{"id":511013,"date":"2024-04-10T15:53:28","date_gmt":"2024-04-10T14:53:28","guid":{"rendered":"https:\/\/www.stormshield.com\/?p=511013"},"modified":"2024-07-08T12:05:13","modified_gmt":"2024-07-08T11:05:13","slug":"alerte-securite-dlink-cve-2024-3272-cve-2024-3273-reponse-produits-stormshield","status":"publish","type":"post","link":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-dlink-cve-2024-3272-cve-2024-3273-reponse-produits-stormshield\/","title":{"rendered":"Alerte de s\u00e9curit\u00e9 D-Link CVE-2024-3272 &#038; CVE-2024-3273 : la r\u00e9ponse des produits Stormshield"},"content":{"rendered":"<p><strong>Deux vuln\u00e9rabilit\u00e9s critiques impactant des serveurs NAS de la marque D-Link, identifi\u00e9es par les r\u00e9f\u00e9rences CVE-2024-3272 &amp; CVE-2024-3273, ont \u00e9t\u00e9 d\u00e9tect\u00e9es suite \u00e0 de nombreuses tentatives d\u2019exploitation. Elles obtiennent respectivement un score CVSS v3.1 de 9.8 et 7.3. L\u2019\u00e9quipe Stormshield Customer Security Lab d\u00e9taille les protections fournies par Stormshield.<\/strong><\/p>\n<p>Il convient de porter une attention particuli\u00e8re \u00e0 ces vuln\u00e9rabilit\u00e9s car de nombreuses preuves de concept sont disponibles publiquement, et des exploitations de ces vuln\u00e9rabilit\u00e9s sont actuellement en cours par des acteurs cyber-malveillants. De plus, <strong>ces vuln\u00e9rabilit\u00e9s ne seront pas corrig\u00e9es par la marque car les mod\u00e8les de serveurs NAS impact\u00e9s ne sont plus support\u00e9s ni mis \u00e0 jour.<\/strong> Voici la liste est ci-dessous des mod\u00e8les impact\u00e9s :<\/p>\n<ul>\n<li>DNS-320L (fin de support le 31 mai 2020),<\/li>\n<li>DNS-325 (fin de support le 1<sup>er<\/sup> septembre 2017),<\/li>\n<li>DNS-327L (fin de support le 31 mai 2020),<\/li>\n<li>DNS-340L (fin de support le 31 juillet 2019).<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>Les d\u00e9tails techniques des vuln\u00e9rabilit\u00e9s D-Link<\/h2>\n<p>La <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-3272\" target=\"_blank\" rel=\"noopener\">CVE-2024-3272<\/a> repose sur la pr\u00e9sence d\u2019un compte technique pr\u00e9sent par d\u00e9faut sur l\u2019ensemble des serveurs NAS impact\u00e9s et ne disposant d\u2019aucun mot de passe.\u00a0La <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-3273\" target=\"_blank\" rel=\"noopener\">CVE-2024-3273<\/a>, elle, permet l\u2019envoi de commandes \u00e0 distance en contactant une URL sp\u00e9cifique disponible sur le serveur NAS. Cet envoi de commande requiert une authentification.<\/p>\n<p><strong>La dangerosit\u00e9 de l\u2019attaque vient de l\u2019exploitation conjointe de ces deux vuln\u00e9rabilit\u00e9s, qui permet alors d\u2019envoyer des commandes \u00e0 distance en contournant l\u2019authentification pr\u00e9sente sur le serveurs NAS.<\/strong> Plus de 90 000 serveurs NAS sont vuln\u00e9rables \u00e0 cette attaque.<\/p>\n<p>La vuln\u00e9rabilit\u00e9 <strong>CVE-2024-3272<\/strong> repose sur l\u2019usage d\u2019un compte utilisateur pr\u00e9sent par d\u00e9faut sur les mod\u00e8les D-Link impact\u00e9s. La particularit\u00e9 de ce compte <em><code>\u2018messagebus\u2019<\/code><\/em> est de n\u2019avoir besoin d\u2019aucun mot de passe, ce qui permet de contourner l'authentification sur le serveur NAS. La vuln\u00e9rabilit\u00e9 <strong>CVE-2024-3273<\/strong> quant \u00e0 elle permet l\u2019envoi \u00e0 distance de commandes sur l\u2019endpoint <em><code>\u2018\/cgi-bin\/nas_sharing.cgi\u2019<\/code><\/em>. En combinant les deux CVE, il est donc possible d\u2019envoyer des commandes \u00e0 distance sans authentification pr\u00e9alable, rendant l\u2019attaque tr\u00e8s dangereuse.<\/p>\n<p>&nbsp;<\/p>\n<h2>La mod\u00e9lisation de l'attaque avec MITRE ATT&amp;CK<\/h2>\n<h3>MITRE ATT&amp;CK<\/h3>\n<ul>\n<li>T1190 (Exploit Public-Facing Application)<\/li>\n<li>T1203 (Exploitation for Client Execution)<\/li>\n<\/ul>\n<h3>IoC<\/h3>\n<p>Une liste d\u2019IPs scannant ou r\u00e9alisant l\u2019attaque est disponible ici : <a href=\"https:\/\/viz.greynoise.io\/tags\/d-link-nas-cve-2024-3273-rce-attempt\" target=\"_blank\" rel=\"noopener\">viz.greynoise.io\/tags\/d-link-nas-cve-2024-3273-rce-attempt<\/a><\/p>\n<p>&nbsp;<\/p>\n<h2>Les moyens de protections Stormshield face aux vuln\u00e9rabilit\u00e9s D-Link<\/h2>\n<h3>Protection avec Stormshield Network Security<\/h3>\n<p>Les firewalls Stormshield Network Security permet de d\u00e9tecter, voire bloquer une tentative d\u2019exploitation de ces vuln\u00e9rabilit\u00e9s. Ils d\u00e9tectent et bloquent