{"id":6399,"date":"2020-10-14T22:40:35","date_gmt":"2020-10-14T21:40:35","guid":{"rendered":"https:\/\/www.n-able.com\/?p=6399"},"modified":"2022-06-10T18:15:29","modified_gmt":"2022-06-10T17:15:29","slug":"october-2020-patch-tuesday-smaller-usual-some-systems-need-patching-now","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/it\/blog\/october-2020-patch-tuesday-smaller-usual-some-systems-need-patching-now","title":{"rendered":"October 2020 Patch Tuesday: Smaller than usual, but some systems need patching now"},"content":{"rendered":"<p>This October Patch Tuesday is the first batch this year that fixes less than 100 vulnerabilities. But don\u2019t be fooled by that, as there are several in this group that do warrant your attention. This month Microsoft fixed a total of 88 vulnerabilities, with 11 marked as \u201cCritical,\u201d and the rest \u201cImportant\u201d with one \u201cModerate\u201d exception. Pay special attention to the \u201cImportant\u201d ones I cover this month, as many of them are listed as \u201cExploitation More Likely\u201d and will be in the priority list. While there are no active attacks according to Microsoft, there is a high likelihood some may appear soon for several of these.\u00a0 First, we\u2019ll review the \u201cCritical\u201d section.<\/p>\n<h2 class=\"h3\">Critical<\/h2>\n<h3 class=\"h4\">OPERATING SYSTEMS<\/h3>\n<p>The first one we need to pay attention to is the\u00a0<b>Windows TCP\/IP Remote Code Execution Vulnerability\u00a0<\/b>that immediately jumped out at me as a concern.\u00a0<a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16898\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-16898<\/a>\u00a0is listed as \u201cExploitation More Likely.\u201d It especially concerning because an attacker could send a ICMPv6 Router Advertisement Packet to a server and, if successful, would allow the attacker to execute code on the target system. Any system that is internet facing should get the highest priority this month, as it is only a matter of time until bad actors use this vulnerability (along with the Denial of Service vulnerability we cover later on).<\/p>\n<p>This vulnerability affects Windows 10 1709 up to the current version, including Server and Server Core versions. It has a CVSS score of 9.8, so this should be your highest priority this month.<\/p>\n<p><a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16891\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-16891<\/a>\u00a0is a\u00a0<b>Windows Hyper-V Remote Code Execution Vulnerability\u00a0<\/b>that would allow an attacker to force the host machine to run code from a guest operating system on that host. This is generally known as a Hyper-V escape vulnerability, because the attacker can escape the bounds of the guest operating system up to the host. It affects Windows 7 up to the current version of Windows 10, and includes Server 2008, R2, 2012, 2016, 2019, and Server version 1903-2004.<\/p>\n<p>The\u00a0<b>Media Foundation Memory Corruption Vulnerability\u00a0<\/b>labeled as\u00a0<a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16915\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-16915<\/a>\u00a0is listed as \u201cExploitation Less Likely.\u201d If a user opened a document or visited a malicious webpage, the attacker could gain full rights to the system. It affects Windows 10 1607 to current, including corresponding Server versions.<\/p>\n<p><a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16911\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-16911<\/a>\u00a0is a\u00a0<b>GDI+ Remote Code Execution Vulnerability\u00a0<\/b>that is privilege dependent, meaning a user with admin rights would have more impact that a non-admin user if they clicked on a malicious link or opened a document. It is listed as \u201cExploitation Less Likely.\u201d<\/p>\n<p>There are two vulnerabilities titled\u00a0<b>Windows Camera Codec Pack Remote Code Execution Vulnerability.\u00a0<\/b><a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16967\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-16967<\/a>\u00a0and\u00a0<a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16968\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-16968<\/a>\u00a0are both listed as \u201cExploitation Less Likely,\u201d but would grant the attacker the same rights as the user who opened a specially crafted file with the Codec Pack. It affects all supported Windows 10 workstation operating systems.<\/p>\n<p>This final operating system vulnerability is\u00a0<a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16923\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-16923<\/a>. The\u00a0<b>Microsoft Graphics Components Remote Code Execution Vulnerability\u00a0<\/b>would grant full access to an attacker if the user opened a specially crafted image file. It affects Windows 7 up to the current version of Windows 10, including corresponding Server versions.<\/p>\n<p>Oddly enough, there were no browser fixes in this month\u2019s batch for Internet Explorer or Edge. Perhaps next month we will see more?