{"id":24954,"date":"2023-06-28T06:32:56","date_gmt":"2023-06-28T06:32:56","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=24954"},"modified":"2023-06-28T06:32:56","modified_gmt":"2023-06-28T06:32:56","slug":"vmware-vcenter-server-multiple-high-risk-vulnerabilities-notification","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/vmware-vcenter-server-multiple-high-risk-vulnerabilities-notification\/","title":{"rendered":"VMware vCenter Server Multiple High Risk Vulnerabilities Notification"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Overview<\/h2>\n\n\n\n<p>Recently, NSFOCUS CERT found that VMware&#8217;s official security announcement disclosed multiple vulnerabilities in VMware vCenter Server, which could be used by attackers to cause remote code execution, cross-border write and read, etc. Currently, the official version has been updated and fixed. Affected users should take protective measures as soon as possible.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Key Vulnerabilities<\/h2>\n\n\n\n<p><strong>vCenter Server<\/strong> <strong>Heap Overflow Vulnerability (CVS 2023-20892):<\/strong><\/p>\n\n\n\n<p>Due to the use of uninitialized memory in the implementation of the DCERPC protocol, malicious attackers with network access to the vCenter Server can exploit this vulnerability to execute arbitrary code on the underlying operating system using the vCenter Server, with a CVSS score of 8.1.<\/p>\n\n\n\n<p><strong>UAF Vulnerability<\/strong> <strong>of vCenter Server<\/strong> <strong>(CVS 2023-20893):<\/strong><\/p>\n\n\n\n<p>There is a UAF vulnerability in the implementation of the DCERPC protocol in vCenter Server, which allows malicious attackers with network access to vCenter Server to execute arbitrary code on the underlying operating system using vCenter Server. The CVSS score is 8.1.<\/p>\n\n\n\n<p><strong>vCenter Server<\/strong> <strong>Out of Bound Write Vulnerability (CVS 2023-20894):<\/strong> <\/p>\n\n\n\n<p>There is an out of bounds write vulnerability in the implementation of the DCERPC protocol in vCenter Server. Malicious attackers with network access to vCenter Server can trigger out of bounds writes by sending specially crafted packets, resulting in memory corruption. The CVSS score is 8.1.<\/p>\n\n\n\n<p><strong>vCenter Server<\/strong> <strong>Out-of-Bounds Read Vulnerability (CVE-2023-20895):<\/strong> <\/p>\n\n\n\n<p>There is an out-of-bounds read vulnerability in the implementation of the DCERPC protocol in vCenter Server, which can be exploited by malicious attackers with network access to vCenter Server to cause memory corruption and bypass authentication. The CVSS score is 8.1.<\/p>\n\n\n\n<p><strong>vCenter Server<\/strong> <strong>Out-of-Bounds Read Vulnerability (CVE-2023-20896):<\/strong> <\/p>\n\n\n\n<p>There is an out-of-bounds read vulnerability in the implementation of the DCERPC protocol in vCenter Server. Malicious attackers with network access to vCenter Server can trigger out of bounds reads by sending crafted packets, resulting in a denial of service for certain services (vmcad, vmdird, and vmafdd), with a CVSS score of 5.9.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Scope of Impact<\/h2>\n\n\n\n<p><strong>Affected version <a><\/a><a><\/a><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Series&lt;8.0 U1b<\/li>\n\n\n\n<li>Series&lt;7.0 U3m<\/li>\n\n\n\n<li>Series&lt;8.0 U1b<\/li>\n\n\n\n<li>Series&lt;7.0 U3m<\/li>\n<\/ul>\n\n\n\n<p><strong>Unaffected version<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Series=8.0 U1b<\/li>\n\n\n\n<li>Series=7.0 U3m<\/li>\n\n\n\n<li>Series=8.0 U1b<\/li>\n\n\n\n<li>Series=7.0 U3m<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Mitigation<\/h2>\n\n\n\n<p>At present, the official has fixed the vulnerability in the latest version. Affected users are requested to upgrade the version as soon as possible. The download link for the corresponding product version is as follows:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Product version<\/strong><\/td><td><strong>Download link<\/strong><\/td><\/tr><tr><td>VMware vCenter Server 8.0 U1b<\/td><td><a href=\"https:\/\/docs.vmware.com\/en\/VMware-vSphere\/8.0\/rn\/vsphere-vcenter-server-80u1b-release-notes\/index.html\">https:\/\/docs.vmware.com\/en\/VMware-vSphere\/8.0\/rn\/vsphere-vcenter-server-80u1b-release-notes\/index.html<\/a><\/td><\/tr><tr><td>VMware vCenter Server 7.0 U3m<\/td><td><a href=\"https:\/\/docs.vmware.com\/en\/VMware-vSphere\/7.0\/rn\/vsphere-vcenter-server-70u3m-release-notes\/index.html\">https:\/\/docs.vmware.com\/en\/VMware-vSphere\/7.0\/rn\/vsphere-vcenter-server-70u3m-release-notes\/index.html<\/a><\/td><\/tr><tr><td>VMware Cloud Foundation (vCenter Server) 8.0 U1b<\/td><td><a href=\"https:\/\/kb.vmware.com\/s\/article\/88287\">https:\/\/kb.vmware.com\/s\/article\/88287<\/a><\/td><\/tr><tr><td>VMware Cloud Foundation (vCenter Server) 7.0 U3m<\/td><td><a href=\"https:\/\/kb.vmware.com\/s\/article\/88287\">https:\/\/kb.vmware.com\/s\/article\/88287<\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Statement<\/h2>\n\n\n\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About NSFOCUS<\/h2>\n\n\n\n<p>NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. The company\u2019s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide multi-layered, unified and dynamic protection against advanced cyber attacks.