{"id":17520,"date":"2021-07-23T08:40:26","date_gmt":"2021-07-23T08:40:26","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=17520"},"modified":"2021-07-23T08:40:26","modified_gmt":"2021-07-23T08:40:26","slug":"solarwinds-serv-u-remote-code-execution-vulnerability-cve-2021-35211-threat-alert","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/solarwinds-serv-u-remote-code-execution-vulnerability-cve-2021-35211-threat-alert\/","title":{"rendered":"SolarWinds Serv-U Remote Code Execution Vulnerability (CVE-2021-35211) Threat Alert"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Overview<\/h2>\n\n\n\n<p>Recently, NSFOCUS CERT, through ongoing monitoring, found that SolarWinds released a security advisory fixing a remote code execution vulnerability (CVE-2021-35211). Microsoft reported to SolarWinds that they had discovered that the vulnerability was exploited in the wild and provided a proof of concept of the exploit. Unauthenticated, remote attackers could exploit this vulnerability to execute arbitrary code with privileges on the affected system. Affected users are advised to take preventive measures as soon as possible.<\/p>\n\n\n\n<p>According to SolarWinds, the vulnerability exists in SSH and is unrelated to the SUNBURST supply chain attack. It only affects Serv-U Managed File Transfer and Serv-U Secure FTP. SSH is enabled by default when the Serv-U Management Console wizard is used to create domains. If SSH is not enabled in the Serv-U environment, the vulnerability does not cause impact.<\/p>\n\n\n\n<p>Reference link: <a href=\"https:\/\/www.solarwinds.com\/trust-center\/security-advisories\/cve-2021-35211\">https:\/\/www.solarwinds.com\/trust-center\/security-advisories\/cve-2021-35211<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Scope of Impact<\/h2>\n\n\n\n<p><strong>Affected Versions<a><\/a><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Serv-U &lt; = 15.2.3 HF1<\/li><\/ul>\n\n\n\n<p><strong>Unaffected Versions<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Serv-U = 15.2.3 HF2<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Security Check<\/h2>\n\n\n\n<p>1. Users can check whether SSH is enabled in the Serv-U environment.<\/p>\n\n\n\n<p>SSH is enabled by default when the Serv-U Management Console wizard is used to create domains. If <strong>SFTP using SSH<\/strong> is selected, the vulnerability causes impact.<\/p>\n\n\n\n<p>2. Users can check whether the Serv-U environment throws exceptions.<\/p>\n\n\n\n<p>Collect the <strong>DebugSocketlog.txt<\/strong> log file and check whether there exists the following exception log:<\/p>\n\n\n\n<p class=\"has-background has-very-light-gray-background-color\">07] Tue 01Jun21 02:42:58 &#8211; EXCEPTION: C0000005; CSUSSHSocket::ProcessReceive(); Type: 30; puchPayLoad = 0x041ec066; \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 nPacketLength = 76; nBytesReceived = 80; \u00a0 nBytesUncompressed = 156; \u00a0\u00a0\u00a0\u00a0\u00a0 uchPaddingLength = 5<\/p>\n\n\n\n<p>3. Users can look for suspicious connections via SSH.<\/p>\n\n\n\n<p>The following IP addresses have been reported by SolarWinds as a potential indicator of attack:<\/p>\n\n\n\n<p>98.176.196.89<\/p>\n\n\n\n<p>68.235.178.32<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Mitigation<\/h2>\n\n\n\n<p><strong>Official Fix<\/strong><\/p>\n\n\n\n<p>Currently, SolarWinds has released security updates to fix the preceding vulnerability. Affected users are advised to apply these updates as soon as possible. These updates are available at the following link: <a href=\"https:\/\/customerportal.solarwinds.com\/\">https:\/\/customerportal.solarwinds.com\/<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Affected Versions<\/strong><\/td><td><strong>Upgrade Paths<\/strong><\/td><\/tr><tr><td>Serv-U 15.2.3 HF1<\/td><td>Apply Serv-U 15.2.3 HF2, available in your Customer Portal<\/td><\/tr><tr><td>Serv-U 15.2.3<\/td><td>Apply Serv-U 15.2.3 HF1, then apply Serv-U 15.2.3 HF2, available in your Customer Portal<\/td><\/tr><tr><td>All Serv-U versions prior to 15.2.3<\/td><td>Upgrade to Serv-U 15.2.3, then apply Serv-U 15.2.3 HF1, then apply Serv-U 15.2.3 HF2, available in your Customer Portal<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>For the installation procedure, go to <a href=\"https:\/\/support.solarwinds.com\/SuccessCenter\/s\/article\/Serv-U-15-2-3-HotFix-2?language=en_US\">https:\/\/support.solarwinds.com\/SuccessCenter\/s\/article\/Serv-U-15-2-3-HotFix-2?language=en_US<\/a>.<\/p>\n\n\n\n<p><strong>Other Protection Measures<\/strong><\/p>\n\n\n\n<p>If related users cannot perform upgrade temporarily, they can disable the SSH listener to protect against this vulnerability.