{"id":20578,"date":"2022-08-10T06:07:33","date_gmt":"2022-08-10T06:07:33","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=20578"},"modified":"2022-08-10T06:07:33","modified_gmt":"2022-08-10T06:07:33","slug":"critical-vmware-product-vulnerability-alerts","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/critical-vmware-product-vulnerability-alerts\/","title":{"rendered":"Critical VMware Product Vulnerability Alerts"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Overview<\/h2>\n\n\n\n<p>Recently, NSFOCUS CERT detected that VMware officially issued a security notice to fix multiple vulnerabilities in products such as VMware Workspace ONE Access, Identity Manager, and VMware vRealize Automation. Attackers can use these vulnerabilities to cause privilege escalation and remote code execution. At present, the official security update has been released, and relevant users are requested to take measures to protect them.<\/p>\n\n\n\n<p>Reference link:<\/p>\n\n\n\n<p><a href=\"https:\/\/www.vmware.com\/security\/advisories\/VMSA-2022-0021.html\">https:\/\/www.vmware.com\/security\/advisories\/VMSA-2022-0021.html<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Key Vulnerabilities<\/h2>\n\n\n\n<p><strong>VMware Authentication Bypass Vulnerability (CVE-2022-31656):<\/strong><\/p>\n\n\n\n<p>An authentication bypass vulnerability exists in VMware Workspace ONE Access, Identity Manager, and vRealize Automation that affects local domain users. An attacker with network access to the UI could gain administrative access without requiring authentication. The CVSS score is 9.8.<\/p>\n\n\n\n<p><strong>VMware JDBC Injection Remote Code Execution Vulnerability (CVE-2022-31658\/CVE-2022-31665):<\/strong><\/p>\n\n\n\n<p>Two remote code execution vulnerabilities exist in VMware Workspace ONE Access, Identity Manager, and vRealize Automation. An attacker with administrator and network access could exploit the vulnerability for remote code execution. The CVSS scores were 8.0 and 7.6, respectively.<\/p>\n\n\n\n<p><strong>VMware SQL Injection Remote Code Execution Vulnerability (CVE-2022-31659):<\/strong><\/p>\n\n\n\n<p>A remote code execution vulnerability exists in VMware Workspace ONE Access and Identity Manager. An attacker with administrative and network access rights can exploit this vulnerability to write malicious files through SQL injection and ultimately achieve arbitrary code execution. CVSS score of 8.0.<\/p>\n\n\n\n<p><strong>VMware Local Privilege Escalation Vulnerability (CVE-2022-31660\/CVE-2022-31661\/CVE-2022-31664):<\/strong><\/p>\n\n\n\n<p>Two privilege escalation vulnerabilities exist in VMware Workspace ONE Access, Identity Manager, and vRealize Automation. An attacker with local privileges could exploit this vulnerability to escalate privileges to root. CVSS score of 7.8.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Scope of Impact<\/h2>\n\n\n\n<p><strong>Affected versions<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>VMware Workspace ONE Access(Access) V21.08.0.0<\/li><li>VMware Workspace ONE Access(Access) V21.08.0.1<\/li><li>VMware Identity Manager(vIDM) V3.3.4<\/li><li>VMware Identity Manager(vIDM) V3.3.5<\/li><li>VMware Identity Manager(vIDM) V3.3.6<\/li><li>VMware Workspace ONE Access Connector(Access Connector) V21.08.0.0<\/li><li>VMware Workspace ONE Access Connector(Access Connector) V21.08.0.1<\/li><li>VMware Workspace ONE Access Connector(Access Connector) V22.05<\/li><li>VMware Identity Manager Connector(vIDM Connector) V3.3.4<\/li><li>VMware Identity Manager Connector(vIDM Connector) V3.3.6<\/li><li>VMware Identity Manager Connector(vIDM Connector) V19.03.0.1<\/li><li>VMware vRealize Automation(vRA) V7.6<\/li><li>VMware Cloud Foundation (v(vRA)IDM) V4.2.x<\/li><li>VMware Cloud Foundation (v(vRA)IDM) V4.3.x<\/li><li>VMware Cloud Foundation (v(vRA)IDM) V4.4.x<\/li><li>vRealize Suite Lifecycle Manager (vIDM) V8.x<\/li><li>VMware Cloud Foundation (vRA) V3.x<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Mitigation<\/h2>\n\n\n\n<p><strong>Official upgrade<\/strong><\/p>\n\n\n\n<p>At present, the official security patch has been released for the above vulnerabilities. Affected users are requested to install the update as soon as possible for protection. The repair patches and documents for the corresponding product version are as follows:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Product version<\/strong><\/td><td><strong>Guide download link<\/strong><\/td><\/tr><tr><td>VMware Workspace ONE Access Appliance 21.08.0.1<\/td><td><a href=\"https:\/\/customerconnect.vmware.com\/en\/downloads\/details?downloadGroup=WS1A_ONPREM_210801&amp;productId=1192&amp;rPId=79985\">https:\/\/customerconnect.vmware.com\/en\/downloads\/details?downloadGroup=WS1A_ONPREM_210801&amp;productId=1192&amp;rPId=79985<\/a><\/td><\/tr><tr><td>VMware Workspace ONE Access Appliance 21.08.0.0<\/td><td><a href=\"https:\/\/customerconnect.vmware.com\/en\/downloads\/details?downloadGroup=WS1A_ONPREM_210800&amp;productId=1192&amp;rPId=79985\">https:\/\/customerconnect.vmware.com\/en\/downloads\/details?downloadGroup=WS1A_ONPREM_210800&amp;productId=1192&amp;rPId=79985<\/a><\/td><\/tr><tr><td>VMware Identity Manager Appliance &amp; Connector 3.3.6<\/td><td><a