{"id":484397,"date":"2025-08-22T09:00:31","date_gmt":"2025-08-22T07:00:31","guid":{"rendered":"https:\/\/www.ecinews.fr\/?p=484397"},"modified":"2025-08-09T18:04:33","modified_gmt":"2025-08-09T16:04:33","slug":"keysight-devoile-une-vulnerabilite-tls-exploitee-pour-contourner-les-defenses-reseau","status":"publish","type":"post","link":"https:\/\/www.ecinews.fr\/fr\/keysight-devoile-une-vulnerabilite-tls-exploitee-pour-contourner-les-defenses-reseau\/","title":{"rendered":"Keysight d\u00e9voile une vuln\u00e9rabilit\u00e9 TLS exploit\u00e9e pour contourner les d\u00e9fenses r\u00e9seau"},"content":{"rendered":"<p>L\u2019\u00e9quipe Application and Threat Intelligence (ATI) de Keysight Technologies a r\u00e9v\u00e9l\u00e9 une faille in\u00e9dite dans le protocole TLS (Transport Layer Security), permettant la cr\u00e9ation de canaux de communication cach\u00e9s capables d\u2019\u00e9chapper aux syst\u00e8mes de s\u00e9curit\u00e9 traditionnels. Cette technique repose sur une r\u00e9organisation l\u00e9gitime des param\u00e8tres TLS Client Hello, sans injection de code malveillant, rendant la d\u00e9tection par les pare-feu et les syst\u00e8mes de pr\u00e9vention des intrusions (IPS) extr\u00eamement difficile.<\/p>\n<p>Ce canal secret peut \u00eatre utilis\u00e9 pour exfiltrer des donn\u00e9es ou \u00e9tablir des communications de commandement et de contr\u00f4le (C2), tout en restant invisible pour la majorit\u00e9 des outils de s\u00e9curit\u00e9. Cette d\u00e9couverte souligne les risques li\u00e9s \u00e0 la flexibilit\u00e9 des protocoles de chiffrement, m\u00eame lorsqu\u2019ils sont conformes aux standards.<\/p>\n<p>\u00ab Cette faille change la donne \u00bb, affirme Ram Periakaruppan, vice-pr\u00e9sident de Keysight. \u00ab Elle permet aux d\u00e9fenseurs de tester leurs syst\u00e8mes face \u00e0 des menaces jusqu\u2019ici inconnues. \u00bb<\/p>\n<p>Keysight a int\u00e9gr\u00e9 cette vuln\u00e9rabilit\u00e9 dans sa derni\u00e8re mise \u00e0 jour ATI, permettant aux entreprises de :<\/p>\n<ul>\n<li>Simuler l\u2019exploit TLS en environnement contr\u00f4l\u00e9<\/li>\n<li>Tester la capacit\u00e9 de leurs d\u00e9fenses \u00e0 le d\u00e9tecter<\/li>\n<li>\u00c9valuer l\u2019impact des mesures d\u2019att\u00e9nuation sur les performances r\u00e9seau<\/li>\n<\/ul>\n<p>Gr\u00e2ce \u00e0 ses mises \u00e0 jour bihebdomadaires et \u00e0 une base de donn\u00e9es de plus de 10 400 attaques, Keysight offre une plateforme de test compl\u00e8te, incluant :<\/p>\n<ul>\n<li>Des simulations r\u00e9alistes de menaces<\/li>\n<li>Des tests de performance jusqu\u2019\u00e0 12 Tbit\/s<\/li>\n<li>Une personnalisation avanc\u00e9e des sc\u00e9narios d\u2019attaque<\/li>\n<\/ul>\n<p>Cette avanc\u00e9e renforce la capacit\u00e9 des organisations \u00e0 anticiper les menaces furtives, en particulier celles exploitant des protocoles de chiffrement comme TLS.<\/p>\n<p><a href=\"https:\/\/www.keysight.com\/fr\/en\/home.html\">Keysight<\/a>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>L\u2019\u00e9quipe Application and Threat Intelligence (ATI) de Keysight Technologies a r\u00e9v\u00e9l\u00e9 une faille in\u00e9dite dans le protocole TLS (Transport Layer Security), permettant la cr\u00e9ation de canaux de communication cach\u00e9s capables d\u2019\u00e9chapper aux syst\u00e8mes de s\u00e9curit\u00e9 traditionnels. Cette technique repose sur une r\u00e9organisation l\u00e9gitime des param\u00e8tres TLS Client Hello, sans injection de code malveillant, rendant la [&hellip;]<\/p>\n","protected":false},"author":39,"featured_media":484402,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[886],"tags":[3861,10381,6066],"domains":[47],"ppma_author":[6113],"class_list":["post-484397","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-fr","tag-securite-fr","tag-tls","tag-vulnerabilites","domains-electronique-eci"],"acf":[],"yoast_head":"<title>Keysight d\u00e9voile une vuln\u00e9rabilit\u00e9 TLS exploit\u00e9e pour conto...