{"id":2627,"date":"2023-10-24T10:00:24","date_gmt":"2023-10-24T13:00:24","guid":{"rendered":"https:\/\/www.altus.com.br\/?page_id=2627"},"modified":"2025-08-08T11:22:24","modified_gmt":"2025-08-08T14:22:24","slug":"seguranca-cibernetica","status":"publish","type":"page","link":"https:\/\/www.altus.com.br\/en\/seguranca-cibernetica\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2627\" class=\"elementor elementor-2627\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1f1edda e-flex e-con-boxed e-con e-parent\" data-id=\"1f1edda\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e4c1123 e-con-full e-flex e-con e-child\" data-id=\"e4c1123\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ac4aedc elementor-icon-list--layout-inline elementor-align-start elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"ac4aedc\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Solu\u00e7\u00f5es<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Seguran\u00e7a Cibern\u00e9tica<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74b55ae elementor-widget elementor-widget-heading\" data-id=\"74b55ae\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Seguran\u00e7a Cibern\u00e9tica:<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f704ab2 elementor-widget elementor-widget-heading\" data-id=\"f704ab2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Seu neg\u00f3cio protegido contra ataques<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a2da1a6 elementor-widget elementor-widget-text-editor\" data-id=\"a2da1a6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Com os avan\u00e7os nas tecnologias de comunica\u00e7\u00e3o, m\u00e1quinas e sistemas est\u00e3o se tornando cada vez mais interconectados por meio da internet. Nesse contexto, a prote\u00e7\u00e3o contra ataques cibern\u00e9ticos torna-se essencial para assegurar a seguran\u00e7a, a integridade dos dados e a continuidade das opera\u00e7\u00f5es industriais.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f96e0c5 e-con-full e-flex e-con e-child\" data-id=\"f96e0c5\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3ec27ec e-con-full e-flex e-con e-child\" data-id=\"3ec27ec\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b017aa elementor-widget elementor-widget-shortcode\" data-id=\"2b017aa\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"section\" data-elementor-id=\"3011\" class=\"elementor elementor-3011\" data-elementor-post-type=\"elementor_library\">\n\t\t\t<div class=\"elementor-element elementor-element-e5a5209 e-flex e-con-boxed e-con e-parent\" data-id=\"e5a5209\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-55e3312 elementor-button-align-stretch elementor-widget elementor-widget-form\" data-id=\"55e3312\" data-element_type=\"widget\" data-settings=\"{&quot;button_width&quot;:&quot;60&quot;,&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" id=\"Seguran\u00e7a Cibern\u00e9tica\" name=\"Solicite uma Assessoria\" aria-label=\"Solicite uma Assessoria\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"3011\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"55e3312\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"\" \/>\n\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-nome elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-nome\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tNome\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[nome]\" id=\"form-field-nome\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Meu nome\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tEmail\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Meu endere\u00e7o de e-mail\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-textarea elementor-field-group elementor-column elementor-field-group-mensagem elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-mensagem\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tMensagem\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t<textarea class=\"elementor-field-textual elementor-field  elementor-size-sm\" name=\"form_fields[mensagem]\" id=\"form-field-mensagem\" rows=\"4\" placeholder=\"Minha mensagem (opcional)\"><\/textarea>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-acceptance elementor-field-group elementor-column elementor-field-group-field_44d8206 elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t<div class=\"elementor-field-subgroup\">\n\t\t\t<span class=\"elementor-field-option\">\n\t\t\t\t<input type=\"checkbox\" name=\"form_fields[field_44d8206]\" id=\"form-field-field_44d8206\" class=\"elementor-field elementor-size-sm  elementor-acceptance-field\" required=\"required\">\n\t\t\t\t<label for=\"form-field-field_44d8206\">Informo que estou de acordo com a pol\u00edtica de privacidade da Altus.<\/label>\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-hidden elementor-field-group elementor-column elementor-field-group-URL elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"hidden\" name=\"form_fields[URL]\" id=\"form-field-URL\" class=\"elementor-field elementor-size-sm  elementor-field-textual\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-60 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-sm\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-right\"><\/i>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Solicitar acessoria<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-76cc2c0 elementor-widget elementor-widget-heading\" data-id=\"76cc2c0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Solicite uma assessoria<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-edd7e1a elementor-widget elementor-widget-text-editor\" data-id=\"edd7e1a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Quer implementar seu projeto em curso conosco? Teremos todo o gosto em assessorar voc\u00ea!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cd215f9 e-flex e-con-boxed e-con e-parent\" data-id=\"cd215f9\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-022623d e-con-full e-flex e-con e-child\" data-id=\"022623d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a398de elementor-widget elementor-widget-heading\" data-id=\"3a398de\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Preven\u00e7\u00e3o, identifica\u00e7\u00e3o  e resolu\u00e7\u00e3o de vulnerabilidades<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f772e99 elementor-widget elementor-widget-text-editor\" data-id=\"f772e99\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Os recursos de seguran\u00e7a embarcados nos produtos Altus s\u00e3o constantemente revisados e atualizadas para evitar poss\u00edveis vulnerabilidades. Por\u00e9m, para os casos em que a vulnerabilidade \u00e9 identificada por agentes externos, nos comprometemos a resolver esses problemas dentro de um prazo razo\u00e1vel.<\/p><p>No Manual de Seguran\u00e7a Cibern\u00e9tica oferecemos informa\u00e7\u00f5es importantes sobre seguran\u00e7a com os produtos Altus.<\/p><p><a style=\"color: white;\" href=\"https:\/\/www.altus.com.br\/wp-content\/uploads\/2024\/10\/MU214004-PT.pdf\"><b>Clique aqui para fazer o download do manual<\/b><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7c55296 e-con-full e-flex e-con e-child\" data-id=\"7c55296\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b47b0c7 elementor-widget elementor-widget-image\" data-id=\"b47b0c7\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1536\" height=\"1024\" src=\"https:\/\/www.altus.com.br\/wp-content\/uploads\/2025\/06\/Cyber2.png\" class=\"attachment-full size-full wp-image-15831\" alt=\"\" srcset=\"https:\/\/www.altus.com.br\/wp-content\/uploads\/2025\/06\/Cyber2.png 1536w, https:\/\/www.altus.com.br\/wp-content\/uploads\/2025\/06\/Cyber2-300x200.png 300w\" sizes=\"(max-width: 1536px) 100vw, 1536px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d04cfcb e-flex e-con-boxed e-con e-parent\" data-id=\"d04cfcb\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d634717 e-con-full e-flex e-con e-child\" data-id=\"d634717\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0c7e2e1 elementor-widget elementor-widget-heading\" data-id=\"0c7e2e1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Lista com os comunicados de seguran\u00e7a publicados pela Altus<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4055053 elementor-widget elementor-widget-text-editor\" data-id=\"4055053\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Esses comunicados fornecem informa\u00e7\u00f5es essenciais sobre vulnerabilidades conhecidas, incluindo poss\u00edveis solu\u00e7\u00f5es alternativas e atualiza\u00e7\u00f5es de seguran\u00e7a dispon\u00edveis. Cabe \u00e0 avalia\u00e7\u00e3o t\u00e9cnica dos usu\u00e1rios de nossos produtos determinar se e quando implementar as atualiza\u00e7\u00f5es recomendadas.