{"id":282628,"date":"2022-06-01T16:32:12","date_gmt":"2022-06-01T15:32:12","guid":{"rendered":"https:\/\/www.stormshield.com\/?p=282628"},"modified":"2024-02-15T11:17:19","modified_gmt":"2024-02-15T10:17:19","slug":"alerte-securite-follina-la-reponse-des-solutions-stormshield","status":"publish","type":"post","link":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-follina-la-reponse-des-solutions-stormshield\/","title":{"rendered":"Alerte s\u00e9curit\u00e9 CVE-2022-30190 Follina : la r\u00e9ponse des solutions Stormshield"},"content":{"rendered":"<p><strong>Une nouvelle vuln\u00e9rabilit\u00e9 li\u00e9e \u00e0 la suite Office a \u00e9t\u00e9 r\u00e9cemment d\u00e9couverte. Cette faille est d\u00e9j\u00e0 exploit\u00e9e par des cyber-criminels, des fichiers malveillants exploitant la vuln\u00e9rabilit\u00e9 ayant \u00e9t\u00e9 d\u00e9couverts par des chercheurs nao_sec sur des plateformes de centralisation de pi\u00e8ces virales. Cette vuln\u00e9rabilit\u00e9 Microsoft, r\u00e9f\u00e9renc\u00e9e CVE-2022-30190, poss\u00e8de un score CVSS de 7.8\/10. Le point sur la menace Follina, avec l\u2019\u00e9quipe Stormshield Customer Security Lab.<\/strong><\/p>\n<p><strong>Mise \u00e0 jour du 02\/06 :<\/strong> un nouveau sample utilisant une strat\u00e9gie d'exploitation diff\u00e9rente a \u00e9t\u00e9 d\u00e9couvert par les \u00e9quipes de Stormshield, les protections de Stormshield Endpoint Security Evolution ont \u00e9t\u00e9 modifi\u00e9es en cons\u00e9quence.<\/p>\n<p>&nbsp;<\/p>\n<h2>Le contexte de la vuln\u00e9rabilit\u00e9 Microsoft Follina<\/h2>\n<p>La soci\u00e9t\u00e9 de recherche en cybers\u00e9curit\u00e9 <strong><em>nao_sec<\/em><\/strong> annon\u00e7ait le 27 mai via Twitter avoir d\u00e9couvert une souche virale utilisant un nouveau vecteur d\u2019attaque trouv\u00e9 dans la nature. Ce nouveau vecteur utilise l\u2019outil de diagnostic Windows pour ex\u00e9cuter des charges malveillantes.<\/p>\n<p>La vuln\u00e9rabilit\u00e9 CVE-2022-30190 est dangereuse par sa facilit\u00e9 d\u2019exploitation et de r\u00e9alisation : il suffit d\u2019un fichier Office ou RTF pointant vers un serveur distribuant la charge virale. Microsoft a d\u2019ailleurs reconnu la vuln\u00e9rabilit\u00e9 dans <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2022-30190\" target=\"_blank\" rel=\"noopener\">une communication<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<h2>Les d\u00e9tails techniques de la vuln\u00e9rabilit\u00e9 Microsoft Follina<\/h2>\n<h3>Les techniques d\u2019exploitation de la vuln\u00e9rabilit\u00e9 CVE-2022-30190<\/h3>\n<p>L\u2019exploitation de cette vuln\u00e9rabilit\u00e9 permet de contourner les outils de s\u00e9curit\u00e9 et les mesures pr\u00e9ventives de la suite Office en trois points\u00a0:<\/p>\n<ol>\n<li>La protection Office sur l\u2019\u00e9dition des documents provenant d\u2019internet :<\/li>\n<\/ol>\n<div id=\"attachment_282634\" style=\"width: 810px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-282634\" class=\"wp-image-282634\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-1.png\" alt=\"\" width=\"800\" height=\"62\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-1.png 907w, https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-1-300x23.png 300w, https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-1-768x59.png 768w, https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-1-700x54.png 700w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><p id=\"caption-attachment-282634\" class=\"wp-caption-text\"><em><small>Illustration 1 : blocage par d\u00e9faut de la manipulation des fichiers d\u2019internet<\/small><\/em><\/p><\/div>\n<ol start=\"2\">\n<li>La protection Office sur les documents contentant des macros :<\/li>\n<\/ol>\n<div id=\"attachment_282639\" style=\"width: 530px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-282639\" class=\"wp-image-282639 size-full\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-2.png\" alt=\"\" width=\"520\" height=\"157\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-2.png 520w, https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-2-300x91.png 300w\" sizes=\"auto, (max-width: 520px) 100vw, 520px\" \/><p id=\"caption-attachment-282639\" class=\"wp-caption-text\"><em><small>Illustration 2 : blocage par d\u00e9faut des macros<\/small><\/em><\/p><\/div>\n<ol start=\"3\">\n<li>Une \u00e9ventuelle protection AV \/ Endpoint en exploitant de mani\u00e8re malveillante des ressources propri\u00e9taires Microsoft suppos\u00e9es b\u00e9nignes.