{"id":8798,"date":"2021-04-15T15:00:24","date_gmt":"2021-04-15T14:00:24","guid":{"rendered":"https:\/\/www.n-able.com\/?p=8798"},"modified":"2023-06-15T22:51:43","modified_gmt":"2023-06-15T21:51:43","slug":"april-2021-patch-tuesday-review","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/pt-br\/blog\/april-2021-patch-tuesday-review","title":{"rendered":"April 2021 Patch Tuesday: Four More Exchange Vulnerabilities Resolved"},"content":{"rendered":"<p class=\"p3\"><span class=\"s1\">While not under active exploit like March\u2019s Exchange vulnerabilities, we are addressing four new security vulnerabilities for Exchange this month. The total number of security fixes are up versus previous months as well, so there is plenty of patching to be done. <\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">There are 110 fixes in for this Patch Tuesday. There are five zero days, with one being under active exploit and 19 critical. These, along with the four Exchange vulnerabilities, should be top priority. <\/span><\/p>\n<h2 class=\"p4\"><span class=\"s1\">Another round of exchange vulnerabilities <\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">There are four new vulnerabilities (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-28480\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2021-28480<\/span><\/a>,\u00a0<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-28481\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2021-28481<\/span><\/a>,\u00a0<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-28482\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2021-28482<\/span><\/a>,\u00a0<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-28483\"><span class=\"s2\">CVE-2021-28483<\/span><\/a>) for Exchange this month, with two being pre-authentication vulnerabilities. Since they are pre-authentication, attackers do not need valid credentials for an Exchange server for exploitation to occur. All four are marked as \u201cexploitation more likely\u201d and with APT and cybercrime groups having a new-found love for Exchange vulnerabilities, it may only be a matter of days before patches for the vulnerabilities are reverse engineered and we see active attacks. <\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Of note is that these vulnerabilities were reported by the NSA;<span class=\"Apple-converted-space\">\u00a0 <\/span><a href=\"https:\/\/msrc-blog.microsoft.com\/2021\/04\/13\/april-2021-update-tuesday-packages-now-available\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Microsoft is urging<\/span><\/a> patching these vulnerabilities as a top priority, and CISA has given federal civilian agencies until Friday, April 16, 2021 to apply the required patches per an updated <a href=\"https:\/\/cyber.dhs.gov\/ed\/21-02\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Emergency Directive 21-02<\/span><\/a>.<\/span><\/p>\n<h2 class=\"p4\"><span class=\"s1\">Windows OS <\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">There are 14 critical and 50 important Windows vulnerabilities this month. Almost all critical are for RPC remote code execution.\u00a0<\/span><\/p>\n<ul class=\"ul1\">\n<li class=\"li3\"><span class=\"s3\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-28336\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2021-28336<\/span><\/a><\/span><span class=\"s1\">\u2014Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/span><\/li>\n<li class=\"li3\"><span class=\"s3\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-28335\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2021-28335<\/span><\/a><\/span><span class=\"s1\">\u2014Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/span><\/li>\n<li class=\"li3\"><span class=\"s3\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-28334\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2021-28334<\/span><\/a><\/span><span class=\"s1\">\u2014Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/span><\/li>\n<li class=\"li3\"><span class=\"s3\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-28338\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2021-28338<\/span><\/a><\/span><span class=\"s1\">\u2014Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/span><\/li>\n<li class=\"li3\"><span class=\"s3\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-28337\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2021-28337<\/span><\/a><\/span><span class=\"s1\">\u2014Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/span><\/li>\n<li class=\"li3\"><span class=\"s3\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-28333\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2021-28333<\/span><\/a><\/span><span class=\"s1\">\u2014Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/span><\/li>\n<li class=\"li3\"><span class=\"s3\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-28329\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2021-28329<\/span><\/a><\/span><span class=\"s1\">\u2014Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/span><\/li>\n<li class=\"li3\"><span class=\"s3\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-28330\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2021-28330<\/span><\/a><\/span><span class=\"s1\">\u2014Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/span><\/li>\n<li class=\"li3\"><span class=\"s3\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-28332\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2021-28332<\/span><\/a><\/span><span class=\"s1\">\u2014Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/span><\/li>\n<li class=\"li3\"><span class=\"s3\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-28331\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2021-28331<\/span><\/a><\/span><span class=\"s1\">\u2014Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/span><\/li>\n<li class=\"li3\"><span class=\"s3\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-28339\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2021-28339<\/span><\/a><\/span><span class=\"s1\">\u2014Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/span><\/li>\n<li class=\"li3\"><span class=\"s3\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-28343\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2021-28343<\/span><\/a><\/span><span class=\"s1\">\u2014Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/span><\/li>\n<\/ul>\n<p class=\"p3\"><span class=\"s4\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-28315\" target=\"_blank\" rel=\"noopener\">CVE-2021-28315<\/a><\/span><span class=\"s1\"> and <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-27095\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2021-27095<\/span><\/a> are for Windows Media Player Video Decoder. <\/span><\/p>\n<h2 class=\"p4\"><span class=\"s1\">Cumulative updates<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">For cumulative updates, we have <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/april-13-2021-kb5001330-os-builds-19041-928-and-19042-928-cead30cd-f284-4115-a42f-d67fec538490\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">KB5001330<\/span><\/a> for Windows 10 20H2 and <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/april-13-2021-kb5001337-os-build-18363-1500-e7336837-2aaa-4f73-995c-ab2ba5013727\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">KB5001337<\/span><\/a> for Windows 10 1909. These cumulative updates include the March out of band update that fixes <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/release-health\/status-windows-10-20h2\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">BSOD related to printing<\/span><\/a>.