{"id":174272,"date":"2025-08-13T18:45:13","date_gmt":"2025-08-13T17:45:13","guid":{"rendered":"https:\/\/cms-articles.softonic.io\/es\/?p=393077"},"modified":"2025-08-13T18:46:42","modified_gmt":"2025-08-13T17:46:42","slug":"microsoft-corrige-111-vulnerabilites-qui-exposaient-votre-ordinateur-a-toutes-sortes-de-menaces","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/fr\/microsoft-corrige-111-vulnerabilites-qui-exposaient-votre-ordinateur-a-toutes-sortes-de-menaces\/","title":{"rendered":"Microsoft corrige 111 vuln\u00e9rabilit\u00e9s qui exposaient votre ordinateur \u00e0 toutes sortes de menaces"},"content":{"rendered":"\n<p>Microsoft a lanc\u00e9 des mises \u00e0 jour pour traiter un total de 111 vuln\u00e9rabilit\u00e9s dans son portefeuille de logiciels, dont 16 ont \u00e9t\u00e9 class\u00e9es comme critiques. <strong>Parmi celles-ci, on trouve des failles significatives comme CVE-2025-53786, qui affecte les d\u00e9ploiements hybrides de Microsoft Exchange Server, et CVE-2025-53779<\/strong>, une vuln\u00e9rabilit\u00e9 d&#8217;escalade de privil\u00e8ges dans Windows Kerberos qui a \u00e9t\u00e9 r\u00e9v\u00e9l\u00e9e publiquement lors de la divulgation.<\/p>\n\n\n<h2 class=\"wp-block-heading\">Une solution pour que vous n&#8217;ayez pas \u00e0 souffrir d&#8217;impr\u00e9vus<\/h2>\n\n\n<p>La vuln\u00e9rabilit\u00e9 BadSuccessor, r\u00e9cemment identifi\u00e9e, permet \u00e0 un attaquant qui a d\u00e9j\u00e0 acc\u00e8s \u00e0 certains attributs de l&#8217;Active Directory de compromettre un domaine, bien qu&#8217;elle n&#8217;affecte qu&#8217;environ 0,7 % des domaines en circulation. <strong>Des sp\u00e9cialistes soulignent que cette faille peut faciliter \u00e0 un attaquant, partant de droits administratifs limit\u00e9s, d&#8217;obtenir un contr\u00f4le total du domaine, en utilisant des techniques telles que le Kerberoasting ou le Silver Ticket<\/strong>.<\/p>\n\n\n<p>De plus, Microsoft a corrig\u00e9 quatre vuln\u00e9rabilit\u00e9s d&#8217;ex\u00e9cution de code \u00e0 distance, qui permettaient aux attaquants d&#8217;ex\u00e9cuter des commandes arbitraires et de compromettre des syst\u00e8mes sans intervention du client.<strong> La soci\u00e9t\u00e9 Check Point a r\u00e9v\u00e9l\u00e9 un d\u00e9faut li\u00e9 \u00e0 un composant bas\u00e9 sur Rust du noyau de Windows qui peut provoquer des pannes syst\u00e8me<\/strong> et a averti que cela pourrait repr\u00e9senter un risque consid\u00e9rable pour les entreprises avec de grandes \u00e9quipes ou des employ\u00e9s \u00e0 distance.<\/p>\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Introducing Windows 11\" width=\"840\" height=\"473\" src=\"https:\/\/www.youtube.com\/embed\/Uh9643c2P6k?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n<p>Un aspect pertinent est la vuln\u00e9rabilit\u00e9 CVE-2025-50154, qui permet \u00e0 un attaquant d&#8217;extraire des hachages NTLM sans n\u00e9cessiter d&#8217;interaction de l&#8217;utilisateur, m\u00eame sur des syst\u00e8mes enti\u00e8rement mis \u00e0 jour. <strong>Cela facilite les attaques par relais et l&#8217;acc\u00e8s non autoris\u00e9, suscitant des inqui\u00e9tudes concernant la s\u00e9curit\u00e9 dans les environnements d&#8217;entreprise<\/strong>.<\/p>\n\n\n<p>Les mises \u00e0 jour ne se contentent pas de traiter les vuln\u00e9rabilit\u00e9s existantes, <strong>mais elles renforcent \u00e9galement les mesures de s\u00e9curit\u00e9 dans des applications comme Azure OpenAI et Microsoft 365 Copilot BizChat, qui ont d\u00e9j\u00e0 \u00e9t\u00e9 att\u00e9nu\u00e9es sans n\u00e9cessiter d&#8217;action de la part des utilisateurs<\/strong>.