<\/title>\n<meta name=\"description\" content=\"L\u2019\u00e9quipe Application and Threat Intelligence (ATI) de Keysight Technologies a r\u00e9v\u00e9l\u00e9 une faille in\u00e9dite dans le protocole TLS (Transport Layer...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/484397\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Keysight d\u00e9voile une vuln\u00e9rabilit\u00e9 TLS exploit\u00e9e pour contourner les d\u00e9fenses r\u00e9seau\" \/>\n<meta property=\"og:description\" content=\"L\u2019\u00e9quipe Application and Threat Intelligence (ATI) de Keysight Technologies a r\u00e9v\u00e9l\u00e9 une faille in\u00e9dite dans le protocole TLS (Transport Layer Security), permettant la cr\u00e9ation de canaux de communication cach\u00e9s capables d\u2019\u00e9chapper aux syst\u00e8mes de s\u00e9curit\u00e9 traditionnels\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/484397\/\" \/>\n<meta property=\"og:site_name\" content=\"EENewsEurope\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-22T07:00:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-09T16:04:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2025\/08\/ECI5113-Keysight-devoile-des-canaux-TLS-caches-capables-deviter-les-defenses-reseaux.png\" \/>\n\t<meta property=\"og:image:width\" content=\"520\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"NicolasFeste\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"NicolasFeste\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/keysight-devoile-une-vulnerabilite-tls-exploitee-pour-contourner-les-defenses-reseau\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/keysight-devoile-une-vulnerabilite-tls-exploitee-pour-contourner-les-defenses-reseau\/\"},\"author\":{\"name\":\"NicolasFeste\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/c7104a72b466a801f257e51481de0c43\"},\"headline\":\"Keysight d\u00e9voile une vuln\u00e9rabilit\u00e9 TLS exploit\u00e9e pour contourner les d\u00e9fenses r\u00e9seau\",\"datePublished\":\"2025-08-22T07:00:31+00:00\",\"dateModified\":\"2025-08-09T16:04:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/keysight-devoile-une-vulnerabilite-tls-exploitee-pour-contourner-les-defenses-reseau\/\"},\"wordCount\":304,\"publisher\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#organization\"},\"keywords\":[\"s\u00e9curit\u00e9\",\"TLS\",\"vuln\u00e9rabilit\u00e9s\"],\"articleSection\":[\"Actualit\u00e9 g\u00e9n\u00e9rale\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/keysight-devoile-une-vulnerabilite-tls-exploitee-pour-contourner-les-defenses-reseau\/\",\"url\":\"https:\/\/www.ecinews.fr\/fr\/keysight-devoile-une-vulnerabilite-tls-exploitee-pour-contourner-les-defenses-reseau\/\",\"name\":\"Keysight d\u00e9voile une vuln\u00e9rabilit\u00e9 TLS exploit\u00e9e pour contourner les d\u00e9fenses r\u00e9seau -\",\"isPartOf\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#website\"},\"datePublished\":\"2025-08-22T07:00:31+00:00\",\"dateModified\":\"2025-08-09T16:04:33+00:00\",\"description\":\"L\u2019\u00e9quipe Application and Threat Intelligence (ATI) de Keysight Technologies a r\u00e9v\u00e9l\u00e9 une faille in\u00e9dite dans le protocole TLS (Transport Layer Security), permettant la cr\u00e9ation de canaux de communication cach\u00e9s capables d\u2019\u00e9chapper aux syst\u00e8mes de s\u00e9curit\u00e9 