{"id":20868,"date":"2024-11-13T11:09:18","date_gmt":"2024-11-13T14:09:18","guid":{"rendered":"https:\/\/ostec.blog\/?p=20868"},"modified":"2024-11-13T11:09:18","modified_gmt":"2024-11-13T14:09:18","slug":"cve-2024-20424-vulnerabilidad-de-inyeccion-de-comando-en-cisco-fmc","status":"publish","type":"post","link":"https:\/\/ostec.blog\/es\/generico\/cve-2024-20424-vulnerabilidad-de-inyeccion-de-comando-en-cisco-fmc\/","title":{"rendered":"CVE-2024-20424: Vulnerabilidad de inyecci\u00f3n de comando en Cisco FMC"},"content":{"rendered":"<p>Recientemente, se identific\u00f3 una vulnerabilidad cr\u00edtica (CVE-2024-20424) en Cisco Secure Firewall Management Center (FMC), software utilizado para administrar y monitorear dispositivos firewall de Cisco como Adaptive Security Appliance (ASA) y Firepower Threat Defense (FTD). Esta falla es una vulnerabilidad de inyecci\u00f3n de comandos, que hace posible ejecutar comandos arbitrarios en el sistema operativo subyacente como root.<\/p>\n<p>Con una puntuaci\u00f3n <a href=\"https:\/\/ostec.blog\/es\/aprendizaje-descubrimiento\/cve-y-cvss-para-la-clasificacion-de-vulnerabilidades-de-seguridad-digital\/\">CVSS<\/a> de 9,9, esta vulnerabilidad representa un alto riesgo para la seguridad. de redes corporativas que utilizan Cisco FMC, ya que permite que actores maliciosos tengan control sobre operaciones cr\u00edticas en el sistema, poniendo en riesgo la integridad y confidencialidad de datos y dispositivos.<\/p>\n<h2>\u00bfC\u00f3mo funciona CVE-2024-20424?<\/h2>\n<p>CVE-2024-20424 explota una falla de validaci\u00f3n incorrecta en ciertas solicitudes HTTP en Cisco FMC. Para aprovechar esta vulnerabilidad, un atacante debe autenticarse inicialmente en la interfaz de administraci\u00f3n web de un dispositivo afectado utilizando credenciales v\u00e1lidas con al menos privilegios de Analista de seguridad (solo lectura). Una vez autenticado, el atacante puede enviar una solicitud HTTP manipulada al dispositivo. Esta solicitud maliciosa permite la ejecuci\u00f3n de comandos arbitrarios con permisos de root en el sistema operativo Cisco FMC subyacente. Adem\u00e1s, la falla se puede explotar para ejecutar comandos en dispositivos Cisco Firepower Threat Defense (FTD) que est\u00e1n bajo la administraci\u00f3n del FMC, lo que aumenta el impacto potencial en la seguridad de la red.<\/p>\n<p>Si se explota, permite a los ciberdelincuentes comprometer el sistema de gesti\u00f3n del firewall, lo que puede comprometer todo el entorno de seguridad de la red. En entornos corporativos donde se usa ampliamente FMC, un exploit exitoso podr\u00eda darle al atacante acceso a informaci\u00f3n confidencial, control sobre el tr\u00e1fico de la red y posiblemente causar un da\u00f1o mayor al entorno de TI de la organizaci\u00f3n.<\/p>\n<p>Hasta la fecha, no hay confirmaci\u00f3n de que esta vulnerabilidad est\u00e9 siendo explotada activamente por agentes externos. Sin embargo, su alto puntaje y su impacto potencial hacen que esta amenaza sea particularmente cr\u00edtica para las empresas que utilizan el sistema afectado.<\/p>\n<h2>Soluci\u00f3n y correcci\u00f3n<\/h2>\n<p>Cisco ya lanz\u00f3 una actualizaci\u00f3n de seguridad para corregir CVE-2024-20424. El parche lanzado por la empresa ajusta el manejo de datos en Cisco FMC, neutralizando el problema e impidiendo la posibilidad de ejecutar comandos arbitrarios. Como pr\u00e1ctica recomendada, las empresas que utilizan este software deben asegurarse de que las actualizaciones se apliquen de inmediato, adem\u00e1s de mantener una pol\u00edtica de actualizaci\u00f3n peri\u00f3dica de todos sus sistemas de seguridad.