{"id":5861,"date":"2022-05-20T09:11:09","date_gmt":"2022-05-20T14:11:09","guid":{"rendered":"https:\/\/etek.com\/es\/?p=5861"},"modified":"2022-05-20T09:11:09","modified_gmt":"2022-05-20T14:11:09","slug":"ultimas-actualizaciones-de-seguridad-para-productos-microsoft","status":"publish","type":"post","link":"https:\/\/etek.com\/es\/ultimas-actualizaciones-de-seguridad-para-productos-microsoft\/","title":{"rendered":"\u00faltimas Actualizaciones de seguridad para productos Microsoft"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"5861\" class=\"elementor elementor-5861\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3d5be061 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3d5be061\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7de9bd8e\" data-id=\"7de9bd8e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-33da08e elementor-widget elementor-widget-text-editor\" data-id=\"33da08e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 13-03-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f99b65 elementor-widget elementor-widget-text-editor\" data-id=\"3f99b65\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Microsoft a publicado un nuevo bolet\u00edn de seguridad, en este han solucionado 75 vulnerabilidades, 8 de estas con calificaci\u00f3n critica<\/p>\n<p>La actualizaci\u00f3n de seguridad de este mes proporciona actualizaciones para varios productos de software y funciones de Microsoft, incluidos Microsoft Office o el kernel de Windows. Para obtener un resumen completo sobre cada CVE, la compa\u00f1\u00eda ha puesto a disposici\u00f3n de sus usuarios los <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\">detalles<\/a>\u00a0de cada una de ellas:<\/p>\n<p>\u00a0<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a59536f elementor-widget elementor-widget-image\" data-id=\"a59536f\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 13-03-2024 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2022\/05\/unnamed-file.jpg\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4ecdd2c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4ecdd2c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fd56f77\" data-id=\"fd56f77\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6735e3a elementor-widget elementor-widget-text-editor\" data-id=\"6735e3a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>A continuaci\u00f3n, se detallan las vulnerabilidades catalogadas como cr\u00edticas en el bolet\u00edn de Microsoft correspondiente al mes de mayo. Cabe se\u00f1alar que Microsoft ha suprimido la descripci\u00f3n de las vulnerabilidades, por lo que, en ausencia de detalles adicionales, se incluye la informaci\u00f3n proporcionada por la compa\u00f1\u00eda:<\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-26925\">CVE-2022-26925 <\/a>&#8211; Servicio LSA de Windows<\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-29972\">CVE-2022-29972 <\/a>&#8211; Azure Synapse y Azure Data Factory <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-22713\">CVE-2022-22713 <\/a>&#8211; Windows Hyper-V<\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-22017\">CVE-2022-22017 <\/a>&#8211; Remote Desktop Client Remote Code Execution Vulnerability<\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-26923\">CVE-2022-26923 <\/a>&#8211; Active Directory Domain Services Elevation of Privilege Vulnerability <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-26931\">CVE-2022-26931 <\/a>&#8211; Windows Kerberos Elevation of Privilege Vulnerability<\/p>\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-26937\">CVE-2022-26937 <\/a>&#8211; Windows Network File System Remote Code Execution Vulnerability <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-23270\">CVE-2022-23270 <\/a>&#8211; Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability<\/p>\n<p>\u00a0<\/p>\n<h1>Recomendaciones:<\/h1>\n<ul>\n<li>Validar del listado suministrado por Microsoft que productos le aplican a su organizaci\u00f3n, generar las respectivas ventanas de mantenimiento y\/o control de cambios y remediar.<\/li>\n<\/ul>\n<h1>Fuentes<\/h1>\n<ul>\n<li><a href=\"https:\/\/www.ccn-cert.cni.es\/seguridad-al-dia\/avisos-ccn-cert\/11763-ccn-cert-av-09-22-actualizaciones-de-seguridad-para-productos-microsoft.html\">https:\/\/www.ccn-cert.cni.es\/seguridad-al-dia\/avisos-ccn-cert\/11763-ccn-cert-av- 09-22-actualizaciones-de-seguridad-para-productos-microsoft.html<\/a><\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\">https:\/\/msrc.microsoft.com\/update-guide\/en-US<\/a><\/li>\n<\/ul>\n<p>\u00a0<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aae5d7c elementor-widget elementor-widget-image\" data-id=\"aae5d7c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2022\/05\/Imagen2.png\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-07f554f elementor-widget elementor-widget-text-editor\" data-id=\"07f554f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><strong>Colombia&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;<\/strong><span style=\"font-weight: 600; letter-spacing: 0px;\">Per\u00fa&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<\/span><span style=\"letter-spacing: 0px;\">&nbsp;<\/span><span style=\"letter-spacing: 0px; font-weight: 600;\">India<\/span><\/p>\n<p>+57 (1) 2571520&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<span style=\"letter-spacing: 0px;\">+51 (1) 6124343&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;<\/span><span style=\"letter-spacing: 0px;\">&nbsp;<\/span><span style=\"letter-spacing: 0px;\">+91-9873451221<\/span><\/p>\n<p>&nbsp; &nbsp;<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Microsoft a publicado un nuevo bolet\u00edn de seguridad, en este han solucionado 75 vulnerabilidades, 8 de estas con calificaci\u00f3n critica La actualizaci\u00f3n de seguridad de este mes proporciona actualizaciones para varios productos de software y funciones de Microsoft, incluidos Microsoft Office o el kernel de Windows. Para obtener un resumen completo sobre cada CVE, la [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":5862,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/posts\/5861"}],"collection":[{"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/comments?post=5861"}],"version-history":[{"count":0,"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/posts\/5861\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/etek.com\/es\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/media?parent=5861"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/categories?post=5861"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/tags?post=5861"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}