Framework LinuxµçÄÔUEFI°²È«·ìÏ¶ÆØ¹â

°ä²¼¹¦·ò 2025-10-16

1. Framework LinuxµçÄÔUEFI°²È«·ìÏ¶ÆØ¹â


10ÔÂ14ÈÕ £¬ÃÀ¹úÓ²¼þ³§ÉÌFramework³ö²úµÄÔ¼20Íǫ̀LinuxµçÄÔÒò³ö³§Ô¤×°º¬¡°ÄÚ´æÅú¸Ä¡±£¨mm£©ºÅÁîµÄÒÑÊðÃûUEFI±í¿Ç×é¼þ £¬´æÔÚÑϳÁ°²È«·ì϶ £¬¿ÉÄܱ»¹¥»÷ÕßÀûÓÃÈÆ¹ý°²È«Æô¶¯± £»¤¡£¾Ý¹Ì¼þ°²È«¹«Ë¾Eclypsium·ÖÎö £¬¸ÃmmºÅÁîÕý±¾ÓÃÓڵͼ¶Õï¶ÏºÍ¹Ì¼þµ÷ÊÔ £¬¿ÉÖ±½Ó¶ÁдϵͳÄÚ´æ £¬µ«¿É±»ÀÄÓÃÕë¶ÔgSecurity2±äÁ¿£¨UEFIÄ£¿éÊðÃûÑéÖ¤µÄ¹Ø¼ü×é¼þ£© £¬Í¨¹ý¸²¸ÇÆäֵΪNULL»ò³Á¶¨ÏòÖÁÎÞÑéÖ¤º¯Êý £¬´Ó¶ø½ûÓÃÊðÃûÑéÖ¤»úÔì¡£¹¥»÷Õß¿Éͨ¹ý´Ë·ì϶¼ÓÔØBlackLotus¡¢HybridPetya¡¢BootkittyµÈ¶ñÒâÊèµ¼¹¤¾ß°ü £¬ÕâЩ¹¤¾ß¿É¶ã±Ü²Ù×÷ϵͳ¼¶°²È«½ÚÔì £¬ÔÚϵͳ³Á×°ºóÈÔ³ÖÐø´æÔÚ £¬ÐγÉÄÑÒԶϸùµÄÓÆ¾ÃÐÔÍþв¡£·ì϶ӰÏìÁìÓòº­¸ÇFramework 13¼°16ϵÁеĶà¿îÐͺŠ£¬Ô̺¬IntelµÚ11-13´ú¡¢AMD Ryzen 7040/AI 300µÈ´¦ÖÃÆ÷°æ±¾ £¬¾ßÌ彨¸´°æ±¾ÒÑÃ÷È· £¬Èç13´úIntel°æ±¾ÔÚ3.08°æ½¨¸´¡¢AMD Ryzen AI 300ÔÚ3.04°æ½¨¸´¡£


https://www.bleepingcomputer.com/news/security/secure-boot-bypass-risk-on-nearly-200-000-linux-framework-sytems/


