{"id":7934308,"date":"2021-12-17T09:21:19","date_gmt":"2021-12-17T08:21:19","guid":{"rendered":"https:\/\/www.wildix.com\/email-news\/dic-17-2021-respuesta-de-wildix-a-la-vulnerabilidad-de-log4j\/"},"modified":"2022-11-28T10:20:16","modified_gmt":"2022-11-28T09:20:16","slug":"dic-17-2021-respuesta-de-wildix-a-la-vulnerabilidad-de-log4j","status":"publish","type":"email-news","link":"https:\/\/www.wildix.com\/de\/email-news\/dic-17-2021-respuesta-de-wildix-a-la-vulnerabilidad-de-log4j\/","title":{"rendered":"Dic 17, 2021 &#8211; Respuesta de Wildix a la vulnerabilidad de Log4j"},"content":{"rendered":"<div><br class=\"\"><\/p>\n<div class=\"\">\n<div dir=\"auto\" style=\"font-family: Helvetica; font-size: 12px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; text-decoration: none; caret-color: rgb(0, 0, 0); color: rgb(0, 0, 0); word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;\" class=\"\">\n<div dir=\"auto\" style=\"caret-color: rgb(0, 0, 0); color: rgb(0, 0, 0); letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration: none; word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;\" class=\"\">\n<div dir=\"auto\" style=\"caret-color: rgb(0, 0, 0); color: rgb(0, 0, 0); font-family: Helvetica; font-size: 12px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration: none; word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;\" class=\"\">\n<div dir=\"auto\" style=\"caret-color: rgb(0, 0, 0); color: rgb(0, 0, 0); letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration: none; word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;\" class=\"\">\n<div dir=\"auto\" style=\"caret-color: rgb(0, 0, 0); color: rgb(0, 0, 0); letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration: none; word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;\" class=\"\">\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"orphans: 2; widows: 2;\" class=\"\">Debido a los anuncios publicados recientemente, nuestro Security Team ha investigado las vulnerabilidades informadas (<font color=\"#050505\" class=\"\"><span style=\"white-space: pre-wrap;\" class=\"\">CVE-2021-44228, CVE-2021-44228) dentro de una Biblioteca Java de c\u00f3digo abierto llamada <b class=\"\">Log4j.<\/b><\/span><\/font><\/div>\n<div style=\"orphans: 2; widows: 2;\" class=\"\"><font color=\"#050505\" class=\"\"><span style=\"white-space: pre-wrap;\" class=\"\"><br class=\"\"><\/span><\/font><\/div>\n<div style=\"orphans: 2; widows: 2;\" class=\"\"><font color=\"#050505\" class=\"\"><span style=\"white-space: pre-wrap;\" class=\"\">Despu\u00e9s de realizar una serie de an\u00e1lisis y pruebas, podemos confirmar que, <b class=\"\">Wildix PBX y los servicios relacionados no est\u00e1s sujetos a tales ataques.<\/b><\/span><\/font><\/div>\n<div style=\"orphans: 2; widows: 2;\" class=\"\"><font color=\"#050505\" class=\"\"><span style=\"white-space: pre-wrap;\" class=\"\"><b class=\"\"><br class=\"\"><\/b><\/span><\/font><\/div>\n<div style=\"orphans: 2; widows: 2;\" class=\"\"><font color=\"#050505\" class=\"\"><span style=\"white-space: pre-wrap;\" class=\"\">Sin embargo, como medida de precauci\u00f3n y de compromiso de mantener una arquitectura completamente segura por dise\u00f1o, <b class=\"\">hemos implementado una actualizaci\u00f3n adicional para prevenir tal vulnerabilidad potencial<\/b>. La actualizaci\u00f3n solo se refiere la parte del servidor, por lo que no es necesario realizar ning\u00fan ajuste manual por tu parte.