{"id":4898,"date":"2023-04-01T04:41:00","date_gmt":"2023-04-01T02:41:00","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=4898"},"modified":"2023-04-04T20:45:21","modified_gmt":"2023-04-04T18:45:21","slug":"plus-de-15-millions-de-services-publics-vulnerables-aux-vulnerabilites-kev-de-la-cisa","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/plus-de-15-millions-de-services-publics-vulnerables-aux-vulnerabilites-kev-de-la-cisa\/","title":{"rendered":"PLUS DE 15 MILLIONS DE SERVICES PUBLICS VULN\u00c9RABLES AUX VULN\u00c9RABILIT\u00c9S KEV DE LA CISA"},"content":{"rendered":"\n<p>Plus de 15 millions de services publics sont vuln\u00e9rables \u00e0 plus d&rsquo;une des 896 vuln\u00e9rabilit\u00e9s r\u00e9pertori\u00e9es dans le catalogue des vuln\u00e9rabilit\u00e9s connues et exploitables (KEV) de la CISA.<\/p>\n\n\n\n<p><strong>Les services publics vuln\u00e9rables aux vuln\u00e9rabilit\u00e9s KEV de la CISA<\/strong><\/p>\n\n\n\n<p>Le nombre \u00e9lev\u00e9 de <strong><a href=\"https:\/\/blog.koddos.net\/cybersecurity-researchers-detect-crucial-vulnerabilities-in-backstage-that-hackers-could-exploit\/\">vuln\u00e9rabilit\u00e9s<\/a><\/strong> dans ces services a \u00e9t\u00e9 r\u00e9v\u00e9l\u00e9 dans un rapport de la soci\u00e9t\u00e9 de cybers\u00e9curit\u00e9 Rezilion. L&rsquo;entreprise a men\u00e9 des recherches approfondies pour d\u00e9tecter les syst\u00e8mes vuln\u00e9rables expos\u00e9s aux piratages des acteurs de la menace. Les hackers, dans ce cas, sont soit parrain\u00e9s par un \u00c9tat, soit des groupes de ransomware.<\/p>\n\n\n\n<p>Les <strong><a href=\"https:\/\/www.rezilion.com\/blog\/get-to-know-kev-in-our-new-research-report\/\">d\u00e9couvertes<\/a><\/strong> de Rezilion sont inqui\u00e9tantes car les failles examin\u00e9es sont connues et r\u00e9pertori\u00e9es dans le catalogue KEV de la CISA. Les acteurs de la menace ont activement exploit\u00e9 les vuln\u00e9rabilit\u00e9s, et tout retard dans la correction de ces failles permet de faire perdurer une vaste surface d&rsquo;attaque, permettant aux hackers d&rsquo;acc\u00e9der \u00e0 de multiples cibles.<\/p>\n\n\n\n<p>La soci\u00e9t\u00e9 de cybers\u00e9curit\u00e9 Rezilion d\u00e9ploie le service d&rsquo;analyse web Shodan qui d\u00e9tecte les points d&rsquo;extr\u00e9mit\u00e9 vuln\u00e9rables aux CVE int\u00e9gr\u00e9s dans le catalogue des vuln\u00e9rabilit\u00e9s connues et exploitables (CISA Known Exploitable Vulnerabilities Catalog).<\/p>\n\n\n\n<p>En utilisant les requ\u00eates de recherche personnalis\u00e9es, les chercheurs ont d\u00e9tect\u00e9 15 millions d&rsquo;instances vuln\u00e9rables \u00e0 200 CVE du catalogue des vuln\u00e9rabilit\u00e9s. Plus de la moiti\u00e9 des 7 millions d&rsquo;instances sont vuln\u00e9rables \u00e0 l&rsquo;une des 137 CVE li\u00e9es \u00e0 Microsoft Windows, ce qui fait de cette fonctionnalit\u00e9 une priorit\u00e9 pour les d\u00e9fenseurs et une cible pour les hackers.<\/p>\n\n\n\n<p>Pr\u00e8s de la moiti\u00e9 des dix principaux CVE, en dehors de Windows, identifi\u00e9s par Rezilion datent de plus de cinq ans. Par cons\u00e9quent, environ 800 000 machines n&rsquo;ont install\u00e9 aucune mise \u00e0 jour de s\u00e9curit\u00e9 pendant une p\u00e9riode donn\u00e9e.<\/p>\n\n\n\n<p>Le rapport indique \u00e9galement que plus de 4,5 millions d&rsquo;appareils connect\u00e9s \u00e0 l&rsquo;internet ont \u00e9t\u00e9 d\u00e9tect\u00e9s et jug\u00e9s vuln\u00e9rables \u00e0 des attaques utilisant les CVE identifi\u00e9s. \u00ab\u00a0Il est tr\u00e8s pr\u00e9occupant que ces machines n&rsquo;aient pas install\u00e9 les mises \u00e0 jour pertinentes publi\u00e9es pendant des ann\u00e9es, m\u00eame si un correctif a \u00e9t\u00e9 publi\u00e9, et que ces vuln\u00e9rabilit\u00e9s soient connues pour \u00eatre exploit\u00e9es dans la nature\u00a0\u00bb, indique le rapport.