{"id":2936,"date":"2021-01-26T13:35:39","date_gmt":"2021-01-26T12:35:39","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=2936"},"modified":"2021-01-26T13:35:44","modified_gmt":"2021-01-26T12:35:44","slug":"lentreprise-informatique-sonicwall-confirme-lexistence-de-failles-de-securite-zero-day-sur-son-serveur","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/lentreprise-informatique-sonicwall-confirme-lexistence-de-failles-de-securite-zero-day-sur-son-serveur\/","title":{"rendered":"L\u2019ENTREPRISE INFORMATIQUE SONICWALL CONFIRME L&rsquo;EXISTENCE DE FAILLES DE S\u00c9CURIT\u00c9 ZERO-DAY SUR SON SERVEUR"},"content":{"rendered":"\n<p>SonicWall, fournisseur de produits de s\u00e9curit\u00e9 Internet pour VPN et pare-feu, a r\u00e9v\u00e9l\u00e9 que ses syst\u00e8mes internes ont subi des attaques coordonn\u00e9es via des <strong><a href=\"https:\/\/blog.koddos.net\/hackers-infect-windows-and-android-devices-using-zero-days\/\">vuln\u00e9rabilit\u00e9s zero-day<\/a><\/strong>.<\/p>\n\n\n\n<p>\u00ab\u00a0R\u00e9cemment, SonicWall a identifi\u00e9 une attaque organis\u00e9e sur ses syst\u00e8mes internes par des acteurs tr\u00e8s sophistiqu\u00e9s\u00a0\u00bb, a d\u00e9clar\u00e9 la soci\u00e9t\u00e9.<\/p>\n\n\n\n<p>Selon SonicWall, les attaquants ont infect\u00e9 son acc\u00e8s mobile s\u00e9curis\u00e9 (SMA) et ses produits d&rsquo;acc\u00e8s \u00e0 distance s\u00e9curis\u00e9. L&rsquo;entreprise de la Silicon Valley <strong><a href=\"https:\/\/www.sonicwall.com\/blog\/2021\/01\/sonicwall-identifies-coordinated-attack-on-netextender-vpn-client-version-10-and-sma-100-series\/\">a d\u00e9clar\u00e9<\/a><\/strong> que ces deux produits pirat\u00e9s permettent aux utilisateurs d&rsquo;acc\u00e9der \u00e0 distance aux ressources internes.<\/p>\n\n\n\n<p>Les attaquants ont profit\u00e9 d&rsquo;une <strong><a href=\"https:\/\/blog.koddos.net\/vmware-flaw-reportedly-a-vector-in-solarwinds-hack\/\">faille logicielle<\/a><\/strong> r\u00e9cemment d\u00e9couverte sur les produits d&rsquo;acc\u00e8s \u00e0 distance. Cependant, le fournisseur de s\u00e9curit\u00e9 n&rsquo;a pas fourni plus d&rsquo;informations sur l&rsquo;attaque, ajoutant que plus d&rsquo;informations seront fournies lorsqu&rsquo;il recevra plus de d\u00e9tails sur l&rsquo;incident.<\/p>\n\n\n\n<p>La nouvelle arrive apr\u00e8s que des rapports aient r\u00e9v\u00e9l\u00e9 que les syst\u00e8mes internes de SonicWall ont \u00e9t\u00e9 mis hors service mardi. Le rapport a \u00e9galement r\u00e9v\u00e9l\u00e9 que les hackers ont eu acc\u00e8s au code source du d\u00e9p\u00f4t GitLab de l&rsquo;entreprise.<\/p>\n\n\n\n<p>SonicWall a demand\u00e9 \u00e0 ses clients et partenaires utilisant la s\u00e9rie SMA 100 de continuer \u00e0 acc\u00e9der \u00e0 la liste blanche directement sur le SMA pour rester en s\u00e9curit\u00e9. Ils peuvent \u00e9galement utiliser un pare-feu uniquement pour donner acc\u00e8s aux connexions SSL-VPN \u00e0 la plate-forme SMA.<\/p>\n\n\n\n<p><strong>La violation de SolarWinds se r\u00e9percute sur d&rsquo;autres entreprises<\/strong><\/p>\n\n\n\n<p>Ces derni\u00e8res semaines ont vu un niveau sans pr\u00e9c\u00e9dent d&rsquo;attaques contre les fournisseurs de cybers\u00e9curit\u00e9. Il s&rsquo;agit du cinqui\u00e8me fournisseur de s\u00e9curit\u00e9 \u00ab\u00a0pure play\u00a0\u00bb qui a confirm\u00e9 publiquement une attaque contre son syst\u00e8me au cours des sept derni\u00e8res semaines.