{"id":488761,"date":"2024-01-24T09:05:26","date_gmt":"2024-01-24T08:05:26","guid":{"rendered":"https:\/\/www.stormshield.com\/?p=488761"},"modified":"2024-02-15T13:15:11","modified_gmt":"2024-02-15T12:15:11","slug":"alerte-securite-ivanti-cve-2023-46805-cve-2024-21887","status":"publish","type":"post","link":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-ivanti-cve-2023-46805-cve-2024-21887\/","title":{"rendered":"Alertes de s\u00e9curit\u00e9 Ivanti CVE-2023-46805 et CVE-2024-21887 : la r\u00e9ponse des produits Stormshield"},"content":{"rendered":"<p><strong>Deux nouvelles vuln\u00e9rabilit\u00e9s critiques impactant Ivanti Connect Secure (anciennement Pulse Connect Secure), identifi\u00e9es sous les CVE-2023-46805 et CVE-2024-21887, sont activement exploit\u00e9es. Elles obtiennent respectivement un score CVSS v3.1 de 8,2 et 9,1. L\u2019\u00e9quipe Stormshield Customer Security Lab d\u00e9taille les protections fournies par Stormshield.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>Le contexte des vuln\u00e9rabilit\u00e9s Ivanti<\/h2>\n<p>Les vuln\u00e9rabilit\u00e9s <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-46805\" target=\"_blank\" rel=\"noopener\">CVE-2023-46805<\/a> et <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-21887\" target=\"_blank\" rel=\"noopener\">CVE-2024-21887<\/a> impactent les versions 9.X et 22.X d\u2019Ivanti Connect Secure.<\/p>\n<p>La CVE-2023-46805 permet de contourner le m\u00e9canisme d\u2019authentification du serveur web tandis que la CVE-2024-21887 permet d\u2019ex\u00e9cuter des commandes shell \u00e0 distance de mani\u00e8re authentifi\u00e9e. En combinant les deux vuln\u00e9rabilit\u00e9s Ivanti, un cyber-attaquant peut ex\u00e9cuter du code \u00e0 distance sans authentification.<\/p>\n<p>&nbsp;<\/p>\n<h2>Les d\u00e9tails techniques des vuln\u00e9rabilit\u00e9s Ivanti<\/h2>\n<h3>La vuln\u00e9rabilit\u00e9 CVE-2023-46805<\/h3>\n<p>Certains chemins de l\u2019application web sont accessibles sans authentification. L\u2019un de ces chemins est vuln\u00e9rable \u00e0 un travers\u00e9e de r\u00e9pertoire (<em>path-traversal<\/em>), permettant d\u2019appeler des chemins authentifi\u00e9s depuis ce chemin non authentifi\u00e9. Cette travers\u00e9e de r\u00e9pertoire (<em>path-traversal<\/em>) vient d\u2019une comparaison d\u2019URL dont le chemin n\u2019est pas normalis\u00e9.<\/p>\n<h3>La vuln\u00e9rabilit\u00e9 CVE-2024-21887<\/h3>\n<p>Deux chemins de l\u2019application web sont vuln\u00e9rables \u00e0 une injection de commande syst\u00e8me. Les donn\u00e9es fournies par l\u2019utilisateur sont utilis\u00e9es dans la fonction python \u00ab\u00a0<em>subprocess.Popen(shell=True)<\/em>\u00a0\u00bb sans filtrage. On peut donc injecter une valeur \u00ab<em>;commande;<\/em>\u00bb et ex\u00e9cuter des commandes shell.<\/p>\n<p>&nbsp;<\/p>\n<h2>Les moyens de protections Stormshield face aux vuln\u00e9rabilit\u00e9s Ivanti<\/h2>\n<h3>Protection avec Stormshield Network Security<\/h3>\n<p>Les firewalls SNS d\u00e9tectent et bloquent par d\u00e9faut l\u2019exploitation de la CVE-2023-46805 via son analyse protocolaire :<\/p>\n<ul>\n<li><strong>http:80<\/strong>\u00a0: Chemin avec r\u00e9f\u00e9rence sup\u00e9rieure<\/li>\n<\/ul>\n<p>Et les signatures IPS suivantes d\u00e9tectent et bloquent l\u2019exploitation de la CVE-2024-21887 :<\/p>\n<ul>\n<li><strong>http:client.97<\/strong>\u00a0: Exploitation d'une ex\u00e9cution de code \u00e0 distance sur Ivanti Connect Secure (CVE-2024-21887)<\/li>\n<li><strong>http:url:decoded.423<\/strong>\u00a0: Exploitation d'une ex\u00e9cution de code \u00e0 distance sur Ivanti Connect Secure (CVE-2024-21887)<\/li>\n<\/ul>\n<p>Afin que ces protections soient efficaces, il est n\u00e9cessaire que le flux soit d\u00e9chiffr\u00e9.<\/p>\n<table class=\" aligncenter\" width=\"623\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\" width=\"312\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-227874\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/indice.png\" alt=\"\" width=\"135\" height=\"101\" \/><\/p>\n<p><em>Indice de confiance de la protection propos\u00e9e par Stormshield<\/em><\/td>\n<td width=\"312\">\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-227874\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/indice.png\" alt=\"\" width=\"135\" height=\"101\" \/><\/p>\n<p style=\"text-align: center;\"><em>Indice de confiance de l\u2019absence de faux positif<\/em><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Recommandations face aux vuln\u00e9rabilit\u00e9s Ivanti<\/h3>\n<p>\u00c0 la r\u00e9daction de cet article, aucun patch n\u2019est disponible. Une mitigation est disponible sur le <a href=\"https:\/\/forums.ivanti.com\/s\/article\/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways?language=en_US\" target=\"_blank\" rel=\"noopener\">site d\u2019Ivanti<\/a>, cependant une modification de configuration efface la mitigation. Nous recommandons donc d\u2019appliquer la mitigation, de ne plus r\u00e9aliser de modification de configuration et de mettre \u00e0 jour d\u00e8s que le patch sera disponible.