{"id":17873,"date":"2021-05-13T21:26:17","date_gmt":"2021-05-13T20:26:17","guid":{"rendered":"https:\/\/www.n-able.com\/?p=17873"},"modified":"2022-06-10T18:09:34","modified_gmt":"2022-06-10T17:09:34","slug":"may-2021-patch-tuesday-wormable-vulnerability-to-prioritize","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/pt-br\/blog\/may-2021-patch-tuesday-wormable-vulnerability-to-prioritize","title":{"rendered":"May 2021 Patch Tuesday: Wormable vulnerability to prioritize"},"content":{"rendered":"<p class=\"p3\">We received a reprieve this month on the volume of vulnerabilities being addressed during Patch Tuesday but we do have some unique vulnerabilities that are worth highlighting. The lower total count of vulnerabilities should free up more time to deal with the end-of-service dates for Windows 10 versions 1803, 1809, and 1909 if you have any of those in circulation.<\/p>\n<p class=\"p3\">There are a total of 55 vulnerabilities addressed in this month\u2019s Patch Tuesday release. Four are critical, six are marked as \u201cexploitation more likely,\u201d<i> <\/i>and three are zero-days. These along with the Dell vulnerability are the ones you should prioritize in most environments.<\/p>\n<h2 class=\"p4\">Microsoft vulnerabilities<\/h2>\n<p class=\"p3\">We have four remote code vulnerabilities associated with Windows OS and other Microsoft products that are rated as critical, and more marked as \u201cexploitation more likely\u201d<i> <\/i>that should be high on your priority list.<\/p>\n<p class=\"p3\"><span class=\"s1\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-31166\" target=\"_blank\" rel=\"noopener\">CVE-2021-31166<\/a><\/span> is of special note and can affect any Windows 10 systems or Windows Server running as a web server. It is wormable, making it a prime target for exploitation, so you should prioritize this vulnerability for patching.<\/p>\n<table class=\"t1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p5\">CVE #<\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p5\">\u00a0CVE Title<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\" style=\"text-align: left\">CVSS V3.x<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\u00a0Exploitability<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-31166\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">CVE-2021-31166<\/span><\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p5\">\u00a0HTTP Protocol Stack Remote Code Execution Vulnerability<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\u00a09.8<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\u00a0Exploitation More Likely<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-31194\" target=\"_blank\" rel=\"noopener\">CVE-2021-31194<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p5\">\u00a0OLE Automation Remote Code Execution Vulnerability<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\u00a08.8<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\u00a0Exploitation Less Likely<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-26419\" target=\"_blank\" rel=\"noopener\">CVE-2021-26419<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p5\">\u00a0Scripting Engine Memory Corruption Vulnerability<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\u00a07.5<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\u00a0Exploitation More Likely<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-28476\" target=\"_blank\" rel=\"noopener\">CVE-2021-28476<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p5\">\u00a0Hyper-V Remote Code Execution Vulnerability<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\u00a09.9<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\u00a0Exploitation Less Likely<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-28474\" target=\"_blank\" rel=\"noopener\">CVE-2021-28474<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p5\">\u00a0Microsoft SharePoint Server Remote Code Execution Vulnerability<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\u00a08.8<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\u00a0Exploitation More Likely<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-31188\" target=\"_blank\" rel=\"noopener\">CVE-2021-31188<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p5\">\u00a0Windows Graphics Component Elevation of Privilege Vulnerability<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\u00a07.8<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\u00a0Exploitation More Likely<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-31181\" target=\"_blank\" rel=\"noopener\">CVE-2021-31181<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p5\">\u00a0Microsoft SharePoint Remote Code Execution Vulnerability<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\u00a08.8<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\u00a0Exploitation More Likely<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-31170\" target=\"_blank\" rel=\"noopener\">CVE-2021-31170<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p5\">\u00a0Windows Graphics Component Elevation of Privilege Vulnerability<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\u00a07.8<\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">\u00a0Exploitation More Likely<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 class=\"p4\">Cumulative updates<\/h2>\n<p class=\"p3\">May 2021 brings the End of Service and last cumulative updates for Windows 10 1803, 1809, and 1909. These builds will no longer be receiving monthly security and quality updates. Microsoft, of course, recommends updating to versions 2004 or 20H2.