{"id":71,"date":"2025-06-30T16:48:35","date_gmt":"2025-06-30T14:48:35","guid":{"rendered":"https:\/\/migracion.ffmm.mil.py\/digetic\/?p=71"},"modified":"2025-07-03T21:08:20","modified_gmt":"2025-07-03T19:08:20","slug":"vulnerabilidad-de-los-servicios-de-escritorio-remoto-de-windows","status":"publish","type":"post","link":"https:\/\/ffmm.mil.py\/digetic\/2025\/06\/30\/vulnerabilidad-de-los-servicios-de-escritorio-remoto-de-windows\/","title":{"rendered":"Vulnerabilidad de los servicios de Escritorio Remoto de Windows"},"content":{"rendered":"\n<p>Una vulnerabilidad de seguridad alta en los servicios de Escritorio Remoto de Windows podr\u00eda permitir a actores maliciosos no autorizados ejecutar c\u00f3digo arbitrario de forma remota sin autenticaci\u00f3n.<\/p>\n\n\n\n<p><strong>Producto<\/strong><strong>s<\/strong><strong>&nbsp;a<\/strong><strong>fectado<\/strong><strong>s<\/strong><\/p>\n\n\n\n<p><strong>Impacto<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Windows Server 2008 (sistemas de 32 bits y basados \u200b\u200ben x64 con Service Pack 2), Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, Windows Server 2022 y la \u00faltima versi\u00f3n de Windows Server 2025.<\/li>\n<\/ul>\n\n\n\n<p><strong>La vulnerabilidad se ha identificado como:<\/strong><\/p>\n\n\n\n<p><strong>CVE-2025-32710:<\/strong>&nbsp;con una puntuaci\u00f3n de 8.1 en CVSS v3.1. Existe una vulnerabilidad de uso despu\u00e9s de la liberaci\u00f3n combinada con una condici\u00f3n de carrera en el servicio Remote Desktop Gateway, lo que podr\u00eda permitir a los actores maliciosos obtener control total sobre los sistemas vulnerables a trav\u00e9s de la explotaci\u00f3n basada en la red.<\/p>\n\n\n\n<p><strong>Recomendaci\u00f3n<\/strong><\/p>\n\n\n\n<p>Actualizar a la \u00faltima versi\u00f3n disponible a trav\u00e9s del sitio web oficial del fabricante.<\/p>\n\n\n\n<p><strong>Referencias<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-32710\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-32710\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Una vulnerabilidad de seguridad alta en los servicios de Escritorio Remoto de Windows podr\u00eda permitir a actores maliciosos no autorizados ejecutar c\u00f3digo arbitrario de forma remota sin autenticaci\u00f3n. Productos&nbsp;afectados Impacto La vulnerabilidad se ha identificado como: CVE-2025-32710:&nbsp;con una puntuaci\u00f3n de 8.1 en CVSS v3.1. Existe una vulnerabilidad de uso despu\u00e9s de la liberaci\u00f3n combinada con [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":121,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-71","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-noticias"],"_links":{"self":[{"href":"https:\/\/ffmm.mil.py\/digetic\/wp-json\/wp\/v2\/posts\/71","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ffmm.mil.py\/digetic\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ffmm.mil.py\/digetic\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ffmm.mil.py\/digetic\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ffmm.mil.py\/digetic\/wp-json\/wp\/v2\/comments?post=71"}],"version-history":[{"count":2,"href":"https:\/\/ffmm.mil.py\/digetic\/wp-json\/wp\/v2\/posts\/71\/revisions"}],"predecessor-version":[{"id":80,"href":"https:\/\/ffmm.mil.py\/digetic\/wp-json\/wp\/v2\/posts\/71\/revisions\/80"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ffmm.mil.py\/digetic\/wp-json\/wp\/v2\/media\/121"}],"wp:attachment":[{"href":"https:\/\/ffmm.mil.py\/digetic\/wp-json\/wp\/v2\/media?parent=71"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ffmm.mil.py\/digetic\/wp-json\/wp\/v2\/categories?post=71"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ffmm.mil.py\/digetic\/wp-json\/wp\/v2\/tags?post=71"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}