{"id":1019,"date":"2025-09-23T14:50:30","date_gmt":"2025-09-23T13:50:30","guid":{"rendered":"https:\/\/conscia.com\/ie\/?p=1019"},"modified":"2025-09-23T15:07:45","modified_gmt":"2025-09-23T14:07:45","slug":"new-0-day-vulnerabilities-in-microsoft-exchange-server-actively-exploited","status":"publish","type":"post","link":"https:\/\/conscia.com\/ie\/blog\/new-0-day-vulnerabilities-in-microsoft-exchange-server-actively-exploited\/","title":{"rendered":"New 0-day vulnerabilities in Microsoft Exchange Server actively exploited"},"content":{"rendered":"\n<p class=\" wp-block-paragraph\">Two reported 0-day vulnerabilities affecting Microsoft Exchange Server 2013, 2016, and 2019 (on-prem) tracked as CVE-2022-41040 and CVE-2022-41082 are being actively exploited in the wild. Conscia Threat Intelligence experts explain how critical these are and how to mitigate them.<\/p>\n\n\n\n<h2 class=\"wp-block-heading  wp-block-paragraph\">How to mitigate Microsoft Exchange Server 0-day vulnerabilities&nbsp;CVE-2022-41040 and CVE-2022-41082<\/h2>\n\n\n\n<p class=\" wp-block-paragraph\">On 29<sup>th<\/sup>&nbsp;September 2022, Microsoft published new Customer Guidance for&nbsp;<strong>two<\/strong>&nbsp;<strong>reported<\/strong>&nbsp;<strong>0-day vulnerabilities affecting Microsoft Exchange Server 2013, 2016, and 2019 (only on-premises deployments)<\/strong>. Tracked as CVE-2022-41040 Server-Side Request Forgery (SSRF) and CVE-2022-41082 Remote Code Execution (RCE), both vulnerabilities are being actively exploited in the wild. Microsoft confirmed that SSRF can only be&nbsp;<strong>exploited by authenticated attackers<\/strong>&nbsp;\u2013 only then is it possible to exploit the RCE vulnerability.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">Upon publishing this article, we already found one public report of a successful cyber-attack based on these vulnerabilities by the Chinese Threat Actor group that deployed&nbsp;<strong>Chinese Chopper web shells for persistence and data theft and to move laterally through victims\u2019 networks<\/strong>.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">Vulnerabilities only affect on-premises deployments, while Microsoft Exchange Online customers do not need to take any action.<\/p>\n\n\n\n<h2 class=\"wp-block-heading  wp-block-paragraph\">Who is affected, and how do they work<\/h2>\n\n\n\n<p class=\" wp-block-paragraph\">Two 0-day vulnerabilities are tracked as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>CVE-2022-41040&nbsp;<\/strong>(Server-Side Request Forgery)<\/li>\n\n\n\n<li><strong>CVE-2022-41082<\/strong>&nbsp;(Remote Code Execution)<\/li>\n<\/ul>\n\n\n\n<p class=\" wp-block-paragraph\"><strong>The SSRF can only be exploited by authenticated attackers and is a prerequisite for successful exploitation of RCE vulnerability<\/strong>. The SSRF vulnerability is exploited similarly to those used in attacks targeting the ProxyShell vulnerabilities.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">The exploit works in two stages:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Requests with a similar format to the ProxyShell vulnerability: autodiscover\/autodiscover.json?@evil.com\/&lt;Exchange-backend-endpoint&gt;&amp;Email=autodiscover\/autodiscover.json%3f@evil.com.<\/li>\n\n\n\n<li>The use of the link above to access a component in the backend where the RCE could be implemented.<\/li>\n<\/ul>\n\n\n\n<p class=\" wp-block-paragraph\">The vulnerabilities affect&nbsp;<strong>on-premises deployments of Microsoft Exchange Server 2013, 2016, and 2019<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading  wp-block-paragraph\">Conscia Cyberdefense Guidelines<\/h2>\n\n\n\n<p class=\" wp-block-paragraph\">We currently recommend our customers to follow the mitigations suggested by Microsoft in their&nbsp;<a href=\"https:\/\/msrc-blog.microsoft.com\/2022\/09\/29\/customer-guidance-for-reported-zero-day-vulnerabilities-in-microsoft-exchange-server\/\" target=\"_blank\" rel=\"noreferrer noopener\">Customer guidance report<\/a>.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\"><strong>Microsoft Exchange Online Customers do not need to take any action. On-premises<\/strong>&nbsp;Microsoft Exchange customers should review and apply the following URL Rewrite Instructions and block exposed Remote PowerShell ports.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\"><strong>The current mitigation is to add a blocking rule in \u201cIIS Manager -&gt; Default Web Site -&gt; Autodiscover -&gt; URL Rewrite -&gt; Actions\u201d to block the known attack patterns.&nbsp;<\/strong><\/p>\n\n\n\n<p class=\" wp-block-paragraph\">Microsoft has confirmed that the following URL Rewrite Instructions, which are currently being discussed publicly, successfully break current attack chains.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Open the IIS Manager.<\/li>\n\n\n\n<li>Expand the Default Web Site.