{"id":2515,"date":"2021-01-20T12:26:27","date_gmt":"2021-01-20T17:26:27","guid":{"rendered":"https:\/\/cert.pa\/?p=2515"},"modified":"2023-01-24T09:54:28","modified_gmt":"2023-01-24T14:54:28","slug":"csirt-panama-aviso-2020-01-18-cisco-libera-multiples-actualizaciones-de-seguridad","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=2515","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2020-01-18 Cisco libera m\u00faltiples actualizaciones de seguridad"},"content":{"rendered":"\n<p>Gravedad: Altas<br>\nFecha de publicaci\u00f3n: 18 de enero de 2021<br>\nFecha de modificaci\u00f3n: 18 de enero de 2021<br>\n\u00daltima revisi\u00f3n: Revisi\u00f3n A.<br>\nFuente: Cisco Security Advisories and Alerts<\/p>\n\n\n\n<p>Sistemas Afectados <br>\n\u2022    AnyConnect Secure Mobility Client para Windows<br>\n\u2022    Connected Mobile Experiences (CMX)<br>\n\u2022    Administraci\u00f3n de routers RV110W, RV130, RV130W y RV215W<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>\nLa empresa Cisco ha publicado m\u00faltiples actualizaciones de seguridad que aborda vulnerabilidades de las que podemos mencionar:<br>\n\u2022    AnyConnect Secure Mobility Client para Windows, vulnerabilidad en los componentes de Network Access Manager y Web Security Agent. Que podr\u00edan permitir a un atacante local autenticado realizar un atauqe de injecci\u00f3n de DLL.<br>\n\u2022    Connected Mobile Experiences (CMX), podr\u00eda permitir que un atacante autenticado y remoto sin privilegios administrativos altere la constrase\u00f1a de cualquier usuario en un sistema afetado.<br>\n\u2022     Administraci\u00f3n de routers RV110W, RV130, RV130W y RV215W. vulnerabilidad en la interface web, podr\u00edan permitir que un atacante remoto autenticado inyecte comandos arbitrarios que se ejecutan con privilegios de root.<br>\n\u2022    Administraci\u00f3n de routers RV110W, RV130, RV130W y RV215W. vulnerabilidad en la interface web, podr\u00edan permitir que un atacante remoto autenticado ejecute c\u00f3digo arbitrario o que un dispositivo afectado se reinicie inesperadamente. <\/p>\n\n\n\n<p>Se les exhorta a revisar los enlaces en la secci\u00f3n III de referencias, para aplicar las acciones necesarias.<\/p>\n\n\n\n<p>II. Impacto<br>\nComplejidad de Acceso: Media a Alta<br>\nAutenticaci\u00f3n: No requerida para explotarla.<br>\nTipo de impacto: Compromiso parcial o total del sistema.<\/p>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br> a.    <a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-anyconnect-dll-injec-pQnryXLf\">https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-anyconnect-dll-injec-pQnryXLf<\/a><br> b.    <a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-cmxpe-75Asy9k\">https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-cmxpe-75Asy9k<\/a><br> c.    <a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-rv-command-inject-LBdQ2KRN\">https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-rv-command-inject-LBdQ2KRN<\/a><br> d.    <a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-rv-overflow-WUnUgv4U\">https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-rv-overflow-WUnUgv4U<\/a><\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>\nCSIRT PANAMA<br>\nAutoridad Nacional para la Innovaci\u00f3n Gubernamental<br>\nE-Mail: info@cert.pa<br>\nWeb:   http:\/\/www.cert.pa<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Gravedad: Altas Fecha de publicaci\u00f3n: 18 de enero de 2021 Fecha de modificaci\u00f3n: 18 de enero de 2021 \u00daltima revisi\u00f3n: Revisi\u00f3n A. Fuente: Cisco Security Advisories and Alerts Sistemas Afectados \u2022 AnyConnect Secure Mobility Client&#8230;<\/p>\n","protected":false},"author":4,"featured_media":448,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-2515","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2515","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2515"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2515\/revisions"}],"predecessor-version":[{"id":2516,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2515\/revisions\/2516"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/448"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2515"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2515"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}