{"id":3029,"date":"2020-05-19T10:58:29","date_gmt":"2020-05-19T10:58:29","guid":{"rendered":"https:\/\/www.affinite.fr\/index.php\/2020\/05\/19\/cette-faille-bluetooth-affecte-tous-les-terminaux-du-marche\/"},"modified":"2020-05-19T10:58:29","modified_gmt":"2020-05-19T10:58:29","slug":"cette-faille-bluetooth-affecte-tous-les-terminaux-du-marche","status":"publish","type":"post","link":"http:\/\/www.affinite.fr\/index.php\/2020\/05\/19\/cette-faille-bluetooth-affecte-tous-les-terminaux-du-marche\/","title":{"rendered":"Cette faille Bluetooth affecte tous les terminaux du march\u00e9"},"content":{"rendered":"<p> [ad_1]<br \/>\n<br \/><img decoding=\"async\" src=\"https:\/\/img.bfmtv.com\/i\/0\/0\/f2d\/a429e428321d3d0acbad72ece1533.jpg\" \/><\/p>\n<div itemprop=\"articleBody\">\n<p>Trois chercheurs en s\u00e9curit\u00e9 viennent de d\u00e9voiler une faille cryptographique dans le protocole Bluetooth. Baptis\u00e9e BIAS (Bluetooth Impersonation AttackS), elle permet \u00e0 un pirate d\u2019usurper l\u2019identit\u00e9 d\u2019un terminal vis-\u00e0-vis d\u2019un autre terminal avec lequel il a d\u00e9j\u00e0 r\u00e9alis\u00e9 un appairage. Il pourrait par exemple se faire passer pour un casque audio, un PC portable, un smartphone ou un disque dur sans fil. Puis, en fonction de la situation, il pourrait envoyer des commandes ou intercepter des donn\u00e9es.<\/p>\n<p>Comme il s\u2019agit d\u2019une faille au niveau du standard Bluetooth, tous les terminaux qui impl\u00e9mentent cette technologie sans fil sont vuln\u00e9rables. Les chercheurs ont test\u00e9 \u00e0 titre exp\u00e9rimental 31\u00a0\u00e9quipements\u00a0: des smartphones, des PC portables, des casques, des tablettes, etc. Tous ont succomb\u00e9 \u00e0 l\u2019attaque BIAS.<\/p>\n<aside class=\"bg-color-0 padding-inside-all-s bloc border-s\">\n<h4 class=\"box-txt-normal\">\n<p><b>A d\u00e9couvrir aussi en vid\u00e9o<\/b><\/p>\n<\/h4>\n<\/aside>\n<p>Cette faille a \u00e9t\u00e9 confirm\u00e9e par l\u2019organisme de standardisation Bluetooth Special Interest Group, qui va apporter des correctifs dans une prochaine version de cette technologie. En attendant, les fabricants sont invit\u00e9s \u00e0 patcher leurs firmwares. Mais personne ne sait, \u00e0 l\u2019heure actuelle, quelles marques l\u2019ont fait ou comptent le faire. En tant qu\u2019utilisateur, il n\u2019y a malheureusement aucune parade possible. Si votre \u00e9quipement n\u2019a pas \u00e9t\u00e9 mis \u00e0 jour depuis d\u00e9cembre 2019, il est tr\u00e8s probablement vuln\u00e9rable.<\/p>\n<p><strong>Sources<\/strong>: <a data-cke-saved-href=\"https:\/\/francozappa.github.io\/about-bias\/\" target=\"_blank\" href=\"https:\/\/francozappa.github.io\/about-bias\/\" rel=\"noopener noreferrer\">publication des chercheurs<\/a>, <a data-cke-saved-href=\"https:\/\/www.bluetooth.com\/learn-about-bluetooth\/bluetooth-technology\/bluetooth-security\/bias-vulnerability\/\" target=\"_blank\" href=\"https:\/\/www.bluetooth.com\/learn-about-bluetooth\/bluetooth-technology\/bluetooth-security\/bias-vulnerability\/\" rel=\"noopener noreferrer\">Bluetooth SIG<\/a><\/p>\n<\/p><\/div>\n<p><script>\n         !function(f,b,e,v,n,t,s){if(f.fbq)return;n=f.fbq=function()\n         {n.callMethod? n.callMethod.apply(n,arguments):n.queue.push(arguments)}\n         ;if(!f._fbq)f._fbq=n;\n             n.push=n;n.loaded=!0;n.version='2.0';n.queue=[];t=b.createElement(e);t.async=!0;\n             t.src=v;s=b.getElementsByTagName(e)[0];s.parentNode.insertBefore(t,s)}(window,\n                 document,'script','https:\/\/connect.facebook.net\/en_US\/fbevents.js');\n         fbq('init', '1065890633454496');\n         fbq('track', 'PageView');\n     <\/script><br \/>\n<br \/>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/www.01net.com\/actualites\/cette-faille-bluetooth-affecte-tous-les-terminaux-du-marche-1916505.html\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] Trois chercheurs en s\u00e9curit\u00e9 viennent de d\u00e9voiler une faille cryptographique dans le protocole Bluetooth. Baptis\u00e9e BIAS (Bluetooth Impersonation AttackS), &hellip; <a href=\"http:\/\/www.affinite.fr\/index.php\/2020\/05\/19\/cette-faille-bluetooth-affecte-tous-les-terminaux-du-marche\/\" class=\"more-link\">Plus <span class=\"screen-reader-text\">Cette faille Bluetooth affecte tous les terminaux du march\u00e9<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":3030,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-3029","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tous"],"_links":{"self":[{"href":"http:\/\/www.affinite.fr\/index.php\/wp-json\/wp\/v2\/posts\/3029"}],"collection":[{"href":"http:\/\/www.affinite.fr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.affinite.fr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.affinite.fr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.affinite.fr\/index.php\/wp-json\/wp\/v2\/comments?post=3029"}],"version-history":[{"count":0,"href":"http:\/\/www.affinite.fr\/index.php\/wp-json\/wp\/v2\/posts\/3029\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/www.affinite.fr\/index.php\/wp-json\/wp\/v2\/media\/3030"}],"wp:attachment":[{"href":"http:\/\/www.affinite.fr\/index.php\/wp-json\/wp\/v2\/media?parent=3029"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.affinite.fr\/index.php\/wp-json\/wp\/v2\/categories?post=3029"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.affinite.fr\/index.php\/wp-json\/wp\/v2\/tags?post=3029"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}