Fortinet³ÎÇåCVE-2025-24472·ÇÁãÈÕ·ì϶£¬½öCVE-2024-55591±»ÀûÓÃ
°ä²¼¹¦·ò 2025-02-131. Fortinet³ÎÇåCVE-2025-24472·ÇÁãÈÕ·ì϶£¬½öCVE-2024-55591±»ÀûÓÃ
2ÔÂ11ÈÕ£¬Fortinet½üÈÕÖÒ¸æ³Æ£¬¹¥»÷ÕßÔÚÀûÓÃFortiOSºÍFortiProxyÖеķì϶À´½Ù³Ö·À»ðǽ²¢ÇÖÈëÆóÒµÍøÂç¡£µ«ËæºóFortinet֪ͨ£¬ÐÂÅû¶µÄCVE-2025-24472·ì϶²¢·ÇÁãÈÕ·ì϶£¬ÇÒÒÑÔÚÒ»Ô·ݽ¨¸´¡£Í¬Ê±È·ÈÏ£¬Ö»ÓÐCVE-2024-55591·ì϶±»ÏÖʵÀûÓá£Èô¿Í»§ÒÑÆ¾¾ÝÏÈǰÁìµ¼Éý¼¶£¬ÔòÒÑÊܱ£»¤¡£CVE-2025-24472·ì϶ÔÊÐíÔ¶³Ì¹¥»÷Õßͨ¹ý¶ñÒâCSF´úÀíÒªÇó»ñµÃ³¬µÈÖÎÀíԱȨÏÞ£¬Ó°ÏìFortiOS 7.0.0ÖÁ7.0.16¼°FortiProxy²¿ÃŰ汾£¬ÒÑÔÚ¸üа汾Öн¨¸´¡£¹¥»÷Õß»¹ÀûÓÃCVE-2024-55591·ì϶ÔÚÉ豸ÉÏ´´½¨Ëæ»úÖÎÀíÔ¹ØË»§£¬Åú¸ÄÅäÖ㬲¢Í¨¹ý¶ñÒâÕÊ»§½Ó¼ûSSLVPN¡£ÍøÂ簲ȫ¹«Ë¾Arctic Wolf»ã±¨ÁËÓйع¥»÷»î¶¯£¬Ô̺¬·ì϶ɨÃè¡¢¿úËÅ¡¢SSL VPNÅäÖü°ºáÏòÒÆ¶¯µÈ½×¶Î£¬²¢½¨Òé½ûÓù«¹²½Ó¿ÚÉϵķÀ»ðǽÖÎÀí½Ó¼û¡£Fortinet½¨ÒéÎÞ·¨µ±¼´¸üеÄÖÎÀíÔ±½ûÓÃHTTP/HTTPSÖÎÀí½çÃæ»òÏ޶ȽӼûIPµØÖ·×÷Ϊһʱ½â¾ö²½Öè¡£
https://www.bleepingcomputer.com/news/security/fortinet-discloses-second-firewall-auth-bypass-patched-in-january/
2. ÀûÓþɰæ ThinkPHP ºÍ ownCloud ·ì϶µÄ¹¥»÷¼¤Ôö
2ÔÂ12ÈÕ£¬½üÆÚºÚ¿Í»î¶¯³öÏÖÔö³¤Ç÷Ïò£¬ËûÃÇÖØÒªÕë¶ÔÒ×ÊÜ2022ÄêºÍ2023Äê¾É°²È«ÎÊÌâÓ°ÏìµÄ¡¢ÊØ»¤²»ÉƵÄÉ豸ÌáÒé¹¥»÷¡£¾ÝÍþв¼à¿ØÆ½Ì¨GreyNoise»ã±¨£¬ÀûÓÃCVE-2022-47945ºÍCVE-2023-49103·ì϶µÄ¹¥»÷ÐÐΪÕßÊýÁ¿¼¤Ôö¡£CVE-2022-47945Éæ¼°ThinkPHP¿ò¼ÜµÄ±¾µØÎļþÔ̺¬£¨LFI£©ÎÊÌ⣬ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÖ´ÐÐËÁÒâ²Ù×÷ϵͳºÅÁ¶øCVE-2023-49103ÔòÓ°Ï쿪ԴÎļþ¹²ÏíÈí¼þownCloud£¬ºÚ¿Í¿Éͨ¹ý¸Ã·ì϶ÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£Ö»¹ÜÕâЩ·ì϶µÄ·ì϶Ԥ²âÆÀ·Öϵͳ£¨EPSS£©ÆÀ·Ö½ÏµÍ£¬ÇÒδȫÊýÁÐÈëCISAµÄÒÑÖªÀûÓ÷ì϶£¨KEV£©Ä¿Â¼£¬µ«GreyNoiseÒѹ۲쵽´óÁ¿Î¨Ò»IPÊÔIJÀûÓÃÕâЩ·ì϶£¬ÇһÓÐËùÔö³¤¡£Îª±£»¤ÏµÍ³£¬½¨ÒéÓû§Éý¼¶µ½ThinkPHP 