{"id":3858,"date":"2024-04-03T16:20:08","date_gmt":"2024-04-03T21:20:08","guid":{"rendered":"https:\/\/www.itechsas.com\/blog\/?p=3858"},"modified":"2024-04-03T16:20:09","modified_gmt":"2024-04-03T21:20:09","slug":"alerta-por-vulnerabilidad-critica-de-fortinet-que-esta-siendo-explotada","status":"publish","type":"post","link":"https:\/\/www.itechsas.com\/blog\/ciberseguridad\/alerta-por-vulnerabilidad-critica-de-fortinet-que-esta-siendo-explotada\/","title":{"rendered":"Alerta por vulnerabilidad critica de Fortinet que esta siendo explotada"},"content":{"rendered":"\n<p><strong>La agencia de ciberseguridad estadounidense -CISA- advierte a las empresas que una vulnerabilidad en el servidor de gesti\u00f3n empresarial (EMS) Fortinet FortiClient recientemente revelada como CVE-2023-48788 est\u00e1 siendo explotada en ataques.<\/strong><\/p>\n\n\n\n<p>La vulnerabilidad que afecta a la soluci\u00f3n de gesti\u00f3n de endpoints empresariales  (EMS FortiClient) se ha descrito como un\u00a0<strong>error cr\u00edtico de inyecci\u00f3n SQL<\/strong> valorado con un <strong>puntaje de 9.3<\/strong>,\u00a0que puede ser aprovechado por un atacante no autenticado para ejecutar c\u00f3digo arbitrario o comandos mediante solicitudes especialmente dise\u00f1adas.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-10.png\"><img data-opt-id=220213851  fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"515\" src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:515\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-10.png\" alt=\"\" class=\"wp-image-3859\" srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:515\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-10.png 1024w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:151\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-10.png 300w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:768\/h:386\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-10.png 768w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:830\/h:417\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-10.png 830w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1175\/h:591\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-10.png 1175w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/a><figcaption class=\"wp-element-caption\"><a href=\"https:\/\/fortiguard.fortinet.com\/psirt\/FG-IR-24-007\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/fortiguard.fortinet.com\/psirt\/FG-IR-24-007 <\/a><\/figcaption><\/figure>\n\n\n\n<p>El Centro Nacional de Seguridad Cibern\u00e9tica (NCSC) del Reino Unido y un empleado de Fortinet han sido acreditados por descubrir el CVE-2023-48788.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Prueba de concepto de explotaci\u00f3n <\/h2>\n\n\n\n<p>El 21 de marzo, la empresa de ciberseguridad Horizon3.ai revel\u00f3\u00a0<a href=\"https:\/\/www.horizon3.ai\/attack-research\/attack-blogs\/cve-2023-48788-fortinet-forticlientems-sql-injection-deep-dive\/\" target=\"_blank\" rel=\"noreferrer noopener\">detalles t\u00e9cnicos<\/a>\u00a0de la vulnerabilidad y public\u00f3 un exploit de prueba de concepto (PoC).<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-11.png\"><img data-opt-id=512604026  fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"293\" src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:293\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-11.png\" alt=\"\" class=\"wp-image-3860\" srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:293\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-11.png 1024w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:86\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-11.png 300w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:768\/h:219\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-11.png 768w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:830\/h:237\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-11.png 830w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1162\/h:332\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-11.png 1162w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/a><figcaption class=\"wp-element-caption\">B\u00fasqueda de cadenas SQL.<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-12.png\"><img data-opt-id=1007175129  data-opt-src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-12.png\"  decoding=\"async\" width=\"753\" height=\"388\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-3861\" old-srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:753\/h:388\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-12.png 753w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:155\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-12.png 300w\" \/><\/a><figcaption class=\"wp-element-caption\">Conexiones FCTDas con la base de datos local a trav\u00e9s de tcp\/1433.<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-13.png\"><img data-opt-id=235409546  data-opt-src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:188\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-13.png\"  loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"188\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%201024%20188%22%20width%3D%221024%22%20height%3D%22188%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%221024%22%20height%3D%22188%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-3862\" old-srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:188\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-13.png 1024w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:55\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-13.png 300w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:768\/h:141\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-13.png 768w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:830\/h:152\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-13.png 830w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1113\/h:204\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-13.png 1113w\" \/><\/a><figcaption class=\"wp-element-caption\">Registros de FcmDaemon con detalles sobre las comunicaciones.