{"id":27810,"date":"2025-07-09T20:56:12","date_gmt":"2025-07-09T18:56:12","guid":{"rendered":"https:\/\/perseus.de\/vulnerabilite-critique-dans-lauthentification-windows\/"},"modified":"2026-03-31T07:18:49","modified_gmt":"2026-03-31T05:18:49","slug":"vulnerabilite-critique-dans-lauthentification-windows","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/vulnerabilite-critique-dans-lauthentification-windows\/","title":{"rendered":"Vuln\u00e9rabilit\u00e9 critique dans l\u2019authentification Windows"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27810\" class=\"elementor elementor-27810 elementor-24082\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dcf4ec4 e-flex e-con-boxed e-con e-parent\" data-id=\"dcf4ec4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e1db58c elementor-widget elementor-widget-image\" data-id=\"e1db58c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"200\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\" class=\"attachment-large size-large wp-image-27802\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png 1024w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-300x75.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-768x192.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png 1200w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1258a43 e-flex e-con-boxed e-con e-parent\" data-id=\"1258a43\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2de4e88 e-con-full e-flex e-con e-child\" data-id=\"2de4e88\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4982c80 elementor-widget elementor-widget-text-editor\" data-id=\"4982c80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>09.07.2025<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8348bc5 elementor-widget elementor-widget-heading\" data-id=\"8348bc5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vuln\u00e9rabilit\u00e9 critique dans l\u2019authentification Windows<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb03842 e-con-full e-flex e-con e-child\" data-id=\"eb03842\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-91d0988 elementor-widget elementor-widget-text-editor\" data-id=\"91d0988\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Nous souhaitons attirer votre attention sur une vuln\u00e9rabilit\u00e9 de s\u00e9curit\u00e9 critique dans Microsoft Windows qui repr\u00e9sente actuellement un risque aigu pour votre infrastructure informatique. La vuln\u00e9rabilit\u00e9 avec un <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-47981\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.cve.org\/CVERecord?id%3DCVE-2025-47981&amp;source=gmail&amp;ust=1752172609247000&amp;usg=AOvVaw1EVpGsepX1LbdrdUsJeWN-\">score CVSS de 9,8<\/a> affecte presque toutes les versions actuelles de Windows et Windows Server \u2013 y compris Windows Server 2008 R2 \u2013 et permet aux attaquants d\u2019ex\u00e9cuter du code malveillant avec des privil\u00e8ges syst\u00e8me sans interaction utilisateur. <\/p><p> <\/p><p>Un correctif imm\u00e9diat des syst\u00e8mes affect\u00e9s est urgent de s\u2019imposer.<\/p><p data-start=\"79\" data-end=\"370\"><span style=\"font-weight: 400;\">Les chercheurs en s\u00e9curit\u00e9 informatique rapportent <\/span><b>des attaques actives<\/b> <span style=\"font-weight: 400;\">dans lesquelles, entre autres, des sessions web existantes ont \u00e9t\u00e9 compromises et des authentifications obtenues \u00e0 l\u2019insu des utilisateurs \u2013 <\/span><b>ce qui sugg\u00e8re que l\u2019authentification active \u00e0 facteurs multiples pourrait \u00e9galement \u00eatre<\/b> <span style=\"font-weight: 400;\">contourn\u00e9e.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ceb0f40 e-flex e-con-boxed e-con e-parent\" data-id=\"ceb0f40\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ffbdc12 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"ffbdc12\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-02dd0e9 e-flex e-con-boxed e-con e-parent\" data-id=\"02dd0e9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-16d621d e-con-full e-flex e-con e-child\" data-id=\"16d621d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-89904c7 elementor-widget elementor-widget-text-editor\" data-id=\"89904c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Que s\u2019est-il pass\u00e9 ?