traditionnels\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/keysight-devoile-une-vulnerabilite-tls-exploitee-pour-contourner-les-defenses-reseau\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ecinews.fr\/fr\/keysight-devoile-une-vulnerabilite-tls-exploitee-pour-contourner-les-defenses-reseau\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/keysight-devoile-une-vulnerabilite-tls-exploitee-pour-contourner-les-defenses-reseau\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ecinews.fr\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Keysight d\u00e9voile une vuln\u00e9rabilit\u00e9 TLS exploit\u00e9e pour contourner les d\u00e9fenses r\u00e9seau\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#website\",\"url\":\"https:\/\/www.ecinews.fr\/fr\/\",\"name\":\"EENewsEurope\",\"description\":\"Just another WordPress site\",\"publisher\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ecinews.fr\/fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#organization\",\"name\":\"EENewsEurope\",\"url\":\"https:\/\/www.ecinews.fr\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"contentUrl\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"width\":283,\"height\":113,\"caption\":\"EENewsEurope\"},\"image\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/c7104a72b466a801f257e51481de0c43\",\"name\":\"NicolasFeste\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/image\/1ea421e7d03c1e96a9ea2bcf2705734a\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2e187f4d96902933ba445ed6c760e11c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2e187f4d96902933ba445ed6c760e11c?s=96&d=mm&r=g\",\"caption\":\"NicolasFeste\"}}]}<\/script>","yoast_head_json":{"title":"Keysight d\u00e9voile une vuln\u00e9rabilit\u00e9 TLS exploit\u00e9e pour conto...","description":"L\u2019\u00e9quipe Application and Threat Intelligence (ATI) de Keysight Technologies a r\u00e9v\u00e9l\u00e9 une faille in\u00e9dite dans le protocole TLS (Transport Layer...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/484397\/","og_locale":"fr_FR","og_type":"article","og_title":"Keysight d\u00e9voile une vuln\u00e9rabilit\u00e9 TLS exploit\u00e9e pour contourner les d\u00e9fenses r\u00e9seau","og_description":"L\u2019\u00e9quipe Application and Threat Intelligence (ATI) de Keysight Technologies a r\u00e9v\u00e9l\u00e9 une faille in\u00e9dite dans le protocole TLS (Transport Layer Security), permettant la cr\u00e9ation de canaux de communication cach\u00e9s capables d\u2019\u00e9chapper aux syst\u00e8mes de s\u00e9curit\u00e9 traditionnels","og_url":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/484397\/","og_site_name":"EENewsEurope","article_published_time":"2025-08-22T07:00:31+00:00","article_modified_time":"2025-08-09T16:04:33+00:00","og_image":[{"width":520,"height":200,"url":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2025\/08\/ECI5113-Keysight-devoile-des-canaux-TLS-caches-capables-deviter-les-defenses-reseaux.png","type":"image\/png"}],"author":"NicolasFeste","twitter_card":"summary_large_image","twitter_misc":{"Written by":"NicolasFeste","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ecinews.fr\/fr\/keysight-devoile-une-vulnerabilite-tls-exploitee-pour-contourner-les-defenses-reseau\/#article","isPartOf":{"@id":"https:\/\/www.ecinews.fr\/fr\/keysight-devoile-une-vulnerabilite-tls-exploitee-pour-contourner-les-defenses-reseau\/"},"author":{"name":"NicolasFeste","@id":"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/c7104a72b466a801f257e51481de0c43"},"headline":"Keysight d\u00e9voile une vuln\u00e9rabilit\u00e9 TLS exploit\u00e9e pour contourner les d\u00e9fenses r\u00e9seau","datePublished":"2025-08-22T07:00:31+00:00","dateModified":"2025-08-09T16:04:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ecinews.fr\/fr\/keysight-devoile-une-vulnerabilite-tls-exploitee-pour-contourner-les-defenses-reseau\/"},"wordCount":304,"publisher":{"@id":"https:\/\/www.ecinews.fr\/fr\/#organization"},"keywords":["s\u00e9curit\u00e9","TLS","vuln\u00e9rabilit\u00e9s"],"articleSection":["Actualit\u00e9 