Fortinet³ÎÇåCVE-2025-24472·ÇÁãÈÕ©¶´£¬½öCVE-2024-55591±»ÀûÓÃ
Ðû²¼Ê±¼ä 2025-02-131. Fortinet³ÎÇåCVE-2025-24472·ÇÁãÈÕ©¶´£¬½öCVE-2024-55591±»ÀûÓÃ
2ÔÂ11ÈÕ£¬Fortinet½üÈÕ¾¯¸æ³Æ£¬¹¥»÷ÕßÕýÔÚÀûÓÃFortiOSºÍFortiProxyÖеÄ©¶´À´½Ù³Ö·À»ðǽ²¢ÇÖÈëÆóÒµÍøÂç¡£µ«ËæºóFortinet֪ͨ£¬ÐÂÅû¶µÄCVE-2025-24472©¶´²¢·ÇÁãÈÕ©¶´£¬ÇÒÒÑÔÚÒ»Ô·ÝÐÞ¸´¡£Í¬Ê±È·ÈÏ£¬Ö»ÓÐCVE-2024-55591©¶´±»Êµ¼ÊÀûÓá£Èô¿Í»§ÒÑÆ¾¾ÝÏÈǰָµ¼Éý¼¶£¬ÔòÒÑÊܱ£»¤¡£CVE-2025-24472©¶´ÔÊÐíÔ¶³Ì¹¥»÷Õßͨ¹ý¶ñÒâCSFÊðÀíÇëÇó»ñµÃ³¬¼¶¹ÜÀíԱȨÏÞ£¬Ó°ÏìFortiOS 7.0.0ÖÁ7.0.16¼°FortiProxy²¿ÃŰ汾£¬ÒÑÔÚ¸üа汾ÖÐÐÞ¸´¡£¹¥»÷Õß»¹ÀûÓÃCVE-2024-55591©¶´ÔÚÉ豸ÉÏ´´½¨Ëæ»ú¹ÜÀíÔ±ÕË»§£¬ÐÞ¸ÄÅäÖ㬲¢Í¨¹ý¶ñÒâÕÊ»§·ÃÎÊSSLVPN¡£ÍøÂçÄþ¾²¹«Ë¾Arctic Wolf³ÂËßÁËÏà¹Ø¹¥»÷»î¶¯£¬°üÂÞ©¶´É¨Ãè¡¢Õì²ì¡¢SSL VPNÅäÖü°ºáÏòÒÆ¶¯µÈ½×¶Î£¬²¢½¨Òé½ûÓù«¹²½Ó¿ÚÉϵķÀ»ðǽ¹ÜÀí·ÃÎÊ¡£Fortinet½¨ÒéÎÞ·¨Á¢¼´¸üеĹÜÀíÔ±½ûÓÃHTTP/HTTPS¹ÜÀí½çÃæ»òÏÞÖÆ·ÃÎÊIPµØÖ·×÷ΪÁÙʱ½â¾öÒªÁì¡£
https://www.bleepingcomputer.com/news/security/fortinet-discloses-second-firewall-auth-bypass-patched-in-january/
2. ÀûÓþɰæ ThinkPHP ºÍ ownCloud ©¶´µÄ¹¥»÷¼¤Ôö
2ÔÂ12ÈÕ£¬½üÆÚºÚ¿Í»î¶¯·ºÆðÔö³¤Ç÷ÊÆ£¬ËûÃÇÖ÷ÒªÕë¶ÔÒ×ÊÜ2022ÄêºÍ2023Äê¾ÉÄþ¾²ÎÊÌâÓ°ÏìµÄ¡¢Î¬»¤²»ÉƵÄÉ豸Ìᳫ¹¥»÷¡£¾ÝÍþв¼à¿ØÆ½Ì¨GreyNoise³ÂËߣ¬ÀûÓÃCVE-2022-47945ºÍCVE-2023-49103©¶´µÄ¹¥»÷ÐÐΪÕßÊýÁ¿¼¤Ôö¡£CVE-2022-47945Éæ¼°ThinkPHP¿ò¼ÜµÄµ±µØÎļþ°üÂÞ£¨LFI£©ÎÊÌ⣬ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÖ´ÐÐÈÎÒâ²Ù×÷ϵͳÃüÁ¶øCVE-2023-49103ÔòÓ°Ï쿪ԴÎļþ¹²ÏíÈí¼þownCloud£¬ºÚ¿Í¿Éͨ¹ý¸Ã©¶´ÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