{"id":27850,"date":"2022-04-07T09:56:00","date_gmt":"2022-04-07T07:56:00","guid":{"rendered":"https:\/\/perseus.de\/cisa-identifica-vulnerabilidades-criticas-para-los-routers-spring-apple-y-d-link\/"},"modified":"2026-03-31T07:26:44","modified_gmt":"2026-03-31T05:26:44","slug":"cisa-identifica-vulnerabilidades-criticas-para-los-routers-spring-apple-y-d-link","status":"publish","type":"post","link":"https:\/\/perseus.de\/es\/cisa-identifica-vulnerabilidades-criticas-para-los-routers-spring-apple-y-d-link\/","title":{"rendered":"CISA identifica vulnerabilidades cr\u00edticas para los routers Spring, Apple y D-Link"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27850\" class=\"elementor elementor-27850 elementor-2933\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dcf4ec4 e-flex e-con-boxed e-con e-parent\" data-id=\"dcf4ec4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e1db58c elementor-widget elementor-widget-image\" data-id=\"e1db58c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"200\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\" class=\"attachment-large size-large wp-image-27805\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png 1024w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-300x75.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-768x192.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png 1200w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1258a43 e-flex e-con-boxed e-con e-parent\" data-id=\"1258a43\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2de4e88 e-con-full e-flex e-con e-child\" data-id=\"2de4e88\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4982c80 elementor-widget elementor-widget-text-editor\" data-id=\"4982c80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>26.04.2022<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8348bc5 elementor-widget elementor-widget-heading\" data-id=\"8348bc5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vulnerabilidad cr\u00edtica en Microsoft Exchange Server<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb03842 e-con-full e-flex e-con e-child\" data-id=\"eb03842\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-91d0988 elementor-widget elementor-widget-text-editor\" data-id=\"91d0988\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>La Agencia Americana de Ciberseguridad e Infraestructura (CISA) mantiene una visi\u00f3n \u00fatil de las vulnerabilidades conocidas que explotan los atacantes. El 5 de abril, la agencia a\u00f1adi\u00f3 cuatro nuevas vulnerabilidades de seguridad a esta visi\u00f3n general. Aqu\u00ed puedes descubrir qu\u00e9 es, cu\u00e1les son los riesgos y c\u00f3mo puedes protegerte de ellos.  <\/strong><\/p><p>La vulnerabilidad de Spring4Shell permite la ejecuci\u00f3n remota de c\u00f3digo<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f85a5ad e-flex e-con-boxed e-con e-parent\" data-id=\"f85a5ad\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-fad2031 e-con-full e-flex e-con e-child\" data-id=\"fad2031\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8282d30 elementor-widget elementor-widget-text-editor\" data-id=\"8282d30\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>\u00bfQu\u00e9 ha pasado?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ee744d2 e-con-full e-flex e-con e-child\" data-id=\"ee744d2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ea6506 elementor-widget elementor-widget-text-editor\" data-id=\"5ea6506\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La vulnerabilidad \u00abSpring4Shell\u00bb (CVE-2022-22965) est\u00e1 preocupando actualmente a los expertos en ciberseguridad. El <a href=\"https:\/\/spring.io\/\">framework de c\u00f3digo abierto Spring<\/a> proporciona herramientas y utilidades para aplicaciones empresariales basadas en el lenguaje de programaci\u00f3n Java. El muelle ayuda a reducir el esfuerzo necesario para construir las aplicaciones.  <\/p><p>El 31 de marzo, la empresa confirm\u00f3 la vulnerabilidad zero-day y lanz\u00f3 un parche que deber\u00eda solucionar el problema.<\/p><p>Sin embargo, la empresa estadounidense de seguridad Sonatype se\u00f1al\u00f3 esta semana que, a pesar del lanzamiento del parche, m\u00e1s del 80% de las descargas recientes son versiones potencialmente vulnerables. Al parecer, los programas de empresas que usan Spring y se usan en todo el mundo se ven afectados. El Equipo de Respuesta a Emergencias Inform\u00e1ticas (CERT) de la Universidad Carnegie Mellon ha publicado una <a href=\"https:\/\/www.kb.cert.org\/vuls\/id\/970766\">lista de empresas<\/a> afectadas.  <\/p><p>La empresa de ciberseguridad Kasada tambi\u00e9n descubri\u00f3 que los ciberdelincuentes utilizan herramientas automatizadas de escaneo de vulnerabilidades para probar miles de URLs y averiguar qu\u00e9 sistemas a\u00fan no han sido parcheados.