{"id":3346,"date":"2025-01-12T13:17:32","date_gmt":"2025-01-12T13:17:32","guid":{"rendered":"https:\/\/dmctechgroup.com\/?p=3346"},"modified":"2025-01-12T13:17:34","modified_gmt":"2025-01-12T13:17:34","slug":"sonicwall-vulnerability","status":"publish","type":"post","link":"https:\/\/dmctechgroup.com\/sonicwall-vulnerability\/","title":{"rendered":"Protecting Your Network: Addressing the SonicWall Firewall Authentication Bypass Vulnerability"},"content":{"rendered":"\n

On January 7, 2025, SonicWall released a critical security patch for its SonicOS firmware, addressing a high-severity vulnerability (CVE-2024-53704) in SSL VPN and SSH management. With a CVSS score of 8.2, this flaw is a serious threat to network security, making immediate action essential for organizations using SonicWall firewalls.<\/p>\n\n\n\n

The Threat: What You Need to Know<\/strong><\/h4>\n\n\n\n

The vulnerability affects multiple generations of SonicWall firewalls (Gen 6 and Gen 7) running older firmware versions. Exploitation could allow attackers to bypass authentication, gaining unauthorized access to network resources. SonicWall has strongly urged customers to update their firmware to mitigate this issue.<\/p>\n\n\n\n

\"\"<\/figure>\n\n\n\n

Affected Firmware Versions:<\/strong><\/p>\n\n\n\n

    \n
  • 6.5.4.15-117n and older<\/li>\n\n\n\n
  • 7.0.1-5161 and older<\/li>\n<\/ul>\n\n\n\n

    Recommended Firmware Updates:<\/strong><\/p>\n\n\n\n

      \n
    • Gen 6 \/ 6.5 hardware firewalls:<\/strong> SonicOS 6.5.5.1-6n or newer<\/li>\n\n\n\n
    • Gen 6 \/ 6.5 NSv firewalls:<\/strong> SonicOS 6.5.4.v-21s-RC2457 or newer<\/li>\n\n\n\n
    • Gen 7 firewalls:<\/strong> SonicOS 7.0.1-5165 or newer; 7.1.3-7015 or higher<\/li>\n\n\n\n
    • TZ80 firewalls:<\/strong> SonicOS 8.0.0-8037 or newer<\/li>\n<\/ul>\n\n\n\n

      Additional Risks<\/strong><\/h4>\n\n\n\n

      The firmware updates also address other vulnerabilities, including:<\/p>\n\n\n\n

        \n
      • CVE-2024-40762:<\/strong> Weak pseudo-random number generator (PRNG) in the SSL VPN authentication token generator.<\/li>\n\n\n\n
      • CVE-2024-53705:<\/strong> Server-side request forgery (SSRF) vulnerability in the SSH management interface.<\/li>\n\n\n\n
      • CVE-2024-53706:<\/strong> Privilege escalation flaw in Gen 7 SonicOS Cloud NSv for AWS and Azure.<\/li>\n<\/ul>\n\n\n\n

        SonicWall's Recommendations<\/strong><\/h4>\n\n\n\n
          \n
        • For SSL VPN vulnerabilities:<\/strong>\n
            \n
          • Restrict access to trusted sources.<\/li>\n\n\n\n
          • Disable internet access entirely if not required.<\/li>\n<\/ul>\n<\/li>\n\n\n\n
          • For SSH vulnerabilities:<\/strong>\n
              \n
            • Limit SSH management access.<\/li>\n\n\n\n
            • Disable internet access to SSH management if possible.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n

              How DMC Technology Group Can Help<\/strong><\/h4>\n\n\n\n

              At DMC Technology Group<\/strong>, we understand the critical importance of network security and proactive threat mitigation. If you\u2019re a SonicWall user concerned about this vulnerability, we can:<\/p>\n\n\n\n

                \n
              1. Assess Your Network Vulnerabilities:<\/strong>
                <\/strong>Conduct a thorough review of your network to identify risks and ensure all firmware is up to date.<\/li>\n\n\n\n
              2. Implement Patch Management:<\/strong>
                <\/strong>Apply the latest SonicOS firmware updates to secure your firewalls against known threats.<\/li>\n\n\n\n
              3. Enhance Security Policies:<\/strong>
                <\/strong>Configure firewall rules, restrict management access, and implement best practices for SSL VPN and SSH security.<\/li>\n\n\n\n
              4. Monitor and Respond:<\/strong>
                <\/strong>Provide 24\/7 network monitoring to detect and respond to suspicious activity in real time.<\/li>\n\n\n\n
              5. Train Your Team:<\/strong>
                <\/strong>Offer training and resources to ensure your IT team can maintain a secure and resilient infrastructure.<\/li>\n<\/ol>\n\n\n\n

