{"id":1106,"date":"2024-09-10T08:00:06","date_gmt":"2024-09-10T15:00:06","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=1106"},"modified":"2024-09-10T08:00:07","modified_gmt":"2024-09-10T15:00:07","slug":"emerging-security-issue-sonicwall-sslvpn-cve-2024-40766","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-sonicwall-sslvpn-cve-2024-40766\/","title":{"rendered":"Emerging Security Issue: SonicWall SSLVPN (CVE-2024-40766)"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">What is CVE-2024-40766?&nbsp;<\/h2>\n\n\n\n<p>CVE-2024-40766 is a critical (CVSS v3 score: 9.3) access control flaw. Its primary danger comes from the potential for providing unauthorized network access, both allowing attackers unfettered access to critical resources and, in some cases, giving attackers the ability to crash the firewall.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Assets are Affected by this Vulnerability?&nbsp;<\/h2>\n\n\n\n<p>CVE-2024-40766 affects SonicWall devices using a vulnerable SonicOS firmware version, specifically SonicWall Firewall Gen 5, Gen 6, and Gen 7 devices.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Is a Fix Available?&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/psirt.global.sonicwall.com\/vuln-detail\/SNWLID-2024-0015\">SonicWall<\/a> has released a list of impacted products and versions alongside releases for CVE-2024-40766:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>SonicWall Gen 5 running SonicOS version 5.9.2.14-12o and older \u2013 fixed in SonicOS version 5.9.2.14-13o<\/li>\n\n\n\n<li>SonicWall Gen 6 running SonicOS version 6.5.4.14-109n and older \u2013 fixed in 6.5.2.8-2n (for SM9800, NSsp 12400, NSsp 12800) and version 6.5.4.15-116n (for other Gen 6 Firewalls)<\/li>\n\n\n\n<li>SonicWall Gen 7 running SonicOS version 7.0.1-5035 and older \u2013 not reproducible in 7.0.1-5035 and later, but SonicWall recommends installing the latest firmware version<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Are There Any Other Recommended Actions to Take?&nbsp;<\/h2>\n\n\n\n<p>SonicWall has released several suggested mitigations in addition to the fixes above.&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Limit firewall management to trusted sources and disable internet access to the WAN management portal if possible.<\/li>\n\n\n\n<li>Restrict SSLVPN access to trusted sources only and disable it entirely if not needed.<\/li>\n\n\n\n<li>For Gen 5 and Gen 6 devices, SSLVPN users with local accounts should update their passwords immediately and administrators should enable the &#8220;User must change password&#8221; option for local users.<\/li>\n\n\n\n<li>Enable multi-factor authentication (MFA) for all SSLVPN users using TOTP or email-based one-time passwords (OTPs).\u00a0<\/li>\n<\/ol>\n\n\n\n<p>For additional information on configuring MFA, check out SonicWall\u2019s <a href=\"https:\/\/www.sonicwall.com\/support\/knowledge-base\/how-do-i-configure-2fa-for-ssl-vpn-with-totp\/190829123329169\">Knowledge Base<\/a> here.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Is CVE-2024-40766 Being Actively Exploited?&nbsp;<\/h2>\n\n\n\n<p>While SonicWall originally indicated that there was no active exploitation of this vulnerability when it was publicly reported on August 22nd, 2024, that didn\u2019t last long. By September 6th, 2024, SonicWall updated its security advisory to include that the issue was potentially being exploited in the wild.&nbsp;<\/p>\n\n\n\n<p>The same day, security researchers at <a href=\"https:\/\/arcticwolf.com\/resources\/blog\/arctic-wolf-observes-akira-ransomware-campaign-targeting-sonicwall-sslvpn-accounts\/\">Arctic Wolf<\/a> reported that threat actors, specifically the Akira ransomware affiliates, have begun actively exploiting this vulnerability to deliver ransomware. Specifically, attackers were observed using compromised SSLVPN user accounts on SonicWall devices as the initial access vectors for ransomware, taking advantage of accounts that were not integrated in a centralized authentication solution and lacked MFA.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How is CyCognito Helping Customers Identify Assets Vulnerable to CVE-2024-40766?&nbsp;<\/h2>\n\n\n\n<p>CyCognito discovery and testing engines detect all assets running SonicWall SonicOS products and leverage multiple tests to services of the vulnerable product and versions.