{"id":27937,"date":"2021-04-22T16:15:00","date_gmt":"2021-04-22T14:15:00","guid":{"rendered":"https:\/\/perseus.de\/nom-detruise-des-vulnerabilites-sur-100-millions-dappareils\/"},"modified":"2026-03-31T07:41:15","modified_gmt":"2026-03-31T05:41:15","slug":"nom-detruise-des-vulnerabilites-sur-100-millions-dappareils","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/nom-detruise-des-vulnerabilites-sur-100-millions-dappareils\/","title":{"rendered":"NOM : D\u00c9TRUISE DES VULN\u00c9RABILIT\u00c9S SUR 100 millions d\u2019appareils"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27937\" class=\"elementor elementor-27937 elementor-22900\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dcf4ec4 e-flex e-con-boxed e-con e-parent\" data-id=\"dcf4ec4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e1db58c elementor-widget elementor-widget-image\" data-id=\"e1db58c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"200\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\" class=\"attachment-large size-large wp-image-27802\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png 1024w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-300x75.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-768x192.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png 1200w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1258a43 e-flex e-con-boxed e-con e-parent\" data-id=\"1258a43\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2de4e88 e-con-full e-flex e-con e-child\" data-id=\"2de4e88\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4982c80 elementor-widget elementor-widget-text-editor\" data-id=\"4982c80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>22.04.2021<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8348bc5 elementor-widget elementor-widget-heading\" data-id=\"8348bc5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">NOM : D\u00c9TRUISE DES VULN\u00c9RABILIT\u00c9S SUR 100 millions d\u2019appareils\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb03842 e-con-full e-flex e-con e-child\" data-id=\"eb03842\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-91d0988 elementor-widget elementor-widget-text-editor\" data-id=\"91d0988\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Les vuln\u00e9rabilit\u00e9s dans les piles TCP\/IP mettent en danger les appareils IoT, tels que les imprimantes ou les dispositifs m\u00e9dicaux. Les entreprises allemandes sont \u00e9galement \u00e0 risque. <\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f85a5ad e-flex e-con-boxed e-con e-parent\" data-id=\"f85a5ad\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-fad2031 e-con-full e-flex e-con e-child\" data-id=\"fad2031\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8282d30 elementor-widget elementor-widget-text-editor\" data-id=\"8282d30\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Que s\u2019est-il pass\u00e9 ?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ee744d2 e-con-full e-flex e-con e-child\" data-id=\"ee744d2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ea6506 elementor-widget elementor-widget-text-editor\" data-id=\"5ea6506\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Neuf vuln\u00e9rabilit\u00e9s de gravit\u00e9 moyenne \u00e0 critique ont \u00e9t\u00e9 d\u00e9couvertes dans un logiciel largement utilis\u00e9 par des chercheurs en s\u00e9curit\u00e9 des laboratoires JSOF et<a href=\"https:\/\/www.bsi.bund.de\/SharedDocs\/Cybersicherheitswarnungen\/DE\/2021\/2021-207948-1032.pdf?__blob=publicationFile&amp;v=2\">Forescout Research<\/a> Labs. Les vuln\u00e9rabilit\u00e9s identifi\u00e9es sont appel\u00e9es \u00ab NOM : \u00c9PAVE \u00bb. Les syst\u00e8mes d\u2019exploitation \u00ab FreeBSD \u00bb, \u00ab IPNet \u00bb, \u00ab Nucleus NET \u00bb (Siemens) et \u00ab NetX \u00bb sont concern\u00e9s. Celles-ci sont couramment utilis\u00e9es dans deux types d\u2019appareils :   <\/p><p> <\/p><ul><li>Ceux qui utilisent la technologie pour contr\u00f4ler et surveiller les machines physiques et les \u00e9quipements industriels (technologie op\u00e9rationnelle).