{"id":27812,"date":"2025-07-09T20:56:12","date_gmt":"2025-07-09T18:56:12","guid":{"rendered":"https:\/\/perseus.de\/vulnerabilidad-critica-en-la-autenticacion-de-windows\/"},"modified":"2026-03-31T07:19:09","modified_gmt":"2026-03-31T05:19:09","slug":"vulnerabilidad-critica-en-la-autenticacion-de-windows","status":"publish","type":"post","link":"https:\/\/perseus.de\/es\/vulnerabilidad-critica-en-la-autenticacion-de-windows\/","title":{"rendered":"Vulnerabilidad cr\u00edtica en la autenticaci\u00f3n de Windows"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27812\" class=\"elementor elementor-27812 elementor-24082\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dcf4ec4 e-flex e-con-boxed e-con e-parent\" data-id=\"dcf4ec4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e1db58c elementor-widget elementor-widget-image\" data-id=\"e1db58c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"200\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\" class=\"attachment-large size-large wp-image-27805\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png 1024w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-300x75.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-768x192.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png 1200w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1258a43 e-flex e-con-boxed e-con e-parent\" data-id=\"1258a43\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2de4e88 e-con-full e-flex e-con e-child\" data-id=\"2de4e88\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4982c80 elementor-widget elementor-widget-text-editor\" data-id=\"4982c80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>09.07.2025<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8348bc5 elementor-widget elementor-widget-heading\" data-id=\"8348bc5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vulnerabilidad cr\u00edtica en la autenticaci\u00f3n de Windows<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb03842 e-con-full e-flex e-con e-child\" data-id=\"eb03842\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-91d0988 elementor-widget elementor-widget-text-editor\" data-id=\"91d0988\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Queremos llamar su atenci\u00f3n sobre una vulnerabilidad cr\u00edtica de seguridad en Microsoft Windows que actualmente representa un riesgo agudo para su infraestructura inform\u00e1tica. La vulnerabilidad con una <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-47981\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.cve.org\/CVERecord?id%3DCVE-2025-47981&amp;source=gmail&amp;ust=1752172609247000&amp;usg=AOvVaw1EVpGsepX1LbdrdUsJeWN-\">puntuaci\u00f3n CVSS de 9,8<\/a> afecta a casi todas las versiones actuales de Windows y Windows Server \u2013 incluido Windows Server 2008 R2 \u2013 y permite a los atacantes ejecutar c\u00f3digo malicioso con privilegios del sistema sin interacci\u00f3n del usuario. <\/p><p> <\/p><p>Es urgente una reparaci\u00f3n inmediata de los sistemas afectados.<\/p><p data-start=\"79\" data-end=\"370\"><span style=\"font-weight: 400;\">Investigadores en seguridad inform\u00e1tica informan <\/span><b>de ataques activos<\/b> <span style=\"font-weight: 400;\">en los que, entre otras cosas, las sesiones web existentes fueron comprometidas y se obtuvieron autenticaciones sin que los usuarios lo supieran, lo <\/span><b>que sugiere que la autenticaci\u00f3n activa multifactor tambi\u00e9n podr\u00eda ser eludida<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ceb0f40 e-flex e-con-boxed e-con e-parent\" data-id=\"ceb0f40\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ffbdc12 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"ffbdc12\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-02dd0e9 e-flex e-con-boxed e-con e-parent\" data-id=\"02dd0e9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-16d621d e-con-full e-flex e-con e-child\" data-id=\"16d621d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-89904c7 elementor-widget elementor-widget-text-editor\" data-id=\"89904c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>\u00bfQu\u00e9 ha pasado?<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fae461d e-con-full e-flex e-con e-child\" data-id=\"fae461d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0f04793 elementor-widget elementor-widget-text-editor\" data-id=\"0f04793\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Microsoft ha identificado y publicado <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-47981\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-47981&amp;source=gmail&amp;ust=1752172609247000&amp;usg=AOvVaw1dZenBlzfToAEFIsbiHtGf\">una vulnerabilidad grave<\/a> (<a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-47981\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.cve.org\/CVERecord?id%3DCVE-2025-47981&amp;source=gmail&amp;ust=1752172609247000&amp;usg=AOvVaw1EVpGsepX1LbdrdUsJeWN-\">CVE-2025-47981<\/a>) en el protocolo de autenticaci\u00f3n SPNEGO NEGOEX, una parte importante de la autenticaci\u00f3n de Windows en el entorno de dominio, entre otras cosas. Esta vulnerabilidad permite a los atacantes ejecutar c\u00f3digo arbitrario con privilegios del sistema, sin iniciar sesi\u00f3n y sin ninguna acci\u00f3n del usuario.  <\/p><p> <\/p><p>La amenaza es especialmente grave porque <a href=\"https:\/\/www.helpnetsecurity.com\/2025\/07\/09\/microsoft-fixes-critical-wormable-windows-flaw-cve-2025-47981\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.helpnetsecurity.com\/2025\/07\/09\/microsoft-fixes-critical-wormable-windows-flaw-cve-2025-47981\/&amp;source=gmail&amp;ust=1752172609247000&amp;usg=AOvVaw0vza0C3UJT_6jqm3bZ7UNG\">Microsoft la clasifica como \u00abwormable\u00bb.<\/a> Esto significa que el malware puede propagarse autom\u00e1ticamente a trav\u00e9s de redes. Seg\u00fan Microsoft, se espera un primer abuso de esta vulnerabilidad en breve.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cdadbd8 e-flex e-con-boxed e-con e-parent\" data-id=\"cdadbd8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-104dd95 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"104dd95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-71fc1cf e-con-full e-flex e-con e-child\" data-id=\"71fc1cf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ca1a3f3 e-con-full e-flex e-con e-child\" data-id=\"ca1a3f3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-66292b3 e-con-full e-flex e-con e-child\" data-id=\"66292b3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9745167 elementor-widget elementor-widget-text-editor\" data-id=\"9745167\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Vulnerabilidad reportada<br><br><\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-35b99f8 e-con-full e-flex e-con e-child\" data-id=\"35b99f8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b163873 elementor-widget elementor-widget-text-editor\" data-id=\"b163873\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La vulnerabilidad permite que atacantes no autenticados ejecuten c\u00f3digo con privilegios del sistema mediante mensajes RED elaborados, provocando un \u00abdesbordamiento de b\u00fafer basado en heap\u00bb. Esto es un error en el manejo de la memoria. Cuando se ejecutan, los programas reservan espacio en el llamado heap, una zona de memoria din\u00e1mica que se solicita de forma flexible en tiempo de ejecuci\u00f3n.  <\/p><p>Si se escribe m\u00e1s en esta \u00e1rea de lo previsto, se pueden manipular \u00e1reas de memoria vecinas. Esto permite a los atacantes inyectar y ejecutar su propio c\u00f3digo malicioso, en este caso, incluso con los privilegios m\u00e1s altos. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4dfc5b9 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"4dfc5b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-174b215 e-flex e-con-boxed e-con e-parent\" data-id=\"174b215\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e560a6b e-con-full e-flex e-con e-child\" data-id=\"e560a6b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-013b67e elementor-widget elementor-widget-text-editor\" data-id=\"013b67e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>\u00bfQu\u00e9 se ve afectado?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a72ed48 e-con-full e-flex e-con e-child\" data-id=\"a72ed48\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-db8754f elementor-widget elementor-widget-text-editor\" data-id=\"db8754f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Esta vulnerabilidad afecta <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-47981\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-47981&amp;source=gmail&amp;ust=1752172609247000&amp;usg=AOvVaw1dZenBlzfToAEFIsbiHtGf\">a todos los clientes de Windows a partir de Windows 10 versi\u00f3n 1607<\/a> porque estas versiones tienen activada por defecto la siguiente Directiva de Grupo: \u00abSeguridad de red: Permitir solicitudes<wbr><\/wbr>de autenticaci\u00f3n PKU2U<wbr><\/wbr> a este ordenador con identidades en l\u00ednea\u00bb.<\/p><p>Esta configuraci\u00f3n por defecto significa que la superficie de ataque ya est\u00e1 activa en muchos sistemas, incluso sin ninguna configuraci\u00f3n especial.<\/p><p> <\/p><p>Los sistemas en los que NEGOEX se utiliza en combinaci\u00f3n con los siguientes servicios tambi\u00e9n est\u00e1n particularmente en riesgo:<\/p><ul><li>Active Directory \/ Controlador de dominio<\/li><li>Accesos RDP<\/li><li>Pasarelas VPN<\/li><li>Compartidos de archivos SMB<\/li><li>Gesti\u00f3n remota de Windows (WinRM)<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-da9fcac e-flex e-con-boxed e-con e-parent\" data-id=\"da9fcac\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-70aad00 e-con-full e-flex e-con e-child\" data-id=\"70aad00\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-55be951 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"55be951\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d3f9227 e-flex e-con-boxed e-con e-parent\" data-id=\"d3f9227\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6059711 e-con-full e-flex e-con e-child\" data-id=\"6059711\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-26eea72 elementor-widget elementor-widget-text-editor\" data-id=\"26eea72\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>\u00bfQu\u00e9 puedo hacer?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-724b6c6 e-con-full e-flex e-con e-child\" data-id=\"724b6c6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f0c2fb4 elementor-widget elementor-widget-text-editor\" data-id=\"f0c2fb4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La vulnerabilidad CVE-2025-47981 supone una amenaza aguda para las redes basadas en Windows. La combinaci\u00f3n de alta criticidad, facilidad de explotaci\u00f3n y posibilidad de distribuci\u00f3n autom\u00e1tica hace que esta vulnerabilidad sea especialmente peligrosa. <\/p><p>Recomendamos que <a href=\"https:\/\/www.cyberdaily.au\/security\/12350-experts-concerned-over-newly-disclosed-critical-windows-vulnerability?