<\/p><p>Se detectar uma poss\u00edvel vulnerabilidade que tenha efeito direto ou indireto em um produto Altus, nos informe atrav\u00e9s do e-mail ouvidoria@altus.com.br.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb9ef34 e-con-full e-flex e-con e-child\" data-id=\"eb9ef34\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4edb5dc elementor-widget elementor-widget-image\" data-id=\"4edb5dc\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"516\" src=\"https:\/\/www.altus.com.br\/wp-content\/uploads\/2025\/01\/Lista-com-os-comunicados-1024x661.jpg\" class=\"attachment-large size-large wp-image-14520\" alt=\"\" srcset=\"https:\/\/www.altus.com.br\/wp-content\/uploads\/2025\/01\/Lista-com-os-comunicados-1024x661.jpg 1024w, https:\/\/www.altus.com.br\/wp-content\/uploads\/2025\/01\/Lista-com-os-comunicados-300x194.jpg 300w, https:\/\/www.altus.com.br\/wp-content\/uploads\/2025\/01\/Lista-com-os-comunicados-768x496.jpg 768w, https:\/\/www.altus.com.br\/wp-content\/uploads\/2025\/01\/Lista-com-os-comunicados-18x12.jpg 18w, https:\/\/www.altus.com.br\/wp-content\/uploads\/2025\/01\/Lista-com-os-comunicados.jpg 1101w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3e8a3c3 e-flex e-con-boxed e-con e-parent\" data-id=\"3e8a3c3\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-93dc680 elementor-widget elementor-widget-heading\" data-id=\"93dc680\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Nos ajude a manter os produtos Altus o mais seguros poss\u00edvel<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd7c2d5 elementor-widget elementor-widget-heading\" data-id=\"fd7c2d5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">As vulnerabilidades da lista a seguir se aplicam para as CPUs da Altus modelos: XP300, XP315, X325, XP340, XP350, XP351, NX3010, NX3020, NX3030, NX3003, NX3004, NX3005, NX3008, NX3035, HX3040.<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-295965d e-flex e-con-boxed e-con e-parent\" data-id=\"295965d\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5f04e5e e-grid e-con-full e-con e-child\" data-id=\"5f04e5e\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-68690e8 e-con-full e-flex e-con e-child\" data-id=\"68690e8\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-e993a45 e-flex e-con-boxed e-con e-child\" data-id=\"e993a45\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-902a2ea elementor-widget elementor-widget-heading\" data-id=\"902a2ea\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2022-30792<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ef83366 e-con-full e-flex e-con e-child\" data-id=\"ef83366\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8b5ff4e elementor-widget elementor-widget-text-editor\" data-id=\"8b5ff4e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-teams=\"true\">Vers\u00e3o de firmware com a vulnerabilidade corrigida: <\/span>HX: 1.14.36.5, XP: 1.14.20.0, NX300x: 1.14.20.0, NL: 1.14.31.4, NX30x0: 1.14.7.0.<\/p><p>Descri\u00e7\u00e3o CVE: Em CmpChannelServer do CODESYS V3, em v\u00e1rias vers\u00f5es, um consumo de recursos descontrolado permite que um invasor n\u00e3o autorizado bloqueie novas conex\u00f5es de canal de comunica\u00e7\u00e3o. As conex\u00f5es existentes n\u00e3o s\u00e3o afetadas.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ad54e16 e-con-full e-flex e-con e-child\" data-id=\"ad54e16\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c9506dd elementor-widget elementor-widget-button\" data-id=\"c9506dd\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2022-30792\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Mais informa\u00e7\u00f5es<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-35ca770 e-con-full e-flex e-con e-child\" data-id=\"35ca770\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3cc59ac e-flex e-con-boxed e-con e-child\" data-id=\"3cc59ac\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1860882 elementor-widget elementor-widget-heading\" data-id=\"1860882\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2022-30791<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb0b859 e-con-full e-flex e-con e-child\" data-id=\"eb0b859\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ce612c7 elementor-widget elementor-widget-text-editor\" data-id=\"ce612c7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-teams=\"true\">Vers\u00e3o de firmware com a vulnerabilidade corrigida: <\/span>HX: 1.14.36.5, XP: 1.14.20.0, NX300x: 1.14.20.0, NL: 1.14.31.4, NX30x0: 1.14.7.0.<\/p><p>Descri\u00e7\u00e3o CVE: Em CmpBlkDrvTcp do CODESYS V3, em v\u00e1rias vers\u00f5es, um consumo de recursos descontrolado permite que um invasor n\u00e3o autorizado bloqueie novas conex\u00f5es TCP. As conex\u00f5es existentes n\u00e3o s\u00e3o afetadas.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-93d11b6 e-con-full e-flex e-con e-child\" data-id=\"93d11b6\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4ec8f82 elementor-widget elementor-widget-button\" data-id=\"4ec8f82\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2022-30791\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Mais informa\u00e7\u00f5es<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20cd61c elementor-widget elementor-widget-heading\" data-id=\"20cd61c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">As vulnerabilidades da lista a seguir se aplicam para o Mastertool IEC XE - MT8500<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cf8ba49 e-con-full e-flex e-con e-child\" data-id=\"cf8ba49\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f874a5f e-flex e-con-boxed e-con e-child\" data-id=\"f874a5f\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1d40785 elementor-widget elementor-widget-heading\" data-id=\"1d40785\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2022-22515<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2f3e6b9 e-con-full e-flex e-con e-child\" data-id=\"2f3e6b9\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6a559cb elementor-widget elementor-widget-text-editor\" data-id=\"6a559cb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-teams=\"true\">Vers\u00e3o de firmware com a vulnerabilidade corrigida: <\/span>HX: 1.12.32.4, XP (exceto 351 e 350): 1.12.5.3, 300x (exceto 3008): 1.12.5.3, 30&#215;0: at\u00e9 1.10.8.0.<\/p><p>Descri\u00e7\u00e3o CVE: Um invasor remoto e autenticado poderia utilizar o programa de controle do sistema de tempo de execu\u00e7\u00e3o CODESYS Control para explorar a vulnerabilidade a fim de ler e modificar o(s) arquivo(s) de configura\u00e7\u00e3o dos produtos afetados.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5def563 e-con-full e-flex e-con e-child\" data-id=\"5def563\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6746fca elementor-widget elementor-widget-button\" data-id=\"6746fca\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2022-22515\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Mais informa\u00e7\u00f5es<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6e1cfb0 e-con-full e-flex e-con e-child\" data-id=\"6e1cfb0\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ff56d03 e-flex e-con-boxed e-con e-child\" data-id=\"ff56d03\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1d18bb1 elementor-widget elementor-widget-heading\" data-id=\"1d18bb1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2022-22508<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e0d4fe0 e-con-full e-flex e-con e-child\" data-id=\"e0d4fe0\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d4aa685 elementor-widget elementor-widget-text-editor\" data-id=\"d4aa685\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-teams=\"true\">Vers\u00e3o de firmware com a vulnerabilidade corrigida: <\/span>HX: 1.14.36.5, XP: 1.14.20.0, NX300x: 1.14.20.0, NL: 1.14.31.4 NX30x0: 1.14.7.0.