<\/p>\n\n\n\n<p>Le 8 d\u00e9cembre, le fournisseur de s\u00e9curit\u00e9 FireEye a tir\u00e9 la sonnette d&rsquo;alarme sur le piratage de son syst\u00e8me, ce qui a incit\u00e9 d&rsquo;autres entreprises \u00e0 renforcer leurs protocoles de s\u00e9curit\u00e9. FireEye a r\u00e9v\u00e9l\u00e9 \u00e0 l&rsquo;\u00e9poque que ses syst\u00e8mes \u00e9taient <strong><a href=\"https:\/\/blog.koddos.net\/indicted-chinese-state-hackers-compromised-over-100-companies\/\">compromis par des hackers<\/a><\/strong> qui voulaient acc\u00e9der aux serveurs de certains de ses clients gouvernementaux.<\/p>\n\n\n\n<p>L&rsquo;attaquant a r\u00e9ussi \u00e0 acc\u00e9der \u00e0 certains des syst\u00e8mes internes de FireEye. Depuis lors, des rapports ont fait \u00e9tat de violations r\u00e9sultant de la violation initiale des syst\u00e8mes de FireEye. Le nombre d&rsquo;entreprises touch\u00e9es aurait \u00e9t\u00e9 pire si FireEye n&rsquo;avait pas fait le premier pas pour alerter \u00e0 temps ses clients et ses consommateurs de sa violation.<\/p>\n\n\n\n<p>Deux semaines apr\u00e8s la violation de FireEye, CrowdStrike a r\u00e9v\u00e9l\u00e9 que le Centre de renseignements sur les menaces de Microsoft les avait contact\u00e9s, soulignant qu&rsquo;il y avait un compte Microsoft Azure d&rsquo;un revendeur qui faisait des demandes non autoris\u00e9es sur l&rsquo;API de Microsoft dans le nuage.<\/p>\n\n\n\n<p>Cependant, les hackers n&rsquo;ont pas r\u00e9ussi \u00e0 lire le courrier \u00e9lectronique de la soci\u00e9t\u00e9, ne sachant pas que CrodSrike n&rsquo;utilise pas la messagerie \u00e9lectronique Office 356.<\/p>\n\n\n\n<p>Et le 12 janvier, Mimecast a r\u00e9v\u00e9l\u00e9 que son certificat \u00e9mis par Mimecast a \u00e9t\u00e9 compromis par un acteur malveillant sophistiqu\u00e9. Selon la r\u00e9v\u00e9lation, l&rsquo;acteur de la menace a utilis\u00e9 le certificat affect\u00e9 pour authentifier les produits de protection interne du courrier \u00e9lectronique (IEP) de l&rsquo;entreprise, le contr\u00f4leur de continuit\u00e9, ainsi que les protocoles Sync et Recover de Mimecast.<\/p>\n\n\n\n<p>Cependant, Mimecast n&rsquo;a pas indiqu\u00e9 si l&rsquo;attaque a \u00e9t\u00e9 perp\u00e9tr\u00e9e par le m\u00eame groupe responsable de <strong><a href=\"https:\/\/blog.koddos.net\/mimecast-certificate-compromised-in-supply-chain-attack\/\">l&rsquo;attaque de SolarWinds<\/a><\/strong>.<\/p>\n\n\n\n<p>Cependant, certains responsables de la cybers\u00e9curit\u00e9 ont r\u00e9v\u00e9l\u00e9 qu&rsquo;il est tr\u00e8s probable que le m\u00eame groupe responsable de l&rsquo;attaque de SolarWinds soit toujours responsable de l&rsquo;attaque de Mimecast.<\/p>\n\n\n\n<p><strong>Les acteurs sponsoris\u00e9s par l&rsquo;\u00c9tat russe seraient responsables des attaques<\/strong><\/p>\n\n\n\n<p>Le Washington Post a rapport\u00e9 pr\u00e9c\u00e9demment que le groupe responsable de l&rsquo;attaque de SolarWinds n&rsquo;est autre que le service de renseignement \u00e9tranger russe.<\/p>\n\n\n\n<p>Et dans un rapport r\u00e9cent, la soci\u00e9t\u00e9 de cybers\u00e9curit\u00e9 Malwarebytes a r\u00e9v\u00e9l\u00e9 que les hackers de SolarWinds ont utilis\u00e9 pour leur attaque un produit de messagerie \u00e9lectronique non fonctionnel dans <strong><a href=\"https:\/\/blog.koddos.net\/microsoft-security-woes-office-365-accounts-used-to-send-millions-of-spam-emails\/\">Office 365<\/a><\/strong>. Ce produit a permis aux hackers d&rsquo;acc\u00e9der facilement \u00e0 certains courriels internes de l&rsquo;entreprise.