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"756\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screenshot-2024-09-10-at-10.13.48\u202fAM-1280x756.webp\" alt=\"\" class=\"wp-image-1107\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screenshot-2024-09-10-at-10.13.48\u202fAM-1280x756.webp 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screenshot-2024-09-10-at-10.13.48\u202fAM-512x302.webp 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screenshot-2024-09-10-at-10.13.48\u202fAM-768x453.webp 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screenshot-2024-09-10-at-10.13.48\u202fAM-1536x907.webp 1536w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/Screenshot-2024-09-10-at-10.13.48\u202fAM.webp 1938w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n\n\n<p class=\"caption\">Figure 1: The alert sent by CyCognito for CVE-2024-40766<\/p>\n\n\n\n<p>All customers have access to an in-platform emerging security issue announcement as of September 10th, 2024. The CyCognito platform uses both passive scanning and active testing techniques to identify vulnerable assets.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Can CyCognito Help Your Organization?&nbsp;<\/h2>\n\n\n\n<p>CyCognito is an exposure management platform that reduces risk by discovering, testing and prioritizing security issues. The platform scans billions of websites, cloud applications and APIs and uses advanced AI to identify the most critical risks and guide remediation. Emerging companies, government agencies and Fortune 500 organizations rely on CyCognito to secure and protect from growing threats. Want to see how it works? Check out our website and explore our platform with a self-guided, interactive <a href=\"https:\/\/app.getreprise.com\/launch\/V6Waa5X\">dashboard product tour<\/a>. To learn how CyCognito can help you understand your external attack surface and exposed risks, please visit our <a href=\"https:\/\/www.cycognito.com\/contact\/\">Contact Us page<\/a> to schedule a demo.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CVE-2024-40766 is a critical (CVSS v3 score: 9.3) access control flaw affecting SonicWall firewall devices that attackers are actively exploiting to deliver ransomware. CyCognito discovery and testing engines detect all assets running SonicWall SonicOS products and leverage multiple tests to services of the vulnerable product and versions. All customers have access to an in-platform emerging security issue announcement as of September 10th, 2024.<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[183,58,182,57],"class_list":["post-1106","post","type-post","status-publish","format-standard","hentry","category-research","tag-access-control","tag-cve","tag-sonicwall","tag-vulnerability"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Emerging Security Issue: SonicWall SSLVPN (CVE-2024-40766) | CyCognito Blog<\/title>\n<meta name=\"description\" content=\"CVE-2024-40766 is a critical (CVSS v3 score: 9.3) access control flaw affecting SonicWall firewall devices that attackers are actively exploiting to deliver ransomware.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-sonicwall-sslvpn-cve-2024-40766\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Emerging Security Issue: SonicWall SSLVPN (CVE-2024-40766)\" \/>\n<meta property=\"og:description\" content=\"CVE-2024-40766 is a critical (CVSS v3 score: 9.3) access control flaw affecting SonicWall firewall devices that attackers are actively exploiting to deliver ransomware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-sonicwall-sslvpn-cve-2024-40766\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-10T15:00:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-10T15:00:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/banner-blog-2024-09-10-2400x1256-email.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"1256\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Emma Zaballos\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Emma Zaballos\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-sonicwall-sslvpn-cve-2024-40766\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-sonicwall-sslvpn-cve-2024-40766\/\"},\"author\":{\"name\":\"Emma Zaballos\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/42c314196e7f096a74bd885693643d58\"},\"headline\":\"Emerging Security Issue: SonicWall SSLVPN (CVE-2024-40766)\",\"datePublished\":\"2024-09-10T15:00:06+00:00\",\"dateModified\":\"2024-09-10T15:00:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-sonicwall-sslvpn-cve-2024-40766\/\"},\"wordCount\":579,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"keywords\":[\"Access Control\",\"CVE\",\"SonicWall\",\"Vulnerability\"],\"articleSection\":[\"Research\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-sonicwall-sslvpn-cve-2024-40766\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-sonicwall-sslvpn-cve-2024-40766\/\",\"name\":\"Emerging Security Issue: SonicWall SSLVPN (CVE-2024-40766) | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"datePublished\":\"2024-09-10T15:00:06+00:00\",\"dateModified\":\"2024-09-10T15:00:07+00:00\",\"description\":\"CVE-2024-40766 is a critical (CVSS v3 score: 9.3) access control flaw affecting SonicWall firewall devices that attackers are actively exploiting to deliver ransomware.