<\/span><\/font><\/div>\n<div style=\"orphans: 2; widows: 2;\" class=\"\"><font color=\"#050505\" class=\"\"><span style=\"white-space: pre-wrap;\" class=\"\"><br class=\"\"><\/span><\/font><\/div>\n<div style=\"orphans: 2; widows: 2;\" class=\"\"><font color=\"#050505\" class=\"\"><span style=\"white-space: pre-wrap;\" class=\"\"><b class=\"\">La seguridad es la m\u00e1xima prioridad de Wildix<\/b>, por ello nos aseguramos de que todos los productos y versiones que lanzamos se correspondan con los \u00faltimos est\u00e1ndares de seguridad. <\/span><\/font><\/div>\n<div style=\"orphans: 2; widows: 2;\" class=\"\"><br class=\"\"><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Debido a los anuncios publicados recientemente, nuestro Security Team ha investigado las vulnerabilidades informadas (CVE-2021-44228, CVE-2021-44228) dentro de una Biblioteca Java de c\u00f3digo abierto llamada Log4j. Despu\u00e9s de realizar una serie de an\u00e1lisis y pruebas, podemos confirmar que, Wildix PBX y los servicios relacionados no est\u00e1s sujetos a tales ataques. Sin embargo, como medida de [&hellip;]<\/p>\n","protected":false},"author":17,"featured_media":0,"parent":0,"template":"","meta":{"_acf_changed":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_jet_sm_ready_style":"","_jet_sm_style":"","_jet_sm_controls_values":"","_jet_sm_fonts_collection":"","_jet_sm_fonts_links":""},"class_list":["post-7934308","email-news","type-email-news","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Dic 17, 2021 - Respuesta de Wildix a la vulnerabilidad de Log4j | Wildix<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Dic 17, 2021 - Respuesta de Wildix a la vulnerabilidad de Log4j | Wildix\" \/>\n<meta property=\"og:description\" content=\"Debido a los anuncios publicados recientemente, nuestro Security Team ha investigado las vulnerabilidades informadas (CVE-2021-44228, CVE-2021-44228) dentro de una Biblioteca Java de c\u00f3digo abierto llamada Log4j. Despu\u00e9s de realizar una serie de an\u00e1lisis y pruebas, podemos confirmar que, Wildix PBX y los servicios relacionados no est\u00e1s sujetos a tales ataques. Sin embargo, como medida de [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wildix.com\/de\/email-news\/dic-17-2021-respuesta-de-wildix-a-la-vulnerabilidad-de-log4j\/\" \/>\n<meta property=\"og:site_name\" content=\"Wildix\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/groups\/wildixtechwizards\/?mibextid=6NoCDW\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-28T09:20:16+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@wildix_\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"1\u00a0Minute\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Dic 17, 2021 - Respuesta de Wildix a la vulnerabilidad de Log4j | Wildix","robots":{"index":"noindex","follow":"follow"},"og_locale":"de_DE","og_type":"article","og_title":"Dic 17, 2021 - Respuesta de Wildix a la vulnerabilidad de Log4j | Wildix","og_description":"Debido a los anuncios publicados recientemente, nuestro Security Team ha investigado las vulnerabilidades informadas (CVE-2021-44228, CVE-2021-44228) dentro de una Biblioteca Java de c\u00f3digo abierto llamada Log4j. Despu\u00e9s de realizar una serie de an\u00e1lisis y pruebas, podemos confirmar que, Wildix PBX y los servicios relacionados no est\u00e1s sujetos a tales ataques. Sin embargo, como medida de [&hellip;]","og_url":"https:\/\/www.wildix.com\/de\/email-news\/dic-17-2021-respuesta-de-wildix-a-la-vulnerabilidad-de-log4j\/","og_site_name":"Wildix","article_publisher":"https:\/\/www.facebook.com\/groups\/wildixtechwizards\/?mibextid=6NoCDW","article_modified_time":"2022-11-28T09:20:16+00:00","twitter_card":"summary_large_image","twitter_site":"@wildix_","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.wildix.com\/de\/email-news\/dic-17-2021-respuesta-de-wildix-a-la-vulnerabilidad-de-log4j\/","url":"https:\/\/www.wildix.com\/de\/email-news\/dic-17-2021-respuesta-de-wildix-a-la-vulnerabilidad-de-log4j\/","name":"Dic 