{"id":1544,"date":"2019-05-06T23:25:16","date_gmt":"2019-05-06T20:25:16","guid":{"rendered":"https:\/\/www.nav.ro\/blog\/?p=1544"},"modified":"2019-05-21T21:27:22","modified_gmt":"2019-05-21T18:27:22","slug":"cisco-avertizeaza-utilizatorii-ruter-ului-seria-9000-si-ios-xe-sa-aplice-urgent-patch-uri-pentru-bresele-de-securitate","status":"publish","type":"post","link":"https:\/\/www.nav.ro\/blog\/cisco-avertizeaza-utilizatorii-ruter-ului-seria-9000-si-ios-xe-sa-aplice-urgent-patch-uri-pentru-bresele-de-securitate\/","title":{"rendered":"Cisco avertizeaz\u0103 utilizatorii ruter-ului seria 9000 \u0219i IOS\/XE s\u0103 aplice urgent patch-uri pentru bre\u0219ele de securitate"},"content":{"rendered":"\n<p>Cisco a lansat de cur\u00e2nd 31 de avertismente privind securitatea, \u0219i a \u00eendreptat aten\u021bia clien\u021bilor asupra patch-urilor &#8222;critice&#8221; pentru IOS \u0219i IOS XE Software Cluster Management \u0219i software-ul IOS pentru routerele Cisco ASR 9000 Series. O serie de alte vulnerabilit\u0103\u021bi au, de asemenea, nevoie de aten\u021bie \u00een cazul \u00een care utilizatorii folosesc controlere wireless LAN Cisco.<\/p>\n\n\n\n<p>Primul patch critic are de a face cu o vulnerabilitate \u00een codul de procesare Cisco Cluster Management Protocol (CMP) din Cisco IOS \u0219i Cisco IOS XE, care ar putea permite unui atacator s\u0103 trimit\u0103 op\u021biuni Telnet specifice CMP de la distan\u021b\u0103 \u00een timpul stabilirii unei sesiuni Telnet cu un dispozitiv Cisco afectat, configurat s\u0103 accepte acest tip de conexiuni. Acest tip de atac ar putea permite unui atacator s\u0103 execute un cod arbitrar \u0219i s\u0103 ob\u021bin\u0103 un control complet al dispozitivului sau s\u0103 provoace un restart al dispozitivului afectat, au declarat cei de la Cisco.<\/p>\n\n\n\n<p>Problema are un num\u0103r CVSS (Common Vulnerability Scoring System) de 9,8 din 10.<\/p>\n\n\n\n<p>Potrivit Cisco, Protocolul de management al clusterului utilizeaz\u0103 intern Telnet ca \u0219i protocol de semnalizare \u0219i comand\u0103 \u00eentre membrii grupului. Vulnerabilitatea se datoreaz\u0103 combin\u0103rii a doi factori:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>E\u0219ecului de a restric\u021biona utilizarea op\u021biunilor Telnet specifice CMP numai pentru comunica\u021biile interne, locale, \u00eentre membrii clusterului \u0219i acceptarea \u0219i procesarea acestor op\u021biuni pe orice conexiune Telnet c\u0103tre un dispozitiv afectat<\/li><li>Procesarea incorect\u0103 a op\u021biunilor Telnet specifice pentru CMP.<\/li><\/ul>\n\n\n\n<p>Cisco afirm\u0103 c\u0103 vulnerabilitatea poate fi exploatat\u0103 \u00een timpul negocierii sesiunii Telnet fie prin intermediul adresei IPv4, fie cea IPv6. Aceast\u0103 vulnerabilitate poate fi exploatat\u0103 numai printr-o sesiune Telnet stabilit\u0103 pe dispozitiv; trimiterea op\u021biunilor incorecte pe sesiunile Telnet prin dispozitiv nu va declan\u0219a vulnerabilitatea.<\/p>\n\n\n\n<p>Compania declar\u0103 c\u0103 nu exist\u0103 solu\u021bii pentru aceast\u0103 problem\u0103, \u00eens\u0103 dezactivarea Telnet ca protocol permis pentru conexiunile de intrare ar elimina vectorul de exploatare. Cisco recomand\u0103 dezactivarea Telnet \u0219i utilizarea \u00een schimb a conexiunii prin SSH. Mai multe informa\u021bii despre modul de efectuare a celor dou\u0103 pot fi g\u0103site \u00een Ghidul Cisco pentru \u00eent\u0103rirea securit\u0103\u021bii dispozitivele IOS Cisco. <\/p>\n\n\n\n<p>Cel de-al doilea patch critic implic\u0103 o vulnerabilitate \u00een modul sysadmin al ma\u0219inii virtuale (VM) de la routerele din clasa ASR 9000 de la Cisco, care ruleaz\u0103 aplica\u021bii Cisco IOS XR pe 64 de