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Deux nouvelles vuln\u00e9rabilit\u00e9s critiques impactant Ivanti Connect Secure (anciennement Pulse Connect Secure), identifi\u00e9es sous les CVE-2023-46805 et CVE-2024-21887, sont activement exploit\u00e9es. Elles obtiennent respectivement un score CVSS v3.1 de 8,2 et 9,1. L\u2019\u00e9quipe Stormshield Customer Security Lab d\u00e9taille les protections fournies par Stormshield. &nbsp; Le&#8230;<\/p>\n","protected":false},"author":83,"featured_media":190179,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1503],"tags":[4368],"business_size":[],"industry":[],"help_mefind":[],"features":[],"type_security":[],"maintenance":[],"offer":[],"administration_tools":[],"cloud_offers":[],"listing_product":[],"class_list":["post-488761","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-alertes","tag-la-cybersecurite-par-stormshield"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vuln\u00e9rabilit\u00e9s critiques Ivanti CVE-2023-46805 et CVE-2024-21887<\/title>\n<meta name=\"description\" content=\"Deux vuln\u00e9rabilit\u00e9s Ivanti et r\u00e9ponse des produits Stormshield. Moyens de protection face aux CVE-2023-46805 et CVE-2024-21887.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-ivanti-cve-2023-46805-cve-2024-21887\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vuln\u00e9rabilit\u00e9s critiques Ivanti CVE-2023-46805 et CVE-2024-21887\" \/>\n<meta property=\"og:description\" content=\"Deux vuln\u00e9rabilit\u00e9s Ivanti et r\u00e9ponse des produits Stormshield. Moyens de protection face aux CVE-2023-46805 et CVE-2024-21887.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-ivanti-cve-2023-46805-cve-2024-21887\/\" \/>\n<meta property=\"og:site_name\" content=\"Stormshield\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-24T08:05:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-15T12:15:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Stormshield Customer Security Lab\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:site\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Stormshield Customer Security Lab\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-ivanti-cve-2023-46805-cve-2024-21887\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-ivanti-cve-2023-46805-cve-2024-21887\\\/\"},\"author\":{\"name\":\"Stormshield Customer Security Lab\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/a05f467cec789f90c8a355b178743249\"},\"headline\":\"Alertes de s\u00e9curit\u00e9 Ivanti CVE-2023-46805 et CVE-2024-21887 : la r\u00e9ponse des produits Stormshield\",\"datePublished\":\"2024-01-24T08:05:26+00:00\",\"dateModified\":\"2024-02-15T12:15:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-ivanti-cve-2023-46805-cve-2024-21887\\\/\"},\"wordCount\":457,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-ivanti-cve-2023-46805-cve-2024-21887\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_1534485395-scaled.jpg\",\"keywords\":[\"La cybers\u00e9curit\u00e9 - par Stormshield\"],\"articleSection\":[\"Alertes\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-ivanti-cve-2023-46805-cve-2024-21887\\\/\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-ivanti-cve-2023-46805-cve-2024-21887\\\/\",\"name\":\"Vuln\u00e9rabilit\u00e9s critiques Ivanti CVE-2023-46805 et CVE-2024-21887\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-ivanti-cve-2023-46805-cve-2024-21887\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-ivanti-cve-2023-46805-cve-2024-21887\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_1534485395-scaled.jpg\",\"datePublished\":\"2024-01-24T08:05:26+00:00\",\"dateModified\":\"2024-02-15T12:15:11+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/a05f467cec789f90c8a355b178743249\"},\"description\":\"Deux vuln\u00e9rabilit\u00e9s Ivanti et r\u00e9ponse des produits Stormshield. Moyens de protection face aux CVE-2023-46805 et CVE-2024-21887.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-ivanti-cve-2023-46805-cve-2024-21887\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-ivanti-cve-2023-46805-cve-2024-21887\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-ivanti-cve-2023-46805-cve-2024-21887\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_1534485395-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_1534485395-scaled.jpg\",\"width\":2560,\"height\":1422},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-ivanti-cve-2023-46805-cve-2024-21887\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Alertes de s\u00e9curit\u00e9 Ivanti CVE-2023-46805 et CVE-2024-21887 : la r\u00e9ponse des produits Stormshield\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\",\"name\":\"Stormshield\",\"description\":\"Stormshield\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/a05f467cec789f90c8a355b178743249\",\"name\":\"Stormshield Customer Security Lab\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g\",\"caption\":\"Stormshield Customer Security Lab\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vuln\u00e9rabilit\u00e9s critiques Ivanti CVE-2023-46805 et CVE-2024-21887","description":"Deux vuln\u00e9rabilit\u00e9s Ivanti et r\u00e9ponse des produits Stormshield. Moyens de protection face aux CVE-2023-46805 et CVE-2024-21887.