<\/p><p>Descri\u00e7\u00e3o CVE: Uma vulnerabilidade de Valida\u00e7\u00e3o de Entrada Inadequada em m\u00faltiplos produtos CODESYS V3 permite que um invasor remoto e autenticado bloqueie logins consecutivos de um tipo espec\u00edfico.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e354a1a e-con-full e-flex e-con e-child\" data-id=\"e354a1a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-654a36a elementor-widget elementor-widget-button\" data-id=\"654a36a\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2022-22508\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Mais informa\u00e7\u00f5es<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c1787ea e-con-full e-flex e-con e-child\" data-id=\"c1787ea\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1400044 e-flex e-con-boxed e-con e-child\" data-id=\"1400044\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b64f66c elementor-widget elementor-widget-heading\" data-id=\"b64f66c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2019-9012<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d07e36e e-con-full e-flex e-con e-child\" data-id=\"d07e36e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a057158 elementor-widget elementor-widget-text-editor\" data-id=\"a057158\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-teams=\"true\">Vers\u00e3o de firmware com a vulnerabilidade corrigida: <\/span>HX: 1.9.4.0, XP: 1.8.5.0, NX3003: 1.8.11.0, NX3004 e 5: at\u00e9 1.8.11.0, NX30x0: at\u00e9 1.8.3.0<\/p><p>Descri\u00e7\u00e3o CVE: Foi descoberto um problema nos produtos CODESYS V3 da 3S-Smart. Uma solicita\u00e7\u00e3o de comunica\u00e7\u00e3o especialmente elaborada pode causar aloca\u00e7\u00f5es de mem\u00f3ria descontroladas nos produtos CODESYS afetados e resultar em uma condi\u00e7\u00e3o de nega\u00e7\u00e3o de servi\u00e7o. Todas as variantes dos seguintes produtos CODESYS V3 em todas as vers\u00f5es anteriores \u00e0 v3.5.14.20 que cont\u00eam o componente CmpGateway s\u00e3o afetadas.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f0cd1f0 e-con-full e-flex e-con e-child\" data-id=\"f0cd1f0\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3fbaf7f elementor-widget elementor-widget-button\" data-id=\"3fbaf7f\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2019-9012\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Mais informa\u00e7\u00f5es<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e5e32ae e-con-full e-flex e-con e-child\" data-id=\"e5e32ae\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-fd03568 e-flex e-con-boxed e-con e-child\" data-id=\"fd03568\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d8ea198 elementor-widget elementor-widget-heading\" data-id=\"d8ea198\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2019-9010<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-df3c7bf e-con-full e-flex e-con e-child\" data-id=\"df3c7bf\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8db90b1 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"8db90b1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-teams=\"true\">Vers\u00e3o de firmware com a vulnerabilidade corrigida: <\/span>HX: 1.9.4.0, XP: 1.8.5.0, NX3003: 1.8.11.0, NX3004 e 5: at\u00e9 1.8.11.0, NX30x0: at\u00e9 1.8.3.0<\/p><p>Descri\u00e7\u00e3o CVE: Foi descoberto um problema nos produtos CODESYS V3 da 3S-Smart. O Gateway CODESYS n\u00e3o verifica corretamente a propriedade de um canal de comunica\u00e7\u00e3o. Todas as variantes dos seguintes produtos CODESYS V3 em todas as vers\u00f5es anteriores \u00e0 v3.5.14.20 que cont\u00eam o componente CmpGateway s\u00e3o afetadas.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7638d44 e-con-full e-flex e-con e-child\" data-id=\"7638d44\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a157f4 elementor-widget elementor-widget-button\" data-id=\"5a157f4\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2019-9010\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Mais informa\u00e7\u00f5es<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-def7e42 e-con-full e-flex e-con e-child\" data-id=\"def7e42\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-8504af2 e-flex e-con-boxed e-con e-child\" data-id=\"8504af2\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5500bc1 elementor-widget elementor-widget-heading\" data-id=\"5500bc1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2018-25048<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-40a93f2 e-con-full e-flex e-con e-child\" data-id=\"40a93f2\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-73cb8ec elementor-widget elementor-widget-text-editor\" data-id=\"73cb8ec\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-teams=\"true\">Vers\u00e3o de firmware com a vulnerabilidade corrigida: <\/span>HX: 1.7.40.0, NX3004 e 5: at\u00e9 1.7.17.0, NX30x0: at\u00e9 1.7.0.8<\/p><p>Descri\u00e7\u00e3o CVE: O sistema de tempo de execu\u00e7\u00e3o CODESYS em v\u00e1rias vers\u00f5es permite que um invasor remoto com privil\u00e9gios baixos use uma vulnerabilidade de path traversal para acessar e modificar todos os arquivos do sistema, bem como causar um ataque de nega\u00e7\u00e3o de servi\u00e7o (DoS) no dispositivo.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-651e4aa e-con-full e-flex e-con e-child\" data-id=\"651e4aa\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-aa45a77 elementor-widget elementor-widget-button\" data-id=\"aa45a77\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2018-25048\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Mais informa\u00e7\u00f5es<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-006c858 e-con-full e-flex e-con e-child\" data-id=\"006c858\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-18ac3a2 e-flex e-con-boxed e-con e-child\" data-id=\"18ac3a2\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-280f866 elementor-widget elementor-widget-heading\" data-id=\"280f866\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2019-13542<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-67e140e e-con-full e-flex e-con e-child\" data-id=\"67e140e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-42152f4 elementor-widget elementor-widget-text-editor\" data-id=\"42152f4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-teams=\"true\">Vers\u00e3o de firmware com a vulnerabilidade corrigida: <\/span>XTORM: 1.7.58.0 e 1.7.40.0, XP (exceto 350, 351 e 340): 1.7.49.0, NX3003: 1.8.11.0, NX30x0: 1.8.3.0<\/p><p>Descri\u00e7\u00e3o CVE: No Sistema de Desenvolvimento CODESYS, m\u00faltiplos componentes em v\u00e1rias vers\u00f5es transmitem as senhas para a comunica\u00e7\u00e3o entre clientes e servidores de forma desprotegida.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c67cebc e-con-full e-flex e-con e-child\" data-id=\"c67cebc\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d28f38a elementor-widget elementor-widget-button\" data-id=\"d28f38a\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2019-13542\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Mais informa\u00e7\u00f5es<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4cbc36e e-con-full e-flex e-con e-child\" data-id=\"4cbc36e\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-39c88b5 e-con-full e-flex e-con e-child\" data-id=\"39c88b5\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-5035e36 e-flex e-con-boxed e-con e-child\" data-id=\"5035e36\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c32a7b5 elementor-widget elementor-widget-heading\" data-id=\"c32a7b5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2022-4048<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5208258 e-con-full e-flex e-con e-child\" data-id=\"5208258\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-63c6d5e elementor-widget elementor-widget-text-editor\" data-id=\"63c6d5e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-teams=\"true\">Vers\u00e3o de software com a vulnerabilidade corrigida: <\/span>MTOOL 8500 3.60<\/p><p>Descri\u00e7\u00e3o CVE: A fraqueza de seguran\u00e7a &#8220;Inadequate Encryption Strength&#8221; (For\u00e7a de Criptografia Inadequada) no <b>Sistema de Desenvolvimento CODESYS V3<\/b> em vers\u00f5es anteriores \u00e0 <b>V3.5.18.40<\/b> permite que um invasor local n\u00e3o autenticado acesse e manipule o c\u00f3digo de aplicativos de inicializa\u00e7\u00e3o criptografados.