{"id":1215,"date":"2024-10-16T08:10:00","date_gmt":"2024-10-16T15:10:00","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=1215"},"modified":"2024-10-16T08:20:40","modified_gmt":"2024-10-16T15:20:40","slug":"emerging-security-issue-multiple-cups-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-multiple-cups-vulnerabilities\/","title":{"rendered":"Emerging Security Issue: Multiple CUPS Vulnerabilities"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">What are CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177?&nbsp;<\/h2>\n\n\n\n<p>On September 26, 2024, four critical vulnerabilities, <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=2024-47076\">CVE-2024-47076<\/a>, <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=2024-47175\">CVE-2024-47175<\/a>, <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=2024-47176\">CVE-2024-47176<\/a>, and <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=2024-47177\">CVE-2024-47177<\/a>, were disclosed in the open-source printing system Common Unix Printing System (CUPS) and its components. Attackers can leverage the remote code execution (RCE) and input validation vulnerabilities as part of an attack chain. Once a fake printing device on a network-exposed system running CUPS is created, any print jobs processed on the fake devices can be used to remotely execute malicious code.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What assets are affected by these vulnerabilities?<\/h2>\n\n\n\n<p>The issues above affect four different CUPS components:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>CVE-2024-47176 affects cups-browsed version 2.0.1<\/li>\n\n\n\n<li>CVE-2024-47076 affects libcupsfilters versions 2.1b1 and below<\/li>\n\n\n\n<li>CVE-2024-47175 affects libbppd versions 2.1b1 and below<\/li>\n\n\n\n<li>CVE-2024-47177 affects cups-filters versions 2.0.1 and below<\/li>\n<\/ul>\n\n\n\n<p>These assets are primarily found on GNU\/Linux systems.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Are fixes available?&nbsp;<\/h2>\n\n\n\n<p>Patches are not currently available for these issues.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Are there any other actions to take?&nbsp;<\/h2>\n\n\n\n<p>To mitigate potential exploitation, administrators can block UDP traffic on port 631. Alternatively, if CUPS is no longer in use, removed the cups-browsed service using the commands&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>systemctl stop cups-browsed<\/li>\n\n\n\n<li>systemctl disable cups-browsed\u00a0<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Are these issues being actively exploited?&nbsp;<\/h2>\n\n\n\n<p>As of October 14th, there are no reports of active exploitation of these vulnerabilities.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How is CyCognito helping customers identify assets vulnerable to these issues?&nbsp;<\/h2>\n\n\n\n<p>CyCognito is investigating active detection methods for these vulnerabilities. CyCognito users can check if any assets are running potentially vulnerable CUPS products using provided filters in the CyCognito platform. All customers have access to an in-platform emerging security issue announcement as of October 2nd, 2024.&nbsp;&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"753\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CUPS-Figure-1-1280x753.webp\" alt=\"\" class=\"wp-image-1218\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CUPS-Figure-1-1280x753.webp 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CUPS-Figure-1-512x301.webp 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CUPS-Figure-1-768x452.webp 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CUPS-Figure-1-1536x904.webp 1536w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CUPS-Figure-1.webp 1954w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure>\n\n\n\n<p class=\"caption\">Figure 1: The alert sent by CyCognito for these issues.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How can CyCognito help your organization?&nbsp;<\/h2>\n\n\n\n<p>CyCognito is an exposure management platform that reduces risk by discovering, testing and prioritizing security issues. The platform scans billions of websites, cloud applications and APIs and uses advanced AI to identify the most critical risks and guide remediation. Emerging companies, government agencies and Fortune 500 organizations rely on CyCognito to secure and protect from growing threats. Want to see how it works? Check out our website and explore our platform with a self-guided, interactive <a href=\"https:\/\/app.getreprise.com\/launch\/V6Waa5X\">dashboard product tour<\/a>. To learn how CyCognito can help you understand your external attack surface and exposed risks, please visit our <a href=\"https:\/\/www.cycognito.com\/contact\/\">Contact Us page<\/a> to schedule a demo.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On September 26, 2024, four critical RCE vulnerabilities were disclosed in components of the open-source printing system CUPS. CyCognito is investigating active detection methods for these vulnerabilities. Users can check if any assets are potentially vulnerable using provided filters in the CyCognito platform.  <\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[199,58,198,200,57],"class_list":["post-1215","post","type-post","status-publish","format-standard","hentry","category-research","tag-cups","tag-cve","tag-linux","tag-rce","tag-vulnerability"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Emerging Security Issue: Multiple CUPS Vulnerabilities | CyCognito Blog<\/title>\n<meta name=\"description\" content=\"CyCognito is investigating active detection methods for four critical RCE vulnerabilities. Users can check if any assets are potentially vulnerable using provided filters in the CyCognito platform.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-multiple-cups-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Emerging Security Issue: Multiple CUPS Vulnerabilities\" \/>\n<meta property=\"og:description\" content=\"CyCognito is investigating active detection methods for four critical RCE vulnerabilities. Users can check if any assets are potentially vulnerable using provided filters in the CyCognito platform.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-multiple-cups-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-16T15:10:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-16T15:20:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/banner-blog-2024-10-16-cups-2400x1256-email.