{"id":25076,"date":"2021-10-13T17:07:16","date_gmt":"2021-10-13T16:07:16","guid":{"rendered":"https:\/\/www.n-able.com\/?p=25076"},"modified":"2022-06-10T18:04:50","modified_gmt":"2022-06-10T17:04:50","slug":"october-2021-patch-tuesday-more-print-spooler-and-exchange-vulnerabilities-lurk","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/pt-br\/blog\/october-2021-patch-tuesday-more-print-spooler-and-exchange-vulnerabilities-lurk","title":{"rendered":"October 2021 Patch Tuesday: More Print Spooler and Exchange vulnerabilities lurk"},"content":{"rendered":"<p class=\"p3\">The number of vulnerabilities addressed by Microsoft this month continues to trend down, a reprieve from earlier in the year. Security patches are available for 74 vulnerabilities with a smattering of Zero-Days, Critical, and <i>Exploitation More Likely<\/i>. This month also has a set of noteworthy updates for Apple and Apache.<\/p>\n<p class=\"p3\">Though we only have 74 vulnerabilities being addressed, there are 1,608 permutations of specific patches for specific builds of Windows OS. Some vulnerabilities might receive the same patch for four different builds, while another may need a different one for each.<\/p>\n<p class=\"p3\">This is why managing patches without a centralized solution can be untenable for MSPs. The ability to audit updates and patches is a must, and the tools commonly used by MSPs and system admins to accomplish this can make it seem fairly trivial. But don\u2019t let a good tool detract from the complexity and importance of the underlying task when positioning <a href=\"https:\/\/www.n-able.com\/features\/windows-patch-management\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">patch management<\/span><\/a> within a managed services contract.<\/p>\n<h2 class=\"p4\">Microsoft vulnerabilities<\/h2>\n<p class=\"p3\">Including Microsoft Edge vulnerabilities (which are typically patched prior to Patch Tuesdays), we have a total of 81 for October. Four of them are zero-days\u2014flaws that were publicly disclosed or are under active exploit prior to fixes being available. There are nine vulnerabilities listed as <i>Exploitation More Likely<\/i> that should also be on everyone\u2019s prioritization.<span class=\"Apple-converted-space\">\u00a0 \u00a0<\/span><\/p>\n<p class=\"p3\">CVE-2021-40449 is of note since it is under active exploitation by APT groups and has been leveraged to deliver the <a href=\"https:\/\/threatpost.com\/windows-zero-day-exploited-espionage\/175432\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">MysterySnail RAT<\/span><\/a>. Further attacks leveraging this <i>elevation of privilege<\/i> vulnerability would not be surprising.<\/p>\n<p class=\"p3\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-26427\" target=\"_blank\" rel=\"noopener\">CVE-2021-26427<\/a><\/span> (an Exchange vulnerability) and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-36970\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2021-36970<\/span><\/a> (a Windows Print Spooler vulnerability) also get called out because they may bring headaches similar to those experienced earlier this year with PrintNightmare and ProxyLogon. Make sure these are included in your earliest possible patch windows.<\/p>\n<h2 class=\"p4\">Vulnerability prioritization<\/h2>\n<p class=\"p3\">The table below lists Critical, <i>Exploitation More Likely,<\/i> or <i>Exploitation Detected <\/i>vulnerabilities. This is to highlight how some might have their patching deferred due to a false sense of importance based on a severity rating. Vulnerabilities marked <i>Exploitation More Likely <\/i>are just as important to address, and quickly, due to their increased likelihood to cause impacts to an environment.<\/p>\n<table class=\"t1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p5\"><strong>CVE<\/strong><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\"><strong>Description<\/strong><\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p6\"><strong>Exploitability<\/strong><\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p6\"><strong>Severity<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p7\"><span class=\"s3\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-40486\" target=\"_blank\" rel=\"noopener\">CVE-2021-40486<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\">Microsoft Word Remote Code Execution Vulnerability<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p6\">Exploitation Less Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p6\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p7\"><span class=\"s3\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-40461\" target=\"_blank\" rel=\"noopener\">CVE-2021-40461<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p8\">Windows Hyper-V Remote Code Execution Vulnerability<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p6\">Exploitation Less Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p6\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p7\"><span class=\"s3\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-38672\" target=\"_blank\" rel=\"noopener\">CVE-2021-38672<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p9\">Windows Hyper-V Remote Code Execution Vulnerability<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p6\">Exploitation