<\/p>\n\n\n\n<p>L&rsquo;une des CVE signal\u00e9es, CVE-2021-40438, est une vuln\u00e9rabilit\u00e9 de gravit\u00e9 moyenne qui appara\u00eet dans pr\u00e8s de 6,5 millions de r\u00e9sultats de Shodan. Cette faille affecte le serveur Apache HTTPD v2.4.48 et les versions ant\u00e9rieures.<\/p>\n\n\n\n<p>L&rsquo;autre faille est ProxyShell, un ensemble de trois failles qui affectent Microsoft Exchange et qui ont \u00e9t\u00e9 exploit\u00e9es par des acteurs Iraniens pour des ex\u00e9cutions de code \u00e0 distance en 2021. Le ProxyLogon contient \u00e9galement quatre vuln\u00e9rabilit\u00e9s affectant Microsoft Exchange que des hackers Russes ont d\u00e9j\u00e0 exploit\u00e9es pour attaquer des infrastructures Am\u00e9ricaines.<\/p>\n\n\n\n<p>La faille HeartBleed est une faille de gravit\u00e9 moyenne qui affecte OpenSSL, o\u00f9 les hackers peuvent faire fuir des informations sensibles de la m\u00e9moire du processus. Selon Shodan, 190 446 failles sont encore expos\u00e9es aux attaques.<\/p>\n\n\n\n<p>La faille CVE-2021-40438 montre que de nombreux exploits sont li\u00e9s aux sites web et aux services fonctionnant sur Apache, et non \u00e0 des appareils individuels. Les multiples sites web peuvent \u00eatre h\u00e9berg\u00e9s sur un seul serveur.<\/p>\n\n\n\n<p>L&rsquo;estimation de Rezilion concernant les 15 millions de points de terminaison expos\u00e9s est prudente. Elle ne contient pas de doublons et ne tient pas compte des cas o\u00f9 les chercheurs n&rsquo;ont pas pu d\u00e9tecter des requ\u00eates permettant de pr\u00e9ciser les versions des produits.<\/p>\n\n\n\n<p>Un rapport de Rezilion ajoute que les chercheurs ne se sont pas uniquement appuy\u00e9s sur les recherches CVE int\u00e9gr\u00e9es dans Shodan pour leur \u00e9tude. Ils ont plut\u00f4t cr\u00e9\u00e9 des requ\u00eates de recherche personnalis\u00e9es qui ont permis de d\u00e9terminer les versions de logiciels fonctionnant sur plusieurs appareils.<\/p>\n\n\n\n<p>L&rsquo;entreprise a indiqu\u00e9 qu&rsquo;elle avait effectu\u00e9 son analyse, notamment en d\u00e9tectant les versions vuln\u00e9rables du produit concern\u00e9 et en concevant des requ\u00eates Shodan qui identifient les indications relatives aux versions dans les m\u00e9tadonn\u00e9es visibles par Shodan.<\/p>\n\n\n\n<p><strong>Tentatives d&rsquo;exploitation de ces vuln\u00e9rabilit\u00e9s<\/strong><\/p>\n\n\n\n<p>Rezilion a utilis\u00e9 les donn\u00e9es acquises dans Greynoise pour surveiller et classer les tentatives d&rsquo;exploitation de cette vuln\u00e9rabilit\u00e9. La vuln\u00e9rabilit\u00e9 la plus exploit\u00e9e est CVE-2022-26134, avec 1 421 r\u00e9sultats dans GreyNoise, tandis que 816 tentatives d&rsquo;exploitation ont \u00e9t\u00e9 faites au cours du dernier mois.<\/p>\n\n\n\n<p>Si les hackers exploitent cette faille, ils peuvent ex\u00e9cuter une expression Object-Graph Navigation Language sur la vuln\u00e9rabilit\u00e9. Les autres vuln\u00e9rabilit\u00e9s qui ont \u00e9galement un niveau d&rsquo;exploitation \u00e9lev\u00e9 comprennent CVE-2018-13379, qui a fait l&rsquo;objet de 66 tentatives d&rsquo;exploitation au cours du mois dernier.<\/p>\n\n\n\n<p>La protection contre les risques pos\u00e9s par ces failles n\u00e9cessite l&rsquo;installation de correctifs sur les appareils des utilisateurs. En outre, les organisations devraient \u00e9galement donner la priorit\u00e9 aux failles critiques lors de l&rsquo;application des correctifs ou de leur s\u00e9curisation dans un pare-feu.