<\/li>\n<\/ol>\n<p>Pour l\u2019instant, les documents Office ne repr\u00e9sentent qu\u2019une seule des portes d\u2019entr\u00e9e potentielles. En effet, il est possible d'ouvrir une pi\u00e8ce malveillante par le moteur de diagnostic Windows, suite au chargement d\u2019un fichier .HTML via des commandes de scripting web comme <strong>wget<\/strong> ou <strong>curl<\/strong>.<\/p>\n<p>Et si l\u2019on revient au cas du document malveillant (qui touche un public plus large), le fonctionnement est particuli\u00e8rement sournois puisque la charge virale contenue dans le fichier peut \u00eatre ex\u00e9cut\u00e9e soit lors de l\u2019ouverture du fichier, soit simplement lors de la pr\u00e9visualisation par l\u2019explorateur Windows :<\/p>\n<div id=\"attachment_282644\" style=\"width: 810px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-282644\" class=\"wp-image-282644\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-3-1024x639.png\" alt=\"\" width=\"800\" height=\"499\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-3-1024x639.png 1024w, https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-3-300x187.png 300w, https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-3-768x479.png 768w, https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-3-700x437.png 700w, https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-3.png 1330w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><p id=\"caption-attachment-282644\" class=\"wp-caption-text\"><em><small>Illustration 3 : le proof-of-concept lance des commandes PowerShell<\/small><\/em><\/p><\/div>\n<p>Le sch\u00e9ma d\u2019attaque serait le suivant\u00a0:<\/p>\n<div id=\"attachment_282649\" style=\"width: 810px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-282649\" class=\"wp-image-282649\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-4-1024x489.png\" alt=\"\" width=\"800\" height=\"382\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-4-1024x489.png 1024w, https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-4-300x143.png 300w, https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-4-768x366.png 768w, https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-4-700x334.png 700w, https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-4.png 1134w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><p id=\"caption-attachment-282649\" class=\"wp-caption-text\"><em><small>Illustration 4 : un graphe d\u2019exploitation de la CVE-2022-30190<\/small><\/em><\/p><\/div>\n<p>&nbsp;<\/p>\n<p>Le vecteur d\u2019attaque exploite deux composants cl\u00e9s\u00a0:<\/p>\n<p><strong>Le premier<\/strong>\u00a0: un fichier de la suite Office, qui pointe vers une ressource HTML contr\u00f4l\u00e9e sur le serveur d\u2019un attaquant. Puisque les documents Microsoft Office sont construits comme des objets ayant une r\u00e9f\u00e9rence vers un serveur malveillant (ici, l\u2019adresse est localhost pour notre POC), la ressource va \u00eatre m\u00e9caniquement charg\u00e9e par Office et d\u00e9clencher la vuln\u00e9rabilit\u00e9.<\/p>\n<div id=\"attachment_282654\" style=\"width: 810px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-282654\" class=\"wp-image-282654\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-5.png\" alt=\"\" width=\"800\" height=\"579\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-5.png 813w, https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-5-300x217.png 300w, https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-5-768x555.png 768w, https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-5-700x506.png 700w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><p id=\"caption-attachment-282654\" class=\"wp-caption-text\"><em><small>Illustration 5 : le fichier de r\u00e9f\u00e9rence dans le document Office<\/small><\/em><\/p><\/div>\n<p>Ce type de fichier n\u2019est pas malveillant en soi, et constitue un \u00e9l\u00e9ment obligatoire de n\u2019importe quel document Office embarquant du contenu h\u00e9berg\u00e9 sur le web.