2. 800ÃÀÔªÉ豸¼´¿ÉÀ¹½ØÎÀÐÇͨѶÊý¾Ý


10ÔÂ14ÈÕ £¬¼ÓÖÝ´óѧʥµØÑǸç·ÖУÓëÂíÀïÀ¼´óѧ½áºÏ×êÑнÒʾ £¬È«ÇòÔ¼°ëÊýÎÀÐÇͨѶÒòδ¼ÓÃÜÃæ¶ÔÑϳÁ°²È«·çÏÕ £¬½öÐè¼ÛÖµÔ¼800ÃÀÔªµÄÏÖ³ÉÉ豸¼´¿ÉÖ´ÐÐÀ¹½Ø¡£×êÑÐÍŶÓÔÚÊ¥µØÑǸç·ÖУÎݶ¥×é×°ÎÀÐǽӹÜϵͳ £¬Ô̺¬185ÃÀÔªÌìÏßµú¡¢140ÃÀÔªÖ§¼Ü¡¢195ÃÀÔªÂí´ï¼°230ÃÀÔªµ÷г¿¨ £¬³É¹¦¶Ô×¼µØÇòͬ²½ÎÀÐǺó £¬ÊµÊ±²¶»ñÁËδ¼ÓÃܵĸöÈËÊý¾Ý¡£×êÑÐÏÔʾ £¬µçÐÅÔËÓªÉÌͨ¹ýÎÀÐÇÏÎ½ÓÆ«Ô¶»ùÕ¾ÓëÖ÷ÌâÍøÂçʱ £¬Êý¾Ý´«ÊäÆÕ±éδ¼ÓÃÜ¡£ÎÀÐǸ²¸ÇµØÇò±í±í»ý40%µÄ¸öÐÔ £¬Ê¹µÃÈκδ¦ÓÚ¸²¸ÇÁìÓòÄÚµÄÈËÔ±¾ù¿ÉÀ¹½ØÊý¾Ý¡£ÔÚÈýÄê×êÑÐÆÚ¼ä £¬ÍŶÓÍøÂçµ½´óÁ¿Î´Êܱ £»¤Í¨Ñ¶ £¬Ô̺¬T-Mobile¡¢AT&TÄ«Î÷¸ç¼°Ä«Î÷¸çµçÐÅÓþ»§µÄͨ»°Óë¶ÌÐÅ £»º½°à³Ë¿ÍµÄWiFiä¯ÀÀ¼Í¼ £»µçÁ¦¹«Ë¾¡¢Ê¯ÓÍÆ½Ì¨µÄÄÚ²¿ÐÅÏ¢ £»ÒÔ¼°ÃÀ¹úºÍÄ«Î÷¸ç¾ü·½ÏµÍ³µÄ´«ÊäÄÚÈÝ¡£¾ßÌå¶³öµÄÊý¾Ýº­¸ÇÃÀ¹úˮʦ½¢´¬±êʶÓëÍøÂçÊý¾Ý¡¢Ä«Î÷¸ç¾ü·½µý±¨»ã±¨¡¢·É»úÊØ»¤ÈÕÖ¾¡¢ÊµÊ±¶Ó¸÷λÏàÐÅÏ¢ £¬ÉõÖÁÄ«Î÷¸ç¹ú¶ÈµçÁ¦¹«Ë¾µÄÓû§ÐÅÏ¢¡¢¹¤×÷¶©µ¥¼°°²È«»ã±¨ £¬²¿ÃÅÃÀ¹ú¹¤Òµ½ÚÔìϵͳÔËÐÐÊý¾ÝÒà±»²¶»ñ¡£


https://cybernews.com/security/satellite-surveillance-encryption-research/


3. CapitaÒòÊý¾Ýй¶ÊÂÎñÖ§¸¶1400ÍòÓ¢°÷


10ÔÂ15ÈÕ £¬Ó¢¹úÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©½üÈÕ¶ÔÊý¾ÝÇý¶¯ÒµÎñÁ÷³Ì·þÎñÌṩÉÌCapita´¦ÒÔ1400ÍòÓ¢°÷£¨Ô¼1870ÍòÃÀÔª£©·£¿î £¬ÆðÒòÊÇ2023Äê²úÉúµÄһ·ӰÏì660ÍòÈ˵ijÁ´óÊý¾Ýй¶ÊÂÎñ¡£Õâ´Î´¦·£Éæ¼°Capita plc¼°Æä×Ó¹«Ë¾Capita Pension Solutions Limited £¬±ðÀë±»·£800ÍòºÍ600ÍòÓ¢°÷ £¬½Ï³õʼ4500ÍòÓ¢°÷µÄÄâ·£½ð¶î´ó·ùϵ÷ £¬Òò¸Ã¹«Ë¾Òѳе£ÔðÈΡ¢Ö´Ðа²È«¸Ä½ø²¢×Ô¶¯ÏòÊÜÓ°ÏìÕßÌṩÊý¾Ý± £»¤·þÎñ¡£×÷ΪӢ¹ú´óÐͱí°üºÍרҵ·þÎñ¹«Ë¾ £¬CapitaÕ¼ÓÐÔ¼3.4ÍòÃûÔ±¹¤¡¢ÄêÊÕÈë´ï30ÒÚÓ¢°÷ £¬¿Í»§º­¸Ç´¦ËùÒé»á¡¢NHS¡¢¹ú·À²¿¼°ÒøÐÓ×¢µçÐŵÈÐÐÒµ¡£ÊÂÎñÔ´ÓÚ2023Äê3ÔÂ22ÈÕÒ»ÃûÔ±¹¤ÏÂÔØ¶ñÒâÎļþ £¬µ¼ÖºڿÍÈëÇÔìäMicrosoft 365»·¾³¡£Ö»¹Ü·ì϶ÔÚ10·ÖÖÓÄÚ±»¼ì²â £¬µ«Capitaδʵʱ¸ôÀëÊÜϰȾÉ豸 £¬Ê¹¹¥»÷ÕßµÃÒÔÔÚ58Ó×ʱÄÚºáÏòÒÆ¶¯ £¬×îÖÕÇÔÈ¡½ü1TBÊý¾Ý²¢²¿ÊðÀÕË÷Èí¼þ¡£Black BastaÍÅ»ïÐû³Æ¶Ô´ËÕÆ¹Ü £¬Íþвй¶Êý¾Ý¡£


https://www.bleepingcomputer.com/news/security/capita-to-pay-14-million-for-data-breach-impacting-66-million-people/


