{"id":1255,"date":"2018-08-01T15:02:38","date_gmt":"2018-08-01T20:02:38","guid":{"rendered":"https:\/\/cert.pa\/?p=1255"},"modified":"2018-08-01T15:02:38","modified_gmt":"2018-08-01T20:02:38","slug":"csirt-panama-aviso-2018-08-01-cisco-libera-actualizacion-de-seguridad","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=1255","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2018-08-01 CISCO libera actualizaci\u00f3n de seguridad."},"content":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2018-08-01 CISCO libera actualizaci\u00f3n de seguridad.<br \/>\nGravedad: Alta<br \/>\nFecha de publicaci\u00f3n: Agosto 01, 2018<br \/>\nFecha de modificaci\u00f3n: Agosto 01, 2018<br \/>\n\u00daltima revisi\u00f3n: 1.0<br \/>\nhttps:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180801-pcp-dos<\/p>\n<p>Sistemas Afectados:<br \/>\nEsta vulnerabilidad afecta a las versiones 12.2 y anteriores de Cisco Prime Collaboration Provisioning (PCP).<\/p>\n<p>I. Descripci\u00f3n:<\/p>\n<p>Se report\u00f3 una vulnerabilidad en la funci\u00f3n de cambio de contrase\u00f1a de Cisco Prime Collaboration Provisioning. Que podr\u00eda permitir que un atacante remoto autenticado haga que el sistema deje de funcionar.<br \/>\nLa vulnerabilidad se debe a la validaci\u00f3n insuficiente de una solicitud de cambio de contrase\u00f1a. Un atacante podr\u00eda aprovechar esta vulnerabilidad cambiando una contrase\u00f1a de cuenta de administrador espec\u00edfica.<\/p>\n<p>II. Impacto<\/p>\n<p>Un exploit exitoso podr\u00eda permitir que el atacante cause que el dispositivo afectado se vuelva inoperable, dando como resultado una condici\u00f3n de denegaci\u00f3n de servicio (DoS).<\/p>\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<\/p>\n<p>Cisco ha lanzado actualizaciones de software que abordan esta vulnerabilidad. No hay soluciones alternativas que solucionen esta vulnerabilidad.<br \/>\nPara mayor informaci\u00f3n: https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180801-pcp-dos<\/p>\n<p>IV. Informaci\u00f3n de contacto<\/p>\n<p>CSIRT PANAMA<br \/>\nComputer Security Incident Response Team Autoridad Nacional para la<br \/>\nInnovacion Gubernamental<br \/>\nE-Mail: info@cert.pa<br \/>\nPhone: +507 520-CERT (2378)<br \/>\nWeb: https:\/\/cert.pa<br \/>\nTwitter: @CSIRTPanama<br \/>\nFacebook: http:\/\/www.facebook.com\/CSIRTPanama<br \/>\nKey ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2018-08-01 CISCO libera actualizaci\u00f3n de seguridad. Gravedad: Alta Fecha de publicaci\u00f3n: Agosto 01, 2018 Fecha de modificaci\u00f3n: Agosto 01, 2018 \u00daltima revisi\u00f3n: 1.0 https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180801-pcp-dos Sistemas Afectados: Esta vulnerabilidad afecta a las versiones&#8230;<\/p>\n","protected":false},"author":3,"featured_media":448,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[13,72,38],"class_list":["post-1255","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-aviso","tag-avisos-de-seguridad","tag-cisco"],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1255","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1255"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1255\/revisions"}],"predecessor-version":[{"id":1256,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1255\/revisions\/1256"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/448"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1255"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1255"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1255"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}