<\/p>\n<p><strong>Le second<\/strong>\u00a0: un fichier HTML construit pour d\u00e9clencher la vuln\u00e9rabilit\u00e9.<\/p>\n<div id=\"attachment_282659\" style=\"width: 655px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-282659\" class=\"wp-image-282659 size-full\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-6.png\" alt=\"\" width=\"645\" height=\"294\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-6.png 645w, https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-6-300x137.png 300w\" sizes=\"auto, (max-width: 645px) 100vw, 645px\" \/><p id=\"caption-attachment-282659\" class=\"wp-caption-text\"><em><small>Illustration 6 : la ressource distance r\u00e9cup\u00e9r\u00e9e sur le serveur de l\u2019attaquant<\/small><\/em><\/p><\/div>\n<p>Le r\u00e9sultat est la cr\u00e9ation de processus sur le poste d\u00e9marrant la charge d\u00e9sir\u00e9e, dans notre cas PowerShell. La chaine d\u2019ex\u00e9cution est en deux temps\u00a0: la premi\u00e8re partie l\u2019est par la suite Office avant d\u2019\u00eatre trait\u00e9e ensuite par le service d\u00e9di\u00e9 au DCOM.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-282669 aligncenter\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-7.png\" alt=\"\" width=\"594\" height=\"429\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-7.png 594w, https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-7-300x217.png 300w\" sizes=\"auto, (max-width: 594px) 100vw, 594px\" \/><\/p>\n<div id=\"attachment_282664\" style=\"width: 595px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-282664\" class=\"wp-image-282664 size-full\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-71.png\" alt=\"\" width=\"585\" height=\"161\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-71.png 585w, https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-71-300x83.png 300w\" sizes=\"auto, (max-width: 585px) 100vw, 585px\" \/><p id=\"caption-attachment-282664\" class=\"wp-caption-text\"><em><small>llustration 7 : le processus li\u00e9s \u00e0 l\u2019ex\u00e9cution de la charge<\/small><\/em><\/p><\/div>\n<h3>Les syst\u00e8mes cibl\u00e9s par la vuln\u00e9rabilit\u00e9 Follina<\/h3>\n<p>Cette vuln\u00e9rabilit\u00e9 touche les syst\u00e8mes 7, 10 et 11, Server 2008 \u00e0 2022 \u00e0 la fois 32 bits et 64 bits, quel que soit le langage du syst\u00e8me.<\/p>\n<h3>Les autres informations de la vuln\u00e9rabilit\u00e9 Follina<\/h3>\n<p><strong>Kit d\u2019exploitation<\/strong><\/p>\n<p>\u00c0 ce jour, il existe des POC permettant d\u2019industrialiser la cr\u00e9ation de documents Office en pr\u00e9cisant un serveur distant qui renvoie une charge malveillante \u00e0 ex\u00e9cuter. Il est donc d\u00e9sormais impossible de sp\u00e9cifier la menace par hash aux vues de l\u2019ampleur du nombre de documents qui pourraient \u00eatre g\u00e9n\u00e9r\u00e9s.<\/p>\n<p><strong>Droits administrateurs<\/strong><\/p>\n<p>Ce type de malware ne n\u00e9cessite pas les droits administrateurs afin de pouvoir d\u00e9poser et lancer sa charge. En ce sens, les attaquants utiliseront cette vuln\u00e9rabilit\u00e9 pour \u00e9tablir un acc\u00e8s initial avant de tenter d\u2019autres actions.<\/p>\n<p><strong>D\u00e9lai d\u2019ex\u00e9cution<\/strong><\/p>\n<p>Le malware effectue ses actions malveillantes tr\u00e8s peu de temps apr\u00e8s avoir d\u00e9marr\u00e9.<\/p>\n<p><strong>Divers<\/strong><\/p>\n<ul>\n<li>Une mise \u00e0 jour Windows d\u00e9di\u00e9e \u00e0 tous les OS concern\u00e9s est disponible depuis le 30 mai.<\/li>\n<li>Le caract\u00e8re r\u00e9cent de la vuln\u00e9rabilit\u00e9 fait que le patch propos\u00e9 par Microsoft ne couvre pas enti\u00e8rement le probl\u00e8me et que de nouvelles techniques d\u2019exploitation voient le jour.<\/li>\n<li>Il est possible de <a href=\"https:\/\/msrc-blog.microsoft.com\/2022\/05\/30\/guidance-for-cve-2022-30190-microsoft-support-diagnostic-tool-vulnerability\/\" target=\"_blank\" rel=\"noopener\">dissocier le protocole <em>ms-msdt<\/em><\/a> au moteur de diagnostic Windows pour mitiger la surface d\u2019attaque, mais ce n\u2019est qu\u2019une solution temporaire qui pourrait avoir des impacts fonctionnels sur les postes.