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f5ec238 e-con-full e-flex e-con e-child\" data-id=\"f5ec238\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eabee0f elementor-widget elementor-widget-button\" data-id=\"eabee0f\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2022-4048\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Mais informa\u00e7\u00f5es<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-613cc40 e-con-full e-flex e-con e-child\" data-id=\"613cc40\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-3428571 e-con-full e-flex e-con e-child\" data-id=\"3428571\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-304ce2c e-flex e-con-boxed e-con e-child\" data-id=\"304ce2c\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d8813bb elementor-widget elementor-widget-heading\" data-id=\"d8813bb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2022-31805<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-35d615b e-con-full e-flex e-con e-child\" data-id=\"35d615b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-23fac79 elementor-widget elementor-widget-text-editor\" data-id=\"23fac79\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-teams=\"true\">Vers\u00e3o de software com a vulnerabilidade corrigida: <\/span>MTOOL 8500 3.60<\/p><p>Descri\u00e7\u00e3o CVE: No Sistema de Desenvolvimento CODESYS, v\u00e1rios componentes em diversas vers\u00f5es transmitem as senhas para a comunica\u00e7\u00e3o entre clientes e servidores sem prote\u00e7\u00e3o.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1c28681 e-con-full e-flex e-con e-child\" data-id=\"1c28681\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-67d84ab elementor-widget elementor-widget-button\" data-id=\"67d84ab\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2022-31805\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Mais informa\u00e7\u00f5es<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0cc61e0 e-con-full e-flex e-con e-child\" data-id=\"0cc61e0\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7d9853b e-con-full e-flex e-con e-child\" data-id=\"7d9853b\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c43c616 e-flex e-con-boxed e-con e-child\" data-id=\"c43c616\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-33fd411 elementor-widget elementor-widget-heading\" data-id=\"33fd411\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2022-30792<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ce8d2c7 e-con-full e-flex e-con e-child\" data-id=\"ce8d2c7\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1eedd5c elementor-widget elementor-widget-text-editor\" data-id=\"1eedd5c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-teams=\"true\">Vers\u00e3o de software com a vulnerabilidade corrigida: <\/span>MTOOL 8500 3.60<\/p><p>Descri\u00e7\u00e3o CVE: Em CmpChannelServer do CODESYS V3, em v\u00e1rias vers\u00f5es, um consumo de recursos descontrolado permite que um invasor n\u00e3o autorizado bloqueie novas conex\u00f5es de canal de comunica\u00e7\u00e3o. As conex\u00f5es existentes n\u00e3o s\u00e3o afetadas.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e2227a6 e-con-full e-flex e-con e-child\" data-id=\"e2227a6\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d9188c4 elementor-widget elementor-widget-button\" data-id=\"d9188c4\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2022-30792\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Mais informa\u00e7\u00f5es<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ff29e3b e-con-full e-flex e-con e-child\" data-id=\"ff29e3b\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-573405c e-con-full e-flex e-con e-child\" data-id=\"573405c\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-b016463 e-flex e-con-boxed e-con e-child\" data-id=\"b016463\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-08deb5d elementor-widget elementor-widget-heading\" data-id=\"08deb5d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2022-30791<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f5912a9 e-con-full e-flex e-con e-child\" data-id=\"f5912a9\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-00c073f elementor-widget elementor-widget-text-editor\" data-id=\"00c073f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-teams=\"true\">Vers\u00e3o de software com a vulnerabilidade corrigida: <\/span>MTOOL 8500 3.60<\/p><p>Descri\u00e7\u00e3o CVE: Em CmpBlkDrvTcp do CODESYS V3, em v\u00e1rias vers\u00f5es, um consumo de recursos descontrolado permite que um invasor n\u00e3o autorizado bloqueie novas conex\u00f5es TCP. As conex\u00f5es existentes n\u00e3o s\u00e3o afetadas.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9422c8c e-con-full e-flex e-con e-child\" data-id=\"9422c8c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8883ca3 elementor-widget elementor-widget-button\" data-id=\"8883ca3\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2022-30791\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Mais informa\u00e7\u00f5es<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-389957c e-con-full e-flex e-con e-child\" data-id=\"389957c\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-997021e e-con-full e-flex e-con e-child\" data-id=\"997021e\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7914c5b e-flex e-con-boxed e-con e-child\" data-id=\"7914c5b\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-061af7c elementor-widget elementor-widget-heading\" data-id=\"061af7c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2022-22515<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f3dbad1 e-con-full e-flex e-con e-child\" data-id=\"f3dbad1\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-afe814b elementor-widget elementor-widget-text-editor\" data-id=\"afe814b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-teams=\"true\">Vers\u00e3o de software com a vulnerabilidade corrigida: <\/span>MTOOL 8500 3.40<\/p><p>Descri\u00e7\u00e3o CVE: Um invasor remoto e autenticado poderia utilizar o programa de controle do sistema de tempo de execu\u00e7\u00e3o CODESYS Control para usar a vulnerabilidade e ler e modificar o(s) arquivo(s) de configura\u00e7\u00e3o dos produtos afetados.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0e2926a e-con-full e-flex e-con e-child\" data-id=\"0e2926a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1ae43f7 elementor-widget elementor-widget-button\" data-id=\"1ae43f7\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2022-22515\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Mais informa\u00e7\u00f5es<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9e8f5a9 e-con-full e-flex e-con e-child\" data-id=\"9e8f5a9\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-8cbf109 e-con-full e-flex e-con e-child\" data-id=\"8cbf109\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-75078cc e-flex e-con-boxed e-con e-child\" data-id=\"75078cc\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-074479f elementor-widget elementor-widget-heading\" data-id=\"074479f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2021-29240<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d99ad15 e-con-full e-flex e-con e-child\" data-id=\"d99ad15\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4dd4652 elementor-widget elementor-widget-text-editor\" data-id=\"4dd4652\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-teams=\"true\">Vers\u00e3o de software com a vulnerabilidade corrigida: <\/span>MTOOL 8500 3.40<\/p><p>Descri\u00e7\u00e3o CVE: O Gerenciador de Pacotes do CODESYS Development System 3 em vers\u00f5es anteriores \u00e0 3.5.17.0 n\u00e3o verifica a validade dos pacotes antes da instala\u00e7\u00e3o, podendo ser usado para instalar pacotes CODESYS com conte\u00fado malicioso.