{"id":30134,"date":"2022-03-10T23:08:10","date_gmt":"2022-03-10T23:08:10","guid":{"rendered":"https:\/\/www.n-able.com\/?p=30134"},"modified":"2022-06-10T17:59:59","modified_gmt":"2022-06-10T16:59:59","slug":"march-2022-patch-tuesday","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/pt-br\/blog\/march-2022-patch-tuesday","title":{"rendered":"March 2022 Patch Tuesday: Time to cover the basics"},"content":{"rendered":"<p class=\"p3\">Patch Tuesday for March of 2022 arrives during a shifting landscape of geopolitical machinations that have cybersecurity defenders on edge. Microsoft issued 71 security fixes this month with <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-24508\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">CVE-2022-24508<\/span><\/a> and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-23277\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">CVE-2022-23277<\/span><\/a> being worthy of making it to the top of your priority lists, but you shouldn\u2019t stop there. Now is a great time to audit environments to make sure you don\u2019t have unpatched or unsupported appliances or software still in production.<\/p>\n<p class=\"p3\">C-suites and other decision makers might have a newfound interest in pushing for cybersecurity improvements; be mindful not to let this new pressure compel cramming months of security and infrastructure improvements into a few days. A sound foundation of the basics to build on first (MFA, an endpoint detection and response solution on all workstations and servers, and robust patch management) can significantly improve defensive capabilities of environments in a timelier manner.<\/p>\n<h2 class=\"p4\">Microsoft Vulnerabilities<\/h2>\n<p class=\"p3\">March offers another month of relatively tame security fixes from Microsoft\u201471 in total with 3 Zero-days, and 10 marked as \u201cExploitation More Likely\u201d. Even though none of these are marked as \u201cExploitation Detected\u201d, don\u2019t rest on your laurels. Use this opportunity to play catchup on any outstanding patches, upgrades, or firmware updates across your estate. Most current malicious threat actor campaigns right now aren\u2019t using unknown vulnerabilities; they are using tried and true methods against vulnerabilities that have had updates, fixes, or mitigation workarounds for months or years.<\/p>\n<p class=\"p3\">As mentioned above <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-24508\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">CVE-2022-24508<\/span><\/a> and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-23277\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">CVE-2022-23277<\/span><\/a> are two vulnerabilities of note for this month. CVE-2022-24508 is for Windows SMBv3 so exposure is potentially wide-ranging for anyone supporting a PC environment. It is also marked as \u201cExploitation More Likely\u201d<i> <\/i>and an existing proof of concept for attacks is available. CVE-2022-23277 is an RCE affecting Microsoft Exchange Server 2013, 2016, and 2019. With Exchange being a favorite target over the past year and SMBv3 being so pervasive, there is a good chance these will be the first vulnerabilities being addressed this month to see successful attacks in the wild.<\/p>\n<h2 class=\"p4\">Vulnerability Prioritization<\/h2>\n<p class=\"p3\">It is important to not just prioritize vulnerabilities based on their severity but also their exploitation likelihood. Vulnerabilities marked as \u201cExploitation More Likely\u201d<i> <\/i>are as important, and some may say even more important, to address quickly due to their increased likelihood to cause actual impacts to an environment. These CVEs from Microsoft should be top of the list as they are all marked as \u201cExploitation More Likely\u201d, \u201cExploitation Detected\u201d, or \u201cCritical\u201d.<\/p>\n<table class=\"t1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p5\"><strong>CVE<\/strong><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p5\"><strong>Description<\/strong><\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\"><strong>Exploitability<\/strong><\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\"><strong>Severity<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-23277%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-23277\" target=\"_blank\" rel=\"noopener\">CVE-2022-23277<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p7\">Microsoft Exchange Server RCE<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-22006%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-22006\" target=\"_blank\" rel=\"noopener\">CVE-2022-22006<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p7\">HEVC Video Extensions RCE<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p7\">Exploitation Less Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p8\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-24501\" target=\"_blank\" rel=\"noopener\">CVE-2022-24501<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p9\">VP9 Video Extensions RCE<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation Less Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Critical<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-24508%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-24508\" target=\"_blank\" rel=\"noopener\">CVE-2022-24508<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p7\">Windows SMBv3 Client\/Server RCE<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-23286%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-23286\" target=\"_blank\" rel=\"noopener\">CVE-2022-23286<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p7\">Windows Cloud Files Mini Filter Driver Elevation of Privilege<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-23285%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-23285\" target=\"_blank\" rel=\"noopener\">CVE-2022-23285<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p7\">Remote