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">Also a small reminder that Windows 10 1909 reaches end of service as of May 11, 2021 for Home, Pro, Pro for Workstation and Server SAC editions. <\/span><\/p>\n<h2 class=\"p4\"><span class=\"s1\">Browsers<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">Microsoft Edge is dead. Long live Chromium Microsoft Edge. <\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">This month\u2019s cumulative updates also mean the end of Legacy Microsoft Edge. It will be permanently removed and replaced with Chromium-based Microsoft Edge. Microsoft has also said there will be no supported way to block the switch from legacy to Chromium Microsoft Edge.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">While there were no CVEs related to Chromium Microsoft Edge addressed in Patch Tuesday, there were nine addressed earlier on April 1, 2021. These vulnerabilities are addressed as of Microsoft Edge version 89.0.774.68.<\/span><\/p>\n<h2 class=\"p4\"><span class=\"s1\">Other applications <\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">Azure Sphere 21.03 and higher have been updated to address <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-28460\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2021-28460<\/span><\/a>. This carries a CVSS of 8.1. Simply make sure you\u2019re on the appropriate version. <\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">We also have a collection of seven important updates for the Microsoft Office Suite that need to be applied.<\/span><\/p>\n<h2 class=\"p4\"><span class=\"s1\">Zero days<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">Microsoft fixed five zero-day vulnerabilities, with one being actively exploited.<\/span><\/p>\n<ul class=\"ul1\">\n<li class=\"li3\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-27091\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2021-27091<\/span><\/a><\/span><span class=\"s1\">\u2014RPC Endpoint Mapper Service Elevation of Privilege Vulnerability<\/span><\/li>\n<li class=\"li3\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-28312\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2021-28312<\/span><\/a><\/span><span class=\"s1\">\u2014Windows NTFS Denial of Service Vulnerability<\/span><\/li>\n<li class=\"li3\"><span class=\"s5\"><a href=\"http:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-28437\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2021-28437<\/span><\/a><\/span><span class=\"s1\">\u2014Windows Installer Information Disclosure Vulnerability <\/span><\/li>\n<li class=\"li3\"><span class=\"s5\"><a href=\"http:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-28458\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2021-28458<\/span><\/a><\/span><span class=\"s1\">\u2014Azure Library Elevation of Privilege Vulnerability<\/span><\/li>\n<\/ul>\n<h2 class=\"p5\"><span class=\"s1\">Exploitation detected<\/span><\/h2>\n<p class=\"p3\"><span class=\"s4\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-28310\" target=\"_blank\" rel=\"noopener\">CVE-2021-28310<\/a><\/span><span class=\"s1\"> is a zero day listed as being actively exploited. This is an escalation of privilege exploit used to escape sandboxes or get system privileges to facilitate lateral movement on an endpoint. This vulnerability exists in Desktop Windows Manager and patches exists for all Windows 10 versions back to 1803, Windows Server 2019 and Windows Server Core version 2004.<\/span><\/p>\n<h2 class=\"p4\"><span class=\"s1\">Summary<\/span><\/h2>\n<p class=\"p3\"><span class=\"s1\">This is a larger than normal Patch Tuesday with lots of critical and \u201cexploitation more likely\u201d vulnerabilities. While you\u2019ll always have to use your own knowledge and the risk exposure of your environments to decide what to prioritize when it comes to patching, here are the ones you should consider tackling first:<\/span><\/p>\n<table class=\"t1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p3\"><strong><span class=\"s1\">CVE Number<\/span><\/strong><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p3\"><strong><span class=\"s1\">CVE Title<\/span><\/strong><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><strong><span class=\"s1\">CVSS V3.x<\/span><\/strong><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><strong><span class=\"s1\">Exploitability<\/span><\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-28480\" target=\"_blank\" rel=\"noopener\">CVE-2021-28480<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Microsoft Exchange Server Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">9.8<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-28481\" target=\"_blank\" rel=\"noopener\">CVE-2021-28481<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Microsoft Exchange Server Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">9.8<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-28482\" target=\"_blank\" rel=\"noopener\">CVE-2021-28482<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Microsoft Exchange Server Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">8.8<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-28483\" target=\"_blank\" rel=\"noopener\">CVE-2021-28483<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Microsoft Exchange Server Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">9.0<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-28310\" target=\"_blank\" rel=\"noopener\">CVE-2021-28310<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Win32k Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">7.8<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Exploitation Detected<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p7\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-28442%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2021-28442\" target=\"_blank\" rel=\"noopener\">CVE-2021-28442<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Windows TCP\/IP Information Disclosure Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">6.5<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p7\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-28325%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2021-28325\" target=\"_blank\" rel=\"noopener\">CVE-2021-28325<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Windows SMB Information