{"id":1197,"date":"2019-02-26T13:59:33","date_gmt":"2019-02-26T13:59:33","guid":{"rendered":"http:\/\/blogs.uo.edu.cu\/seginf\/?p=1197"},"modified":"2019-02-26T13:59:33","modified_gmt":"2019-02-26T13:59:33","slug":"actualizaciones-para-multiples-dispositivos-cisco","status":"publish","type":"post","link":"https:\/\/blogs.uo.edu.cu\/seginf\/?p=1197","title":{"rendered":"Actualizaciones para m\u00faltiples dispositivos Cisco."},"content":{"rendered":"<p class=\"rtejustify\" style=\"text-align: justify\">\n\t<img loading=\"lazy\" decoding=\"async\" alt=\"\" class=\"alignleft size-full wp-image-1198\" height=\"200\" src=\"http:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2019\/02\/cisco200X200.jpg\" width=\"200\" srcset=\"https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2019\/02\/cisco200X200.jpg 200w, https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2019\/02\/cisco200X200-150x150.jpg 150w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/> La empresa productora de equipamiento CISCO es lider en la producci&oacute;n de equipamientos para la transmisi&oacute;n de datos en las redes inform&aacute;ticas tambi&eacute;n ha mostrado que sus producciones poseen vulnerabilidades que ponen en peligro la seguridad de la informaci&oacute;n. La nota que se anexa expone las cuestiones m&aacute;s relevantes sobre lo publicado por este coloso de las infocomunicaciones.\n<\/p>\n<p><!--more--><\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\tCisco ha publicado 20 boletines de seguridad para solucionar otras tantas vulnerabilidades (una cr&iacute;tica, 8 de gravedad alta y 11 de gravedad media) en m&uacute;ltiples productos que podr&iacute;an permitir a atacantes provocar condiciones de denegaci&oacute;n de servicio, de cross-site scripting, ejecutar c&oacute;digo arbitrario o acceder al dispositivo sin autorizaci&oacute;n.\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\tLos productos afectados son:\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco ACI Virtual Edge\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Aironet 1560, 1815, 2800, 3800 Series\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco AMP Virtual Private Cloud Appliance\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Application Policy Infrastructure Controller\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Cloud Services Platform 2100\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco CloudCenter\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Common Services Platform Collector\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Container Platform\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Defense Orchestrator\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco DNA Center\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Elastic Service Controller\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Elastic Services\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Emergency Responder\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Enterprise NFV Infrastructure Software (NFVIS)\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Enterprise Service Automation\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Evolved Programmable Network Manager\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Expressway Series\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Finesse\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Firepower 9000 Series\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Firepower eXtensible Operating System\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Firepower Management Center\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Firepower Threat Defense\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco FireSIGHT System Software\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco HyperFlex\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Identity Services Engine\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco IOS XE Software\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco IoT Field Network Director\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco IOx Fog Director\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco IP Phone 7800, 7832, 8800 Series\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco MDS 9000 Series Multilayer Switches\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco MediaSense\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Meeting Management\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Meeting Server\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Mobility Services Engine\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Network Analysis Module\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Network Assurance Engine\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Network Assurance Engine\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Network Convergence System 1000 Series\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Nexus 3000, 7000, 9000 Series\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Paging Server\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Policy Suite\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Prime Collaboration\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Prime Collaboration Assurance\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Prime Infrastructure\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Prime Infrastructure\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Prime Network Registrar Virtual Appliance\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Prime Service Catalog Virtual Appliance\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Secure Access Control System (ACS)\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco SocialMiner\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco SPA112, SPA525, y SPA5x5 Series\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco TelePresence\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Tetration Analytics\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Threat Grid Appliance\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco UCS B-Series M5 Blade Servers\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco UCS Standalone C-Series M5 Rack Server\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Umbrella Virtual Appliance\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Unified Communications\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Unified Contact Center\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Unified Intelligence