Desktop Client Remote Code Execution Vulnerability<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-23253%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-23253\" target=\"_blank\" rel=\"noopener\">CVE-2022-23253<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p7\">Point-to-Point Tunneling Protocol Denial of Service Vulnerability<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-24507%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-24507\" target=\"_blank\" rel=\"noopener\">CVE-2022-24507<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p7\">Windows Ancillary Function Driver for WinSock Elevation of Privilege<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-24502%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-24502\" target=\"_blank\" rel=\"noopener\">CVE-2022-24502<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p7\">Windows HTML Platforms Security Feature Bypass<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-23299%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-23299\" target=\"_blank\" rel=\"noopener\">CVE-2022-23299<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p7\">Windows PDEV Elevation of Privilege<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-23294%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-23294\" target=\"_blank\" rel=\"noopener\">CVE-2022-23294<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p7\">Windows Event Tracing RCE<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Important<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s2\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21990%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2022-21990\" target=\"_blank\" rel=\"noopener\">CVE-2022-21990<\/a><\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p7\">Remote Desktop Client RCE<\/p>\n<\/td>\n<td class=\"td3\" valign=\"top\">\n<p class=\"p5\">Exploitation More Likely<\/p>\n<\/td>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Important<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 class=\"p4\">Cumulative Updates<\/h2>\n<p class=\"p3\"><span class=\"s1\"><a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/march-8-2022-kb5011487-os-builds-19042-1586-19043-1586-and-19044-1586-8297eadb-3b8b-4ca5-9083-ca41a91c1c56\" target=\"_blank\" rel=\"noopener\">KB5011487<\/a><\/span> (OS Builds 19042.1586, 19043.1586, and 19044.1586) and <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/march-8-2022-kb5011485-os-build-18363-2158-ae8accde-7a32-4ca2-a888-54bb7e57fdde\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">KB5011485<\/span><\/a> (OS Build 18363.2158) have an assortment of bug fixes for Microsoft Edge Internet Explorer mode and a Windows reset bug that did not delete all OneDrive data when a computer was reset with the \u201cRemove Everything\u201d option.<\/p>\n<h2 class=\"p4\">Summary<\/h2>\n<p class=\"p3\">Make sure that if you\u2019re feeling the pressure to react to global concerns by stake holders, you\u2019re addressing security basics and following the <a href=\"https:\/\/www.nist.gov\/cyberframework\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">NIST Cybersecurity Framework<\/span><\/a>, <a href=\"https:\/\/www.cisecurity.org\/controls\/cis-controls-list\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">CIS 18 Controls<\/span><\/a><span class=\"s1\">,<\/span> or another collection of recognized security controls. Also keep things in perspective. Spending days of labor and capex to put an expensive lock on an attic window doesn\u2019t do you any good if your front door is always open. Make sure the basics are being covered.<\/p>\n<p class=\"p3\">As always, make sure you have established patching processes for evaluation, testing, and pushing into production. If you have traditionally only dealt with patches by applying them based on their severity consider including prioritization of patches for zero days, \u201cExploitation Detected\u201d, and \u201cExploitation More Likely\u201d vulnerabilities in your <a href=\"https:\/\/www.n-able.com\/features\/windows-patch-management?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">patch management<\/span><\/a> routines.<\/p>\n<p class=\"p10\"><i>Lewis Pope is the head security nerd at N&#8209;able. You can follow him on:<\/i><\/p>\n<p class=\"p11\"><span class=\"s3\"><i>Twitter:\u00a0<\/i><a href=\"https:\/\/twitter.com\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s4\"><i>@cybersec_nerd<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p11\"><span class=\"s3\"><i>LinkedIn:\u00a0<\/i><a href=\"https:\/\/www.linkedin.com\/in\/thesecuritypope\" target=\"_blank\" rel=\"noopener\"><span class=\"s4\"><i>thesecuritypope<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p11\"><span class=\"s3\"><i>Twitch:\u00a0<\/i><a href=\"https:\/\/www.twitch.tv\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s4\"><i>cybersec_nerd<\/i><\/span><\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This month sees 71 security fixes from Microsoft, with 3 zero days and 10 marked as \u201cExploitation More Likely\u201d. Lewis Pope takes a closer look.<\/p>\n","protected":false},"author":62,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-30134","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>March 2022 Patch Tuesday: Time to cover the basics - N-able<\/title>\n<meta name=\"description\" content=\"This month sees 71 security fixes from Microsoft, with 3 zero days and 10 marked as \u201cExploitation More Likely\u201d. this blog takes a closer look.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/pt-br\/blog\/march-2022-patch-tuesday\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"March 2022 Patch Tuesday: Time to cover the basics - N-able\" \/>\n<meta property=\"og:description\" content=\"This month sees 71 security fixes from Microsoft, with 3 zero days and 10 marked as \u201cExploitation More Likely\u201d. this blog takes a closer look.