{"id":27846,"date":"2022-04-07T09:56:00","date_gmt":"2022-04-07T07:56:00","guid":{"rendered":"https:\/\/perseus.de\/cisa-identifie-des-vulnerabilites-critiques-pour-les-routeurs-spring-apple-et-d-link\/"},"modified":"2026-03-31T07:25:53","modified_gmt":"2026-03-31T05:25:53","slug":"cisa-identifie-des-vulnerabilites-critiques-pour-les-routeurs-spring-apple-et-d-link","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/cisa-identifie-des-vulnerabilites-critiques-pour-les-routeurs-spring-apple-et-d-link\/","title":{"rendered":"CISA identifie des vuln\u00e9rabilit\u00e9s critiques pour les routeurs Spring, Apple et D-Link"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27846\" class=\"elementor elementor-27846 elementor-2933\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dcf4ec4 e-flex e-con-boxed e-con e-parent\" data-id=\"dcf4ec4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e1db58c elementor-widget elementor-widget-image\" data-id=\"e1db58c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"200\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\" class=\"attachment-large size-large wp-image-27802\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png 1024w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-300x75.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-768x192.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png 1200w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1258a43 e-flex e-con-boxed e-con e-parent\" data-id=\"1258a43\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2de4e88 e-con-full e-flex e-con e-child\" data-id=\"2de4e88\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4982c80 elementor-widget elementor-widget-text-editor\" data-id=\"4982c80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>26.04.2022<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8348bc5 elementor-widget elementor-widget-heading\" data-id=\"8348bc5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vuln\u00e9rabilit\u00e9 critique dans Microsoft Exchange Server<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb03842 e-con-full e-flex e-con e-child\" data-id=\"eb03842\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-91d0988 elementor-widget elementor-widget-text-editor\" data-id=\"91d0988\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>L\u2019Agence am\u00e9ricaine de cybers\u00e9curit\u00e9 et de s\u00e9curit\u00e9 des infrastructures (CISA) maintient un aper\u00e7u utile des vuln\u00e9rabilit\u00e9s connues exploit\u00e9es par les attaquants. Le 5 avril, l\u2019agence a ajout\u00e9 quatre nouvelles vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 \u00e0 cette analyse. Vous pouvez d\u00e9couvrir ce que c\u2019est, quels sont les risques et comment vous pouvez vous prot\u00e9ger contre eux.  <\/strong><\/p><p>La vuln\u00e9rabilit\u00e9 Spring4Shell permet l\u2019ex\u00e9cution \u00e0 distance de code<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f85a5ad e-flex e-con-boxed e-con e-parent\" data-id=\"f85a5ad\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-fad2031 e-con-full e-flex e-con e-child\" data-id=\"fad2031\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8282d30 elementor-widget elementor-widget-text-editor\" data-id=\"8282d30\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Que s\u2019est-il pass\u00e9 ?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ee744d2 e-con-full e-flex e-con e-child\" data-id=\"ee744d2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ea6506 elementor-widget elementor-widget-text-editor\" data-id=\"5ea6506\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La vuln\u00e9rabilit\u00e9 \u00ab Spring4Shell \u00bb (CVE-2022-22965) inqui\u00e8te actuellement les experts en cybers\u00e9curit\u00e9. Le <a href=\"https:\/\/spring.io\/\">framework open source Spring<\/a> fournit des outils et des utilitaires pour les applications d\u2019entreprise bas\u00e9s sur le langage de programmation Java. Le ressort aide \u00e0 r\u00e9duire l\u2019effort n\u00e9cessaire pour construire les applications.  <\/p><p>Le 31 mars, la soci\u00e9t\u00e9 a confirm\u00e9 la vuln\u00e9rabilit\u00e9 zero-day et publi\u00e9 un correctif qui devrait r\u00e9soudre le probl\u00e8me.