{"id":1134,"date":"2019-08-17T08:19:34","date_gmt":"2019-08-17T06:19:34","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=1134"},"modified":"2019-08-19T08:23:53","modified_gmt":"2019-08-19T06:23:53","slug":"une-nouvelle-vulnerabilite-bluetooth-appelee-knob-represente-une-menace-pour-les-appareils-vulnerables","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/une-nouvelle-vulnerabilite-bluetooth-appelee-knob-represente-une-menace-pour-les-appareils-vulnerables\/","title":{"rendered":"UNE NOUVELLE VULN\u00c9RABILIT\u00c9 BLUETOOTH APPEL\u00c9E \u00abKNOB\u00bb REPR\u00c9SENTE UNE MENACE POUR LES APPAREILS VULN\u00c9RABLES"},"content":{"rendered":"\n<p>La longue liste de <strong><a href=\"https:\/\/koddos.net\/blog\/hackers-could-steal-everything-up-to-76-of-smartphone-apps-have-dangerous-vulnerabilities\/\">vuln\u00e9rabilit\u00e9s\nen mati\u00e8re de s\u00e9curit\u00e9<\/a><\/strong> sur internet s&rsquo;av\u00e8re insuffisante pour\nles utilisateurs qui comptent sur les ressources de connectivit\u00e9. Bluetooth\npourrait \u00e9galement repr\u00e9senter un risque \u00e9lev\u00e9, car il a des exploits possibles\nqui peuvent laisser les utilisateurs expos\u00e9s \u00e0 des attaques.<\/p>\n\n\n\n<p>Selon des chercheurs en s\u00e9curit\u00e9 sp\u00e9cialis\u00e9s en la mati\u00e8re,\nil y a une nouvelle faille dans les protocoles d&rsquo;authentification Bluetooth. Si\nl&rsquo;attaquant parvient \u00e0 s&rsquo;ex\u00e9cuter correctement, il pourrait profiter de cette\nfaille et effectuer une attaque interm\u00e9diaire entre deux appareils appari\u00e9s.<\/p>\n\n\n\n<p><strong>L&rsquo;homme du milieu de\nl&rsquo;attaque<\/strong><\/p>\n\n\n\n<p>L&rsquo;homme du milieu de l&rsquo;attaque est celui dans lequel\nl&rsquo;agresseur se met entre deux parties diff\u00e9rentes et parvient \u00e0 modifier les\ncommunications entre elles. L&rsquo;attaquant relaie secr\u00e8tement tout \u00e9change et peut\nm\u00eame intercepter les messages pertinents, les modifier ou en injecter de\nnouveaux. Les chercheurs affirment que l&rsquo;attaquant peut intercepter et modifier\nles fichiers qui ont \u00e9t\u00e9 partag\u00e9s entre deux appareils appari\u00e9s via la\ntechnologie Bluetooth. Il peut aussi \u00e9couter des conversations et espionner des\nmessages, et bien d&rsquo;autres choses encore.<\/p>\n\n\n\n<p>Cette attaque a \u00e9t\u00e9 appel\u00e9e KNOB, qui signifie Key\nNegotiation Of Bluetooth. Elle a \u00e9t\u00e9 d\u00e9couverte et annonc\u00e9 au monde entier par\ndes sp\u00e9cialistes de plusieurs centres et institutions de recherche, dont\nl&rsquo;Universit\u00e9 d&rsquo;Oxford, l&rsquo;Universit\u00e9 de technologie et de design de Singapour et\nle CISPA Helmholtz Center for Information Security.<\/p>\n\n\n\n<p><strong>L&rsquo;attaque KNOB expliqu\u00e9<\/strong><\/p>\n\n\n\n<p>Un site Web entier <a href=\"http:\/\/knobattack.com\/\">http:\/\/knobattack.com<\/a>\nest consacr\u00e9 \u00e0 l&rsquo;attaque KNOB. Dans une attaque KNOB, un agent d\u00e9guise\nles entit\u00e9s participant \u00e0 une connexion Bluetooth pour impl\u00e9menter une cl\u00e9 de\ncryptage d\u00e9grad\u00e9e, avec un seul octet d&rsquo;entropie. La situation ouvrira la voie\n\u00e0 une simple attaque de force brute dans laquelle le hacker ou l&rsquo;agent\nmalveillant pourra deviner la cl\u00e9 de cryptage de mani\u00e8re rudimentaire.<\/p>\n\n\n\n<p>Matthew Green s&rsquo;est rendu sur son compte Twitter personnel\n(@matthew_d_green) pour expliquer l&rsquo;infraction et a \u00e9crit que les\nsp\u00e9cifications Bluetooth permettent d\u2019un c\u00f4t\u00e9 de l&rsquo;\u00e9change de cl\u00e9s\nd\u2019appariement de sugg\u00e9rer une longueur de cl\u00e9 en octets, sans processus\nd&rsquo;authentification. L&rsquo;attaquant peut alors r\u00e9ussir \u00e0 r\u00e9duire la taille de la\ncl\u00e9 \u00e0 1 octet.