bi\u021bi. Software-ul ar putea permite unui atacator de la distan\u021b\u0103 s\u0103 acceseze aplica\u021bii interne care ruleaz\u0103 pe sysadmin VM, a anun\u021bat Cisco. Aceast\u0103 vulnerabilitate are de asemenea un num\u0103r CVSS de 9,8. <\/p>\n\n\n\n<p>Cisco a declarat c\u0103 vulnerabilitatea se datoreaz\u0103 unei izola\u021bii incorecte a interfe\u021bei secundare de management din aplica\u021biile interne sysadmin. Un atacator ar putea exploata aceast\u0103 vulnerabilitate prin conectarea la una din aplica\u021biile interne. O exploatare reu\u0219it\u0103 ar putea avea ca rezultat condi\u021bii instabile, inclusiv Denial of Service (DoS) \u0219i accesul neautorizat de la distan\u021b\u0103 la dispozitiv, a afirmat Cisco.<\/p>\n\n\n\n<p>Cisco a lansat actualiz\u0103ri gratuite de software care abordeaz\u0103 vulnerabilitatea descris\u0103 \u00een aceast\u0103 recomandare.<\/p>\n\n\n\n<p>\u00cen cele din urm\u0103, Cisco a scris c\u0103 mai multe vulnerabilit\u0103\u021bi din configura\u021bia cu administrare GUI a software-ului Cisco Wireless LAN Controller (WLC) ar putea permite unui atacator autentificat de la distan\u021b\u0103 s\u0103 provoace restartarea nea\u0219teptat\u0103 a dispozitivului \u00een timpul configur\u0103rii dispozitivului atunci c\u00e2nd administratorul folose\u0219te modul GUI, pe un dispozitiv afectat. Atacatorul ar trebui s\u0103 aib\u0103 acredit\u0103ri de administrator valide pe dispozitiv pentru ca acest atac s\u0103 func\u021bioneze, a afirmat Cisco.<\/p>\n\n\n\n<p>&#8222;Aceste vulnerabilit\u0103\u021bi se datoreaz\u0103 valid\u0103rii incomplete a intr\u0103rilor pentru op\u021biunile de configurare nea\u0219teptate pe care atacatorul le-ar putea trimite \u00een timp ce acceseaz\u0103 meniurile de configurare GUI. Un atacator ar putea s\u0103 exploateze aceste vulnerabilit\u0103\u021bi prin autentificarea pe dispozitiv \u0219i prin trimiterea de date de utilizator artizanale atunci c\u00e2nd utilizeaz\u0103 func\u021bia de configurare GUI administrativ\u0103 &#8222;, au declarat cei de la Cisco.<\/p>\n\n\n\n<p>&#8222;Aceste vulnerabilit\u0103\u021bi au o Evaluare a Impactului asupra Securit\u0103\u021bii (SIR) ridicat\u0103, deoarece ar putea fi exploatate atunci c\u00e2nd fix-ul pentru Cisco Wireless LAN Controller Cross-Site Request Forgery Vulnerability nu exist\u0103&#8221;, a declarat Cisco. &#8222;\u00cen acest caz, un atacator neautenticat care exploateaz\u0103 mai \u00eent\u00e2i vulnerabilitatea de falsificare a cererii \u00eentre site-uri, ar putea executa comenzi arbitrare cu privilegii de administrator, exploat\u00e2nd vulnerabilit\u0103\u021bile descrise \u00een acest aviz.&#8221;<\/p>\n\n\n\n<p>Cisco a lansat actualiz\u0103ri software care abordeaz\u0103 aceste vulnerabilit\u0103\u021bi \u0219i a spus c\u0103 nu exist\u0103 alt fel de solu\u021bii.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cisco a lansat de cur\u00e2nd 31 de avertismente privind securitatea, \u0219i a \u00eendreptat aten\u021bia clien\u021bilor asupra patch-urilor &#8222;critice&#8221; pentru IOS \u0219i IOS XE Software Cluster Management \u0219i software-ul IOS pentru routerele Cisco ASR 9000 Series. O serie de alte vulnerabilit\u0103\u021bi au, de asemenea, nevoie de aten\u021bie \u00een cazul \u00een care utilizatorii folosesc controlere wireless LAN<\/p>\n","protected":false},"author":1,"featured_media":1575,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[151],"tags":[166,130,175],"class_list":["post-1544","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-noutati","tag-internet","tag-network","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cisco avertizeaz\u0103 utilizatorii ruter-ului seria 9000 \u0219i IOS\/XE