<\/p><p>Cependant, la soci\u00e9t\u00e9 am\u00e9ricaine de s\u00e9curit\u00e9 Sonatype a not\u00e9 cette semaine que malgr\u00e9 la sortie du correctif, plus de 80 % des t\u00e9l\u00e9chargements r\u00e9cents sont des versions potentiellement vuln\u00e9rables. Apparemment, les programmes des entreprises qui utilisent Spring et sont utilis\u00e9es dans le monde entier sont concern\u00e9s. L\u2019\u00e9quipe d\u2019intervention d\u2019urgence informatique (CERT) de l\u2019Universit\u00e9 Carnegie Mellon a publi\u00e9 une <a href=\"https:\/\/www.kb.cert.org\/vuls\/id\/970766\">liste des entreprises<\/a> concern\u00e9es.  <\/p><p>La soci\u00e9t\u00e9 de cybers\u00e9curit\u00e9 Kasada a \u00e9galement constat\u00e9 que les cybercriminels utilisent des outils automatis\u00e9s de scanner de vuln\u00e9rabilit\u00e9s pour tester des milliers d\u2019URL et d\u00e9terminer quels syst\u00e8mes n\u2019ont pas encore \u00e9t\u00e9 correctifs.<\/p><p>Un porte-parole de la soci\u00e9t\u00e9 de t\u00e9l\u00e9communications a assur\u00e9 <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/t-mobile-confirms-lapsus-hackers-breached-internal-systems\/\">\u00e0 BleepingComputer<\/a> qu\u2019aucune information sensible ni donn\u00e9es clients n\u2019avait \u00e9t\u00e9 vol\u00e9e dans le cadre de la cyberattaque. Les cybercriminels n\u2019ont r\u00e9ussi \u00e0 acc\u00e9der qu\u2019\u00e0 des logiciels d\u2019exploitation internes, qui ne sont pas li\u00e9s \u00e0 des informations confidentielles. Aucune preuve n\u2019a \u00e9t\u00e9 trouv\u00e9e que des donn\u00e9es ou des secrets commerciaux aient \u00e9t\u00e9 intercept\u00e9s.  <\/p><p>L\u2019incident a \u00e9t\u00e9 d\u00e9couvert gr\u00e2ce \u00e0 des outils de surveillance internes qui ont document\u00e9 l\u2019intrusion des acteurs non autoris\u00e9s via des identifiants vol\u00e9s. Selon T-Mobile, l\u2019acc\u00e8s des criminels a \u00e9t\u00e9 rapidement coup\u00e9 et les identifiants compromis utilis\u00e9s ont \u00e9t\u00e9 imm\u00e9diatement d\u00e9sactiv\u00e9s. Les syst\u00e8mes et processus de l\u2019entreprise ont \u00e9t\u00e9 nettoy\u00e9s et fonctionnent comme pr\u00e9vu.  <\/p><p>L\u2019incident cybern\u00e9tique a \u00e9t\u00e9 mis en lumi\u00e8re par le journaliste d\u2019investigation ind\u00e9pendant Brian Krebs, qui a \u00e9t\u00e9 le premier \u00e0 en <a href=\"https:\/\/krebsonsecurity.com\/2022\/04\/leaked-chats-show-lapsus-stole-t-mobile-source-code\/\">faire un<\/a> reportage. Il a pu analyser les messages de discussion Telegram fuit\u00e9s entre membres du gang Lapsus$ et d\u00e9terminer que les assaillants avaient r\u00e9ussi \u00e0 voler le code source interne de T-Mobile puis \u00e0 p\u00e9n\u00e9trer les syst\u00e8mes. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f1dfa8e e-flex e-con-boxed e-con e-parent\" data-id=\"f1dfa8e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bf4f09a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"bf4f09a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a82985c e-flex e-con-boxed e-con e-parent\" data-id=\"a82985c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-482032b e-con-full e-flex e-con e-child\" data-id=\"482032b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b5f6a5c elementor-widget elementor-widget-text-editor\" data-id=\"b5f6a5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Que puis-je faire ?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8f5d6ed e-con-full e-flex e-con e-child\" data-id=\"8f5d6ed\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-057f5b5 elementor-widget elementor-widget-text-editor\" data-id=\"057f5b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li>V\u00e9rifiez aupr\u00e8s du fabricant de votre logiciel, de vos programmes et services pour voir si vos applications sont affect\u00e9es. Spring a publi\u00e9 un guide pour aider les utilisateurs \u00e0 d\u00e9terminer s\u2019ils sont affect\u00e9s et dans quelle mesure. <\/li><li>Si un correctif imm\u00e9diat n\u2019est pas possible, Spring a publi\u00e9 des solutions de contournement pour contourner le probl\u00e8me pour le moment<\/li><li>Pour les administrateurs informatiques : isoler les syst\u00e8mes affect\u00e9s dans un \u00ab VLAN vuln\u00e9rable \u00bb (R\u00e9seau Local Virtuel).<\/li><li>Faites attention aux modifications de configuration non autoris\u00e9es sur tous les syst\u00e8mes.