<\/p>\n\n\n\n<figure class=\"wp-block-embed-twitter wp-block-embed is-type-rich is-provider-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">So the TL;DR of <a href=\"https:\/\/t.co\/hyhdXzVuWQ\">https:\/\/t.co\/hyhdXzVuWQ<\/a> us that the Bluetooth spec allows one wide of the pairing key exchange to suggest a key length in bytes, and doesn\u2019t authenticate it. The key size can be pushed down to 1 byte.<\/p>&mdash; Matthew Green is on BlueSky (@matthew_d_green) <a href=\"https:\/\/twitter.com\/matthew_d_green\/status\/1162119948786814977?ref_src=twsrc%5Etfw\">August 15, 2019<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<p>Apr\u00e8s cela, la personne malveillante aura la libert\u00e9 de\nfaire pratiquement tout ce qu&rsquo;il veut, d&rsquo;espionner le contenu ou de changer\npour injecter ses propres fichiers dans le transfert, entre autres sc\u00e9narios\nqui peuvent compromettre l&rsquo;int\u00e9grit\u00e9 des appareils appari\u00e9s et les donn\u00e9es\n\u00e9chang\u00e9es.<\/p>\n\n\n\n<p>Le danger r\u00e9el de l&rsquo;attaque KNOB est qu&rsquo;elle ne constitue\npas pr\u00e9cis\u00e9ment une violation de la sp\u00e9cification Bluetooth DR\/EDR, qui\nautorise des cl\u00e9s avec un seul octet d&rsquo;entropie. La vuln\u00e9rabilit\u00e9 fonctionne\nsur les \u00e9metteurs Bluetooth de toutes les grandes marques, y compris <strong><a href=\"https:\/\/koddos.net\/blog\/hackers-strike-at-the-macos-flaw-that-apple-overlooked\/\">Apple, Intel<\/a><\/strong> et <strong><a href=\"https:\/\/koddos.net\/blog\/botnet-infects-100000-routers-to-send-outlook-hotmail-and-yahoo-spam\/\">Broadcom.<\/a><\/strong><\/p>\n\n\n\n<p>L&rsquo;attaque peut \u00eatre d\u00e9vastatrice parce que les victimes ne\npeuvent pas savoir qu&rsquo;elles ont \u00e9t\u00e9 compromises, comme le souligne l&rsquo;\u00e9quipe de\nrecherche. Cela se produit parce que les \u00e9v\u00e9nements se produisent lors du\nprocessus d&rsquo;\u00e9change de cl\u00e9s et non dans les dispositifs impliqu\u00e9s.<\/p>\n\n\n\n<p><strong>Une lumi\u00e8re au bout\ndu tunnel<\/strong><\/p>\n\n\n\n<p>Cependant, et malgr\u00e9 les cons\u00e9quences manifestement\nd\u00e9vastatrices de l&rsquo;attaque KNOB, il y a de la lumi\u00e8re au bout du tunnel. Le\nBluetooth SIG a r\u00e9cemment mis \u00e0 jour les sp\u00e9cifications afin de recommander\ncelles qui produisent des appareils r\u00e9guliers utilisant au moins sept octets\nd&rsquo;entropie. Autre \u00e9volution positive, les fabricants et les marques sont\nconscients de cette vuln\u00e9rabilit\u00e9 depuis la derni\u00e8re partie de 2018 et certains\nd&rsquo;entre eux ont d\u00e9velopp\u00e9 des correctifs comme mesure de protection.<\/p>\n\n\n\n<p>Et comme elle est tr\u00e8s difficile \u00e0 exploiter, les chances\nqu&rsquo;elle soit utilis\u00e9e dans une attaque g\u00e9n\u00e9ralis\u00e9e sont tr\u00e8s faibles. Et pour\nque l\u2019attaque r\u00e9ussisse, <strong><a href=\"https:\/\/koddos.net\/blog\/android-devices-remain-unsecured-while-two-botnets-fight-for-dominance\/\">l&rsquo;appareil\nde l\u2019attaquant<\/a><\/strong> doit \u00eatre \u00e0 port\u00e9e sans fil des deux appareils\nqui s&rsquo;apparient via Bluetooth.<\/p>\n\n\n\n<p>Un autre obstacle potentiel pour les attaquants est que si\nl&rsquo;un des appareils ne pr\u00e9sente pas la vuln\u00e9rabilit\u00e9, alors l&rsquo;attaque serait un\n\u00e9chec. Il y a plusieurs choses qui doivent se produire pour qu&rsquo;une attaque KNOB\nse produise : l&rsquo;appareil qui la commet doit intercepter, traiter et\nretransmettre les messages de n\u00e9gociation de longueur de cl\u00e9 entre les deux\nappareils appari\u00e9s et, en outre, bloquer les transmissions des deux, dans une\ntr\u00e8s courte p\u00e9riode de temps.