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recientemente, se identific\u00f3 una vulnerabilidad cr\u00edtica (CVE-2024-20424) en Cisco Secure Firewall Management Center (FMC), software utilizado para administrar y monitorear dispositivos firewall de Cisco como Adaptive Security Appliance (ASA) y Firepower Threat Defense (FTD). Esta falla es una vulnerabilidad de inyecci\u00f3n de comandos, que hace posible ejecutar comandos arbitrarios en el sistema operativo subyacente como [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":20858,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1019],"tags":[1778],"class_list":["post-20868","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-generico","tag-cve-es"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CVE-2024-20424: Vulnerabilidad de inyecci\u00f3n de comando en Cisco FMC - OSTEC | Seguran\u00e7a digital de resultados<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ostec.blog\/es\/generico\/cve-2024-20424-vulnerabilidad-de-inyeccion-de-comando-en-cisco-fmc\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CVE-2024-20424: Vulnerabilidad de inyecci\u00f3n de comando en Cisco FMC - OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"og:description\" content=\"Recientemente, se identific\u00f3 una vulnerabilidad cr\u00edtica (CVE-2024-20424) en Cisco Secure Firewall Management Center (FMC), software utilizado para administrar y monitorear dispositivos firewall de Cisco como Adaptive Security Appliance (ASA) y Firepower Threat Defense (FTD). Esta falla es una vulnerabilidad de inyecci\u00f3n de comandos, que hace posible ejecutar comandos arbitrarios en el sistema operativo subyacente como [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ostec.blog\/es\/generico\/cve-2024-20424-vulnerabilidad-de-inyeccion-de-comando-en-cisco-fmc\/\" \/>\n<meta property=\"og:site_name\" content=\"OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ostec\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-13T14:09:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/11\/CVE-2024-20424.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"928\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alejandra Villanueva\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ostecsecurity\" \/>\n<meta name=\"twitter:site\" content=\"@ostecsecurity\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-20424-vulnerabilidad-de-inyeccion-de-comando-en-cisco-fmc\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-20424-vulnerabilidad-de-inyeccion-de-comando-en-cisco-fmc\/\"},\"author\":{\"name\":\"Alejandra Villanueva\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c\"},\"headline\":\"CVE-2024-20424: Vulnerabilidad de inyecci\u00f3n de comando en Cisco FMC\",\"datePublished\":\"2024-11-13T14:09:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-20424-vulnerabilidad-de-inyeccion-de-comando-en-cisco-fmc\/\"},\"wordCount\":439,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-20424-vulnerabilidad-de-inyeccion-de-comando-en-cisco-fmc\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/11\/CVE-2024-20424.jpg\",\"keywords\":[\"cve\"],\"articleSection\":[\"Gen\u00e9rico\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ostec.blog\/es\/generico\/cve-2024-20424-vulnerabilidad-de-inyeccion-de-comando-en-cisco-fmc\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-20424-vulnerabilidad-de-inyeccion-de-comando-en-cisco-fmc\/\",\"url\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-20424-vulnerabilidad-de-inyeccion-de-comando-en-cisco-fmc\/\",\"name\":\"CVE-2024-20424: Vulnerabilidad de inyecci\u00f3n de comando en Cisco FMC - OSTEC | Seguran\u00e7a digital de