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-99f5dc1 e-con-full e-flex e-con e-child\" data-id=\"99f5dc1\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ab532af elementor-widget elementor-widget-button\" data-id=\"ab532af\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2021-29240\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Mais informa\u00e7\u00f5es<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dfc5304 e-con-full e-flex e-con e-child\" data-id=\"dfc5304\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-0a72105 e-flex e-con-boxed e-con e-child\" data-id=\"0a72105\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e5fcd66 elementor-widget elementor-widget-heading\" data-id=\"e5fcd66\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2021-29239<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-40a6895 e-con-full e-flex e-con e-child\" data-id=\"40a6895\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9338d86 elementor-widget elementor-widget-text-editor\" data-id=\"9338d86\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-teams=\"true\">Vers\u00e3o de software com a vulnerabilidade corrigida: <\/span>MTOOL 8500 3.40<\/p><p>Descri\u00e7\u00e3o CVE: O CODESYS Development System 3, em vers\u00f5es anteriores \u00e0 3.5.17.0, exibe ou executa documentos ou arquivos maliciosos incorporados em bibliotecas sem verificar sua validade previamente.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a9c678f e-con-full e-flex e-con e-child\" data-id=\"a9c678f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-193f944 elementor-widget elementor-widget-button\" data-id=\"193f944\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2021-29239\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Mais informa\u00e7\u00f5es<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-99fa7de e-con-full e-flex e-con e-child\" data-id=\"99fa7de\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-0475384 e-flex e-con-boxed e-con e-child\" data-id=\"0475384\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6a70c7e elementor-widget elementor-widget-heading\" data-id=\"6a70c7e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2020-12068<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-76496c3 e-con-full e-flex e-con e-child\" data-id=\"76496c3\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f6abd7d elementor-widget elementor-widget-text-editor\" data-id=\"f6abd7d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-teams=\"true\">Vers\u00e3o de software com a vulnerabilidade corrigida: <\/span>MTOOL 8500 3.40<\/p><p>Descri\u00e7\u00e3o CVE: Foi descoberto um problema no CODESYS Development System em vers\u00f5es anteriores \u00e0 3.5.16.0. O CODESYS WebVisu e o CODESYS Remote TargetVisu s\u00e3o suscet\u00edveis a escalonamento de privil\u00e9gios.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-463c3d8 e-con-full e-flex e-con e-child\" data-id=\"463c3d8\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-272dc12 elementor-widget elementor-widget-button\" data-id=\"272dc12\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2020-12068\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Mais informa\u00e7\u00f5es<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ced34bd e-con-full e-flex e-con e-child\" data-id=\"ced34bd\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-9740161 e-flex e-con-boxed e-con e-child\" data-id=\"9740161\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8a6d07a elementor-widget elementor-widget-heading\" data-id=\"8a6d07a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2019-9012<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a546597 e-con-full e-flex e-con e-child\" data-id=\"a546597\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-09dfe84 elementor-widget elementor-widget-text-editor\" data-id=\"09dfe84\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-teams=\"true\">Vers\u00e3o de software com a vulnerabilidade corrigida: <\/span>MTOOL 8500 3.30<\/p><p>Descri\u00e7\u00e3o CVE: Foi descoberto um problema nos produtos CODESYS V3 da 3S-Smart. Uma solicita\u00e7\u00e3o de comunica\u00e7\u00e3o especialmente elaborada pode causar aloca\u00e7\u00f5es de mem\u00f3ria descontroladas nos produtos CODESYS afetados, podendo resultar em uma condi\u00e7\u00e3o de nega\u00e7\u00e3o de servi\u00e7o. Todas as variantes dos seguintes produtos CODESYS V3 em todas as vers\u00f5es anteriores \u00e0 v3.5.14.20 que cont\u00eam o componente CmpGateway s\u00e3o afetadas, independentemente do tipo de CPU ou sistema operacional.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-49e6a1c e-con-full e-flex e-con e-child\" data-id=\"49e6a1c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c96385 elementor-widget elementor-widget-button\" data-id=\"6c96385\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2019-9012\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Mais informa\u00e7\u00f5es<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1006f5e e-con-full e-flex e-con e-child\" data-id=\"1006f5e\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-11d6235 e-flex e-con-boxed e-con e-child\" data-id=\"11d6235\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9cb96b3 elementor-widget elementor-widget-heading\" data-id=\"9cb96b3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2019-9010<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-55044fb e-con-full e-flex e-con e-child\" data-id=\"55044fb\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a2425e elementor-widget elementor-widget-text-editor\" data-id=\"3a2425e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-teams=\"true\">Vers\u00e3o de software com a vulnerabilidade corrigida: <\/span>MTOOL 8500 3.30<\/p><p>Descri\u00e7\u00e3o CVE: Foi descoberto um problema nos produtos CODESYS V3 da 3S-Smart. O CODESYS Gateway n\u00e3o verifica corretamente a propriedade de um canal de comunica\u00e7\u00e3o. Todas as variantes dos seguintes produtos CODESYS V3 em todas as vers\u00f5es anteriores \u00e0 v3.5.14.20 que cont\u00eam o componente CmpGateway s\u00e3o afetadas.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8e2ecfc e-con-full e-flex e-con e-child\" data-id=\"8e2ecfc\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e09a9ea elementor-widget elementor-widget-button\" data-id=\"e09a9ea\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2019-9010\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Mais informa\u00e7\u00f5es<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a087ae2 e-con-full e-flex e-con e-child\" data-id=\"a087ae2\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ff6af91 e-flex e-con-boxed e-con e-child\" data-id=\"ff6af91\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8ab973a elementor-widget elementor-widget-heading\" data-id=\"8ab973a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2021-36764<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-af036fb e-con-full e-flex e-con e-child\" data-id=\"af036fb\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dca5cdf elementor-widget elementor-widget-text-editor\" data-id=\"dca5cdf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-teams=\"true\">Vers\u00e3o de software com a vulnerabilidade corrigida: <\/span>MTOOL 8500 3.40<\/p><p>Descri\u00e7\u00e3o CVE: No CODESYS Gateway V3 em vers\u00f5es anteriores \u00e0 3.5.17.10, h\u00e1 uma Desrefer\u00eancia de Ponteiro Nulo (NULL Pointer Dereference). Solicita\u00e7\u00f5es de comunica\u00e7\u00e3o especialmente elaboradas podem causar uma desrefer\u00eancia de ponteiro nulo nos produtos CODESYS afetados, podendo resultar em uma condi\u00e7\u00e3o de nega\u00e7\u00e3o de servi\u00e7o.