£¾¡¹ÜÕâЩ©¶´µÄ©¶´Ô¤²âÆÀ·Öϵͳ£¨EPSS£©ÆÀ·Ö½ÏµÍ£¬ÇÒδȫ²¿ÁÐÈëCISAµÄÒÑÖªÀûÓé¶´£¨KEV£©Ä¿Â¼£¬µ«GreyNoiseÒÑÊӲ쵽´óÁ¿Î¨Ò»IPÊÔͼÀûÓÃÕâЩ©¶´£¬ÇһÓÐËùÔö¼Ó¡£Îª±£»¤ÏµÍ³£¬½¨ÒéÓû§Éý¼¶µ½ThinkPHP 6.0.14»ò¸ü¸ß°æ±¾£¬½«ownCloud GraphAPIÉý¼¶µ½0.3.1¼°¸üа汾£¬²¢½«Ç±ÔÚÒ×Êܹ¥»÷µÄʵÀýÍÑ»ú»òÖÃÓÚ·À»ðǽºóÃæ¡£
https://www.bleepingcomputer.com/news/security/surge-in-attacks-exploiting-old-thinkphp-and-owncloud-flaws/
3. Kimsuky½ÓÄÉClickFix¼ÆÄ±ÌᳫÐÂÐÍÍøÂç¹¥»÷
2ÔÂ12ÈÕ£¬³¯Ïʹú¼ÒÑÝÔ±¡°Kimsuky¡±½üÆÚ½ÓÄÉÁËÒ»ÖÖÊÜClickFix»î¶¯Æô·¢µÄмÆÄ±½øÐÐÍøÂç¹¥»÷¡£ClickFixÊÇÒ»ÖÖÉç»á¹¤³Ì¼ÆÄ±£¬Í¨¹ýÆÛÆÐÔ´íÎóÏûÏ¢»òÌáʾÓÕµ¼Êܺ¦ÕßÖ´ÐжñÒâ´úÂ룬³£ÓÃÓÚÁ÷´«ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£Kimsukyαװ³Éº«¹úÕþ¸®¹ÙÔ±£¬ÓëÄ¿±ê½¨Á¢ÐÅÈκ󣬷¢ËÍ´øÓÐPDF¸½¼þµÄÓã²æÊ½ÍøÂçµöÓãµç×ÓÓʼþ¡£È»¶ø£¬ÕâЩPDFÎĵµÊµ¼ÊÉÏÒýµ¼Êܺ¦Õß·ÃÎÊÐé¼ÙÉ豸ע²áÁ´½Ó£¬ÒªÇóËûÃÇÒÔ¹ÜÀíÔ±Éí·ÝÔËÐÐPowerShell²¢Õ³Ìù¹¥»÷ÕßÌṩµÄ´úÂë¡£Ò»µ©Ö´ÐУ¬¸Ã´úÂë»á°²×°Ô¶³Ì×ÀÃæ¹¤¾ß£¬ÏÂÔØÖ¤Ê飬²¢½«Êܺ¦ÕßÉ豸ע²áµ½Ô¶³Ì·þÎñÆ÷£¬Ê¹¹¥»÷ÕßÄܹ»Ö±½Ó·ÃÎʲ¢ÇÔÈ¡Êý¾Ý¡£Î¢Èí×Ô2025Äê1ÔÂÆðÔÚÓÐÏÞ·¶Î§µÄ¹¥»÷ÖÐÊӲ쵽ÕâÖÖ¼ÆÄ±£¬Ä¿±êÉæ¼°¹ú¼ÊÊÂÎñ×éÖ¯¡¢·ÇÕþ¸®×éÖ¯¡¢Õþ¸®»ú¹¹ºÍýÌ幫˾µÄ¸öÈË¡£Î¢ÈíÒÑ֪ͨÊÜÓ°Ïì¿Í»§£¬²¢¾¯¸æÆäËûÈË×¢ÒâÕâһмÆÄ±£¬½÷É÷¿´´ýËùÓÐδ¾ÇëÇóµÄͨÐÅ¡£Óû§Ó¦ÌرðСÐÄÔÚÏ߸´ÖƲ¢Ö´ÐдúÂëµÄÇëÇó£¬ÓÈÆäÊÇÔÚÒÔ¹ÜÀíԱȨÏÞÖ´ÐÐʱ¡£
https://www.bleepingcomputer.com/news/security/dprk-hackers-dupe-targets-into-typing-powershell-commands-as-admin/