Center\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Unity Connection\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Unity Connection\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco vEdge 100, 1000, 2000, 5000 Series\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco vEdge Cloud Router Platform\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Video Surveillance 8000 Series IP Cameras\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Virtual Topology System\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Virtualized Voice Browser\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Webex Hybrid Data Security Node\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Webex Meetings Server\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Webex Room Kit\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Webex Video Mesh Node\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cisco Wireless LAN Controller (WLC 5520, WLC 8540, WLC 3504, Virtual Wireless Controller)\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\tLa vulnerabilidad considerada cr&iacute;tica, con&nbsp;<strong>CVE-2018-0121<\/strong>, afecta al portal web de Cisco Elastic Services y permitir&iacute;a a un atacante remoto sin autenticar&nbsp;<strong>acceder al sistema como administrador<\/strong>. Las ocho vulnerabilidades de gravedad alta permitir&iacute;an escalar privilegios en dispositivos Cisco ASA, Cisco Nexus, Cisco IOS XE, Cisco IOS XR entre otros (<strong>CVE-2019-5736<\/strong>); realizar ataques man-in-the-middle contra el t&uacute;nel SSL establecido entre los servicios Cisco Service Identity Engine y Cisco Prime (<strong>CVE-2019-1659<\/strong>); acceder a partes no autorizadas del software Cisco Prime Collaboration Assurance (PCA) utilizando alg&uacute;n nombre de usuario v&aacute;lido (<strong>CVE-2019-1662<\/strong>); recuperar ficheros del servidor TFTP utilizado en Cisco Network Convergence System 1000 (<strong>CVE-2019-1681<\/strong>); permitir a un usuario adyacente sin autenticar ejecutar comandos como administrador (<strong>CVE-2018-15380<\/strong>) o a un usuario local elevar privilegios a administrador en Cisco HyperFlex (<strong>CVE-2019-1664<\/strong>).\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\tOtra de las vulnerabilidades de gravedad alta afecta al kernel Linux&nbsp;de algunos dispositivos&nbsp;(<strong>CVE-2018-5391<\/strong>) y permitir&iacute;a a un atacante remoto sin autenticar provocar una denegaci&oacute;n de servicio enviando paquetes IPv4 o IPv6 especialmente manipulados.\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\tLa &uacute;ltima de las vulnerabilidades de gravedad alta reside en el componente encargado de la autenticaci&oacute;n de Cisco Network Assurance Engine (NAE) y permitir&iacute;a a un atacante local provocar una denegaci&oacute;n de servicio en el servidor&nbsp;<strong>(CVE-2019-1688)<\/strong>.\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\tVulnerabilidades consideradas de importancia media podr&iacute;an ser aprovechadas para inyectar contenido en Cisco Webex (<strong>CVE-2019-1680<\/strong>) o subir ficheros arbitrarios en su versi&oacute;n para IOS (<strong>CVE-2019-1689<\/strong>). Espiar el tr&aacute;fico TLS en Cisco SPA112, SPA525 y SPA5x5 (<strong>CVE-2019-1683<\/strong>); un XEE en Cisco IoT Field Network Director (<strong>CVE-2019-1698<\/strong>); denegaciones de servicio en Cisco Firepower y Cisco IP Phone (<strong>CVE-2019-1691, CVE-2019-1700, CVE-2019-1684<\/strong>); un XSS en Cisco HyperFlex y Cisco Unity (<strong>CVE-2019-1665, CVE-2019-1685<\/strong>) o accesos de lectura y escritura no autorizados a las estad&iacute;sticas de Cisco HyperFlex (<strong>CVE-2019-1667, CVE-2019-1666<\/strong>).\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\tCisco ha publicado actualizaciones para las vulnerabilidades consideradas de gravedad cr&iacute;tica y alta. Se recomienda consultar las alertas publicadas para obtener informaci&oacute;n sobre disponibilidad de parches y actualizaciones.\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\t<strong>M&aacute;s informaci&oacute;n:<\/strong>\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\tContainer Privilege Escalation Vulnerability Affecting Cisco Products<br \/>\n\t<a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20190215-runc\" rel=\" noopener noreferrer\" target=\"_blank\">https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/ci&#8230;<\/a>\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\tCisco Prime Infrastructure Certificate Validation Vulnerability<br \/>\n\t<a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20190220-prime-validation\" rel=\" noopener noreferrer\" target=\"_blank\">https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/ci&#8230;<\/a>\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\tCisco Prime Collaboration Assurance Software Unauthenticated Access Vulnerability<br \/>\n\t<a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20190220-pca-access\" rel=\" noopener noreferrer\" target=\"_blank\">https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/ci&#8230;<\/a>\n<\/p>\n<p class=\"rtejustify\" style=\"text-align: justify\">\n\tFuente: <a href=\"http:\/\/www.segurm\u00e1tica.cu\" rel=\" noopener noreferrer\" target=\"_blank\">Segurm&aacute;tica<\/a>.\n<\/p>\n<p>\n\t&nbsp;<\/p>\n<h3>Im\u00e1genes Relacionadas:<\/h3>","protected":false},"excerpt":{"rendered":"<p>La empresa productora de equipamiento CISCO es lider en la producci&oacute;n de equipamientos para la transmisi&oacute;n de datos en las redes inform&aacute;ticas tambi&eacute;n ha mostrado que sus producciones poseen vulnerabilidades que ponen en peligro la seguridad de la informaci&oacute;n. La &hellip; <a href=\"https:\/\/blogs.uo.edu.cu\/seginf\/?p=1197\">Sigue leyendo <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[15,40],"tags":[],"class_list":["post-1197","post","type-post","status-publish","format-standard","hentry","category-informaciones","category-vulnerabilidades"],"_links":{"self":[{"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/posts\/1197","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1197"}],"version-history":[{"count":1,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/posts\/1197\/revisions"}],"predecessor-version":[{"id":1200,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/posts\/1197\/revisions\/1200"}],"wp:attachment":[{"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1197"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1197"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}