CISAÖÒ¸æBroadcom VMware vCenter·ì϶ÔâÀûÓÃ

°ä²¼¹¦·ò 2026-01-27

1. CISAÖÒ¸æBroadcom VMware vCenter·ì϶ÔâÀûÓÃ


1ÔÂ24ÈÕ£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©½üÈÕ½«Broadcom VMware vCenter ServerµÄÑϳÁ·ì϶CVE-2024-37079£¨CVSSÆÀ·Ö9.8£©ÄÉÈëÒÑÖªÀûÓ÷ì϶£¨KEV£©Ä¿Â¼¡£¸Ã·ì϶ԴÓÚvCenter Server¶ÔDCERPCºÍ̸ʵÏֵĶÑÒç³öȱµã£¬¹¥»÷Õßͨ¹ýÍøÂç½Ó¼û¼´¿É·¢ËÍÌØÔìÊý¾Ý°ü´¥·¢·ì϶£¬ÊµÏÖÔ¶³Ì´úÂëÖ´ÐлòȨÏÞÌáÉý¡£vCenter ServerÊÇVMware¿ª·¢µÄÐé¹¹»¯»·¾³¼¯ÖÐÖÎÀíÆ½Ì¨¡£2024Äê6Ô£¬VMware½¨¸´ÁËCVE-2024-37079¼°¹ØÁª·ì϶CVE-2024-37080£¬¶þÕß¾ù±»ÆÀ¹ÀΪ¡°ÑϳÁ¡±¼¶±ð¡£²©Í¨¹«Ë¾ËæºóÈ·ÈÏ£¬CVE-2024-37079ÒÑÔâÏÖʵÀûÓ㬵«¾ßÌå¹¥»÷ϸ½ÚÉÐδ¹«¿ª¡£ÔÚ2025ÄêÑÇÖÞºÚñ´ó»áÉÏ£¬×êÑÐÈËÔ±Åû¶CVE-2024-37079ʵΪËĸöDCE/RPC·ì϶Á´µÄÒ»²¿ÃÅ£¬Ô̺¬Èý¸ö¶ÑÒç¶Âí½ÅºÍÒ»¸öȨÏÞÌáÉý·ì϶¡£ÆäÖÐÁ½¸öÓйطì϶ÒÑÓÚ2024Äê9Ô½¨¸´£¬¶øÌض¨¶ÑÒç¶Âí½Å¿ÉÓëCVE-2024-38813½áºÏ£¬ÔÚESXiÖ÷»úÉÏ»ñȡԶ³ÌrootȨÏÞ¡£×êÑÐÈËԱǿµ÷£¬Í¨¹ý×éºÏÀûÓÃÕâЩ·ì϶£¬ËûÃdzɹ¦ÔÚ2024ÄêMatrix Cup·ì϶ÌôÕ½ÈüÖÐʵÏÖδ¾­ÊÚȨµÄÔ¶³Ìroot½Ó¼û¡£


https://securityaffairs.com/187267/security/u-s-cisa-adds-a-flaw-in-broadcom-vmware-vcenter-server-to-its-known-exploited-vulnerabilities-catalog.html


