{"id":43721,"date":"2023-03-20T22:28:58","date_gmt":"2023-03-21T02:28:58","guid":{"rendered":"https:\/\/cimbcc.org\/test2\/?p=43721"},"modified":"2023-10-16T22:10:26","modified_gmt":"2023-10-17T02:10:26","slug":"telephones-vivo-samsung-galaxy-et-google-pixel-a-risque-de-piratage-par-une-faille-zero-day","status":"publish","type":"post","link":"https:\/\/cimbcc.org\/test2\/telephones-vivo-samsung-galaxy-et-google-pixel-a-risque-de-piratage-par-une-faille-zero-day\/","title":{"rendered":"T\u00e9l\u00e9phones Vivo, Samsung Galaxy et Google Pixel \u00e0 risque de piratage par une faille zero-day"},"content":{"rendered":"<div class=\"gmail_default\" style=\"text-align: justify;\">\n<figure id=\"attachment_24081\" aria-describedby=\"caption-attachment-24081\" style=\"width: 125px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-24081\" src=\"https:\/\/cimbcc.org\/test2\/wp-content\/uploads\/photo_charron_denis.jpg\" alt=\"\" width=\"125\" height=\"125\" \/><figcaption id=\"caption-attachment-24081\" class=\"wp-caption-text\"><span style=\"color: #ffffff;\">mmm<\/span>Denis Charron<\/figcaption><\/figure>\n<p>Des experts de Google ont d\u00e9couvert 18 failles de type <a href=\"https:\/\/fr.wikipedia.org\/wiki\/Vuln%C3%A9rabilit%C3%A9_zero-day\" target=\"_blank\" rel=\"noopener\"><em>zero-day<\/em><\/a> sur les t\u00e9l\u00e9phones dot\u00e9s du modem Exynos. <a href=\"https:\/\/francoischarron.com\/securite\/fraude-et-arnaques-web\/ces-appareils-samsung-et-pixel-sont-a-risque-de-piratage-a-laide-de-notre-numero-de-telephone\/uKsXnEIJWz\/\" target=\"_blank\" rel=\"noopener\">Cet article<\/a> du site Web de <em>Fran\u00e7ois Charron<\/em> donne la liste des mod\u00e8les de t\u00e9l\u00e9phones touch\u00e9s, reproduite plus loin dans cet article, de m\u00eame que les actions \u00e0 prendre en attendant une mise \u00e0 jour des fabricants.<\/p>\n<\/div>\n<p><!--more--><\/p>\n<h4>Le probl\u00e8me<\/h4>\n<p style=\"padding-left: 40px; text-align: justify;\"><em>\u00ab Google met en garde les d\u00e9tenteurs d\u2019appareils munis de modems Exynos int\u00e9gr\u00e9s dans des t\u00e9l\u00e9phones Samsung, Vivo et Pixel. Project Zero, son laboratoire d\u00e9di\u00e9 \u00e0 la cybers\u00e9curit\u00e9, a rapport\u00e9 18 failles de s\u00e9curit\u00e9 de type <a href=\"https:\/\/fr.wikipedia.org\/wiki\/Vuln%C3%A9rabilit%C3%A9_zero-day\" target=\"_blank\" rel=\"noopener\">zero day<\/a>. Quatre d\u2019entre elles peuvent permettre \u00e0 un pirate informatique de prendre le contr\u00f4le de notre appareil \u00e0 l\u2019aide de notre num\u00e9ro de t\u00e9l\u00e9phone tout simplement. \u00bb <a href=\"https:\/\/francoischarron.com\/securite\/fraude-et-arnaques-web\/ces-appareils-samsung-et-pixel-sont-a-risque-de-piratage-a-laide-de-notre-numero-de-telephone\/uKsXnEIJWz\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-size: 8pt;\">Source<\/span><\/a><\/em><\/p>\n<h4>Liste des appareils touch\u00e9s<\/h4>\n<ul>\n<li><a href=\"https:\/\/fr.wikipedia.org\/wiki\/Vivo_(smartphone)\" target=\"_blank\" rel=\"noopener\">Vivo<\/a> S16<\/li>\n<li>Vivo S15<\/li>\n<li>Vivo S6<\/li>\n<li>Vivo X70<\/li>\n<li>Vivo X60<\/li>\n<li>Vivo X30<\/li>\n<li><a href=\"https:\/\/fr.wikipedia.org\/wiki\/Samsung_Galaxy\" target=\"_blank\" rel=\"noopener\">Samsung Galaxy<\/a> S22<\/li>\n<li>Samsung Galaxy M33<\/li>\n<li>Samsung Galaxy M13<\/li>\n<li>Samsung Galaxy M12<\/li>\n<li>Samsung Galaxy A71<\/li>\n<li>Samsung Galaxy A53<\/li>\n<li>Samsung Galaxy A33<\/li>\n<li>Samsung Galaxy A21s<\/li>\n<li>Samsung Galaxy A13<\/li>\n<li>Samsung Galaxy A12<\/li>\n<li>Samsung Galaxy A04<\/li>\n<li><a href=\"https:\/\/fr.wikipedia.org\/wiki\/Google_Pixel\" target=\"_blank\" rel=\"noopener\">Google Pixel<\/a> 6<\/li>\n<li>Google