{"id":232894,"date":"2022-12-05T00:00:00","date_gmt":"2022-12-04T23:00:00","guid":{"rendered":"https:\/\/www.ascend.de\/pas-de-vulnerabilite-log4j-sur-ascend\/"},"modified":"2022-12-05T00:00:00","modified_gmt":"2022-12-04T23:00:00","slug":"pas-de-vulnerabilite-log4j-sur-ascend","status":"publish","type":"post","link":"https:\/\/www.ascend.de\/fr\/pas-de-vulnerabilite-log4j-sur-ascend\/","title":{"rendered":"Pas de vuln\u00e9rabilit\u00e9 Log4j sur ASCEND"},"content":{"rendered":"<p>Nuremberg, janvier 2022 &#8211; En d\u00e9cembre 2021, une vuln\u00e9rabilit\u00e9 jug\u00e9e hautement critique a \u00e9t\u00e9 d\u00e9couverte dans la biblioth\u00e8que Java Log4j largement utilis\u00e9e.<br \/>\nElle permet aux cybercriminels d&rsquo;acc\u00e9der facilement \u00e0 un serveur cible afin d&rsquo;ex\u00e9cuter des logiciels malveillants ou de prendre le contr\u00f4le du syst\u00e8me.<br \/>\nASCEND a imm\u00e9diatement r\u00e9agi en analysant tous ses syst\u00e8mes pour d\u00e9tecter cette faille.<br \/>\n\u00ab\u00a0Nos fabricants de mat\u00e9riel et nos partenaires logiciels ont tr\u00e8s rapidement combl\u00e9 les quelques failles d\u00e9tect\u00e9es\u00a0\u00bb, explique Johannes Fickeis, directeur g\u00e9n\u00e9ral d&rsquo;ASCEND GmbH.     <\/p>\n<style>\/*! elementor - v3.11.3 - 07-03-2023 *\/<br \/>\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style>\n<h3>Pas de vuln\u00e9rabilit\u00e9 Log4j sur Peplink<\/h3>\n<p>  Les routeurs Peplink, y compris les applications InControl et InControl 2, ne sont pas affect\u00e9s par cette vuln\u00e9rabilit\u00e9 car ils n&rsquo;utilisent pas le framework Log4j. Plus d&rsquo;informations sur Peplink <a href=\"https:\/\/www.peplink.com\/we-are-safe-from-log4j\/\">ici<\/a>.  <\/p>\n<style>\/*! elementor - v3.11.3 - 07-03-2023 *\/<br \/>\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\n<p>\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"720\" src=\"https:\/\/www.ascend.de\/staging\/wp-content\/uploads\/2023\/02\/ascend_boost-for-application-and-software-use-one-illustration.svg\" alt=\"Boost for Application and Software use one Illustration\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nuremberg, janvier 2022 &#8211; En d\u00e9cembre 2021, une vuln\u00e9rabilit\u00e9 jug\u00e9e hautement critique a \u00e9t\u00e9 d\u00e9couverte dans la biblioth\u00e8que Java Log4j largement utilis\u00e9e. Elle permet aux cybercriminels d&rsquo;acc\u00e9der facilement \u00e0 un serveur cible afin d&rsquo;ex\u00e9cuter des logiciels malveillants ou de prendre le contr\u00f4le du syst\u00e8me. ASCEND a imm\u00e9diatement r\u00e9agi en analysant tous ses syst\u00e8mes pour d\u00e9tecter [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":39569,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"none","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4541,4536,4542,4522],"tags":[6806,6810,6821,6820,6814,6815,6813],"class_list":["post-232894","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-entreprise-de-systemes-informatiques","category-generalites","category-mise-en-reseau","category-wlan-fr","tag-industrie-4-0-fr","tag-industrie-4-0-fr-2","tag-mise-en-reseau","tag-mise-en-reseau-de-sites","tag-peplink-fr","tag-sd-wan-fr","tag-securite-informatique"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.ascend.de\/fr\/wp-json\/wp\/v2\/posts\/232894","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ascend.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ascend.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ascend.de\/fr\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ascend.de\/fr\/wp-json\/wp\/v2\/comments?post=232894"}],"version-history":[{"count":0,"href":"https:\/\/www.ascend.de\/fr\/wp-json\/wp\/v2\/posts\/232894\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ascend.de\/fr\/wp-json\/wp\/v2\/media\/39569"}],"wp:attachment":[{"href":"https:\/\/www.ascend.de\/fr\/wp-json\/wp\/v2\/media?parent=232894"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ascend.de\/fr\/wp-json\/wp\/v2\/categories?post=232894"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ascend.de\/fr\/wp-json\/wp\/v2\/tags?post=232894"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}