<\/li>\n\n\n\n<li>Select Autodiscover.<\/li>\n\n\n\n<li>In the Feature View, click URL Rewrite.<\/li>\n\n\n\n<li>In the Actions pane on the right-hand side, click Add Rules.<\/li>\n\n\n\n<li>Select \u2018Request Blocking\u2019 and click \u2018OK.\u2019<\/li>\n\n\n\n<li>Add String \u201c<strong>(?=.*autodiscover)(?=.*powershell)<\/strong>\u201d (excluding quotes) and click \u2018OK\u2019. *<\/li>\n\n\n\n<li>Expand the rule and select the rule with the Pattern \u201c<strong>(?=.*autodiscover)(?=.*powershell)<\/strong>\u201d and click \u2018Edit\u2019 under \u2018Conditions.\u2019<\/li>\n\n\n\n<li>Change the condition input from {URL} to {REQUEST_URL}<\/li>\n<\/ol>\n\n\n\n<p class=\" wp-block-paragraph\"><strong>*[04.10.2022]<\/strong>&nbsp;<strong>UPDATE<\/strong>: According to further analysis, the \u2018@\u2019 sign in the 7th step proved to be too specific for the known attacks. Removing it should make the rule more prone to other attacks. However, we at Conscia have not been able to test it yet whether it would have any implications on normal operations.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\"><strong>*[05.10.2022] UPDATE<\/strong>: Removed the \u2018@\u2019 sign in the 7th step.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\"><strong>*[09.10.2022] UPDATE:<\/strong>&nbsp;Updated the strings inside the rule, based on Microsoft\u2019s update.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\"><strong>NOTE:<\/strong>&nbsp;For complete up to date guidelines refer to Microsoft\u2019s official Customer Guidance report as they might be updating the article throughout the time. Refer to the URL provided above.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">There is no known impact on Exchange functionality if the URL Rewrite module is installed as recommended.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">Authenticated attackers who can access PowerShell Remoting on vulnerable Exchange systems will be able to trigger RCE using CVE-2022-41082. Blocking the ports used for Remote PowerShell can limit these attacks.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>HTTP: 5985<\/li>\n\n\n\n<li>HTTPS: 5986<\/li>\n<\/ul>\n\n\n\n<p class=\" wp-block-paragraph\">Microsoft also provided recently two other options on how to apply these mitigations:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Using Exchange Emergency Mitigation Service<\/li>\n\n\n\n<li>Using provided PowerShell Script<\/li>\n<\/ol>\n\n\n\n<p class=\" wp-block-paragraph\">Please refer to their&nbsp;<a href=\"https:\/\/msrc-blog.microsoft.com\/2022\/09\/29\/customer-guidance-for-reported-zero-day-vulnerabilities-in-microsoft-exchange-server\/\">guidance page<\/a>&nbsp;to learn more about these methods.<\/p>\n\n\n\n<h2 class=\"wp-block-heading  wp-block-paragraph\">Patch Available<\/h2>\n\n\n\n<p class=\" wp-block-paragraph\">On November 8th 2022, during their regular Patch Tuseday,&nbsp;<strong>Microsoft released the security patch that fixes the zero-days<\/strong>. We advise anyone vulnerable to the mentioned CVEs to immediately patch their servers as we still continue to see ProxyNotShell exploitations in the wild. The attacks spiked after the public release of Proof-of-Concept exploit code and still linger.<\/p>\n\n\n\n<div class=\"wp-block-group  background-graphics--none has-green-palest-background-color has-background is-layout-constrained wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading  wp-block-paragraph\">Need assistance?<\/h2>\n\n\n\n<p class=\" wp-block-paragraph\">If you have further questions or need assistance with your risk assessment, security strategy, or deployment of countermeasures,&nbsp;<a href=\"https:\/\/conscia.com\/contact\/\">please contact your closest Conscia office<\/a>, and our experts will be glad to answer your questions.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Two reported 0-day vulnerabilities affecting Microsoft Exchange Server 2013, 2016, and 2019 (on-prem) tracked as CVE-2022-41040 and CVE-2022-41082 are being actively exploited in the wild. Conscia Threat Intelligence experts explain how critical these are and how to mitigate them. How to mitigate Microsoft Exchange Server 0-day vulnerabilities&nbsp;CVE-2022-41040 and CVE-2022-41082 On 29th&nbsp;September 2022, Microsoft published new [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"global_solutions":[9,22],"global_partners":[],"global_industries":[25],"global_business_outcome":[43],"global_types":[],"class_list":["post-1019","post","type-post","status-publish","format-standard","hentry","category-uncategorized","global_solutions-cybersecurity","global_solutions-threat-intelligence","global_industries-all-industries","global_business_outcome-security-operations"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.4 (Yoast SEO v26.