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"1256\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Emma Zaballos\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Emma Zaballos\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-multiple-cups-vulnerabilities\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-multiple-cups-vulnerabilities\/\"},\"author\":{\"name\":\"Emma Zaballos\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/42c314196e7f096a74bd885693643d58\"},\"headline\":\"Emerging Security Issue: Multiple CUPS Vulnerabilities\",\"datePublished\":\"2024-10-16T15:10:00+00:00\",\"dateModified\":\"2024-10-16T15:20:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-multiple-cups-vulnerabilities\/\"},\"wordCount\":400,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-multiple-cups-vulnerabilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CUPS-Figure-1-1280x753.webp\",\"keywords\":[\"CUPS\",\"CVE\",\"Linux\",\"RCE\",\"Vulnerability\"],\"articleSection\":[\"Research\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-multiple-cups-vulnerabilities\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-multiple-cups-vulnerabilities\/\",\"name\":\"Emerging Security Issue: Multiple CUPS Vulnerabilities | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-multiple-cups-vulnerabilities\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-multiple-cups-vulnerabilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CUPS-Figure-1-1280x753.webp\",\"datePublished\":\"2024-10-16T15:10:00+00:00\",\"dateModified\":\"2024-10-16T15:20:40+00:00\",\"description\":\"CyCognito is investigating active detection methods for four critical RCE vulnerabilities. Users can check if any assets are potentially vulnerable using provided filters in the CyCognito platform.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-multiple-cups-vulnerabilities\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-multiple-cups-vulnerabilities\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-multiple-cups-vulnerabilities\/#primaryimage\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CUPS-Figure-1.webp\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CUPS-Figure-1.webp\",\"width\":1954,\"height\":1150},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-multiple-cups-vulnerabilities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Emerging Security Issue: Multiple CUPS Vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/42c314196e7f096a74bd885693643d58\",\"name\":\"Emma Zaballos\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7ff812a5ab34a955a1e815e6719c68a7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7ff812a5ab34a955a1e815e6719c68a7?s=96&d=mm&r=g\",\"caption\":\"Emma Zaballos\"},\"description\":\"Product Marketing Manager\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/emma-zaballos\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Emerging Security Issue: Multiple CUPS Vulnerabilities | CyCognito Blog","description":"CyCognito is investigating active detection methods for four critical RCE vulnerabilities. Users can check if any assets are potentially vulnerable using provided filters in the CyCognito platform.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-multiple-cups-vulnerabilities\/","og_locale":"en_US","og_type":"article","og_title":"Emerging Security Issue: Multiple CUPS Vulnerabilities","og_description":"CyCognito is investigating active detection methods for four critical RCE vulnerabilities. Users can check if any assets are potentially vulnerable using provided filters in the CyCognito platform.","og_url":"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-multiple-cups-vulnerabilities\/","og_site_name":"CyCognito Blog","article_published_time":"2024-10-16T15:10:00+00:00","article_modified_time":"2024-10-16T15:20:40+00:00","og_image":[{"width":2400,"height":1256,"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/banner-blog-2024-10-16-cups-2400x1256-email.png","type":"image\/png"}],"author":"Emma Zaballos","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Emma Zaballos","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-multiple-cups-vulnerabilities\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-multiple-cups-vulnerabilities\/"},"author":{"name":"Emma Zaballos","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/42c314196e7f096a74bd885693643d58"},"headline":"Emerging Security Issue: Multiple CUPS Vulnerabilities","datePublished":"2024-10-16T15:10:00+00:00","dateModified":"2024-10-16T15:20:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-multiple-cups-vulnerabilities\/"},"wordCount":400,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-multiple-cups-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CUPS-Figure-1-1280x753.webp","keywords":["CUPS","CVE","Linux","RCE","Vulnerability"],"articleSection":["Research"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-multiple-cups-vulnerabilities\/","url":"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-multiple-cups-vulnerabilities\/","name":"Emerging Security Issue: Multiple CUPS Vulnerabilities | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-multiple-cups-vulnerabilities\/#primaryimage"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-multiple-cups-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CUPS-Figure-1-1280x753.webp","datePublished":"2024-10-16T15:10:00+00:00","dateModified":"2024-10-16T15:20:40+00:00","description":"CyCognito is investigating active detection methods for four critical RCE vulnerabilities. Users can check if any assets are potentially vulnerable using provided filters in the CyCognito platform.","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-multiple-cups-vulnerabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/emerging-security-issue-multiple-cups-vulnerabilities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-multiple-cups-vulnerabilities\/#primaryimage","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CUPS-Figure-1.webp","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CUPS-Figure-1.webp","width":1954,"height":1150},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/emerging-security-issue-multiple-cups-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Emerging Security Issue: Multiple CUPS Vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/42c314196e7f096a74bd885693643d58","name":"Emma Zaballos","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7ff812a5ab34a955a1e815e6719c68a7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7ff812a5ab34a955a1e815e6719c68a7?s=96&d=mm&r=g","caption":"Emma Zaballos"},"description":"Product Marketing Manager","url":"https:\/\/www.cycognito.com\/blog\/author\/emma-zaballos\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/1215","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=1215"}],"version-history":[{"count":2,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/1215\/revisions"}],"predecessor-version":[{"id":1219,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/1215\/revisions\/1219"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=1215"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=1215"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=1215"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}