<\/p>\n\n\n\n<p>Bien que Malwarebytes n&rsquo;utilise pas SolarWinds Orion ni aucun de ses produits, la soci\u00e9t\u00e9 a d\u00e9clar\u00e9 avoir appris l&rsquo;existence de la violation par Microsoft apr\u00e8s avoir intercept\u00e9 une activit\u00e9 suspecte sur une application tierce dans Office 265.<\/p>\n\n\n\n<p><strong>Les entreprises doivent mettre en place une authentification \u00e0 plusieurs facteurs<\/strong><\/p>\n\n\n\n<p>La violation de la cha\u00eene logistique de SolarWinds a touch\u00e9 plusieurs entreprises, dont Crowdstrike, Microsoft et FireEye.<\/p>\n\n\n\n<p>SonicWall a d\u00e9clar\u00e9 avoir constat\u00e9 une \u00ab\u00a0augmentation spectaculaire des cyberattaques contre le gouvernement et les entreprises\u00a0\u00bb, la soci\u00e9t\u00e9 a \u00e9galement not\u00e9 que l&rsquo;attaque a \u00e9t\u00e9 plus fr\u00e9quente parmi les entreprises qui fournissent des protocoles de s\u00e9curit\u00e9 et d&rsquo;infrastructure critiques pour les firmes.<\/p>\n\n\n\n<p>SonicWall a \u00e9galement <strong><a href=\"https:\/\/www.sonicwall.com\/support\/product-notification\/urgent-security-notice-netextender-vpn-client-10-x-sma-100-series-vulnerability\/210122173415410\/\">averti les entreprises<\/a><\/strong> qui pourraient \u00eatre touch\u00e9es de d\u00e9sactiver l&rsquo;acc\u00e8s de NextExtender au pare-feu et de permettre l&rsquo;authentification multi-facteurs pour emp\u00eacher toute attaque sur leurs syst\u00e8mes. Elles devraient \u00e9galement avoir une restriction temporaire de l&rsquo;acc\u00e8s aux administrateurs et aux utilisateurs pour les adresses IP publiques.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SonicWall, fournisseur de produits de s\u00e9curit\u00e9 Internet pour VPN et pare-feu, a r\u00e9v\u00e9l\u00e9 que ses syst\u00e8mes internes ont subi des attaques coordonn\u00e9es via des vuln\u00e9rabilit\u00e9s zero-day. \u00ab\u00a0R\u00e9cemment, SonicWall a identifi\u00e9 une attaque organis\u00e9e sur ses syst\u00e8mes internes par des acteurs tr\u00e8s sophistiqu\u00e9s\u00a0\u00bb, a d\u00e9clar\u00e9 la soci\u00e9t\u00e9. Selon SonicWall, les attaquants ont infect\u00e9 son acc\u00e8s mobile &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/lentreprise-informatique-sonicwall-confirme-lexistence-de-failles-de-securite-zero-day-sur-son-serveur\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">L\u2019ENTREPRISE INFORMATIQUE SONICWALL CONFIRME L&rsquo;EXISTENCE DE FAILLES DE S\u00c9CURIT\u00c9 ZERO-DAY SUR SON SERVEUR<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":2937,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[6],"tags":[],"class_list":["post-2936","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>L\u2019ENTREPRISE INFORMATIQUE SONICWALL CONFIRME L&#039;EXISTENCE DE FAILLES DE S\u00c9CURIT\u00c9 ZERO-DAY SUR SON SERVEUR - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/lentreprise-informatique-sonicwall-confirme-lexistence-de-failles-de-securite-zero-day-sur-son-serveur\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"L\u2019ENTREPRISE INFORMATIQUE