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/pt-br\/blog\/march-2022-patch-tuesday\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-10T23:08:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-10T16:59:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"720\" \/>\n\t<meta property=\"og:image:height\" content=\"356\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lewis Pope\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lewis Pope\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/march-2022-patch-tuesday#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/march-2022-patch-tuesday\"},\"author\":{\"name\":\"Lewis Pope\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\"},\"headline\":\"March 2022 Patch Tuesday: Time to cover the basics\",\"datePublished\":\"2022-03-10T23:08:10+00:00\",\"dateModified\":\"2022-06-10T16:59:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/march-2022-patch-tuesday\"},\"wordCount\":753,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"articleSection\":[\"Head Nerds\",\"Patch Management\",\"Security\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/march-2022-patch-tuesday\",\"url\":\"https:\/\/www.n-able.com\/pt-br\/blog\/march-2022-patch-tuesday\",\"name\":\"March 2022 Patch Tuesday: Time to cover the basics - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\"},\"datePublished\":\"2022-03-10T23:08:10+00:00\",\"dateModified\":\"2022-06-10T16:59:59+00:00\",\"description\":\"This month sees 71 security fixes from Microsoft, with 3 zero days and 10 marked as \u201cExploitation More Likely\u201d. this blog takes a closer look.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/march-2022-patch-tuesday#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/pt-br\/blog\/march-2022-patch-tuesday\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/march-2022-patch-tuesday#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Head Nerds\",\"item\":\"https:\/\/www.n-able.com\/pt-br\/blog\/category\/head-nerds-pt-br\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"March 2022 Patch Tuesday: Time to cover the basics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/pt-br?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\",\"name\":\"Lewis Pope\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"caption\":\"Lewis Pope\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"March 2022 Patch Tuesday: Time to cover the basics - N-able","description":"This month sees 71 security fixes from Microsoft, with 3 zero days and 10 marked as \u201cExploitation More Likely\u201d. this blog takes a closer look.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/pt-br\/blog\/march-2022-patch-tuesday","og_locale":"pt_BR","og_type":"article","og_title":"March 2022 Patch Tuesday: Time to cover the basics - N-able","og_description":"This month sees 71 security fixes from Microsoft, with 3 zero days and 10 marked as \u201cExploitation More Likely\u201d. this blog takes a closer look.","og_url":"https:\/\/www.n-able.com\/pt-br\/blog\/march-2022-patch-tuesday","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2022-03-10T23:08:10+00:00","article_modified_time":"2022-06-10T16:59:59+00:00","og_image":[{"width":720,"height":356,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope.jpg","type":"image\/jpeg"}],"author":"Lewis Pope","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/blog-Lewis-Pope.jpg","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"Lewis Pope","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/march-2022-patch-tuesday#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/march-2022-patch-tuesday"},"author":{"name":"Lewis Pope","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae"},"headline":"March 2022 Patch Tuesday: Time to cover the basics","datePublished":"2022-03-10T23:08:10+00:00","dateModified":"2022-06-10T16:59:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/march-2022-patch-tuesday"},"wordCount":753,"publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"articleSection":["Head Nerds","Patch Management","Security"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/march-2022-patch-tuesday","url":"https:\/\/www.n-able.com\/pt-br\/blog\/march-2022-patch-tuesday","name":"March 2022 Patch Tuesday: Time to cover the basics - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br#website"},"datePublished":"2022-03-10T23:08:10+00:00","dateModified":"2022-06-10T16:59:59+00:00","description":"This month sees 71 security fixes from Microsoft, with 3 zero days and 10 marked as \u201cExploitation More Likely\u201d. this blog takes a closer look.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/march-2022-patch-tuesday#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/pt-br\/blog\/march-2022-patch-tuesday"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/march-2022-patch-tuesday#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Head Nerds","item":"https:\/\/www.n-able.com\/pt-br\/blog\/category\/head-nerds-pt-br"},{"@type":"ListItem","position":2,"name":"March 2022 Patch Tuesday: Time to cover the basics"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/pt-br#website","url":"https:\/\/www.n-able.com\/pt-br","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/pt-br?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/pt-br#organization","name":"N-able","url":"https:\/\/www.n-able.com\/pt-br","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae","name":"Lewis Pope","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","caption":"Lewis Pope"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/30134","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/comments?post=30134"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/30134\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/media?parent=30134"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}