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>New 0-day vulnerabilities in Microsoft Exchange Server actively exploited - Conscia Ireland<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conscia.com\/blog\/new-0-day-vulnerabilities-in-microsoft-exchange-server-actively-exploited\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New 0-day vulnerabilities in Microsoft Exchange Server actively exploited\" \/>\n<meta property=\"og:description\" content=\"Two reported 0-day vulnerabilities affecting Microsoft Exchange Server 2013, 2016, and 2019 (on-prem) tracked as CVE-2022-41040 and CVE-2022-41082 are being actively exploited in the wild. Conscia Threat Intelligence experts explain how critical these are and how to mitigate them. How to mitigate Microsoft Exchange Server 0-day vulnerabilities&nbsp;CVE-2022-41040 and CVE-2022-41082 On 29th&nbsp;September 2022, Microsoft published new [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conscia.com\/blog\/new-0-day-vulnerabilities-in-microsoft-exchange-server-actively-exploited\/\" \/>\n<meta property=\"og:site_name\" content=\"Conscia Ireland\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-23T13:50:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-23T14:07:45+00:00\" \/>\n<meta name=\"author\" content=\"Mikkel Elvej\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mikkel Elvej\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/conscia.com\/blog\/new-0-day-vulnerabilities-in-microsoft-exchange-server-actively-exploited\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/conscia.com\/ie\/blog\/new-0-day-vulnerabilities-in-microsoft-exchange-server-actively-exploited\/\"},\"author\":{\"name\":\"Mikkel Elvej\",\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/person\/e65cdf0ee22f4931e48d2ae6c7943a5e\"},\"headline\":\"New 0-day vulnerabilities in Microsoft Exchange Server actively exploited\",\"datePublished\":\"2025-09-23T13:50:30+00:00\",\"dateModified\":\"2025-09-23T14:07:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/conscia.com\/ie\/blog\/new-0-day-vulnerabilities-in-microsoft-exchange-server-actively-exploited\/\"},\"wordCount\":777,\"publisher\":{\"@id\":\"https:\/\/conscia.com\/ie\/#organization\"},\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conscia.com\/ie\/blog\/new-0-day-vulnerabilities-in-microsoft-exchange-server-actively-exploited\/\",\"url\":\"https:\/\/conscia.com\/blog\/new-0-day-vulnerabilities-in-microsoft-exchange-server-actively-exploited\/\",\"name\":\"New 0-day vulnerabilities in Microsoft Exchange Server actively exploited - Conscia Ireland\",\"isPartOf\":{\"@id\":\"https:\/\/conscia.com\/ie\/#website\"},\"datePublished\":\"2025-09-23T13:50:30+00:00\",\"dateModified\":\"2025-09-23T14:07:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conscia.com\/blog\/new-0-day-vulnerabilities-in-microsoft-exchange-server-actively-exploited\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conscia.com\/blog\/new-0-day-vulnerabilities-in-microsoft-exchange-server-actively-exploited\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conscia.com\/blog\/new-0-day-vulnerabilities-in-microsoft-exchange-server-actively-exploited\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conscia.com\/ie\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New 0-day vulnerabilities in Microsoft Exchange Server actively exploited\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conscia.com\/ie\/#website\",\"url\":\"https:\/\/conscia.com\/ie\/\",\"name\":\"Conscia Ireland\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/conscia.com\/ie\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conscia.com\/ie\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/conscia.com\/ie\/#organization\",\"name\":\"Conscia Ireland\",\"url\":\"https:\/\/conscia.com\/ie\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png\",\"contentUrl\":\"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png\",\"width\":994,\"height\":241,\"caption\":\"Conscia Ireland\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/conscia-ireland\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/person\/e65cdf0ee22f4931e48d2ae6c7943a5e\",\"name\":\"Mikkel Elvej\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conscia.com\/ie\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g\",\"caption\":\"Mikkel Elvej\"},\"url\":\"https:\/\/conscia.com\/ie\/blog\/author\/mhe\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"New 0-day vulnerabilities in Microsoft Exchange Server actively exploited - Conscia Ireland","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conscia.com\/blog\/new-0-day-vulnerabilities-in-microsoft-exchange-server-actively-exploited\/","og_locale":"en_US","og_type":"article","og_title":"New 0-day vulnerabilities in Microsoft Exchange Server actively exploited","og_description":"Two reported 0-day vulnerabilities affecting Microsoft Exchange Server 2013, 2016, and 2019 (on-prem) tracked as