<\/p>\n\n<div class=\"sc-card-program\">\r\n  <div class=\"sc-card-program__body\">\r\n    <div class=\"sc-card-program__row clearfix\">\r\n      <div class=\"sc-card-program__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-program__img\" src=\"https:\/\/images.sftcdn.net\/images\/t_app-icon-s\/p\/3a83edc2-8bcb-4baa-8fbe-3ddcf458c1a4\/1709716978\/windows-11-win11icon.png\" alt=\"Windows 11\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-title\">\r\n        <span class=\"sc-card-program__title\">Windows 11<\/span>\r\n        <a class=\"sc-card-program__button sc-card-program-internal\" href=\"https:\/\/windows-11.softonic.com\/\" target=\"_self\" rel=\"noopener noreferrer\">T\u00c9L\u00c9CHARGER<\/a>\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-rating\">\r\n        \r\n      <\/div>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <span class=\"sc-card-program__description\"><\/span>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <img decoding=\"async\" class=\"sc-card-program__bigpic\" src=\"\">\r\n    <\/div>\r\n    <a class=\"sc-card-program__link track-link sc-card-program-internal\" href=\"https:\/\/windows-11.softonic.com\/\" target=\"_self\" rel=\"noopener noreferrer\"><\/a>\r\n  <\/div>\r\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft a lanc\u00e9 des mises \u00e0 jour pour traiter un total de 111 vuln\u00e9rabilit\u00e9s dans son portefeuille de logiciels, dont 16 ont \u00e9t\u00e9 class\u00e9es comme critiques. Parmi celles-ci figurent des d\u00e9fauts significatifs tels que CVE-2025-53786, qui affecte les d\u00e9ploiements hybrides de Microsoft Exchange Server, et CVE-2025-53779, une vuln\u00e9rabilit\u00e9 d&#8217;escalade de privil\u00e8ges dans Windows Kerberos qui a \u00e9t\u00e9 r\u00e9v\u00e9l\u00e9e publiquement lors de la divulgation. Une solution pour que vous n&#8217;ayez pas \u00e0 subir d&#8217;impr\u00e9vus La vuln\u00e9rabilit\u00e9 BadSuccessor, r\u00e9cemment identifi\u00e9e, permet \u00e0 un attaquant qui a d\u00e9j\u00e0 acc\u00e8s \u00e0 certains attributs de l&#8217;Active Directory de compromettre un domaine, bien qu&#8217;elle n&#8217;affecte qu&#8217;environ 0,7 % de [&hellip;]<\/p>\n","protected":false},"author":9318,"featured_media":174273,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":0},"categories":[16761,25882],"tags":[17677,17048,26273,17132,17291,241,24931,6],"usertag":[],"vertical":[],"content-category":[18042],"class_list":["post-174272","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-windows-software","tag-ciberseguridad","tag-copilot","tag-ejecucion-remota","tag-openai","tag-seguridad","tag-software","tag-vulnerabilidad","tag-windows","content-category-seguridad-privacidad"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/posts\/174272","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/users\/9318"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/comments?post=174272"}],"version-history":[{"count":2,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/posts\/174272\/revisions"}],"predecessor-version":[{"id":174283,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/posts\/174272\/revisions\/174283"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/media\/174273"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/media?parent=174272"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/categories?post=174272"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/tags?post=174272"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/usertag?post=174272"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/vertical?post=174272"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/fr\/wp-json\/wp\/v2\/content-category?post=174272"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}