resultados\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-20424-vulnerabilidad-de-inyeccion-de-comando-en-cisco-fmc\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-20424-vulnerabilidad-de-inyeccion-de-comando-en-cisco-fmc\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/11\/CVE-2024-20424.jpg\",\"datePublished\":\"2024-11-13T14:09:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-20424-vulnerabilidad-de-inyeccion-de-comando-en-cisco-fmc\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ostec.blog\/es\/generico\/cve-2024-20424-vulnerabilidad-de-inyeccion-de-comando-en-cisco-fmc\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-20424-vulnerabilidad-de-inyeccion-de-comando-en-cisco-fmc\/#primaryimage\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/11\/CVE-2024-20424.jpg\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/11\/CVE-2024-20424.jpg\",\"width\":928,\"height\":534,\"caption\":\"CVE-2024-20424\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ostec.blog\/es\/generico\/cve-2024-20424-vulnerabilidad-de-inyeccion-de-comando-en-cisco-fmc\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/ostec.blog\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CVE-2024-20424: Vulnerabilidad de inyecci\u00f3n de comando en Cisco FMC\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ostec.blog\/#website\",\"url\":\"https:\/\/ostec.blog\/\",\"name\":\"OSTEC | Seguran\u00e7a digital de resultados\",\"description\":\"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.\",\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ostec.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ostec.blog\/#organization\",\"name\":\"OSTEC Business Security\",\"url\":\"https:\/\/ostec.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"width\":251,\"height\":67,\"caption\":\"OSTEC Business Security\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ostec\",\"https:\/\/x.com\/ostecsecurity\",\"https:\/\/www.instagram.com\/ostecsecurity\/\",\"https:\/\/linkedin.com\/company\/ostec-security\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c\",\"name\":\"Alejandra Villanueva\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g\",\"caption\":\"Alejandra Villanueva\"},\"sameAs\":[\"https:\/\/www.ostec.com.br\"],\"url\":\"https:\/\/ostec.blog\/es\/author\/alejandra-villanueva\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CVE-2024-20424: Vulnerabilidad de inyecci\u00f3n de comando en Cisco FMC - OSTEC | Seguran\u00e7a digital de resultados","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ostec.blog\/es\/generico\/cve-2024-20424-vulnerabilidad-de-inyeccion-de-comando-en-cisco-fmc\/","og_locale":"es_ES","og_type":"article","og_title":"CVE-2024-20424: Vulnerabilidad de inyecci\u00f3n de comando en Cisco FMC - OSTEC | Seguran\u00e7a digital de resultados","og_description":"Recientemente, se identific\u00f3 una vulnerabilidad cr\u00edtica (CVE-2024-20424) en Cisco Secure Firewall Management Center (FMC), software utilizado para administrar y monitorear dispositivos firewall de Cisco como Adaptive Security Appliance (ASA) y Firepower Threat Defense (FTD). Esta falla es una vulnerabilidad de inyecci\u00f3n de comandos, que hace posible ejecutar comandos arbitrarios en el sistema operativo subyacente como [&hellip;]","og_url":"https:\/\/ostec.blog\/es\/generico\/cve-2024-20424-vulnerabilidad-de-inyeccion-de-comando-en-cisco-fmc\/","og_site_name":"OSTEC | Seguran\u00e7a digital de resultados","article_publisher":"https:\/\/www.facebook.com\/ostec","article_published_time":"2024-11-13T14:09:18+00:00","og_image":[{"width":928,"height":534,"url":"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/11\/CVE-2024-20424.jpg","type":"image\/jpeg"}],"author":"Alejandra Villanueva","twitter_card":"summary_large_image","twitter_creator":"@ostecsecurity","twitter_site":"@ostecsecurity","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-20424-vulnerabilidad-de-inyeccion-de-comando-en-cisco-fmc\/#article","isPartOf":{"@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-20424-vulnerabilidad-de-inyeccion-de-comando-en-cisco-fmc\/"},"author":{"name":"Alejandra Villanueva","@id":"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c"},"headline":"CVE-2024-20424: Vulnerabilidad de inyecci\u00f3n de comando en Cisco