<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fae461d e-con-full e-flex e-con e-child\" data-id=\"fae461d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0f04793 elementor-widget elementor-widget-text-editor\" data-id=\"0f04793\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Microsoft a identifi\u00e9 et publi\u00e9 <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-47981\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-47981&amp;source=gmail&amp;ust=1752172609247000&amp;usg=AOvVaw1dZenBlzfToAEFIsbiHtGf\">une vuln\u00e9rabilit\u00e9 grave<\/a> (<a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-47981\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.cve.org\/CVERecord?id%3DCVE-2025-47981&amp;source=gmail&amp;ust=1752172609247000&amp;usg=AOvVaw1EVpGsepX1LbdrdUsJeWN-\">CVE-2025-47981<\/a>) dans le protocole d\u2019authentification SPNEGO NEGOEX \u2013 une partie importante de l\u2019authentification Windows dans l\u2019environnement de domaine, entre autres. Cette vuln\u00e9rabilit\u00e9 permet aux attaquants d\u2019ex\u00e9cuter un code arbitraire avec des privil\u00e8ges syst\u00e8me \u2013 sans se connecter et sans aucune action utilisateur.  <\/p><p> <\/p><p>La menace est particuli\u00e8rement s\u00e9rieuse car <a href=\"https:\/\/www.helpnetsecurity.com\/2025\/07\/09\/microsoft-fixes-critical-wormable-windows-flaw-cve-2025-47981\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.helpnetsecurity.com\/2025\/07\/09\/microsoft-fixes-critical-wormable-windows-flaw-cve-2025-47981\/&amp;source=gmail&amp;ust=1752172609247000&amp;usg=AOvVaw0vza0C3UJT_6jqm3bZ7UNG\">Microsoft la classe comme \u00ab vermeable \u00bb.<\/a> Cela signifie que le malware peut se propager automatiquement via les r\u00e9seaux. Selon Microsoft, un premier abus de cette vuln\u00e9rabilit\u00e9 est attendu prochainement.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cdadbd8 e-flex e-con-boxed e-con e-parent\" data-id=\"cdadbd8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-104dd95 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"104dd95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-71fc1cf e-con-full e-flex e-con e-child\" data-id=\"71fc1cf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ca1a3f3 e-con-full e-flex e-con e-child\" data-id=\"ca1a3f3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-66292b3 e-con-full e-flex e-con e-child\" data-id=\"66292b3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9745167 elementor-widget elementor-widget-text-editor\" data-id=\"9745167\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Vuln\u00e9rabilit\u00e9 signal\u00e9e<br><br><\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-35b99f8 e-con-full e-flex e-con e-child\" data-id=\"35b99f8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b163873 elementor-widget elementor-widget-text-editor\" data-id=\"b163873\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cette vuln\u00e9rabilit\u00e9 permet aux attaquants non authentifi\u00e9s d\u2019ex\u00e9cuter du code avec des privil\u00e8ges syst\u00e8me via des messages R\u00c9SEAU con\u00e7us, d\u00e9clenchant un \u00ab d\u00e9bordement de tampon bas\u00e9 sur le tas \u00bb. C\u2019est un bug dans la gestion de la m\u00e9moire. Lorsqu\u2019ils sont ex\u00e9cut\u00e9s, les programmes r\u00e9servent de l\u2019espace dans ce qu\u2019on appelle le tas \u2013 une zone m\u00e9moire dynamique qui est demand\u00e9e de mani\u00e8re flexible \u00e0 l\u2019ex\u00e9cution.  <\/p><p>Si plus de d\u00e9tails sont \u00e9crits dans cette zone que pr\u00e9vu, les zones m\u00e9moire voisines peuvent \u00eatre manipul\u00e9es. Cela permet aux attaquants d\u2019injecter et d\u2019ex\u00e9cuter leur propre code malveillant \u2013 dans ce cas, m\u00eame avec les privil\u00e8ges les plus \u00e9lev\u00e9s. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4dfc5b9 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"4dfc5b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-174b215 e-flex e-con-boxed e-con e-parent\" data-id=\"174b215\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e560a6b e-con-full e-flex e-con e-child\" data-id=\"e560a6b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-013b67e elementor-widget elementor-widget-text-editor\" data-id=\"013b67e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Qu\u2019est-ce qui est affect\u00e9 ?