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ceb0f40 e-flex e-con-boxed e-con e-parent\" data-id=\"ceb0f40\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-71cb03a e-con-full e-flex e-con e-child\" data-id=\"71cb03a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-26d4389 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"26d4389\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bcfa049 e-flex e-con-boxed e-con e-parent\" data-id=\"bcfa049\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2130c2d e-con-full e-flex e-con e-child\" data-id=\"2130c2d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2fcd616 elementor-widget elementor-widget-heading\" data-id=\"2fcd616\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Apple publie et ferme deux vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 critiques\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ac2bde6 e-con-full e-flex e-con e-child\" data-id=\"ac2bde6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-84ebc33 elementor-widget elementor-widget-text-editor\" data-id=\"84ebc33\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>En plus de Spring4Shell, CISA a catalogu\u00e9 deux vuln\u00e9rabilit\u00e9s (CVE-2022-22675 et CVE-2022-22674) divulgu\u00e9es par Apple le 1er avril qui affectent ses iPhone, iPad et Mac les plus utilis\u00e9s.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6237d73 e-flex e-con-boxed e-con e-parent\" data-id=\"6237d73\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9dde6dc elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"9dde6dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-02dd0e9 e-flex e-con-boxed e-con e-parent\" data-id=\"02dd0e9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-16d621d e-con-full e-flex e-con e-child\" data-id=\"16d621d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-89904c7 elementor-widget elementor-widget-text-editor\" data-id=\"89904c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Que s\u2019est-il pass\u00e9 ?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fae461d e-con-full e-flex e-con e-child\" data-id=\"fae461d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0f04793 elementor-widget elementor-widget-text-editor\" data-id=\"0f04793\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Dans la vuln\u00e9rabilit\u00e9 CVE-2022-22675, le composant de d\u00e9codage audio et vid\u00e9o affecte AppleAVD. Cette vuln\u00e9rabilit\u00e9 peut \u00e9galement entra\u00eener l\u2019ex\u00e9cution de codes \u00e0 distance.<br>En combinaison avec la seconde vuln\u00e9rabilit\u00e9 CVE-2022-22674, qui permet de lire la m\u00e9moire du noyau macOS, les cybercriminels pourraient \u00e9galement obtenir des informations sensibles sur leurs victimes potentielles. <\/p><p>Apple a d\u00e9clar\u00e9 que les deux vuln\u00e9rabilit\u00e9s avaient \u00e9t\u00e9 corrig\u00e9es. Cependant, il existe un risque que ces vuln\u00e9rabilit\u00e9s aient d\u00e9j\u00e0 \u00e9t\u00e9 exploit\u00e9es. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cdadbd8 e-flex e-con-boxed e-con e-parent\" data-id=\"cdadbd8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-104dd95 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"104dd95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f6e5251 e-flex e-con-boxed e-con e-parent\" data-id=\"f6e5251\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f1cf26c e-con-full e-flex e-con e-child\" data-id=\"f1cf26c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ee082fd elementor-widget elementor-widget-text-editor\" data-id=\"ee082fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Que puis-je faire ?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bc25934 e-con-full e-flex e-con e-child\" data-id=\"bc25934\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b46b6f elementor-widget elementor-widget-text-editor\" data-id=\"2b46b6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les mises \u00e0 jour de s\u00e9curit\u00e9 iOS et iPad (iOS 15.4.1 et macOS Monterey 12.3.1) sont disponibles pour l\u2019iPhone 6S et les versions ult\u00e9rieures, tous les mod\u00e8les iPad Pro, tous les mod\u00e8les iPad Air 2 et ult\u00e9rieurs, l\u2019iPad 5e g\u00e9n\u00e9ration et ult\u00e9rieures, l\u2019iPad Mini 4 et ult\u00e9rieurs, ainsi que l\u2019iPod Touch (7e g\u00e9n\u00e9ration). Si vous utilisez l\u2019un de ces appareils, vous devriez installer les mises \u00e0 jour d\u00e8s que possible et ne pas attendre une mise \u00e0 jour automatique de s\u00e9curit\u00e9 d\u2019Apple : <\/p><ul><li>Sur votre iPhone ou iPad, ouvrez les Param\u00e8tres. Cliquez sur \u00ab G\u00e9n\u00e9ral \u00bb, puis sur \u00ab Mise \u00e0 jour logicielle \u00bb et enfin sur \u00ab Mettre \u00e0 jour maintenant \u00bb. <\/li><li>Les utilisateurs Mac ouvrent le menu Apple, allent dans l\u2019\u00e9l\u00e9ment \u00ab Mise \u00e0 jour logicielle \u00bb et cliquent sur \u00ab Mettre \u00e0 jour maintenant \u00bb.