SONICWALL CONFIRME L&#039;EXISTENCE DE FAILLES DE S\u00c9CURIT\u00c9 ZERO-DAY SUR SON SERVEUR - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"SonicWall, fournisseur de produits de s\u00e9curit\u00e9 Internet pour VPN et pare-feu, a r\u00e9v\u00e9l\u00e9 que ses syst\u00e8mes internes ont subi des attaques coordonn\u00e9es via des vuln\u00e9rabilit\u00e9s zero-day. \u00ab\u00a0R\u00e9cemment, SonicWall a identifi\u00e9 une attaque organis\u00e9e sur ses syst\u00e8mes internes par des acteurs tr\u00e8s sophistiqu\u00e9s\u00a0\u00bb, a d\u00e9clar\u00e9 la soci\u00e9t\u00e9. Selon SonicWall, les attaquants ont infect\u00e9 son acc\u00e8s mobile &hellip; Continue reading L\u2019ENTREPRISE INFORMATIQUE SONICWALL CONFIRME L&rsquo;EXISTENCE DE FAILLES DE S\u00c9CURIT\u00c9 ZERO-DAY SUR SON SERVEUR\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/lentreprise-informatique-sonicwall-confirme-lexistence-de-failles-de-securite-zero-day-sur-son-serveur\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-26T12:35:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-26T12:35:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2021\/01\/Cyber-Firm-SonicWall-Confirms-Zero-Day-Bugs-On-Its-Server.jpg?fit=640%2C405&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"405\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/lentreprise-informatique-sonicwall-confirme-lexistence-de-failles-de-securite-zero-day-sur-son-serveur\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/lentreprise-informatique-sonicwall-confirme-lexistence-de-failles-de-securite-zero-day-sur-son-serveur\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"L\u2019ENTREPRISE INFORMATIQUE SONICWALL CONFIRME L&rsquo;EXISTENCE DE FAILLES DE S\u00c9CURIT\u00c9 ZERO-DAY SUR SON SERVEUR\",\"datePublished\":\"2021-01-26T12:35:39+00:00\",\"dateModified\":\"2021-01-26T12:35:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/lentreprise-informatique-sonicwall-confirme-lexistence-de-failles-de-securite-zero-day-sur-son-serveur\\\/\"},\"wordCount\":929,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/lentreprise-informatique-sonicwall-confirme-lexistence-de-failles-de-securite-zero-day-sur-son-serveur\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/Cyber-Firm-SonicWall-Confirms-Zero-Day-Bugs-On-Its-Server.jpg?fit=640%2C405&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/lentreprise-informatique-sonicwall-confirme-lexistence-de-failles-de-securite-zero-day-sur-son-serveur\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/lentreprise-informatique-sonicwall-confirme-lexistence-de-failles-de-securite-zero-day-sur-son-serveur\\\/\",\"name\":\"L\u2019ENTREPRISE INFORMATIQUE SONICWALL CONFIRME L'EXISTENCE DE FAILLES DE S\u00c9CURIT\u00c9 ZERO-DAY SUR SON SERVEUR - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/lentreprise-informatique-sonicwall-confirme-lexistence-de-failles-de-securite-zero-day-sur-son-serveur\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/lentreprise-informatique-sonicwall-confirme-lexistence-de-failles-de-securite-zero-day-sur-son-serveur\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/Cyber-Firm-SonicWall-Confirms-Zero-Day-Bugs-On-Its-Server.jpg?fit=640%2C405&ssl=1\",\"datePublished\":\"2021-01-26T12:35:39+00:00\",\"dateModified\":\"2021-01-26T12:35:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