FMC","datePublished":"2024-11-13T14:09:18+00:00","mainEntityOfPage":{"@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-20424-vulnerabilidad-de-inyeccion-de-comando-en-cisco-fmc\/"},"wordCount":439,"commentCount":0,"publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"image":{"@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-20424-vulnerabilidad-de-inyeccion-de-comando-en-cisco-fmc\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/11\/CVE-2024-20424.jpg","keywords":["cve"],"articleSection":["Gen\u00e9rico"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ostec.blog\/es\/generico\/cve-2024-20424-vulnerabilidad-de-inyeccion-de-comando-en-cisco-fmc\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-20424-vulnerabilidad-de-inyeccion-de-comando-en-cisco-fmc\/","url":"https:\/\/ostec.blog\/es\/generico\/cve-2024-20424-vulnerabilidad-de-inyeccion-de-comando-en-cisco-fmc\/","name":"CVE-2024-20424: Vulnerabilidad de inyecci\u00f3n de comando en Cisco FMC - OSTEC | Seguran\u00e7a digital de resultados","isPartOf":{"@id":"https:\/\/ostec.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-20424-vulnerabilidad-de-inyeccion-de-comando-en-cisco-fmc\/#primaryimage"},"image":{"@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-20424-vulnerabilidad-de-inyeccion-de-comando-en-cisco-fmc\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/11\/CVE-2024-20424.jpg","datePublished":"2024-11-13T14:09:18+00:00","breadcrumb":{"@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-20424-vulnerabilidad-de-inyeccion-de-comando-en-cisco-fmc\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ostec.blog\/es\/generico\/cve-2024-20424-vulnerabilidad-de-inyeccion-de-comando-en-cisco-fmc\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-20424-vulnerabilidad-de-inyeccion-de-comando-en-cisco-fmc\/#primaryimage","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/11\/CVE-2024-20424.jpg","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2024\/11\/CVE-2024-20424.jpg","width":928,"height":534,"caption":"CVE-2024-20424"},{"@type":"BreadcrumbList","@id":"https:\/\/ostec.blog\/es\/generico\/cve-2024-20424-vulnerabilidad-de-inyeccion-de-comando-en-cisco-fmc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/ostec.blog\/es\/"},{"@type":"ListItem","position":2,"name":"CVE-2024-20424: Vulnerabilidad de inyecci\u00f3n de comando en Cisco FMC"}]},{"@type":"WebSite","@id":"https:\/\/ostec.blog\/#website","url":"https:\/\/ostec.blog\/","name":"OSTEC | Seguran\u00e7a digital de resultados","description":"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.","publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ostec.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/ostec.blog\/#organization","name":"OSTEC Business Security","url":"https:\/\/ostec.blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","width":251,"height":67,"caption":"OSTEC Business Security"},"image":{"@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ostec","https:\/\/x.com\/ostecsecurity","https:\/\/www.instagram.com\/ostecsecurity\/","https:\/\/linkedin.com\/company\/ostec-security"]},{"@type":"Person","@id":"https:\/\/ostec.blog\/#\/schema\/person\/882afa77ea19c38d090f993830060c3c","name":"Alejandra Villanueva","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ostec.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4ceb189ebb529d4de28f3ab2a156fb63?s=96&d=mm&r=g","caption":"Alejandra Villanueva"},"sameAs":["https:\/\/www.ostec.com.br"],"url":"https:\/\/ostec.blog\/es\/author\/alejandra-villanueva\/"}]}},"_links":{"self":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts\/20868","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/comments?post=20868"}],"version-history":[{"count":0,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/posts\/20868\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/media\/20858"}],"wp:attachment":[{"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/media?parent=20868"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/categories?post=20868"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ostec.blog\/es\/wp-json\/wp\/v2\/tags?post=20868"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}