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La longue liste de vuln\u00e9rabilit\u00e9s en mati\u00e8re de s\u00e9curit\u00e9 sur internet s&rsquo;av\u00e8re insuffisante pour les utilisateurs qui comptent sur les ressources de connectivit\u00e9. Bluetooth pourrait \u00e9galement repr\u00e9senter un risque \u00e9lev\u00e9, car il a des exploits possibles qui peuvent laisser les utilisateurs expos\u00e9s \u00e0 des attaques. Selon des chercheurs en s\u00e9curit\u00e9 sp\u00e9cialis\u00e9s en la mati\u00e8re, il &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/une-nouvelle-vulnerabilite-bluetooth-appelee-knob-represente-une-menace-pour-les-appareils-vulnerables\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">UNE NOUVELLE VULN\u00c9RABILIT\u00c9 BLUETOOTH APPEL\u00c9E \u00abKNOB\u00bb REPR\u00c9SENTE UNE MENACE POUR LES APPAREILS VULN\u00c9RABLES<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":1135,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[6],"tags":[],"class_list":["post-1134","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>UNE NOUVELLE VULN\u00c9RABILIT\u00c9 BLUETOOTH APPEL\u00c9E \u00abKNOB\u00bb REPR\u00c9SENTE UNE MENACE POUR LES APPAREILS VULN\u00c9RABLES - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/une-nouvelle-vulnerabilite-bluetooth-appelee-knob-represente-une-menace-pour-les-appareils-vulnerables\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"UNE NOUVELLE VULN\u00c9RABILIT\u00c9 BLUETOOTH APPEL\u00c9E \u00abKNOB\u00bb REPR\u00c9SENTE UNE MENACE POUR LES APPAREILS VULN\u00c9RABLES - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"La longue liste de vuln\u00e9rabilit\u00e9s en mati\u00e8re de s\u00e9curit\u00e9 sur internet s&rsquo;av\u00e8re insuffisante pour les utilisateurs qui comptent sur les ressources de connectivit\u00e9. Bluetooth pourrait \u00e9galement repr\u00e9senter un risque \u00e9lev\u00e9, car il a des exploits possibles qui peuvent laisser les utilisateurs expos\u00e9s \u00e0 des attaques. Selon des chercheurs en s\u00e9curit\u00e9 sp\u00e9cialis\u00e9s en la mati\u00e8re, il &hellip; Continue reading UNE NOUVELLE VULN\u00c9RABILIT\u00c9 BLUETOOTH APPEL\u00c9E \u00abKNOB\u00bb REPR\u00c9SENTE UNE MENACE POUR LES APPAREILS VULN\u00c9RABLES\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/une-nouvelle-vulnerabilite-bluetooth-appelee-knob-represente-une-menace-pour-les-appareils-vulnerables\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-17T06:19:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-08-19T06:23:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/08\/A-New-Bluetooth-Vulnerability.jpg?fit=640%2C414&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"414\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-nouvelle-vulnerabilite-bluetooth-appelee-knob-represente-une-menace-pour-les-appareils-vulnerables\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-nouvelle-vulnerabilite-bluetooth-appelee-knob-represente-une-menace-pour-les-appareils-vulnerables\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"UNE NOUVELLE VULN\u00c9RABILIT\u00c9 BLUETOOTH APPEL\u00c9E \u00abKNOB\u00bb REPR\u00c9SENTE UNE MENACE POUR LES APPAREILS VULN\u00c9RABLES\",\"datePublished\":\"2019-08-17T06:19:34+00:00\",\"dateModified\":\"2019-08-19T06:23:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-nouvelle-vulnerabilite-bluetooth-appelee-knob-represente-une-menace-pour-les-appareils-vulnerables\\\/\"},\"wordCount\":829,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-nouvelle-vulnerabilite-bluetooth-appelee-knob-represente-une-menace-pour-les-appareils-vulnerables\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/A-New-Bluetooth-Vulnerability.jpg?fit=640%2C414&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-nouvelle-vulnerabilite-bluetooth-appelee-knob-represente-une-menace-pour-les-appareils-vulnerables\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-nouvelle-vulnerabilite-bluetooth-appelee-knob-represente-une-menace-pour-les-appareils-vulnerables\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-nouvelle-vulnerabilite-bluetooth-appelee-knob-represente-une-menace-pour-les-appareils-vulnerables\\\/\",\"name\":\"UNE