Disclosure Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">6.5<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p7\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-28324%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2021-28324\" target=\"_blank\" rel=\"noopener\">CVE-2021-28324<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Windows SMB Information Disclosure Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">7.5<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p7\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-28319%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2021-28319\" target=\"_blank\" rel=\"noopener\">CVE-2021-28319<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Windows TCP\/IP Driver Denial of Service Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">7.5<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p7\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-27072%22%20%5Co%20%22Open%20%5C%22https:\/\/msrc.microsoft.com\/\/update-guide\/vulnerability\/CVE-2021-27072\" target=\"_blank\" rel=\"noopener\">CVE-2021-27072<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Win32k Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">7.0<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Exploitation More Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-27091\" target=\"_blank\" rel=\"noopener\">CVE-2021-27091<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">RPC Endpoint Mapper Service Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">7.8<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Exploitation Less Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s6\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-28312\" target=\"_blank\" rel=\"noopener\">CVE-2021-28312<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Windows NTFS Denial of Service Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">3.3<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Exploitation Less Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s6\"><a href=\"http:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-28437\" target=\"_blank\" rel=\"noopener\">CVE-2021-28437<\/a><\/span><span class=\"s8\">\u00a0<\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Windows Installer Information Disclosure Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">5.5<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Exploitation Less Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s6\"><a href=\"http:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-28458\" target=\"_blank\" rel=\"noopener\">CVE-2021-28458<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Azure Library Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">7.8<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Exploitation Less Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s6\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-28315\" target=\"_blank\" rel=\"noopener\">CVE-2021-28315<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Windows Media Video Decoder Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">7.8<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Exploitation Less Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s6\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-27095\" target=\"_blank\" rel=\"noopener\">CVE-2021-27095<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Windows Media Video Decoder Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">7.8<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Exploitation Less Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s6\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-28336\" target=\"_blank\" rel=\"noopener\">CVE-2021-28336<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">8.8<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Exploitation Less Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s6\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-28335\" target=\"_blank\" rel=\"noopener\">CVE-2021-28335<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">8.8<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Exploitation Less Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s6\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-28334\" target=\"_blank\" rel=\"noopener\">CVE-2021-28334<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">8.8<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Exploitation Less Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s6\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-28338\" target=\"_blank\" rel=\"noopener\">CVE-2021-28338<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">8.8<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Exploitation Less Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s6\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-28337\" target=\"_blank\" rel=\"noopener\">CVE-2021-28337<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">8.8<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Exploitation Less Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s6\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-28333\" target=\"_blank\" rel=\"noopener\">CVE-2021-28333<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">8.8<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Exploitation Less Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s6\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-28329\" target=\"_blank\" rel=\"noopener\">CVE-2021-28329<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">8.8<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Exploitation Less Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s6\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-28330\" target=\"_blank\" rel=\"noopener\">CVE-2021-28330<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">8.8<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Exploitation Less Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s6\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-28332\" target=\"_blank\" rel=\"noopener\">CVE-2021-28332<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">8.8<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Exploitation Less Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s6\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-28331\" target=\"_blank\" rel=\"noopener\">CVE-2021-28331<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">8.8<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Exploitation Less Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s6\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-28339\" target=\"_blank\" rel=\"noopener\">CVE-2021-28339<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">8.8<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Exploitation Less Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p6\"><span class=\"s6\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2021-28343\" target=\"_blank\" rel=\"noopener\">CVE-2021-28343<\/a><\/span><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Remote Procedure Call Runtime Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">8.8<\/span><\/p>\n<\/td>\n<td class=\"td2\" valign=\"top\">\n<p class=\"p3\"><span class=\"s1\">Exploitation Less Likely<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p class=\"p9\"><span class=\"s1\"><i>Lewis Pope is Head N&#8209;sight RMM Nerd for N&#8209;able you can follow him on Twitter at\u00a0<\/i><a href=\"https:\/\/twitter.com\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s9\"><i>@cybersec_nerd<\/i><\/span><\/a><i>.