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Statement<\/h2>\n\n\n\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview Recently, NSFOCUS CERT, through ongoing monitoring, found that SolarWinds released a security advisory fixing a remote code execution vulnerability (CVE-2021-35211). Microsoft reported to SolarWinds that they had discovered that the vulnerability was exploited in the wild and provided a proof of concept of the exploit. Unauthenticated, remote attackers could exploit this vulnerability to execute [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":12339,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[6],"tags":[202,612,657],"class_list":["post-17520","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-emergency-response","tag-cve-2021-35211","tag-remotecode","tag-solarwinds"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SolarWinds Serv-U Remote Code Execution Vulnerability (CVE-2021-35211) Threat Alert - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/solarwinds-serv-u-remote-code-execution-vulnerability-cve-2021-35211-threat-alert\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SolarWinds Serv-U Remote Code Execution Vulnerability (CVE-2021-35211) Threat Alert - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Overview Recently, NSFOCUS CERT, through ongoing monitoring, found that SolarWinds released a security advisory fixing a remote code execution\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/solarwinds-serv-u-remote-code-execution-vulnerability-cve-2021-35211-threat-alert\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-23T08:40:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/SolarWinds.jpg\" \/>\n<meta name=\"author\" content=\"Jie Ji\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"SolarWinds Serv-U Remote Code Execution Vulnerability (CVE-2021-35211) Threat Alert - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Overview Recently, NSFOCUS CERT, through ongoing monitoring, found that SolarWinds released a security advisory fixing a remote code execution\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/SolarWinds.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jie Ji\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/solarwinds-serv-u-remote-code-execution-vulnerability-cve-2021-35211-threat-alert\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/solarwinds-serv-u-remote-code-execution-vulnerability-cve-2021-35211-threat-alert\\\/\"},\"author\":{\"name\":\"Jie Ji\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\"},\"headline\":\"SolarWinds Serv-U Remote Code Execution Vulnerability (CVE-2021-35211) Threat Alert\",\"datePublished\":\"2021-07-23T08:40:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/solarwinds-serv-u-remote-code-execution-vulnerability-cve-2021-35211-threat-alert\\\/\"},\"wordCount\":488,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/solarwinds-serv-u-remote-code-execution-vulnerability-cve-2021-35211-threat-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/SolarWinds.jpg\",\"keywords\":[\"CVE-2021-35211\",\"remotecode\",\"SolarWinds\"],\"articleSection\":[\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/solarwinds-serv-u-remote-code-execution-vulnerability-cve-2021-35211-threat-alert\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/solarwinds-serv-u-remote-code-execution-vulnerability-cve-2021-35211-threat-alert\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/solarwinds-serv-u-remote-code-execution-vulnerability-cve-2021-35211-threat-alert\\\/\",\"name\":\"SolarWinds Serv-U Remote Code Execution Vulnerability (CVE-2021-35211) Threat Alert - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/solarwinds-serv-u-remote-code-execution-vulnerability-cve-2021-35211-threat-alert\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/solarwinds-serv-u-remote-code-execution-vulnerability-cve-2021-35211-threat-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/SolarWinds.jpg\",\"datePublished\":\"2021-07-23T08:40:26+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/solarwinds-serv-u-remote-code-execution-vulnerability-cve-2021-35211-threat-alert\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/solarwinds-serv-u-remote-code-execution-vulnerability-cve-2021-35211-threat-alert\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/solarwinds-serv-u-remote-code-execution-vulnerability-cve-2021-35211-threat-alert\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/SolarWinds.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/SolarWinds.jpg\",\"width\":447,\"height\":207,\"caption\":\"SolarWinds logo with orange abstract symbol.