\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.cyberdaily.au\/security\/12350-experts-concerned-over-newly-disclosed-critical-windows-vulnerability?&amp;source=gmail&amp;ust=1752172609247000&amp;usg=AOvVaw05HHPnlNVh3IxPBNYDeJp8\">act\u00faes de inmediato para evitar posibles da\u00f1os<\/a>:<\/p><p> <\/p><ol><li>Prioridad: Instala las \u00faltimas actualizaciones de seguridad de Microsoft de inmediato, especialmente en sistemas accesibles p\u00fablicamente o cr\u00edticos para el negocio.<\/li><li>Si no puedes parchear, bloquea el acceso de red a los puertos 135, 445 y 5985 si es t\u00e9cnicamente posible.<\/li><li>Utiliza la Directiva de Grupo (GPO) para desactivar la opci\u00f3n \u00abPermitir solicitudes de autenticaci\u00f3n PKU2U\u00bb si no es necesaria.<\/li><li>Revisa qu\u00e9 sistemas son potencialmente vulnerables y prioriza la protecci\u00f3n de servicios sensibles como AD, RDP o VPN.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-65d84f2 e-flex e-con-boxed e-con e-parent\" data-id=\"65d84f2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3c936a5 e-con-full e-flex e-con e-child\" data-id=\"3c936a5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3bbb54c elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"3bbb54c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-36d5f66 e-flex e-con-boxed e-con e-parent\" data-id=\"36d5f66\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-60eb6a0 elementor-widget elementor-widget-heading\" data-id=\"60eb6a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">De expertos para expertos:<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-092ac14 elementor-widget elementor-widget-text-editor\" data-id=\"092ac14\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Nota importante: Tenga en cuenta que bloquear los puertos 135, 445 y 5985 puede provocar los siguientes efectos:<\/strong><\/p><p> <\/p><ul><li>Compartidos de archivos (unidades de red): Puede que ya no sean accesibles.<\/li><li>Pol\u00edtica de grupo: Las GPO pueden fallar o retrasarse dependiendo del entorno.  <\/li><li>PowerShell remoto (WinRM): Soluciones basadas en scripts como SCCM, Ansible u otras herramientas de automatizaci\u00f3n pueden dejar de funcionar.<\/li><li>Acceso MI\/DCOM: Las herramientas para monitorizaci\u00f3n, inventario o administraci\u00f3n pueden verse interrumpidas, por ejemplo, al conectarse a sistemas remotos.<\/li><\/ul><p> <\/p><p>As\u00ed es como puedes identificar una posible explotaci\u00f3n de la vulnerabilidad:<\/p><p> <\/p><ul><li>Utiliza EDR\/antivirus con an\u00e1lisis de memoria (por ejemplo, Defender for Endpoint, CrowdStrike, SentinelOne) para detectar actividad sospechosa en la memoria.<\/li><li>Activa la monitorizaci\u00f3n del registro de eventos \u2013 presta especial atenci\u00f3n a fallos de LSASS y conexiones de red inusuales.<\/li><li>Usa Sysmon (especialmente los eventos: ID 1: Inicio de proceso, ID 10: Acceso a otros procesos, ID 11: Operaciones de archivo)<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dcff67d e-flex e-con-boxed e-con e-parent\" data-id=\"dcff67d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ad15629 e-con-full e-flex e-con e-child\" data-id=\"ad15629\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dd3e115 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"dd3e115\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Existe una vulnerabilidad cr\u00edtica en Microsoft Windows (CVSS 9.8) que afecta a casi todas las versiones actuales de Windows y servidor y permite a los atacantes ejecutar c\u00f3digo malicioso con privilegios del sistema sin interacci\u00f3n del usuario, un riesgo agudo para tu infraestructura inform\u00e1tica<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[66],"tags":[],"class_list":["post-27812","post","type-post","status-publish","format-standard","hentry","category-advertencia-de-peligro"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vulnerabilidad cr\u00edtica en la autenticaci\u00f3n de Windows - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/es\/vulnerabilidad-critica-en-la-autenticacion-de-windows\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerabilidad cr\u00edtica en la autenticaci\u00f3n de Windows - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Existe una vulnerabilidad cr\u00edtica en Microsoft Windows (CVSS 9.8) que afecta a casi todas las versiones actuales de Windows y servidor y permite a los atacantes ejecutar c\u00f3digo malicioso con privilegios del sistema sin interacci\u00f3n del usuario, un riesgo agudo para tu infraestructura inform\u00e1tica\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/es\/vulnerabilidad-critica-en-la-autenticacion-de-windows\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-09T18:56:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T05:19:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/vulnerabilidad-critica-en-la-autenticacion-de-windows\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/vulnerabilidad-critica-en-la-autenticacion-de-windows\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Vulnerabilidad cr\u00edtica en la autenticaci\u00f3n de