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>Les moyens de protection fournis par Stormshield face \u00e0 la vuln\u00e9rabilit\u00e9 Microsoft Follina<\/h2>\n<h3>Protection avec Stormshield Network Security<\/h3>\n<p>Une signature IPS sp\u00e9cifique permettant de bloquer le script Javascript contenu dans la phase de \u00ab Get \u00bb et permettant de d\u00e9clencher l\u2019exploitation a \u00e9t\u00e9 publi\u00e9e sous la r\u00e9f\u00e9rence :<\/p>\n<ul>\n<li><strong>http\u00a0:javascript\u00a0:stack\u00a0.518<\/strong> - Tentative d'ex\u00e9cution de code \u00e0 distance via la vuln\u00e9rabilit\u00e9 MSDT Follina (CVE-2022-30190)<\/li>\n<\/ul>\n<table class=\" aligncenter\" width=\"623\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\" width=\"312\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-227874\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/indice.png\" alt=\"\" width=\"135\" height=\"101\" \/><\/p>\n<p><em>Indice de confiance de la protection propos\u00e9e par Stormshield<\/em><\/td>\n<td width=\"312\">\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-227874\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/indice.png\" alt=\"\" width=\"135\" height=\"101\" \/><\/p>\n<p style=\"text-align: center;\"><em>Indice de confiance de l\u2019absence de faux positif<\/em><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Protection avec Stormshield Endpoint Security Evolution<\/h3>\n<p>Un jeu sp\u00e9cifique de r\u00e8gles a \u00e9t\u00e9 mis \u00e0 disposition des utilisateurs afin de contrer ce malware Follina.<\/p>\n<p>Il est pr\u00e9vu pour bloquer n\u2019importe quel programme d\u00e9marrant l\u2019outil de diagnostic Windows avec les param\u00e8tres typiques de l\u2019exploitation de la vuln\u00e9rabilit\u00e9.<\/p>\n<div id=\"attachment_282674\" style=\"width: 679px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-282674\" class=\"wp-image-282674 size-full\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-8.png\" alt=\"\" width=\"669\" height=\"295\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-8.png 669w, https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-8-300x132.png 300w\" sizes=\"auto, (max-width: 669px) 100vw, 669px\" \/><p id=\"caption-attachment-282674\" class=\"wp-caption-text\"><em><small>Illustration 8 : la r\u00e8gle de blocage<\/small><\/em><\/p><\/div>\n<table class=\" aligncenter\" width=\"623\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\" width=\"312\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-227874\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/indice.png\" alt=\"\" width=\"135\" height=\"101\" \/><\/p>\n<p><em>Indice de confiance de la protection propos\u00e9e par Stormshield<\/em><\/td>\n<td width=\"312\">\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-227874\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/indice.png\" alt=\"\" width=\"135\" height=\"101\" \/><\/p>\n<p style=\"text-align: center;\"><em>Indice de confiance de l\u2019absence de faux positif<\/em><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><\/h3>\n<h3>Protection avec Stormshield Endpoint Security 7.2<\/h3>\n<p>Pour SES 7.2, il est recommand\u00e9 de bloquer l\u2019ex\u00e9cution de msdt.exe par les processus issus de la suite Office, PowerShell et WordPad comme premier palliatif \u00e0 l\u2019attaque.<\/p>\n<p>Une politique pour SES 7.2 contenant des exemples de r\u00e8gles de blocage de la vuln\u00e9rabilit\u00e9 est fournie sur l\u2019espace MyStormshield.<\/p>\n<div id=\"attachment_282679\" style=\"width: 675px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-282679\" class=\"wp-image-282679 size-full\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-9.png\" alt=\"\" width=\"665\" height=\"378\" srcset=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-9.png 665w, https:\/\/www.stormshield.com\/wp-content\/uploads\/follina-9-300x171.png 300w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/><p id=\"caption-attachment-282679\" class=\"wp-caption-text\"><em><small>Illustration 9 : la politique de protection SES 7.2<\/small><\/em><\/p><\/div>\n<table class=\" aligncenter\" width=\"623\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\" width=\"312\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-233125\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/indice-3.png\" alt=\"\" width=\"135\" height=\"101\" \/><\/p>\n<p><em>Indice