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-ivanti-cve-2023-46805-cve-2024-21887\/","og_locale":"fr_FR","og_type":"article","og_title":"Vuln\u00e9rabilit\u00e9s critiques Ivanti CVE-2023-46805 et CVE-2024-21887","og_description":"Deux vuln\u00e9rabilit\u00e9s Ivanti et r\u00e9ponse des produits Stormshield. Moyens de protection face aux CVE-2023-46805 et CVE-2024-21887.","og_url":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-ivanti-cve-2023-46805-cve-2024-21887\/","og_site_name":"Stormshield","article_published_time":"2024-01-24T08:05:26+00:00","article_modified_time":"2024-02-15T12:15:11+00:00","og_image":[{"width":2560,"height":1422,"url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","type":"image\/jpeg"}],"author":"Stormshield Customer Security Lab","twitter_card":"summary_large_image","twitter_creator":"@Stormshield","twitter_site":"@Stormshield","twitter_misc":{"\u00c9crit par":"Stormshield Customer Security Lab","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-ivanti-cve-2023-46805-cve-2024-21887\/#article","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-ivanti-cve-2023-46805-cve-2024-21887\/"},"author":{"name":"Stormshield Customer Security Lab","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/a05f467cec789f90c8a355b178743249"},"headline":"Alertes de s\u00e9curit\u00e9 Ivanti CVE-2023-46805 et CVE-2024-21887 : la r\u00e9ponse des produits Stormshield","datePublished":"2024-01-24T08:05:26+00:00","dateModified":"2024-02-15T12:15:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-ivanti-cve-2023-46805-cve-2024-21887\/"},"wordCount":457,"commentCount":0,"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-ivanti-cve-2023-46805-cve-2024-21887\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","keywords":["La cybers\u00e9curit\u00e9 - par Stormshield"],"articleSection":["Alertes"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-ivanti-cve-2023-46805-cve-2024-21887\/","url":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-ivanti-cve-2023-46805-cve-2024-21887\/","name":"Vuln\u00e9rabilit\u00e9s critiques Ivanti CVE-2023-46805 et CVE-2024-21887","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-ivanti-cve-2023-46805-cve-2024-21887\/#primaryimage"},"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-ivanti-cve-2023-46805-cve-2024-21887\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","datePublished":"2024-01-24T08:05:26+00:00","dateModified":"2024-02-15T12:15:11+00:00","author":{"@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/a05f467cec789f90c8a355b178743249"},"description":"Deux vuln\u00e9rabilit\u00e9s Ivanti et r\u00e9ponse des produits Stormshield. Moyens de protection face aux CVE-2023-46805 et CVE-2024-21887.","breadcrumb":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-ivanti-cve-2023-46805-cve-2024-21887\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-ivanti-cve-2023-46805-cve-2024-21887\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-ivanti-cve-2023-46805-cve-2024-21887\/#primaryimage","url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","contentUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","width":2560,"height":1422},{"@type":"BreadcrumbList","@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-ivanti-cve-2023-46805-cve-2024-21887\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stormshield.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Alertes de s\u00e9curit\u00e9 Ivanti CVE-2023-46805 et CVE-2024-21887 : la r\u00e9ponse des produits Stormshield"}]},{"@type":"WebSite","@id":"https:\/\/www.stormshield.com\/fr\/#website","url":"https:\/\/www.stormshield.com\/fr\/","name":"Stormshield","description":"Stormshield","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stormshield.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/a05f467cec789f90c8a355b178743249","name":"Stormshield Customer Security Lab","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g","caption":"Stormshield Customer Security Lab"}}]}},"_links":{"self":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/488761","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/comments?post=488761"}],"version-history":[{"count":3,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/488761\/revisions"}],"predecessor-version":[{"id":493414,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/488761\/revisions\/493414"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media\/190179"}],"wp:attachment":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media?parent=488761"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/categories?post=488761"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/tags?post=488761"},{"taxonomy":"business_size","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/business_size?post=488761"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/industry?post=488761"},{"taxonomy":"help_mefind","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/help_mefind?post=488761"},{"taxonomy":"features","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/features?post=488761"},{"taxonomy":"type_security","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/type_security?post=488761"},{"taxonomy":"maintenance","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/maintenance?post=488761"},{"taxonomy":"offer","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/offer?post=488761"},{"taxonomy":"administration_tools","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/administration_tools?post=488761"},{"taxonomy":"cloud_offers","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/cloud_offers?post=488761"},{"taxonomy":"listing_product","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/listing_product?post=488761"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}