{"id":12598,"date":"2021-02-24T01:17:34","date_gmt":"2021-02-24T01:17:34","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=12598"},"modified":"2021-02-24T01:17:34","modified_gmt":"2021-02-24T01:17:34","slug":"windows-tcp-ip-remote-code-execution-vulnerability-cve-2021-24074","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/windows-tcp-ip-remote-code-execution-vulnerability-cve-2021-24074\/","title":{"rendered":"Windows TCP\/IP Remote Code Execution Vulnerability (CVE-2021-24074)"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>Vulnerability Description<\/strong><\/h2>\n\n\n\n<p>On February 10, NSFOCUS found that Microsoft fixed the Windows TCP\/IP remote code execution vulnerability (CVE-2021-24074) in its February updates. This vulnerability exists in the IPv4 source routing which is blocked by default in Windows systems. Attackers, via a crafted IP packet, could exploit this vulnerability to execute arbitrary code on a target host. This vulnerability, with a CVSS score of 9.8, affects all versions of Windows. Affected users are advised to apply the updates for protection as soon as possible.<\/p>\n\n\n\n<p>Reference link: <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-24074\">https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-24074<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Scope of Impact<\/strong><\/h2>\n\n\n\n<p><strong>Affected Versions:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Windows Server, version 20H2 (Server Core Installation)<\/li><li>Windows 10 Version 20H2 for ARM64-based Systems<\/li><li>Windows 10 Version 20H2 for 32-bit Systems<\/li><li>Windows 10 Version 20H2 for x64-based Systems<\/li><li>Windows Server, version 2004 (Server Core installation)<\/li><li>Windows 10 Version 2004 for x64-based Systems<\/li><li>Windows 10 Version 2004 for ARM64-based Systems<\/li><li>Windows 10 Version 2004 for 32-bit Systems<\/li><li>Windows Server, version 1909 (Server Core installation)<\/li><li>Windows 10 Version 1909 for ARM64-based Systems<\/li><li>Windows 10 Version 1909 for x64-based Systems<\/li><li>Windows 10 Version 1909 for 32-bit Systems<\/li><li>Windows Server 2012 R2 (Server Core installation)<\/li><li>Windows Server 2012 R2<\/li><li>Windows Server 2012 (Server Core installation)<\/li><li>Windows Server 2012<\/li><li>Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)<\/li><li>Windows Server 2008 R2 for x64-based Systems Service Pack 1<\/li><li>Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)<\/li><li>Windows Server 2008 for x64-based Systems Service Pack 2<\/li><li>Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)<\/li><li>Windows Server 2008 for 32-bit Systems Service Pack 2<\/li><li>Windows RT 8.1<\/li><li>Windows 8.1 for x64-based systems<\/li><li>Windows 8.1 for 32-bit systems<\/li><li>Windows 7 for x64-based Systems Service Pack 1<\/li><li>Windows 7 for 32-bit Systems Service Pack 1<\/li><li>Windows Server 2016&nbsp;&nbsp;&nbsp; (Server Core installation)<\/li><li>Windows Server 2016<\/li><li>Windows 10 Version 1607 for x64-based Systems<\/li><li>Windows 10 Version 1607 for 32-bit Systems<\/li><li>Windows 10 for x64-based Systems<\/li><li>Windows 10 for 32-bit Systems<\/li><li>Windows Server 2019&nbsp;&nbsp;&nbsp; (Server Core installation)<\/li><li>Windows Server 2019<\/li><li>Windows 10 Version 1809 for ARM64-based Systems<\/li><li>Windows 10 Version 1809 for x64-based Systems<\/li><li>Windows 10 Version 1809 for 32-bit Systems<\/li><li>Windows 10 Version 1803 for ARM64-based Systems<\/li><li>Windows 10 Version 1803 for x64-based Systems<\/li><li>Windows 10 Version 1803 for 32-bit Systems<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Official Fix<\/strong><\/h2>\n\n\n\n<p>Currently, Microsoft has released security updates to fix this vulnerability in system versions supported by Microsoft. Affected users are strongly advised to apply these updates as soon as possible. These updates are available at the following link:<\/p>\n\n\n\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-24074\">https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2021-24074<\/a><\/p>\n\n\n\n<p>Note: Your Windows Update may fail to install the updates due to network and computer environment issues.<\/p>\n\n\n\n<p>Therefore, users are advised to check whether the patches are successfully updated immediately after installation.<\/p>\n\n\n\n<p>Right-click the <strong>Start<\/strong> button and choose <strong>Settings (N)<\/strong> &gt; <strong>Update &amp; Security &gt; Windows Update<\/strong> to view the message on the page. Alternatively, you can view historical updates by clicking <strong>View update history<\/strong>. If an update fails to be successfully installed, you can click the update name to open the Microsoft&#8217;s official update download page. Users are advised to click the links on the page to visit the &#8220;Microsoft Update Catalog&#8221; website to download and install independent packages.