2. 11Äê佨¸´µÄGNU Telnetd¸ßΣ·ì϶ÔâЭͬ¹¥»÷


1ÔÂ23ÈÕ£¬½üÈÕ£¬Ò»¸ö´æÔÚ³¤´ï11ÄêµÄGNU InetUtils telnetd·þÎñÆ÷ÑϳÁ·ì϶£¨CVE-2026-24061£©±»ÆØÔâЭͬ¹¥»÷¡£¸Ã·ì϶ԴÓÚtelnetdδËãÕÊÓû§½ÚÔìµÄUSER»·¾³±äÁ¿£¬¹¥»÷Õß¿ÉÉèÖÃUSER=-f root²¢Í¨¹ýtelnet -aºÅÁîÏνÓ£¬Ö±½ÓÈÆ¹ýÉí·ÝÑéÖ¤»ñÈ¡rootȨÏÞ¡£·ì϶ӰÏì2015Äê°ä²¼µÄ1.9.3ÖÁ2.7°æ±¾£¬2.8°æ±¾Òѽ¨¸´£¬ÎÞ·¨Éý¼¶µÄÓû§¿Éͨ¹ý½ûÓ÷þÎñ»ò¹Ø±ÕTCP 23¶Ë¿Ú»º½â¡£GNU InetUtilsÊÇGNUÏîÄ¿ÊØ»¤µÄ¾­µäÍøÂ繤¾ß¼¯£¬Ô̺¬telnet/ftpµÈ¿Í»§¶ËºÍ·þÎñÆ÷£¬¿í·ºÀûÓÃÓÚLinux¿¯Ðаæ¡£Ö»¹ÜTelnetÒò°²È«ÐԲSSHÈ¡´ú£¬µ«ÔÚ¹¤ÒµÎïÁªÍø¡¢ÉãÏñÍ·¡¢´«¸ÐÆ÷¼°OTÍøÂçÖÐÈÔÆÕ±é´æÔÚ£¬ÕâЩÉ豸³£Òò¼æÈÝÐÔ»òÉý¼¶Ðè³ÁÆô¶ø³Ö¾ÃÔËÐоɰæÏµÍ³¡£Zerotak¹«Ë¾Ö¸³ö£¬OT/ICS»·¾³Öйؼüϵͳ´úÌæÄÑÌ⣬ÒÅÁôÉ豸µ¼ÖÂTelnetÄÑÒÔÆëÈ«²Ã¼õ¡£Íþв¼à¿Ø¹«Ë¾GreyNoise¼ì²âµ½Õë¶Ô¸Ã·ì϶µÄ¹¥»÷»î¶¯£º1ÔÂ21-22ÈÕ£¬18¸ö¹¥»÷IPͨ¹ý60´ÎTelnet»á»°ÌáÒé100%¶ñÒâ¹¥»÷£¬·¢ËÍ1525¸öÊý¾Ý°ü£¨×ܼÆ101.6KB£©¡£¹¥»÷ÀûÓÃTelnet IACÑ¡ÏîЭÉÌ»úÔì×¢Èë"USER=-f "²ÎÊý£¬83.3%µÄÖ¸±êÊÇrootÓû§¡£


https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-telnetd-auth-bypass-flaw-to-get-root/