<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-14.png\"><img data-opt-id=359745026  data-opt-src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:196\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-14.png\"  loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"196\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%201024%20196%22%20width%3D%221024%22%20height%3D%22196%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%221024%22%20height%3D%22196%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-3863\" old-srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:196\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-14.png 1024w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:57\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-14.png 300w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:768\/h:147\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-14.png 768w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:830\/h:159\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-14.png 830w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1244\/h:238\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-14.png 1244w\" \/><\/a><figcaption class=\"wp-element-caption\">Uso de Windbg para examinar el formato del mensaje.<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-15.png\"><img data-opt-id=1951460324  data-opt-src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:409\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-15.png\"  loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"409\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%201024%20409%22%20width%3D%221024%22%20height%3D%22409%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%221024%22%20height%3D%22409%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-3864\" old-srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:409\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-15.png 1024w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:120\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-15.png 300w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:768\/h:307\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-15.png 768w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:830\/h:331\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-15.png 830w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1192\/h:476\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-15.png 1192w\" \/><\/a><figcaption class=\"wp-element-caption\">Consulta SQL en el registro DAS usando \u00a0script de Python.<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-16.png\"><img data-opt-id=1652482554  data-opt-src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-16.png\"  loading=\"lazy\" decoding=\"async\" width=\"864\" height=\"173\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-3866\" old-srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:864\/h:173\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-16.png 864w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:60\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-16.png 300w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:768\/h:154\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-16.png 768w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:830\/h:166\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-16.png 830w\" \/><\/a><\/figure>\n\n\n\n<p><strong>CISA agreg\u00f3 CVE-2023-48788<\/strong>\u00a0a su cat\u00e1logo de vulnerabilidades explotadas conocidas (KEV) el lunes, instando a las organizaciones a instalar parches o implementar mitigaciones lo antes posible.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-17.png\"><img data-opt-id=261635365  data-opt-src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-17.png\"  loading=\"lazy\" decoding=\"async\" width=\"1019\" height=\"430\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-3867\" old-srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1019\/h:430\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-17.png 1019w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:127\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-17.png 300w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:768\/h:324\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-17.png 768w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:830\/h:350\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-17.png 830w\" \/><\/a><figcaption class=\"wp-element-caption\"><a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2024\/03\/25\/cisa-adds-three-known-exploited-vulnerabilities-catalog\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.cisa.gov\/news-events\/alerts\/2024\/03\/25\/cisa-adds-three-known-exploited-vulnerabilities-catalog <\/a><\/figcaption><\/figure>\n\n\n\n<p>No parece haber informaci\u00f3n disponible sobre los ataques que aprovechan CVE-2023-48788, pero las vulnerabilidades de los productos Fortinet a menudo han sido\u00a0<a href=\"https:\/\/www.securityweek.com\/chinese-hackers-exploited-fortinet-vpn-vulnerability-zero-day\/\" target=\"_blank\" rel=\"noreferrer noopener\">explotadas por actores de amenazas patrocinados por el estado<\/a>, como lo sucedido con los ataques realizados por China frente a la <strong>vulnerabilidad de d\u00eda cero de Fortinet VPN en 2023<\/strong>.