                Staying Ahead of Threats<\/strong><\/h4>\n\n\n\n

                Cybersecurity threats evolve rapidly, and vulnerabilities like this highlight the importance of vigilance. With our expertise, DMC Technology Group ensures that your organization is protected against the latest risks.<\/p>\n\n\n\n

                Contact us today<\/strong> to secure your network and safeguard your business, or download our Security Checklist to see if you're vulnerable. <\/p>\n\n\n\n

                Stay protected. Stay proactive. Stay connected.<\/p>\n\n\n\n

                <\/p>\n","protected":false},"excerpt":{"rendered":"

                On January 7, 2025, SonicWall released a critical security patch for its SonicOS firmware, addressing a high-severity vulnerability (CVE-2024-53704) in SSL VPN and SSH management. With a CVSS score of 8.2, this flaw is a serious threat to network security, making immediate action essential for organizations using SonicWall firewalls.<\/p>\n","protected":false},"author":1,"featured_media":3350,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[6,4,15,5,1,7],"tags":[95,16,10,89,92,93,94,12],"class_list":["post-3346","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cybersecurity","category-it-managed-services","category-it-services-toledo","category-news-and-events","category-security-assessment","tag-company-policy-for-social-media","tag-cyber-security-toledo","tag-dmc-technology-group","tag-it-strategy","tag-new-hire","tag-social-media","tag-social-media-access","tag-toledo-it-firm"],"yoast_head":"\nProtecting Your Network: Addressing the SonicWall Firewall Authentication Bypass Vulnerability - DMC Technology Group<\/title>\n<meta name=\"description\" content=\"Protecting Your Network: Addressing the SonicWall Firewall Authentication Bypass Vulnerability 2025\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dmctechgroup.com\/sonicwall-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting Your Network: Addressing the SonicWall Firewall Authentication Bypass Vulnerability\" \/>\n<meta property=\"og:description\" content=\"On January 7, 2025, SonicWall released a critical security patch for its SonicOS firmware, addressing a high-severity vulnerability (CVE-2024-53704) in SSL VPN and SSH management. With a CVSS score of 8.2, this flaw is a serious threat to network security, making immediate action essential for organizations using SonicWall firewalls.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dmctechgroup.com\/sonicwall-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"DMC Technology Group\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-12T13:17:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-12T13:17:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dmctechgroup.com\/wp-content\/uploads\/2025\/01\/Add-a-heading-19-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1650\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"dmctechgroustg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dmctechgroustg\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dmctechgroup.com\/sonicwall-vulnerability\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/dmctechgroup.com\/sonicwall-vulnerability\/\"},\"author\":{\"name\":\"dmctechgroustg\",\"@id\":\"https:\/\/dmctechgroup.com\/#\/schema\/person\/f5d7b1e6d283e44dba79ff52106a30c3\"},\"headline\":\"Protecting Your Network: Addressing the SonicWall Firewall Authentication Bypass Vulnerability\",\"datePublished\":\"2025-01-12T13:17:32+00:00\",\"dateModified\":\"2025-01-12T13:17:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dmctechgroup.com\/sonicwall-vulnerability\/\"},\"wordCount\":420,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/dmctechgroup.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/dmctechgroup.com\/sonicwall-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dmctechgroup.com\/wp-content\/uploads\/2025\/01\/Add-a-heading-19-2.png\",\"keywords\":[\"company policy for social media\",\"cyber security Toledo\",\"DMC Technology Group\",\"IT strategy\",\"New hire\",\"social media\",\"social media access\",\"Toledo IT Firm\"],\"articleSection\":[\"Blog\",\"Cybersecurity\",\"IT Managed Services\",\"IT Services Toledo\",\"News and Events\",\"Security Assessment\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/dmctechgroup.com\/sonicwall-vulnerability\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dmctechgroup.com\/sonicwall-vulnerability\/\",\"url\":\"https:\/\/dmctechgroup.com\/sonicwall-vulnerability\/\",\"name\":\"Protecting Your Network: Addressing the SonicWall Firewall Authentication Bypass Vulnerability - DMC Technology Group\",\"isPartOf\":{\"@id\":\"https:\/\/dmctechgroup.