3. StanleyÐÂÐÍMaaSͨ¹ýChromeÉ̵ê·Ö·¢´¹µöÀ©´ó


1ÔÂ26ÈÕ£¬Ò»ÖÖÃûΪ"Stanley"µÄÐÂÐͶñÒâÈí¼þ¼´·þÎñ£¨MaaS£©½üÈÕÒý·¢°²È«½ç¹Ø×¢£¬¸Ã·þÎñͨ¹ýChromeÍøÉÏÀûÓÃÉ̵ê·Ö·¢¶ñÒâÀ©´ó·¨Ê½Ö´ÐÐÍøÂç´¹µö¹¥»÷¡£¾Ý¶Ëµ½¶ËÊý¾Ý°²È«¹«Ë¾Varonis×êÑУ¬StanleyÓÉ»¯ÃûÒ»ÑùµÄÂô¼Ò¿ª·¢£¬ÆäÖ÷ÌâÖ°ÄÜÊÇÔÚÓû§ä¯ÀÀÆ÷Öи²¸ÇÈ«ÆÁiframeÏÔʾ´¹µöÄÚÈÝ£¬Í¬Ê±Î¬³ÖµØÖ·À¸ÏÔʾºÏ·¨ÓòÃûÒÔ¼ÓÇ¿ºýŪÐÔ¡£¸ÃMaaS·þÎñÖ§³ÖChrome¡¢EdgeºÍBraveä¯ÀÀÆ÷¾²Ä¬×Ô¶¯×°Ö㬲¢Ìṩ¶¨Ô컯ְÄÜ¡£Æä¶©ÔÄģʽÔ̺¬¶à¸ö²ã¼¶£¬µÚÒ»Á÷µÄ"LuxeÌײÍ"½¨ÉèWeb½ÚÔìÃæ°å£¬Ö§³Ö½«¶ñÒâÀ©´óÖ±½Ó°ä²¼ÖÁChromeÀûÓÃÉ̵ê¡£StanleyµÄ¹¥»÷»úÔìͨ¹ýÀ¹½ØÒ³Ãæµ¼º½²¢ÓÃiframe¸²¸ÇÍøÒ³ÊµÏÖ£¬²Ù×÷ÈËÔ±¿Éͨ¹ý½ÚÔìÃæ°åʵʱÆôÓÃ/½ûÓýٳֹ涨£¬ÉõÖÁÖ±½ÓÏòÊܺ¦Õßä¯ÀÀÆ÷ÍÆËÍ֪ͨÓÕµ¼½Ó¼ûÌØ¶¨Ò³Ãæ¡£¼¼Êõ²ãÃæ£¬Stanleyÿ10ÃëÖ´ÐÐC2ÂÖѯ²¢Ö§³Ö±¸·ÝÓòÂÖ»»ÒÔ¼ÓÇ¿¿¹¹Ø±ÕÄÜÁ¦¡£Æä´úÂë´æÔÚ¶íÓï×¢½â¡¢¿Õcatch¿éºÍ²»¹æ·¼ûýÎó´¦ÖõÈÎÊÌ⣬±»ÆÀ¼ÛΪ"¼¼Êõ´Ö²Ú"¡£µ«ÕæÕýʹÆäÍÑÓ±¶ø³öµÄÊÇÆä¹ÖÒìµÄ·Ö·¢Õ½Êõ£¬ÀûÓÃChromeÀûÓÃÉ̵ê×÷Ϊ¿ÉÐÅÆ½Ì¨ÈƹýͨÀýÉóºËÁ÷³Ì¡£


https://www.bleepingcomputer.com/news/security/new-malware-service-guarantees-phishing-extensions-on-chrome-web-store/


4. αÔìCAPTCHAÓëApp-V¾ç±¾´«²¼AmateraÇÔÃÜ·¨Ê½


1ÔÂ26ÈÕ£¬Ò»Ïî½áºÏClickFix²½Ö衢αÔìCAPTCHA¼°ÒÑÊðÃûMicrosoft App-V¾ç±¾µÄÐÂÐͶñÒâ¹¥»÷Õý´«²¼AmateraÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¾ÝBlackPoint Cyber×êÑУ¬¹¥»÷ʼÓÚαÔìµÄCAPTCHAÑéÖ¤£¬ÓÕµ¼Êܺ¦Õßͨ¹ýWindowsÔËÐжԻ°¿òÖ´ÐжñÒâºÅÁî¡£ÕâЩºÅÁîÀÄÓúϷ¨µÄSyncAppvPublishingServer.vbs¾ç±¾£¬Í¨¹ýÊÜÐÅÀµµÄwscript.exeÖ´ÐÐPowerShell´úÂ룬ʵÏÖ¶ñÒâ»î¶¯Òñ±Î»¯¡£¸Ã¹¥»÷³õ´ÎÔÚClickFix³¡¾°Öм¯³ÉApp-V¾ç±¾¡£¹¥»÷Á÷³ÌÔ̺¬¶à½×¶ÎÑéÖ¤£º³õʼºÅÁî»á²é³­ÊÇ·ñÊÖ¶¯Ö´ÐÓ×¢Ö´Ðа¤´ÎÊÇ·ñºÏ¹æ¼°¼ôÌù°åÄÚÈÝÊÇ·ñ±»´Û¸Ä£¬ÒÔ¶ã±ÜɳÏä¼ì²â¡£Èô·¢ÏÖ·ÖÎö»·¾³£¬Ö´Ðн«ÎÞÆÚÏÞÔÝÍ£ÒÔ¿÷Ëð×Ô¶¯»¯·ÖÎö×ÊÔ´¡£Âú×ãǰÌáºó£¬¶ñÒâÈí¼þ´ÓGoogleÈÕÀúÎļþÖмìË÷base64±àÂëµÄÅäÖÃÊý¾Ý£¬Í¨¹ýWMI¿ò¼ÜÌìÉú°µ²ØµÄ32λPowerShell¹ý³Ì£¬½«Ç¶Ì×ÓÐÐ§ÔØºÉ½âÃܲ¢¼ÓÔØÖÁÄÚ´æ¡£ºóÐø½×¶ÎѡȡÒþдÊõ£º¼ÓÃܵÄPowerShellÓÐÐ§ÔØºÉǶÈ빫¹²CDNÍйܵÄPNGͼÏñ£¬Í¨¹ýWinINet API¶¯Ì¬ÌáÈ¡£¬¾­LSBÒþдÊõ½âÎö¡¢GZip½âѹºóÄÚ´æÖ´ÐС£×îÖս׶νâÃܲ¢Æô¶¯Ô­Éúshellcode£¬Ó³ÉäÖ´ÐÐAmateraÇÔÃÜ·¨Ê½¡£


