{"id":12821,"date":"2021-04-12T08:50:05","date_gmt":"2021-04-12T08:50:05","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=12821"},"modified":"2021-04-12T08:50:05","modified_gmt":"2021-04-12T08:50:05","slug":"openssl-denial-of-service-and-certificate-bypass-check-vulnerabilities-cve-2021-3449-cve-2021-3450-threat-alert","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/openssl-denial-of-service-and-certificate-bypass-check-vulnerabilities-cve-2021-3449-cve-2021-3450-threat-alert\/","title":{"rendered":"OpenSSL Denial-of-Service and Certificate Bypass Check Vulnerabilities (CVE-2021-3449\/CVE-2021-3450) Threat Alert"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Vulnerability Description<\/h2>\n\n\n\n<p>On March 26, 2021, NSFOCUS detected that OpenSSL issued a security advisory fixing a denial-of-service vulnerability and a certificate check bypass vulnerability (CVE-2021-3449\/CVE-2021-3450) in OpenSSL products. Currently, the proof of concept (PoC) of this vulnerability has been made publicly available. Relevant users are advised to take protective measures as soon as possible.<\/p>\n\n\n\n<p>CVE-2021-3449: A NULL pointer dereference exists in renegotiation enabled by OpenSSL TLSv1.2 by default. By sending a maliciously crafted renegotiation ClientHello message from a client, attackers could crash the server, resulting in a denial of service.<\/p>\n\n\n\n<p>CVE-2021-3450: On an OpenSSL server that enables X509_V_FLAG_X509_STRICT, an error exists in the verification logic in the X.509 certificate chain. As a result, an affected application accepts valid certificates signed by non-CA certificates or the certificate chain, which allows attackers to conduct man-in-the-middle (MiTM) attacks and obtain sensitive information.<\/p>\n\n\n\n<p>OpenSSL is an open-source software library for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end. It is widely used in Internet web servers.<\/p>\n\n\n\n<p>Reference link:<\/p>\n\n\n\n<p><a href=\"https:\/\/www.openssl.org\/news\/vulnerabilities.html\">https:\/\/www.openssl.org\/news\/vulnerabilities.html<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Scope of Impact<\/h2>\n\n\n\n<p><strong>CVE-2021-3449:<\/strong><strong><\/strong><\/p>\n\n\n\n<p><strong>Affected Versions<\/strong>: OpenSSL 1.1.1-1.1.1j<\/p>\n\n\n\n<p><strong>CVE-2021-3450:<\/strong><strong><\/strong><\/p>\n\n\n\n<p><strong>Affected Versions<\/strong>: OpenSSL 1.1.1h-1.1.1j<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Check for the Vulnerability<\/h2>\n\n\n\n<p><strong>Manual Check<\/strong><\/p>\n\n\n\n<p>You can check whether your software is affected by the OpenSSL denial-of-service vulnerability (CVE-2021-3449) via the following method:<\/p>\n\n\n\n<div class=\"wp-block-group has-very-light-gray-background-color has-background\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<p>openssl s_client -tls1_2 -connect your_domain:443<\/p>\n\n\n\n<p>[Press the R key]<\/p>\n<\/div><\/div>\n\n\n\n<p>Check the content below RENEGOTIATING. If the keyword &#8220;verify&#8221; is included, the software may be vulnerable. If write:errno=0 appears, the software will not be affected by this vulnerability.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Mitigation<\/h2>\n\n\n\n<p><strong>Official Fix<\/strong><\/p>\n\n\n\n<p>Currently, the preceding vulnerabilities have been fixed in the latest version. If you are affected by these vulnerabilities, please upgrade your installation as soon as possible via <a href=\"https:\/\/www.openssl.org\/source\/\">https:\/\/www.openssl.org\/source\/<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Statement<\/h2>\n\n\n\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Vulnerability Description On March 26, 2021, NSFOCUS detected that OpenSSL issued a security advisory fixing a denial-of-service vulnerability and a certificate check bypass vulnerability (CVE-2021-3449\/CVE-2021-3450) in OpenSSL products. Currently, the proof of concept (PoC) of this vulnerability has been made publicly available. Relevant users are advised to take protective measures as soon as possible. CVE-2021-3449: [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":12319,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[6],"tags":[569],"class_list":["post-12821","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-emergency-response","tag-openssl"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>OpenSSL Denial-of-Service and Certificate Bypass Check Vulnerabilities (CVE-2021-3449\/CVE-2021-3450) Threat Alert - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/openssl-denial-of-service-and-certificate-bypass-check-vulnerabilities-cve-2021-3449-cve-2021-3450-threat-alert\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OpenSSL Denial-of-Service and Certificate Bypass Check Vulnerabilities (CVE-2021-3449\/CVE-2021-3450) Threat