{"id":26935,"date":"2021-12-16T10:21:57","date_gmt":"2021-12-16T10:21:57","guid":{"rendered":"https:\/\/www.n-able.com\/?p=26935"},"modified":"2022-06-10T18:03:38","modified_gmt":"2022-06-10T17:03:38","slug":"december-2021-patch-tuesday","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/pt-br\/blog\/december-2021-patch-tuesday","title":{"rendered":"December 2021 Patch Tuesday: 76 vulnerabilities and 5 zero days to round out the year"},"content":{"rendered":"<p class=\"p3\">Happy holidays! Congratulations on making it through another year of keeping your systems patched and environments secure. The final Patch Tuesday of 2021 brings us a year-end gift of patches for 72 new vulnerabilities with 4 old vulnerabilities receiving updated patches, for a total of 76. There are also 5 zero days, with one actively exploited Windows AppX Installer spoofing vulnerability in Emotet and Trickbot campaigns\u2014which should be high on priorities lists.<\/p>\n<p class=\"p3\">The big story is the Log4Shell <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-44228\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">CVE-2021-44228<\/span><\/a> vulnerability. N&#8209;able RMM and N&#8209;central have been cleared as either not using the vulnerable Log4J Java library or have had the vulnerability mitigated where Log4J is used. For more information on the N&#8209;able response to Log4Shell, please check our updated statement <a href=\"https:\/\/status.n-able.com\/2021\/12\/13\/apache-log4j-vulnerability-updated-12-p-m-est-december-13-2021\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">here<\/span><\/a>. The silver lining is that the Log4J library typically exists in server-side applications, so efforts can focus on those systems first. For additional information and guidance on Log4Shell, check these <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/12\/11\/guidance-for-preventing-detecting-and-hunting-for-cve-2021-44228-log4j-2-exploitation\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">Microsoft<\/span><\/a> and <a href=\"https:\/\/www.cisa.gov\/uscert\/apache-log4j-vulnerability-guidance\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">CISA<\/span><\/a> resources.<\/p>\n<h2 class=\"p4\">Microsoft vulnerabilities<\/h2>\n<p class=\"p3\">Microsoft released fixes for 59 vulnerabilities marked as Important and eight as Critical. It\u2019s going to be a busy month for teams responsible for patching, with nine of those marked as exploitation more likely. Your teams may need additional bandwidth to deal with these vulnerabilities this month.<\/p>\n<p class=\"p3\">While it might be overshadowed by Log4Shell, the Windows AppX Installer vulnerability <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-43890\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">CVE-2021-43890<\/span><\/a> should also be one of your top priorities. It is a zero day under active exploit, and it requires end-user interaction. However, threat actors leveraging the vulnerability to deliver malware like Emotet and Trickbot are proficient at exploiting end users. Informing end users about this spoofing attack and how to avoid it might be warranted if fixes cannot be immediately applied to environments. See Microsoft\u2019s mitigation and workaround information <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-43890\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">here<\/span><\/a>.<\/p>\n<h2 class=\"p4\">Vulnerability prioritization<\/h2>\n<p class=\"p3\">As always, it is important to not just prioritize vulnerabilities based on their severity but also on how likely they are to be exploited. Addressing vulnerabilities marked as exploitation more likely is as important\u2014some might say even more so\u2014due to their increased likelihood to actually affect an environment. These 10 CVEs from Microsoft should be top of the list, because they are all marked as Exploitation More Likely or Exploitation Detected.<\/p>\n<ul class=\"ul1\">\n<li class=\"li3\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-43890\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">CVE-2021-43890<\/span><\/a><\/span> \u2013 Windows AppX Installer Spoofing<\/li>\n<li class=\"li3\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-43905\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">CVE-2021-43905<\/span><\/a><\/span> \u2013 Microsoft Office App Remote Code Execution<\/li>\n<li class=\"li3\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-43883\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">CVE-2021-43883<\/span><\/a><\/span> \u2013 Windows Installer Elevation of Privilege<\/li>\n<li class=\"li3\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-43880\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">CVE-2021-43880<\/span><\/a><\/span> \u2013 Windows Mobile Device Management Elevation of Privilege<\/li>\n<li class=\"li3\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-43233\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">CVE-2021-43233<\/span><\/a><\/span> \u2013 Remote Desktop Client Remote Code Execution<\/li>\n<li class=\"li3\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-43226\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">CVE-2021-43226<\/span><\/a><\/span> \u2013 Windows Common Log File System Driver Elevation of Privilege<\/li>\n<li class=\"li3\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-43215\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">CVE-2021-43215<\/span><\/a><\/span> \u2013 