g\u00e9n\u00e9rale"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.ecinews.fr\/fr\/keysight-devoile-une-vulnerabilite-tls-exploitee-pour-contourner-les-defenses-reseau\/","url":"https:\/\/www.ecinews.fr\/fr\/keysight-devoile-une-vulnerabilite-tls-exploitee-pour-contourner-les-defenses-reseau\/","name":"Keysight d\u00e9voile une vuln\u00e9rabilit\u00e9 TLS exploit\u00e9e pour contourner les d\u00e9fenses r\u00e9seau -","isPartOf":{"@id":"https:\/\/www.ecinews.fr\/fr\/#website"},"datePublished":"2025-08-22T07:00:31+00:00","dateModified":"2025-08-09T16:04:33+00:00","description":"L\u2019\u00e9quipe Application and Threat Intelligence (ATI) de Keysight Technologies a r\u00e9v\u00e9l\u00e9 une faille in\u00e9dite dans le protocole TLS (Transport Layer Security), permettant la cr\u00e9ation de canaux de communication cach\u00e9s capables d\u2019\u00e9chapper aux syst\u00e8mes de s\u00e9curit\u00e9 traditionnels","breadcrumb":{"@id":"https:\/\/www.ecinews.fr\/fr\/keysight-devoile-une-vulnerabilite-tls-exploitee-pour-contourner-les-defenses-reseau\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ecinews.fr\/fr\/keysight-devoile-une-vulnerabilite-tls-exploitee-pour-contourner-les-defenses-reseau\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ecinews.fr\/fr\/keysight-devoile-une-vulnerabilite-tls-exploitee-pour-contourner-les-defenses-reseau\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ecinews.fr\/fr\/"},{"@type":"ListItem","position":2,"name":"Keysight d\u00e9voile une vuln\u00e9rabilit\u00e9 TLS exploit\u00e9e pour contourner les d\u00e9fenses r\u00e9seau"}]},{"@type":"WebSite","@id":"https:\/\/www.ecinews.fr\/fr\/#website","url":"https:\/\/www.ecinews.fr\/fr\/","name":"EENewsEurope","description":"Just another WordPress site","publisher":{"@id":"https:\/\/www.ecinews.fr\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ecinews.fr\/fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.ecinews.fr\/fr\/#organization","name":"EENewsEurope","url":"https:\/\/www.ecinews.fr\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.ecinews.fr\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","contentUrl":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","width":283,"height":113,"caption":"EENewsEurope"},"image":{"@id":"https:\/\/www.ecinews.fr\/fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/c7104a72b466a801f257e51481de0c43","name":"NicolasFeste","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/image\/1ea421e7d03c1e96a9ea2bcf2705734a","url":"https:\/\/secure.gravatar.com\/avatar\/2e187f4d96902933ba445ed6c760e11c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2e187f4d96902933ba445ed6c760e11c?s=96&d=mm&r=g","caption":"NicolasFeste"}}]}},"authors":[{"term_id":6113,"user_id":39,"is_guest":0,"slug":"nicolasfeste","display_name":"NicolasFeste","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/2e187f4d96902933ba445ed6c760e11c?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/484397"}],"collection":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/comments?post=484397"}],"version-history":[{"count":0,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/484397\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media\/484402"}],"wp:attachment":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media?parent=484397"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/categories?post=484397"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/tags?post=484397"},{"taxonomy":"domains","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/domains?post=484397"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/ppma_author?post=484397"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}