Alert - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Vulnerability Description On March 26, 2021, NSFOCUS detected that OpenSSL issued a security advisory fixing a denial-of-service vulnerability and a\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/openssl-denial-of-service-and-certificate-bypass-check-vulnerabilities-cve-2021-3449-cve-2021-3450-threat-alert\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-12T08:50:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/openssl.jpg\" \/>\n<meta name=\"author\" content=\"Jie Ji\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"OpenSSL Denial-of-Service and Certificate Bypass Check Vulnerabilities (CVE-2021-3449\/CVE-2021-3450) Threat Alert - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Vulnerability Description On March 26, 2021, NSFOCUS detected that OpenSSL issued a security advisory fixing a denial-of-service vulnerability and a\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/openssl.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jie Ji\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/openssl-denial-of-service-and-certificate-bypass-check-vulnerabilities-cve-2021-3449-cve-2021-3450-threat-alert\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/openssl-denial-of-service-and-certificate-bypass-check-vulnerabilities-cve-2021-3449-cve-2021-3450-threat-alert\\\/\"},\"author\":{\"name\":\"Jie Ji\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\"},\"headline\":\"OpenSSL Denial-of-Service and Certificate Bypass Check Vulnerabilities (CVE-2021-3449\\\/CVE-2021-3450) Threat Alert\",\"datePublished\":\"2021-04-12T08:50:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/openssl-denial-of-service-and-certificate-bypass-check-vulnerabilities-cve-2021-3449-cve-2021-3450-threat-alert\\\/\"},\"wordCount\":412,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/openssl-denial-of-service-and-certificate-bypass-check-vulnerabilities-cve-2021-3449-cve-2021-3450-threat-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/openssl.jpg\",\"keywords\":[\"openssl\"],\"articleSection\":[\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/openssl-denial-of-service-and-certificate-bypass-check-vulnerabilities-cve-2021-3449-cve-2021-3450-threat-alert\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/openssl-denial-of-service-and-certificate-bypass-check-vulnerabilities-cve-2021-3449-cve-2021-3450-threat-alert\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/openssl-denial-of-service-and-certificate-bypass-check-vulnerabilities-cve-2021-3449-cve-2021-3450-threat-alert\\\/\",\"name\":\"OpenSSL Denial-of-Service and Certificate Bypass Check Vulnerabilities (CVE-2021-3449\\\/CVE-2021-3450) Threat Alert - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/openssl-denial-of-service-and-certificate-bypass-check-vulnerabilities-cve-2021-3449-cve-2021-3450-threat-alert\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/openssl-denial-of-service-and-certificate-bypass-check-vulnerabilities-cve-2021-3449-cve-2021-3450-threat-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/openssl.jpg\",\"datePublished\":\"2021-04-12T08:50:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/openssl-denial-of-service-and-certificate-bypass-check-vulnerabilities-cve-2021-3449-cve-2021-3450-threat-alert\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/openssl-denial-of-service-and-certificate-bypass-check-vulnerabilities-cve-2021-3449-cve-2021-3450-threat-alert\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/openssl-denial-of-service-and-certificate-bypass-check-vulnerabilities-cve-2021-3449-cve-2021-3450-threat-alert\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/openssl.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/openssl.jpg\",\"width\":500,\"height\":234,\"caption\":\"OpenSSL logo with red and black text.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/openssl-denial-of-service-and-certificate-bypass-check-vulnerabilities-cve-2021-3449-cve-2021-3450-threat-alert\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"OpenSSL Denial-of-Service and Certificate Bypass Check Vulnerabilities (CVE-2021-3449\\\/CVE-2021-3450) Threat Alert\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\",\"name\":\"Jie Ji\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"caption\":\"Jie Ji\"},\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/jji\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"OpenSSL Denial-of-Service and Certificate Bypass Check Vulnerabilities (CVE-2021-3449\/CVE-2021-3450) Threat Alert - NSFOCUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/openssl-denial-of-service-and-certificate-bypass-check-vulnerabilities-cve-2021-3449-cve-2021-3450-threat-alert\/","og_locale":"pt_BR","og_type":"article","og_title":"OpenSSL Denial-of-Service and Certificate