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dmctechgroup.com\/sonicwall-vulnerability\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dmctechgroup.com\/sonicwall-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dmctechgroup.com\/wp-content\/uploads\/2025\/01\/Add-a-heading-19-2.png\",\"datePublished\":\"2025-01-12T13:17:32+00:00\",\"dateModified\":\"2025-01-12T13:17:34+00:00\",\"description\":\"Protecting Your Network: Addressing the SonicWall Firewall Authentication Bypass Vulnerability 2025\",\"breadcrumb\":{\"@id\":\"https:\/\/dmctechgroup.com\/sonicwall-vulnerability\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dmctechgroup.com\/sonicwall-vulnerability\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dmctechgroup.com\/sonicwall-vulnerability\/#primaryimage\",\"url\":\"https:\/\/dmctechgroup.com\/wp-content\/uploads\/2025\/01\/Add-a-heading-19-2.png\",\"contentUrl\":\"https:\/\/dmctechgroup.com\/wp-content\/uploads\/2025\/01\/Add-a-heading-19-2.png\",\"width\":1650,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dmctechgroup.com\/sonicwall-vulnerability\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dmctechgroup.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting Your Network: Addressing the SonicWall Firewall Authentication Bypass Vulnerability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dmctechgroup.com\/#website\",\"url\":\"https:\/\/dmctechgroup.com\/\",\"name\":\"DMC Technology Group\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/dmctechgroup.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dmctechgroup.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dmctechgroup.com\/#organization\",\"name\":\"DMC Technology Group\",\"url\":\"https:\/\/dmctechgroup.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dmctechgroup.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/dmctechgroup.com\/wp-content\/uploads\/2023\/12\/DMC-Logo-Alone.svg\",\"contentUrl\":\"https:\/\/dmctechgroup.com\/wp-content\/uploads\/2023\/12\/DMC-Logo-Alone.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"DMC Technology Group\"},\"image\":{\"@id\":\"https:\/\/dmctechgroup.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/dmctechgroup.com\/#\/schema\/person\/f5d7b1e6d283e44dba79ff52106a30c3\",\"name\":\"dmctechgroustg\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dmctechgroup.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7fd48b5dd8b3a464faaf6b8474202525?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7fd48b5dd8b3a464faaf6b8474202525?s=96&d=mm&r=g\",\"caption\":\"dmctechgroustg\"},\"sameAs\":[\"https:\/\/dmctechgroup.com\"],\"url\":\"https:\/\/dmctechgroup.com\/author\/dmctechgroustg\/\"}]}<\/script>\n","yoast_head_json":{"title":"Protecting Your Network: Addressing the SonicWall Firewall Authentication Bypass Vulnerability - DMC Technology Group","description":"Protecting Your Network: Addressing the SonicWall Firewall Authentication Bypass Vulnerability 2025","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dmctechgroup.com\/sonicwall-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"Protecting Your Network: Addressing the SonicWall Firewall Authentication Bypass Vulnerability","og_description":"On January 7, 2025, SonicWall released a critical security patch for its SonicOS firmware, addressing a high-severity vulnerability (CVE-2024-53704) in SSL VPN and SSH management. With a CVSS score of 8.2, this flaw is a serious threat to network security, making immediate action essential for organizations using SonicWall firewalls.","og_url":"https:\/\/dmctechgroup.com\/sonicwall-vulnerability\/","og_site_name":"DMC Technology Group","article_published_time":"2025-01-12T13:17:32+00:00","article_modified_time":"2025-01-12T13:17:34+00:00","og_image":[{"width":1650,"height":550,"url":"https:\/\/dmctechgroup.com\/wp-content\/uploads\/2025\/01\/Add-a-heading-19-2.png","type":"image\/png"}],"author":"dmctechgroustg","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dmctechgroustg","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dmctechgroup.com\/sonicwall-vulnerability\/#article","isPartOf":{"@id":"https:\/\/dmctechgroup.com\/sonicwall-vulnerability\/"},"author":{"name":"dmctechgroustg","@id":"https:\/\/dmctechgroup.com\/#\/schema\/person\/f5d7b1e6d283e44dba79ff52106a30c3"},"headline":"Protecting Your Network: Addressing the SonicWall Firewall Authentication Bypass Vulnerability","datePublished":"2025-01-12T13:17:32+00:00","dateModified":"2025-01-12T13:17:34+00:00","mainEntityOfPage":{"@id":"https:\/\/dmctechgroup.com\/sonicwall-vulnerability\/"},"wordCount":420,"commentCount":0,"publisher":{"@id":"https:\/\/dmctechgroup.com\/#organization"},"image":{"@id":"https:\/\/dmctechgroup.com\/sonicwall-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/dmctechgroup.com\/wp-content\/uploads\/2025\/01\/Add-a-heading-19-2.png","keywords":["company