{"id":40480,"date":"2017-03-14T16:33:02","date_gmt":"2017-03-14T21:33:02","guid":{"rendered":"http:\/\/www.eagleeyenetworks.com\/vulnerabilites-modeles-cameras-wifi\/"},"modified":"2020-07-13T07:58:18","modified_gmt":"2020-07-13T12:58:18","slug":"vulnerabilites-modeles-cameras-wifi","status":"publish","type":"post","link":"https:\/\/www.een.com\/fr\/blog\/vulnerabilites-modeles-cameras-wifi\/","title":{"rendered":"Vuln\u00e9rabilit\u00e9s dans les Cam\u00e9ras WiFi"},"content":{"rendered":"<p>Les cameras WiFi \u00e0 bas prix sont tr\u00e8s r\u00e9pandues sur internet. \u00c7a peut sembler int\u00e9ressant, mais il faut comprendre leurs failles de s\u00e9curit\u00e9 et le risque qu\u2019elles apportent \u00e0 votre r\u00e9seau.<\/p>\n<p>Pierre Kiim, un blogueur de s\u00e9curit\u00e9 IT <a href=\"https:\/\/pierrekim.github.io\/blog\/2017-03-08-camera-goahead-0day.html\">a r\u00e9cemment d\u00e9couvert<\/a> 1.250 mod\u00e8les diff\u00e9rents de cam\u00e9ras qui ont \u00e9t\u00e9 modifi\u00e9es et pr\u00e9sent\u00e9s comme produits de marques de plusieurs centaines d\u2019entreprises.<\/p>\n<p>Ces cam\u00e9ras ont beaucoup de vuln\u00e9rabilit\u00e9s\u00a0:<\/p>\n<ul>\n<li>Elles contiennent des backdoors (porte d\u00e9rob\u00e9es) qui permettent aux constructeurs d\u2019avoir un acc\u00e8s complet aux informations.<\/li>\n<li>Elles se connectent aux cloud \u00e0 partir des applications mobiles, en utilisant des mots de passe au format texte clair<\/li>\n<li>N\u2019importe qui ayant le num\u00e9ro de s\u00e9rie de la cam\u00e9ra peut y acc\u00e9der<\/li>\n<\/ul>\n<p>Si vous avez une cam\u00e9ra de cette liste, Kim recommande de la retirer imm\u00e9diatement d\u2019internet et de vous en d\u00e9barrasser. Kim explique, \u00ab\u00a0je recommande de DECONNECTER IMMEDIATEMENT ces cam\u00e9ras d\u2019internet. Des centaines de milliers de cam\u00e9ras sont affect\u00e9es par br\u00e8che 0day. Des millions d\u2019entre elles utilisent un r\u00e9seau Cloud non s\u00e9curis\u00e9.\u00a0\u00bb<\/p>\n<p>De plus, Kim sous-entend que des millions de cameras contiennent d\u00e9j\u00e0 le code botnet : \u00ab\u00a0Ce protocole \u00ab\u00a0cloud\u00a0\u00bb ressemble plus \u00e0 un protocole botnet qu\u2019\u00e0 un protocole d\u2019acc\u00e8s \u00e0 distance l\u00e9gitime, et a des faibles \u00e9videntes (tout est en texte clair, c-\u00e0-d qu\u2019un assaillant peut attaquer les cam\u00e9ras dans le cloud et exploiter cet acc\u00e8s pour pirater les r\u00e9seaux internes).\u00a0\u00bb<\/p>\n<p>Nous recommandons de vous renseigner avant d\u2019acheter de nouvelles cam\u00e9ras \u2013 <strong>n\u2019achetez pas<\/strong> de cam\u00e9ras pas ch\u00e8res de fabricants inconnus. Achetez-les depuis des sources fiables, m\u00eame si c\u2019est plus cher, vous en sortirez gagnants sur le long-terme.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignleft size-full wp-image-13617\" src=\"https:\/\/www.een.com\/wp-content\/uploads\/2017\/03\/Vulnerabilities-WIFI-Cameras-FI.jpg\" alt=\"Vulnerabilities-WIFI-Cameras-FI\" width=\"500\" height=\"334\" srcset=\"https:\/\/www.een.com\/wp-content\/uploads\/2017\/03\/Vulnerabilities-WIFI-Cameras-FI.jpg 500w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/03\/Vulnerabilities-WIFI-Cameras-FI-300x200.jpg 300w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/03\/Vulnerabilities-WIFI-Cameras-FI-100x67.jpg 100w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/03\/Vulnerabilities-WIFI-Cameras-FI-195x130.jpg 195w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/03\/Vulnerabilities-WIFI-Cameras-FI-200x134.jpg 200w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/03\/Vulnerabilities-WIFI-Cameras-FI-400x267.jpg 400w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les cameras WiFi \u00e0 bas prix sont tr\u00e8s r\u00e9pandues sur internet. \u00c7a peut sembler int\u00e9ressant, mais il faut comprendre leurs failles de s\u00e9curit\u00e9 et le risque qu\u2019elles apportent \u00e0 votre &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.een.com\/fr\/blog\/vulnerabilites-modeles-cameras-wifi\/\"> <span class=\"screen-reader-text\">Vuln\u00e9rabilit\u00e9s dans les Cam\u00e9ras WiFi<\/span> Lire la suite\u00a0\u00bb<\/a><\/p>\n","protected":false},"author":544,"featured_media":31403,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[436],"tags":[],"class_list":["post-40480","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite-de-cyber"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/posts\/40480","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/users\/544"}],"replies":[{"embeddable":true,"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/comments?post=40480"}],"version-history":[{"count":0,"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/posts\/40480\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/media\/31403"}],"wp:attachment":[{"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/media?parent=40480"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/categories?post=40480"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.een.com\/fr\/wp-json\/wp\/v2\/tags?post=40480"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}