par d\u00e9faut l\u2019exploitation des CVE-2024-3272 &amp; CVE-2024-3273 via leur analyse protocolaire :<\/p>\n<ul>\n<li><strong>http:url:decoded.426<\/strong> : Exploitation d'une vuln\u00e9rabilit\u00e9 de type injection de commande sur D-Link NAS (CVE-2024-3273)<\/li>\n<\/ul>\n<table class=\" aligncenter\" width=\"623\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\" width=\"312\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-227874\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/indice.png\" alt=\"\" width=\"135\" height=\"101\" \/><\/p>\n<p><em>Indice de confiance de la protection propos\u00e9e par Stormshield<\/em><\/td>\n<td width=\"312\">\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-232004 size-full\" src=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/indice-2.png\" alt=\"\" width=\"135\" height=\"101\" \/><\/p>\n<p style=\"text-align: center;\"><em>Indice de confiance de l\u2019absence de faux positif<\/em><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Recommandations face aux vuln\u00e9rabilit\u00e9s D-Link<\/h3>\n<p>La recommandation du constructeur D-Link est de d\u00e9commissionner les serveurs NAS vuln\u00e9rables, puisque ceux-ci ne sont plus support\u00e9s. Le bulletin d\u2019alerte de la marque est disponible ici : <a href=\"https:\/\/supportannouncement.us.dlink.com\/security\/publication.aspx?name=SAP10383\" target=\"_blank\" rel=\"noopener\">supportannouncement.us.dlink.com\/security\/publication.aspx?name=SAP10383<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Deux vuln\u00e9rabilit\u00e9s critiques impactant des serveurs NAS de la marque D-Link, identifi\u00e9es par les r\u00e9f\u00e9rences CVE-2024-3272 &amp; CVE-2024-3273, ont \u00e9t\u00e9 d\u00e9tect\u00e9es suite \u00e0 de nombreuses tentatives d\u2019exploitation. Elles obtiennent respectivement un score CVSS v3.1 de 9.8 et 7.3. L\u2019\u00e9quipe Stormshield Customer Security Lab d\u00e9taille les&#8230;<\/p>\n","protected":false},"author":83,"featured_media":190179,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1503],"tags":[4368],"business_size":[],"industry":[],"help_mefind":[],"features":[],"type_security":[],"maintenance":[],"offer":[],"administration_tools":[],"cloud_offers":[],"listing_product":[1530],"class_list":["post-511013","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-alertes","tag-la-cybersecurite-par-stormshield","listing_product-sns-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vuln\u00e9rabilit\u00e9s critiques D-Link CVE-2024-3272 &amp; CVE-2024-3273<\/title>\n<meta name=\"description\" content=\"Alerte de s\u00e9curit\u00e9 D-Link et la r\u00e9ponse des produits Stormshield. Moyens de protection face aux CVE-2024-3272 &amp; CVE-2024-3273.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-dlink-cve-2024-3272-cve-2024-3273-reponse-produits-stormshield\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vuln\u00e9rabilit\u00e9s critiques D-Link CVE-2024-3272 &amp; CVE-2024-3273\" \/>\n<meta property=\"og:description\" content=\"Alerte de s\u00e9curit\u00e9 D-Link et la r\u00e9ponse des produits Stormshield. Moyens de protection face aux CVE-2024-3272 &amp; CVE-2024-3273.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-dlink-cve-2024-3272-cve-2024-3273-reponse-produits-stormshield\/\" \/>\n<meta property=\"og:site_name\" content=\"Stormshield\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-10T14:53:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-08T11:05:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Stormshield Customer Security Lab\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:site\" content=\"@Stormshield\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Stormshield Customer Security Lab\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-dlink-cve-2024-3272-cve-2024-3273-reponse-produits-stormshield\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-dlink-cve-2024-3272-cve-2024-3273-reponse-produits-stormshield\\\/\"},\"author\":{\"name\":\"Stormshield Customer Security Lab\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/a05f467cec789f90c8a355b178743249\"},\"headline\":\"Alerte de s\u00e9curit\u00e9 D-Link CVE-2024-3272 &#038; CVE-2024-3273 : la r\u00e9ponse des produits Stormshield\",\"datePublished\":\"2024-04-10T14:53:28+00:00\",\"dateModified\":\"2024-07-08T11:05:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-dlink-cve-2024-3272-cve-2024-3273-reponse-produits-stormshield\\\/\"},\"wordCount\":571,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-dlink-cve-2024-3272-cve-2024-3273-reponse-produits-stormshield\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_1534485395-scaled.jpg\",\"keywords\":[\"La