NOUVELLE VULN\u00c9RABILIT\u00c9 BLUETOOTH APPEL\u00c9E \u00abKNOB\u00bb REPR\u00c9SENTE UNE MENACE POUR LES APPAREILS VULN\u00c9RABLES - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-nouvelle-vulnerabilite-bluetooth-appelee-knob-represente-une-menace-pour-les-appareils-vulnerables\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-nouvelle-vulnerabilite-bluetooth-appelee-knob-represente-une-menace-pour-les-appareils-vulnerables\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/A-New-Bluetooth-Vulnerability.jpg?fit=640%2C414&ssl=1\",\"datePublished\":\"2019-08-17T06:19:34+00:00\",\"dateModified\":\"2019-08-19T06:23:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-nouvelle-vulnerabilite-bluetooth-appelee-knob-represente-une-menace-pour-les-appareils-vulnerables\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-nouvelle-vulnerabilite-bluetooth-appelee-knob-represente-une-menace-pour-les-appareils-vulnerables\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-nouvelle-vulnerabilite-bluetooth-appelee-knob-represente-une-menace-pour-les-appareils-vulnerables\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/A-New-Bluetooth-Vulnerability.jpg?fit=640%2C414&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/A-New-Bluetooth-Vulnerability.jpg?fit=640%2C414&ssl=1\",\"width\":640,\"height\":414},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/une-nouvelle-vulnerabilite-bluetooth-appelee-knob-represente-une-menace-pour-les-appareils-vulnerables\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"UNE NOUVELLE VULN\u00c9RABILIT\u00c9 BLUETOOTH APPEL\u00c9E \u00abKNOB\u00bb REPR\u00c9SENTE UNE MENACE POUR LES APPAREILS VULN\u00c9RABLES\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"UNE NOUVELLE VULN\u00c9RABILIT\u00c9 BLUETOOTH APPEL\u00c9E \u00abKNOB\u00bb REPR\u00c9SENTE UNE MENACE POUR LES APPAREILS VULN\u00c9RABLES - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/une-nouvelle-vulnerabilite-bluetooth-appelee-knob-represente-une-menace-pour-les-appareils-vulnerables\/","og_locale":"fr_FR","og_type":"article","og_title":"UNE NOUVELLE VULN\u00c9RABILIT\u00c9 BLUETOOTH APPEL\u00c9E \u00abKNOB\u00bb REPR\u00c9SENTE UNE MENACE POUR LES APPAREILS VULN\u00c9RABLES - Blog KoDDoS","og_description":"La longue liste de vuln\u00e9rabilit\u00e9s en mati\u00e8re de s\u00e9curit\u00e9 sur internet s&rsquo;av\u00e8re insuffisante pour les utilisateurs qui comptent sur les ressources de connectivit\u00e9. Bluetooth pourrait \u00e9galement repr\u00e9senter un risque \u00e9lev\u00e9, car il a des exploits possibles qui peuvent laisser les utilisateurs expos\u00e9s \u00e0 des attaques. Selon des chercheurs en s\u00e9curit\u00e9 sp\u00e9cialis\u00e9s en la mati\u00e8re, il &hellip; Continue reading UNE NOUVELLE VULN\u00c9RABILIT\u00c9 BLUETOOTH APPEL\u00c9E \u00abKNOB\u00bb REPR\u00c9SENTE UNE MENACE POUR LES APPAREILS VULN\u00c9RABLES","og_url":"https:\/\/fr.koddos.net\/blog\/une-nouvelle-vulnerabilite-bluetooth-appelee-knob-represente-une-menace-pour-les-appareils-vulnerables\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2019-08-17T06:19:34+00:00","article_modified_time":"2019-08-19T06:23:53+00:00","og_image":[{"width":640,"height":414,"url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/08\/A-New-Bluetooth-Vulnerability.jpg?fit=640%2C414&ssl=1","type":"image\/jpeg"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/une-nouvelle-vulnerabilite-bluetooth-appelee-knob-represente-une-menace-pour-les-appareils-vulnerables\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/une-nouvelle-vulnerabilite-bluetooth-appelee-knob-represente-une-menace-pour-les-appareils-vulnerables\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"UNE