<\/p>\n<h3 class=\"h4\">OTHER APPLICATIONS<\/h3>\n<p>The other \u201cCritical\u201d vulnerabilities are found in Office, SharePoint, Base3D, and in Adobe Flash.<\/p>\n<p><a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16947\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-16947<\/a>\u00a0is a\u00a0<b>Microsoft Outlook Remote Code Execution Vulnerability\u00a0<\/b>that would grant an attacker the same rights as the user. This vulnerability is especially concerning because it affects the preview pane in Outlook, meaning the user would not even have to open the malicious file that was attached if the preview pane feature is active in Outlook. Microsoft lists this one as \u201cExploitation Less Likely.\u201d<\/p>\n<p>There are two vulnerabilities with the title\u00a0<b>Microsoft SharePoint Remote Code Execution Vulnerability<\/b>, and they are listed as\u00a0<a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16951\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-16951<\/a>\u00a0and\u00a0<a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16952\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-16952<\/a>. They are source markup check vulnerabilities that would require a user to upload an application package to an affected SharePoint server and would allow them to execute code on the server. They affect SharePoint 2013 SP1, SharePoint Enterprise Server 2016, and SharePoint Server 2019, and are listed as \u201cExploitation Less Likely.\u201d<\/p>\n<p><a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-17003\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-17003<\/a>\u00a0is a\u00a0<b>Base3D Remote Code Execution Vulnerability\u00a0<\/b>listed as \u201cExploitation Less Likely.\u201d It is a memory handling issue in the Base3D rendering engine in Windows.<\/p>\n<p>The final \u201cCritical\u201d is\u00a0<b>ADV200012 -October 2020 Adobe Flash Security Update<\/b>, which addresses a vulnerability published in\u00a0APSB20-58\u00a0on Adobe\u2019s site for Adobe Flash. It can be installed using the Windows update supplied in the article for Windows 8.1 up to current version of Windows 10 including Server versions.<\/p>\n<h3 class=\"h4\">NOT \u201cCRITICAL\u201d BUT REALLY \u201cIMPORTANT\u201d<\/h3>\n<p>Recently, Microsoft released a new version of the Security Update Guide in preview. This guide is what I use to review and sort the fixed vulnerabilities in this blog. This newly designed version will allow me to filter on some of the information I had to dig deeper into the data to find previously; this is great news.\u00a0 You can get a preview of this format at\u00a0<a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/msrc.microsoft.com\/update-guide\/<\/a>. Using this new guide, I can more easily uncover the \u201cImportant\u201d vulnerabilities that are actually listed as \u201cExploitation More Likely.\u201d Even though they are not listed as \u201cCritical\u201d they warrant special attention, as sometimes these vulnerabilities end up exploited quickly, and while they may not all be \u201cRemote Code Execution,\u201d bad actors many times use these vulnerabilities after gaining an initial foothold for follow-on or chained attacks. Let\u2019s review them here.<\/p>\n<p><a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16899\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-16899<\/a>\u00a0is a\u00a0<b>Windows TCP\/IP Denial of Service Vulnerability\u00a0<\/b>that is similar to the first TCP\/IP vulnerability we reviewed in this article. It has the same attack vector but would only result in a Denial of Service instead of Remote Code Execution. Microsoft suggests a workaround of disabling ICMPv6 RDNSS if possible, and the instructions to do so are listed in the linked article.<\/p>\n<p><a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-16907\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-16907<\/a>\u00a0and\u00a0<a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-16913\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-16913<\/a>\u00a0are both titled\u00a0<b>Win32k Elevation of Privilege Vulnerability.\u00a0<\/b>This is a kernel driver memory handling vulnerability that would require an attacker to log on to a system. A successful exploit would allow an attacker to execute code on the system. They affect Windows 10 up to current version, including Server operating systems.<\/p>\n<p>There is a\u00a0<b>Windows Spoofing Vulnerability\u00a0<\/b>fix for\u00a0<a class=\"ext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-16922\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-16922<\/a>\u00a0that affects Windows 7 up to current Windows 10 versions, including Server. This is a security feature bypass that would allow an attacker to load improperly signed files on a system.