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a72ed48 e-con-full e-flex e-con e-child\" data-id=\"a72ed48\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-db8754f elementor-widget elementor-widget-text-editor\" data-id=\"db8754f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cette vuln\u00e9rabilit\u00e9 affecte <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-47981\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-47981&amp;source=gmail&amp;ust=1752172609247000&amp;usg=AOvVaw1dZenBlzfToAEFIsbiHtGf\">tous les clients Windows \u00e0 partir de Windows 10 version 1607<\/a> car ces versions ont la politique de groupe suivante activ\u00e9e par d\u00e9faut : \u00ab S\u00e9curit\u00e9 r\u00e9seau : Autoriser les requ\u00eates<wbr><\/wbr>d\u2019authentification PKU2U<wbr><\/wbr> \u00e0 cet ordinateur avec des identit\u00e9s en ligne \u00bb.<\/p><p>Ce r\u00e9glage par d\u00e9faut signifie que la surface d\u2019attaque est d\u00e9j\u00e0 active sur de nombreux syst\u00e8mes \u2013 m\u00eame sans configuration sp\u00e9ciale.<\/p><p> <\/p><p>Les syst\u00e8mes dans lesquels NEGOEX est utilis\u00e9 en combinaison avec les services suivants sont \u00e9galement particuli\u00e8rement \u00e0 risque :<\/p><ul><li>Active Directory \/ Contr\u00f4leur de domaine<\/li><li>Acc\u00e8s RDP<\/li><li>Passerelles VPN<\/li><li>Partages de fichiers SMB<\/li><li>Gestion \u00e0 distance de Windows (WinRM)<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-da9fcac e-flex e-con-boxed e-con e-parent\" data-id=\"da9fcac\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-70aad00 e-con-full e-flex e-con e-child\" data-id=\"70aad00\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-55be951 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"55be951\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d3f9227 e-flex e-con-boxed e-con e-parent\" data-id=\"d3f9227\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6059711 e-con-full e-flex e-con e-child\" data-id=\"6059711\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-26eea72 elementor-widget elementor-widget-text-editor\" data-id=\"26eea72\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Que puis-je faire ?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-724b6c6 e-con-full e-flex e-con e-child\" data-id=\"724b6c6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f0c2fb4 elementor-widget elementor-widget-text-editor\" data-id=\"f0c2fb4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La vuln\u00e9rabilit\u00e9 CVE-2025-47981 repr\u00e9sente une menace aigu\u00eb pour les r\u00e9seaux bas\u00e9s sur Windows. La combinaison d\u2019une haute criticit\u00e9, d\u2019une facilit\u00e9 d\u2019exploitation et de la possibilit\u00e9 d\u2019une distribution automatique rend cette vuln\u00e9rabilit\u00e9 particuli\u00e8rement dangereuse. <\/p><p>Nous vous recommandons <a href=\"https:\/\/www.cyberdaily.au\/security\/12350-experts-concerned-over-newly-disclosed-critical-windows-vulnerability?\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.cyberdaily.au\/security\/12350-experts-concerned-over-newly-disclosed-critical-windows-vulnerability?&amp;source=gmail&amp;ust=1752172609247000&amp;usg=AOvVaw05HHPnlNVh3IxPBNYDeJp8\">d\u2019agir imm\u00e9diatement pour pr\u00e9venir d\u2019\u00e9ventuels dommages<\/a> :<\/p><p> <\/p><ol><li>Priorit\u00e9 : Installez imm\u00e9diatement les derni\u00e8res mises \u00e0 jour de s\u00e9curit\u00e9 de Microsoft, en particulier sur les syst\u00e8mes accessibles au public ou critiques pour l\u2019entreprise.<\/li><li>Si vous ne pouvez pas patcher, bloquez l\u2019acc\u00e8s r\u00e9seau aux ports 135, 445 et 5985 si c\u2019est techniquement possible.<\/li><li>Utilisez la Strat\u00e9gie de Groupe (GPO) pour d\u00e9sactiver le param\u00e8tre \u00ab Autoriser les requ\u00eates d\u2019authentification PKU2U \u00bb si n\u00e9cessaire.<\/li><li>V\u00e9rifiez quels syst\u00e8mes sont potentiellement vuln\u00e9rables et privil\u00e9giez la s\u00e9curisation des services sensibles tels que AD, RDP ou VPN.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-65d84f2 e-flex e-con-boxed e-con e-parent\" data-id=\"65d84f2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3c936a5 e-con-full e-flex e-con e-child\" data-id=\"3c936a5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3bbb54c elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"3bbb54c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-36d5f66 e-flex e-con-boxed e-con e-parent\" data-id=\"36d5f66\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-60eb6a0 elementor-widget elementor-widget-heading\" data-id=\"60eb6a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">D\u2019experts pour experts :<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-092ac14 elementor-widget elementor-widget-text-editor\" data-id=\"092ac14\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Note importante : veuillez noter que bloquer les ports 135, 445 et 5985 peut entra\u00eener les effets suivants :<\/strong><\/p><p> <\/p><ul><li>Partages de fichiers (disques r\u00e9seau) : Ces \u00e9l\u00e9ments peuvent ne plus \u00eatre accessibles.