s\u0103 aplice urgent patch-uri pentru bre\u0219ele de securitate - NAV.RO Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nav.ro\/blog\/cisco-avertizeaza-utilizatorii-ruter-ului-seria-9000-si-ios-xe-sa-aplice-urgent-patch-uri-pentru-bresele-de-securitate\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cisco avertizeaz\u0103 utilizatorii ruter-ului seria 9000 \u0219i IOS\/XE s\u0103 aplice urgent patch-uri pentru bre\u0219ele de securitate - NAV.RO Blog\" \/>\n<meta property=\"og:description\" content=\"Cisco a lansat de cur\u00e2nd 31 de avertismente privind securitatea, \u0219i a \u00eendreptat aten\u021bia clien\u021bilor asupra patch-urilor &#8222;critice&#8221; pentru IOS \u0219i IOS XE Software Cluster Management \u0219i software-ul IOS pentru routerele Cisco ASR 9000 Series. O serie de alte vulnerabilit\u0103\u021bi au, de asemenea, nevoie de aten\u021bie \u00een cazul \u00een care utilizatorii folosesc controlere wireless LAN\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.nav.ro\/blog\/cisco-avertizeaza-utilizatorii-ruter-ului-seria-9000-si-ios-xe-sa-aplice-urgent-patch-uri-pentru-bresele-de-securitate\/\" \/>\n<meta property=\"og:site_name\" content=\"NAV.RO Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/nav6718\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-06T20:25:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-21T18:27:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2019\/05\/Cisco.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1250\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"NAV.RO\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@nav6718\" \/>\n<meta name=\"twitter:site\" content=\"@nav6718\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"NAV.RO\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.nav.ro\/blog\/cisco-avertizeaza-utilizatorii-ruter-ului-seria-9000-si-ios-xe-sa-aplice-urgent-patch-uri-pentru-bresele-de-securitate\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/cisco-avertizeaza-utilizatorii-ruter-ului-seria-9000-si-ios-xe-sa-aplice-urgent-patch-uri-pentru-bresele-de-securitate\/\"},\"author\":{\"name\":\"NAV.RO\",\"@id\":\"https:\/\/www.nav.ro\/blog\/#\/schema\/person\/c0271febcae717bbdbc3b2c6dbdec20e\"},\"headline\":\"Cisco avertizeaz\u0103 utilizatorii ruter-ului seria 9000 \u0219i IOS\/XE s\u0103 aplice urgent patch-uri pentru bre\u0219ele de securitate\",\"datePublished\":\"2019-05-06T20:25:16+00:00\",\"dateModified\":\"2019-05-21T18:27:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/cisco-avertizeaza-utilizatorii-ruter-ului-seria-9000-si-ios-xe-sa-aplice-urgent-patch-uri-pentru-bresele-de-securitate\/\"},\"wordCount\":759,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/cisco-avertizeaza-utilizatorii-ruter-ului-seria-9000-si-ios-xe-sa-aplice-urgent-patch-uri-pentru-bresele-de-securitate\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2019\/05\/Cisco.jpg\",\"keywords\":[\"internet\",\"Network\",\"Security\"],\"articleSection\":[\"NOUT\u0102\u021aI\"],\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.nav.ro\/blog\/cisco-avertizeaza-utilizatorii-ruter-ului-seria-9000-si-ios-xe-sa-aplice-urgent-patch-uri-pentru-bresele-de-securitate\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nav.ro\/blog\/cisco-avertizeaza-utilizatorii-ruter-ului-seria-9000-si-ios-xe-sa-aplice-urgent-patch-uri-pentru-bresele-de-securitate\/\",\"url\":\"https:\/\/www.nav.ro\/blog\/cisco-avertizeaza-utilizatorii-ruter-ului-seria-9000-si-ios-xe-sa-aplice-urgent-patch-uri-pentru-bresele-de-securitate\/\",\"name\":\"Cisco avertizeaz\u0103 utilizatorii ruter-ului seria 9000 \u0219i IOS\/XE s\u0103 aplice urgent patch-uri pentru bre\u0219ele de securitate - NAV.RO Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/cisco-avertizeaza-utilizatorii-ruter-ului-seria-9000-si-ios-xe-sa-aplice-urgent-patch-uri-pentru-bresele-de-securitate\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/cisco-avertizeaza-utilizatorii-ruter-ului-seria-9000-si-ios-xe-sa-aplice-urgent-patch-uri-pentru-bresele-de-securitate\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2019\/05\/Cisco.jpg\",\"datePublished\":\"2019-05-06T20:25:16+00:00\",\"dateModified\":\"2019-05-21T18:27:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/cisco-avertizeaza-utilizatorii-ruter-ului-seria-9000-si-ios-xe-sa-aplice-urgent-patch-uri-pentru-bresele-de-securitate\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nav.ro\/blog\/cisco-avertizeaza-utilizatorii-ruter-ului-seria-9000-si-ios-xe-sa-aplice-urgent-patch-uri-pentru-bresele-de-securitate\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/www.nav.ro\/blog\/cisco-avertizeaza-utilizatorii-ruter-ului-seria-9000-si-ios-xe-sa-aplice-urgent-patch-uri-pentru-bresele-de-securitate\/#primaryimage\",\"url\":\"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2019\/05\/Cisco.jpg\",\"contentUrl\":\"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2019\/05\/Cisco.jpg\",\"width\":1250,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.nav.ro\/blog\/cisco-avertizeaza-utilizatorii-ruter-ului-seria-9000-si-ios-xe-sa-aplice-urgent-patch-uri-pentru-bresele-de-securitate\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Prima pagin\u0103\",\"item\":\"https:\/\/www.nav.ro\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cisco avertizeaz\u0103 utilizatorii ruter-ului seria 9000 \u0219i IOS\/XE s\u0103 aplice urgent patch-uri pentru bre\u0219ele de securitate\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nav.ro\/blog\/#website\",\"url\":\"https:\/\/www.nav.ro\/blog\/\",\"name\":\"NAV.RO Blog\",\"description\":\"Stiri IT\u2705 de actualitate si noutati din domeniul Hosting \u279c Gazduire Web \u279c Servere Dedicate \/ VPS \u279c DATA CENTER \u279c Domenii \u2b50 Actualizare zilnica de la expertii NAV.RO\",\"publisher\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nav.ro\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.nav.ro\/blog\/#organization\",\"name\":\"NAV Communications\",\"url\":\"https:\/\/www.nav.ro\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/www.nav.ro\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2022\/09\/nav_logo.png\",\"contentUrl\":\"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2022\/09\/nav_logo.png\",\"width\":1120,\"height\":800,\"caption\":\"NAV Communications\"},\"image\":{\"@id\":\"https:\/\/www.nav.ro\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/nav6718\",\"https:\/\/x.com\/nav6718\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.nav.ro\/blog\/#\/schema\/person\/c0271febcae717bbdbc3b2c6dbdec20e\",\"name\":\"NAV.RO\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/www.nav.ro\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/93c42d768fb29d2b7c2c9b94595b1770ec8dbbda107bfb5e6759247e857c9cda?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/93c42d768fb29d2b7c2c9b94595b1770ec8dbbda107bfb5e6759247e857c9cda?s=96&d=mm&r=g\",\"caption\":\"NAV.RO\"},\"sameAs\":[\"https:\/\/www.nav.ro\"],\"url\":\"https:\/\/www.nav.ro\/blog\/author\/useradmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cisco avertizeaz\u0103 utilizatorii ruter-ului seria 9000 \u0219i IOS\/XE s\u0103 aplice urgent patch-uri pentru bre\u0219ele de securitate - NAV.RO Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nav.ro\/blog\/cisco-avertizeaza-utilizatorii-ruter-ului-seria-9000-si-ios-xe-sa-aplice-urgent-patch-uri-pentru-bresele-de-securitate\/","og_locale":"ro_RO","og_type":"article","og_title":"Cisco