{"id":27945,"date":"2021-04-14T16:12:00","date_gmt":"2021-04-14T14:12:00","guid":{"rendered":"https:\/\/perseus.de\/vulnerabilidad-unclosed-fortinet-vpn-permite-un-ataque-de-cifrado\/"},"modified":"2026-03-31T07:42:47","modified_gmt":"2026-03-31T05:42:47","slug":"vulnerabilidad-unclosed-fortinet-vpn-permite-un-ataque-de-cifrado","status":"publish","type":"post","link":"https:\/\/perseus.de\/es\/vulnerabilidad-unclosed-fortinet-vpn-permite-un-ataque-de-cifrado\/","title":{"rendered":"Vulnerabilidad Unclosed Fortinet VPN permite un ataque de cifrado"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27945\" class=\"elementor elementor-27945 elementor-22892\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dcf4ec4 e-flex e-con-boxed e-con e-parent\" data-id=\"dcf4ec4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e1db58c elementor-widget elementor-widget-image\" data-id=\"e1db58c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"200\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\" class=\"attachment-large size-large wp-image-27805\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png 1024w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-300x75.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-768x192.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png 1200w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1258a43 e-flex e-con-boxed e-con e-parent\" data-id=\"1258a43\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2de4e88 e-con-full e-flex e-con e-child\" data-id=\"2de4e88\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4982c80 elementor-widget elementor-widget-text-editor\" data-id=\"4982c80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>14.04.2021<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8348bc5 elementor-widget elementor-widget-heading\" data-id=\"8348bc5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vulnerabilidad Unclosed Fortinet VPN permite un ataque de cifrado\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb03842 e-con-full e-flex e-con e-child\" data-id=\"eb03842\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-91d0988 elementor-widget elementor-widget-text-editor\" data-id=\"91d0988\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Al explotar una vulnerabilidad en FortiOS (un sistema operativo que se utiliza principalmente en productos Fortigate SSL VPN de Fortinet), los atacantes han logrado recientemente infiltrar malware llamado \u00abCring\u00bb en las redes de las v\u00edctimas para hacer inaccesibles sistemas enteros en el peor de los casos. Las empresas industriales occidentales parecen verse especialmente afectadas. Averigua c\u00f3mo es el ataque y qu\u00e9 puedes hacer para evitarlo.  <\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f85a5ad e-flex e-con-boxed e-con e-parent\" data-id=\"f85a5ad\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-fad2031 e-con-full e-flex e-con e-child\" data-id=\"fad2031\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8282d30 elementor-widget elementor-widget-text-editor\" data-id=\"8282d30\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>\u00bfQu\u00e9 ha pasado?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ee744d2 e-con-full e-flex e-con e-child\" data-id=\"ee744d2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ea6506 elementor-widget elementor-widget-text-editor\" data-id=\"5ea6506\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La semana pasada, investigadores de seguridad de la empresa de software Kaspersky informaron sobre el descubrimiento de un nuevo ransomware. Este es un programa que cifra archivos o sistemas completos, tras lo cual se exige un rescate al usuario para que puedan ser liberados de nuevo. Los ciberdelincuentes utilizan el software reci\u00e9n descubierto explotando productos \u00abFortigate SSL VPN\u00bb no parcheados, es decir, a trav\u00e9s de dispositivos sin actualizaciones de seguridad actuales. Los investigadores descubrieron que las empresas industriales en pa\u00edses europeos son los principales objetivos de estos ataques. El malware fue llamado \u00abransomware Cring\u00bb. La vulnerabilidad utilizada para distribuir el malware, que recibi\u00f3 el n\u00famero CVE-2018-13379, fue descubierta por primera vez en 2018. Desde entonces, los dispositivos Fortinet han sido atacados varias veces. La combinaci\u00f3n de la vulnerabilidad relacionada con el nuevo malware \u00abCring\u00bb, conocido desde 2018, descrita al principio es una amenaza reci\u00e9n descubierta que no debe ignorarse debido a sus graves consecuencias.       <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f1dfa8e e-flex e-con-boxed e-con e-parent\" data-id=\"f1dfa8e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bf4f09a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"bf4f09a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a82985c e-flex e-con-boxed e-con e-parent\" data-id=\"a82985c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-482032b e-con-full e-flex e-con e-child\" data-id=\"482032b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b5f6a5c elementor-widget elementor-widget-text-editor\" data-id=\"b5f6a5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>\u00bfCu\u00e1les son los riesgos para mi empresa?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8f5d6ed e-con-full e-flex e-con e-child\" data-id=\"8f5d6ed\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-057f5b5 elementor-widget elementor-widget-text-editor\" data-id=\"057f5b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Si tiene \u00e9xito, este ataque remoto puede provocar que los archivos y ordenadores queden cifrados y, por tanto, inutilizables. Sin embargo, sobre todo, los servidores utilizados para controlar el proceso industrial (por ejemplo, para la producci\u00f3n de bienes) tambi\u00e9n pueden ser cifrados; como resultado, el proceso tambi\u00e9n se cerrar\u00eda. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6237d73 e-flex e-con-boxed e-con e-parent\" data-id=\"6237d73\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9dde6dc elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"9dde6dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-02dd0e9 e-flex e-con-boxed e-con e-parent\" data-id=\"02dd0e9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-16d621d e-con-full e-flex e-con e-child\" data-id=\"16d621d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-89904c7 elementor-widget elementor-widget-text-editor\" data-id=\"89904c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>\u00bfC\u00f3mo funciona el ataque en detalle?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fae461d e-con-full e-flex e-con e-child\" data-id=\"fae461d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0f04793 elementor-widget elementor-widget-text-editor\" data-id=\"0f04793\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Todo el ataque es multietapa y complejo. Los perpetradores obtienen acceso inicial a trav\u00e9s <a href=\"https:\/\/www.fortiguard.com\/psirt\/FG-IR-18-384\">de vulnerabilidades <\/a>no cerradas y, por tanto, dispositivos <a href=\"http:\/\/52.57.197.213\/2022\/04\/26\/vpn\/\">VPN<\/a> Fortinet vulnerables. Esto no permite que los dispositivos FortiOS en s\u00ed se vean comprometidos directamente. Pero s\u00ed permite a los atacantes obtener todas las combinaciones de nombre de usuario y contrase\u00f1a de todos los usuarios de VPN (que se hayan autenticado al menos una vez en el dispositivo), siempre que el endpoint VPN del dispositivo est\u00e9 configurado para proporcionar servicios VPN a la empresa.   <\/p><p>Si el atacante accede a esta informaci\u00f3n, puede usar las credenciales VPN de un empleado de la empresa para acceder a la red interna, que se hace accesible a trav\u00e9s del t\u00fanel VPN. Ante todo, esto no significa que un delincuente pueda comprometer todos los sistemas de la red solo explotando esta vulnerabilidad. Pero obtiene una mejor visi\u00f3n de la red. De este modo, es posible lanzar otros ataques. Si la v\u00edctima es negligente, las cuentas VPN est\u00e1n vinculadas a las cuentas del dominio (como en el caso de Kaspersky). Esto puede hacer posible iniciar sesi\u00f3n en un ordenador con acceso remoto e infectar la red desde all\u00ed.     <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cdadbd8 e-flex e-con-boxed e-con e-parent\" data-id=\"cdadbd8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-104dd95 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"104dd95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f6e5251 e-flex e-con-boxed e-con e-parent\" data-id=\"f6e5251\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f1cf26c e-con-full e-flex e-con e-child\" data-id=\"f1cf26c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ee082fd elementor-widget elementor-widget-text-editor\" data-id=\"ee082fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>\u00bfQu\u00e9 puedo hacer?