cybers\u00e9curit\u00e9 - par Stormshield\"],\"articleSection\":[\"Alertes\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-dlink-cve-2024-3272-cve-2024-3273-reponse-produits-stormshield\\\/\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-dlink-cve-2024-3272-cve-2024-3273-reponse-produits-stormshield\\\/\",\"name\":\"Vuln\u00e9rabilit\u00e9s critiques D-Link CVE-2024-3272 & CVE-2024-3273\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-dlink-cve-2024-3272-cve-2024-3273-reponse-produits-stormshield\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-dlink-cve-2024-3272-cve-2024-3273-reponse-produits-stormshield\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_1534485395-scaled.jpg\",\"datePublished\":\"2024-04-10T14:53:28+00:00\",\"dateModified\":\"2024-07-08T11:05:13+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/a05f467cec789f90c8a355b178743249\"},\"description\":\"Alerte de s\u00e9curit\u00e9 D-Link et la r\u00e9ponse des produits Stormshield. Moyens de protection face aux CVE-2024-3272 & CVE-2024-3273.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-dlink-cve-2024-3272-cve-2024-3273-reponse-produits-stormshield\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-dlink-cve-2024-3272-cve-2024-3273-reponse-produits-stormshield\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-dlink-cve-2024-3272-cve-2024-3273-reponse-produits-stormshield\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_1534485395-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.stormshield.com\\\/wp-content\\\/uploads\\\/shutterstock_1534485395-scaled.jpg\",\"width\":2560,\"height\":1422},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/actus\\\/alerte-securite-dlink-cve-2024-3272-cve-2024-3273-reponse-produits-stormshield\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Alerte de s\u00e9curit\u00e9 D-Link CVE-2024-3272 &#038; CVE-2024-3273 : la r\u00e9ponse des produits Stormshield\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/\",\"name\":\"Stormshield\",\"description\":\"Stormshield\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.stormshield.com\\\/fr\\\/#\\\/schema\\\/person\\\/a05f467cec789f90c8a355b178743249\",\"name\":\"Stormshield Customer Security Lab\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g\",\"caption\":\"Stormshield Customer Security Lab\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vuln\u00e9rabilit\u00e9s critiques D-Link CVE-2024-3272 & CVE-2024-3273","description":"Alerte de s\u00e9curit\u00e9 D-Link et la r\u00e9ponse des produits Stormshield. Moyens de protection face aux CVE-2024-3272 & CVE-2024-3273.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-dlink-cve-2024-3272-cve-2024-3273-reponse-produits-stormshield\/","og_locale":"fr_FR","og_type":"article","og_title":"Vuln\u00e9rabilit\u00e9s critiques D-Link CVE-2024-3272 & CVE-2024-3273","og_description":"Alerte de s\u00e9curit\u00e9 D-Link et la r\u00e9ponse des produits Stormshield. Moyens de protection face aux CVE-2024-3272 & CVE-2024-3273.","og_url":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-dlink-cve-2024-3272-cve-2024-3273-reponse-produits-stormshield\/","og_site_name":"Stormshield","article_published_time":"2024-04-10T14:53:28+00:00","article_modified_time":"2024-07-08T11:05:13+00:00","og_image":[{"width":2560,"height":1422,"url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","type":"image\/jpeg"}],"author":"Stormshield Customer Security Lab","twitter_card":"summary_large_image","twitter_creator":"@Stormshield","twitter_site":"@Stormshield","twitter_misc":{"\u00c9crit par":"Stormshield Customer Security Lab","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-dlink-cve-2024-3272-cve-2024-3273-reponse-produits-stormshield\/#article","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-dlink-cve-2024-3272-cve-2024-3273-reponse-produits-stormshield\/"},"author":{"name":"Stormshield Customer Security Lab","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/a05f467cec789f90c8a355b178743249"},"headline":"Alerte de s\u00e9curit\u00e9 D-Link CVE-2024-3272 &#038; CVE-2024-3273 : la r\u00e9ponse des produits Stormshield","datePublished":"2024-04-10T14:53:28+00:00","dateModified":"2024-07-08T11:05:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-dlink-cve-2024-3272-cve-2024-3273-reponse-produits-stormshield\/"},"wordCount":571,"commentCount":0,"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-dlink-cve-2024-3272-cve-2024-3273-reponse-produits-stormshield\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","keywords":["La cybers\u00e9curit\u00e9 - par Stormshield"],"articleSection":["Alertes"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-dlink-cve-2024-3272-cve-2024-3273-reponse-produits-stormshield\/","url":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-dlink-cve-2024-3272-cve-2024-3273-reponse-produits-stormshield\/","name":"Vuln\u00e9rabilit\u00e9s critiques D-Link CVE-2024-3272 & CVE-2024-3273","isPartOf":{"@id":"https:\/\/www.stormshield.