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Statement<\/strong><\/h2>\n\n\n\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>About NSFOCUS<\/strong><\/h2>\n\n\n\n<p>NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyberattacks. The company&#8217;s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide multi-layered, unified and dynamic protection against advanced cyber attacks.<\/p>\n\n\n\n<p>NSFOCUS works with Fortune Global 500 companies, including four of the world&#8217;s five largest financial institutions, organizations in insurance, retail, healthcare, critical infrastructure industries as well as government agencies. NSFOCUS has technology and channel partners in more than 60 countries, is a member of both the Microsoft Active Protections Program (MAPP), and the Cloud Security Alliance (CSA).<\/p>\n\n\n\n<p>A wholly owned subsidiary of NSFOCUS Technologies Group Co., Ltd., the company has operations in the Americas, Europe, the Middle East and Asia Pacific.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Vulnerability Description On February 10, NSFOCUS found that Microsoft fixed the Windows TCP\/IP remote code execution vulnerability (CVE-2021-24074) in its February updates. This vulnerability exists in the IPv4 source routing which is blocked by default in Windows systems. Attackers, via a crafted IP packet, could exploit this vulnerability to execute arbitrary code on a target [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":26347,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[6],"tags":[195,680,752],"class_list":["post-12598","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-emergency-response","tag-cve-2021-24074","tag-tcp-ip","tag-windows"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Windows TCP\/IP Remote Code Execution Vulnerability (CVE-2021-24074) - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/windows-tcp-ip-remote-code-execution-vulnerability-cve-2021-24074\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Windows TCP\/IP Remote Code Execution Vulnerability (CVE-2021-24074) - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Vulnerability Description On February 10, NSFOCUS found that Microsoft fixed the Windows TCP\/IP remote code execution vulnerability (CVE-2021-24074) in\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/windows-tcp-ip-remote-code-execution-vulnerability-cve-2021-24074\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-24T01:17:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/Figure-2.4-Attack-vectors-with-hailBot.png\" \/>\n<meta name=\"author\" content=\"Jie Ji\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Windows TCP\/IP Remote Code Execution Vulnerability (CVE-2021-24074) - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Vulnerability Description On February 10, NSFOCUS found that Microsoft fixed the Windows TCP\/IP remote code execution vulnerability (CVE-2021-24074) in\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/Figure-2.4-Attack-vectors-with-hailBot.png\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jie Ji\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/windows-tcp-ip-remote-code-execution-vulnerability-cve-2021-24074\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/windows-tcp-ip-remote-code-execution-vulnerability-cve-2021-24074\\\/\"},\"author\":{\"name\":\"Jie Ji\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\"},\"headline\":\"Windows TCP\\\/IP Remote Code Execution Vulnerability (CVE-2021-24074)\",\"datePublished\":\"2021-02-24T01:17:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/windows-tcp-ip-remote-code-execution-vulnerability-cve-2021-24074\\\/\"},\"wordCount\":736,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/windows-tcp-ip-remote-code-execution-vulnerability-cve-2021-24074\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Figure-2.4-Attack-vectors-with-hailBot.png\",\"keywords\":[\"CVE-2021-24074\",\"TCP\\\/IP\",\"Windows\"],\"articleSection\":[\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/windows-tcp-ip-remote-code-execution-vulnerability-cve-2021-24074\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/windows-tcp-ip-remote-code-execution-vulnerability-cve-2021-24074\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/windows-tcp-ip-remote-code-execution-vulnerability-cve-2021-24074\\\/\",\"name\":\"Windows TCP\\\/IP Remote Code Execution Vulnerability (CVE-2021-24074) - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/windows-tcp-ip-remote-code-execution-vulnerability-cve-2021-24074\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/windows-tcp-ip-remote-code-execution-vulnerability-cve-2021-24074\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Figure-2.4-Attack-vectors-with-hailBot.png\",\"datePublished\":\"2021-02-24T01:17:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/windows-tcp-ip-remote-code-execution-vulnerability-cve-2021-24074\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/windows-tcp-ip-remote-code-execution-vulnerability-cve-2021-24074\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/windows-tcp-ip-remote-code-execution-vulnerability-cve-2021-24074\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Figure-2.4-Attack-vectors-with-hailBot.