{"id":27803,"date":"2025-07-22T16:54:39","date_gmt":"2025-07-22T14:54:39","guid":{"rendered":"https:\/\/perseus.de\/vulnerabilite-critique-dans-microsoft-sharepoint\/"},"modified":"2026-03-31T07:15:54","modified_gmt":"2026-03-31T05:15:54","slug":"vulnerabilite-critique-dans-microsoft-sharepoint","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/vulnerabilite-critique-dans-microsoft-sharepoint\/","title":{"rendered":"Vuln\u00e9rabilit\u00e9 critique dans Microsoft SharePoint"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27803\" class=\"elementor elementor-27803 elementor-24743\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dcf4ec4 e-flex e-con-boxed e-con e-parent\" data-id=\"dcf4ec4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e1db58c elementor-widget elementor-widget-image\" data-id=\"e1db58c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"200\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\" class=\"attachment-large size-large wp-image-27802\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png 1024w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-300x75.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-768x192.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png 1200w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1258a43 e-flex e-con-boxed e-con e-parent\" data-id=\"1258a43\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2de4e88 e-con-full e-flex e-con e-child\" data-id=\"2de4e88\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4982c80 elementor-widget elementor-widget-text-editor\" data-id=\"4982c80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>21.07.2025<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8348bc5 elementor-widget elementor-widget-heading\" data-id=\"8348bc5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vuln\u00e9rabilit\u00e9 critique dans Microsoft SharePoint  \n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb03842 e-con-full e-flex e-con e-child\" data-id=\"eb03842\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-91d0988 elementor-widget elementor-widget-text-editor\" data-id=\"91d0988\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Nous souhaitons attirer votre attention sur une<\/span><b> vuln\u00e9rabilit\u00e9 de s\u00e9curit\u00e9 actuellement exploit\u00e9e dans Microsoft SharePoint <\/b><span style=\"font-weight: 400;\">, qui pr\u00e9sente des risques consid\u00e9rables pour les syst\u00e8mes exploit\u00e9s exclusivement localement (\u00ab on-premises \u00bb). <\/span> <\/p><p><span style=\"font-weight: 400;\">L\u2019agence<\/span><a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2025\/07\/20\/microsoft-releases-guidance-exploitation-sharepoint-vulnerability-cve-2025-53770\"><span style=\"font-weight: 400;\"> am\u00e9ricaine de cybers\u00e9curit\u00e9<\/span><\/a><span style=\"font-weight: 400;\"> CISA et Microsoft elle-m\u00eame signalent <\/span><b>des attaques actives contre des syst\u00e8mes<\/b> <span style=\"font-weight: 400;\">exploitant la vuln\u00e9rabilit\u00e9 CVE-2025-53770 \u2013 \u00e9galement <\/span><a href=\"https:\/\/www.heise.de\/news\/Kritische-Sharepoint-Sicherheitsluecke-Erste-Patches-fuer-ToolShell-sind-da-10493989.html\"><span style=\"font-weight: 400;\">connue sous le nom de \u00ab ToolShell \u00bb.<\/span><\/a><span style=\"font-weight: 400;\"> Vous trouverez ci-dessous un aper\u00e7u de l\u2019incident ainsi que des mesures concr\u00e8tes que vous pouvez prendre pour s\u00e9curiser vos syst\u00e8mes.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ceb0f40 e-flex e-con-boxed e-con e-parent\" data-id=\"ceb0f40\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ffbdc12 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"ffbdc12\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-02dd0e9 e-flex e-con-boxed e-con e-parent\" data-id=\"02dd0e9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-16d621d e-con-full e-flex e-con e-child\" data-id=\"16d621d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-89904c7 elementor-widget elementor-widget-text-editor\" data-id=\"89904c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Que s\u2019est-il pass\u00e9 ?<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fae461d e-con-full e-flex e-con e-child\" data-id=\"fae461d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0f04793 elementor-widget elementor-widget-text-editor\" data-id=\"0f04793\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">La <\/span><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-53770\"><span style=\"font-weight: 400;\">vuln\u00e9rabilit\u00e9 CVE-2025-53770<\/span><\/a><span style=\"font-weight: 400;\"> permet aux attaquants d\u2019acc\u00e9der aux serveurs SharePoint sans se connecter (\u00ab non authentifi\u00e9 \u00bb) et <\/span><b>d\u2019ex\u00e9cuter un code arbitraire sur le r\u00e9seau (= RCE \u2192 ex\u00e9cution de code \u00e0 distance).<\/b><span style=\"font-weight: 400;\"> Il s\u2019agit d\u2019une variante de la <\/span> vuln\u00e9rabilit\u00e9 <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-49706\"><span style=\"font-weight: 400;\">d\u00e9j\u00e0 connue CVE-2025-49706<\/span><\/a> <span style=\"font-weight: 400;\"> et repose sur une <\/span><b>d\u00e9s\u00e9rialisation<\/b><span style=\"font-weight: 400;\"> d\u00e9fectueuse \u2013 un processus technique dans lequel les donn\u00e9es sont converties en un format lisible. Si cela n\u2019est pas suffisamment s\u00e9curis\u00e9, un code malveillant peut \u00eatre introduit et ex\u00e9cut\u00e9.