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-dlink-cve-2024-3272-cve-2024-3273-reponse-produits-stormshield\/#primaryimage"},"image":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-dlink-cve-2024-3272-cve-2024-3273-reponse-produits-stormshield\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","datePublished":"2024-04-10T14:53:28+00:00","dateModified":"2024-07-08T11:05:13+00:00","author":{"@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/a05f467cec789f90c8a355b178743249"},"description":"Alerte de s\u00e9curit\u00e9 D-Link et la r\u00e9ponse des produits Stormshield. Moyens de protection face aux CVE-2024-3272 & CVE-2024-3273.","breadcrumb":{"@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-dlink-cve-2024-3272-cve-2024-3273-reponse-produits-stormshield\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-dlink-cve-2024-3272-cve-2024-3273-reponse-produits-stormshield\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-dlink-cve-2024-3272-cve-2024-3273-reponse-produits-stormshield\/#primaryimage","url":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","contentUrl":"https:\/\/www.stormshield.com\/wp-content\/uploads\/shutterstock_1534485395-scaled.jpg","width":2560,"height":1422},{"@type":"BreadcrumbList","@id":"https:\/\/www.stormshield.com\/fr\/actus\/alerte-securite-dlink-cve-2024-3272-cve-2024-3273-reponse-produits-stormshield\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stormshield.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Alerte de s\u00e9curit\u00e9 D-Link CVE-2024-3272 &#038; CVE-2024-3273 : la r\u00e9ponse des produits Stormshield"}]},{"@type":"WebSite","@id":"https:\/\/www.stormshield.com\/fr\/#website","url":"https:\/\/www.stormshield.com\/fr\/","name":"Stormshield","description":"Stormshield","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stormshield.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.stormshield.com\/fr\/#\/schema\/person\/a05f467cec789f90c8a355b178743249","name":"Stormshield Customer Security Lab","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/46b9416c400398c1a9fc878c7a35bd2ae4f79caeeda138facd5cb65a4ab91c5d?s=96&d=mm&r=g","caption":"Stormshield Customer Security Lab"}}]}},"_links":{"self":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/511013","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/comments?post=511013"}],"version-history":[{"count":4,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/511013\/revisions"}],"predecessor-version":[{"id":511020,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/posts\/511013\/revisions\/511020"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media\/190179"}],"wp:attachment":[{"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/media?parent=511013"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/categories?post=511013"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/tags?post=511013"},{"taxonomy":"business_size","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/business_size?post=511013"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/industry?post=511013"},{"taxonomy":"help_mefind","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/help_mefind?post=511013"},{"taxonomy":"features","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/features?post=511013"},{"taxonomy":"type_security","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/type_security?post=511013"},{"taxonomy":"maintenance","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/maintenance?post=511013"},{"taxonomy":"offer","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/offer?post=511013"},{"taxonomy":"administration_tools","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/administration_tools?post=511013"},{"taxonomy":"cloud_offers","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/cloud_offers?post=511013"},{"taxonomy":"listing_product","embeddable":true,"href":"https:\/\/www.stormshield.com\/fr\/wp-json\/wp\/v2\/listing_product?post=511013"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}