Less Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p6\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p7\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-40449%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2021-40449\" target=\"_blank\" rel=\"noopener\">CVE-2021-40449<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p10\">Win32k Elevation of Privilege Vulnerability<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p6\">Exploitation Detected<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p6\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p7\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-41357%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2021-41357\" target=\"_blank\" rel=\"noopener\">CVE-2021-41357<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p10\">Win32k Elevation of Privilege Vulnerability<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p6\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p6\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p7\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-41344%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2021-41344\" target=\"_blank\" rel=\"noopener\">CVE-2021-41344<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p10\">Microsoft SharePoint Server Remote Code Execution Vulnerability<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p6\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p6\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p7\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-40487%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2021-40487\" target=\"_blank\" rel=\"noopener\">CVE-2021-40487<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p10\">Microsoft SharePoint Server Remote Code Execution Vulnerability<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p6\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p6\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p7\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-40470%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2021-40470\" target=\"_blank\" rel=\"noopener\">CVE-2021-40470<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p11\">DirectX Graphics Kernel Elevation of Privilege Vulnerability<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p6\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p6\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p7\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-40467%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2021-40467\" target=\"_blank\" rel=\"noopener\">CVE-2021-40467<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p10\">Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p6\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p6\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p7\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-40466%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2021-40466\" target=\"_blank\" rel=\"noopener\">CVE-2021-40466<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p10\">Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p6\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p6\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p7\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-40450%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2021-40450\" target=\"_blank\" rel=\"noopener\">CVE-2021-40450<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p10\">Win32k Elevation of Privilege Vulnerability<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p6\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p6\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p7\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-40443%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2021-40443\" target=\"_blank\" rel=\"noopener\">CVE-2021-40443<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p10\">Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p6\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p6\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p7\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-36970%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2021-36970\" target=\"_blank\" rel=\"noopener\">CVE-2021-36970<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p10\">Windows Print Spooler Spoofing Vulnerability<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p6\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p6\">Important<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 class=\"p4\">Cumulative updates<\/h2>\n<p class=\"p3\">KB5006670 and KB5006667 cumulative updates were released with typical previous security fixes included for Windows 10 versions 21H1, 20H2, 2004, and 1909. There were also some notable bug fixes included, such as resolving intermittent Outlook freezing and an issue where some apps would not allow keyboard input if the taskbar was not positioned along the bottom of the screen.<\/p>\n<h2 class=\"p4\">End of Service for Windows 10 2004<\/h2>\n<p class=\"p3\">Joining previous Windows builds that hit EoS this year, Windows 10 2004 will no longer receive security updates after December 14, 2021. That\u2019s only three months to plan for transition to newer builds. If you don\u2019t already have plans in motion, then today is the day to start.