<\/li><li>Appareils capables d\u2019envoyer et de recevoir des donn\u00e9es via Internet (Internet des objets).<br>Cela peut inclure des ordinateurs, des imprimantes, des montres connect\u00e9es et des dispositifs r\u00e9seau, ainsi que l\u2019automatisation du b\u00e2timent, le g\u00e9nie industriel, la VoIP, les dispositifs m\u00e9dicaux, les syst\u00e8mes sur puce, les dispositifs \u00e9nerg\u00e9tiques et d\u2019\u00e9nergie dans les syst\u00e8mes de contr\u00f4le industriel.<\/li><\/ul><p> <\/p><p>L\u2019utilisation g\u00e9n\u00e9ralis\u00e9e du logiciel et la possibilit\u00e9 d\u2019acc\u00e8s via Internet ont conduit \u00e0 une surface d\u2019attaque nettement accrue. On estime qu\u2019environ 100 millions d\u2019appareils sont concern\u00e9s. Selon le <a href=\"https:\/\/www.forescout.com\/resources\/namewreck-breaking-and-fixing-dns-implementations\/\">rapport de Forescout<\/a> , l\u2019Allemagne fait partie des cinq premiers pays ayant identifi\u00e9 des dispositifs expos\u00e9s o\u00f9 Nucleus NET et FreeBSD sont utilis\u00e9s. Le secteur de la sant\u00e9 et les zones avec des processus industriels de fabrication sont particuli\u00e8rement \u00e0 risque.   <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f1dfa8e e-flex e-con-boxed e-con e-parent\" data-id=\"f1dfa8e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bf4f09a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"bf4f09a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a82985c e-flex e-con-boxed e-con e-parent\" data-id=\"a82985c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-482032b e-con-full e-flex e-con e-child\" data-id=\"482032b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b5f6a5c elementor-widget elementor-widget-text-editor\" data-id=\"b5f6a5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Quels sont les risques pour mon entreprise li\u00e9s \u00e0 l\u2019exploitation de NAME&nbsp;:ACCIDENT ?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8f5d6ed e-con-full e-flex e-con e-child\" data-id=\"8f5d6ed\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-057f5b5 elementor-widget elementor-widget-text-editor\" data-id=\"057f5b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Si les attaquants exploitent avec succ\u00e8s les vuln\u00e9rabilit\u00e9s, il est possible que les appareils cibl\u00e9s soient mis hors ligne. Dans le pire des cas, l\u2019attaquant peut prendre le contr\u00f4le des appareils \u2013 sans autorisation et sans \u00eatre remarqu\u00e9 par l\u2019utilisateur. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6237d73 e-flex e-con-boxed e-con e-parent\" data-id=\"6237d73\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9dde6dc elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"9dde6dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-02dd0e9 e-flex e-con-boxed e-con e-parent\" data-id=\"02dd0e9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-16d621d e-con-full e-flex e-con e-child\" data-id=\"16d621d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-89904c7 elementor-widget elementor-widget-text-editor\" data-id=\"89904c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Contexte suppl\u00e9mentaire sur la menace de NOM : ACCIDENT<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fae461d e-con-full e-flex e-con e-child\" data-id=\"fae461d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0f04793 elementor-widget elementor-widget-text-editor\" data-id=\"0f04793\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les vuln\u00e9rabilit\u00e9s affectent les impl\u00e9mentations DHCP et DNS des piles TCP\/IP des quatre syst\u00e8mes d\u2019exploitation mentionn\u00e9s. Le mod\u00e8le TCP\/IP vous aide \u00e0 d\u00e9terminer comment un syst\u00e8me particulier doit \u00eatre connect\u00e9 \u00e0 Internet et comment les donn\u00e9es doivent \u00eatre transmises. <\/p><p><em>FreeBSD<\/em><\/p><p>Comme le soulignent les chercheurs dans leur rapport, FreeBSD est largement connu pour \u00eatre utilis\u00e9 dans des millions de r\u00e9seaux informatiques pour des serveurs haute performance, y compris sur des sites web majeurs comme Netflix et Yahoo. Les types de p\u00e9riph\u00e9riques les plus