<\/p>\n\n\n\n<p>Selon Rezilion, les failles de Microsoft Windows, Adobe Flash Player, Google Chrome, Microsoft Office, Internet Explorer et Win32k repr\u00e9sentent un quart du catalogue KEV de la CISA, o\u00f9 ces produits peuvent constituer un point de d\u00e9part id\u00e9al.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Plus de 15 millions de services publics sont vuln\u00e9rables \u00e0 plus d&rsquo;une des 896 vuln\u00e9rabilit\u00e9s r\u00e9pertori\u00e9es dans le catalogue des vuln\u00e9rabilit\u00e9s connues et exploitables (KEV) de la CISA. Les services publics vuln\u00e9rables aux vuln\u00e9rabilit\u00e9s KEV de la CISA Le nombre \u00e9lev\u00e9 de vuln\u00e9rabilit\u00e9s dans ces services a \u00e9t\u00e9 r\u00e9v\u00e9l\u00e9 dans un rapport de la soci\u00e9t\u00e9 &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/plus-de-15-millions-de-services-publics-vulnerables-aux-vulnerabilites-kev-de-la-cisa\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">PLUS DE 15 MILLIONS DE SERVICES PUBLICS VULN\u00c9RABLES AUX VULN\u00c9RABILIT\u00c9S KEV DE LA CISA<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":4899,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[6],"tags":[],"class_list":["post-4898","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>PLUS DE 15 MILLIONS DE SERVICES PUBLICS VULN\u00c9RABLES AUX VULN\u00c9RABILIT\u00c9S KEV DE LA CISA - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/plus-de-15-millions-de-services-publics-vulnerables-aux-vulnerabilites-kev-de-la-cisa\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PLUS DE 15 MILLIONS DE SERVICES PUBLICS VULN\u00c9RABLES AUX VULN\u00c9RABILIT\u00c9S KEV DE LA CISA - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"Plus de 15 millions de services publics sont vuln\u00e9rables \u00e0 plus d&rsquo;une des 896 vuln\u00e9rabilit\u00e9s r\u00e9pertori\u00e9es dans le catalogue des vuln\u00e9rabilit\u00e9s connues et exploitables (KEV) de la CISA. Les services publics vuln\u00e9rables aux vuln\u00e9rabilit\u00e9s KEV de la CISA Le nombre \u00e9lev\u00e9 de vuln\u00e9rabilit\u00e9s dans ces services a \u00e9t\u00e9 r\u00e9v\u00e9l\u00e9 dans un rapport de la soci\u00e9t\u00e9 &hellip; Continue reading PLUS DE 15 MILLIONS DE SERVICES PUBLICS VULN\u00c9RABLES AUX VULN\u00c9RABILIT\u00c9S KEV DE LA CISA\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/plus-de-15-millions-de-services-publics-vulnerables-aux-vulnerabilites-kev-de-la-cisa\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-01T02:41:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-04T18:45:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/fr.koddos.net\/blog\/wp-content\/uploads\/2023\/04\/DoorDish-says-it-has-been-hit-by-a-cybersecurity-attack.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"427\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/plus-de-15-millions-de-services-publics-vulnerables-aux-vulnerabilites-kev-de-la-cisa\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/plus-de-15-millions-de-services-publics-vulnerables-aux-vulnerabilites-kev-de-la-cisa\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"PLUS DE 15 MILLIONS DE SERVICES PUBLICS VULN\u00c9RABLES AUX VULN\u00c9RABILIT\u00c9S KEV DE LA