avertizeaz\u0103 utilizatorii ruter-ului seria 9000 \u0219i IOS\/XE s\u0103 aplice urgent patch-uri pentru bre\u0219ele de securitate - NAV.RO Blog","og_description":"Cisco a lansat de cur\u00e2nd 31 de avertismente privind securitatea, \u0219i a \u00eendreptat aten\u021bia clien\u021bilor asupra patch-urilor &#8222;critice&#8221; pentru IOS \u0219i IOS XE Software Cluster Management \u0219i software-ul IOS pentru routerele Cisco ASR 9000 Series. O serie de alte vulnerabilit\u0103\u021bi au, de asemenea, nevoie de aten\u021bie \u00een cazul \u00een care utilizatorii folosesc controlere wireless LAN","og_url":"https:\/\/www.nav.ro\/blog\/cisco-avertizeaza-utilizatorii-ruter-ului-seria-9000-si-ios-xe-sa-aplice-urgent-patch-uri-pentru-bresele-de-securitate\/","og_site_name":"NAV.RO Blog","article_publisher":"https:\/\/www.facebook.com\/nav6718","article_published_time":"2019-05-06T20:25:16+00:00","article_modified_time":"2019-05-21T18:27:22+00:00","og_image":[{"width":1250,"height":500,"url":"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2019\/05\/Cisco.jpg","type":"image\/jpeg"}],"author":"NAV.RO","twitter_card":"summary_large_image","twitter_creator":"@nav6718","twitter_site":"@nav6718","twitter_misc":{"Scris de":"NAV.RO","Timp estimat pentru citire":"4 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.nav.ro\/blog\/cisco-avertizeaza-utilizatorii-ruter-ului-seria-9000-si-ios-xe-sa-aplice-urgent-patch-uri-pentru-bresele-de-securitate\/#article","isPartOf":{"@id":"https:\/\/www.nav.ro\/blog\/cisco-avertizeaza-utilizatorii-ruter-ului-seria-9000-si-ios-xe-sa-aplice-urgent-patch-uri-pentru-bresele-de-securitate\/"},"author":{"name":"NAV.RO","@id":"https:\/\/www.nav.ro\/blog\/#\/schema\/person\/c0271febcae717bbdbc3b2c6dbdec20e"},"headline":"Cisco avertizeaz\u0103 utilizatorii ruter-ului seria 9000 \u0219i IOS\/XE s\u0103 aplice urgent patch-uri pentru bre\u0219ele de securitate","datePublished":"2019-05-06T20:25:16+00:00","dateModified":"2019-05-21T18:27:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.nav.ro\/blog\/cisco-avertizeaza-utilizatorii-ruter-ului-seria-9000-si-ios-xe-sa-aplice-urgent-patch-uri-pentru-bresele-de-securitate\/"},"wordCount":759,"commentCount":0,"publisher":{"@id":"https:\/\/www.nav.ro\/blog\/#organization"},"image":{"@id":"https:\/\/www.nav.ro\/blog\/cisco-avertizeaza-utilizatorii-ruter-ului-seria-9000-si-ios-xe-sa-aplice-urgent-patch-uri-pentru-bresele-de-securitate\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2019\/05\/Cisco.jpg","keywords":["internet","Network","Security"],"articleSection":["NOUT\u0102\u021aI"],"inLanguage":"ro-RO","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.nav.ro\/blog\/cisco-avertizeaza-utilizatorii-ruter-ului-seria-9000-si-ios-xe-sa-aplice-urgent-patch-uri-pentru-bresele-de-securitate\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.nav.ro\/blog\/cisco-avertizeaza-utilizatorii-ruter-ului-seria-9000-si-ios-xe-sa-aplice-urgent-patch-uri-pentru-bresele-de-securitate\/","url":"https:\/\/www.nav.ro\/blog\/cisco-avertizeaza-utilizatorii-ruter-ului-seria-9000-si-ios-xe-sa-aplice-urgent-patch-uri-pentru-bresele-de-securitate\/","name":"Cisco avertizeaz\u0103 utilizatorii ruter-ului seria 9000 \u0219i IOS\/XE s\u0103 aplice urgent patch-uri pentru bre\u0219ele de securitate - NAV.RO