<\/p>\n\n\n\n<p>La Fundaci\u00f3n Shadowserver inform\u00f3 haber visto 130 sistemas aparentemente\u00a0<a href=\"https:\/\/twitter.com\/Shadowserver\/status\/1771963616092193085\" target=\"_blank\" rel=\"noreferrer noopener\">vulnerables<\/a>\u00a0a los que se hab\u00eda accedido directamente desde Internet hasta el 23 de marzo, incluidos 30 en los Estados Unidos.<\/p>\n\n\n\n<p>En el portal de <a href=\"https:\/\/www.cvedetails.com\/vendor\/3080\/Fortinet.html\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>www.cvedetails.com\/<\/strong><\/a> se reportan actualmente <strong>711 vulnerabilidades<\/strong> asociadas al fabricante Fortinet y en lo recorrido de 2024 se han detectado 12 vulnerabilidades <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-18.png\"><img data-opt-id=763123758  data-opt-src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:492\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-18.png\"  loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"492\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%201024%20492%22%20width%3D%221024%22%20height%3D%22492%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%221024%22%20height%3D%22492%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-3868\" old-srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1024\/h:492\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-18.png 1024w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:144\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-18.png 300w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:768\/h:369\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-18.png 768w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:830\/h:399\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-18.png 830w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:1035\/h:497\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-18.png 1035w\" \/><\/a><figcaption class=\"wp-element-caption\">https:\/\/www.cvedetails.com\/vendor\/3080\/Fortinet.html<\/figcaption><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>&gt;&gt; M\u00e1s detalles<\/strong>&nbsp;en nuestros canales privados de&nbsp;<mark><strong><a href=\"https:\/\/whatsapp.com\/channel\/0029VZzkzdhIXnltJlXVEA3J\" target=\"_blank\" rel=\"noreferrer noopener\">WhatsApp<\/a>&nbsp;<\/strong>y&nbsp;<a href=\"https:\/\/t.me\/itechsas\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Telegram<\/strong><\/a>.<\/mark><\/p>\n\n\n\n<p><strong>Es muy importante que se identifiquen las vulnerabilidades en los sistemas y aplicaciones antes que sean descubiertas por los actores maliciosos que aprovechan esas debilidades para realizar los ataques en b\u00fasqueda de beneficios econ\u00f3micos.<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/www.itechsas.com\/blog\/ciberseguridad\/muchas-empresas-privadas-y-de-gobierno-afectadas-por-ciberataque-de-ransomware-masivo\/\" target=\"_blank\" rel=\"noreferrer noopener\">Muchas empresas privadas y de gobierno afectadas por ciberataque de ransomware masivo<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-8.png\"><img data-opt-id=109291328  data-opt-src=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-8.png\"  loading=\"lazy\" decoding=\"async\" width=\"529\" height=\"145\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"\" class=\"wp-image-3845\" old-srcset=\"https:\/\/ml4lvzevoq9y.i.optimole.com\/w:529\/h:145\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-8.png 529w, https:\/\/ml4lvzevoq9y.i.optimole.com\/w:300\/h:82\/q:mauto\/f:best\/https:\/\/www.itechsas.com\/blog\/wp-content\/uploads\/2024\/04\/image-8.png 300w\" \/><\/a><\/figure>\n\n\n\n<p>Recibe un&nbsp;<strong>Diagn\u00f3stico Sin Costo&nbsp;<\/strong>del estado de seguridad de tu aplicaci\u00f3n o sitio web dando clic en el siguiente enlace:<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-vivid-red-background-color has-background wp-element-button\" href=\"https:\/\/forms.gle\/5yvxp32NRbNSGQ5W9\" target=\"_blank\" rel=\"noreferrer noopener\">Reciba Diagnostico sin Costo<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>La agencia de ciberseguridad estadounidense -CISA- advierte a las empresas que una vulnerabilidad en el servidor de gesti\u00f3n empresarial (EMS) Fortinet FortiClient recientemente revelada como CVE-2023-48788 est\u00e1 siendo explotada en ataques. La vulnerabilidad que afecta a la soluci\u00f3n de gesti\u00f3n de endpoints empresariales (EMS FortiClient) se ha descrito como un\u00a0error cr\u00edtico de inyecci\u00f3n SQL valorado&hellip;<\/p>\n","protected":false},"author":1,"featured_media":3872,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[433,432,357,434,91],"class_list":["post-3858","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad","tag-cve-2023-48788","tag-forticlient","tag-fortinet","tag-inyeccion-sql","tag-vulnerabilidad"],"_links":{"self":[{"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/posts\/3858","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/comments?post=3858"}],"version-history":[{"count":10,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/posts\/3858\/revisions"}],"predecessor-version":[{"id":3879,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/posts\/3858\/revisions\/3879"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/media\/3872"}],"wp:attachment":[{"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/media?parent=3858"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/categories?post=3858"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itechsas.com\/blog\/wp-json\/wp\/v2\/tags?post=3858"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}