{"id":1162,"date":"2018-02-23T08:31:41","date_gmt":"2018-02-23T13:31:41","guid":{"rendered":"https:\/\/cert.pa\/?p=1162"},"modified":"2018-02-23T08:53:11","modified_gmt":"2018-02-23T13:53:11","slug":"cisco-ha-lanzado-varias-actualizaciones","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=1162","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2018-02-23 CISCO libera actualizaciones"},"content":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2018-02-23 CISCO libera actualizaciones<br \/>\nGravedad: Alta<br \/>\nFecha de publicaci\u00f3n: Febrero 23, 2018<br \/>\nFecha de modificaci\u00f3n: Febrero 22, 2018<br \/>\n\u00daltima revisi\u00f3n: Revisi\u00f3n Browsers.<br \/>\nhttps:\/\/www.us-cert.gov\/ncas\/current-activity\/2018\/02\/21\/Cisco-Releases-Security-Updates-Multiple-Products (sitio de USCERT)<br \/>\nSistemas Afectados:<br \/>\nEquipos CISCO (ver Impacto para detalles)<\/p>\n<p>I. Descripci\u00f3n<br \/>\nisco ha lanzado varias actualizaciones para abordar vulnerabilidades que afectan a m\u00faltiples productos. Un atacante remoto podr\u00eda explotar algunas de estas vulnerabilidades para tomar el control de un sistema afectado.<\/p>\n<p>Se alienta a los usuarios y administradores a revisar los siguientes avisos de seguridad de Cisco y aplicar las actualizaciones necesarias:<\/p>\n<p>II. Impacto<br \/>\nVulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el dominio de dominio de comunicaciones unificadas cisco-sa-20180221-ucdm (https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180221-ucdm)<br \/>\nVulnerabilidad de omisi\u00f3n de autenticaci\u00f3n del portal de servicio del controlador de servicios Elastic cisco-sa-20180221-esc (https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180221-esc)<br \/>\nVulnerabilidad de acceso no autorizado del portal de servicio del controlador de servicios el\u00e1sticos cisco-sa-20180221-esc1 (https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180221-esc1)<br \/>\nPortal de Voz Unificada Voz Interactiva Respuesta de Voz Vulnerabilidad de Denegaci\u00f3n de Servicio cisco-sa-20180221-cvp (https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180221-cvp)<\/p>\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<\/p>\n<p>Se recomienda actualizar los equipos.<\/p>\n<p>IV. Informaci\u00f3n de contacto<br \/>\nCSIRT PANAMA<br \/>\nComputer Security Incident Response Team Autoridad Nacional para la<br \/>\nInnovacion Gubernamental<br \/>\nE-Mail: info@cert.pa<br \/>\nPhone: +507 520-CERT (2378)<br \/>\nWeb: https:\/\/cert.pa<br \/>\nTwitter: @CSIRTPanama<br \/>\nFacebook: http:\/\/www.facebook.com\/CSIRTPanama<br \/>\nKey ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2018-02-23 CISCO libera actualizaciones Gravedad: Alta Fecha de publicaci\u00f3n: Febrero 23, 2018 Fecha de modificaci\u00f3n: Febrero 22, 2018 \u00daltima revisi\u00f3n: Revisi\u00f3n Browsers. https:\/\/www.us-cert.gov\/ncas\/current-activity\/2018\/02\/21\/Cisco-Releases-Security-Updates-Multiple-Products (sitio de USCERT) Sistemas Afectados: Equipos CISCO (ver Impacto&#8230;<\/p>\n","protected":false},"author":5,"featured_media":448,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,8,72,74,49,38,80,68],"class_list":["post-1162","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-avisos","tag-avisos-de-seguridad","tag-boletines","tag-ciberseguridad","tag-cisco","tag-vulnerabilidad","tag-vulnerabilidades"],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1162","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1162"}],"version-history":[{"count":2,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1162\/revisions"}],"predecessor-version":[{"id":1164,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1162\/revisions\/1164"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/448"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1162"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1162"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}