<\/p>\n<h2 class=\"p4\">Apple<\/h2>\n<p class=\"p3\">Apple released <a href=\"https:\/\/support.apple.com\/en-us\/HT212846\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">security updates<\/span><\/a> for iOS to fix zero-day vulnerability <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-30883\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-201-30883<\/span><\/a> that can be used to exfiltrate data or install malware. There is a freely available <a href=\"https:\/\/saaramar.github.io\/IOMFB_integer_overflow_poc\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">POC<\/span><\/a> leveraging this vulnerability. If you manage iPads or iPhones, getting the new Apple update applied should be a priority item.<\/p>\n<h2 class=\"p4\">Apache<\/h2>\n<p class=\"p3\">While not as prevalent as other solutions that fall under the purview of most MSPs, the sheer deployment base of Apache Web Servers means it is on everyone\u2019s radar when vulnerabilities affect it. The Apache Software Foundation released Apache HTTP 2.4.51 to address an incomplete fix for <a href=\"https:\/\/httpd.apache.org\/security\/vulnerabilities_24.html\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2021-42013<\/span><\/a> that is under active exploit. Attackers are <a href=\"https:\/\/us-cert.cisa.gov\/ncas\/current-activity\/2021\/10\/07\/apache-releases-http-server-version-2451-address-vulnerabilities\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">actively scanning<\/span><\/a> the internet for Apache HTTP Servers vulnerable to CVE-2021-41773 and CVE-2021-42013 an is likely to increase. Ensure any HTTP Web Server 2.4.50 are updated ASAP.<\/p>\n<h2 class=\"p4\">Summary<\/h2>\n<p class=\"p3\">As always, make sure you have established patching processes for evaluation, testing, and pushing into production. If you have traditionally only dealt with patches by applying them based on their severity, then now is the time to start including prioritization of patches for Zero-Days, Exploitation Detected and Exploitation More Likely vulnerabilities in your <a href=\"https:\/\/www.n-able.com\/features\/windows-patch-management?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">patch management<\/span><\/a> routines.<\/p>\n<p class=\"p13\"><i>Lewis Pope is the Head Security Nerd at N&#8209;able. You can follow him on:<\/i><\/p>\n<p class=\"p14\"><span class=\"s4\"><i>Twitter:\u00a0<\/i><a href=\"https:\/\/twitter.com\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\"><i>@cybersec_nerd<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p14\"><span class=\"s4\"><i>LinkedIn:\u00a0<\/i><a href=\"https:\/\/www.linkedin.com\/in\/thesecuritypope\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\"><i>thesecuritypope<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p14\"><span class=\"s4\"><i>Twitch:\u00a0<\/i><a href=\"https:\/\/www.twitch.tv\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\"><i>cybersec_nerd<\/i><\/span><\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>October sees another decrease in the number of vulnerability fixes, bringing availability to 74 with a smattering of Zero-Days, Critical, and Exploitation More Likely. Plus, there are notable patches for&#8230;<\/p>\n","protected":false},"author":62,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-25076","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>October 2021 Patch Tuesday: More Print Spooler and Exchange vulnerabilities lurk - N-able<\/title>\n<meta name=\"description\" content=\"October sees another decrease in the number of vulnerability fixes. Plus, there are notable patches for Apple and Apache. Find out more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/pt-br\/blog\/october-2021-patch-tuesday-more-print-spooler-and-exchange-vulnerabilities-lurk\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"October 2021 Patch Tuesday: More Print Spooler and Exchange vulnerabilities lurk - N-able\" \/>\n<meta property=\"og:description\" content=\"October sees another decrease in the number of vulnerability fixes. Plus, there are notable patches for Apple and Apache. Find out more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/pt-br\/blog\/october-2021-patch-tuesday-more-print-spooler-and-exchange-vulnerabilities-lurk\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-13T16:07:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-10T17:04:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"720\" \/>\n\t<meta property=\"og:image:height\" content=\"356\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lewis Pope\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lewis Pope\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/october-2021-patch-tuesday-more-print-spooler-and-exchange-vulnerabilities-lurk#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/october-2021-patch-tuesday-more-print-spooler-and-exchange-vulnerabilities-lurk\"},\"author\":{\"name\":\"Lewis Pope\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\"},\"headline\":\"October 2021 Patch Tuesday: More Print Spooler and Exchange vulnerabilities lurk\",\"datePublished\":\"2021-10-13T17:07:16+01:00\",\"dateModified\":\"2022-06-10T17:04:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/october-2021-patch-tuesday-more-print-spooler-and-exchange-vulnerabilities-lurk\"},\"wordCount\":860,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"articleSection\":[\"Head Nerds\",\"Patch Management\",\"Security\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/october-2021-patch-tuesday-more-print-spooler-and-exchange-vulnerabilities-lurk\",\"url\":\"https:\/\/www.n-able.com\/pt-br\/blog\/october-2021-patch-tuesday-more-print-spooler-and-exchange-vulnerabilities-lurk\",\"name\":\"October 2021 Patch Tuesday: More Print Spooler and Exchange vulnerabilities lurk - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\"},\"datePublished\":\"2021-10-13T17:07:16+01:00\",\"dateModified\":\"2022-06-10T17:04:50+00:00\",\"description\":\"October sees another decrease in the number of vulnerability fixes. Plus, there are notable patches for Apple and Apache. Find out more.