/lentreprise-informatique-sonicwall-confirme-lexistence-de-failles-de-securite-zero-day-sur-son-serveur\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/lentreprise-informatique-sonicwall-confirme-lexistence-de-failles-de-securite-zero-day-sur-son-serveur\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/lentreprise-informatique-sonicwall-confirme-lexistence-de-failles-de-securite-zero-day-sur-son-serveur\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/Cyber-Firm-SonicWall-Confirms-Zero-Day-Bugs-On-Its-Server.jpg?fit=640%2C405&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/Cyber-Firm-SonicWall-Confirms-Zero-Day-Bugs-On-Its-Server.jpg?fit=640%2C405&ssl=1\",\"width\":640,\"height\":405},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/lentreprise-informatique-sonicwall-confirme-lexistence-de-failles-de-securite-zero-day-sur-son-serveur\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"L\u2019ENTREPRISE INFORMATIQUE SONICWALL CONFIRME L&rsquo;EXISTENCE DE FAILLES DE S\u00c9CURIT\u00c9 ZERO-DAY SUR SON SERVEUR\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"L\u2019ENTREPRISE INFORMATIQUE SONICWALL CONFIRME L'EXISTENCE DE FAILLES DE S\u00c9CURIT\u00c9 ZERO-DAY SUR SON SERVEUR - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/lentreprise-informatique-sonicwall-confirme-lexistence-de-failles-de-securite-zero-day-sur-son-serveur\/","og_locale":"fr_FR","og_type":"article","og_title":"L\u2019ENTREPRISE INFORMATIQUE SONICWALL CONFIRME L'EXISTENCE DE FAILLES DE S\u00c9CURIT\u00c9 ZERO-DAY SUR SON SERVEUR - Blog KoDDoS","og_description":"SonicWall, fournisseur de produits de s\u00e9curit\u00e9 Internet pour VPN et pare-feu, a r\u00e9v\u00e9l\u00e9 que ses syst\u00e8mes internes ont subi des attaques coordonn\u00e9es via des vuln\u00e9rabilit\u00e9s zero-day. \u00ab\u00a0R\u00e9cemment, SonicWall a identifi\u00e9 une attaque organis\u00e9e sur ses syst\u00e8mes internes par des acteurs tr\u00e8s sophistiqu\u00e9s\u00a0\u00bb, a d\u00e9clar\u00e9 la soci\u00e9t\u00e9. Selon SonicWall, les attaquants ont infect\u00e9 son acc\u00e8s mobile &hellip; Continue reading L\u2019ENTREPRISE INFORMATIQUE SONICWALL CONFIRME L&rsquo;EXISTENCE DE FAILLES DE S\u00c9CURIT\u00c9 ZERO-DAY SUR SON SERVEUR","og_url":"https:\/\/fr.koddos.net\/blog\/lentreprise-informatique-sonicwall-confirme-lexistence-de-failles-de-securite-zero-day-sur-son-serveur\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2021-01-26T12:35:39+00:00","article_modified_time":"2021-01-26T12:35:44+00:00","og_image":[{"width":640,"height":405,"url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2021\/01\/Cyber-Firm-SonicWall-Confirms-Zero-Day-Bugs-On-Its-Server.jpg?fit=640%2C405&ssl=1","type":"image\/jpeg"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/lentreprise-informatique-sonicwall-confirme-lexistence-de-failles-de-securite-zero-day-sur-son-serveur\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/lentreprise-informatique-sonicwall-confirme-lexistence-de-failles-de-securite-zero-day-sur-son-serveur\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"L\u2019ENTREPRISE INFORMATIQUE SONICWALL CONFIRME L&rsquo;EXISTENCE DE FAILLES DE S\u00c9CURIT\u00c9 ZERO-DAY SUR SON