (on-premises) Remote Code Execution Vulnerability\u00a0<\/b>this month, with the same description and details.\u00a0<a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-17152\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-17152<\/a>\u00a0and\u00a0<a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-17158\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-17158<\/a>\u00a0are remote code execution vulnerabilities that Microsoft has labeled \u201cExploitation More Likely\u201d.\u00a0In the description, they state that the attacker must be authenticated to exploit this vulnerability.<\/p>\n<h2 class=\"h3\">Important but needs attention<\/h2>\n<p>There are often times that the vulnerabilities listed as \u201cImportant\u201d can be the ones that are first exploited by bad actors, so my recommendation is to always treat the \u201cImportant\u201d vulnerabilities with the same concern you treat the \u201cCritical\u201d ones. While we will not review every one here, there is one that stands out that deserves some attention.\u00a0<a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-17096\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-17096<\/a>\u00a0is a\u00a0<b>Windows NTFS Remote Code Execution Vulnerability<\/b>\u00a0that Microsoft lists as \u201cExploitation More Likely\u201d and it is assigned a CVSS score of 7.5. This is a vulnerability in SMBv2 that would allow a remote attacker to gain access to the system and execute code.\u00a0SMB related vulnerabilities are usually given special attention by bad actors because in many cases they can allow attackers to spread from system to system, so I would not be surprised if we see some attacks using this vulnerability soon.<\/p>\n<p>The other vulnerabilities that need attention this month are mainly elevation of privilege vulnerabilities in operating systems, and several information disclosure vulnerabilities in Excel, PowerPoint, and Office products.\u00a0There are also notable updates for Azure DevOps server and Visual Studio, for those that run developer tools.<\/p>\n<p>From a priority standpoint, I recommend focusing on the on-premises Exchange servers under your management, then turn towards your SharePoint installations. Then give special attention to any Internet-facing systems for the SMBv2 vulnerability, and then get those Hyper-V servers patched. Desktops and Office products can be patched on their regular patch schedule.<\/p>\n<p>As a side note, we are approaching the end of the first year of the Extended Security Updates (ESU) program for Windows 7 and Windows Server 2008 R2. This month there was only one ESU update, but\u00a0this year there have been numerous fixes for these operating systems you will only get if you have an ESU agreement. There are two years left on the ESU support schedule, but the new year is a great time to look at those older operating systems and investigate moving to a supported operating system that gets updates without additional support agreements required.<\/p>\n<p>As I mentioned before, this year has been one of the highest vulnerability counts I have seen since I started reviewing the patch releases some years ago. This is likely due to the additional attention vulnerabilities have been getting from the increasing amount of research teams that participate in vulnerability research programs like Microsoft\u2019s. This is a good thing, as discovering and patching them early greatly reduces the risk to environments that maintain a good patch schedule. And with the increasing complexity and volume of attacks we have seen this year, defenders need all the help they can get.<\/p>\n<p>To all of you who focus on keeping your customers and end-users safe, I wish you a happy holiday season!\u00a0I hope to see you again in the new year, and stay safe out there!<\/p>\n<p>&nbsp;<\/p>\n<p><em>Gill Langston is head security nerd for SolarWinds MSP. You can follow Gill on Twitter at\u00a0<a class=\"ext\" href=\"https:\/\/twitter.com\/cybersec_nerd\" target=\"_blank\" rel=\"noopener noreferrer\">@cybersec_nerd<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Things are a little quieter for the final l Patch Tuesday of 2020. Only 58 total vulnerabilities fixes, with 9 of them \u201cCritical\u201d and 46 as \u201cImportant\u201d.<\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-6594","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>December 2020 Patch Tuesday\u2014A quiet(er) finish to a busy year in vulnerabilities - N-able<\/title>\n<meta name=\"description\" content=\"Things are a little quieter for the final l Patch Tuesday of 2020. Only 58 total vulnerabilities fixes, with 9 of them \u201cCritical\u201d and 46 as \u201cImportant\u201d.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/fr\/blog\/december-2020-patch-tuesday-quieter-finish-busy-year-vulnerabilities\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"December 2020 Patch Tuesday\u2014A quiet(er) finish to a busy year in vulnerabilities - N-able\" \/>\n<meta property=\"og:description\" content=\"Things are a little quieter for the final l Patch Tuesday of 2020. Only 58 total vulnerabilities fixes, with 9 of them \u201cCritical\u201d and 46 as \u201cImportant\u201d.