<\/span><\/p><p><span style=\"font-weight: 400;\">Les attaquants peuvent acc\u00e9der enti\u00e8rement au serveur puis \u00e0 l\u2019infrastructure qui le sous-tend, y compris le stockage des fichiers, la configuration et le contenu sensible. L\u2019incident ne concerne que <\/span> les <b>installations locales de SharePoint<\/b><span style=\"font-weight: 400;\"> \u2013 <\/span><b>SharePoint Online (Microsoft 365) n\u2019est pas affect\u00e9, selon Microsoft<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-174b215 e-flex e-con-boxed e-con e-parent\" data-id=\"174b215\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e560a6b e-con-full e-flex e-con e-child\" data-id=\"e560a6b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-013b67e elementor-widget elementor-widget-text-editor\" data-id=\"013b67e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Qu\u2019est-ce qui est affect\u00e9 ?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a72ed48 e-con-full e-flex e-con e-child\" data-id=\"a72ed48\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-db8754f elementor-widget elementor-widget-text-editor\" data-id=\"db8754f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">La vuln\u00e9rabilit\u00e9 ne concerne que les entreprises qui <\/span> exploitent <b>Microsoft SharePoint localement (sur site<\/b><span style=\"font-weight: 400;\">).<\/span><\/p><p><span style=\"font-weight: 400;\">Plus pr\u00e9cis\u00e9ment, les versions suivantes sont en danger :<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">SharePoint Server 2016<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">SharePoint Server 2019<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">\u00c9dition SharePoint par abonnement (si elle n\u2019a pas \u00e9t\u00e9 correcte)<\/span><\/li><\/ul><p> <\/p><p><span style=\"font-weight: 400;\">La version cloud de SharePoint Online, qui fonctionne sous Microsoft 365, n\u2019est pas affect\u00e9e.<\/span><\/p><p><span style=\"font-weight: 400;\">La situation est particuli\u00e8rement critique si les serveurs concern\u00e9s sont directement accessibles via Internet et que des mesures de protection importantes ou des mises \u00e0 jour manquent.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-da9fcac e-flex e-con-boxed e-con e-parent\" data-id=\"da9fcac\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-70aad00 e-con-full e-flex e-con e-child\" data-id=\"70aad00\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-55be951 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"55be951\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d3f9227 e-flex e-con-boxed e-con e-parent\" data-id=\"d3f9227\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6059711 e-con-full e-flex e-con e-child\" data-id=\"6059711\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-26eea72 elementor-widget elementor-widget-text-editor\" data-id=\"26eea72\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Comment puis-je me prot\u00e9ger ?<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-724b6c6 e-con-full e-flex e-con e-child\" data-id=\"724b6c6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f0c2fb4 elementor-widget elementor-widget-text-editor\" data-id=\"f0c2fb4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li> <span style=\"font-weight: 400;\"> Installer les mises \u00e0 jour de s\u00e9curit\u00e9 : <\/span><a href=\"https:\/\/msrc.microsoft.com\/blog\/2025\/07\/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770\/\"><span style=\"font-weight: 400;\">Microsoft a maintenant publi\u00e9 des correctifs<\/span><\/a><span style=\"font-weight: 400;\"> pour SharePoint 2019 (correctif avec l\u2019identifiant KB5002754) et l\u2019\u00c9dition Abonnement (correctif avec l\u2019identifiant KB 5002768). La mise \u00e0 jour de s\u00e9curit\u00e9 de SharePoint 2016 est actuellement en cours. Dans ce cas, il est recommand\u00e9 de prendre des mesures de protection imm\u00e9diates (voir ci-dessous) jusqu\u2019\u00e0 la sortie de la mise \u00e0 jour et d\u2019installer en m\u00eame temps les mises \u00e0 jour de s\u00e9curit\u00e9 de juillet de Microsoft. <\/span> <\/li><\/ol><p> <\/p><ol start=\"2\"><li> <span style=\"font-weight: 400;\"> Faire pivoter les cl\u00e9s machine : Apr\u00e8s l\u2019installation des mises \u00e0 jour, les soi-disant cl\u00e9s ASP.NET <\/span><b>machine<\/b> doivent <span style=\"font-weight: 400;\"> \u00eatre renouvel\u00e9es. Ces cl\u00e9s sont essentielles pour une communication s\u00e9curis\u00e9e entre les composants du syst\u00e8me. La rotation se fait via PowerShell ou via SharePoint Central Administration. Ensuite, un red\u00e9marrage du serveur web IIS est n\u00e9cessaire.<\/span><span style=\"font-weight: 400;\"><br><br><\/span><\/li><li><span style=\"font-weight: 400;\">  Activer l\u2019interface de balayage antimalware (AMSI) : AMSI d\u00e9tecte et bloque les scripts suspects \u00e0 l\u2019ex\u00e9cution. Assurez-vous que l\u2019AMSI est correctement activ\u00e9. Cela devrait \u00eatre activ\u00e9 par d\u00e9faut depuis septembre 2023.  <\/span><span style=\"font-weight: 400;\"><br><br><\/span><\/li><li><span style=\"font-weight: 400;\">  Utilisez Microsoft Defender Antivirus et Defender for Endpoint : Ces solutions de s\u00e9curit\u00e9 d\u00e9tectent les sch\u00e9mas d\u2019attaque connus et bloquent les activit\u00e9s associ\u00e9es. Alternativement, des solutions comparables de d\u00e9tection et de r\u00e9ponse aux points de terminaison (EDR) peuvent \u00eatre utilis\u00e9es. <\/span><span style=\"font-weight: 400;\"><br><br><\/span><\/li><li><span style=\"font-weight: 400;\">  D\u00e9connecter les syst\u00e8mes d\u2019urgence du r\u00e9seau (si l\u2019AMSI ne peut pas \u00eatre activ\u00e9) : Si l\u2019AMSI ne peut pas \u00eatre activ\u00e9, la CISA recommande que les syst\u00e8mes publics soient temporairement d\u00e9connect\u00e9s d\u2019Internet.<\/span><span style=\"font-weight: 400;\"><br><br><\/span><\/li><li><span style=\"font-weight: 400;\">  Assurer la journalisation et la surveillance : Activez la journalisation compl\u00e8te (journalisation des \u00e9v\u00e9nements) pour suivre les comportements inhabituels. En particulier, surveillez les requ\u00eates POST vers des chemins suspects. <\/span><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-65d84f2 e-flex e-con-boxed e-con e-parent\" data-id=\"65d84f2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3c936a5 e-con-full e-flex e-con e-child\" data-id=\"3c936a5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3bbb54c elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"3bbb54c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-36d5f66 e-flex e-con-boxed e-con e-parent\" data-id=\"36d5f66\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-60eb6a0 elementor-widget elementor-widget-heading\" data-id=\"60eb6a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">D\u2019experts pour experts :<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-092ac14 elementor-widget elementor-widget-text-editor\" data-id=\"092ac14\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Les responsables informatiques doivent en particulier v\u00e9rifier les sch\u00e9mas d\u2019attaque suivants :<\/strong><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Pr\u00e9sence du fichier : \/_layouts\/15\/ToolPane.aspx ? DisplayMode=Modifier<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Acc\u00e8s depuis les adresses IP suivantes : 107.191.58[.]76, 104.238.159[.]149, 96.9.125[.]147<\/span><span style=\"font-weight: 400;\"><br><\/span><span style=\"font-weight: 400;\"> (en particulier entre le 18 et le 19 juillet 2025)<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Des alertes dans Microsoft Defender telles que :<\/span><span style=\"font-weight: 400;\"><br><\/span><span style=\"font-weight: 400;\">\u00ab Installation possible de webshell \u00bb<\/span><span style=\"font-weight: 400;\"><br><\/span><span style=\"font-weight: 400;\">\u00ab Comportement suspect des processus des travailleurs de l\u2019IIS \u00bb<\/span><span style=\"font-weight: 400;\"><br><\/span><span style=\"font-weight: 400;\">D\u00e9tect\u00e9 des malwares \u00ab HijackSharePointServer \u00bb ou \u00ab SuspSignoutReq \u00bb<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dcff67d e-flex e-con-boxed e-con e-parent\" data-id=\"dcff67d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ad15629 e-con-full e-flex e-con e-child\" data-id=\"ad15629\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dd3e115 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"dd3e115\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Il existe une vuln\u00e9rabilit\u00e9 critique dans Microsoft Windows (CVSS 9.8) qui affecte presque toutes les versions actuelles de Windows et de serveurs et permet aux attaquants d\u2019ex\u00e9cuter du code malveillant avec des privil\u00e8ges syst\u00e8me sans interaction utilisateur \u2013 un risque aigu pour votre infrastructure informatique<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[65],"tags":[],"class_list":["post-27803","post","type-post","status-publish","format-standard","hentry","category-alerte-aux-dangers"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vuln\u00e9rabilit\u00e9 critique dans Microsoft SharePoint - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/vulnerabilite-critique-dans-microsoft-sharepoint\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vuln\u00e9rabilit\u00e9 critique dans Microsoft SharePoint - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Il existe une vuln\u00e9rabilit\u00e9 critique dans Microsoft Windows (CVSS 9.8) qui affecte presque toutes les versions actuelles de Windows et de serveurs et permet aux attaquants d\u2019ex\u00e9cuter du code malveillant avec des privil\u00e8ges syst\u00e8me sans interaction utilisateur \u2013 un risque aigu pour votre infrastructure informatique\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/vulnerabilite-critique-dans-microsoft-sharepoint\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-22T14:54:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T05:15:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/vulnerabilite-critique-dans-microsoft-sharepoint\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/vulnerabilite-critique-dans-microsoft-sharepoint\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Vuln\u00e9rabilit\u00e9 