<\/p>\n<p>This final one in this review is\u00a0<a class=\"ext\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-16896\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-16896<\/a>\u00a0and is a\u00a0<b>Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability\u00a0<\/b>that would allow an attacker to send a specially crafted packet to an RDP server. The response could unintentionally disclose information about the system that would allow an attacker to further compromise the system. Microsoft gives workarounds of disabling RDP if it is not needed, or enabling Network Level Authentication on the server.<\/p>\n<p>As always, avoid exposing RDP on the Internet wherever possible. It is incredibly easy to discover available and responding RDP server with services like Shodan or other scanners. In my opinion, if you are simply exposing RDP to the internet without additional security in place, you are at a high risk for attack.<\/p>\n<h2 class=\"h3\">Summary<\/h2>\n<p>While this month\u2019s batch was lighter than usual, there are some real attention getters here.\u00a0 I recommend addressing the Windows TCP\/IP vulnerabilities first, with highest priority on any Internet-facing systems. Then get those RDP servers patched, since Remote Desktop seems to be one of the most popular attack vectors these days. Next, turn your focus towards patching your Hyper-V systems, and then patching workstations (especially those running Outlook), and finally your SharePoint servers (which by now should be a regular part of your routine considering the volume of SharePoint vulnerabilities fixed this year).<\/p>\n<p>We will keep our ears to the ground on the TCP\/IP vulnerabilities and update you if we start to see attacks leveraging these vulnerabilities.<\/p>\n<p>As always, let\u2019s stay safe out there!<\/p>\n<p>&nbsp;<\/p>\n<p><em>Gill Langston is head security nerd for SolarWinds MSP. You can follow Gill on Twitter at\u00a0<a class=\"ext\" href=\"https:\/\/twitter.com\/cybersec_nerd\" target=\"_blank\" rel=\"noopener noreferrer\">@cybersec_nerd<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>SolarWinds MSP takes a look at this month&#8217;s Patch Tuesday releases, which fixes less than 100 vulnerabilities. But don\u2019t be fooled by that, there are several that do warrant your&#8230;<\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-6399","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>October 2020 Patch Tuesday: Smaller than usual, but some systems need patching now - N-able<\/title>\n<meta name=\"description\" content=\"SolarWinds MSP takes a look at this month&#039;s Patch Tuesday releases, which fixes less than 100 vulnerabilities. But don\u2019t be fooled by that, there are several that do warrant your attention.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/it\/blog\/october-2020-patch-tuesday-smaller-usual-some-systems-need-patching-now\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"October 2020 Patch Tuesday: Smaller than usual, but some systems need patching now - N-able\" \/>\n<meta property=\"og:description\" content=\"SolarWinds MSP takes a look at this month&#039;s Patch Tuesday releases, which fixes less than 100 vulnerabilities. But don\u2019t be fooled by that, there are several that do warrant your attention.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/it\/blog\/october-2020-patch-tuesday-smaller-usual-some-systems-need-patching-now\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-14T21:40:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-10T17:15:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Gill Langston\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gill Langston\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/october-2020-patch-tuesday-smaller-usual-some-systems-need-patching-now#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/october-2020-patch-tuesday-smaller-usual-some-systems-need-patching-now\"},\"author\":{\"name\":\"Gill Langston\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/ccb02e43837727da6ab962f5357e872a\"},\"headline\":\"October 2020 Patch Tuesday: Smaller than usual, but some systems need patching now\",\"datePublished\":\"2020-10-14T22:40:35+01:00\",\"dateModified\":\"2022-06-10T17:15:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/october-2020-patch-tuesday-smaller-usual-some-systems-need-patching-now\"},\"wordCount\":1364,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"articleSection\":[\"Head Nerds\",\"Patch Management\",\"Security\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/october-2020-patch-tuesday-smaller-usual-some-systems-need-patching-now\",\"url\":\"https:\/\/www.n-able.com\/it\/blog\/october-2020-patch-tuesday-smaller-usual-some-systems-need-patching-now\",\"name\":\"October 2020 Patch Tuesday: Smaller than usual, but some systems need patching now - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#website\"},\"datePublished\":\"2020-10-14T22:40:35+01:00\",\"dateModified\":\"2022-06-10T17:15:29+00:00\",\"description\":\"SolarWinds MSP takes a look at this month's Patch Tuesday releases, which fixes less than 100 vulnerabilities. But don\u2019t be fooled by that, there are several that do warrant your attention.