4. Slider Revolution²å¼þ·ì϶ӰÏìÊý°ÙÍòWordPressÍøÕ¾


10ÔÂ15ÈÕ £¬»îÔ¾×°Öó¬400ÍòµÄWordPress»¬¿é²å¼þSlider Revolution½üÈÕ±»ÆØ³ö±àºÅΪCVE-2025-9217µÄ°²È«·ì϶ £¬Ó°Ïì6.7.36¼°ÒÔÉÏËùÓа汾¡£¸Ã·ì϶ԴÓÚ²å¼þÖÓ×°used_svg¡±ºÍ¡°used_images¡±Á½¸ö²ÎÊýµÄÑé֤ȱµã £¬ÕâÁ½¸ö²ÎÊýÓÃÓÚÖÎÀíͼÏñ/ÊÓÆµµ¼³öÖ°ÄÜ¡£ÓÉÓÚδÑϸñÏÞ¶ÈÎļþÀàÐͺÍõè¾¶ £¬¹¥»÷Õß¿ÉÀûÓô˷ì϶¶ÁÈ¡·þÎñÆ÷ÉϵÄËÁÒâÎļþ £¬Ô̺¬´æ´¢Êý¾Ý¿âÍ´´¦ºÍ¼ÓÃÜÃÜÔ¿µÄwp-config.phpÎļþ £¬ÍþÐ²ÍøÕ¾Êý¾Ý°²È«¡£°²È«·ÖÎöʦƾ¾ÝͨÓ÷ì϶ÆÀ·Öϵͳ£¨CVSS£©ÆÀ¶¨¸Ã·ì϶Ϊ6.5·Ö £¬ÊôÓÚÖеÈÑϳÁÐÔ¡£·ì϶ÓɶÀÁ¢×êÑÐÔ±¡°stealthcopter¡±ÓÚ2025Äê8ÔÂ11ÈÕͨ¹ýWordfence·ì϶Éͽð´òËã³õ´Î»ã±¨¡£WordfenceÍŶÓÔÚ8ÔÂ19ÈÕʵÏÖÑéÖ¤ºó £¬½«ÏêÇé´«µÝ¸ø²å¼þ¿ª·¢ÉÌThemePunch¡£¿ª·¢ÍŶÓѸËÙÏìÓ¦ £¬ÔÚÁ½ÌìÄÚÈ·ÈÏÎÊÌâ²¢Æô¶¯½¨¸´¹¤×÷ £¬×îÖÕÓÚ8ÔÂ28ÈÕ°ä²¼6.7.37°æ±¾³¹µ×½¨¸´·ì϶¡£Îª´Ë £¬×êÑÐÈËÔ±»ñµÃ656ÃÀÔªµÄÉͽð¼Î½±¡£