critique dans Microsoft SharePoint\",\"datePublished\":\"2025-07-22T14:54:39+00:00\",\"dateModified\":\"2026-03-31T05:15:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/vulnerabilite-critique-dans-microsoft-sharepoint\\\/\"},\"wordCount\":704,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/vulnerabilite-critique-dans-microsoft-sharepoint\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\",\"articleSection\":[\"Alerte aux dangers\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/vulnerabilite-critique-dans-microsoft-sharepoint\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/vulnerabilite-critique-dans-microsoft-sharepoint\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/vulnerabilite-critique-dans-microsoft-sharepoint\\\/\",\"name\":\"Vuln\u00e9rabilit\u00e9 critique dans Microsoft SharePoint - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/vulnerabilite-critique-dans-microsoft-sharepoint\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/vulnerabilite-critique-dans-microsoft-sharepoint\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\",\"datePublished\":\"2025-07-22T14:54:39+00:00\",\"dateModified\":\"2026-03-31T05:15:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/vulnerabilite-critique-dans-microsoft-sharepoint\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/vulnerabilite-critique-dans-microsoft-sharepoint\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/vulnerabilite-critique-dans-microsoft-sharepoint\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/vulnerabilite-critique-dans-microsoft-sharepoint\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vuln\u00e9rabilit\u00e9 critique dans Microsoft SharePoint\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vuln\u00e9rabilit\u00e9 critique dans Microsoft SharePoint - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/vulnerabilite-critique-dans-microsoft-sharepoint\/","og_locale":"fr_FR","og_type":"article","og_title":"Vuln\u00e9rabilit\u00e9 critique dans Microsoft SharePoint - Perseus Technologies","og_description":"Il existe une vuln\u00e9rabilit\u00e9 critique dans Microsoft Windows (CVSS 9.8) qui affecte presque toutes les versions actuelles de Windows et de serveurs et permet aux attaquants d\u2019ex\u00e9cuter du code malveillant avec des privil\u00e8ges syst\u00e8me sans interaction utilisateur \u2013 un risque aigu pour votre infrastructure informatique","og_url":"https:\/\/perseus.de\/fr\/vulnerabilite-critique-dans-microsoft-sharepoint\/","og_site_name":"Perseus Technologies","article_published_time":"2025-07-22T14:54:39+00:00","article_modified_time":"2026-03-31T05:15:54+00:00","og_image":[{"width":1200,"height":300,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Xenia Silbe","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/vulnerabilite-critique-dans-microsoft-sharepoint\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/vulnerabilite-critique-dans-microsoft-sharepoint\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Vuln\u00e9rabilit\u00e9 critique dans Microsoft SharePoint","datePublished":"2025-07-22T14:54:39+00:00","dateModified":"2026-03-31T05:15:54+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/vulnerabilite-critique-dans-microsoft-sharepoint\/"},"wordCount":704,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/vulnerabilite-critique-dans-microsoft-sharepoint\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png","articleSection":["Alerte aux dangers"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/vulnerabilite-critique-dans-microsoft-sharepoint\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/vulnerabilite-critique-dans-microsoft-sharepoint\/","url":"https:\/\/perseus.de\/fr\/vulnerabilite-critique-dans-microsoft-sharepoint\/","name":"Vuln\u00e9rabilit\u00e9 critique dans Microsoft SharePoint - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/vulnerabilite-critique-dans-microsoft-sharepoint\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/vulnerabilite-critique-dans-microsoft-sharepoint\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png","datePublished":"2025-07-22T14:54:39+00:00","dateModified":"2026-03-31T05:15:54+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/vulnerabilite-critique-dans-microsoft-sharepoint\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/vulnerabilite-critique-dans-microsoft-sharepoint\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/vulnerabilite-critique-dans-microsoft-sharepoint\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/vulnerabilite-critique-dans-microsoft-sharepoint\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Vuln\u00e9rabilit\u00e9 critique dans Microsoft SharePoint"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/fr\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27803","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=27803"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27803\/revisions"}],"predecessor-version":[{"id":27804,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27803\/revisions\/27804"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=27803"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=27803"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=27803"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}