policy for social media","cyber security Toledo","DMC Technology Group","IT strategy","New hire","social media","social media access","Toledo IT Firm"],"articleSection":["Blog","Cybersecurity","IT Managed Services","IT Services Toledo","News and Events","Security Assessment"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/dmctechgroup.com\/sonicwall-vulnerability\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/dmctechgroup.com\/sonicwall-vulnerability\/","url":"https:\/\/dmctechgroup.com\/sonicwall-vulnerability\/","name":"Protecting Your Network: Addressing the SonicWall Firewall Authentication Bypass Vulnerability - DMC Technology Group","isPartOf":{"@id":"https:\/\/dmctechgroup.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dmctechgroup.com\/sonicwall-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/dmctechgroup.com\/sonicwall-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/dmctechgroup.com\/wp-content\/uploads\/2025\/01\/Add-a-heading-19-2.png","datePublished":"2025-01-12T13:17:32+00:00","dateModified":"2025-01-12T13:17:34+00:00","description":"Protecting Your Network: Addressing the SonicWall Firewall Authentication Bypass Vulnerability 2025","breadcrumb":{"@id":"https:\/\/dmctechgroup.com\/sonicwall-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dmctechgroup.com\/sonicwall-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dmctechgroup.com\/sonicwall-vulnerability\/#primaryimage","url":"https:\/\/dmctechgroup.com\/wp-content\/uploads\/2025\/01\/Add-a-heading-19-2.png","contentUrl":"https:\/\/dmctechgroup.com\/wp-content\/uploads\/2025\/01\/Add-a-heading-19-2.png","width":1650,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/dmctechgroup.com\/sonicwall-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dmctechgroup.com\/"},{"@type":"ListItem","position":2,"name":"Protecting Your Network: Addressing the SonicWall Firewall Authentication Bypass Vulnerability"}]},{"@type":"WebSite","@id":"https:\/\/dmctechgroup.com\/#website","url":"https:\/\/dmctechgroup.com\/","name":"DMC Technology Group","description":"","publisher":{"@id":"https:\/\/dmctechgroup.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dmctechgroup.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/dmctechgroup.com\/#organization","name":"DMC Technology Group","url":"https:\/\/dmctechgroup.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dmctechgroup.com\/#\/schema\/logo\/image\/","url":"https:\/\/dmctechgroup.com\/wp-content\/uploads\/2023\/12\/DMC-Logo-Alone.svg","contentUrl":"https:\/\/dmctechgroup.com\/wp-content\/uploads\/2023\/12\/DMC-Logo-Alone.svg","width":"1024","height":"1024","caption":"DMC Technology Group"},"image":{"@id":"https:\/\/dmctechgroup.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/dmctechgroup.com\/#\/schema\/person\/f5d7b1e6d283e44dba79ff52106a30c3","name":"dmctechgroustg","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dmctechgroup.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7fd48b5dd8b3a464faaf6b8474202525?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7fd48b5dd8b3a464faaf6b8474202525?s=96&d=mm&r=g","caption":"dmctechgroustg"},"sameAs":["https:\/\/dmctechgroup.com"],"url":"https:\/\/dmctechgroup.com\/author\/dmctechgroustg\/"}]}},"featured_image_src":"https:\/\/dmctechgroup.com\/wp-content\/uploads\/2025\/01\/Add-a-heading-19-2-600x400.png","featured_image_src_square":"https:\/\/dmctechgroup.com\/wp-content\/uploads\/2025\/01\/Add-a-heading-19-2-600x550.png","author_info":{"display_name":"dmctechgroustg","author_link":"https:\/\/dmctechgroup.com\/author\/dmctechgroustg\/"},"_links":{"self":[{"href":"https:\/\/dmctechgroup.com\/wp-json\/wp\/v2\/posts\/3346","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dmctechgroup.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dmctechgroup.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dmctechgroup.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dmctechgroup.com\/wp-json\/wp\/v2\/comments?post=3346"}],"version-history":[{"count":0,"href":"https:\/\/dmctechgroup.com\/wp-json\/wp\/v2\/posts\/3346\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dmctechgroup.com\/wp-json\/wp\/v2\/media\/3350"}],"wp:attachment":[{"href":"https:\/\/dmctechgroup.com\/wp-json\/wp\/v2\/media?parent=3346"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dmctechgroup.com\/wp-json\/wp\/v2\/categories?post=3346"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dmctechgroup.com\/wp-json\/wp\/v2\/tags?post=3346"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}