<\/p>\n\n\n\n<p>NSFOCUS works with Fortune Global 500 companies, including four of the world\u2019s five largest financial institutions, organizations in insurance, retail, healthcare, critical infrastructure industries as well as government agencies. NSFOCUS has technology and channel partners in more than 60 countries, is a member of both the Microsoft Active Protections Program (MAPP), and the Cloud Security Alliance (CSA).<\/p>\n\n\n\n<p>A wholly owned subsidiary of NSFOCUS Technologies Group Co., Ltd., the company has operations in the Americas, Europe, the Middle East and Asia Pacific.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview Recently, NSFOCUS CERT found that VMware&#8217;s official security announcement disclosed multiple vulnerabilities in VMware vCenter Server, which could be used by attackers to cause remote code execution, cross-border write and read, etc. Currently, the official version has been updated and fixed. Affected users should take protective measures as soon as possible. Key Vulnerabilities vCenter [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":10123,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3,6],"tags":[28,258,259,321,322,720],"class_list":["post-24954","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-emergency-response","tag-cvs-2023-20892","tag-cve-2023-20895","tag-cve-2023-20896","tag-cvs-2023-20893","tag-cvs-2023-20894","tag-vmware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>VMware vCenter Server Multiple High Risk Vulnerabilities Notification - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"VMware vCenter Server Multiple High Risk Vulnerabilities Notification - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Overview Recently, NSFOCUS CERT found that VMware&#039;s official security announcement disclosed multiple vulnerabilities in VMware vCenter Server, which\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/vmware-vcenter-server-multiple-high-risk-vulnerabilities-notification\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-28T06:32:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/02\/vmware.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"VMware vCenter Server Multiple High Risk Vulnerabilities Notification - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Overview Recently, NSFOCUS CERT found that VMware&#039;s official security announcement disclosed multiple vulnerabilities in VMware vCenter Server, which\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/02\/vmware.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-vcenter-server-multiple-high-risk-vulnerabilities-notification\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-vcenter-server-multiple-high-risk-vulnerabilities-notification\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"VMware vCenter Server Multiple High Risk Vulnerabilities Notification\",\"datePublished\":\"2023-06-28T06:32:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-vcenter-server-multiple-high-risk-vulnerabilities-notification\\\/\"},\"wordCount\":684,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-vcenter-server-multiple-high-risk-vulnerabilities-notification\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/vmware.jpg\",\"keywords\":[\"(CVS 2023-20892\",\"CVE-2023-20895\",\"CVE-2023-20896\",\"CVS 2023-20893\",\"CVS 2023-20894\",\"VMware\"],\"articleSection\":[\"Blog\",\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-vcenter-server-multiple-high-risk-vulnerabilities-notification\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-vcenter-server-multiple-high-risk-vulnerabilities-notification\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-vcenter-server-multiple-high-risk-vulnerabilities-notification\\\/\",\"name\":\"VMware vCenter Server Multiple High Risk Vulnerabilities Notification - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-vcenter-server-multiple-high-risk-vulnerabilities-notification\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-vcenter-server-multiple-high-risk-vulnerabilities-notification\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/vmware.jpg\",\"datePublished\":\"2023-06-28T06:32:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-vcenter-server-multiple-high-risk-vulnerabilities-notification\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-vcenter-server-multiple-high-risk-vulnerabilities-notification\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-vcenter-server-multiple-high-risk-vulnerabilities-notification\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/vmware.