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Figure-2.4-Attack-vectors-with-hailBot.png\",\"width\":524,\"height\":526,\"caption\":\"Code analysis with attack function annotations.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/windows-tcp-ip-remote-code-execution-vulnerability-cve-2021-24074\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Windows TCP\\\/IP Remote Code Execution Vulnerability (CVE-2021-24074)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\",\"name\":\"Jie Ji\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"caption\":\"Jie Ji\"},\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/jji\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Windows TCP\/IP Remote Code Execution Vulnerability (CVE-2021-24074) - NSFOCUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/windows-tcp-ip-remote-code-execution-vulnerability-cve-2021-24074\/","og_locale":"pt_BR","og_type":"article","og_title":"Windows TCP\/IP Remote Code Execution Vulnerability (CVE-2021-24074) - NSFOCUS","og_description":"Vulnerability Description On February 10, NSFOCUS found that Microsoft fixed the Windows TCP\/IP remote code execution vulnerability (CVE-2021-24074) in","og_url":"https:\/\/nsfocusglobal.com\/windows-tcp-ip-remote-code-execution-vulnerability-cve-2021-24074\/","og_site_name":"NSFOCUS","article_published_time":"2021-02-24T01:17:34+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/Figure-2.4-Attack-vectors-with-hailBot.png","type":"","width":"","height":""}],"author":"Jie Ji","twitter_card":"summary_large_image","twitter_title":"Windows TCP\/IP Remote Code Execution Vulnerability (CVE-2021-24074) - NSFOCUS","twitter_description":"Vulnerability Description On February 10, NSFOCUS found that Microsoft fixed the Windows TCP\/IP remote code execution vulnerability (CVE-2021-24074) in","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/Figure-2.4-Attack-vectors-with-hailBot.png","twitter_misc":{"Escrito por":"Jie Ji","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/windows-tcp-ip-remote-code-execution-vulnerability-cve-2021-24074\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/windows-tcp-ip-remote-code-execution-vulnerability-cve-2021-24074\/"},"author":{"name":"Jie Ji","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b"},"headline":"Windows TCP\/IP Remote Code Execution Vulnerability (CVE-2021-24074)","datePublished":"2021-02-24T01:17:34+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/windows-tcp-ip-remote-code-execution-vulnerability-cve-2021-24074\/"},"wordCount":736,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/windows-tcp-ip-remote-code-execution-vulnerability-cve-2021-24074\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/Figure-2.4-Attack-vectors-with-hailBot.png","keywords":["CVE-2021-24074","TCP\/IP","Windows"],"articleSection":["Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/windows-tcp-ip-remote-code-execution-vulnerability-cve-2021-24074\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/windows-tcp-ip-remote-code-execution-vulnerability-cve-2021-24074\/","url":"https:\/\/nsfocusglobal.com\/windows-tcp-ip-remote-code-execution-vulnerability-cve-2021-24074\/","name":"Windows TCP\/IP Remote Code Execution Vulnerability (CVE-2021-24074) - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/windows-tcp-ip-remote-code-execution-vulnerability-cve-2021-24074\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/windows-tcp-ip-remote-code-execution-vulnerability-cve-2021-24074\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/Figure-2.4-Attack-vectors-with-hailBot.png","datePublished":"2021-02-24T01:17:34+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/windows-tcp-ip-remote-code-execution-vulnerability-cve-2021-24074\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/windows-tcp-ip-remote-code-execution-vulnerability-cve-2021-24074\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/windows-tcp-ip-remote-code-execution-vulnerability-cve-2021-24074\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/Figure-2.4-Attack-vectors-with-hailBot.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/09\/Figure-2.4-Attack-vectors-with-hailBot.png","width":524,"height":526,"caption":"Code analysis with attack function annotations."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/windows-tcp-ip-remote-code-execution-vulnerability-cve-2021-24074\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Windows TCP\/IP Remote Code Execution Vulnerability (CVE-2021-24074)"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b","name":"Jie Ji","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","caption":"Jie Ji"},"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/jji\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/12598","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=12598"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/12598\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/26347"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=12598"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=12598"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=12598"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}