https://www.bleepingcomputer.com/news/security/new-clickfix-attacks-abuse-windows-app-v-scripts-to-push-malware/


5. ¶à¶ûÂí¿¨°ÍÃŽûϵͳ·ì϶»òÖÂÔ¶³Ì¿ªÃÅ


1ÔÂ26ÈÕ£¬½üÈÕ£¬¶à¶ûÂí¿¨°Í£¨Dormakaba£©ÎïÀíÃŽûϵͳ±»ÆØ´æÔÚÑϳÁ°²È«·ì϶£¬¿ÉÄÜʹºÚ¿ÍÔ¶³Ì´ò¿ª´óÐÍ»ú¹¹´óÃÅ¡£¸Ã·ì϶ÓÉAtosÆìÏÂEviden¹«Ë¾µÄÍøÂ簲ȫÕ÷ѯ¹«Ë¾SEC Consultר¼Ò·¢ÏÖ£¬Ó°ÏìÁìÓòº­¸ÇDormakabaµÄExosÖÐÑëÖÎÀíÈí¼þ¡¢Ó²¼þ½Ó¼ûÖÎÀíÆ÷¼°Ö§³Ö¼üÅÌ¡¢Ö¸ÎÆ¡¢Ð¾Æ¬¿¨½Ó¼ûµÄ×¢²áµ¥ÔªµÈÖ÷Ìâ²úÆ·¡£×êÑÐÍŶӹ²·¢ÏÖ20Óà¸ö·ì϶ÀàÐÍ£¬Ô̺¬Ó²±àÂëÍ´´¦Óë¼ÓÃÜÃÜÔ¿¡¢ÈõÃÜÂë¡¢Éí·ÝÑé֤ȱʧ¡¢²»°²È«ÃÜÂëÌìÉú¡¢±¾µØÈ¨ÏÞÌáÉý¡¢Êý¾Ýй¶¡¢õè¾¶±éÀú¼°ºÅÁî×¢ÈëµÈ¡£ÕâЩ·ìÏ¶ÖØÒª±»Å·ÖÞ´óÐÍÆóҵʹÓã¬Éæ¼°¹¤Òµ¹«Ë¾¡¢ÄÜÔ´¹©¸øÉÌ¡¢ÎïÁ÷ÆóÒµ¼°»ú³¡ÔËÓªÉ̵ȸ߰²È«ÐèÒª³¡¾°¡£SEC ConsultÖ¸³ö£¬¹¥»÷ÕßÈôÀûÓÃÕâЩ·ì϶£¬¿ÉÖ±½Ó½âËøÃŽû¡¢ÇÔÈ¡½Ó¼ûPINÂ룬»òÔÚÊܿػ·¾³ÖÐÌáÒé½øÒ»²½¹¥»÷¡£Dormakabaй©£¬¿ÉÄÜÊýǧÃû¿Í»§ÊÜÓ°Ï죬ÆäÖв¿ÃŸ߰²È«ÐèÒª¿Í»§·çÏÕÓÈΪ͹Æð¡£DormakabaÔÚ´ÓǰһÄê°ëÄÚ³ÖÐø°ä²¼²¹¶¡¼°¼Ó¹ÌÖ¸ÄÏ£¬²¢ÓëÖØÒª¿Í»§ºÏ×÷½¨¸´ÏµÍ³·ì϶£¬Í¬Ê±°µÊ¾ÉÐδ·¢ÏÖÏÖʵÀûÓð¸Àý¡£