<\/p>\n<p class=\"p3\">Both cumulative <a href=\"https:\/\/support.microsoft.com\/help\/5003169\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">KB5003169 (OS Build 18363.1556)<\/span><\/a> and <a href=\"https:\/\/support.microsoft.com\/help\/5003173\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">KB5003173 (OS Builds 19041.985 and 19042.985)<\/span><\/a> come with an assortment of security updates. KB5003173 does include a new \u201cNews and Interests\u201d feed that will deliver news stories, finance, and weather information and will live on the taskbar.<\/p>\n<h2 class=\"p4\">Third-party vulnerabilities<\/h2>\n<p class=\"p3\">There were also a number of vulnerabilities this past month that were addressed by third-party vendors.<\/p>\n<h3 class=\"p7\">Dell client platform control vulnerability<\/h3>\n<p class=\"p3\">Dell announced <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-21551\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">CVE-2021-21551<\/span><\/a> that affects the dbutil_2_3.sys driver used by the Dell assortment of firmware update utilities and driver management software. We have an automation manager policy available in the <a href=\"https:\/\/me.n-able.com\/s\/article\/Delete-DBUtil-2-3-sys-Dell-Vulnerability-AMP\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">Automation Cookbook<\/span><\/a> that will remove the offending dbutil_2_3.sys as a stop-gap mitigation, but you will still need to follow the <a href=\"https:\/\/www.dell.com\/support\/kbdoc\/en-us\/000186019\/dsa-2021-088-dell-client-platform-security-update-for-dell-driver-insufficient-access-control-vulnerability\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">guidance<\/span><\/a> from Dell to permanently resolve this.<\/p>\n<h3 class=\"p7\">Adobe<\/h3>\n<p class=\"p3\">Twelve different Adobe applications received fixes for 43 vulnerabilities this month with one being actively exploited in Adobe Reader. <a href=\"https:\/\/helpx.adobe.com\/security\/products\/acrobat\/apsb21-29.html\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">CVE-2021-28550<\/span><\/a> affects multiple versions of Adobe Reader, and Adobe Reader should receive top priority as it is seeing active exploitation.<\/p>\n<h3 class=\"p4\">Browsers<\/h3>\n<p class=\"p3\">Internet Explorer 11 and 9\u2014yes you read that correctly\u2014had <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-26419\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">CVE-2021-26419<\/span><\/a> addressed with Security Updates. With a CVSS of 7.5 and marked as \u201cexploitation more likely,\u201d now is a good time to audit your environments for Internet Explorer 11 and 9 installs and remove them if possible.<\/p>\n<h2 class=\"p4\">Summary<\/h2>\n<p class=\"p3\">While we have more breathing room this month versus previous months there are still a number of high-priority patches that require your attention. Patch Management in N&#8209;able<sup>\u2122<\/sup> <a href=\"https:\/\/www.n-able.com\/products\/rmm?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">RMM<\/span><\/a> and <a href=\"https:\/\/www.n-able.com\/products\/n-central?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">N&#8209;central<\/span><\/a><span class=\"s1\"><sup>\u00ae<\/sup><\/span> should make it easy for you to contend with the Windows Patch Tuesday and Adobe update for CVE-2021-28550. You\u2019ll still need to check inventory and perform an audit of any Dell systems you have deployed to make sure you address the <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-21551\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">CVE-2021-21551<\/span><\/a> vulnerability.<\/p>\n<p class=\"p9\"><i>Lewis Pope is Head Security Nerd for N&#8209;able you can follow him on Twitter at\u00a0<\/i><a href=\"https:\/\/twitter.com\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s4\"><i>@cybersec_nerd<\/i><\/span><\/a><i>.\u00a0<\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This month\u2019s Patch Tuesday is smaller than usual with just 55 vulnerabilities, including four that are critical. Lewis Pope has the details.<\/p>\n","protected":false},"author":62,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-17873","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>May 2021 Patch Tuesday: Wormable vulnerability to prioritize - N-able<\/title>\n<meta name=\"description\" content=\"This month\u2019s Patch Tuesday is smaller than usual with just 55 vulnerabilities, including four that are critical. Lewis Pope has the details.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/pt-br\/blog\/may-2021-patch-tuesday-wormable-vulnerability-to-prioritize\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"May 2021 Patch Tuesday: Wormable vulnerability to prioritize - N-able\" \/>\n<meta property=\"og:description\" content=\"This month\u2019s Patch Tuesday is smaller than usual with just 55 vulnerabilities, including four that are critical. Lewis Pope has the details.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/pt-br\/blog\/may-2021-patch-tuesday-wormable-vulnerability-to-prioritize\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-13T20:26:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-10T17:09:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope-white.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"720\" \/>\n\t<meta property=\"og:image:height\" content=\"356\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lewis Pope\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope-white.