Pixel 6 Pro<\/li>\n<li>Google Pixel 7<\/li>\n<li>Google Pixel 7 Pro<\/li>\n<li>Les v\u00e9hicules munis de la puce <a href=\"https:\/\/fr.wikipedia.org\/wiki\/Exynos\" target=\"_blank\" rel=\"noopener\">Exynos<\/a> Auto T5123<\/li>\n<\/ul>\n<h4>La correction des failles de s\u00e9curit\u00e9<\/h4>\n<p style=\"padding-left: 40px; text-align: justify;\"><em>\u00ab Google a commenc\u00e9 \u00e0 d\u00e9ployer les correctifs de s\u00e9curit\u00e9, notamment pour les d\u00e9tenteurs d\u2019appareil Pixel. Dans leur cas, pour colmater les risques il suffit d\u2019installer la mise \u00e0 jour de Mars 2023 via les param\u00e8tres dans l\u2019onglet: Syst\u00e8me.<\/em><\/p>\n<p style=\"padding-left: 40px; text-align: justify;\"><em>Pour ce qui est des appareils Samsung et Vivo, c\u2019est \u00e0 ces compagnies d\u2019offrir leur propre correctif de s\u00e9curit\u00e9 et Google ne peut dire exactement quand ils le feront. (&#8230;)<\/em><\/p>\n<p style=\"padding-left: 40px; text-align: justify;\"><em>En attendent la mise \u00e0 jour, Google recommande aux d\u00e9tenteurs d\u2019appareils Samsung et Vivo de d\u00e9sactiver les appels Wi-Fi et les appels Voice-over-LTE (VolTE) via les param\u00e8tres de leur appareil. \u00bb <a href=\"https:\/\/francoischarron.com\/securite\/fraude-et-arnaques-web\/ces-appareils-samsung-et-pixel-sont-a-risque-de-piratage-a-laide-de-notre-numero-de-telephone\/uKsXnEIJWz\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-size: 8pt;\">Source<\/span><\/a><\/em><\/p>\n<p style=\"text-align: justify;\">La proc\u00e9dure pour d\u00e9sactiver ces fonctions est expliqu\u00e9e dans l&rsquo;<a href=\"https:\/\/francoischarron.com\/securite\/fraude-et-arnaques-web\/ces-appareils-samsung-et-pixel-sont-a-risque-de-piratage-a-laide-de-notre-numero-de-telephone\/uKsXnEIJWz\/\" target=\"_blank\" rel=\"noopener\">article pr\u00e9c\u00e9demment cit\u00e9<\/a>.<\/p>\n<p>Denis Charron<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Des experts de Google ont d\u00e9couvert 18 failles de type zero-day sur les t\u00e9l\u00e9phones dot\u00e9s du modem Exynos. Cet article du site Web de Fran\u00e7ois Charron donne la liste des mod\u00e8les de t\u00e9l\u00e9phones touch\u00e9s, reproduite plus loin dans cet article, de m\u00eame que les actions \u00e0 prendre en attendant une mise \u00e0 jour des fabricants.<\/p>\n","protected":false},"author":43,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25],"tags":[1777,1535,1401,1778,104,1779],"class_list":["post-43721","post","type-post","status-publish","format-standard","hentry","category-chronique-securite","tag-exynos","tag-failles-de-securite","tag-google-pixel","tag-samsung-galaxy","tag-telephone-intelligent","tag-vivo"],"_links":{"self":[{"href":"https:\/\/cimbcc.org\/test2\/wp-json\/wp\/v2\/posts\/43721","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cimbcc.org\/test2\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cimbcc.org\/test2\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cimbcc.org\/test2\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/cimbcc.org\/test2\/wp-json\/wp\/v2\/comments?post=43721"}],"version-history":[{"count":5,"href":"https:\/\/cimbcc.org\/test2\/wp-json\/wp\/v2\/posts\/43721\/revisions"}],"predecessor-version":[{"id":43726,"href":"https:\/\/cimbcc.org\/test2\/wp-json\/wp\/v2\/posts\/43721\/revisions\/43726"}],"wp:attachment":[{"href":"https:\/\/cimbcc.org\/test2\/wp-json\/wp\/v2\/media?parent=43721"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cimbcc.org\/test2\/wp-json\/wp\/v2\/categories?post=43721"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cimbcc.org\/test2\/wp-json\/wp\/v2\/tags?post=43721"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}