{"id":1270,"date":"2018-09-06T15:18:32","date_gmt":"2018-09-06T20:18:32","guid":{"rendered":"https:\/\/cert.pa\/?p=1270"},"modified":"2018-09-06T15:19:29","modified_gmt":"2018-09-06T20:19:29","slug":"csirt-panama-aviso-2018-09-06-actualizaciones-criticas-de-seguridad-para-productos-cisco","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=1270","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2018-09-06 Actualizaciones cr\u00edticas de seguridad para productos Cisco"},"content":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2018-09-06 Actualizaciones cr\u00edticas de seguridad para productos Cisco<\/p>\n<p>Gravedad: Alta<br \/>\nFecha de publicaci\u00f3n: 06 septiembre 2018<br \/>\nFecha de modificaci\u00f3n: 06 septiembre 2018<br \/>\n\u00daltima revisi\u00f3n: Revisi\u00f3n A.<br \/>\nFuente: Cisco Security Advisories and Alerts<\/p>\n<p>Sistemas Afectados<br \/>\n\u2022 Apache Struts.<br \/>\n\u2022 Cisco Umbrella API.<br \/>\n\u2022 Cisco routers RV110W, RV130W y RV215W.<\/p>\n<p>I. Descripci\u00f3n<br \/>\nLa empresa Cisco ha publicado y actualizado para el mes de septiembre de 2018 tres vulnerabilidades de impacto cr\u00edtico.<\/p>\n<p>a. cisco-sa-20180823-apache-struts. Vulnerabilidad en Apache Struts que puede permitir a un atacante remoto no autenticado ejecutar c\u00f3digo arbitrario. Referencia: CWE-20 y CVE-2018-11776.<br \/>\nb. cisco-sa-20180905-umbrella-api. Vulnerabilidad en la API de Cisco Umbrella podr\u00eda permitir a un atacante remoto no autenticado ver y modificar datos a trav\u00e9s de organizaciones. Referencia: CWE-287 y CVE-2018-0435.<br \/>\nc. cisco-sa-20180905-rv-routers-overflow. Vulnerabilidad en la interfaz administrativa de Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router y Cisco RV215W Wireless-N VPN Router que podr\u00eda permitir a un atacante remoto no autenticado causar denegaci\u00f3n de servicio o ejecutar c\u00f3digo arbitrario. Referencia: CWE-119 y CVE-2018-0423.<\/p>\n<p>Para mayor informaci\u00f3n, referirse a la &#8220;secci\u00f3n III. Referencia a soluciones, herramientas e informaci\u00f3n&#8221;.<\/p>\n<p>II. Impacto<br \/>\nComplejidad de Acceso: Alta.<br \/>\nAutenticaci\u00f3n: No requerida para explotarla.<br \/>\nTipo de impacto: Compromiso parcial o total del sistema.<\/p>\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br \/>\na. https:\/\/tools.cisco.com\/security\/center\/publicationListing.x?product=Cisco&amp;sort=-day_sir#~Vulnerabilities<br \/>\nb. https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180823-apache-struts<br \/>\nc. https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180905-umbrella-api<br \/>\nd. https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180905-rv-routers-overflow<\/p>\n<p>IV. Informaci\u00f3n de contacto<br \/>\nCSIRT PANAMA<br \/>\nAutoridad Nacional para la Innovaci\u00f3n Gubernamental<br \/>\nE-mail: info@cert.pa<br \/>\nWeb: http:\/\/www.cert.pa<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2018-09-06 Actualizaciones cr\u00edticas de seguridad para productos Cisco Gravedad: Alta Fecha de publicaci\u00f3n: 06 septiembre 2018 Fecha de modificaci\u00f3n: 06 septiembre 2018 \u00daltima revisi\u00f3n: Revisi\u00f3n A. Fuente: Cisco Security Advisories and Alerts&#8230;<\/p>\n","protected":false},"author":4,"featured_media":448,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-1270","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad"],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1270","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1270"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1270\/revisions"}],"predecessor-version":[{"id":1271,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1270\/revisions\/1271"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/448"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1270"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1270"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1270"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}