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/vmware.jpg\",\"width\":547,\"height\":400,\"caption\":\"VMware logo with geometric cloud design.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-vcenter-server-multiple-high-risk-vulnerabilities-notification\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"VMware vCenter Server Multiple High Risk Vulnerabilities Notification\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"VMware vCenter Server Multiple High Risk Vulnerabilities Notification - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"VMware vCenter Server Multiple High Risk Vulnerabilities Notification - NSFOCUS","og_description":"Overview Recently, NSFOCUS CERT found that VMware's official security announcement disclosed multiple vulnerabilities in VMware vCenter Server, which","og_url":"https:\/\/nsfocusglobal.com\/vmware-vcenter-server-multiple-high-risk-vulnerabilities-notification\/","og_site_name":"NSFOCUS","article_published_time":"2023-06-28T06:32:56+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/02\/vmware.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"VMware vCenter Server Multiple High Risk Vulnerabilities Notification - NSFOCUS","twitter_description":"Overview Recently, NSFOCUS CERT found that VMware's official security announcement disclosed multiple vulnerabilities in VMware vCenter Server, which","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/02\/vmware.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/vmware-vcenter-server-multiple-high-risk-vulnerabilities-notification\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/vmware-vcenter-server-multiple-high-risk-vulnerabilities-notification\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"VMware vCenter Server Multiple High Risk Vulnerabilities Notification","datePublished":"2023-06-28T06:32:56+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/vmware-vcenter-server-multiple-high-risk-vulnerabilities-notification\/"},"wordCount":684,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/vmware-vcenter-server-multiple-high-risk-vulnerabilities-notification\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/02\/vmware.jpg","keywords":["(CVS 2023-20892","CVE-2023-20895","CVE-2023-20896","CVS 2023-20893","CVS 2023-20894","VMware"],"articleSection":["Blog","Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/vmware-vcenter-server-multiple-high-risk-vulnerabilities-notification\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/vmware-vcenter-server-multiple-high-risk-vulnerabilities-notification\/","url":"https:\/\/nsfocusglobal.com\/vmware-vcenter-server-multiple-high-risk-vulnerabilities-notification\/","name":"VMware vCenter Server Multiple High Risk Vulnerabilities Notification - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/vmware-vcenter-server-multiple-high-risk-vulnerabilities-notification\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/vmware-vcenter-server-multiple-high-risk-vulnerabilities-notification\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/02\/vmware.jpg","datePublished":"2023-06-28T06:32:56+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/vmware-vcenter-server-multiple-high-risk-vulnerabilities-notification\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/vmware-vcenter-server-multiple-high-risk-vulnerabilities-notification\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/vmware-vcenter-server-multiple-high-risk-vulnerabilities-notification\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/02\/vmware.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/02\/vmware.jpg","width":547,"height":400,"caption":"VMware logo with geometric cloud design."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/vmware-vcenter-server-multiple-high-risk-vulnerabilities-notification\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"VMware vCenter Server Multiple High Risk Vulnerabilities Notification"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/24954","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=24954"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/24954\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/10123"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=24954"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=24954"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=24954"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}