<\/p><p>Un portavoz de la compa\u00f1\u00eda de telecomunicaciones asegur\u00f3 <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/t-mobile-confirms-lapsus-hackers-breached-internal-systems\/\">a BleepingComputer<\/a> que no se rob\u00f3 informaci\u00f3n sensible ni datos de clientes como parte del ciberataque. Los ciberdelincuentes solo lograron acceder a software operativo interno, que no est\u00e1 relacionado con informaci\u00f3n confidencial. No se encontr\u00f3 ninguna prueba de que se hubieran pinchado datos o secretos comerciales.  <\/p><p>El incidente fue descubierto por herramientas internas de monitorizaci\u00f3n que documentaron la intrusi\u00f3n de los actores no autorizados mediante el robo de credenciales. Seg\u00fan T-Mobile, el acceso a los criminales fue r\u00e1pidamente cortado y las credenciales comprometidas utilizadas fueron desactivadas de inmediato. Los sistemas y procesos de la empresa han sido limpiados y funcionan seg\u00fan lo previsto.  <\/p><p>El incidente cibern\u00e9tico fue sacado a la luz por el periodista independiente de investigaci\u00f3n Brian Krebs, quien fue el primero en informar sobre el <a href=\"https:\/\/krebsonsecurity.com\/2022\/04\/leaked-chats-show-lapsus-stole-t-mobile-source-code\/\">incidente<\/a>. Pudo analizar mensajes filtrados de chat de Telegram entre miembros de la banda Lapsus$ y determinar que los atacantes hab\u00edan logrado robar c\u00f3digo fuente interno de T-Mobile y luego penetrar en los sistemas. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f1dfa8e e-flex e-con-boxed e-con e-parent\" data-id=\"f1dfa8e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bf4f09a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"bf4f09a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a82985c e-flex e-con-boxed e-con e-parent\" data-id=\"a82985c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-482032b e-con-full e-flex e-con e-child\" data-id=\"482032b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b5f6a5c elementor-widget elementor-widget-text-editor\" data-id=\"b5f6a5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>\u00bfQu\u00e9 puedo hacer?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8f5d6ed e-con-full e-flex e-con e-child\" data-id=\"8f5d6ed\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-057f5b5 elementor-widget elementor-widget-text-editor\" data-id=\"057f5b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li>Consulta con el fabricante de tu software, programas y servicios para ver si tus aplicaciones se ven afectadas. Spring ha publicado una gu\u00eda para ayudar a los usuarios a descubrir si se ven afectados y en qu\u00e9 medida. <\/li><li>Si no es posible aplicar parches inmediatos, Spring ha publicado soluciones alternativas para solucionar el problema por el momento<\/li><li>Para los administradores de TI: Aislar los sistemas afectados en una \u00abVLAN vulnerable\u00bb (Red de \u00c1rea Local Virtual).<\/li><li>Cuidado con cambios de configuraci\u00f3n no autorizados en todos los sistemas.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ceb0f40 e-flex e-con-boxed e-con e-parent\" data-id=\"ceb0f40\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-71cb03a e-con-full e-flex e-con e-child\" data-id=\"71cb03a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-26d4389 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"26d4389\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bcfa049 e-flex e-con-boxed e-con e-parent\" data-id=\"bcfa049\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2130c2d e-con-full e-flex e-con e-child\" data-id=\"2130c2d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2fcd616 elementor-widget elementor-widget-heading\" data-id=\"2fcd616\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Apple publica y cierra dos vulnerabilidades cr\u00edticas de seguridad\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ac2bde6 e-con-full e-flex e-con e-child\" data-id=\"ac2bde6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-84ebc33 elementor-widget elementor-widget-text-editor\" data-id=\"84ebc33\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Adem\u00e1s de Spring4Shell, CISA catalog\u00f3 dos vulnerabilidades (CVE-2022-22675 y CVE-2022-22674) reveladas por Apple el 1 de abril que afectan a sus dispositivos iPhone, iPad y Mac m\u00e1s utilizados.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6237d73 e-flex e-con-boxed e-con e-parent\" data-id=\"6237d73\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9dde6dc elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"9dde6dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-02dd0e9 e-flex e-con-boxed e-con e-parent\" data-id=\"02dd0e9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-16d621d e-con-full e-flex e-con e-child\" data-id=\"16d621d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-89904c7 elementor-widget elementor-widget-text-editor\" data-id=\"89904c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>\u00bfQu\u00e9 ha pasado?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fae461d e-con-full e-flex e-con e-child\" data-id=\"fae461d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0f04793 elementor-widget elementor-widget-text-editor\" data-id=\"0f04793\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>En la vulnerabilidad CVE-2022-22675, el componente de decodificaci\u00f3n de audio y v\u00eddeo afecta a AppleAVD. Esta vulnerabilidad tambi\u00e9n puede llevar a la ejecuci\u00f3n de c\u00f3digos remotos.