6.0.14»ò¸ü¸ß°æ±¾£¬½«ownCloud GraphAPIÉý¼¶µ½0.3.1¼°¸üа汾£¬²¢½«Ç±ÔÚÒ×Êܹ¥»÷µÄÊ·ýÍÑ»ú»òÖÃÓÚ·À»ðǽºóÃæ¡£
https://www.bleepingcomputer.com/news/security/surge-in-attacks-exploiting-old-thinkphp-and-owncloud-flaws/
3. KimsukyѡȡClickFixÕ½ÊõÌáÒéÐÂÐÍÍøÂç¹¥»÷
2ÔÂ12ÈÕ£¬³¯Ïʹú¶ÈÑÝÔ±¡°Kimsuky¡±½üÆÚѡȡÁËÒ»ÖÖÊÜClickFix»î¶¯Æô·¢µÄÐÂÕ½Êõ½øÐÐÍøÂç¹¥»÷¡£ClickFixÊÇÒ»ÖÖÉç»á¹¤³ÌÕ½Êõ£¬Í¨¹ýºýŪÐÔÃýÎóÐÂÎÅ»òÌáÐÑÓÕµ¼Êܺ¦ÕßÖ´ÐжñÒâ´úÂ룬³£ÓÃÓÚ´«²¼ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£Kimsuky¼Ù×°³Éº«¹úµ±¾Ö¹ÙÔ±£¬ÓëÖ¸±ê³ÉÁ¢ÐÅÀµºó£¬·¢ËÍ´øÓÐPDF¸½¼þµÄÓã²æÊ½ÍøÂç´¹µöµç×ÓÓʼþ¡£È»¶ø£¬ÕâЩPDFÎĵµÏÖʵÉÏÊèµ¼Êܺ¦Õß½Ó¼ûÐéÈç¹û±¸×¢²áÁ´½Ó£¬ÒªÇóËûÃÇÒÔÖÎÀíÔ±Éí·ÝÔËÐÐPowerShell²¢Õ³Ìù¹¥»÷ÕßÌṩµÄ´úÂë¡£Ò»µ©Ö´ÐУ¬¸Ã´úÂë»á×°ÖÃÔ¶³Ì×ÀÃæ¹¤¾ß£¬ÏÂÔØÖ¤Ê飬²¢½«Êܺ¦ÕßÉ豸ע²áµ½Ô¶³Ì·þÎñÆ÷£¬Ê¹¹¥»÷Õß¿ÉÄÜÖ±½Ó½Ó¼û²¢ÇÔÈ¡Êý¾Ý¡£Î¢Èí×Ô2025Äê1ÔÂÆðÔÚÓÐÏÞÁìÓòµÄ¹¥»÷Öй۲쵽ÕâÖÖÕ½Êõ£¬Ö¸±êÉæ¼°¹ú¼ÊÊÂÎñ×éÖ¯¡¢·Çµ±¾Ö×éÖ¯¡¢µ±¾Ö»ú¹¹ºÍýÌ幫˾µÄÓ×ÎÒ¡£Î¢ÈíÒÑ֪ͨÊÜÓ°Ïì¿Í»§£¬²¢ÖÒ¸æÆäËûÈ˰ÑÎÈÕâÒ»ÐÂÕ½Êõ£¬ÉóÉ÷¶Ô´ýËùÓÐδ¾ÒªÇóµÄͨѶ¡£Óû§Ó¦³ö¸ñÓ×ÐÄÔÚÏ߸´Ôì²¢Ö´ÐдúÂëµÄÒªÇó£¬ÓÈÆäÊÇÔÚÒÔÖÎÀíԱȨÏÞÖ´ÐÐʱ¡£
https://www.bleepingcomputer.com/news/security/dprk-hackers-dupe-targets-into-typing-powershell-commands-as-admin/
4. ¶íÂÞ˹ºÚ¿Í×éÖ¯APT44·ÖÖ§¡°±´¿Ç±©Ñ©¡±È«Çò¹¥»÷»î¶¯½ÒÃØ