4. ¶íÂÞ˹ºÚ¿Í×éÖ¯APT44·ÖÖ§¡°±´¿Ç±©Ñ©¡±È«Çò¹¥»÷»î¶¯½ÒÃØ
2ÔÂ12ÈÕ£¬¶íÂÞ˹Õþ¸®Ö§³ÖµÄºÚ¿Í×éÖ¯APT44µÄÒ»¸ö·ÖÖ§£¬±»³ÆÎª¡°±´¿Ç±©Ñ©¡±»ò¡°É³³æ¡±£¬×Ô2021ÄêÒÔÀ´Ò»Ö±»îÔ¾ÓÚÕë¶ÔÖØÒª×éÖ¯ºÍÕþ¸®µÄÍøÂç¹¥»÷ÖУ¬ÌرðÊÇÔÚÄÜÔ´¡¢Ê¯ÓͺÍÌìÈ»Æø¡¢µçÐÅ¡¢º½Ô˺ÍÎäÆ÷ÖÆÔìÁìÓò¡£¸Ã×éÖ¯ÖÂÁ¦ÓÚ»ñȡĿ±êϵͳµÄ³õʼ·ÃÎÊȨÏÞ£¬²¢½¨Á¢³Ö¾ÃÐÔÒÔά³Ö´æÔÚ£¬ÒÔ±ãÆäËûAPT44×Ó×é½Ó¹Ü¡£Î¢ÈíÍþвÇ鱨ÍŶÓÊӲ쵽£¬¸Ã×éÖ¯Õë¶ÔÎÚ¿ËÀ¼¡¢Å·ÖÞ¡¢ÖÐÑÇ¡¢ÄÏÑǺÍÖж«µØÓòµÄÒªº¦ÁìÓò¿ªÕ¹»ú»áÐÔÐж¯£¬ÌرðÊÇÔÚ¶íÂÞ˹ÈëÇÖÎÚ¿ËÀ¼ºó£¬¼ÓÇ¿Á˶ÔÎÚ¿ËÀ¼Òªº¦»ù´¡ÉèÊ©µÄ¹¥»÷¡£´ËÍ⣬¸Ã×éÖ¯»¹ÀûÓöàÖÖ¼¼ÊõÆÆ»µÍøÂ磬°üÂÞÀûÓÃnÈÕ©¶´¡¢Æ¾Ö¤ÍµÇԺ͹©Ó¦Á´¹¥»÷µÈ¡£ÔÚ»ñÈ¡·ÃÎÊȨÏ޺󣬺ڿÍͨ¹ý²¿Êð×Ô½ç˵Web shell½¨Á¢³Ö¾ÃÐÔ£¬²¢Ê¹ÓúϷ¨µÄITÔ¶³Ì¹ÜÀí¹¤¾ßÖ´ÐÐÃüÁͬʱð³äIT¹ÜÀíÔ±ÒÔÌӱܼì²â¡£¶ÔÓÚ³õʼ·ÃÎʺóµÄ»î¶¯£¬ÍþвÐÐΪÕßÇÔȡƾ¾Ý¡¢Ð¹Â¶Êý¾Ý£¬²¢Í¨¹ýTorÍøÂçÒþ²ØÁ¬½Ó¡£×îºó£¬¸Ã×éÖ¯½øÐкáÏòÒÆ¶¯£¬Ð޸Ļù´¡ÉèÊ©ÒÔÂú×ãÆäÔËÓªÐèÇó¡£Î¢ÈíÌåÏÖ£¬¸Ã¶íÂÞ˹ºÚ¿ÍС×éµÄÓ°ÏìÁ¦½Ó½üÈ«Çò£¬²¢·ÖÏíÁËá÷ÁÔ²éѯ¡¢¹¥»÷Ö¸±êºÍYARA¹æÔò£¬ÒÔ×ÊÖú·ÀÓùÕß¼°Ê±²¶×½²¢×èÖ¹¸ÃÍþвÐÐΪÕߵĻ¡£
https://www.bleepingcomputer.com/news/security/badpilot-network-hacking-campaign-fuels-russian-sandworm-attacks/
5. HipshipperÊý°ÙÍòÔËÊä±êÇ©ÆØ¹â£¬¸öÈËÐÅÏ¢Äþ¾²½ô¼±
2ÔÂ11ÈÕ£¬HipshipperÊÇΪeBay¡¢ShopifyºÍÑÇÂíÑ·Âô¼ÒÌṩ¹ú¼ÊÔËÊä·þÎñµÄƽ̨£¬½üÆÚÔâÓöÁËÒ»ÆðÑÏÖØµÄÊý¾Ýй¶Ê¼þ¡£ÔÚ2024Äê12ÔÂÕâ¸ö¹ú¼ÊÔËÊäá¯ÁëÔ£¬CybernewsÑо¿ÍŶӷ¢ÏÖHipshipperµÄÒ»¸öδÊܱ£»¤µÄAWS´æ´¢Í°Ì»Â¶ÁËÁè¼Ý1430ÍòÌõ¼Ç¼£¬Ö÷Òª°üÂÞÔËÊä±êÇ©ºÍº£¹ØÉ걨±í£¬Ð¹Â¶ÁËÂò¼ÒµÄÈ«Ãû¡¢¼Òͥסַ¡¢µç»°ºÅÂë¼°¶©µ¥ÏêÇéµÈ¸öÈËÏêϸÐÅÏ¢¡£ÕâЩй¶µÄÊý¾Ý¿ÉÄܱ»ÍøÂç·¸×ï·Ö×ÓÓÃÓÚ³ïı¸ß¼¶Õ©