CISA\",\"datePublished\":\"2023-04-01T02:41:00+00:00\",\"dateModified\":\"2023-04-04T18:45:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/plus-de-15-millions-de-services-publics-vulnerables-aux-vulnerabilites-kev-de-la-cisa\\\/\"},\"wordCount\":937,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/plus-de-15-millions-de-services-publics-vulnerables-aux-vulnerabilites-kev-de-la-cisa\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/DoorDish-says-it-has-been-hit-by-a-cybersecurity-attack.webp?fit=640%2C427&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/plus-de-15-millions-de-services-publics-vulnerables-aux-vulnerabilites-kev-de-la-cisa\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/plus-de-15-millions-de-services-publics-vulnerables-aux-vulnerabilites-kev-de-la-cisa\\\/\",\"name\":\"PLUS DE 15 MILLIONS DE SERVICES PUBLICS VULN\u00c9RABLES AUX VULN\u00c9RABILIT\u00c9S KEV DE LA CISA - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/plus-de-15-millions-de-services-publics-vulnerables-aux-vulnerabilites-kev-de-la-cisa\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/plus-de-15-millions-de-services-publics-vulnerables-aux-vulnerabilites-kev-de-la-cisa\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/DoorDish-says-it-has-been-hit-by-a-cybersecurity-attack.webp?fit=640%2C427&ssl=1\",\"datePublished\":\"2023-04-01T02:41:00+00:00\",\"dateModified\":\"2023-04-04T18:45:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/plus-de-15-millions-de-services-publics-vulnerables-aux-vulnerabilites-kev-de-la-cisa\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/plus-de-15-millions-de-services-publics-vulnerables-aux-vulnerabilites-kev-de-la-cisa\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/plus-de-15-millions-de-services-publics-vulnerables-aux-vulnerabilites-kev-de-la-cisa\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/DoorDish-says-it-has-been-hit-by-a-cybersecurity-attack.webp?fit=640%2C427&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/DoorDish-says-it-has-been-hit-by-a-cybersecurity-attack.webp?fit=640%2C427&ssl=1\",\"width\":640,\"height\":427},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/plus-de-15-millions-de-services-publics-vulnerables-aux-vulnerabilites-kev-de-la-cisa\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PLUS DE 15 MILLIONS DE SERVICES PUBLICS VULN\u00c9RABLES AUX VULN\u00c9RABILIT\u00c9S KEV DE LA CISA\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PLUS DE 15 MILLIONS DE SERVICES PUBLICS VULN\u00c9RABLES AUX VULN\u00c9RABILIT\u00c9S KEV DE LA CISA - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/plus-de-15-millions-de-services-publics-vulnerables-aux-vulnerabilites-kev-de-la-cisa\/","og_locale":"fr_FR","og_type":"article","og_title":"PLUS DE 15 MILLIONS DE SERVICES PUBLICS VULN\u00c9RABLES AUX VULN\u00c9RABILIT\u00c9S KEV DE LA CISA - Blog KoDDoS","og_description":"Plus de 15 millions de services publics sont vuln\u00e9rables \u00e0 plus d&rsquo;une des 896 vuln\u00e9rabilit\u00e9s r\u00e9pertori\u00e9es dans le catalogue des vuln\u00e9rabilit\u00e9s connues et exploitables (KEV) de la CISA. Les services publics vuln\u00e9rables aux vuln\u00e9rabilit\u00e9s KEV de la CISA Le nombre \u00e9lev\u00e9 de vuln\u00e9rabilit\u00e9s dans ces services a \u00e9t\u00e9 r\u00e9v\u00e9l\u00e9 dans un rapport de la soci\u00e9t\u00e9 &hellip; Continue reading PLUS DE 15 MILLIONS DE SERVICES PUBLICS VULN\u00c9RABLES AUX VULN\u00c9RABILIT\u00c9S KEV DE LA CISA","og_url":"https:\/\/fr.koddos.net\/blog\/plus-de-15-millions-de-services-publics-vulnerables-aux-vulnerabilites-kev-de-la-cisa\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2023-04-01T02:41:00+00:00","article_modified_time":"2023-04-04T18:45:21+00:00","og_image":[{"width":640,"height":427,"url":"https:\/\/fr.koddos.net\/blog\/wp-content\/uploads\/2023\/04\/DoorDish-says-it-has-been-hit-by-a-cybersecurity-attack.webp","type":"image\/webp"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/plus-de-15-millions-de-services-publics-vulnerables-aux-vulnerabilites-kev-de-la-cisa\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/plus-de-15-millions-de-services-publics-vulnerables-aux-vulnerabilites-kev-de-la-cisa\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"PLUS