CVE-2022-41040 and CVE-2022-41082 are being actively exploited in the wild. Conscia Threat Intelligence experts explain how critical these are and how to mitigate them. How to mitigate Microsoft Exchange Server 0-day vulnerabilities&nbsp;CVE-2022-41040 and CVE-2022-41082 On 29th&nbsp;September 2022, Microsoft published new [&hellip;]","og_url":"https:\/\/conscia.com\/blog\/new-0-day-vulnerabilities-in-microsoft-exchange-server-actively-exploited\/","og_site_name":"Conscia Ireland","article_published_time":"2025-09-23T13:50:30+00:00","article_modified_time":"2025-09-23T14:07:45+00:00","author":"Mikkel Elvej","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mikkel Elvej","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/conscia.com\/blog\/new-0-day-vulnerabilities-in-microsoft-exchange-server-actively-exploited\/#article","isPartOf":{"@id":"https:\/\/conscia.com\/ie\/blog\/new-0-day-vulnerabilities-in-microsoft-exchange-server-actively-exploited\/"},"author":{"name":"Mikkel Elvej","@id":"https:\/\/conscia.com\/ie\/#\/schema\/person\/e65cdf0ee22f4931e48d2ae6c7943a5e"},"headline":"New 0-day vulnerabilities in Microsoft Exchange Server actively exploited","datePublished":"2025-09-23T13:50:30+00:00","dateModified":"2025-09-23T14:07:45+00:00","mainEntityOfPage":{"@id":"https:\/\/conscia.com\/ie\/blog\/new-0-day-vulnerabilities-in-microsoft-exchange-server-actively-exploited\/"},"wordCount":777,"publisher":{"@id":"https:\/\/conscia.com\/ie\/#organization"},"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/conscia.com\/ie\/blog\/new-0-day-vulnerabilities-in-microsoft-exchange-server-actively-exploited\/","url":"https:\/\/conscia.com\/blog\/new-0-day-vulnerabilities-in-microsoft-exchange-server-actively-exploited\/","name":"New 0-day vulnerabilities in Microsoft Exchange Server actively exploited - Conscia Ireland","isPartOf":{"@id":"https:\/\/conscia.com\/ie\/#website"},"datePublished":"2025-09-23T13:50:30+00:00","dateModified":"2025-09-23T14:07:45+00:00","breadcrumb":{"@id":"https:\/\/conscia.com\/blog\/new-0-day-vulnerabilities-in-microsoft-exchange-server-actively-exploited\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conscia.com\/blog\/new-0-day-vulnerabilities-in-microsoft-exchange-server-actively-exploited\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/conscia.com\/blog\/new-0-day-vulnerabilities-in-microsoft-exchange-server-actively-exploited\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conscia.com\/ie\/"},{"@type":"ListItem","position":2,"name":"New 0-day vulnerabilities in Microsoft Exchange Server actively exploited"}]},{"@type":"WebSite","@id":"https:\/\/conscia.com\/ie\/#website","url":"https:\/\/conscia.com\/ie\/","name":"Conscia Ireland","description":"","publisher":{"@id":"https:\/\/conscia.com\/ie\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conscia.com\/ie\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/conscia.com\/ie\/#organization","name":"Conscia Ireland","url":"https:\/\/conscia.com\/ie\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/","url":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png","contentUrl":"https:\/\/conscia.com\/ie\/wp-content\/uploads\/2025\/08\/conscia_logo_tagline_black.png","width":994,"height":241,"caption":"Conscia Ireland"},"image":{"@id":"https:\/\/conscia.com\/ie\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/conscia-ireland\/"]},{"@type":"Person","@id":"https:\/\/conscia.com\/ie\/#\/schema\/person\/e65cdf0ee22f4931e48d2ae6c7943a5e","name":"Mikkel Elvej","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conscia.com\/ie\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g","caption":"Mikkel Elvej"},"url":"https:\/\/conscia.com\/ie\/blog\/author\/mhe\/"}]}},"_links":{"self":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/posts\/1019","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/comments?post=1019"}],"version-history":[{"count":4,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/posts\/1019\/revisions"}],"predecessor-version":[{"id":1031,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/posts\/1019\/revisions\/1031"}],"wp:attachment":[{"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/media?parent=1019"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/categories?post=1019"},{"taxonomy":"global_solutions","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_solutions?post=1019"},{"taxonomy":"global_partners","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_partners?post=1019"},{"taxonomy":"global_industries","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_industries?post=1019"},{"taxonomy":"global_business_outcome","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_business_outcome?post=1019"},{"taxonomy":"global_types","embeddable":true,"href":"https:\/\/conscia.com\/ie\/wp-json\/wp\/v2\/global_types?post=1019"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}