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lewis Pope\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/may-2021-patch-tuesday-wormable-vulnerability-to-prioritize#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/may-2021-patch-tuesday-wormable-vulnerability-to-prioritize\"},\"author\":{\"name\":\"Lewis Pope\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\"},\"headline\":\"May 2021 Patch Tuesday: Wormable vulnerability to prioritize\",\"datePublished\":\"2021-05-13T21:26:17+01:00\",\"dateModified\":\"2022-06-10T17:09:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/may-2021-patch-tuesday-wormable-vulnerability-to-prioritize\"},\"wordCount\":616,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"articleSection\":[\"Head Nerds\",\"Patch Management\",\"Security\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/may-2021-patch-tuesday-wormable-vulnerability-to-prioritize\",\"url\":\"https:\/\/www.n-able.com\/pt-br\/blog\/may-2021-patch-tuesday-wormable-vulnerability-to-prioritize\",\"name\":\"May 2021 Patch Tuesday: Wormable vulnerability to prioritize - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\"},\"datePublished\":\"2021-05-13T21:26:17+01:00\",\"dateModified\":\"2022-06-10T17:09:34+00:00\",\"description\":\"This month\u2019s Patch Tuesday is smaller than usual with just 55 vulnerabilities, including four that are critical. Lewis Pope has the details.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/may-2021-patch-tuesday-wormable-vulnerability-to-prioritize#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/pt-br\/blog\/may-2021-patch-tuesday-wormable-vulnerability-to-prioritize\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/may-2021-patch-tuesday-wormable-vulnerability-to-prioritize#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/pt-br\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"May 2021 Patch Tuesday: Wormable vulnerability to prioritize\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/pt-br?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\",\"name\":\"Lewis Pope\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"caption\":\"Lewis Pope\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"May 2021 Patch Tuesday: Wormable vulnerability to prioritize - N-able","description":"This month\u2019s Patch Tuesday is smaller than usual with just 55 vulnerabilities, including four that are critical. Lewis Pope has the details.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/pt-br\/blog\/may-2021-patch-tuesday-wormable-vulnerability-to-prioritize","og_locale":"pt_BR","og_type":"article","og_title":"May 2021 Patch Tuesday: Wormable vulnerability to prioritize - N-able","og_description":"This month\u2019s Patch Tuesday is smaller than usual with just 55 vulnerabilities, including four that are critical. Lewis Pope has the details.","og_url":"https:\/\/www.n-able.com\/pt-br\/blog\/may-2021-patch-tuesday-wormable-vulnerability-to-prioritize","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2021-05-13T20:26:17+00:00","article_modified_time":"2022-06-10T17:09:34+00:00","og_image":[{"width":720,"height":356,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope-white.jpg","type":"image\/jpeg"}],"author":"Lewis Pope","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope-white.jpg","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"Lewis Pope","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/may-2021-patch-tuesday-wormable-vulnerability-to-prioritize#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/may-2021-patch-tuesday-wormable-vulnerability-to-prioritize"},"author":{"name":"Lewis Pope","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae"},"headline":"May 2021 Patch Tuesday: Wormable vulnerability to prioritize","datePublished":"2021-05-13T21:26:17+01:00","dateModified":"2022-06-10T17:09:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/may-2021-patch-tuesday-wormable-vulnerability-to-prioritize"},"wordCount":616,"publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"articleSection":["Head Nerds","Patch Management","Security"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/may-2021-patch-tuesday-wormable-vulnerability-to-prioritize","url":"https:\/\/www.n-able.com\/pt-br\/blog\/may-2021-patch-tuesday-wormable-vulnerability-to-prioritize","name":"May 2021 Patch Tuesday: Wormable vulnerability to prioritize - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br#website"},"datePublished":"2021-05-13T21:26:17+01:00","dateModified":"2022-06-10T17:09:34+00:00","description":"This month\u2019s Patch Tuesday is smaller than usual with just 55 vulnerabilities, including four that are critical. Lewis Pope has the details.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/may-2021-patch-tuesday-wormable-vulnerability-to-prioritize#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/pt-br\/blog\/may-2021-patch-tuesday-wormable-vulnerability-to-prioritize"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/may-2021-patch-tuesday-wormable-vulnerability-to-prioritize#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/pt-br\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"May 2021 Patch Tuesday: Wormable vulnerability to prioritize"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/pt-br#website","url":"https:\/\/www.n-able.com\/pt-br","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/pt-br?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/pt-br#organization","name":"N-able","url":"https:\/\/www.n-able.com\/pt-br","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae","name":"Lewis Pope","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","caption":"Lewis Pope"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/17873","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/comments?post=17873"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/17873\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/media?parent=17873"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}