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-sonicwall-sslvpn-cve-2024-40766\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-sonicwall-sslvpn-cve-2024-40766\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-sonicwall-sslvpn-cve-2024-40766\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Emerging Security Issue: SonicWall SSLVPN (CVE-2024-40766)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/42c314196e7f096a74bd885693643d58\",\"name\":\"Emma Zaballos\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7ff812a5ab34a955a1e815e6719c68a7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7ff812a5ab34a955a1e815e6719c68a7?s=96&d=mm&r=g\",\"caption\":\"Emma Zaballos\"},\"description\":\"Product Marketing Manager\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/emma-zaballos\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Emerging Security Issue: SonicWall SSLVPN (CVE-2024-40766) | CyCognito Blog","description":"CVE-2024-40766 is a critical (CVSS v3 score: 9.3) access control flaw affecting SonicWall firewall devices that attackers are actively exploiting to deliver ransomware.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-sonicwall-sslvpn-cve-2024-40766\/","og_locale":"en_US","og_type":"article","og_title":"Emerging Security Issue: SonicWall SSLVPN (CVE-2024-40766)","og_description":"CVE-2024-40766 is a critical (CVSS v3 score: 9.3) access control flaw affecting SonicWall firewall devices that attackers are actively exploiting to deliver ransomware.","og_url":"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-sonicwall-sslvpn-cve-2024-40766\/","og_site_name":"CyCognito Blog","article_published_time":"2024-09-10T15:00:06+00:00","article_modified_time":"2024-09-10T15:00:07+00:00","og_image":[{"width":2400,"height":1256,"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/banner-blog-2024-09-10-2400x1256-email.png","type":"image\/png"}],"author":"Emma Zaballos","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Emma Zaballos","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-sonicwall-sslvpn-cve-2024-40766\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-sonicwall-sslvpn-cve-2024-40766\/"},"author":{"name":"Emma Zaballos","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/42c314196e7f096a74bd885693643d58"},"headline":"Emerging Security Issue: SonicWall SSLVPN (CVE-2024-40766)","datePublished":"2024-09-10T15:00:06+00:00","dateModified":"2024-09-10T15:00:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-sonicwall-sslvpn-cve-2024-40766\/"},"wordCount":579,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"keywords":["Access Control","CVE","SonicWall","Vulnerability"],"articleSection":["Research"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-sonicwall-sslvpn-cve-2024-40766\/","url":"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-sonicwall-sslvpn-cve-2024-40766\/","name":"Emerging Security Issue: SonicWall SSLVPN (CVE-2024-40766) | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"datePublished":"2024-09-10T15:00:06+00:00","dateModified":"2024-09-10T15:00:07+00:00","description":"CVE-2024-40766 is a critical (CVSS v3 score: 9.3) access control flaw affecting SonicWall firewall devices that attackers are actively exploiting to deliver ransomware.","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-sonicwall-sslvpn-cve-2024-40766\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/emerging-security-issue-sonicwall-sslvpn-cve-2024-40766\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-sonicwall-sslvpn-cve-2024-40766\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Emerging Security Issue: SonicWall SSLVPN (CVE-2024-40766)"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/42c314196e7f096a74bd885693643d58","name":"Emma Zaballos","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7ff812a5ab34a955a1e815e6719c68a7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7ff812a5ab34a955a1e815e6719c68a7?s=96&d=mm&r=g","caption":"Emma Zaballos"},"description":"Product Marketing Manager","url":"https:\/\/www.cycognito.com\/blog\/author\/emma-zaballos\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/1106","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=1106"}],"version-history":[{"count":1,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/1106\/revisions"}],"predecessor-version":[{"id":1108,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/1106\/revisions\/1108"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=1106"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=1106"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=1106"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}