\u00a0<\/i><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Lewis Pope takes a look at this month\u2019s Patch Tuesday release from Microsoft. There are 110 fixes, with 19 listed as critical.<\/p>\n","protected":false},"author":62,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-8798","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>April 2021 Patch Tuesday Review - N-able<\/title>\n<meta name=\"description\" content=\"Lewis Pope takes a look at this month\u2019s Patch Tuesday release from Microsoft. There are 110 fixes, with 19 listed as critical.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/pt-br\/blog\/april-2021-patch-tuesday-review\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"April 2021 Patch Tuesday Review - N-able\" \/>\n<meta property=\"og:description\" content=\"Lewis Pope takes a look at this month\u2019s Patch Tuesday release from Microsoft. There are 110 fixes, with 19 listed as critical.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/pt-br\/blog\/april-2021-patch-tuesday-review\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-15T14:00:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-15T21:51:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lewis Pope\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lewis Pope\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/april-2021-patch-tuesday-review#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/april-2021-patch-tuesday-review\"},\"author\":{\"name\":\"Lewis Pope\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\"},\"headline\":\"April 2021 Patch Tuesday: Four More Exchange Vulnerabilities Resolved\",\"datePublished\":\"2021-04-15T15:00:24+01:00\",\"dateModified\":\"2023-06-15T21:51:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/april-2021-patch-tuesday-review\"},\"wordCount\":1072,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"articleSection\":[\"Head Nerds\",\"Patch Management\",\"Security\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/april-2021-patch-tuesday-review\",\"url\":\"https:\/\/www.n-able.com\/pt-br\/blog\/april-2021-patch-tuesday-review\",\"name\":\"April 2021 Patch Tuesday Review - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\"},\"datePublished\":\"2021-04-15T15:00:24+01:00\",\"dateModified\":\"2023-06-15T21:51:43+00:00\",\"description\":\"Lewis Pope takes a look at this month\u2019s Patch Tuesday release from Microsoft. There are 110 fixes, with 19 listed as critical.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/april-2021-patch-tuesday-review#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/pt-br\/blog\/april-2021-patch-tuesday-review\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/april-2021-patch-tuesday-review#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/pt-br\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"April 2021 Patch Tuesday: Four More Exchange Vulnerabilities Resolved\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/pt-br?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\",\"name\":\"Lewis Pope\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"caption\":\"Lewis Pope\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"April 2021 Patch Tuesday Review - N-able","description":"Lewis Pope takes a look at this month\u2019s Patch Tuesday release from Microsoft. There are 110 fixes, with 19 listed as critical.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/pt-br\/blog\/april-2021-patch-tuesday-review","og_locale":"pt_BR","og_type":"article","og_title":"April 2021 Patch Tuesday Review - N-able","og_description":"Lewis Pope takes a look at this month\u2019s Patch Tuesday release from Microsoft. There are 110 fixes, with 19 listed as critical.","og_url":"https:\/\/www.n-able.com\/pt-br\/blog\/april-2021-patch-tuesday-review","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2021-04-15T14:00:24+00:00","article_modified_time":"2023-06-15T21:51:43+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"Lewis Pope","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"Lewis Pope","Est. tempo de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/april-2021-patch-tuesday-review#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/april-2021-patch-tuesday-review"},"author":{"name":"Lewis Pope","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae"},"headline":"April 2021 Patch Tuesday: Four More Exchange Vulnerabilities Resolved","datePublished":"2021-04-15T15:00:24+01:00","dateModified":"2023-06-15T21:51:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/april-2021-patch-tuesday-review"},"wordCount":1072,"publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"articleSection":["Head Nerds","Patch Management","Security"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/april-2021-patch-tuesday-review","url":"https:\/\/www.n-able.com\/pt-br\/blog\/april-2021-patch-tuesday-review","name":"April 2021 Patch Tuesday Review - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br#website"},"datePublished":"2021-04-15T15:00:24+01:00","dateModified":"2023-06-15T21:51:43+00:00","description":"Lewis Pope takes a look at this month\u2019s Patch Tuesday release from Microsoft. There are 110 fixes, with 19 listed as critical.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/april-2021-patch-tuesday-review#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/pt-br\/blog\/april-2021-patch-tuesday-review"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/april-2021-patch-tuesday-review#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/pt-br\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"April 2021 Patch Tuesday: Four More Exchange Vulnerabilities Resolved"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/pt-br#website","url":"https:\/\/www.n-able.com\/pt-br","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/pt-br?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/pt-br#organization","name":"N-able","url":"https:\/\/www.n-able.com\/pt-br","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae","name":"Lewis Pope","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","caption":"Lewis Pope"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/8798","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/comments?post=8798"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/8798\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/media?parent=8798"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}