2ÔÂ12ÈÕ£¬¶íÂÞ˹µ±¾ÖÖ§³ÖµÄºÚ¿Í×éÖ¯APT44µÄÒ»¸ö·ÖÖ§£¬±»³ÆÎª¡°±´¿Ç±©Ñ©¡±»ò¡°É³³æ¡±£¬×Ô2021ÄêÒÔÀ´Ò»Ïò»îÔ¾ÓÚÕë¶Ô³ÁÒª×éÖ¯ºÍµ±¾ÖµÄÍøÂç¹¥»÷ÖУ¬³ö¸ñÊÇÔÚÄÜÔ´¡¢Ê¯ÓͺÍÌìÈ»Æø¡¢µçÐÅ¡¢º½Ô˺ͱøÆ÷Ôì×÷ÁìÓò¡£¸Ã×éÖ¯ÖÂÁ¦ÓÚ»ñȡָ±êϵͳµÄ³õʼ½Ó¼ûȨÏÞ£¬²¢³ÉÁ¢ÓƾÃÐÔÒÔά³Ö´æÔÚ£¬ÒÔ±ãÆäËûAPT44×Ó×éÊÕÊÜ¡£Î¢ÈíÍþвµý±¨ÍŶӹ۲쵽£¬¸Ã×éÖ¯Õë¶ÔÎÚ¿ËÀ¼¡¢Å·ÖÞ¡¢ÖÐÑÇ¡¢ÄÏÑǺÍÖж«µØÓòµÄ¹Ø¼üÁìÓò·¢Õ¹»úÓöÐÔÐж¯£¬³ö¸ñÊÇÔÚ¶íÂÞ˹ÈëÇÖÎÚ¿ËÀ¼ºó£¬¼ÓÇ¿Á˶ÔÎÚ¿ËÀ¼¹Ø¼ü»ù´¡ÉèÊ©µÄ¹¥»÷¡£´Ë±í£¬¸Ã×éÖ¯»¹ÀûÓöàÖÖ¼¼Êõ·ÛËéÍøÂ磬Ô̺¬ÀûÓÃnÈÕ·ì϶¡¢Æ¾Ö¤ÍµÇԺ͹©¸øÁ´¹¥»÷µÈ¡£ÔÚ»ñÈ¡½Ó¼ûȨÏ޺󣬺ڿÍͨ¹ý²¿Êð×Ô½ç˵Web shell³ÉÁ¢ÓƾÃÐÔ£¬²¢Ê¹ÓúϷ¨µÄITÔ¶³ÌÖÎÀí¹¤¾ßÖ´ÐкÅÁͬʱ¼ÙÒâITÖÎÀíÔ±ÒÔÌӱܼì²â¡£¶ÔÓÚ³õʼ½Ó¼ûºóµÄ»î¶¯£¬ÍþвÐÐΪÕßÇÔȡʹ´¦¡¢Ð¹Â¶Êý¾Ý£¬²¢Í¨¹ýTorÍøÂç°µ²ØÏνӡ£×îºó£¬¸Ã×éÖ¯½øÐкáÏòÒÆ¶¯£¬Åú¸Ä»ù´¡ÉèÊ©ÒÔÂú×ãÆäÔËÓªÐèÒª¡£Î¢Èí°µÊ¾£¬¸Ã¶íÂÞ˹ºÚ¿ÍÓ××éµÄÓ°ÏìÁ¦¿¿½üÈ«Çò£¬²¢·ÖÏíÁËá÷ÁÔ²éÎÊ¡¢¹¥»÷Ö¸±êºÍYARA¹æ¶¨£¬ÒÔÔ®ÊÖ·ÀÓùÕßʵʱ²¶»ñ²¢×èÖ¹¸ÃÍþвÐÐΪÕߵĻ¡£
https://www.bleepingcomputer.com/news/security/badpilot-network-hacking-campaign-fuels-russian-sandworm-attacks/
5. HipshipperÊý°ÙÍòÔËÊä±êÇ©ÆØ¹â£¬Ó×ÎÒÐÅÏ¢°²È«´¹Î£
2ÔÂ11ÈÕ£¬HipshipperÊÇΪeBay¡¢ShopifyºÍÑÇÂíÑ·Âô¼ÒÌṩ¹ú¼ÊÔËÊä·þÎñµÄƽ̨£¬½üÆÚÔâ·êÁËһ·ÑϳÁµÄÊý¾Ýй¶ÊÂÎñ¡£ÔÚ2024Äê12ÔÂÕâ¸ö¹ú¼ÊÔËÊä¶¥·åÔ£¬Cybernews×êÑÐÍŶӷ¢ÏÖHipshipperµÄÒ»¸öδÊܱ£»¤µÄAWS´æ´¢Í°Â¶³öÁ˳¬¹ý1430Íò±Ê¼Í¼£¬ÖØÒªÔ̺¬ÔËÊä±êÇ©ºÍº£¹ØÉ걨±í£¬Ð¹Â¶ÁËÂò¼ÒµÄÈ«Ãû¡¢¼Òͥסַ¡¢µç»°ºÅÂë¼°¶©µ¥ÏêÇéµÈÓ×ÎÒ¾ßÌåÐÅÏ¢¡£ÕâЩй¶µÄÊý¾Ý¿ÉÄܱ»ÍøÂç·¸×ï·Ö×ÓÓÃÓڲ߶¯¸ß¼¶Ú¿Æ¡¢ÍøÂç´¹µö¹¥»÷»òÓÐÕë¶ÔÐԵĶñÒâÈí