<br>En combinaci\u00f3n con la segunda vulnerabilidad CVE-2022-22674, que permite leer la memoria del n\u00facleo de macOS, los ciberdelincuentes tambi\u00e9n podr\u00edan obtener informaci\u00f3n sensible sobre sus posibles v\u00edctimas. <\/p><p>Apple afirm\u00f3 que ambas vulnerabilidades han sido corregidas. Sin embargo, existe el riesgo de que las vulnerabilidades ya hayan sido explotadas. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cdadbd8 e-flex e-con-boxed e-con e-parent\" data-id=\"cdadbd8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-104dd95 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"104dd95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f6e5251 e-flex e-con-boxed e-con e-parent\" data-id=\"f6e5251\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f1cf26c e-con-full e-flex e-con e-child\" data-id=\"f1cf26c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ee082fd elementor-widget elementor-widget-text-editor\" data-id=\"ee082fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>\u00bfQu\u00e9 puedo hacer?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bc25934 e-con-full e-flex e-con e-child\" data-id=\"bc25934\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b46b6f elementor-widget elementor-widget-text-editor\" data-id=\"2b46b6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Las actualizaciones de seguridad para iOS y iPad (iOS 15.4.1 y macOS Monterey 12.3.1) est\u00e1n disponibles para iPhone 6S y posteriores, todos los modelos iPad Pro, todos los iPad Air 2 y posteriores, iPad 5\u00aa generaci\u00f3n y posteriores, iPad Mini 4 y posteriores, y iPod Touch (7\u00aa generaci\u00f3n). Si usas uno de estos dispositivos, deber\u00edas instalar las actualizaciones lo antes posible y no esperar a una actualizaci\u00f3n autom\u00e1tica de seguridad de Apple: <\/p><ul><li>En tu iPhone o iPad, abre Configuraci\u00f3n. Haz clic en \u00abGeneral\u00bb, luego en \u00abActualizaci\u00f3n de software\u00bb y finalmente en \u00abActualizar ahora\u00bb. <\/li><li>Los usuarios de Mac abren el men\u00fa de Apple, vayan al elemento del men\u00fa \u00abActualizaci\u00f3n de software\u00bb y hagan clic en \u00abActualizar ahora\u00bb.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d4150d0 e-flex e-con-boxed e-con e-parent\" data-id=\"d4150d0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-baf1f0f elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"baf1f0f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a662895 e-flex e-con-boxed e-con e-parent\" data-id=\"a662895\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-dd1db79 e-con-full e-flex e-con e-child\" data-id=\"dd1db79\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ad19c14 elementor-widget elementor-widget-heading\" data-id=\"ad19c14\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ejecuci\u00f3n remota de c\u00f3digo en routers D-Link  \n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d6f22d5 e-con-full e-flex e-con e-child\" data-id=\"d6f22d5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a7014ef elementor-widget elementor-widget-text-editor\" data-id=\"a7014ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La visi\u00f3n general de CISA tambi\u00e9n se ha ampliado para incluir la vulnerabilidad CVE-2021-45382. Afecta a los modelos de router DIR-810L, DIR-820L\/LW, DIR-826L, DIR-830L y DIR-836L de D-Link. La vulnerabilidad tambi\u00e9n abre la puerta a la ejecuci\u00f3n remota de c\u00f3digo.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a03f6e4 e-flex e-con-boxed e-con e-parent\" data-id=\"a03f6e4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b600db9 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"b600db9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5f622d6 e-flex e-con-boxed e-con e-parent\" data-id=\"5f622d6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9c1eeee e-con-full e-flex e-con e-child\" data-id=\"9c1eeee\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b305611 elementor-widget elementor-widget-text-editor\" data-id=\"b305611\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>\u00bfQu\u00e9 ha pasado?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e889ec5 e-con-full e-flex e-con e-child\" data-id=\"e889ec5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-335618c elementor-widget elementor-widget-text-editor\" data-id=\"335618c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>No hay m\u00e1s actualizaciones disponibles para estos dispositivos \u2013 la \u00faltima se lanz\u00f3 el 19 de diciembre de 2021 \u2013 ya que son los llamados dispositivos de fin de vida. Los productos han llegado al final de su vida \u00fatil y ya no se mantienen en servicio. En consecuencia, se desarrollan vulnerabilidades en estos dispositivos y se convierten as\u00ed en un objetivo popular para ataques, especialmente porque los dispositivos est\u00e1n constantemente encendidos y conectados a Internet. Los routers comprometidos suelen ser utilizados por ciberdelincuentes para disfrazar su ubicaci\u00f3n mientras lanzan ataques.   <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0960966 e-flex e-con-boxed e-con e-parent\" data-id=\"0960966\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d008e5a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"d008e5a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1a860a0 e-flex e-con-boxed e-con e-parent\" data-id=\"1a860a0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6924eb7 e-con-full e-flex e-con e-child\" data-id=\"6924eb7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-65f9402 elementor-widget elementor-widget-text-editor\" data-id=\"65f9402\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>\u00bfQu\u00e9 puedo hacer?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-530eecb e-con-full e-flex e-con e-child\" data-id=\"530eecb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-05d44c6 elementor-widget elementor-widget-text-editor\" data-id=\"05d44c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La propia D-Link recomienda retirar y reemplazar los modelos mencionados. Para que las empresas cumplan con la Directiva Operativa Vinculante 22-01, esto debe hacerse antes del 25 de abril de 2022. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>26.04.2022 Vulnerabilidad cr\u00edtica en Microsoft Exchange Server La Agencia Americana de Ciberseguridad e Infraestructura (CISA) mantiene una visi\u00f3n \u00fatil de las vulnerabilidades conocidas que explotan los atacantes. El 5 de abril, la agencia a\u00f1adi\u00f3 cuatro nuevas vulnerabilidades de seguridad a esta visi\u00f3n general. Aqu\u00ed puedes descubrir qu\u00e9 es, cu\u00e1les son los riesgos y c\u00f3mo puedes [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[66],"tags":[],"class_list":["post-27850","post","type-post","status-publish","format-standard","hentry","category-advertencia-de-peligro"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CISA identifica vulnerabilidades cr\u00edticas para los routers Spring, Apple y D-Link - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/es\/cisa-identifica-vulnerabilidades-criticas-para-los-routers-spring-apple-y-d-link\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISA identifica vulnerabilidades cr\u00edticas para los routers Spring, Apple y D-Link - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"26.04.2022 Vulnerabilidad cr\u00edtica en Microsoft Exchange Server La Agencia Americana de Ciberseguridad e Infraestructura (CISA) mantiene una visi\u00f3n \u00fatil de las vulnerabilidades conocidas que explotan los atacantes. El 5 de abril, la agencia a\u00f1adi\u00f3 cuatro nuevas vulnerabilidades de seguridad a esta visi\u00f3n general. Aqu\u00ed puedes descubrir qu\u00e9 es, cu\u00e1les son los riesgos y c\u00f3mo puedes [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/es\/cisa-identifica-vulnerabilidades-criticas-para-los-routers-spring-apple-y-d-link\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-07T07:56:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T05:26:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/cisa-identifica-vulnerabilidades-criticas-para-los-routers-spring-apple-y-d-link\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/cisa-identifica-vulnerabilidades-criticas-para-los-routers-spring-apple-y-d-link\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"CISA identifica vulnerabilidades cr\u00edticas para los routers Spring, Apple y D-Link\",\"datePublished\":\"2022-04-07T07:56:00+00:00\",\"dateModified\":\"2026-03-31T05:26:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/cisa-identifica-vulnerabilidades-criticas-para-los-routers-spring-apple-y-d-link\\\/\"},\"wordCount\":972,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/cisa-identifica-vulnerabilidades-criticas-para-los-routers-spring-apple-y-d-link\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\",\"articleSection\":[\"Advertencia de peligro\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/es\\\/cisa-identifica-vulnerabilidades-criticas-para-los-routers-spring-apple-y-d-link\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/cisa-identifica-vulnerabilidades-criticas-para-los-routers-spring-apple-y-d-link\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/es\\\/cisa-identifica-vulnerabilidades-criticas-para-los-routers-spring-apple-y-d-link\\\/\",\"name\":\"CISA identifica vulnerabilidades cr\u00edticas para los routers Spring, Apple y D-Link - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/cisa-identifica-vulnerabilidades-criticas-para-los-routers-spring-apple-y-d-link\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/cisa-identifica-vulnerabilidades-criticas-para-los-routers-spring-apple-y-d-link\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\",\"datePublished\":\"2022-04-07T07:56:00+00:00\",\"dateModified\":\"2026-03-31T05:26:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/cisa-identifica-vulnerabilidades-criticas-para-los-routers-spring-apple-y-d-link\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/es\\\/cisa-identifica-vulnerabilidades-criticas-para-los-routers-spring-apple-y-d-link\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/cisa-identifica-vulnerabilidades-criticas-para-los-routers-spring-apple-y-d-link\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/cisa-identifica-vulnerabilidades-criticas-para-los-routers-spring-apple-y-d-link\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISA identifica vulnerabilidades cr\u00edticas para los routers Spring, Apple y D-Link\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/es\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CISA identifica vulnerabilidades cr\u00edticas para los routers Spring, Apple y D-Link - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/es\/cisa-identifica-vulnerabilidades-criticas-para-los-routers-spring-apple-y-d-link\/","og_locale":"es_ES","og_type":"article","og_title":"CISA identifica vulnerabilidades cr\u00edticas para los routers Spring, Apple y D-Link - Perseus Technologies","og_description":"26.04.2022 Vulnerabilidad cr\u00edtica en Microsoft Exchange Server La Agencia Americana de Ciberseguridad e Infraestructura (CISA) mantiene una visi\u00f3n \u00fatil de las vulnerabilidades conocidas que explotan los atacantes. El 5 de abril, la agencia a\u00f1adi\u00f3 cuatro nuevas vulnerabilidades de seguridad a esta visi\u00f3n general. Aqu\u00ed puedes descubrir qu\u00e9 es, cu\u00e1les son los riesgos y c\u00f3mo puedes [&hellip;]","og_url":"https:\/\/perseus.de\/es\/cisa-identifica-vulnerabilidades-criticas-para-los-routers-spring-apple-y-d-link\/","og_site_name":"Perseus Technologies","article_published_time":"2022-04-07T07:56:00+00:00","article_modified_time":"2026-03-31T05:26:44+00:00","og_image":[{"width":1200,"height":300,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Xenia Silbe","Tiempo de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/es\/cisa-identifica-vulnerabilidades-criticas-para-los-routers-spring-apple-y-d-link\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/es\/cisa-identifica-vulnerabilidades-criticas-para-los-routers-spring-apple-y-d-link\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"CISA identifica vulnerabilidades cr\u00edticas para los routers Spring, Apple y D-Link","datePublished":"2022-04-07T07:56:00+00:00","dateModified":"2026-03-31T05:26:44+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/es\/cisa-identifica-vulnerabilidades-criticas-para-los-routers-spring-apple-y-d-link\/"},"wordCount":972,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/es\/cisa-identifica-vulnerabilidades-criticas-para-los-routers-spring-apple-y-d-link\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png","articleSection":["Advertencia de peligro"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/es\/cisa-identifica-vulnerabilidades-criticas-para-los-routers-spring-apple-y-d-link\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/es\/cisa-identifica-vulnerabilidades-criticas-para-los-routers-spring-apple-y-d-link\/","url":"https:\/\/perseus.de\/es\/cisa-identifica-vulnerabilidades-criticas-para-los-routers-spring-apple-y-d-link\/","name":"CISA identifica vulnerabilidades cr\u00edticas para los routers Spring, Apple y D-Link - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/es\/cisa-identifica-vulnerabilidades-criticas-para-los-routers-spring-apple-y-d-link\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/es\/cisa-identifica-vulnerabilidades-criticas-para-los-routers-spring-apple-y-d-link\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png","datePublished":"2022-04-07T07:56:00+00:00","dateModified":"2026-03-31T05:26:44+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/es\/cisa-identifica-vulnerabilidades-criticas-para-los-routers-spring-apple-y-d-link\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/es\/cisa-identifica-vulnerabilidades-criticas-para-los-routers-spring-apple-y-d-link\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/perseus.de\/es\/cisa-identifica-vulnerabilidades-criticas-para-los-routers-spring-apple-y-d-link\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/es\/cisa-identifica-vulnerabilidades-criticas-para-los-routers-spring-apple-y-d-link\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"CISA identifica vulnerabilidades cr\u00edticas para los routers Spring, Apple y D-Link"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/es\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/27850","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/comments?post=27850"}],"version-history":[{"count":4,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/27850\/revisions"}],"predecessor-version":[{"id":27854,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/27850\/revisions\/27854"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/media?parent=27850"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/categories?post=27850"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/tags?post=27850"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}