iSNS Server Memory Corruption Vulnerability<\/li>\n<li class=\"li3\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-43207\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">CVE-2021-43207<\/span><\/a><\/span> \u2013 Windows Common Log File System Driver Elevation of Privilege<\/li>\n<li class=\"li3\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-41333\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">CVE-2021-41333<\/span><\/a><\/span> \u2013 Windows Print Spooler Elevation of Privilege<\/li>\n<li class=\"li3\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2019-0887\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">CVE-2019-0887<\/span><\/a><\/span> \u2013 Remote Desktop Services Remote Code Execution<\/li>\n<\/ul>\n<h2 class=\"p4\">Cumulative updates<\/h2>\n<p class=\"p3\">Nothing out of the ordinary for cumulative updates this month. KB5008212 and KB5008206 were released for Windows 10 Version 2004, 20H2, 21H1, and 21H2. These include security improvements and bug fixes.<\/p>\n<h2 class=\"p4\">End of service for Windows 10 2004<\/h2>\n<p class=\"p3\">Windows 10 Version 2004 receives its last security update this month, as it has hit EOS. It\u2019s a good time to audit for this older build of Windows 10 in your environments and plan upgrades accordingly.<\/p>\n<h2 class=\"p4\">Apple<\/h2>\n<p class=\"p3\">If you are supporting Apple devices, make sure to review Apple\u2019s <a href=\"https:\/\/support.apple.com\/en-us\/HT201222\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">security updates<\/span><\/a>.<\/p>\n<h2 class=\"p4\">Cisco<\/h2>\n<p class=\"p3\">Cisco published advisories this month concerning Log4Shell along with security updates. If you have Cisco equipment in your stack, you should review <a href=\"https:\/\/tools.cisco.com\/security\/center\/publicationListing.x\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">security updates<\/span><\/a>.<\/p>\n<h2 class=\"p4\">VMWare<\/h2>\n<p class=\"p3\">If you support VMWare, check out their <a href=\"https:\/\/www.vmware.com\/security\/advisories\/VMSA-2021-0028.html\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">advisory<\/span><\/a> about impacts of Log4j and the affected products.<\/p>\n<h2 class=\"p4\">Summary<\/h2>\n<p class=\"p3\">As always, make sure you have established patching processes for evaluation, testing, and pushing into production. If you have traditionally dealt only with patches by applying them based on their severity, now is the time to start including prioritization of patches for zero-day, exploitation detected, and exploitation more likely vulnerabilities in your <a href=\"https:\/\/www.n-able.com\/features\/windows-patch-management\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">Patch Management<\/span><\/a> routines.<\/p>\n<p>&nbsp;<\/p>\n<p class=\"p5\"><i>Lewis Pope is the head security nerd at N&#8209;able. You can follow him on:<\/i><\/p>\n<p class=\"p6\"><span class=\"s4\"><i>Twitter:\u00a0<\/i><a href=\"https:\/\/twitter.com\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\"><i>@cybersec_nerd<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p6\"><span class=\"s4\"><i>LinkedIn:\u00a0<\/i><a href=\"https:\/\/www.linkedin.com\/in\/thesecuritypope\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\"><i>thesecuritypope<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p6\"><span class=\"s4\"><i>Twitch:\u00a0<\/i><a href=\"https:\/\/www.twitch.tv\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\"><i>cybersec_nerd<\/i><\/span><\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s going to be a busy month, warns Lewis Pope, so your teams may need additional bandwidth to handle dealing with these vulnerabilities.<\/p>\n","protected":false},"author":62,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-26935","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>December 2021 Patch Tuesday: 76 vulnerabilities and 5 zero days to round out the year - N-able<\/title>\n<meta name=\"description\" content=\"You may need additional bandwidth to handle dealing with the vulnerabilities addressed in December&#039;s Patch Tuesday. Find out more here.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/pt-br\/blog\/december-2021-patch-tuesday\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"December 2021 Patch Tuesday: 76 vulnerabilities and 5 zero days to round out the year - N-able\" \/>\n<meta property=\"og:description\" content=\"You may need additional bandwidth to handle dealing with the vulnerabilities addressed in December&#039;s Patch Tuesday. Find out more here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/pt-br\/blog\/december-2021-patch-tuesday\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-16T10:21:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-10T17:03:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope-white.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"720\" \/>\n\t<meta property=\"og:image:height\" content=\"356\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lewis Pope\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope-white.