Bypass Check Vulnerabilities (CVE-2021-3449\/CVE-2021-3450) Threat Alert - NSFOCUS","og_description":"Vulnerability Description On March 26, 2021, NSFOCUS detected that OpenSSL issued a security advisory fixing a denial-of-service vulnerability and a","og_url":"https:\/\/nsfocusglobal.com\/openssl-denial-of-service-and-certificate-bypass-check-vulnerabilities-cve-2021-3449-cve-2021-3450-threat-alert\/","og_site_name":"NSFOCUS","article_published_time":"2021-04-12T08:50:05+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/openssl.jpg","type":"","width":"","height":""}],"author":"Jie Ji","twitter_card":"summary_large_image","twitter_title":"OpenSSL Denial-of-Service and Certificate Bypass Check Vulnerabilities (CVE-2021-3449\/CVE-2021-3450) Threat Alert - NSFOCUS","twitter_description":"Vulnerability Description On March 26, 2021, NSFOCUS detected that OpenSSL issued a security advisory fixing a denial-of-service vulnerability and a","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/openssl.jpg","twitter_misc":{"Escrito por":"Jie Ji","Est. tempo de leitura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/openssl-denial-of-service-and-certificate-bypass-check-vulnerabilities-cve-2021-3449-cve-2021-3450-threat-alert\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/openssl-denial-of-service-and-certificate-bypass-check-vulnerabilities-cve-2021-3449-cve-2021-3450-threat-alert\/"},"author":{"name":"Jie Ji","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b"},"headline":"OpenSSL Denial-of-Service and Certificate Bypass Check Vulnerabilities (CVE-2021-3449\/CVE-2021-3450) Threat Alert","datePublished":"2021-04-12T08:50:05+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/openssl-denial-of-service-and-certificate-bypass-check-vulnerabilities-cve-2021-3449-cve-2021-3450-threat-alert\/"},"wordCount":412,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/openssl-denial-of-service-and-certificate-bypass-check-vulnerabilities-cve-2021-3449-cve-2021-3450-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/openssl.jpg","keywords":["openssl"],"articleSection":["Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/openssl-denial-of-service-and-certificate-bypass-check-vulnerabilities-cve-2021-3449-cve-2021-3450-threat-alert\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/openssl-denial-of-service-and-certificate-bypass-check-vulnerabilities-cve-2021-3449-cve-2021-3450-threat-alert\/","url":"https:\/\/nsfocusglobal.com\/openssl-denial-of-service-and-certificate-bypass-check-vulnerabilities-cve-2021-3449-cve-2021-3450-threat-alert\/","name":"OpenSSL Denial-of-Service and Certificate Bypass Check Vulnerabilities (CVE-2021-3449\/CVE-2021-3450) Threat Alert - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/openssl-denial-of-service-and-certificate-bypass-check-vulnerabilities-cve-2021-3449-cve-2021-3450-threat-alert\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/openssl-denial-of-service-and-certificate-bypass-check-vulnerabilities-cve-2021-3449-cve-2021-3450-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/openssl.jpg","datePublished":"2021-04-12T08:50:05+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/openssl-denial-of-service-and-certificate-bypass-check-vulnerabilities-cve-2021-3449-cve-2021-3450-threat-alert\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/openssl-denial-of-service-and-certificate-bypass-check-vulnerabilities-cve-2021-3449-cve-2021-3450-threat-alert\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/openssl-denial-of-service-and-certificate-bypass-check-vulnerabilities-cve-2021-3449-cve-2021-3450-threat-alert\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/openssl.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/openssl.jpg","width":500,"height":234,"caption":"OpenSSL logo with red and black text."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/openssl-denial-of-service-and-certificate-bypass-check-vulnerabilities-cve-2021-3449-cve-2021-3450-threat-alert\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"OpenSSL Denial-of-Service and Certificate Bypass Check Vulnerabilities (CVE-2021-3449\/CVE-2021-3450) Threat Alert"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b","name":"Jie Ji","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","caption":"Jie Ji"},"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/jji\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/12821","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=12821"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/12821\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/12319"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=12821"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=12821"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=12821"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}