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d4150d0 e-flex e-con-boxed e-con e-parent\" data-id=\"d4150d0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-baf1f0f elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"baf1f0f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a662895 e-flex e-con-boxed e-con e-parent\" data-id=\"a662895\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-dd1db79 e-con-full e-flex e-con e-child\" data-id=\"dd1db79\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ad19c14 elementor-widget elementor-widget-heading\" data-id=\"ad19c14\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ex\u00e9cution de code \u00e0 distance sur les routeurs D-Link  \n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d6f22d5 e-con-full e-flex e-con e-child\" data-id=\"d6f22d5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a7014ef elementor-widget elementor-widget-text-editor\" data-id=\"a7014ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L\u2019aper\u00e7u de CISA a \u00e9galement \u00e9t\u00e9 \u00e9largi pour inclure la vuln\u00e9rabilit\u00e9 CVE-2021-45382. Cela affecte les mod\u00e8les de routeurs DIR-810L, DIR-820L\/LW, DIR-826L, DIR-830L et DIR-836L de D-Link. Cette vuln\u00e9rabilit\u00e9 ouvre \u00e9galement la porte \u00e0 l\u2019ex\u00e9cution de code \u00e0 distance.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a03f6e4 e-flex e-con-boxed e-con e-parent\" data-id=\"a03f6e4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b600db9 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"b600db9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5f622d6 e-flex e-con-boxed e-con e-parent\" data-id=\"5f622d6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9c1eeee e-con-full e-flex e-con e-child\" data-id=\"9c1eeee\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b305611 elementor-widget elementor-widget-text-editor\" data-id=\"b305611\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Que s\u2019est-il pass\u00e9 ?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e889ec5 e-con-full e-flex e-con e-child\" data-id=\"e889ec5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-335618c elementor-widget elementor-widget-text-editor\" data-id=\"335618c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Il n\u2019y a plus de mises \u00e0 jour disponibles pour ces appareils \u2013 la derni\u00e8re a \u00e9t\u00e9 publi\u00e9e le 19 d\u00e9cembre 2021 \u2013 car il s\u2019agit de dispositifs dits en fin de vie. Les produits ont atteint la fin de leur dur\u00e9e de vie et ne sont plus entretenus. En cons\u00e9quence, des vuln\u00e9rabilit\u00e9s apparaissent dans ces appareils et deviennent ainsi une cible populaire d\u2019attaque \u2013 d\u2019autant plus que les appareils sont constamment allum\u00e9s et connect\u00e9s \u00e0 Internet. Les routeurs compromis sont souvent utilis\u00e9s par les cybercriminels pour dissimuler leur position lors de lancements d\u2019attaques.   <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0960966 e-flex e-con-boxed e-con e-parent\" data-id=\"0960966\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d008e5a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"d008e5a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1a860a0 e-flex e-con-boxed e-con e-parent\" data-id=\"1a860a0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6924eb7 e-con-full e-flex e-con e-child\" data-id=\"6924eb7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-65f9402 elementor-widget elementor-widget-text-editor\" data-id=\"65f9402\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Que puis-je faire ?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-530eecb e-con-full e-flex e-con e-child\" data-id=\"530eecb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-05d44c6 elementor-widget elementor-widget-text-editor\" data-id=\"05d44c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>D-Link conseille elle-m\u00eame de retirer et de remplacer les mod\u00e8les mentionn\u00e9s pr\u00e9c\u00e9demment. Pour que les entreprises se conforment \u00e0 la Directive op\u00e9rationnelle contraignante 22-01, cela doit \u00eatre fait avant le 25 avril 2022. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>26.04.2022 Vuln\u00e9rabilit\u00e9 critique dans Microsoft Exchange Server L\u2019Agence am\u00e9ricaine de cybers\u00e9curit\u00e9 et de s\u00e9curit\u00e9 des infrastructures (CISA) maintient un aper\u00e7u utile des vuln\u00e9rabilit\u00e9s connues exploit\u00e9es par les attaquants. Le 5 avril, l\u2019agence a ajout\u00e9 quatre nouvelles vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 \u00e0 cette analyse. Vous pouvez d\u00e9couvrir ce que c\u2019est, quels sont les risques et comment vous [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[65],"tags":[],"class_list":["post-27846","post","type-post","status-publish","format-standard","hentry","category-alerte-aux-dangers"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CISA identifie des vuln\u00e9rabilit\u00e9s critiques pour les routeurs Spring, Apple et D-Link - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/cisa-identifie-des-vulnerabilites-critiques-pour-les-routeurs-spring-apple-et-d-link\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISA identifie des vuln\u00e9rabilit\u00e9s critiques pour les routeurs Spring, Apple et D-Link - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"26.04.2022 Vuln\u00e9rabilit\u00e9 critique dans Microsoft Exchange Server L\u2019Agence am\u00e9ricaine de cybers\u00e9curit\u00e9 et de s\u00e9curit\u00e9 des infrastructures (CISA) maintient un aper\u00e7u utile des vuln\u00e9rabilit\u00e9s connues exploit\u00e9es par les attaquants. Le 5 avril, l\u2019agence a ajout\u00e9 quatre nouvelles vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 \u00e0 cette analyse. Vous pouvez d\u00e9couvrir ce que c\u2019est, quels sont les risques et comment vous [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/cisa-identifie-des-vulnerabilites-critiques-pour-les-routeurs-spring-apple-et-d-link\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-07T07:56:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T05:25:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/cisa-identifie-des-vulnerabilites-critiques-pour-les-routeurs-spring-apple-et-d-link\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/cisa-identifie-des-vulnerabilites-critiques-pour-les-routeurs-spring-apple-et-d-link\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"CISA identifie des vuln\u00e9rabilit\u00e9s critiques pour les routeurs Spring, Apple et D-Link\",\"datePublished\":\"2022-04-07T07:56:00+00:00\",\"dateModified\":\"2026-03-31T05:25:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/cisa-identifie-des-vulnerabilites-critiques-pour-les-routeurs-spring-apple-et-d-link\\\/\"},\"wordCount\":1094,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/cisa-identifie-des-vulnerabilites-critiques-pour-les-routeurs-spring-apple-et-d-link\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\",\"articleSection\":[\"Alerte aux dangers\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/cisa-identifie-des-vulnerabilites-critiques-pour-les-routeurs-spring-apple-et-d-link\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/cisa-identifie-des-vulnerabilites-critiques-pour-les-routeurs-spring-apple-et-d-link\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/cisa-identifie-des-vulnerabilites-critiques-pour-les-routeurs-spring-apple-et-d-link\\\/\",\"name\":\"CISA identifie des vuln\u00e9rabilit\u00e9s critiques pour les routeurs Spring, Apple et D-Link - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/cisa-identifie-des-vulnerabilites-critiques-pour-les-routeurs-spring-apple-et-d-link\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/cisa-identifie-des-vulnerabilites-critiques-pour-les-routeurs-spring-apple-et-d-link\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\",\"datePublished\":\"2022-04-07T07:56:00+00:00\",\"dateModified\":\"2026-03-31T05:25:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/cisa-identifie-des-vulnerabilites-critiques-pour-les-routeurs-spring-apple-et-d-link\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/cisa-identifie-des-vulnerabilites-critiques-pour-les-routeurs-spring-apple-et-d-link\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/cisa-identifie-des-vulnerabilites-critiques-pour-les-routeurs-spring-apple-et-d-link\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/cisa-identifie-des-vulnerabilites-critiques-pour-les-routeurs-spring-apple-et-d-link\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISA identifie des vuln\u00e9rabilit\u00e9s critiques pour les routeurs Spring, Apple et D-Link\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CISA