Blog","isPartOf":{"@id":"https:\/\/www.nav.ro\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.nav.ro\/blog\/cisco-avertizeaza-utilizatorii-ruter-ului-seria-9000-si-ios-xe-sa-aplice-urgent-patch-uri-pentru-bresele-de-securitate\/#primaryimage"},"image":{"@id":"https:\/\/www.nav.ro\/blog\/cisco-avertizeaza-utilizatorii-ruter-ului-seria-9000-si-ios-xe-sa-aplice-urgent-patch-uri-pentru-bresele-de-securitate\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2019\/05\/Cisco.jpg","datePublished":"2019-05-06T20:25:16+00:00","dateModified":"2019-05-21T18:27:22+00:00","breadcrumb":{"@id":"https:\/\/www.nav.ro\/blog\/cisco-avertizeaza-utilizatorii-ruter-ului-seria-9000-si-ios-xe-sa-aplice-urgent-patch-uri-pentru-bresele-de-securitate\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nav.ro\/blog\/cisco-avertizeaza-utilizatorii-ruter-ului-seria-9000-si-ios-xe-sa-aplice-urgent-patch-uri-pentru-bresele-de-securitate\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/www.nav.ro\/blog\/cisco-avertizeaza-utilizatorii-ruter-ului-seria-9000-si-ios-xe-sa-aplice-urgent-patch-uri-pentru-bresele-de-securitate\/#primaryimage","url":"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2019\/05\/Cisco.jpg","contentUrl":"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2019\/05\/Cisco.jpg","width":1250,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/www.nav.ro\/blog\/cisco-avertizeaza-utilizatorii-ruter-ului-seria-9000-si-ios-xe-sa-aplice-urgent-patch-uri-pentru-bresele-de-securitate\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Prima pagin\u0103","item":"https:\/\/www.nav.ro\/blog\/"},{"@type":"ListItem","position":2,"name":"Cisco avertizeaz\u0103 utilizatorii ruter-ului seria 9000 \u0219i IOS\/XE s\u0103 aplice urgent patch-uri pentru bre\u0219ele de securitate"}]},{"@type":"WebSite","@id":"https:\/\/www.nav.ro\/blog\/#website","url":"https:\/\/www.nav.ro\/blog\/","name":"NAV.RO Blog","description":"Stiri IT\u2705 de actualitate si noutati din domeniul Hosting \u279c Gazduire Web \u279c Servere Dedicate \/ VPS \u279c DATA CENTER \u279c Domenii \u2b50 Actualizare zilnica de la expertii NAV.RO","publisher":{"@id":"https:\/\/www.nav.ro\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nav.ro\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/www.nav.ro\/blog\/#organization","name":"NAV Communications","url":"https:\/\/www.nav.ro\/blog\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/www.nav.ro\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2022\/09\/nav_logo.png","contentUrl":"https:\/\/www.nav.ro\/blog\/wp-content\/uploads\/2022\/09\/nav_logo.png","width":1120,"height":800,"caption":"NAV Communications"},"image":{"@id":"https:\/\/www.nav.ro\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/nav6718","https:\/\/x.com\/nav6718"]},{"@type":"Person","@id":"https:\/\/www.nav.ro\/blog\/#\/schema\/person\/c0271febcae717bbdbc3b2c6dbdec20e","name":"NAV.RO","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/www.nav.ro\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/93c42d768fb29d2b7c2c9b94595b1770ec8dbbda107bfb5e6759247e857c9cda?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93c42d768fb29d2b7c2c9b94595b1770ec8dbbda107bfb5e6759247e857c9cda?s=96&d=mm&r=g","caption":"NAV.RO"},"sameAs":["https:\/\/www.nav.ro"],"url":"https:\/\/www.nav.ro\/blog\/author\/useradmin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/posts\/1544","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/comments?post=1544"}],"version-history":[{"count":1,"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/posts\/1544\/revisions"}],"predecessor-version":[{"id":1545,"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/posts\/1544\/revisions\/1545"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/media\/1575"}],"wp:attachment":[{"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/media?parent=1544"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/categories?post=1544"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nav.ro\/blog\/wp-json\/wp\/v2\/tags?post=1544"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}