NOUVELLE VULN\u00c9RABILIT\u00c9 BLUETOOTH APPEL\u00c9E \u00abKNOB\u00bb REPR\u00c9SENTE UNE MENACE POUR LES APPAREILS VULN\u00c9RABLES","datePublished":"2019-08-17T06:19:34+00:00","dateModified":"2019-08-19T06:23:53+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/une-nouvelle-vulnerabilite-bluetooth-appelee-knob-represente-une-menace-pour-les-appareils-vulnerables\/"},"wordCount":829,"commentCount":0,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/une-nouvelle-vulnerabilite-bluetooth-appelee-knob-represente-une-menace-pour-les-appareils-vulnerables\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/08\/A-New-Bluetooth-Vulnerability.jpg?fit=640%2C414&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/fr.koddos.net\/blog\/une-nouvelle-vulnerabilite-bluetooth-appelee-knob-represente-une-menace-pour-les-appareils-vulnerables\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/une-nouvelle-vulnerabilite-bluetooth-appelee-knob-represente-une-menace-pour-les-appareils-vulnerables\/","url":"https:\/\/fr.koddos.net\/blog\/une-nouvelle-vulnerabilite-bluetooth-appelee-knob-represente-une-menace-pour-les-appareils-vulnerables\/","name":"UNE NOUVELLE VULN\u00c9RABILIT\u00c9 BLUETOOTH APPEL\u00c9E \u00abKNOB\u00bb REPR\u00c9SENTE UNE MENACE POUR LES APPAREILS VULN\u00c9RABLES - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/une-nouvelle-vulnerabilite-bluetooth-appelee-knob-represente-une-menace-pour-les-appareils-vulnerables\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/une-nouvelle-vulnerabilite-bluetooth-appelee-knob-represente-une-menace-pour-les-appareils-vulnerables\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/08\/A-New-Bluetooth-Vulnerability.jpg?fit=640%2C414&ssl=1","datePublished":"2019-08-17T06:19:34+00:00","dateModified":"2019-08-19T06:23:53+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/une-nouvelle-vulnerabilite-bluetooth-appelee-knob-represente-une-menace-pour-les-appareils-vulnerables\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/une-nouvelle-vulnerabilite-bluetooth-appelee-knob-represente-une-menace-pour-les-appareils-vulnerables\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/une-nouvelle-vulnerabilite-bluetooth-appelee-knob-represente-une-menace-pour-les-appareils-vulnerables\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/08\/A-New-Bluetooth-Vulnerability.jpg?fit=640%2C414&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/08\/A-New-Bluetooth-Vulnerability.jpg?fit=640%2C414&ssl=1","width":640,"height":414},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/une-nouvelle-vulnerabilite-bluetooth-appelee-knob-represente-une-menace-pour-les-appareils-vulnerables\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"UNE NOUVELLE VULN\u00c9RABILIT\u00c9 BLUETOOTH APPEL\u00c9E \u00abKNOB\u00bb REPR\u00c9SENTE UNE MENACE POUR LES APPAREILS VULN\u00c9RABLES"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2019\/08\/A-New-Bluetooth-Vulnerability.jpg?fit=640%2C414&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-ii","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1134","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=1134"}],"version-history":[{"count":1,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1134\/revisions"}],"predecessor-version":[{"id":1137,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/1134\/revisions\/1137"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/1135"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=1134"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=1134"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=1134"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}