de confiance de la protection propos\u00e9e par Stormshield<\/em><\/td>\n<td width=\"312\">\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-233125\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/indice-3.png\" alt=\"\" width=\"135\" height=\"101\" \/><\/p>\n<p style=\"text-align: center;\"><em>Indice de confiance de l\u2019absence de faux positif<\/em><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><\/h3>\n<h2>IOC \/ Infos utiles de la vuln\u00e9rabilit\u00e9 Microsoft Follina<\/h2>\n<p>Sha256 :<\/p>\n<ul>\n<li>248296cf75065c7db51a793816d388ad589127c40fddef276e622a160727ca29<\/li>\n<li>8b0ba2092bc7d030733bbc7d990d39f38352a4c50290208afe4e1364872807cfC<\/li>\n<\/ul>\n<p>Portail Breach Fighter :<\/p>\n<ul>\n<li><a href=\"https:\/\/breachfighter.stormshieldcs.eu\/248296cf75065c7db51a793816d388ad589127c40fddef276e622a160727ca29\" target=\"_blank\" rel=\"noopener\">bf.stormshieldcs.eu\/248296cf75065c7db51a793816d388ad589127c40fddef276e622a160727ca29<\/a><\/li>\n<li><a href=\"https:\/\/breachfighter.stormshieldcs.eu\/8b0ba2092bc7d030733bbc7d990d39f38352a4c50290208afe4e1364872807cf\" target=\"_blank\" rel=\"noopener\">bf.stormshieldcs.eu\/8b0ba2092bc7d030733bbc7d990d39f38352a4c50290208afe4e1364872807cf<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Une nouvelle vuln\u00e9rabilit\u00e9 li\u00e9e \u00e0 la suite Office a \u00e9t\u00e9 r\u00e9cemment d\u00e9couverte. Cette faille est d\u00e9j\u00e0 exploit\u00e9e par des cyber-criminels, des fichiers malveillants exploitant la vuln\u00e9rabilit\u00e9 ayant \u00e9t\u00e9 d\u00e9couverts par des chercheurs nao_sec sur des plateformes de centralisation de pi\u00e8ces virales. Cette vuln\u00e9rabilit\u00e9 Microsoft, r\u00e9f\u00e9renc\u00e9e&#8230;<\/p>\n","protected":false},"author":83,"featured_media":190179,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1503],"tags":[4368],"business_size":[],"industry":[],"help_mefind":[],"features":[],"type_security":[],"maintenance":[],"offer":[],"administration_tools":[],"cloud_offers":[],"listing_product":[1565,1530],"class_list":["post-282628","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-alertes","tag-la-cybersecurite-par-stormshield","listing_product-ses-fr","listing_product-sns-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vuln\u00e9rabilit\u00e9 Follina : quelles protections avec Stormshield ?<\/title>\n<meta name=\"description\" content=\"CVE-2022-30190 sur la suite Office : se prot\u00e9ger avec les produits Stormshield SNS et SES face \u00e0 cette vuln\u00e9rabilit\u00e9 Microsoft.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-follina-la-reponse-des-solutions-stormshield\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vuln\u00e9rabilit\u00e9 Follina : quelles protections avec Stormshield ?\" \/>\n<meta property=\"og:description\" content=\"CVE-2022-30190 sur la suite Office : se prot\u00e9ger avec les produits Stormshield SNS et SES face \u00e0 cette vuln\u00e9rabilit\u00e9 Microsoft.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-follina-la-reponse-des-solutions-stormshield\/\" \/>\n<meta property=\"og:site_name\" content=\"Stormshield\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-01T15:32:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-15T10:17:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Stormshield Customer Security Lab\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:site\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Stormshield Customer Security Lab\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-follina-la-reponse-des-solutions-stormshield\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-follina-la-reponse-des-solutions-stormshield\\\/\"},\"author\":{\"name\":\"Stormshield Customer Security Lab\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/a05f467cec789f90c8a355b178743249\"},\"headline\":\"Alerte s\u00e9curit\u00e9 CVE-2022-30190 Follina : la r\u00e9ponse des solutions Stormshield\",\"datePublished\":\"2022-06-01T15:32:12+00:00\",\"dateModified\":\"2024-02-15T10:17:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-follina-la-reponse-des-solutions-stormshield\\\/\"},\"wordCount\":1303,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-follina-la-reponse-des-solutions-stormshield\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_1534485395-scaled.jpg\",\"keywords\":[\"La cybers\u00e9curit\u00e9 - par Stormshield\"],\"articleSection\":[\"Alertes\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-follina-la-reponse-des-solutions-stormshield\\\/\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-follina-la-reponse-des-solutions-stormshield\\\/\",\"name\":\"Vuln\u00e9rabilit\u00e9 Follina : quelles protections avec Stormshield ?