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/october-2021-patch-tuesday-more-print-spooler-and-exchange-vulnerabilities-lurk#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/pt-br\/blog\/october-2021-patch-tuesday-more-print-spooler-and-exchange-vulnerabilities-lurk\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/october-2021-patch-tuesday-more-print-spooler-and-exchange-vulnerabilities-lurk#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/pt-br\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"October 2021 Patch Tuesday: More Print Spooler and Exchange vulnerabilities lurk\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/pt-br?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\",\"name\":\"Lewis Pope\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"caption\":\"Lewis Pope\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"October 2021 Patch Tuesday: More Print Spooler and Exchange vulnerabilities lurk - N-able","description":"October sees another decrease in the number of vulnerability fixes. Plus, there are notable patches for Apple and Apache. Find out more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/pt-br\/blog\/october-2021-patch-tuesday-more-print-spooler-and-exchange-vulnerabilities-lurk","og_locale":"pt_BR","og_type":"article","og_title":"October 2021 Patch Tuesday: More Print Spooler and Exchange vulnerabilities lurk - N-able","og_description":"October sees another decrease in the number of vulnerability fixes. Plus, there are notable patches for Apple and Apache. Find out more.","og_url":"https:\/\/www.n-able.com\/pt-br\/blog\/october-2021-patch-tuesday-more-print-spooler-and-exchange-vulnerabilities-lurk","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2021-10-13T16:07:16+00:00","article_modified_time":"2022-06-10T17:04:50+00:00","og_image":[{"width":720,"height":356,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope.jpg","type":"image\/jpeg"}],"author":"Lewis Pope","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope.jpg","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"Lewis Pope","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/october-2021-patch-tuesday-more-print-spooler-and-exchange-vulnerabilities-lurk#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/october-2021-patch-tuesday-more-print-spooler-and-exchange-vulnerabilities-lurk"},"author":{"name":"Lewis Pope","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae"},"headline":"October 2021 Patch Tuesday: More Print Spooler and Exchange vulnerabilities lurk","datePublished":"2021-10-13T17:07:16+01:00","dateModified":"2022-06-10T17:04:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/october-2021-patch-tuesday-more-print-spooler-and-exchange-vulnerabilities-lurk"},"wordCount":860,"publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"articleSection":["Head Nerds","Patch Management","Security"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/october-2021-patch-tuesday-more-print-spooler-and-exchange-vulnerabilities-lurk","url":"https:\/\/www.n-able.com\/pt-br\/blog\/october-2021-patch-tuesday-more-print-spooler-and-exchange-vulnerabilities-lurk","name":"October 2021 Patch Tuesday: More Print Spooler and Exchange vulnerabilities lurk - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br#website"},"datePublished":"2021-10-13T17:07:16+01:00","dateModified":"2022-06-10T17:04:50+00:00","description":"October sees another decrease in the number of vulnerability fixes. Plus, there are notable patches for Apple and Apache. Find out more.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/october-2021-patch-tuesday-more-print-spooler-and-exchange-vulnerabilities-lurk#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/pt-br\/blog\/october-2021-patch-tuesday-more-print-spooler-and-exchange-vulnerabilities-lurk"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/october-2021-patch-tuesday-more-print-spooler-and-exchange-vulnerabilities-lurk#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/pt-br\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"October 2021 Patch Tuesday: More Print Spooler and Exchange vulnerabilities lurk"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/pt-br#website","url":"https:\/\/www.n-able.com\/pt-br","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/pt-br?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/pt-br#organization","name":"N-able","url":"https:\/\/www.n-able.com\/pt-br","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae","name":"Lewis Pope","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","caption":"Lewis Pope"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/25076","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/comments?post=25076"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/25076\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/media?parent=25076"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}