identifie des vuln\u00e9rabilit\u00e9s critiques pour les routeurs Spring, Apple et D-Link - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/cisa-identifie-des-vulnerabilites-critiques-pour-les-routeurs-spring-apple-et-d-link\/","og_locale":"fr_FR","og_type":"article","og_title":"CISA identifie des vuln\u00e9rabilit\u00e9s critiques pour les routeurs Spring, Apple et D-Link - Perseus Technologies","og_description":"26.04.2022 Vuln\u00e9rabilit\u00e9 critique dans Microsoft Exchange Server L\u2019Agence am\u00e9ricaine de cybers\u00e9curit\u00e9 et de s\u00e9curit\u00e9 des infrastructures (CISA) maintient un aper\u00e7u utile des vuln\u00e9rabilit\u00e9s connues exploit\u00e9es par les attaquants. Le 5 avril, l\u2019agence a ajout\u00e9 quatre nouvelles vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 \u00e0 cette analyse. Vous pouvez d\u00e9couvrir ce que c\u2019est, quels sont les risques et comment vous [&hellip;]","og_url":"https:\/\/perseus.de\/fr\/cisa-identifie-des-vulnerabilites-critiques-pour-les-routeurs-spring-apple-et-d-link\/","og_site_name":"Perseus Technologies","article_published_time":"2022-04-07T07:56:00+00:00","article_modified_time":"2026-03-31T05:25:53+00:00","og_image":[{"width":1200,"height":300,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Xenia Silbe","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/cisa-identifie-des-vulnerabilites-critiques-pour-les-routeurs-spring-apple-et-d-link\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/cisa-identifie-des-vulnerabilites-critiques-pour-les-routeurs-spring-apple-et-d-link\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"CISA identifie des vuln\u00e9rabilit\u00e9s critiques pour les routeurs Spring, Apple et D-Link","datePublished":"2022-04-07T07:56:00+00:00","dateModified":"2026-03-31T05:25:53+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/cisa-identifie-des-vulnerabilites-critiques-pour-les-routeurs-spring-apple-et-d-link\/"},"wordCount":1094,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/cisa-identifie-des-vulnerabilites-critiques-pour-les-routeurs-spring-apple-et-d-link\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png","articleSection":["Alerte aux dangers"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/cisa-identifie-des-vulnerabilites-critiques-pour-les-routeurs-spring-apple-et-d-link\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/cisa-identifie-des-vulnerabilites-critiques-pour-les-routeurs-spring-apple-et-d-link\/","url":"https:\/\/perseus.de\/fr\/cisa-identifie-des-vulnerabilites-critiques-pour-les-routeurs-spring-apple-et-d-link\/","name":"CISA identifie des vuln\u00e9rabilit\u00e9s critiques pour les routeurs Spring, Apple et D-Link - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/cisa-identifie-des-vulnerabilites-critiques-pour-les-routeurs-spring-apple-et-d-link\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/cisa-identifie-des-vulnerabilites-critiques-pour-les-routeurs-spring-apple-et-d-link\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png","datePublished":"2022-04-07T07:56:00+00:00","dateModified":"2026-03-31T05:25:53+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/cisa-identifie-des-vulnerabilites-critiques-pour-les-routeurs-spring-apple-et-d-link\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/cisa-identifie-des-vulnerabilites-critiques-pour-les-routeurs-spring-apple-et-d-link\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/cisa-identifie-des-vulnerabilites-critiques-pour-les-routeurs-spring-apple-et-d-link\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/cisa-identifie-des-vulnerabilites-critiques-pour-les-routeurs-spring-apple-et-d-link\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"CISA identifie des vuln\u00e9rabilit\u00e9s critiques pour les routeurs Spring, Apple et D-Link"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/fr\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27846","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=27846"}],"version-history":[{"count":3,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27846\/revisions"}],"predecessor-version":[{"id":27849,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27846\/revisions\/27849"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=27846"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=27846"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=27846"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}