Windows\",\"datePublished\":\"2025-07-09T18:56:12+00:00\",\"dateModified\":\"2026-03-31T05:19:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/vulnerabilidad-critica-en-la-autenticacion-de-windows\\\/\"},\"wordCount\":757,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/vulnerabilidad-critica-en-la-autenticacion-de-windows\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\",\"articleSection\":[\"Advertencia de peligro\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/es\\\/vulnerabilidad-critica-en-la-autenticacion-de-windows\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/vulnerabilidad-critica-en-la-autenticacion-de-windows\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/es\\\/vulnerabilidad-critica-en-la-autenticacion-de-windows\\\/\",\"name\":\"Vulnerabilidad cr\u00edtica en la autenticaci\u00f3n de Windows - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/vulnerabilidad-critica-en-la-autenticacion-de-windows\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/vulnerabilidad-critica-en-la-autenticacion-de-windows\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\",\"datePublished\":\"2025-07-09T18:56:12+00:00\",\"dateModified\":\"2026-03-31T05:19:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/vulnerabilidad-critica-en-la-autenticacion-de-windows\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/es\\\/vulnerabilidad-critica-en-la-autenticacion-de-windows\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/vulnerabilidad-critica-en-la-autenticacion-de-windows\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/vulnerabilidad-critica-en-la-autenticacion-de-windows\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerabilidad cr\u00edtica en la autenticaci\u00f3n de Windows\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/es\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerabilidad cr\u00edtica en la autenticaci\u00f3n de Windows - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/es\/vulnerabilidad-critica-en-la-autenticacion-de-windows\/","og_locale":"es_ES","og_type":"article","og_title":"Vulnerabilidad cr\u00edtica en la autenticaci\u00f3n de Windows - Perseus Technologies","og_description":"Existe una vulnerabilidad cr\u00edtica en Microsoft Windows (CVSS 9.8) que afecta a casi todas las versiones actuales de Windows y servidor y permite a los atacantes ejecutar c\u00f3digo malicioso con privilegios del sistema sin interacci\u00f3n del usuario, un riesgo agudo para tu infraestructura inform\u00e1tica","og_url":"https:\/\/perseus.de\/es\/vulnerabilidad-critica-en-la-autenticacion-de-windows\/","og_site_name":"Perseus Technologies","article_published_time":"2025-07-09T18:56:12+00:00","article_modified_time":"2026-03-31T05:19:09+00:00","og_image":[{"width":1200,"height":300,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Xenia Silbe","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/es\/vulnerabilidad-critica-en-la-autenticacion-de-windows\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/es\/vulnerabilidad-critica-en-la-autenticacion-de-windows\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Vulnerabilidad cr\u00edtica en la autenticaci\u00f3n de Windows","datePublished":"2025-07-09T18:56:12+00:00","dateModified":"2026-03-31T05:19:09+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/es\/vulnerabilidad-critica-en-la-autenticacion-de-windows\/"},"wordCount":757,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/es\/vulnerabilidad-critica-en-la-autenticacion-de-windows\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png","articleSection":["Advertencia de peligro"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/es\/vulnerabilidad-critica-en-la-autenticacion-de-windows\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/es\/vulnerabilidad-critica-en-la-autenticacion-de-windows\/","url":"https:\/\/perseus.de\/es\/vulnerabilidad-critica-en-la-autenticacion-de-windows\/","name":"Vulnerabilidad cr\u00edtica en la autenticaci\u00f3n de Windows - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/es\/vulnerabilidad-critica-en-la-autenticacion-de-windows\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/es\/vulnerabilidad-critica-en-la-autenticacion-de-windows\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png","datePublished":"2025-07-09T18:56:12+00:00","dateModified":"2026-03-31T05:19:09+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/es\/vulnerabilidad-critica-en-la-autenticacion-de-windows\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/es\/vulnerabilidad-critica-en-la-autenticacion-de-windows\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/perseus.de\/es\/vulnerabilidad-critica-en-la-autenticacion-de-windows\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/es\/vulnerabilidad-critica-en-la-autenticacion-de-windows\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Vulnerabilidad cr\u00edtica en la autenticaci\u00f3n de Windows"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/es\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/27812","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/comments?post=27812"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/27812\/revisions"}],"predecessor-version":[{"id":27813,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/27812\/revisions\/27813"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/media?parent=27812"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/categories?post=27812"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/tags?post=27812"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}