{"id":6119,"date":"2022-08-29T15:38:32","date_gmt":"2022-08-29T20:38:32","guid":{"rendered":"https:\/\/etek.com\/es\/?p=6119"},"modified":"2022-08-29T15:38:32","modified_gmt":"2022-08-29T20:38:32","slug":"vulnerabilidades-de-los-enrutadores-de-la-serie-rv-de-cisco","status":"publish","type":"post","link":"https:\/\/etek.com\/es\/vulnerabilidades-de-los-enrutadores-de-la-serie-rv-de-cisco\/","title":{"rendered":"Vulnerabilidades de los enrutadores de la serie RV de Cisco"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"6119\" class=\"elementor elementor-6119\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2adefb72 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2adefb72\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5726cbef\" data-id=\"5726cbef\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-649962d0 elementor-widget elementor-widget-text-editor\" data-id=\"649962d0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 13-03-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<!-- wp:paragraph -->\n<p>Escrito por: <strong>Melanie Malag\u00f3n<\/strong>&#8211; <strong>Cyber Intelligence Expert<\/strong><\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a12419 elementor-widget elementor-widget-heading\" data-id=\"8a12419\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 13-03-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h6 class=\"elementor-heading-title elementor-size-default\">Se presentan vulnerabilidades en los enrutadores de las series RV de Cisco Small Business permitiendo posibles ataques DOS e inyecci\u00f3n de comandos.<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b268a56 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b268a56\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-f189096\" data-id=\"f189096\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e0fcf79 elementor-widget elementor-widget-image\" data-id=\"e0fcf79\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 13-03-2024 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2022\/08\/vulnerabilidades-Cisco.jpg\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-dabdd33\" data-id=\"dabdd33\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-617eaeb elementor-widget elementor-widget-text-editor\" data-id=\"617eaeb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Las siguientes vulnerabilidades se deben a una validaci\u00f3n insuficiente en la entrada en la interfaz web la cual puede permitir que un actor remoto no autenticado ejecute c\u00f3digo malicioso:<\/p>\n<ul>\n<li><strong>CVE-2022-20842: <\/strong>Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo y denegaci\u00f3n de<\/li>\n<li><strong>CVE-2022-20827<\/strong>: Vulnerabilidad de inyecci\u00f3n de comando de actualizaci\u00f3n de base de datos de filtro<\/li>\n<li><strong>CVE-2022-20841<\/strong>: Vulnerabilidad de inyecci\u00f3n de comando Plug and Play abierta.<\/li>\n<\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0c4d1e2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0c4d1e2\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-25c6a94\" data-id=\"25c6a94\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-788d94a elementor-widget elementor-widget-text-editor\" data-id=\"788d94a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Enrutadores VPN RV160, RV260, RV260P con PoE, Enrutadores VPN inal\u00e1mbricos AC RV160W, AC RV260W, Enrutadores VPN Gigabit de doble WAN RV340, WAN RV345, Enrutadores VPN inal\u00e1mbricos-AC Gigabit de doble WAN RV340W, Enrutadores VPN POE Gigabit de doble WAN RV345P.<\/p>\n<h5>RECOMENDACIONES<\/h5>\n<p>Se recomienda a los clientes que actualicen a una versi\u00f3n adecuada, como se indica en las siguientes tablas:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"255\">\n<p><strong>Producto Cisco<\/strong><\/p>\n<\/td>\n<td width=\"155\">\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p><strong>Lanzamientos afectados<\/strong><\/p>\n<\/td>\n<td width=\"193\">\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p><strong>Primera versi\u00f3n fija<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">\n<p>Enrutadores de las series RV160 y RV260<\/p>\n<\/td>\n<td width=\"155\">\n<p>Antes de 1.0.01.05<\/p>\n<\/td>\n<td width=\"193\">\n<p>En validaci\u00f3n<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">\n<p>Enrutadores de las series RV160 y RV260<\/p>\n<\/td>\n<td width=\"155\">\n<p>1.0.01.05<\/p>\n<\/td>\n<td width=\"193\">\n<p>1.0.01.09<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">\n<p>Enrutadores de las series RV340 y RV345<\/p>\n<\/td>\n<td width=\"155\">\n<p>Antes de 1.0.03.26<\/p>\n<\/td>\n<td width=\"193\">\n<p>En validaci\u00f3n<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">\n<p>Enrutadores de las series RV340 y RV345<\/p>\n<\/td>\n<td width=\"155\">\n<p>1.0.03.26<\/p>\n<\/td>\n<td width=\"193\">\n<p>1.0.03.28<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>CVE-2022-20842<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"255\">\n<p><strong>Cisco Product<\/strong><\/p>\n<\/td>\n<td width=\"155\">\n<p><strong>Affected Releases<\/strong><\/p>\n<\/td>\n<td width=\"193\">\n<p><strong>First Fixed Release<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"255\">\n<p>RV340 and RV345 Series Routers<\/p>\n<\/td>\n<td width=\"155\">\n<p>1.0.03.26 and earlier<\/p>\n<\/td>\n<td width=\"193\">\n<p>1.0.03.28<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h6>FUENTES<\/h6>\n<ul>\n<li><a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-sb-mult-vuln-CbVp4SUR\">https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-sb-mult-vuln-CbVp4SUR<\/a><\/li>\n<li><a href=\"https:\/\/noticiasseguridad.com\/vulnerabilidades\/3-vulnerabilidades-criticas-en-9-modelos-de-router-cisco-permiten-la-toma-completa-de-cualquier-red\/\">https:\/\/noticiasseguridad.com\/vulnerabilidades\/3-vulnerabilidades-criticas-en-9-modelos-de-router- cisco-permiten-la-toma-completa-de-cualquier-red\/<\/a><\/li>\n<\/ul>\n<p>\u00a0<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-00e6f4b elementor-widget elementor-widget-image\" data-id=\"00e6f4b\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/etek.com\/es\/wp-content\/uploads\/2022\/05\/Imagen2.png\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e0f497 elementor-widget elementor-widget-text-editor\" data-id=\"5e0f497\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><a href=\"mailto:Info@etek.com\">Info@etek.com<\/a><\/p>\n<p><\/p>\n<p><strong>Colombia&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Per\u00fa&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<\/strong><span style=\"font-weight: 600; letter-spacing: 0px;\">India<\/span><\/p>\n<p>+57 (1) 2571520&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;+51&nbsp;(1) 6124343&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<span style=\"letter-spacing: 0px;\">+91-9873451221<\/span><\/p>\n<p><\/p>\n<p><br><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Escrito por: Melanie Malag\u00f3n&#8211; Cyber Intelligence Expert Se presentan vulnerabilidades en los enrutadores de las series RV de Cisco Small Business permitiendo posibles ataques DOS e inyecci\u00f3n de comandos. Las siguientes vulnerabilidades se deben a una validaci\u00f3n insuficiente en la entrada en la interfaz web la cual puede permitir que un actor remoto no autenticado [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":6120,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/posts\/6119"}],"collection":[{"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/comments?post=6119"}],"version-history":[{"count":0,"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/posts\/6119\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/etek.com\/es\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/media?parent=6119"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/categories?post=6119"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/etek.com\/es\/wp-json\/wp\/v2\/tags?post=6119"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}