SERVEUR","datePublished":"2021-01-26T12:35:39+00:00","dateModified":"2021-01-26T12:35:44+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/lentreprise-informatique-sonicwall-confirme-lexistence-de-failles-de-securite-zero-day-sur-son-serveur\/"},"wordCount":929,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/lentreprise-informatique-sonicwall-confirme-lexistence-de-failles-de-securite-zero-day-sur-son-serveur\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2021\/01\/Cyber-Firm-SonicWall-Confirms-Zero-Day-Bugs-On-Its-Server.jpg?fit=640%2C405&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/lentreprise-informatique-sonicwall-confirme-lexistence-de-failles-de-securite-zero-day-sur-son-serveur\/","url":"https:\/\/fr.koddos.net\/blog\/lentreprise-informatique-sonicwall-confirme-lexistence-de-failles-de-securite-zero-day-sur-son-serveur\/","name":"L\u2019ENTREPRISE INFORMATIQUE SONICWALL CONFIRME L'EXISTENCE DE FAILLES DE S\u00c9CURIT\u00c9 ZERO-DAY SUR SON SERVEUR - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/lentreprise-informatique-sonicwall-confirme-lexistence-de-failles-de-securite-zero-day-sur-son-serveur\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/lentreprise-informatique-sonicwall-confirme-lexistence-de-failles-de-securite-zero-day-sur-son-serveur\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2021\/01\/Cyber-Firm-SonicWall-Confirms-Zero-Day-Bugs-On-Its-Server.jpg?fit=640%2C405&ssl=1","datePublished":"2021-01-26T12:35:39+00:00","dateModified":"2021-01-26T12:35:44+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/lentreprise-informatique-sonicwall-confirme-lexistence-de-failles-de-securite-zero-day-sur-son-serveur\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/lentreprise-informatique-sonicwall-confirme-lexistence-de-failles-de-securite-zero-day-sur-son-serveur\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/lentreprise-informatique-sonicwall-confirme-lexistence-de-failles-de-securite-zero-day-sur-son-serveur\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2021\/01\/Cyber-Firm-SonicWall-Confirms-Zero-Day-Bugs-On-Its-Server.jpg?fit=640%2C405&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2021\/01\/Cyber-Firm-SonicWall-Confirms-Zero-Day-Bugs-On-Its-Server.jpg?fit=640%2C405&ssl=1","width":640,"height":405},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/lentreprise-informatique-sonicwall-confirme-lexistence-de-failles-de-securite-zero-day-sur-son-serveur\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"L\u2019ENTREPRISE INFORMATIQUE SONICWALL CONFIRME L&rsquo;EXISTENCE DE FAILLES DE S\u00c9CURIT\u00c9 ZERO-DAY SUR SON SERVEUR"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2021\/01\/Cyber-Firm-SonicWall-Confirms-Zero-Day-Bugs-On-Its-Server.jpg?fit=640%2C405&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-Lm","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2936","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=2936"}],"version-history":[{"count":1,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2936\/revisions"}],"predecessor-version":[{"id":2938,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2936\/revisions\/2938"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/2937"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=2936"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=2936"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=2936"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}