href=\"https:\/\/customerconnect.vmware.com\/downloads\/details?downloadGroup=VIDM_ONPREM_3360&amp;productId=786&amp;rPId=82542\">https:\/\/customerconnect.vmware.com\/downloads\/details?downloadGroup=VIDM_ONPREM_3360&amp;productId=786&amp;rPId=82542<\/a><\/td><\/tr><tr><td>VMware Identity Manager Appliance &amp; Connector 3.3.5<\/td><td><a href=\"https:\/\/customerconnect.vmware.com\/downloads\/details?downloadGroup=VIDM_ONPREM_3350&amp;productId=786&amp;rPId=82542\">https:\/\/customerconnect.vmware.com\/downloads\/details?downloadGroup=VIDM_ONPREM_3350&amp;productId=786&amp;rPId=82542<\/a><\/td><\/tr><tr><td>VMware Identity Manager Appliance &amp; Connector 3.3.4<\/td><td><a href=\"https:\/\/customerconnect.vmware.com\/downloads\/details?downloadGroup=VIDM_ONPREM_3340&amp;productId=786&amp;rPId=82542\">https:\/\/customerconnect.vmware.com\/downloads\/details?downloadGroup=VIDM_ONPREM_3340&amp;productId=786&amp;rPId=82542<\/a><\/td><\/tr><tr><td>VMware Identity Manager Connector 19.03.0.1&nbsp;&nbsp;<\/td><td><a href=\"https:\/\/customerconnect.vmware.com\/downloads\/details?downloadGroup=VIDM_ONPREM_1903&amp;productId=885&amp;rPId=32629\">https:\/\/customerconnect.vmware.com\/downloads\/details?downloadGroup=VIDM_ONPREM_1903&amp;productId=885&amp;rPId=32629<\/a><\/td><\/tr><tr><td>VMware Realize Automation 7.6<\/td><td><a href=\"https:\/\/kb.vmware.com\/s\/article\/70911\">https:\/\/kb.vmware.com\/s\/article\/70911<\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>FAQ: <a href=\"https:\/\/core.vmware.com\/vmsa-2022-0021-questions-answers-faq#\">https:\/\/core.vmware.com\/vmsa-2022-0021-questions-answers-faq#<\/a><\/p>\n\n\n\n<p><strong>Temporary mitigation<\/strong><\/p>\n\n\n\n<p>For VMware authentication bypass vulnerability (CVE-2022-31656), you can refer to the official measures for temporary mitigation:<\/p>\n\n\n\n<p><a href=\"https:\/\/www.vmware.com\/security\/advisories\/VMSA-2022-0021.html\">https:\/\/www.vmware.com\/security\/advisories\/VMSA-2022-0021.html<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Statement<\/h2>\n\n\n\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About NSFOCUS<\/h2>\n\n\n\n<p>NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. The company\u2019s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide multi-layered, unified and dynamic protection against advanced cyber attacks.<\/p>\n\n\n\n<p>NSFOCUS works with Fortune Global 500 companies, including four of the world\u2019s five largest financial institutions, organizations in insurance, retail, healthcare, critical infrastructure industries as well as government agencies. NSFOCUS has technology and channel partners in more than 60 countries, is a member of both the Microsoft Active Protections Program (MAPP), and the Cloud Security Alliance (CSA).<\/p>\n\n\n\n<p>A wholly owned subsidiary of NSFOCUS Technologies Group Co., Ltd., the company has operations in the Americas, Europe, the Middle East and Asia Pacific.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview Recently, NSFOCUS CERT detected that VMware officially issued a security notice to fix multiple vulnerabilities in products such as VMware Workspace ONE Access, Identity Manager, and VMware vRealize Automation. Attackers can use these vulnerabilities to cause privilege escalation and remote code execution. At present, the official security update has been released, and relevant users [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":10123,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3,6],"tags":[],"class_list":["post-20578","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-emergency-response"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Critical VMware Product Vulnerability Alerts - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Critical VMware Product Vulnerability Alerts - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Overview Recently, NSFOCUS CERT detected that VMware officially issued a security notice to fix multiple vulnerabilities in products such as VMware\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/critical-vmware-product-vulnerability-alerts\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-10T06:07:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/02\/vmware.jpg\" \/>\n<meta name=\"author\" content=\"Jie Ji\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Critical VMware Product Vulnerability Alerts - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Overview Recently, NSFOCUS CERT detected that VMware officially issued a security notice to fix multiple vulnerabilities in products such as VMware\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/02\/vmware.