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6a41563 e-con-full e-flex e-con e-child\" data-id=\"6a41563\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e4b9cea elementor-widget elementor-widget-button\" data-id=\"e4b9cea\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2021-36764\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Mais informa\u00e7\u00f5es<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3047d15 e-con-full e-flex e-con e-child\" data-id=\"3047d15\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-7c44a4c e-flex e-con-boxed e-con e-child\" data-id=\"7c44a4c\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-622a7c5 elementor-widget elementor-widget-heading\" data-id=\"622a7c5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2021-29241<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4abd90a e-con-full e-flex e-con e-child\" data-id=\"4abd90a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-829fc95 elementor-widget elementor-widget-text-editor\" data-id=\"829fc95\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-teams=\"true\">Vers\u00e3o de software com a vulnerabilidade corrigida: <\/span>MTOOL 8500 3.40<\/p><p>Descri\u00e7\u00e3o CVE: No CODESYS Gateway 3 em vers\u00f5es anteriores \u00e0 3.5.16.70, h\u00e1 uma desrefer\u00eancia de ponteiro nulo (NULL pointer dereference) que pode resultar em uma nega\u00e7\u00e3o de servi\u00e7o (DoS).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-20cd315 e-con-full e-flex e-con e-child\" data-id=\"20cd315\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4a7cdfc elementor-widget elementor-widget-button\" data-id=\"4a7cdfc\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2021-29241\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Mais informa\u00e7\u00f5es<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ed981e2 e-con-full e-flex e-con e-child\" data-id=\"ed981e2\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ec14dc2 e-flex e-con-boxed e-con e-child\" data-id=\"ec14dc2\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-671b16c elementor-widget elementor-widget-heading\" data-id=\"671b16c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2020-7052<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9d7ea62 e-con-full e-flex e-con e-child\" data-id=\"9d7ea62\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5b77d94 elementor-widget elementor-widget-text-editor\" data-id=\"5b77d94\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-teams=\"true\">Vers\u00e3o de software com a vulnerabilidade corrigida: <\/span>MTOOL 8500 3.30<\/p><p>Descri\u00e7\u00e3o CVE: O CODESYS Control V3, Gateway V3 e HMI V3, em vers\u00f5es anteriores \u00e0 3.5.15.30, permitem uma aloca\u00e7\u00e3o de mem\u00f3ria descontrolada que pode resultar em uma condi\u00e7\u00e3o de nega\u00e7\u00e3o de servi\u00e7o remota.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0c70459 e-con-full e-flex e-con e-child\" data-id=\"0c70459\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c87fe73 elementor-widget elementor-widget-button\" data-id=\"c87fe73\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2020-7052\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Mais informa\u00e7\u00f5es<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1181eb8 e-con-full e-flex e-con e-child\" data-id=\"1181eb8\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f29fb90 e-flex e-con-boxed e-con e-child\" data-id=\"f29fb90\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a101a68 elementor-widget elementor-widget-heading\" data-id=\"a101a68\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2019-5105<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-943e378 e-con-full e-flex e-con e-child\" data-id=\"943e378\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-beebea8 elementor-widget elementor-widget-text-editor\" data-id=\"beebea8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-teams=\"true\">Vers\u00e3o de software com a vulnerabilidade corrigida: <\/span>MTOOL 8500 3.40<\/p><p>Descri\u00e7\u00e3o CVE: Uma vulnerabilidade de corrup\u00e7\u00e3o de mem\u00f3ria explor\u00e1vel existe na funcionalidade do Name Service Client do 3S-Smart Software Solutions CODESYS GatewayService. Um pacote especialmente elaborado pode causar um memcpy de grande escala, resultando em uma viola\u00e7\u00e3o de acesso e no encerramento do processo. Um invasor pode enviar um pacote para um dispositivo executando o GatewayService.exe para acionar essa vulnerabilidade. Todas as variantes dos produtos CODESYS V3 em todas as vers\u00f5es anteriores \u00e0 V3.5.16.10 que cont\u00eam o componente CmpRouter ou CmpRouterEmbedded s\u00e3o afetadas.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cd6ed72 e-con-full e-flex e-con e-child\" data-id=\"cd6ed72\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4008926 elementor-widget elementor-widget-button\" data-id=\"4008926\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2019-5105\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Mais informa\u00e7\u00f5es<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5b4d6ce e-con-full e-flex e-con e-child\" data-id=\"5b4d6ce\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1c571ae e-flex e-con-boxed e-con e-child\" data-id=\"1c571ae\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a69813c elementor-widget elementor-widget-heading\" data-id=\"a69813c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2022-1989<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-01064f7 e-con-full e-flex e-con e-child\" data-id=\"01064f7\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3e9ec53 elementor-widget elementor-widget-text-editor\" data-id=\"3e9ec53\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-teams=\"true\">Vers\u00e3o de software com a vulnerabilidade corrigida: <\/span>MTOOL 8500 3.60<\/p><p>Descri\u00e7\u00e3o CVE: Todas as vers\u00f5es do CODESYS Visualization anteriores \u00e0 V4.2.0.0 geram um di\u00e1logo de login vulner\u00e1vel \u00e0 exposi\u00e7\u00e3o de informa\u00e7\u00f5es, permitindo que um invasor remoto e n\u00e3o autenticado enumere usu\u00e1rios v\u00e1lidos.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cf2e7de e-con-full e-flex e-con e-child\" data-id=\"cf2e7de\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3c5c239 elementor-widget elementor-widget-button\" data-id=\"3c5c239\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2022-1989\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Mais informa\u00e7\u00f5es<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-32da525 e-con-full e-flex e-con e-child\" data-id=\"32da525\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-b23045d e-flex e-con-boxed e-con e-child\" data-id=\"b23045d\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-04c0df0 elementor-widget elementor-widget-heading\" data-id=\"04c0df0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2020-12068<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-896e0a7 e-con-full e-flex e-con e-child\" data-id=\"896e0a7\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c11bd3f elementor-widget elementor-widget-text-editor\" data-id=\"c11bd3f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-teams=\"true\">Vers\u00e3o de software com a vulnerabilidade corrigida: <\/span>MTOOL 8500 3.40<\/p><p>Descri\u00e7\u00e3o CVE: Foi descoberto um problema no CODESYS Development System em vers\u00f5es anteriores \u00e0 3.5.16.0. O CODESYS WebVisu e o CODESYS Remote TargetVisu s\u00e3o suscet\u00edveis a escalonamento de privil\u00e9gios.