DE 15 MILLIONS DE SERVICES PUBLICS VULN\u00c9RABLES AUX VULN\u00c9RABILIT\u00c9S KEV DE LA CISA","datePublished":"2023-04-01T02:41:00+00:00","dateModified":"2023-04-04T18:45:21+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/plus-de-15-millions-de-services-publics-vulnerables-aux-vulnerabilites-kev-de-la-cisa\/"},"wordCount":937,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/plus-de-15-millions-de-services-publics-vulnerables-aux-vulnerabilites-kev-de-la-cisa\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2023\/04\/DoorDish-says-it-has-been-hit-by-a-cybersecurity-attack.webp?fit=640%2C427&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/plus-de-15-millions-de-services-publics-vulnerables-aux-vulnerabilites-kev-de-la-cisa\/","url":"https:\/\/fr.koddos.net\/blog\/plus-de-15-millions-de-services-publics-vulnerables-aux-vulnerabilites-kev-de-la-cisa\/","name":"PLUS DE 15 MILLIONS DE SERVICES PUBLICS VULN\u00c9RABLES AUX VULN\u00c9RABILIT\u00c9S KEV DE LA CISA - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/plus-de-15-millions-de-services-publics-vulnerables-aux-vulnerabilites-kev-de-la-cisa\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/plus-de-15-millions-de-services-publics-vulnerables-aux-vulnerabilites-kev-de-la-cisa\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2023\/04\/DoorDish-says-it-has-been-hit-by-a-cybersecurity-attack.webp?fit=640%2C427&ssl=1","datePublished":"2023-04-01T02:41:00+00:00","dateModified":"2023-04-04T18:45:21+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/plus-de-15-millions-de-services-publics-vulnerables-aux-vulnerabilites-kev-de-la-cisa\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/plus-de-15-millions-de-services-publics-vulnerables-aux-vulnerabilites-kev-de-la-cisa\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/plus-de-15-millions-de-services-publics-vulnerables-aux-vulnerabilites-kev-de-la-cisa\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2023\/04\/DoorDish-says-it-has-been-hit-by-a-cybersecurity-attack.webp?fit=640%2C427&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2023\/04\/DoorDish-says-it-has-been-hit-by-a-cybersecurity-attack.webp?fit=640%2C427&ssl=1","width":640,"height":427},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/plus-de-15-millions-de-services-publics-vulnerables-aux-vulnerabilites-kev-de-la-cisa\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"PLUS DE 15 MILLIONS DE SERVICES PUBLICS VULN\u00c9RABLES AUX VULN\u00c9RABILIT\u00c9S KEV DE LA CISA"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2023\/04\/DoorDish-says-it-has-been-hit-by-a-cybersecurity-attack.webp?fit=640%2C427&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-1h0","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/4898","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=4898"}],"version-history":[{"count":1,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/4898\/revisions"}],"predecessor-version":[{"id":4900,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/4898\/revisions\/4900"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/4899"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=4898"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=4898"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=4898"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}