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jie Ji\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/critical-vmware-product-vulnerability-alerts\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/critical-vmware-product-vulnerability-alerts\\\/\"},\"author\":{\"name\":\"Jie Ji\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\"},\"headline\":\"Critical VMware Product Vulnerability Alerts\",\"datePublished\":\"2022-08-10T06:07:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/critical-vmware-product-vulnerability-alerts\\\/\"},\"wordCount\":822,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/critical-vmware-product-vulnerability-alerts\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/vmware.jpg\",\"articleSection\":[\"Blog\",\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/critical-vmware-product-vulnerability-alerts\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/critical-vmware-product-vulnerability-alerts\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/critical-vmware-product-vulnerability-alerts\\\/\",\"name\":\"Critical VMware Product Vulnerability Alerts - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/critical-vmware-product-vulnerability-alerts\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/critical-vmware-product-vulnerability-alerts\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/vmware.jpg\",\"datePublished\":\"2022-08-10T06:07:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/critical-vmware-product-vulnerability-alerts\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/critical-vmware-product-vulnerability-alerts\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/critical-vmware-product-vulnerability-alerts\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/vmware.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/vmware.jpg\",\"width\":547,\"height\":400,\"caption\":\"VMware logo with geometric cloud design.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/critical-vmware-product-vulnerability-alerts\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Critical VMware Product Vulnerability Alerts\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\",\"name\":\"Jie Ji\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"caption\":\"Jie Ji\"},\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/jji\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Critical VMware Product Vulnerability Alerts - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Critical VMware Product Vulnerability Alerts - NSFOCUS","og_description":"Overview Recently, NSFOCUS CERT detected that VMware officially issued a security notice to fix multiple vulnerabilities in products such as VMware","og_url":"https:\/\/nsfocusglobal.com\/critical-vmware-product-vulnerability-alerts\/","og_site_name":"NSFOCUS","article_published_time":"2022-08-10T06:07:33+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/02\/vmware.jpg","type":"","width":"","height":""}],"author":"Jie Ji","twitter_card":"summary_large_image","twitter_title":"Critical VMware Product Vulnerability Alerts - NSFOCUS","twitter_description":"Overview Recently, NSFOCUS CERT detected that VMware officially issued a security notice to fix multiple vulnerabilities in products such as VMware","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/02\/vmware.jpg","twitter_misc":{"Escrito por":"Jie Ji","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/critical-vmware-product-vulnerability-alerts\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/critical-vmware-product-vulnerability-alerts\/"},"author":{"name":"Jie Ji","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b"},"headline":"Critical VMware Product Vulnerability Alerts","datePublished":"2022-08-10T06:07:33+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/critical-vmware-product-vulnerability-alerts\/"},"wordCount":822,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/critical-vmware-product-vulnerability-alerts\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/02\/vmware.jpg","articleSection":["Blog","Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/critical-vmware-product-vulnerability-alerts\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/critical-vmware-product-vulnerability-alerts\/","url":"https:\/\/nsfocusglobal.com\/critical-vmware-product-vulnerability-alerts\/","name":"Critical VMware Product Vulnerability Alerts - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/critical-vmware-product-vulnerability-alerts\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/critical-vmware-product-vulnerability-alerts\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/02\/vmware.jpg","datePublished":"2022-08-10T06:07:33+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/critical-vmware-product-vulnerability-alerts\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/critical-vmware-product-vulnerability-alerts\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/critical-vmware-product-vulnerability-alerts\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/02\/vmware.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/02\/vmware.jpg","width":547,"height":400,"caption":"VMware logo with geometric cloud design."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/critical-vmware-product-vulnerability-alerts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Critical VMware Product Vulnerability Alerts"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b","name":"Jie Ji","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","caption":"Jie Ji"},"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/jji\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/20578","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=20578"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/20578\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/10123"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=20578"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=20578"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=20578"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}