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-89488e3 e-con-full e-flex e-con e-child\" data-id=\"89488e3\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-61381e5 elementor-widget elementor-widget-button\" data-id=\"61381e5\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2020-12068\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Mais informa\u00e7\u00f5es<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3357ae7 e-con-full e-flex e-con e-child\" data-id=\"3357ae7\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2f518b4 e-flex e-con-boxed e-con e-child\" data-id=\"2f518b4\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ec991be elementor-widget elementor-widget-heading\" data-id=\"ec991be\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">CVE-2018-25048<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-72ec056 e-con-full e-flex e-con e-child\" data-id=\"72ec056\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d4eb7c9 elementor-widget elementor-widget-text-editor\" data-id=\"d4eb7c9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-teams=\"true\">Vers\u00e3o de software com a vulnerabilidade corrigida: <\/span>MTOOL 8500 3.30<\/p><p>Descri\u00e7\u00e3o CVE: O sistema de tempo de execu\u00e7\u00e3o CODESYS em v\u00e1rias vers\u00f5es permite que um invasor remoto com privil\u00e9gios baixos use uma vulnerabilidade de path traversal para acessar e modificar todos os arquivos do sistema, al\u00e9m de causar uma nega\u00e7\u00e3o de servi\u00e7o (DoS) no dispositivo.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a420ec0 e-con-full e-flex e-con e-child\" data-id=\"a420ec0\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-914e29c elementor-widget elementor-widget-button\" data-id=\"914e29c\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2018-25048\" rel=\"nofollow noopener\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Mais informa\u00e7\u00f5es<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4c79483 e-flex e-con-boxed e-con e-parent\" data-id=\"4c79483\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9e8c739 elementor-widget elementor-widget-heading\" data-id=\"9e8c739\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Veja tamb\u00e9m:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ccaf473 e-con-full e-flex e-con e-parent\" data-id=\"ccaf473\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-75c0e8c elementor-widget elementor-widget-ucaddon_slider_segments_content\" data-id=\"75c0e8c\" data-element_type=\"widget\" data-widget_type=\"ucaddon_slider_segments_content.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Slider Segmentos -->\n<style>\/* widget: Slider Segmentos *\/\n\n.bloco-servicos .swiper {\n  width: 100%;\n  height: 100%;\n}\n\n.bloco-servicos .swiper-slide {\n  text-align: center;\n  font-size: 18px;\n  display: flex;\n  justify-content: center;\n  align-items: flex-end;\n  background: rgba(000, 000, 000, 0.3);\n}\n\n.bloco-servicos .swiper-slide img {\n  display: block;\n  width: 100%;\n  height: 100%;\n  object-fit: cover;\n}\n\n.bloco-servicos {\n  height: 800px;\n  position: relative;\n  color: #fff;\n}\n\n.bloco-servicos h2 {\n  font-weight: 300;\n  position: absolute;\n  z-index: 9;\n  left: 40px;\n  top: 60px;\n  margin: 0;\n  font-size: 38px;\n}\n\n.bloco-servicos .swiper-figure {\n  height: 100%;\n  width: 100%;\n  position: absolute;\n}\n\n.bloco-servicos .swiper-slide-img {\n  background-size: cover !important;\n  background-position: center center !important;\n  z-index: -1;\n  transition: 0.3s;\n  opacity: 0;\n  height: 100%;\n  width: 100%;\n  position: absolute;\n  top: 0;\n  left: 0;\n}\n\n.bloco-servicos .swiper-slide-img.active {\n  z-index: 1;\n  opacity: 1;\n}\n\n.bloco-servicos .swiper-button-next {\n  right: 40px;\n}\n\n.bloco-servicos .swiper-button-prev {\n  left: 40px;\n}\n\n.bloco-servicos .swiper-button-next,\n.bloco-servicos .swiper-button-prev {\n  color: #fff;\n  width: 54px;\n  height: 54px;\n  top: 50%;\n}\n\n.bloco-servicos .swiper-button-next:after,\n.bloco-servicos .swiper-button-prev:after {\n  display: none;\n}\n\n.bloco-servicos .swiper-button-next svg,\n.bloco-servicos .swiper-button-prev svg {\n  width: 54px;\n  height: 54px;\n}\n\n.bloco-servicos .swiper-slide-content {\n  width: 100%;\n}\n\n.bloco-servicos .swiper-slide-content div {\n  padding: 40px 40px 70px;\n  text-align: left;\n  min-height: 100px;\n}\n\n.bloco-servicos .swiper-slide-content h3 {\n  font-weight: 400;\n  font-size: 38px;\n  line-height: 38px;\n  color: #fff;\n}\n\n.bloco-servicos .swiper-slide-content p {\n  font-weight: 400;\n  font-size: 16px;\n  line-height: 20px;\n  color: #fff;\n}\n\n.bloco-servicos .swiper-slide-content a {\n  display: flex;\n  align-items: center;\n  font-weight: 600;\n  font-size: 14px;\n  line-height: 15px;\n  color: #fff;\n  justify-content: space-between;\n}\n\n.bloco-servicos .swiper-pagination-clickable .swiper-pagination-bullet {\n  transition: 0.3s;\n}\n\n.bloco-servicos .progress-bar {\n  display: none;\n  align-items: center;\n  justify-content: space-between;\n  position: absolute;\n  left: 50%;\n  top: 5%;\n  z-index: 10;\n  margin-left: -65px;\n}\n\n.bloco-servicos .progress-bar .index,\n.bloco-servicos .progress-bar .length {\n  font-weight: 400;\n  font-size: 14px;\n  line-height: 15px;\n  color: #fff;\n}\n\n.bloco-servicos .progress-bar .bar {\n  width: 75px;\n  height: 1px;\n  background: #FFFFFF4D;\n  margin: 0 20px;\n}\n.bloco-servicos .progress-bar .bar .progress {\n  height: 1px;\n  background: #FFFFFF;\n  width: 0;\n}\n\n@keyframes slideDown {\n  from {\n    opacity: 0;\n    max-height: 0;\n  }\n\n  to {\n    max-height: 200px;\n    opacity: 1;\n  }\n}\n\n@media only screen and (min-width: 549px) {\n  .bloco-servicos .swiper-slide {\n    border-right: 2px solid #e6e6e673;\n  }\n}\n\n@media only screen and (min-width: 992px) {\n  .bloco-servicos .swiper-pagination {\n    display: none;\n  }\n\n  .bloco-servicos .swiper-slide-content p {\n    padding-right: 30px;\n  }\n\n  .bloco-servicos .swiper-slide:hover .swiper-slide-content p {\n    display: block;\n    animation: slideDown 0.5s forwards;\n  }\n\n  .bloco-servicos .swiper-slide:hover .swiper-slide-content {\n    border-bottom: 15px solid #102F8E;\n    background: #3F8EDD;\n    border-top-left-radius: 20px;\n    border-top-right-radius: 20px;\n  }\n  .bloco-servicos .swiper-slide:hover {\t\n    background: transparent;\n  }\n  \/*.bloco-servicos .swiper-slide:hover {\n    background: rgb(0, 0, 0);\n    background: linear-gradient(\n      0deg,\n      rgba(0, 0, 0, 1) 0%,\n      rgba(0, 0, 0, 1) 2%,\n      rgba(0, 0, 0, 0.41360294117647056) 100%\n    );\n  }*\/\n\n  .bloco-servicos .swiper-slide:hover .swiper-slide-content a span {\n    display: block;\n  }\n}\n\n@media only screen and (max-width: 992px) {\n  .bloco-servicos .swiper-slide {\n    background: rgba(000, 000, 000, 0.3);\n  }\n\n  .bloco-servicos {\n  \theight: 650px;\n\t}\n\n   .swiper-slide-content {\n     border-bottom: 15px solid #102F8E;\n   }\n  \n  .bloco-servicos .swiper-slide-content a span {\n    display: block;\n  }\n\n  .bloco-servicos .swiper-slide-content a {\n    color: #fff !important;\n  }\n\n  .bloco-servicos .swiper-slide-content a svg path {\n    fill: #3cc64d;\n  }\n\n  .bloco-servicos .bloco-servicos h2 {\n    font-size: 1.5rem;\n  }\n\n  .bloco-servicos .swiper-pagination-bullet {\n    opacity: 1;\n    background: #fff;\n  }\n\n  .bloco-servicos .swiper-pagination-bullet-active {\n    background: #e1b401;\n    width: 20px;\n    border-radius: 5px;\n  }\n  \n  .bloco-servicos .swiper-slide:hover .swiper-slide-content {\n    border-bottom: 15px solid #102F8E;\n    background: #3F8EDD;\n    border-top-left-radius: 20px;\n    border-top-right-radius: 20px;\n  }\n  .bloco-servicos .swiper-slide:hover {\t\n    background: transparent;\n  }\n}\n\n.swiper-pagination.swiper-pagination-clickable.swiper-pagination-bullets.swiper-pagination-horizontal {\n    padding: 0 0 40px 0;\n}\n\n@media only screen and (max-width: 479px) {\n\n  .bloco-servicos .swiper-slide-active .swiper-slide-content {\n    border-bottom: 15px solid #102F8E;\n    background: #3F8EDD;\n    border-top-left-radius: 20px;\n    border-top-right-radius: 20px;\n  }\n  \n  .bloco-servicos .swiper-slide-content h3 {\n    font-size: 24px;\n    line-height: 24px;\n  }\n  \n  .bloco-servicos .swiper-slide-content a {\n    justify-content: flex-start;\n  }\n  \n  .bloco-servicos .swiper-slide-content div {\n    padding: 40px 40px 30px;\n  }\n  \n  .bloco-servicos .swiper-button-next,\n  .bloco-servicos .swiper-button-prev {\n    top: unset;\n    bottom: 7%\n  }\n  \n  .bloco-servicos .swiper-button-prev {\n    left: unset;\n    right: 30%;\n  }\n  \n  .bloco-servicos .swiper-slide-content p {\n    padding-bottom: 