{"id":16323,"date":"2021-01-28T08:51:04","date_gmt":"2021-01-28T08:51:04","guid":{"rendered":"https:\/\/www.kaspersky.fr\/blog\/?p=16323"},"modified":"2021-01-28T08:51:04","modified_gmt":"2021-01-28T08:51:04","slug":"update-ios-to-14-4-immediately","status":"publish","type":"post","link":"https:\/\/www.kaspersky.fr\/blog\/update-ios-to-14-4-immediately\/16323\/","title":{"rendered":"Installez imm\u00e9diatement la version 14.4 d&rsquo;iOS et d&rsquo;iPadOS"},"content":{"rendered":"<p>Apple a publi\u00e9 une mise \u00e0 jour de s\u00e9curit\u00e9 qui corrige trois vuln\u00e9rabilit\u00e9s zero-day\u00a0: <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-1780\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2021-1780<\/a>, <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-1781\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2021-1781<\/a> et <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-1782\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2021-1782<\/a>. Comme Apple pense que certains cybercriminels pourraient d\u00e9j\u00e0 exploiter ces vuln\u00e9rabilit\u00e9s, l\u2019entreprise conseille \u00e0 tous les utilisateurs d\u2019iOS et d\u2019iPadOS de mettre \u00e0 jour le syst\u00e8me d\u2019exploitation.<\/p>\n<h2>Vuln\u00e9rabilit\u00e9s<\/h2>\n<p>Les vuln\u00e9rabilit\u00e9s CVE-2021-1780 et CVE-2021-1781 se trouvent dans le moteur de navigation WebKit utilis\u00e9 par le navigateur par d\u00e9faut Safari. <a href=\"https:\/\/support.apple.com\/fr-fr\/HT212146\" target=\"_blank\" rel=\"noopener nofollow\">Selon Apple<\/a>, ces deux vuln\u00e9rabilit\u00e9s peuvent permettre l\u2019ex\u00e9cution d\u2019un code arbitraire sur l\u2019appareil affect\u00e9.<\/p>\n<p>Les utilisateurs d\u2019autres navigateurs doivent tout de m\u00eame installer la mise \u00e0 jour.\u00a0M\u00eame si le syst\u00e8me dispose d\u2019un autre navigateur, certaines applications peuvent utiliser le moteur de Safari pour naviguer entre elles. La pr\u00e9sence m\u00eame d\u2019un objet malveillant dans le syst\u00e8me est dangereuse.<\/p>\n<p>Quant \u00e0 la vuln\u00e9rabilit\u00e9 CVE-2021-1782, elle se trouve dans le noyau du syst\u00e8me. Apple la d\u00e9crit comme un bug de situation de condition (<a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/race-condition\/\" target=\"_blank\" rel=\"noopener\">race condition<\/a>) qui peut permettre aux attaquants d\u2019\u00e9lever les privil\u00e8ges de leur processus.<\/p>\n<p>Selon les informations disponibles, des acteurs inconnus pourraient d\u00e9j\u00e0 avoir profit\u00e9 de ces vuln\u00e9rabilit\u00e9s. Ces trois failles peuvent \u00eatre utilis\u00e9es comme cha\u00eene d\u2019exploit mais avec les recherches en cours et pour la protection des utilisateurs, Apple envisage de retarder la publication de plus amples renseignements. La base de donn\u00e9es CVE manque aussi d\u2019informations pr\u00e9cises pour le moment.<\/p>\n<h2>Comment prot\u00e9ger vos appareils iOS<\/h2>\n<ul>\n<li>Installez d\u00e8s que possible la mise \u00e0 jour 14.4 d\u2019iOS et d\u2019iPadOS sur tous les iPhones et iPads compatibles. Selon de <a href=\"https:\/\/support.apple.com\/fr-fr\/HT212146\" target=\"_blank\" rel=\"noopener nofollow\">site d\u2019Apple<\/a>, la mise \u00e0 jour est disponible pour les iPhones 6 et les versions ult\u00e9rieures, les iPad Air 2 et les versions plus r\u00e9centes, les iPad mini 4 et ceux sortis apr\u00e8s, et la septi\u00e8me g\u00e9n\u00e9ration iPod Touch.<\/li>\n<li>Si votre appareil est plus ancien et incompatible avec la version 14.4 d\u2019iOS et iPadOS, installez un autre navigateur pour ne plus utiliser Safari et s\u00e9lectionnez-le comme navigateur par d\u00e9faut. Par exemple, vous pouvez choisir <a href=\"https:\/\/apps.apple.com\/fr\/app\/firefox-private-safe-browser\/id989804926\" target=\"_blank\" rel=\"noopener nofollow\">Firefox<\/a> ou <a href=\"https:\/\/apps.apple.com\/fr\/app\/duckduckgo-privacy-browser\/id663592361\" target=\"_blank\" rel=\"noopener nofollow\">DuckDuckGo<\/a> si vous utilisez iOS 11, ou encore <a href=\"https:\/\/apps.apple.com\/fr\/app\/google-chrome\/id535886823\" target=\"_blank\" rel=\"noopener nofollow\">Google Chrome<\/a> si vous avez iOS 12.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-top3\">\n","protected":false},"excerpt":{"rendered":"<p>La version 14.4 corrige des vuln\u00e9rabilit\u00e9s activement exploit\u00e9es par les cybercriminels. Installez cette mise \u00e0 jour d\u00e8s que possible.<\/p>\n","protected":false},"author":2581,"featured_media":16324,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2112,686,3151],"tags":[29,693,165,134,17,790,568,322],"class_list":{"0":"post-16323","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-threats","9":"category-smb","10":"tag-apple","11":"tag-exploits","12":"tag-ios","13":"tag-ipad","14":"tag-iphone","15":"tag-mises-a-jour","16":"tag-safari","17":"tag-vulnerabilites"},"hreflang":[{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/update-ios-to-14-4-immediately\/16323\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/update-ios-to-14-4-immediately\/22464\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/update-ios-to-14-4-immediately\/17954\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/update-ios-to-14-4-immediately\/8912\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/update-ios-to-14-4-immediately\/24169\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/update-ios-to-14-4-immediately\/22246\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/update-ios-to-14-4-immediately\/20936\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/update-ios-to-14-4-immediately\/24582\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/update-ios-to-14-4-immediately\/23809\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/update-ios-to-14-4-immediately\/30023\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/update-ios-to-14-4-immediately\/9249\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/update-ios-to-14-4-immediately\/38599\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/update-ios-to-14-4-immediately\/16889\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/update-ios-to-14-4-immediately\/14429\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/update-ios-to-14-4-immediately\/29941\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/update-ios-to-14-4-immediately\/26640\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/update-ios-to-14-4-immediately\/23498\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/update-ios-to-14-4-immediately\/28844\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/update-ios-to-14-4-immediately\/28650\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.fr\/blog\/tag\/ios\/","name":"iOS"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/posts\/16323","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/users\/2581"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/comments?post=16323"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/posts\/16323\/revisions"}],"predecessor-version":[{"id":16326,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/posts\/16323\/revisions\/16326"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/media\/16324"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/media?parent=16323"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/categories?post=16323"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.fr\/blog\/wp-json\/wp\/v2\/tags?post=16323"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}