{"id":27943,"date":"2021-04-14T16:12:00","date_gmt":"2021-04-14T14:12:00","guid":{"rendered":"https:\/\/perseus.de\/une-vulnerabilite-vpn-fortinet-non-fermee-permet-une-attaque-par-chiffrement\/"},"modified":"2026-03-31T07:42:27","modified_gmt":"2026-03-31T05:42:27","slug":"une-vulnerabilite-vpn-fortinet-non-fermee-permet-une-attaque-par-chiffrement","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/une-vulnerabilite-vpn-fortinet-non-fermee-permet-une-attaque-par-chiffrement\/","title":{"rendered":"Une vuln\u00e9rabilit\u00e9 VPN Fortinet non ferm\u00e9e permet une attaque par chiffrement"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27943\" class=\"elementor elementor-27943 elementor-22892\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dcf4ec4 e-flex e-con-boxed e-con e-parent\" data-id=\"dcf4ec4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e1db58c elementor-widget elementor-widget-image\" data-id=\"e1db58c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"200\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\" class=\"attachment-large size-large wp-image-27802\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png 1024w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-300x75.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-768x192.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png 1200w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1258a43 e-flex e-con-boxed e-con e-parent\" data-id=\"1258a43\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2de4e88 e-con-full e-flex e-con e-child\" data-id=\"2de4e88\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4982c80 elementor-widget elementor-widget-text-editor\" data-id=\"4982c80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>14.04.2021<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8348bc5 elementor-widget elementor-widget-heading\" data-id=\"8348bc5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Une vuln\u00e9rabilit\u00e9 VPN Fortinet non ferm\u00e9e permet une attaque par chiffrement\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb03842 e-con-full e-flex e-con e-child\" data-id=\"eb03842\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-91d0988 elementor-widget elementor-widget-text-editor\" data-id=\"91d0988\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>En exploitant une vuln\u00e9rabilit\u00e9 de FortiOS (un syst\u00e8me d\u2019exploitation principalement utilis\u00e9 sur les produits VPN SSL Fortigate de Fortinet), les attaquants ont r\u00e9cemment r\u00e9ussi \u00e0 infiltrer des logiciels malveillants appel\u00e9s \u00ab Cring \u00bb dans les r\u00e9seaux des victimes afin de rendre des syst\u00e8mes entiers inaccessibles dans le pire des cas. Les entreprises industrielles occidentales semblent particuli\u00e8rement touch\u00e9es. D\u00e9couvrez \u00e0 quoi ressemble l\u2019attaque et ce que vous pouvez faire pour la pr\u00e9venir.  <\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f85a5ad e-flex e-con-boxed e-con e-parent\" data-id=\"f85a5ad\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-fad2031 e-con-full e-flex e-con e-child\" data-id=\"fad2031\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8282d30 elementor-widget elementor-widget-text-editor\" data-id=\"8282d30\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Que s\u2019est-il pass\u00e9 ?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ee744d2 e-con-full e-flex e-con e-child\" data-id=\"ee744d2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ea6506 elementor-widget elementor-widget-text-editor\" data-id=\"5ea6506\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La semaine derni\u00e8re, des chercheurs en s\u00e9curit\u00e9 de la soci\u00e9t\u00e9 de logiciels Kaspersky ont rapport\u00e9 la d\u00e9couverte d\u2019un nouveau ransomware. C\u2019est un programme qui chiffre des fichiers ou des syst\u00e8mes entiers, apr\u00e8s quoi une ran\u00e7on est exig\u00e9e de l\u2019utilisateur afin qu\u2019ils puissent \u00eatre \u00e0 nouveau lib\u00e9r\u00e9s. Les cybercriminels utilisent ce logiciel nouvellement d\u00e9couvert en exploitant des produits \u00ab Fortigate SSL VPN \u00bb non patch\u00e9s \u2013 c\u2019est-\u00e0-dire via des appareils sans mises \u00e0 jour de s\u00e9curit\u00e9 actuelles. Les chercheurs ont constat\u00e9 que les entreprises industrielles des pays europ\u00e9ens sont les principales cibles de ces attaques. Le malware a \u00e9t\u00e9 nomm\u00e9 \u00ab ransomware Cring \u00bb. La vuln\u00e9rabilit\u00e9 utilis\u00e9e pour distribuer le malware, qui a re\u00e7u le num\u00e9ro CVE-2018-13379, a \u00e9t\u00e9 d\u00e9couverte pour la premi\u00e8re fois en 2018. Depuis, les appareils Fortinet ont \u00e9t\u00e9 attaqu\u00e9s \u00e0 plusieurs reprises. La combinaison de la vuln\u00e9rabilit\u00e9 li\u00e9e au nouveau malware \u00ab Cranc \u00bb, connu depuis 2018, d\u00e9crite au d\u00e9but est une menace nouvellement d\u00e9couverte qui ne doit pas \u00eatre ignor\u00e9e en raison de ses graves cons\u00e9quences.       <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f1dfa8e e-flex e-con-boxed e-con e-parent\" data-id=\"f1dfa8e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bf4f09a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"bf4f09a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a82985c e-flex e-con-boxed e-con e-parent\" data-id=\"a82985c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-482032b e-con-full e-flex e-con e-child\" data-id=\"482032b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b5f6a5c elementor-widget elementor-widget-text-editor\" data-id=\"b5f6a5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Quels sont les risques pour mon entreprise ?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8f5d6ed e-con-full e-flex e-con e-child\" data-id=\"8f5d6ed\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-057f5b5 elementor-widget elementor-widget-text-editor\" data-id=\"057f5b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Si elle r\u00e9ussit, cette attaque \u00e0 distance peut entra\u00eener le chiffrement des fichiers et des ordinateurs et donc inutilisables. Mais surtout, les serveurs utilis\u00e9s pour contr\u00f4ler le processus industriel (par exemple, pour la production de biens) peuvent \u00e9galement \u00eatre chiffr\u00e9s \u2013 par cons\u00e9quent, le processus serait \u00e9galement arr\u00eat\u00e9. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6237d73 e-flex e-con-boxed e-con e-parent\" data-id=\"6237d73\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9dde6dc elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"9dde6dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-02dd0e9 e-flex e-con-boxed e-con e-parent\" data-id=\"02dd0e9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-16d621d e-con-full e-flex e-con e-child\" data-id=\"16d621d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-89904c7 elementor-widget elementor-widget-text-editor\" data-id=\"89904c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Comment fonctionne l\u2019attaque en d\u00e9tail ?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fae461d e-con-full e-flex e-con e-child\" data-id=\"fae461d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0f04793 elementor-widget elementor-widget-text-editor\" data-id=\"0f04793\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>L\u2019attaque enti\u00e8re est en plusieurs \u00e9tapes et complexe. Les auteurs obtiennent un acc\u00e8s initial via <a href=\"https:\/\/www.fortiguard.com\/psirt\/FG-IR-18-384\">des vuln\u00e9rabilit\u00e9s <\/a>non ferm\u00e9es et donc des dispositifs <a href=\"http:\/\/52.57.197.213\/2022\/04\/26\/vpn\/\">VPN<\/a> Fortinet vuln\u00e9rables. Cela ne permet pas directement que les appareils FortiOS eux-m\u00eames soient compromis. Mais cela permet aux attaquants d\u2019obtenir toutes les combinaisons de noms d\u2019utilisateur et de mots de passe de tous les utilisateurs VPN (qui se sont authentifi\u00e9s sur l\u2019appareil au moins une fois) \u2013 si le point d\u2019acc\u00e8s VPN de l\u2019appareil est configur\u00e9 pour fournir des services VPN \u00e0 l\u2019entreprise.   <\/p><p>Si l\u2019attaquant acc\u00e8de \u00e0 ces informations, il peut utiliser les identifiants VPN d\u2019un employ\u00e9 de l\u2019entreprise pour acc\u00e9der au r\u00e9seau interne, rendu accessible via le tunnel VPN. Tout d\u2019abord, cela ne signifie pas qu\u2019un criminel peut compromettre tous les syst\u00e8mes du r\u00e9seau simplement en exploitant cette seule vuln\u00e9rabilit\u00e9. Mais il acquiert une meilleure compr\u00e9hension du r\u00e9seau. De cette fa\u00e7on, il est possible de lancer d\u2019autres attaques. Si la victime fait preuve de n\u00e9gligence, les comptes VPN sont li\u00e9s aux comptes de domaine (comme dans l\u2019exemple de Kaspersky). Cela peut permettre de se connecter \u00e0 un ordinateur avec un acc\u00e8s \u00e0 distance et d\u2019infecter le r\u00e9seau depuis l\u00e0.     <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cdadbd8 e-flex e-con-boxed e-con e-parent\" data-id=\"cdadbd8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-104dd95 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"104dd95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f6e5251 e-flex e-con-boxed e-con e-parent\" data-id=\"f6e5251\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f1cf26c e-con-full e-flex e-con e-child\" data-id=\"f1cf26c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ee082fd elementor-widget elementor-widget-text-editor\" data-id=\"ee082fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Que puis-je faire ?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bc25934 e-con-full e-flex e-con e-child\" data-id=\"bc25934\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b46b6f elementor-widget elementor-widget-text-editor\" data-id=\"2b46b6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Nous vous recommandons de proc\u00e9der en plusieurs \u00e9tapes :<\/p>\n<p><strong>\u00c9tape 1<\/strong><\/p>\n<p>V\u00e9rifiez si vous ou votre entreprise poss\u00e9dez des produits VPN SSL Fortigate&nbsp;&nbsp;. Puisque les appareils doivent \u00eatre achet\u00e9s ou lou\u00e9s, cela doit \u00eatre \u00e9tudi\u00e9 via l\u2019administration informatique ou, si n\u00e9cessaire, via le service comptable. <\/p>\n<p><br><\/p><p><b>\u00c9tape 2<\/b><\/p>\n<p>Si oui, v\u00e9rifie quelle version tu as. Les versions suivantes sont vuln\u00e9rables : <\/p>\n<p>FortiOS 6.0 \u2013 6.0.0 \u00e0 6.0.4<\/p>\n<p>FortiOS 5.6 \u2013 5.6.3 \u00e0 5.6.7<\/p>\n<p>FortiOS 5.4 \u2013 5.4.6 \u00e0 5.4.12<\/p>\n<p><br><\/p><p><b>\u00c9tape 3<\/b><\/p>\n<p>Mettez \u00e0 jour le logiciel de l\u2019appareil vers la derni\u00e8re version. N\u2019oubliez pas de toujours garder les syst\u00e8mes \u00e0 jour, m\u00eame si vos appareils ne figurent pas dans la liste des appareils vuln\u00e9rables ci-dessus. <\/p>\n<p><br><\/p><p><b>\u00c9tape 4<\/b><\/p>\n<p>Mettez \u00e0 jour votre logiciel de s\u00e9curit\u00e9 vers les derni\u00e8res versions et maintenez-le toujours \u00e0 jour. Assurez-vous \u00e9galement que tous les modules de vos solutions de s\u00e9curit\u00e9 sont toujours activ\u00e9s. <\/p>\n<p><br><\/p><p><b>\u00c9tape 5<\/b><\/p>\n<p>Examinez les politiques de s\u00e9curit\u00e9 de votre organisation et assurez-vous que les utilisateurs ne sont autoris\u00e9s \u00e0 se connecter qu\u2019aux syst\u00e8mes n\u00e9cessaires \u00e0 leurs besoins op\u00e9rationnels.<\/p>\n<p><br><\/p><p><b>\u00c9tape 6<\/b><\/p>\n<p>Restreignez l\u2019acc\u00e8s VPN entre diff\u00e9rents emplacements, fermez tous les ports non n\u00e9cessaires \u00e0 des fins op\u00e9rationnelles.<\/p>\n<p><br><\/p><p><b>\u00c9tape 7<\/b><\/p>\n<p>Assurez-vous d\u2019avoir au moins trois <a href=\"http:\/\/52.57.197.213\/2022\/04\/19\/backup\/\">copies de sauvegarde r\u00e9guli\u00e8rement mises \u00e0 jour<\/a> de vos syst\u00e8mes critiques qui vous permettraient de r\u00e9tablir vos op\u00e9rations en cas d\u2019attaque impr\u00e9vue.<\/p>\n<p><\/p>\n<p>Si vous avez des questions ou soup\u00e7onnez d\u2019avoir \u00e9t\u00e9 attaqu\u00e9, n\u2019h\u00e9sitez pas \u00e0 nous contacter.