<\/li><li>Politique de groupe : Les GPO peuvent \u00e9chouer ou \u00eatre retard\u00e9s selon l\u2019environnement.  <\/li><li>PowerShell \u00e0 distance (WinRM) : Les solutions bas\u00e9es sur des scripts telles que SCCM, Ansible ou d\u2019autres outils d\u2019automatisation peuvent ne plus fonctionner.<\/li><li>Acc\u00e8s MI\/DCOM : Les outils de surveillance, d\u2019inventaire ou d\u2019administration peuvent \u00eatre perturb\u00e9s, par exemple lors de la connexion \u00e0 des syst\u00e8mes distants.<\/li><\/ul><p> <\/p><p>Voici comment identifier une exploitation potentielle de la vuln\u00e9rabilit\u00e9 :<\/p><p> <\/p><ul><li>Utilisez l\u2019EDR\/antivirus avec l\u2019analyse de la m\u00e9moire (par exemple Defender for Endpoint, CrowdStrike, SentinelOne) pour d\u00e9tecter toute activit\u00e9 suspecte en m\u00e9moire.<\/li><li>Activez la surveillance des journaux d\u2019\u00e9v\u00e9nements \u2013 portez une attention particuli\u00e8re aux plantages LSASS et aux connexions r\u00e9seau inhabituelles.<\/li><li>Utilisez Sysmon (en particulier les \u00e9v\u00e9nements : ID 1 : D\u00e9but du processus, ID 10 : Acc\u00e8s \u00e0 d\u2019autres processus, ID 11 : Op\u00e9rations de fichiers)<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dcff67d e-flex e-con-boxed e-con e-parent\" data-id=\"dcff67d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ad15629 e-con-full e-flex e-con e-child\" data-id=\"ad15629\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dd3e115 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"dd3e115\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Il existe une vuln\u00e9rabilit\u00e9 critique dans Microsoft Windows (CVSS 9.8) qui affecte presque toutes les versions actuelles de Windows et de serveurs et permet aux attaquants d\u2019ex\u00e9cuter du code malveillant avec des privil\u00e8ges syst\u00e8me sans interaction utilisateur \u2013 un risque aigu pour votre infrastructure informatique<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[65],"tags":[],"class_list":["post-27810","post","type-post","status-publish","format-standard","hentry","category-alerte-aux-dangers"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vuln\u00e9rabilit\u00e9 critique dans l\u2019authentification Windows - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/vulnerabilite-critique-dans-lauthentification-windows\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vuln\u00e9rabilit\u00e9 critique dans l\u2019authentification Windows - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Il existe une vuln\u00e9rabilit\u00e9 critique dans Microsoft Windows (CVSS 9.8) qui affecte presque toutes les versions actuelles de Windows et de serveurs et permet aux attaquants d\u2019ex\u00e9cuter du code malveillant avec des privil\u00e8ges syst\u00e8me sans interaction utilisateur \u2013 un risque aigu pour votre infrastructure informatique\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/vulnerabilite-critique-dans-lauthentification-windows\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-09T18:56:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T05:18:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/vulnerabilite-critique-dans-lauthentification-windows\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/vulnerabilite-critique-dans-lauthentification-windows\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Vuln\u00e9rabilit\u00e9 critique dans l\u2019authentification Windows\",\"datePublished\":\"2025-07-09T18:56:12+00:00\",\"dateModified\":\"2026-03-31T05:18:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/vulnerabilite-critique-dans-lauthentification-windows\\\/\"},\"wordCount\":833,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/vulnerabilite-critique-dans-lauthentification-windows\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\",\"articleSection\":[\"Alerte aux dangers\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/vulnerabilite-critique-dans-lauthentification-windows\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/vulnerabilite-critique-dans-lauthentification-windows\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/vulnerabilite-critique-dans-lauthentification-windows\\\/\",\"name\":\"Vuln\u00e9rabilit\u00e9 critique dans l\u2019authentification Windows - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/vulnerabilite-critique-dans-lauthentification-windows\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/vulnerabilite-critique-dans-lauthentification-windows\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\",\"datePublished\":\"2025-07-09T18:56:12+00:00\",\"dateModified\":\"2026-03-31T05:18:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/vulnerabilite-critique-dans-lauthentification-windows\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/vulnerabilite-critique-dans-lauthentification-windows\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/vulnerabilite-critique-dans-lauthentification-windows\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/vulnerabilite-critique-dans-lauthentification-windows\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vuln\u00e9rabilit\u00e9 critique dans l\u2019authentification Windows\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vuln\u00e9rabilit\u00e9 critique dans l\u2019authentification Windows - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/vulnerabilite-critique-dans-lauthentification-windows\/","og_locale":"fr_FR","og_type":"article","og_title":"Vuln\u00e9rabilit\u00e9 critique dans l\u2019authentification Windows - Perseus Technologies","og_description":"Il existe une vuln\u00e9rabilit\u00e9 critique dans Microsoft Windows (CVSS 9.8) qui affecte presque toutes les versions actuelles de Windows et de serveurs et permet aux attaquants d\u2019ex\u00e9cuter du code malveillant avec des privil\u00e8ges syst\u00e8me sans interaction utilisateur \u2013 un risque aigu pour votre infrastructure informatique","og_url":"https:\/\/perseus.de\/fr\/vulnerabilite-critique-dans-lauthentification-windows\/","og_site_name":"Perseus Technologies","article_published_time":"2025-07-09T18:56:12+00:00","article_modified_time":"2026-03-31T05:18:49+00:00","og_image":[{"width":1200,"height":300,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Xenia Silbe","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/vulnerabilite-critique-dans-lauthentification-windows\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/vulnerabilite-critique-dans-lauthentification-windows\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Vuln\u00e9rabilit\u00e9 critique dans l\u2019authentification Windows","datePublished":"2025-07-09T18:56:12+00:00","dateModified":"2026-03-31T05:18:49+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/vulnerabilite-critique-dans-lauthentification-windows\/"},"wordCount":833,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/vulnerabilite-critique-dans-lauthentification-windows\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png","articleSection":["Alerte aux dangers"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/vulnerabilite-critique-dans-lauthentification-windows\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/vulnerabilite-critique-dans-lauthentification-windows\/","url":"https:\/\/perseus.de\/fr\/vulnerabilite-critique-dans-lauthentification-windows\/","name":"Vuln\u00e9rabilit\u00e9 critique dans l\u2019authentification Windows - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/vulnerabilite-critique-dans-lauthentification-windows\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/vulnerabilite-critique-dans-lauthentification-windows\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png","datePublished":"2025-07-09T18:56:12+00:00","dateModified":"2026-03-31T05:18:49+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/vulnerabilite-critique-dans-lauthentification-windows\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/vulnerabilite-critique-dans-lauthentification-windows\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/vulnerabilite-critique-dans-lauthentification-windows\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/vulnerabilite-critique-dans-lauthentification-windows\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Vuln\u00e9rabilit\u00e9 critique dans l\u2019authentification Windows"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/fr\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27810","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=27810"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27810\/revisions"}],"predecessor-version":[{"id":27811,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27810\/revisions\/27811"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=27810"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=27810"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=27810"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}