Æ¡¢ÍøÂçµöÓã¹¥»÷»òÓÐÕë¶ÔÐԵĶñÒâÈí¼þ¹¥»÷£¬Ôö¼ÓÁËÊܺ¦ÕßÔâÊÜÆÛÕ©¡¢É§ÈÅ¡¢ÍµÇԺ;¼ÃËðʧµÄ·çÏÕ¡£ÐÒÔ˵ÄÊÇ£¬ÔÚCybernewsÁªÏµHipshipperºó£¬¸Ã¹«Ë¾¼°Ê±¹Ø±ÕÁË̻¶µÄ´æ´¢Í°£¬·ÀÖ¹ÁËÊý¾ÝµÄ½øÒ»²½Ð¹Â¶¡£ÎªÁËÖÆÖ¹ÀàËÆÊ¼þÔٴη¢Éú£¬Ñо¿ÈËÔ±½¨ÒéÆóÒµ¼ÓÇ¿·ÃÎÊ¿ØÖÆ¡¢¼à¿Ø·ÃÎÊÈÕÖ¾¡¢ÆôÓ÷þÎñÆ÷¶Ë¼ÓÃÜ¡¢ÊµÊ©SSL/TLSÄþ¾²Í¨ÐÅ£¬²¢¿¼ÂǶ¨ÆÚÉ󼯡¢×Ô¶¯Äþ¾²¼ì²éºÍÔ±¹¤ÅàѵµÈÄþ¾²×î¼Ñʵ¼ù¡£´Ë´ÎÊý¾Ýй¶µÄ·¢ÏÖÈÕÆÚΪ2024Äê12ÔÂ2ÈÕ£¬Ê×´ÎÅû¶ÓÚ2024Äê12ÔÂ9ÈÕ£¬²¢ÓÚ2025Äê1ÔÂ8ÈÕ½áÊøÐ¹Â¶¡£
https://cybernews.com/security/hipshipper-data-leak-exposed-shipping-records/
6. CISA½«WindowsºÍZyxelÉ豸©¶´Ìí¼Óµ½ÒÑÖª±»ÀûÓ鶴Ŀ¼
2ÔÂ12ÈÕ£¬ÃÀ¹úÍøÂçÄþ¾²ºÍ»ù´¡ÉèÊ©Äþ¾²¾Ö£¨CISA£©½üÆÚ¸üÐÂÁËÆäÒÑÖª±»ÀûÓé¶´£¨KEV£©Ä¿Â¼£¬ÐÂÔöÁËÉæ¼°WindowsºÍZyxelÉ豸µÄ¶à¸ö©¶´¡£ÆäÖаüÂÞZyxel DSL CPE OSµÄÃüÁî×¢Èë©¶´CVE-2024-40891ºÍCVE-2024-40890£¬ÒÔ¼°Microsoft WindowsµÄÁ½¸ö©¶´£º¸¨Öú¹¦Ð§Çý¶¯·¨Ê½µÄWinSock»ùÓڶѵĻº³åÇøÒç³ö©¶´CVE-2025-21418ºÍ´æ´¢Á´½Ó¸ú×Ù©¶´CVE-2025-21391¡£CVE-2024-40891ºÍCVE-2024-40890ÔÊÐí¹¥»÷ÕßÔÚδ¾ÑéÖ¤µÄÇé¿öÏÂÖ´ÐÐÈÎÒâÃüÁ¿ÉÄܵ¼ÖÂÉ豸½Ó¹ÜµÈÑÏÖØºó¹û£¬ÇÒCVE-2024-40891Òѱ»ÊӲ쵽Êýǧ´Î¹¥»÷ʵÑé¡£¶øWindowsµÄÁ½¸ö©¶´Ò²±»»ý¼«ÀûÓã¬CVE-2025-21391ÔÊÐí¹¥»÷Õßɾ³ýÎļþ²¢¿ÉÄܽáºÏ´úÂëÖ´ÐнӹÜϵͳ£¬CVE-2025-21418ÔòÔÊÐí¾¹ýÉí·ÝÑéÖ¤µÄÓû§»ñÈ¡ÏµÍ³ÌØÈ¨¡£Î¢ÈíÒÑÔÚ2025Äê2ÔµÄÄþ¾²¸üÐÂÖÐÐÞ¸´ÁËÕâÁ½¸öWindows©¶´£¬µ«ZyxelÉ豸µÄ©¶´ÉÐδµÃµ½¹©Ó¦ÉÌÐÞ¸´ºÍ¹ûÈ»Åû¶¡£
https://securityaffairs.com/174135/security/u-s-cisa-adds-microsoft-windows-zyxel-device-flaws-known-exploited-vulnerabilities-catalog.htm