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>14.04.2021 Une vuln\u00e9rabilit\u00e9 VPN Fortinet non ferm\u00e9e permet une attaque par chiffrement En exploitant une vuln\u00e9rabilit\u00e9 de FortiOS (un syst\u00e8me d\u2019exploitation principalement utilis\u00e9 sur les produits VPN SSL Fortigate de Fortinet), les attaquants ont r\u00e9cemment r\u00e9ussi \u00e0 infiltrer des logiciels malveillants appel\u00e9s \u00ab Cring \u00bb dans les r\u00e9seaux des victimes afin de rendre des syst\u00e8mes [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[65],"tags":[],"class_list":["post-27943","post","type-post","status-publish","format-standard","hentry","category-alerte-aux-dangers"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Une vuln\u00e9rabilit\u00e9 VPN Fortinet non ferm\u00e9e permet une attaque par chiffrement - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/une-vulnerabilite-vpn-fortinet-non-fermee-permet-une-attaque-par-chiffrement\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Une vuln\u00e9rabilit\u00e9 VPN Fortinet non ferm\u00e9e permet une attaque par chiffrement - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"14.04.2021 Une vuln\u00e9rabilit\u00e9 VPN Fortinet non ferm\u00e9e permet une attaque par chiffrement En exploitant une vuln\u00e9rabilit\u00e9 de FortiOS (un syst\u00e8me d\u2019exploitation principalement utilis\u00e9 sur les produits VPN SSL Fortigate de Fortinet), les attaquants ont r\u00e9cemment r\u00e9ussi \u00e0 infiltrer des logiciels malveillants appel\u00e9s \u00ab Cring \u00bb dans les r\u00e9seaux des victimes afin de rendre des syst\u00e8mes [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/une-vulnerabilite-vpn-fortinet-non-fermee-permet-une-attaque-par-chiffrement\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-14T14:12:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T05:42:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/une-vulnerabilite-vpn-fortinet-non-fermee-permet-une-attaque-par-chiffrement\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/une-vulnerabilite-vpn-fortinet-non-fermee-permet-une-attaque-par-chiffrement\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Une vuln\u00e9rabilit\u00e9 VPN Fortinet non ferm\u00e9e permet une attaque par chiffrement\",\"datePublished\":\"2021-04-14T14:12:00+00:00\",\"dateModified\":\"2026-03-31T05:42:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/une-vulnerabilite-vpn-fortinet-non-fermee-permet-une-attaque-par-chiffrement\\\/\"},\"wordCount\":846,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/une-vulnerabilite-vpn-fortinet-non-fermee-permet-une-attaque-par-chiffrement\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\",\"articleSection\":[\"Alerte aux dangers\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/une-vulnerabilite-vpn-fortinet-non-fermee-permet-une-attaque-par-chiffrement\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/une-vulnerabilite-vpn-fortinet-non-fermee-permet-une-attaque-par-chiffrement\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/une-vulnerabilite-vpn-fortinet-non-fermee-permet-une-attaque-par-chiffrement\\\/\",\"name\":\"Une vuln\u00e9rabilit\u00e9 VPN Fortinet non ferm\u00e9e permet une attaque par chiffrement - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/une-vulnerabilite-vpn-fortinet-non-fermee-permet-une-attaque-par-chiffrement\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/une-vulnerabilite-vpn-fortinet-non-fermee-permet-une-attaque-par-chiffrement\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\",\"datePublished\":\"2021-04-14T14:12:00+00:00\",\"dateModified\":\"2026-03-31T05:42:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/une-vulnerabilite-vpn-fortinet-non-fermee-permet-une-attaque-par-chiffrement\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/une-vulnerabilite-vpn-fortinet-non-fermee-permet-une-attaque-par-chiffrement\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/une-vulnerabilite-vpn-fortinet-non-fermee-permet-une-attaque-par-chiffrement\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/une-vulnerabilite-vpn-fortinet-non-fermee-permet-une-attaque-par-chiffrement\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Une vuln\u00e9rabilit\u00e9 VPN Fortinet non ferm\u00e9e permet une attaque par chiffrement\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Une vuln\u00e9rabilit\u00e9 VPN Fortinet non ferm\u00e9e permet une attaque par chiffrement - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/une-vulnerabilite-vpn-fortinet-non-fermee-permet-une-attaque-par-chiffrement\/","og_locale":"fr_FR","og_type":"article","og_title":"Une vuln\u00e9rabilit\u00e9 VPN Fortinet non ferm\u00e9e permet une attaque par chiffrement - Perseus Technologies","og_description":"14.04.2021 Une vuln\u00e9rabilit\u00e9 VPN Fortinet non ferm\u00e9e permet une attaque par chiffrement En exploitant une vuln\u00e9rabilit\u00e9 de FortiOS (un syst\u00e8me d\u2019exploitation principalement utilis\u00e9 sur les produits VPN SSL Fortigate de Fortinet), les attaquants ont r\u00e9cemment r\u00e9ussi \u00e0 infiltrer des logiciels malveillants appel\u00e9s \u00ab Cring \u00bb dans les r\u00e9seaux des victimes afin de rendre des syst\u00e8mes [&hellip;]","og_url":"https:\/\/perseus.de\/fr\/une-vulnerabilite-vpn-fortinet-non-fermee-permet-une-attaque-par-chiffrement\/","og_site_name":"Perseus Technologies","article_published_time":"2021-04-14T14:12:00+00:00","article_modified_time":"2026-03-31T05:42:27+00:00","og_image":[{"width":1200,"height":300,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Xenia Silbe","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/une-vulnerabilite-vpn-fortinet-non-fermee-permet-une-attaque-par-chiffrement\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/une-vulnerabilite-vpn-fortinet-non-fermee-permet-une-attaque-par-chiffrement\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Une vuln\u00e9rabilit\u00e9 VPN Fortinet non ferm\u00e9e permet une attaque par chiffrement","datePublished":"2021-04-14T14:12:00+00:00","dateModified":"2026-03-31T05:42:27+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/une-vulnerabilite-vpn-fortinet-non-fermee-permet-une-attaque-par-chiffrement\/"},"wordCount":846,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/une-vulnerabilite-vpn-fortinet-non-fermee-permet-une-attaque-par-chiffrement\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png","articleSection":["Alerte aux dangers"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/une-vulnerabilite-vpn-fortinet-non-fermee-permet-une-attaque-par-chiffrement\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/une-vulnerabilite-vpn-fortinet-non-fermee-permet-une-attaque-par-chiffrement\/","url":"https:\/\/perseus.de\/fr\/une-vulnerabilite-vpn-fortinet-non-fermee-permet-une-attaque-par-chiffrement\/","name":"Une vuln\u00e9rabilit\u00e9 VPN Fortinet non ferm\u00e9e permet une attaque par chiffrement - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/une-vulnerabilite-vpn-fortinet-non-fermee-permet-une-attaque-par-chiffrement\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/une-vulnerabilite-vpn-fortinet-non-fermee-permet-une-attaque-par-chiffrement\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png","datePublished":"2021-04-14T14:12:00+00:00","dateModified":"2026-03-31T05:42:27+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/une-vulnerabilite-vpn-fortinet-non-fermee-permet-une-attaque-par-chiffrement\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/une-vulnerabilite-vpn-fortinet-non-fermee-permet-une-attaque-par-chiffrement\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/une-vulnerabilite-vpn-fortinet-non-fermee-permet-une-attaque-par-chiffrement\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Gefahrenwarnung-Headerbild-Website-2025-1024x256.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/une-vulnerabilite-vpn-fortinet-non-fermee-permet-une-attaque-par-chiffrement\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Une vuln\u00e9rabilit\u00e9 VPN Fortinet non ferm\u00e9e permet une attaque par chiffrement"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/fr\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27943","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=27943"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27943\/revisions"}],"predecessor-version":[{"id":27944,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27943\/revisions\/27944"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=27943"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=27943"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=27943"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}