¼þ¹¥»÷£¬Ôö³¤ÁËÊܺ¦ÕßÔâ·êڲơ¢É§ÈÅ¡¢ÍµÇԺ;¼ÃËðʧµÄ·çÏÕ¡£ÐÒÔ˵ÄÊÇ£¬ÔÚCybernewsÁªÏµHipshipperºó£¬¸Ã¹«Ë¾ÊµÊ±¹Ø¹ØÁ˶³öµÄ´æ´¢Í°£¬Ô¤·ÀÁËÊý¾ÝµÄ½øÒ»²½Ð¹Â¶¡£ÎªÁËÔ¤·ÀÀàËÆÊÂÎñÔٴβúÉú£¬×êÑÐÈËÔ±½¨ÒéÆóÒµ¼ÓÇ¿½Ó¼û½ÚÔì¡¢¼à¿Ø½Ó¼ûÈÕÖ¾¡¢ÆôÓ÷þÎñÆ÷¶Ë¼ÓÃÜ¡¢Ö´ÐÐSSL/TLS°²È«Í¨Ñ¶£¬²¢Ë¼¿¼¶¨ÆÚÉ󼯡¢×Ô¶¯°²È«²é³ºÍÔ±¹¤ÅàѵµÈ°²È«×î¼Ñʵ¼Ê¡£Õâ´ÎÊý¾Ýй¶µÄ·¢ÏÖÈÕÆÚΪ2024Äê12ÔÂ2ÈÕ£¬³õ´ÎÅû¶ÓÚ2024Äê12ÔÂ9ÈÕ£¬²¢ÓÚ2025Äê1ÔÂ8ÈÕʵÏÖй¶¡£
https://cybernews.com/security/hipshipper-data-leak-exposed-shipping-records/
6. CISA½«WindowsºÍZyxelÉ豸·ì϶Ôö³¤µ½ÒÑÖª±»ÀûÓ÷ì϶Ŀ¼
2ÔÂ12ÈÕ£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©½üÆÚ¸üÐÂÁËÆäÒÑÖª±»ÀûÓ÷ì϶£¨KEV£©Ä¿Â¼£¬ÐÂÔöÁËÉæ¼°WindowsºÍZyxelÉ豸µÄ¶à¸ö·ì϶¡£ÆäÖÐÔ̺¬Zyxel DSL CPE OSµÄºÅÁî×¢Èë·ì϶CVE-2024-40891ºÍCVE-2024-40890£¬ÒÔ¼°Microsoft WindowsµÄÁ½¸ö·ì϶£º¸¨ÖúÖ°ÄÜÇý¶¯·¨Ê½µÄWinSock»ùÓڶѵĻº³åÇøÒç¶Âí½ÅCVE-2025-21418ºÍ´æ´¢Á´½Ó¸ú×Ù·ì϶CVE-2025-21391¡£CVE-2024-40891ºÍCVE-2024-40890ÔÊÐí¹¥»÷ÕßÔÚδ¾ÑéÖ¤µÄÇé¿öÏÂÖ´ÐÐËÁÒâºÅÁ¿ÉÄܵ¼ÖÂÉ豸ÊÕÊܵÈÑϳÁºó¹û£¬ÇÒCVE-2024-40891Òѱ»¹Û²ìµ½Êýǧ´Î¹¥»÷³¢ÊÔ¡£¶øWindowsµÄÁ½¸ö·ì϶Ҳ±»»ý¼«ÀûÓã¬CVE-2025-21391ÔÊÐí¹¥»÷Õßɾ³ýÎļþ²¢¿ÉÄܽáºÏ´úÂëÖ´ÐÐÊÕÊÜϵͳ£¬CVE-2025-21418ÔòÔÊÐí¾¹ýÉí·ÝÑéÖ¤µÄÓû§»ñÈ¡ÏµÍ³ÌØÈ¨¡£Î¢ÈíÒÑÔÚ2025Äê2Եݲȫ¸üÐÂÖн¨¸´ÁËÕâÁ½¸öWindows·ì϶£¬µ«ZyxelÉ豸µÄ·ì϶ÉÐδµÃµ½¹©¸øÉ̽¨¸´ºÍ¹«¿ªÅû¶¡£
https://securityaffairs.com/174135/security/u-s-cisa-adds-microsoft-windows-zyxel-device-flaws-known-exploited-vulnerabilities-catalog.htm


¾©¹«Íø°²±¸11010802024551ºÅ