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-follina-la-reponse-des-solutions-stormshield\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-follina-la-reponse-des-solutions-stormshield\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_1534485395-scaled.jpg\",\"datePublished\":\"2022-06-01T15:32:12+00:00\",\"dateModified\":\"2024-02-15T10:17:19+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/a05f467cec789f90c8a355b178743249\"},\"description\":\"CVE-2022-30190 sur la suite Office : se prot\u00e9ger avec les produits Stormshield SNS et SES face \u00e0 cette vuln\u00e9rabilit\u00e9 Microsoft.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-follina-la-reponse-des-solutions-stormshield\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-follina-la-reponse-des-solutions-stormshield\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-follina-la-reponse-des-solutions-stormshield\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_1534485395-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_1534485395-scaled.jpg\",\"width\":2560,\"height\":1422},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-follina-la-reponse-des-solutions-stormshield\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Alerte s\u00e9curit\u00e9 CVE-2022-30190 Follina : la r\u00e9ponse des solutions Stormshield\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\",\"name\":\"Stormshield\",\"description\":\"Stormshield\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/a05f467cec789f90c8a355b178743249\",\"name\":\"Stormshield Customer Security Lab\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g\",\"caption\":\"Stormshield Customer Security Lab\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vuln\u00e9rabilit\u00e9 Follina : quelles protections avec Stormshield ?","description":"CVE-2022-30190 sur la suite Office : se prot\u00e9ger avec les produits Stormshield SNS et SES face \u00e0 cette vuln\u00e9rabilit\u00e9 Microsoft.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-follina-la-reponse-des-solutions-stormshield\/","og_locale":"fr_FR","og_type":"article","og_title":"Vuln\u00e9rabilit\u00e9 Follina : quelles protections avec Stormshield ?","og_description":"CVE-2022-30190 sur la suite Office : se prot\u00e9ger avec les produits Stormshield SNS et SES face \u00e0 cette vuln\u00e9rabilit\u00e9 Microsoft.","og_url":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-follina-la-reponse-des-solutions-stormshield\/","og_site_name":"Stormshield","article_published_time":"2022-06-01T15:32:12+00:00","article_modified_time":"2024-02-15T10:17:19+00:00","og_image":[{"width":2560,"height":1422,"url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","type":"image\/jpeg"}],"author":"Stormshield Customer Security Lab","twitter_card":"summary_large_image","twitter_creator":"@Stormshield","twitter_site":"@Stormshield","twitter_misc":{"\u00c9crit par":"Stormshield Customer Security Lab","Dur\u00e9e de lecture estim\u00e9e":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-follina-la-reponse-des-solutions-stormshield\/#article","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-follina-la-reponse-des-solutions-stormshield\/"},"author":{"name":"Stormshield Customer Security Lab","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/a05f467cec789f90c8a355b178743249"},"headline":"Alerte s\u00e9curit\u00e9 CVE-2022-30190 Follina : la r\u00e9ponse des solutions Stormshield","datePublished":"2022-06-01T15:32:12+00:00","dateModified":"2024-02-15T10:17:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-follina-la-reponse-des-solutions-stormshield\/"},"wordCount":1303,"commentCount":0,"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-follina-la-reponse-des-solutions-stormshield\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","keywords":["La