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/fr\/blog\/december-2020-patch-tuesday-quieter-finish-busy-year-vulnerabilities\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-10T15:37:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-10T17:14:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Gill Langston\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gill Langston\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/december-2020-patch-tuesday-quieter-finish-busy-year-vulnerabilities#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/december-2020-patch-tuesday-quieter-finish-busy-year-vulnerabilities\"},\"author\":{\"name\":\"Gill Langston\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/ccb02e43837727da6ab962f5357e872a\"},\"headline\":\"December 2020 Patch Tuesday\u2014A quiet(er) finish to a busy year in vulnerabilities\",\"datePublished\":\"2020-12-10T15:37:59+00:00\",\"dateModified\":\"2022-06-10T17:14:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/december-2020-patch-tuesday-quieter-finish-busy-year-vulnerabilities\"},\"wordCount\":1157,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"articleSection\":[\"Head Nerds\",\"Patch Management\",\"Security\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/december-2020-patch-tuesday-quieter-finish-busy-year-vulnerabilities\",\"url\":\"https:\/\/www.n-able.com\/fr\/blog\/december-2020-patch-tuesday-quieter-finish-busy-year-vulnerabilities\",\"name\":\"December 2020 Patch Tuesday\u2014A quiet(er) finish to a busy year in vulnerabilities - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr#website\"},\"datePublished\":\"2020-12-10T15:37:59+00:00\",\"dateModified\":\"2022-06-10T17:14:13+00:00\",\"description\":\"Things are a little quieter for the final l Patch Tuesday of 2020. Only 58 total vulnerabilities fixes, with 9 of them \u201cCritical\u201d and 46 as \u201cImportant\u201d.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/december-2020-patch-tuesday-quieter-finish-busy-year-vulnerabilities#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/fr\/blog\/december-2020-patch-tuesday-quieter-finish-busy-year-vulnerabilities\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/december-2020-patch-tuesday-quieter-finish-busy-year-vulnerabilities#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/fr\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"December 2020 Patch Tuesday\u2014A quiet(er) finish to a busy year in vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/fr#website\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/fr?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/fr#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/ccb02e43837727da6ab962f5357e872a\",\"name\":\"Gill Langston\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g\",\"caption\":\"Gill Langston\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"December 2020 Patch Tuesday\u2014A quiet(er) finish to a busy year in vulnerabilities - N-able","description":"Things are a little quieter for the final l Patch Tuesday of 2020. Only 58 total vulnerabilities fixes, with 9 of them \u201cCritical\u201d and 46 as \u201cImportant\u201d.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/fr\/blog\/december-2020-patch-tuesday-quieter-finish-busy-year-vulnerabilities","og_locale":"fr_FR","og_type":"article","og_title":"December 2020 Patch Tuesday\u2014A quiet(er) finish to a busy year in vulnerabilities - N-able","og_description":"Things are a little quieter for the final l Patch Tuesday of 2020. Only 58 total vulnerabilities fixes, with 9 of them \u201cCritical\u201d and 46 as \u201cImportant\u201d.","og_url":"https:\/\/www.n-able.com\/fr\/blog\/december-2020-patch-tuesday-quieter-finish-busy-year-vulnerabilities","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-12-10T15:37:59+00:00","article_modified_time":"2022-06-10T17:14:13+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"Gill Langston","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"\u00c9crit par":"Gill Langston","Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/fr\/blog\/december-2020-patch-tuesday-quieter-finish-busy-year-vulnerabilities#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/december-2020-patch-tuesday-quieter-finish-busy-year-vulnerabilities"},"author":{"name":"Gill Langston","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/ccb02e43837727da6ab962f5357e872a"},"headline":"December 2020 Patch Tuesday\u2014A quiet(er) finish to a busy year in vulnerabilities","datePublished":"2020-12-10T15:37:59+00:00","dateModified":"2022-06-10T17:14:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/december-2020-patch-tuesday-quieter-finish-busy-year-vulnerabilities"},"wordCount":1157,"publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"articleSection":["Head Nerds","Patch Management","Security"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/fr\/blog\/december-2020-patch-tuesday-quieter-finish-busy-year-vulnerabilities","url":"https:\/\/www.n-able.com\/fr\/blog\/december-2020-patch-tuesday-quieter-finish-busy-year-vulnerabilities","name":"December 2020 Patch Tuesday\u2014A quiet(er) finish to a busy year in vulnerabilities - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr#website"},"datePublished":"2020-12-10T15:37:59+00:00","dateModified":"2022-06-10T17:14:13+00:00","description":"Things are a little quieter for the final l Patch Tuesday of 2020. Only 58 total vulnerabilities fixes, with 9 of them \u201cCritical\u201d and 46 as \u201cImportant\u201d.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/december-2020-patch-tuesday-quieter-finish-busy-year-vulnerabilities#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/fr\/blog\/december-2020-patch-tuesday-quieter-finish-busy-year-vulnerabilities"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/fr\/blog\/december-2020-patch-tuesday-quieter-finish-busy-year-vulnerabilities#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/fr\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"December 2020 Patch Tuesday\u2014A quiet(er) finish to a busy year in vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/fr#website","url":"https:\/\/www.n-able.com\/fr","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/fr?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/fr#organization","name":"N-able","url":"https:\/\/www.n-able.com\/fr","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/ccb02e43837727da6ab962f5357e872a","name":"Gill Langston","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g","caption":"Gill Langston"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/6594","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/comments?post=6594"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/6594\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/media?parent=6594"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}