17, 2021 - Respuesta de Wildix a la vulnerabilidad de Log4j | Wildix","isPartOf":{"@id":"https:\/\/www.wildix.com\/de\/#website"},"datePublished":"2021-12-17T08:21:19+00:00","dateModified":"2022-11-28T09:20:16+00:00","breadcrumb":{"@id":"https:\/\/www.wildix.com\/de\/email-news\/dic-17-2021-respuesta-de-wildix-a-la-vulnerabilidad-de-log4j\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wildix.com\/de\/email-news\/dic-17-2021-respuesta-de-wildix-a-la-vulnerabilidad-de-log4j\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.wildix.com\/de\/email-news\/dic-17-2021-respuesta-de-wildix-a-la-vulnerabilidad-de-log4j\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.wildix.com\/de\/"},{"@type":"ListItem","position":2,"name":"News on WMP","item":"https:\/\/www.wildix.com\/de\/email-news\/"},{"@type":"ListItem","position":3,"name":"Dic 17, 2021 &#8211; Respuesta de Wildix a la vulnerabilidad de Log4j"}]},{"@type":"WebSite","@id":"https:\/\/www.wildix.com\/de\/#website","url":"https:\/\/www.wildix.com\/de\/","name":"Wildix","description":"","publisher":{"@id":"https:\/\/www.wildix.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wildix.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.wildix.com\/de\/#organization","name":"Wildix","url":"https:\/\/www.wildix.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.wildix.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/www.wildix.com\/wp-content\/uploads\/2021\/09\/logo-1.svg","contentUrl":"https:\/\/www.wildix.com\/wp-content\/uploads\/2021\/09\/logo-1.svg","caption":"Wildix"},"image":{"@id":"https:\/\/www.wildix.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/groups\/wildixtechwizards\/?mibextid=6NoCDW","https:\/\/x.com\/wildix_"]}]}},"clean_content":"Debido a los anuncios publicados recientemente, nuestro Security Team ha investigado las vulnerabilidades informadas (CVE-2021-44228, CVE-2021-44228) dentro de una Biblioteca Java de c\u00f3digo abierto llamada Log4j. Despu\u00e9s de realizar una serie de an\u00e1lisis y pruebas, podemos confirmar que, Wildix PBX y los servicios relacionados no est\u00e1s sujetos a tales ataques. Sin embargo, como medida de precauci\u00f3n y de compromiso de mantener una arquitectura completamente segura por dise\u00f1o, hemos implementado una actualizaci\u00f3n adicional para prevenir tal vulnerabilidad potencial. La actualizaci\u00f3n solo se refiere la parte del servidor, por lo que no es necesario realizar ning\u00fan ajuste manual por tu parte. La seguridad es la m\u00e1xima prioridad de Wildix, por ello nos aseguramos de que todos los productos y versiones que lanzamos se correspondan con los \u00faltimos est\u00e1ndares de seguridad.","clean_excerpt":"Debido a los anuncios publicados recientemente, nuestro Security Team ha investigado las vulnerabilidades informadas (CVE-2021-44228, CVE-2021-44228) dentro de una Biblioteca Java de c\u00f3digo abierto llamada Log4j.Despu\u00e9s de realizar una serie de an\u00e1lisis y pruebas, podemos confirmar que, Wildix PBX y los servicios relacionados no est\u00e1s sujetos a tales ataques.Sin embargo, como medida de precauci\u00f3n y...","_links":{"self":[{"href":"https:\/\/www.wildix.com\/de\/wp-json\/wp\/v2\/email-news\/7934308","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wildix.com\/de\/wp-json\/wp\/v2\/email-news"}],"about":[{"href":"https:\/\/www.wildix.com\/de\/wp-json\/wp\/v2\/types\/email-news"}],"author":[{"embeddable":true,"href":"https:\/\/www.wildix.com\/de\/wp-json\/wp\/v2\/users\/17"}],"wp:attachment":[{"href":"https:\/\/www.wildix.com\/de\/wp-json\/wp\/v2\/media?parent=7934308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}