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bc25934 e-con-full e-flex e-con e-child\" data-id=\"bc25934\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b46b6f elementor-widget elementor-widget-text-editor\" data-id=\"2b46b6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Recomendamos que avances en varios pasos:<\/p>\n<p><strong>Paso 1<\/strong><\/p>\n<p>Comprueba si t\u00fa o tu empresa ten\u00e9is productos VPN SSL de Fortigate&nbsp;&nbsp;. Como los dispositivos deben comprarse o alquilarse, esto debe investigarse a trav\u00e9s de la administraci\u00f3n de TI o, si es necesario, del departamento de contabilidad. <\/p>\n<p><br><\/p><p><b>Paso 2<\/b><\/p>\n<p>Si es as\u00ed, comprueba qu\u00e9 versi\u00f3n tienes. Las siguientes versiones son vulnerables: <\/p>\n<p>FortiOS 6.0 \u2013 6.0.0 a 6.0.4<\/p>\n<p>FortiOS 5.6 \u2013 5.6.3 a 5.6.7<\/p>\n<p>FortiOS 5.4 \u2013 5.4.6 a 5.4.12<\/p>\n<p><br><\/p><p><b>Paso 3<\/b><\/p>\n<p>Actualiza el software del dispositivo a la \u00faltima versi\u00f3n. Recuerda mantener siempre los sistemas actualizados, incluso si tus dispositivos no figuran en la lista de dispositivos vulnerables mencionada arriba. <\/p>\n<p><br><\/p><p><b>Paso 4<\/b><\/p>\n<p>Actualiza tu software de seguridad a las \u00faltimas versiones y mantenlo siempre actualizado. Adem\u00e1s, aseg\u00farate de que todos los m\u00f3dulos de tus soluciones de seguridad est\u00e9n siempre activados. <\/p>\n<p><br><\/p><p><b>Paso 5<\/b><\/p>\n<p>Revisa las pol\u00edticas de seguridad de tu organizaci\u00f3n y aseg\u00farate de que los usuarios solo puedan acceder a los sistemas necesarios para sus necesidades operativas.<\/p>\n<p><br><\/p><p><b>Paso 6<\/b><\/p>\n<p>Restringir el acceso a VPN entre diferentes ubicaciones, cerrar todos los puertos que no sean necesarios para fines operativos.<\/p>\n<p><br><\/p><p><b>Paso 7<\/b><\/p>\n<p>Aseg\u00farate de tener al menos tres <a href=\"http:\/\/52.57.197.213\/2022\/04\/19\/backup\/\">copias de seguridad actualizadas<\/a> regularmente de tus sistemas cr\u00edticos que te permitan restaurar tus operaciones en caso de un ataque imprevisto.<\/p>\n<p><\/p>\n<p>Si tienes alguna pregunta o sospechas que has sido atacado, no dudes en ponerte en contacto con nosotros.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>14.04.2021 Vulnerabilidad Unclosed Fortinet VPN permite un ataque de cifrado Al explotar una vulnerabilidad en FortiOS (un sistema operativo que se utiliza principalmente en productos Fortigate SSL VPN de Fortinet), los atacantes han logrado recientemente infiltrar malware llamado \u00abCring\u00bb en las redes de las v\u00edctimas para hacer inaccesibles sistemas enteros en el peor de los [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[66],"tags":[],"class_list":["post-27945","post","type-post","status-publish","format-standard","hentry","category-advertencia-de-peligro"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vulnerabilidad Unclosed Fortinet VPN permite un ataque de cifrado - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/es\/vulnerabilidad-unclosed-fortinet-vpn-permite-un-ataque-de-cifrado\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerabilidad Unclosed Fortinet VPN permite un ataque de cifrado - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"14.04.2021 Vulnerabilidad Unclosed Fortinet VPN permite un ataque de cifrado Al explotar una vulnerabilidad en FortiOS (un sistema operativo que se utiliza principalmente en productos Fortigate SSL VPN de Fortinet), los atacantes han logrado recientemente infiltrar malware llamado \u00abCring\u00bb en las redes de las v\u00edctimas para hacer inaccesibles sistemas enteros en el peor de los [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/es\/vulnerabilidad-unclosed-fortinet-vpn-permite-un-ataque-de-cifrado\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-14T14:12:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T05:42:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/vulnerabilidad-unclosed-fortinet-vpn-permite-un-ataque-de-cifrado\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/vulnerabilidad-unclosed-fortinet-vpn-permite-un-ataque-de-cifrado\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Vulnerabilidad Unclosed Fortinet VPN permite un ataque de cifrado\",\"datePublished\":\"2021-04-14T14:12:00+00:00\",\"dateModified\":\"2026-03-31T05:42:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/vulnerabilidad-unclosed-fortinet-vpn-permite-un-ataque-de-cifrado\\\/\"},\"wordCount\":752,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/vulnerabilidad-unclosed-fortinet-vpn-permite-un-ataque-de-cifrado\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\",\"articleSection\":[\"Advertencia de peligro\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/es\\\/vulnerabilidad-unclosed-fortinet-vpn-permite-un-ataque-de-cifrado\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/vulnerabilidad-unclosed-fortinet-vpn-permite-un-ataque-de-cifrado\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/es\\\/vulnerabilidad-unclosed-fortinet-vpn-permite-un-ataque-de-cifrado\\\/\",\"name\":\"Vulnerabilidad Unclosed Fortinet VPN permite un ataque de cifrado - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/vulnerabilidad-unclosed-fortinet-vpn-permite-un-ataque-de-cifrado\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/vulnerabilidad-unclosed-fortinet-vpn-permite-un-ataque-de-cifrado\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\",\"datePublished\":\"2021-04-14T14:12:00+00:00\",\"dateModified\":\"2026-03-31T05:42:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/vulnerabilidad-unclosed-fortinet-vpn-permite-un-ataque-de-cifrado\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/es\\\/vulnerabilidad-unclosed-fortinet-vpn-permite-un-ataque-de-cifrado\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/vulnerabilidad-unclosed-fortinet-vpn-permite-un-ataque-de-cifrado\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/vulnerabilidad-unclosed-fortinet-vpn-permite-un-ataque-de-cifrado\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerabilidad Unclosed Fortinet VPN permite un ataque de cifrado\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/es\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerabilidad Unclosed Fortinet VPN permite un ataque de cifrado - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/es\/vulnerabilidad-unclosed-fortinet-vpn-permite-un-ataque-de-cifrado\/","og_locale":"es_ES","og_type":"article","og_title":"Vulnerabilidad Unclosed Fortinet VPN permite un ataque de cifrado - Perseus Technologies","og_description":"14.04.2021 Vulnerabilidad Unclosed Fortinet VPN permite un ataque de cifrado Al explotar una vulnerabilidad en FortiOS (un sistema operativo que se utiliza principalmente en productos Fortigate SSL VPN de Fortinet), los atacantes han logrado recientemente infiltrar malware llamado \u00abCring\u00bb en las redes de las v\u00edctimas para hacer inaccesibles sistemas enteros en el peor de los [&hellip;]","og_url":"https:\/\/perseus.de\/es\/vulnerabilidad-unclosed-fortinet-vpn-permite-un-ataque-de-cifrado\/","og_site_name":"Perseus Technologies","article_published_time":"2021-04-14T14:12:00+00:00","article_modified_time":"2026-03-31T05:42:47+00:00","og_image":[{"width":1200,"height":300,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Xenia Silbe","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/es\/vulnerabilidad-unclosed-fortinet-vpn-permite-un-ataque-de-cifrado\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/es\/vulnerabilidad-unclosed-fortinet-vpn-permite-un-ataque-de-cifrado\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Vulnerabilidad Unclosed Fortinet VPN permite un ataque de cifrado","datePublished":"2021-04-14T14:12:00+00:00","dateModified":"2026-03-31T05:42:47+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/es\/vulnerabilidad-unclosed-fortinet-vpn-permite-un-ataque-de-cifrado\/"},"wordCount":752,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/es\/vulnerabilidad-unclosed-fortinet-vpn-permite-un-ataque-de-cifrado\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png","articleSection":["Advertencia de peligro"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/es\/vulnerabilidad-unclosed-fortinet-vpn-permite-un-ataque-de-cifrado\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/es\/vulnerabilidad-unclosed-fortinet-vpn-permite-un-ataque-de-cifrado\/","url":"https:\/\/perseus.de\/es\/vulnerabilidad-unclosed-fortinet-vpn-permite-un-ataque-de-cifrado\/","name":"Vulnerabilidad Unclosed Fortinet VPN permite un ataque de cifrado - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/es\/vulnerabilidad-unclosed-fortinet-vpn-permite-un-ataque-de-cifrado\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/es\/vulnerabilidad-unclosed-fortinet-vpn-permite-un-ataque-de-cifrado\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png","datePublished":"2021-04-14T14:12:00+00:00","dateModified":"2026-03-31T05:42:47+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/es\/vulnerabilidad-unclosed-fortinet-vpn-permite-un-ataque-de-cifrado\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/es\/vulnerabilidad-unclosed-fortinet-vpn-permite-un-ataque-de-cifrado\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/perseus.de\/es\/vulnerabilidad-unclosed-fortinet-vpn-permite-un-ataque-de-cifrado\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/es\/vulnerabilidad-unclosed-fortinet-vpn-permite-un-ataque-de-cifrado\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Vulnerabilidad Unclosed Fortinet VPN permite un ataque de cifrado"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/es\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/27945","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/comments?post=27945"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/27945\/revisions"}],"predecessor-version":[{"id":27946,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/27945\/revisions\/27946"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/media?parent=27945"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/categories?post=27945"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/tags?post=27945"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}