https://www.securityweek.com/access-system-flaws-enabled-hackers-to-unlock-doors-at-major-european-firms/


6. CrunchbaseÔâShinyHunters¹¥»÷Ö³¬200ÍòÌõÊý¾Ýй¶


1ÔÂ26ÈÕ£¬½üÈÕ£¬ÆóÒµÊý¾Ýƽ̨Crunchbase֤ʵ²úÉúÑϳÁÊý¾Ýй¶ÊÂÎñ¡£ÍøÂç·¸×ï×éÖ¯ShinyHuntersÐû³Æ´ÓÆäϵͳÖÐÇÔÈ¡Á˳¬¹ý200ÍòÌõÓ×ÎҼͼ£¬ÒòÀÕË÷δ¹û£¬¸Ã×éÖ¯ÔÚTor°µÍøÍøÕ¾Ð¹Â¶ÁËÔ̺¬402MBÊý¾ÝµÄѹËõÎļþ¡£Crunchbase»ØÓ¦³Æ£¬Õâ´Î°²È«ÊÂÎñδ¶ÔÒµÎñÔËÓªÔì³É×ÌÈÅ£¬Ä¿Ç°·ì϶Òѵõ½½ÚÔ죬ϵͳ°²È«×´Ì¬ÒѸ´Ô­¡£¾ÝCrunchbaseÅû¶£¬ÊÂÎñ²úÉúºó£¬¹«Ë¾µ±¼´ÀñÆ¸ÍøÂ簲ȫר¼ÒЭÖúµ÷²é£¬²¢ÒÑ֪ͨÁª¹ú·¨Âɲ¿ÃÅ¡£×÷ΪÊÂÎñÏìÓ¦Á÷³ÌµÄÒ»²¿ÃÅ£¬CrunchbaseÔÚÉó²éй¶Êý¾ÝµÄ¾ßÌåÄÚÈÝ£¬ÒÔÈ·¶¨ÊÇ·ñ±ØÒªÆ¾¾ÝÓйØË¾·¨ÒªÇóÏòÊÜÓ°ÏìÓû§·¢ËÍÕýʽ֪ͨ¡£¸Ã¹«Ë¾Ç¿µ÷£¬¹¥»÷Õß°ä²¼µÄÎļþÔ̺¬ÆóÒµÍøÂçÖеÄÌØ¶¨ÐÅÏ¢£¬µ«Ö÷ÌâÒµÎñϵͳδÊÜÄÚÈÝÐÔÓ°Ïì¡£ÖµÍ×ÌùÐĵÄÊÇ£¬ShinyHunters×éÖ¯½üÆÚ³ÁÆôÁËÆäTorÊý¾Ýй¶վµã£¬½«CrunchbaseÓëSoundCloud¡¢Betterment¹²Í¬ÁÐÈë"Êý¾Ýй¶Êܺ¦ÕßÃûµ¥"£¬ºóÁ½¼Ò¹«Ë¾´Ëǰ¾ùÒÑ֤ʵÔâ·êÀàËÆ¹¥»÷¡£


https://securityaffairs.com/187340/data-breach/shinyhunters-claims-2-million-crunchbase-records-company-confirms-breach.html