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/solarwinds-serv-u-remote-code-execution-vulnerability-cve-2021-35211-threat-alert\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SolarWinds Serv-U Remote Code Execution Vulnerability (CVE-2021-35211) Threat Alert\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\",\"name\":\"Jie Ji\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"caption\":\"Jie Ji\"},\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/jji\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SolarWinds Serv-U Remote Code Execution Vulnerability (CVE-2021-35211) Threat Alert - NSFOCUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/solarwinds-serv-u-remote-code-execution-vulnerability-cve-2021-35211-threat-alert\/","og_locale":"pt_BR","og_type":"article","og_title":"SolarWinds Serv-U Remote Code Execution Vulnerability (CVE-2021-35211) Threat Alert - NSFOCUS","og_description":"Overview Recently, NSFOCUS CERT, through ongoing monitoring, found that SolarWinds released a security advisory fixing a remote code execution","og_url":"https:\/\/nsfocusglobal.com\/solarwinds-serv-u-remote-code-execution-vulnerability-cve-2021-35211-threat-alert\/","og_site_name":"NSFOCUS","article_published_time":"2021-07-23T08:40:26+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/SolarWinds.jpg","type":"","width":"","height":""}],"author":"Jie Ji","twitter_card":"summary_large_image","twitter_title":"SolarWinds Serv-U Remote Code Execution Vulnerability (CVE-2021-35211) Threat Alert - NSFOCUS","twitter_description":"Overview Recently, NSFOCUS CERT, through ongoing monitoring, found that SolarWinds released a security advisory fixing a remote code execution","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/SolarWinds.jpg","twitter_misc":{"Escrito por":"Jie Ji","Est. tempo de leitura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/solarwinds-serv-u-remote-code-execution-vulnerability-cve-2021-35211-threat-alert\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/solarwinds-serv-u-remote-code-execution-vulnerability-cve-2021-35211-threat-alert\/"},"author":{"name":"Jie Ji","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b"},"headline":"SolarWinds Serv-U Remote Code Execution Vulnerability (CVE-2021-35211) Threat Alert","datePublished":"2021-07-23T08:40:26+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/solarwinds-serv-u-remote-code-execution-vulnerability-cve-2021-35211-threat-alert\/"},"wordCount":488,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/solarwinds-serv-u-remote-code-execution-vulnerability-cve-2021-35211-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/SolarWinds.jpg","keywords":["CVE-2021-35211","remotecode","SolarWinds"],"articleSection":["Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/solarwinds-serv-u-remote-code-execution-vulnerability-cve-2021-35211-threat-alert\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/solarwinds-serv-u-remote-code-execution-vulnerability-cve-2021-35211-threat-alert\/","url":"https:\/\/nsfocusglobal.com\/solarwinds-serv-u-remote-code-execution-vulnerability-cve-2021-35211-threat-alert\/","name":"SolarWinds Serv-U Remote Code Execution Vulnerability (CVE-2021-35211) Threat Alert - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/solarwinds-serv-u-remote-code-execution-vulnerability-cve-2021-35211-threat-alert\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/solarwinds-serv-u-remote-code-execution-vulnerability-cve-2021-35211-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/SolarWinds.jpg","datePublished":"2021-07-23T08:40:26+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/solarwinds-serv-u-remote-code-execution-vulnerability-cve-2021-35211-threat-alert\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/solarwinds-serv-u-remote-code-execution-vulnerability-cve-2021-35211-threat-alert\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/solarwinds-serv-u-remote-code-execution-vulnerability-cve-2021-35211-threat-alert\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/SolarWinds.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/12\/SolarWinds.jpg","width":447,"height":207,"caption":"SolarWinds logo with orange abstract symbol."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/solarwinds-serv-u-remote-code-execution-vulnerability-cve-2021-35211-threat-alert\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"SolarWinds Serv-U Remote Code Execution Vulnerability (CVE-2021-35211) Threat Alert"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b","name":"Jie Ji","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","caption":"Jie Ji"},"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/jji\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/17520","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=17520"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/17520\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/12339"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=17520"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=17520"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=17520"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}