courants dans le Cloud de P\u00e9riph\u00e9riques qui ex\u00e9cutent FreeBSD incluent les ordinateurs, les imprimantes et les dispositifs r\u00e9seau. <\/p><p><em>Nucleus NET<\/em><\/p><p>Nucleus NET, \u00e0 son tour, est utilis\u00e9 dans de nombreux dispositifs IoT et OT. Les types d\u2019appareils les plus courants sous Nucleus sont l\u2019automatisation des b\u00e2timents, l\u2019ing\u00e9nierie des op\u00e9rations et la VoIP. <\/p><p><em>NetX  <\/em><\/p><p>NetX est g\u00e9n\u00e9ralement utilis\u00e9 avec le RTOS ThreadX. Les applications typiques incluent les dispositifs m\u00e9dicaux, les syst\u00e8mes sur puce et divers mod\u00e8les d\u2019imprimantes. Parmi les types d\u2019appareils les plus courants fonctionnant sous ThreadX figurent les imprimantes, les montres connect\u00e9es, ainsi que les dispositifs d\u2019alimentation et d\u2019alimentation dans les syst\u00e8mes de contr\u00f4le industriels.  <\/p><p>Ces dispositifs et les industries associ\u00e9es sont cens\u00e9s \u00eatre les plus \u00e0 risque. NOM : \u00c9PAVE SEMBLE DONC REPR\u00c9SENTER UNE MENACE PLUS GRANDE POUR LES GRANDES ORGANISATIONS. <\/p><p>Heureusement, toutes les versions ne sont pas vuln\u00e9rables \u00e0 ce que les chercheurs appellent la menace NAME : D\u00c9CAVE.<\/p><p>Vous pouvez trouver plus de contexte sur le sujet dans le <a href=\"https:\/\/www.forescout.com\/resources\/namewreck-breaking-and-fixing-dns-implementations\/\">rapport Forescout<\/a> .<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cdadbd8 e-flex e-con-boxed e-con e-parent\" data-id=\"cdadbd8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-104dd95 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"104dd95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f6e5251 e-flex e-con-boxed e-con e-parent\" data-id=\"f6e5251\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f1cf26c e-con-full e-flex e-con e-child\" data-id=\"f1cf26c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ee082fd elementor-widget elementor-widget-text-editor\" data-id=\"ee082fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Que puis-je faire ?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bc25934 e-con-full e-flex e-con e-child\" data-id=\"bc25934\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b46b6f elementor-widget elementor-widget-text-editor\" data-id=\"2b46b6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>V\u00e9rifiez d\u2019abord si votre entreprise utilise le logiciel\/firmware mentionn\u00e9 ci-dessus. Si l\u2019entreprise utilise un dispositif m\u00e9dical sp\u00e9cifique ou un syst\u00e8me d\u2019automatisation du b\u00e2timent, il est recommand\u00e9 de v\u00e9rifier les sp\u00e9cifications de cet appareil et de contacter le fournisseur d\u2019\u00e9quipements en cas de doute. <\/li><li>V\u00e9rifie si ta version est affect\u00e9e. Les neuf vuln\u00e9rabilit\u00e9s identifi\u00e9es par les chercheurs se trouvent \u00e0 la page 7 du <a href=\"https:\/\/www.forescout.com\/resources\/namewreck-breaking-and-fixing-dns-implementations\/\">rapport Forescout<\/a>. Par exemple, pour identifier votre version de FreeBSD, suivez les <a href=\"https:\/\/www.cyberciti.biz\/faq\/how-to-find-out-freebsd-version-and-patch-level-number\/\">instructions<\/a>.  <\/li><li>Si le logiciel est d\u00e9tect\u00e9 sur l\u2019un de vos appareils, il doit \u00eatre mis \u00e0 jour \u00e0 la derni\u00e8re version. Tous les fournisseurs des piles TCP\/IP vuln\u00e9rables identifi\u00e9s dans le rapport ont \u00e9t\u00e9 inform\u00e9s de ces vuln\u00e9rabilit\u00e9s et les ont corrig\u00e9es en cons\u00e9quence. <\/li><li>Les solutions g\u00e9n\u00e9ralement recommand\u00e9es pour NAME&nbsp;:WRECK incluent la limitation de l\u2019exposition r\u00e9seau des dispositifs critiques vuln\u00e9rables via la segmentation r\u00e9seau,<\/li><li>Utilisez des serveurs DNS internes.<\/li><li>Les fabricants d\u2019appareils qui utilisent ce logiciel devraient fournir \u00e0 leurs clients leurs propres mises \u00e0 jour. Il est important de se rappeler que la protection compl\u00e8te contre NAME&nbsp;:WRECK n\u00e9cessite de patcher les appareils ex\u00e9cutant les versions vuln\u00e9rables des piles TCP\/IP. <\/li><li>Si le patching n\u2019est pas possible pour vous ou si vous avez des questions, vous pouvez toujours contacter Perseus en tant que client de notre assistance d\u2019urgence.