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lewis Pope\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/december-2021-patch-tuesday#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/december-2021-patch-tuesday\"},\"author\":{\"name\":\"Lewis Pope\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\"},\"headline\":\"December 2021 Patch Tuesday: 76 vulnerabilities and 5 zero days to round out the year\",\"datePublished\":\"2021-12-16T10:21:57+00:00\",\"dateModified\":\"2022-06-10T17:03:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/december-2021-patch-tuesday\"},\"wordCount\":670,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"articleSection\":[\"Head Nerds\",\"Patch Management\",\"Security\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/december-2021-patch-tuesday\",\"url\":\"https:\/\/www.n-able.com\/pt-br\/blog\/december-2021-patch-tuesday\",\"name\":\"December 2021 Patch Tuesday: 76 vulnerabilities and 5 zero days to round out the year - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\"},\"datePublished\":\"2021-12-16T10:21:57+00:00\",\"dateModified\":\"2022-06-10T17:03:38+00:00\",\"description\":\"You may need additional bandwidth to handle dealing with the vulnerabilities addressed in December's Patch Tuesday. Find out more here.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/december-2021-patch-tuesday#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/pt-br\/blog\/december-2021-patch-tuesday\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/december-2021-patch-tuesday#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Head Nerds\",\"item\":\"https:\/\/www.n-able.com\/pt-br\/blog\/category\/head-nerds-pt-br\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"December 2021 Patch Tuesday: 76 vulnerabilities and 5 zero days to round out the year\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/pt-br?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\",\"name\":\"Lewis Pope\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"caption\":\"Lewis Pope\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"December 2021 Patch Tuesday: 76 vulnerabilities and 5 zero days to round out the year - N-able","description":"You may need additional bandwidth to handle dealing with the vulnerabilities addressed in December's Patch Tuesday. Find out more here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/pt-br\/blog\/december-2021-patch-tuesday","og_locale":"pt_BR","og_type":"article","og_title":"December 2021 Patch Tuesday: 76 vulnerabilities and 5 zero days to round out the year - N-able","og_description":"You may need additional bandwidth to handle dealing with the vulnerabilities addressed in December's Patch Tuesday. Find out more here.","og_url":"https:\/\/www.n-able.com\/pt-br\/blog\/december-2021-patch-tuesday","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2021-12-16T10:21:57+00:00","article_modified_time":"2022-06-10T17:03:38+00:00","og_image":[{"width":720,"height":356,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope-white.jpg","type":"image\/jpeg"}],"author":"Lewis Pope","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope-white.jpg","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"Lewis Pope","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/december-2021-patch-tuesday#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/december-2021-patch-tuesday"},"author":{"name":"Lewis Pope","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae"},"headline":"December 2021 Patch Tuesday: 76 vulnerabilities and 5 zero days to round out the year","datePublished":"2021-12-16T10:21:57+00:00","dateModified":"2022-06-10T17:03:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/december-2021-patch-tuesday"},"wordCount":670,"publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"articleSection":["Head Nerds","Patch Management","Security"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/december-2021-patch-tuesday","url":"https:\/\/www.n-able.com\/pt-br\/blog\/december-2021-patch-tuesday","name":"December 2021 Patch Tuesday: 76 vulnerabilities and 5 zero days to round out the year - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br#website"},"datePublished":"2021-12-16T10:21:57+00:00","dateModified":"2022-06-10T17:03:38+00:00","description":"You may need additional bandwidth to handle dealing with the vulnerabilities addressed in December's Patch Tuesday. Find out more here.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/december-2021-patch-tuesday#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/pt-br\/blog\/december-2021-patch-tuesday"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/december-2021-patch-tuesday#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Head Nerds","item":"https:\/\/www.n-able.com\/pt-br\/blog\/category\/head-nerds-pt-br"},{"@type":"ListItem","position":2,"name":"December 2021 Patch Tuesday: 76 vulnerabilities and 5 zero days to round out the year"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/pt-br#website","url":"https:\/\/www.n-able.com\/pt-br","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/pt-br?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/pt-br#organization","name":"N-able","url":"https:\/\/www.n-able.com\/pt-br","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae","name":"Lewis Pope","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","caption":"Lewis Pope"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/26935","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/comments?post=26935"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/26935\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/media?parent=26935"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}