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/october-2020-patch-tuesday-smaller-usual-some-systems-need-patching-now#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/it\/blog\/october-2020-patch-tuesday-smaller-usual-some-systems-need-patching-now\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/october-2020-patch-tuesday-smaller-usual-some-systems-need-patching-now#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/it\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"October 2020 Patch Tuesday: Smaller than usual, but some systems need patching now\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/it\/#website\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/ccb02e43837727da6ab962f5357e872a\",\"name\":\"Gill Langston\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g\",\"caption\":\"Gill Langston\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"October 2020 Patch Tuesday: Smaller than usual, but some systems need patching now - N-able","description":"SolarWinds MSP takes a look at this month's Patch Tuesday releases, which fixes less than 100 vulnerabilities. But don\u2019t be fooled by that, there are several that do warrant your attention.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/it\/blog\/october-2020-patch-tuesday-smaller-usual-some-systems-need-patching-now","og_locale":"it_IT","og_type":"article","og_title":"October 2020 Patch Tuesday: Smaller than usual, but some systems need patching now - N-able","og_description":"SolarWinds MSP takes a look at this month's Patch Tuesday releases, which fixes less than 100 vulnerabilities. But don\u2019t be fooled by that, there are several that do warrant your attention.","og_url":"https:\/\/www.n-able.com\/it\/blog\/october-2020-patch-tuesday-smaller-usual-some-systems-need-patching-now","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-10-14T21:40:35+00:00","article_modified_time":"2022-06-10T17:15:29+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"Gill Langston","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Scritto da":"Gill Langston","Tempo di lettura stimato":"6 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/it\/blog\/october-2020-patch-tuesday-smaller-usual-some-systems-need-patching-now#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/blog\/october-2020-patch-tuesday-smaller-usual-some-systems-need-patching-now"},"author":{"name":"Gill Langston","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/ccb02e43837727da6ab962f5357e872a"},"headline":"October 2020 Patch Tuesday: Smaller than usual, but some systems need patching now","datePublished":"2020-10-14T22:40:35+01:00","dateModified":"2022-06-10T17:15:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/october-2020-patch-tuesday-smaller-usual-some-systems-need-patching-now"},"wordCount":1364,"publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"articleSection":["Head Nerds","Patch Management","Security"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/it\/blog\/october-2020-patch-tuesday-smaller-usual-some-systems-need-patching-now","url":"https:\/\/www.n-able.com\/it\/blog\/october-2020-patch-tuesday-smaller-usual-some-systems-need-patching-now","name":"October 2020 Patch Tuesday: Smaller than usual, but some systems need patching now - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/#website"},"datePublished":"2020-10-14T22:40:35+01:00","dateModified":"2022-06-10T17:15:29+00:00","description":"SolarWinds MSP takes a look at this month's Patch Tuesday releases, which fixes less than 100 vulnerabilities. But don\u2019t be fooled by that, there are several that do warrant your attention.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/it\/blog\/october-2020-patch-tuesday-smaller-usual-some-systems-need-patching-now#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/it\/blog\/october-2020-patch-tuesday-smaller-usual-some-systems-need-patching-now"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/it\/blog\/october-2020-patch-tuesday-smaller-usual-some-systems-need-patching-now#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/it\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"October 2020 Patch Tuesday: Smaller than usual, but some systems need patching now"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/it\/#website","url":"https:\/\/www.n-able.com\/it\/","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/it\/#organization","name":"N-able","url":"https:\/\/www.n-able.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/ccb02e43837727da6ab962f5357e872a","name":"Gill Langston","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7e3211da194e6f8c74fccea7140d31255418759757a5d157a8eb4fd12fd0f1f2?s=96&d=mm&r=g","caption":"Gill Langston"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/6399","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/comments?post=6399"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/6399\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/media?parent=6399"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}