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>22.04.2021 NOM : D\u00c9TRUISE DES VULN\u00c9RABILIT\u00c9S SUR 100 millions d\u2019appareils Les vuln\u00e9rabilit\u00e9s dans les piles TCP\/IP mettent en danger les appareils IoT, tels que les imprimantes ou les dispositifs m\u00e9dicaux. Les entreprises allemandes sont \u00e9galement \u00e0 risque. Que s\u2019est-il pass\u00e9 ? Neuf vuln\u00e9rabilit\u00e9s de gravit\u00e9 moyenne \u00e0 critique ont \u00e9t\u00e9 d\u00e9couvertes dans un logiciel largement [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[65],"tags":[],"class_list":["post-27937","post","type-post","status-publish","format-standard","hentry","category-alerte-aux-dangers"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NOM : D\u00c9TRUISE DES VULN\u00c9RABILIT\u00c9S SUR 100 millions d\u2019appareils - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/nom-detruise-des-vulnerabilites-sur-100-millions-dappareils\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NOM : D\u00c9TRUISE DES VULN\u00c9RABILIT\u00c9S SUR 100 millions d\u2019appareils - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"22.04.2021 NOM : D\u00c9TRUISE DES VULN\u00c9RABILIT\u00c9S SUR 100 millions d\u2019appareils Les vuln\u00e9rabilit\u00e9s dans les piles TCP\/IP mettent en danger les appareils IoT, tels que les imprimantes ou les dispositifs m\u00e9dicaux. Les entreprises allemandes sont \u00e9galement \u00e0 risque. Que s\u2019est-il pass\u00e9 ? Neuf vuln\u00e9rabilit\u00e9s de gravit\u00e9 moyenne \u00e0 critique ont \u00e9t\u00e9 d\u00e9couvertes dans un logiciel largement [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/nom-detruise-des-vulnerabilites-sur-100-millions-dappareils\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-22T14:15:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T05:41:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/nom-detruise-des-vulnerabilites-sur-100-millions-dappareils\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/nom-detruise-des-vulnerabilites-sur-100-millions-dappareils\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"NOM : D\u00c9TRUISE DES VULN\u00c9RABILIT\u00c9S SUR 100 millions d\u2019appareils\",\"datePublished\":\"2021-04-22T14:15:00+00:00\",\"dateModified\":\"2026-03-31T05:41:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/nom-detruise-des-vulnerabilites-sur-100-millions-dappareils\\\/\"},\"wordCount\":896,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/nom-detruise-des-vulnerabilites-sur-100-millions-dappareils\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\",\"articleSection\":[\"Alerte aux dangers\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/nom-detruise-des-vulnerabilites-sur-100-millions-dappareils\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/nom-detruise-des-vulnerabilites-sur-100-millions-dappareils\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/nom-detruise-des-vulnerabilites-sur-100-millions-dappareils\\\/\",\"name\":\"NOM : D\u00c9TRUISE DES VULN\u00c9RABILIT\u00c9S SUR 100 millions d\u2019appareils - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/nom-detruise-des-vulnerabilites-sur-100-millions-dappareils\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/nom-detruise-des-vulnerabilites-sur-100-millions-dappareils\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\",\"datePublished\":\"2021-04-22T14:15:00+00:00\",\"dateModified\":\"2026-03-31T05:41:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/nom-detruise-des-vulnerabilites-sur-100-millions-dappareils\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/nom-detruise-des-vulnerabilites-sur-100-millions-dappareils\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/nom-detruise-des-vulnerabilites-sur-100-millions-dappareils\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/nom-detruise-des-vulnerabilites-sur-100-millions-dappareils\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NOM : D\u00c9TRUISE DES VULN\u00c9RABILIT\u00c9S SUR 100 millions d\u2019appareils\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NOM : D\u00c9TRUISE DES VULN\u00c9RABILIT\u00c9S SUR 100 millions d\u2019appareils - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/nom-detruise-des-vulnerabilites-sur-100-millions-dappareils\/","og_locale":"fr_FR","og_type":"article","og_title":"NOM : D\u00c9TRUISE DES VULN\u00c9RABILIT\u00c9S SUR 100 millions d\u2019appareils - Perseus Technologies","og_description":"22.04.2021 NOM : D\u00c9TRUISE DES VULN\u00c9RABILIT\u00c9S SUR 100 millions d\u2019appareils Les vuln\u00e9rabilit\u00e9s dans les piles TCP\/IP mettent en danger les appareils IoT, tels que les imprimantes ou les dispositifs m\u00e9dicaux. Les entreprises allemandes sont \u00e9galement \u00e0 risque. Que s\u2019est-il pass\u00e9 ? Neuf vuln\u00e9rabilit\u00e9s de gravit\u00e9 moyenne \u00e0 critique ont \u00e9t\u00e9 d\u00e9couvertes dans un logiciel largement [&hellip;]","og_url":"https:\/\/perseus.de\/fr\/nom-detruise-des-vulnerabilites-sur-100-millions-dappareils\/","og_site_name":"Perseus Technologies","article_published_time":"2021-04-22T14:15:00+00:00","article_modified_time":"2026-03-31T05:41:15+00:00","og_image":[{"width":1200,"height":300,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Xenia Silbe","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/nom-detruise-des-vulnerabilites-sur-100-millions-dappareils\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/nom-detruise-des-vulnerabilites-sur-100-millions-dappareils\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"NOM : D\u00c9TRUISE DES VULN\u00c9RABILIT\u00c9S SUR 100 millions d\u2019appareils","datePublished":"2021-04-22T14:15:00+00:00","dateModified":"2026-03-31T05:41:15+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/nom-detruise-des-vulnerabilites-sur-100-millions-dappareils\/"},"wordCount":896,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/nom-detruise-des-vulnerabilites-sur-100-millions-dappareils\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png","articleSection":["Alerte aux dangers"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/nom-detruise-des-vulnerabilites-sur-100-millions-dappareils\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/nom-detruise-des-vulnerabilites-sur-100-millions-dappareils\/","url":"https:\/\/perseus.de\/fr\/nom-detruise-des-vulnerabilites-sur-100-millions-dappareils\/","name":"NOM : D\u00c9TRUISE DES VULN\u00c9RABILIT\u00c9S SUR 100 millions d\u2019appareils - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/nom-detruise-des-vulnerabilites-sur-100-millions-dappareils\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/nom-detruise-des-vulnerabilites-sur-100-millions-dappareils\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png","datePublished":"2021-04-22T14:15:00+00:00","dateModified":"2026-03-31T05:41:15+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/nom-detruise-des-vulnerabilites-sur-100-millions-dappareils\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/nom-detruise-des-vulnerabilites-sur-100-millions-dappareils\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/nom-detruise-des-vulnerabilites-sur-100-millions-dappareils\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/nom-detruise-des-vulnerabilites-sur-100-millions-dappareils\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"NOM : D\u00c9TRUISE DES VULN\u00c9RABILIT\u00c9S SUR 100 millions d\u2019appareils"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/fr\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27937","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=27937"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27937\/revisions"}],"predecessor-version":[{"id":27938,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27937\/revisions\/27938"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=27937"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=27937"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=27937"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}