10px;\n  }\n  \n  .bloco-servicos .swiper-slide-active {\n    background: #3F8EDD;\n    background: linear-gradient(\n      180deg,\n      rgba(0, 0, 0, 0.3) 0%,\n      \/*rgba(0, 0, 0, 1) 2%,*\/\n      rgba(0, 0, 0, 0) 50%\n    );\n  }\n  \n  .bloco-servicos .progress-bar {\n    display: flex;\n  }\n}\n\n<\/style>\n\n<div class=\"bloco-servicos\" id=\"uc_slider_segments_content_elementor_75c0e8c\" data-id=\"uc_slider_segments_content_elementor_75c0e8c\">\n    <h2><\/h2>\n    <div class=\"swiper-figure\">\n      <div data-slider=\"background-servicos\" class=\"swiper-slide-img\"\n     style=\"background: url(https:\/\/www.altus.com.br\/wp-content\/uploads\/2024\/09\/Segmentos_og.jpg);\">\n<\/div>\n<div data-slider=\"background-servicos\" class=\"swiper-slide-img\"\n     style=\"background: url(https:\/\/www.altus.com.br\/wp-content\/uploads\/2024\/09\/Segmentos_energia-eletrica.jpg);\">\n<\/div>\n<div data-slider=\"background-servicos\" class=\"swiper-slide-img\"\n     style=\"background: url(https:\/\/www.altus.com.br\/wp-content\/uploads\/2024\/09\/Segmentos_industria-processos.jpg);\">\n<\/div>\n<div data-slider=\"background-servicos\" class=\"swiper-slide-img\"\n     style=\"background: url(https:\/\/www.altus.com.br\/wp-content\/uploads\/2024\/09\/Segmentos_manufatura.jpg);\">\n<\/div>\n<div data-slider=\"background-servicos\" class=\"swiper-slide-img\"\n     style=\"background: url(https:\/\/www.altus.com.br\/wp-content\/uploads\/2024\/09\/Segmentos_infra.jpg);\">\n<\/div>\n\n    <\/div>\n    <div class=\"swiper swiper-servico\">\n      <div class=\"swiper-wrapper\">\n        <div data-slider=\"options-servicos\" class=\"swiper-slide\">\n  <div class=\"swiper-slide-content\">\n    <div>\n      <h3>\u00d3leo e G\u00e1s<\/h3>\n      <p>Efici\u00eancia produtiva e alta disponibilidade para aplica\u00e7\u00f5es de \u00d3leo e G\u00e1s<\/p>\n              <a href=\"\/oleo-e-gas\/\" title=\"\u00d3leo e G\u00e1s\" >\n          <span>Veja mais<\/span>\n          <svg width=\"54\" height=\"54\" viewBox=\"0 0 54 54\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n            <path d=\"M27 20V34\" stroke=\"white\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n            <path d=\"M20 27H34\" stroke=\"white\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n          <\/svg>\n        <\/a>\n          <\/div>\n  <\/div>\n<\/div>\n<div data-slider=\"options-servicos\" class=\"swiper-slide\">\n  <div class=\"swiper-slide-content\">\n    <div>\n      <h3>Energia El\u00e9trica<\/h3>\n      <p>Performance e alta disponibilidade para a ind\u00fastria de Energia El\u00e9trica<\/p>\n              <a href=\"\/energia-eletrica\" title=\"Energia El\u00e9trica\" >\n          <span>Veja mais<\/span>\n          <svg width=\"54\" height=\"54\" viewBox=\"0 0 54 54\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n            <path d=\"M27 20V34\" stroke=\"white\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n            <path d=\"M20 27H34\" stroke=\"white\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n          <\/svg>\n        <\/a>\n          <\/div>\n  <\/div>\n<\/div>\n<div data-slider=\"options-servicos\" class=\"swiper-slide\">\n  <div class=\"swiper-slide-content\">\n    <div>\n      <h3>Ind\u00fastria de Processos<\/h3>\n      <p>Efici\u00eancia e produtividade para a Ind\u00fastria de Processos<\/p>\n              <a href=\"\/industria-de-processos\" title=\"Ind\u00fastria de Processos\" >\n          <span>Veja mais<\/span>\n          <svg width=\"54\" height=\"54\" viewBox=\"0 0 54 54\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n            <path d=\"M27 20V34\" stroke=\"white\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n            <path d=\"M20 27H34\" stroke=\"white\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n          <\/svg>\n        <\/a>\n          <\/div>\n  <\/div>\n<\/div>\n<div data-slider=\"options-servicos\" class=\"swiper-slide\">\n  <div class=\"swiper-slide-content\">\n    <div>\n      <h3>Ind\u00fastria de Manufatura<\/h3>\n      <p>Desempenho e alta disponibilidade para a Ind\u00fastria de Manufatura<\/p>\n              <a href=\"\/industria-de-manufatura\" title=\"Ind\u00fastria de Manufatura\" >\n          <span>Veja mais<\/span>\n          <svg width=\"54\" height=\"54\" viewBox=\"0 0 54 54\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n            <path d=\"M27 20V34\" stroke=\"white\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n            <path d=\"M20 27H34\" stroke=\"white\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n          <\/svg>\n        <\/a>\n          <\/div>\n  <\/div>\n<\/div>\n<div data-slider=\"options-servicos\" class=\"swiper-slide\">\n  <div class=\"swiper-slide-content\">\n    <div>\n      <h3>Infraestrutura<\/h3>\n      <p>Solu\u00e7\u00f5es integradas de Infraestrutura e Transporte<\/p>\n              <a href=\"\/infraestrutura\" title=\"Infraestrutura\" >\n          <span>Veja mais<\/span>\n          <svg width=\"54\" height=\"54\" viewBox=\"0 0 54 54\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n            <path d=\"M27 20V34\" stroke=\"white\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n            <path d=\"M20 27H34\" stroke=\"white\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n          <\/svg>\n        <\/a>\n          <\/div>\n  <\/div>\n<\/div>\n\n      <\/div>\n      <div class=\"swiper-button-next\">\n        <svg width=\"54\" height=\"54\" viewBox=\"0 0 54 54\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n          <path d=\"M20 27H34\" stroke=\"white\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n          <path d=\"M27 20L34 27L27 34\" stroke=\"white\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n          <rect x=\"0.5\" y=\"0.5\" width=\"53\" height=\"53\" rx=\"26.5\" stroke=\"white\"\/>\n        <\/svg>\n      <\/div>\n      <div class=\"swiper-button-prev\">\n        <svg width=\"54\" height=\"54\" viewBox=\"0 0 54 54\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n          <path d=\"M34 27H20\" stroke=\"white\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n          <path d=\"M27 20L20 27L27 34\" stroke=\"white\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\n          <rect x=\"-0.5\" y=\"0.5\" width=\"53\" height=\"53\" rx=\"26.5\" transform=\"matrix(-1 0 0 1 53 0)\" stroke=\"white\"\/>\n        <\/svg>\n      <\/div>\n      <div class=\"swiper-pagination\"><\/div>\n      <div class=\"progress-bar\">\n        <div class=\"index\"><\/div>\n        <div class=\"bar\">\n          <div class=\"progress\"><\/div>\n        <\/div>\n        <div class=\"length\"><\/div>\n      <\/div>\n    <\/div>\n  <\/div>\n<!-- end Slider Segmentos -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Solu\u00e7\u00f5es Seu neg\u00f3cio protegido contra ataques Com os avan\u00e7os nas tecnologias de comunica\u00e7\u00e3o, m\u00e1quinas e sistemas est\u00e3o se tornando cada vez mais interconectados por meio da internet. Nesse contexto, a prote\u00e7\u00e3o contra ataques cibern\u00e9ticos torna-se essencial para assegurar a seguran\u00e7a, a integridade dos dados e a continuidade das opera\u00e7\u00f5es industriais. Solicite uma assessoria Quer implementar [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2627","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.altus.com.br\/en\/wp-json\/wp\/v2\/pages\/2627","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.altus.com.br\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.altus.com.br\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.altus.com.br\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.altus.com.br\/en\/wp-json\/wp\/v2\/comments?post=2627"}],"version-history":[{"count":433,"href":"https:\/\/www.altus.com.br\/en\/wp-json\/wp\/v2\/pages\/2627\/revisions"}],"predecessor-version":[{"id":17894,"href":"https:\/\/www.altus.com.br\/en\/wp-json\/wp\/v2\/pages\/2627\/revisions\/17894"}],"wp:attachment":[{"href":"https:\/\/www.altus.com.br\/en\/wp-json\/wp\/v2\/media?parent=2627"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}