cybers\u00e9curit\u00e9 - par Stormshield"],"articleSection":["Alertes"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-follina-la-reponse-des-solutions-stormshield\/","url":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-follina-la-reponse-des-solutions-stormshield\/","name":"Vuln\u00e9rabilit\u00e9 Follina : quelles protections avec Stormshield ?","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-follina-la-reponse-des-solutions-stormshield\/#primaryimage"},"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-follina-la-reponse-des-solutions-stormshield\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","datePublished":"2022-06-01T15:32:12+00:00","dateModified":"2024-02-15T10:17:19+00:00","author":{"@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/a05f467cec789f90c8a355b178743249"},"description":"CVE-2022-30190 sur la suite Office : se prot\u00e9ger avec les produits Stormshield SNS et SES face \u00e0 cette vuln\u00e9rabilit\u00e9 Microsoft.","breadcrumb":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-follina-la-reponse-des-solutions-stormshield\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-follina-la-reponse-des-solutions-stormshield\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-follina-la-reponse-des-solutions-stormshield\/#primaryimage","url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","contentUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","width":2560,"height":1422},{"@type":"BreadcrumbList","@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-follina-la-reponse-des-solutions-stormshield\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stormshield.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Alerte s\u00e9curit\u00e9 CVE-2022-30190 Follina : la r\u00e9ponse des solutions Stormshield"}]},{"@type":"WebSite","@id":"https:\/\/www.stormshield.com\/fr\/#website","url":"https:\/\/www.stormshield.com\/fr\/","name":"Stormshield","description":"Stormshield","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stormshield.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/a05f467cec789f90c8a355b178743249","name":"Stormshield Customer Security Lab","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g","caption":"Stormshield Customer Security Lab"}}]}},"_links":{"self":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/282628","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/comments?post=282628"}],"version-history":[{"count":11,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/282628\/revisions"}],"predecessor-version":[{"id":493408,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/282628\/revisions\/493408"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media\/190179"}],"wp:attachment":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media?parent=282628"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/categories?post=282628"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/tags?post=282628"},{"taxonomy":"business_size","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/business_size?post=282628"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/industry?post=282628"},{"taxonomy":"help_mefind","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/help_mefind?post=282628"},{"taxonomy":"features","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/features?post=282628"},{"taxonomy":"type_security","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/type_security?post=282628"},{"taxonomy":"maintenance","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/maintenance?post=282628"},{"taxonomy":"offer","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/offer?post=282628"},{"taxonomy":"administration_tools","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/administration_tools?post=282628"},{"taxonomy":"cloud_offers","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/cloud_offers?post=282628"},{"taxonomy":"listing_product","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/listing_product?post=282628"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}