https://www.infosecurity-magazine.com/news/flaw-slider-revolution-plugin/


5. Î÷°àÑÀʱÉоÞÍ·MANGO´«µÝÓªÏú·þÎñÉÌÊý¾Ýй¶ÊÂÎñ


10ÔÂ15ÈÕ £¬Î÷°àÑÀʱÉÐÁãÊÛÉÌMANGOÏòÈ«Çò¿Í»§·¢ËÍÊý¾Ýй¶֪ͨ £¬Åû¶Æä±í²¿ÓªÏú·þÎñ¹©¸øÉÌÔâ·êÍøÂç¹¥»÷ £¬µ¼Ö²¿Ãſͻ§Ó×ÎÒÐÅÏ¢±»·¸·¨½Ó¼û¡£×÷Ϊ³ÉÁ¢ÓÚ1984Äê¡¢ÔÚ120¸ö¹ú¶ÈÕ¼ÓÐ2800¸öÏúÊÛÍøµã¡¢ÄêÊÕÈë33ÒÚÅ·Ôª¡¢Ô±¹¤16300È˵ÄʱÉоÞÍ· £¬MANGOÕâ´ÎÊÂÎñÉæ¼°¿Í»§ÐÕÃû£¨²»º¬ÐÕÊÏ£©¡¢¹ú¶È¡¢ÓÊÕþ±àÂë¡¢µç×ÓÓʼþµØÖ·¼°µç»°ºÅÂëµÅתÏú»î¶¯³£ÓÃÊý¾Ý £¬µ«Ã÷È·ÅųýÐÕÊÏ¡¢ÒøÐÐÕË»§¡¢ÐÅÓþ¿¨ÐÅÏ¢¡¢Éí·ÝÖ¤/»¤ÕÕºÅÂë¼°ÕË»§Æ¾Ö¤µÈ¸ßÃô¸ÐÐÅÏ¢¡£MANGOÇ¿µ÷ £¬ÆäÖ÷ÌâÒµÎñϵͳ¼°IT»ù´¡ÉèʩδÊÜÓ°Ïì £¬¹«Ë¾ÔËӪά³ÖÕý³£¡£ÊÂÎñÔ´ÓÚµÚÈý·½ÓªÏú·þÎñÉ̵ݲȫ·ì϶ £¬¹¥»÷Õßͨ¹ý¸Ã·ì϶»ñÈ¡ÁË´æ´¢ÔÚÓªÏúϵͳÖеĿͻ§Êý¾Ý¡£Ö»¹ÜȱʧÐÕÊϽµµÍÁËÖ±½ÓÉí·ÝµÁÓ÷çÏÕ £¬µ«Ð¹Â¶µÄÁªÏµ·½Ê½ÈÔ¿ÉÄܱ»ÓÃÓÚÍøÂç´¹µöµÈ¶þ´Î¹¥»÷¡£ÊÂÎñ²úÉúºó £¬MANGOÁ¢¼´Æô¶¯ËùÓа²È«ºÍ̸ £¬²¢ÏòÎ÷°àÑÀÊý¾Ý± £»¤¾Ö£¨AEPD£©¼°¼à¹Ü²¿ÃŻ㱨¡£ÎªÐ­ÖúÊÜÓ°Ïì¿Í»§ £¬¹«Ë¾ÉèÁ¢ÁËרÓÃÓÊÏäºÍÈÈÏߵ绰 £¬Ìṩ·çÏÕÕ÷ѯ֧³Ö¡£


https://www.bleepingcomputer.com/news/security/clothing-giant-mango-discloses-data-breach-exposing-customer-info/


6. F5Ôâ·ê¹ú¶È¼¶ºÚ¿ÍÈëÇÖ £¬Î´¹«¿ª·ì϶Դ´úÂëÔâÇÔÈ¡


10ÔÂ15ÈÕ £¬ÃÀ¹úÍøÂ簲ȫ¹«Ë¾F5ÓÚ2025Äê8ÔÂ9ÈÕÅû¶Ôâ·ê¹ú¶È¼¶ºÚ¿ÍÈëÇÖ £¬¹¥»÷Õ߳־ýӼûÆäϵͳ²¢ÇÔÈ¡ÁËÆì½¢²úÆ·BIG-IPµÄδ¹«¿ª°²È«·ì϶¼°Ô´´úÂë¡£µ÷²éÏÔʾ £¬ºÚ¿ÍÈëÇÖÁËF5µÄBIG-IP²úÆ·¿ª·¢»·¾³¼°¹¤³Ì֪ʶÖÎÀíÆ½Ì¨ £¬ÇÔÈ¡ÁËÔ̺¬BIG-IP²¿ÃÅÔ´´úÂ롢δ¹«¿ª·ì϶ÐÅÏ¢¼°¿Í»§ÅäÖÃϸ½ÚµÄÎļþ¡£Ö»¹Ü´æÔÚÊý¾Ýй¶ £¬µ«F5Ç¿µ÷¹¥»÷ÕßδÀûÓÃÕâЩ·ì϶½øÐÐÏÖʵ¹¥»÷ £¬Ò²Î´·¢ÏÖ¹©¸øÁ´·çÏÕ»ò´úÂë±»´Û¸ÄµÄÖ¤¾Ý £¬ÆäCRM¡¢²ÆÕþ¡¢Ö§³Ö°¸ÀýÖÎÀíµÈÔ̺¬¿Í»§Êý¾ÝµÄƽ̨¾ùδÊÜÓ°Ïì¡£ÊÂÎñ²úÉúºó £¬F5ѸËÙ²ÉÈ¡²¹¾È´ëÊ©£ºÂÖ»»Æ¾Ö¤¡¢Ç¿»¯½Ó¼û½ÚÔì¡¢²¿Êð×Ô¶¯»¯²¹¶¡ÖÎÀí¹¤¾ß £¬²¢¼ÓÇ¿ÍøÂ簲ȫ¼Ü¹¹¡£¸Ã¹«Ë¾ÓëNCC GroupºÍIOActiveºÏ×÷ £¬Í¨¹ý76ÃûÕÕ·÷¶ÔBIG-IP¹Ø¼üÈí¼þ×é¼þ¼°¿ª·¢Á÷³Ì½øÐа²È«Éó²é £¬Î´·¢ÏÖ¶ñÒâ´úÂëÖ²È롣ͬʱ £¬F5°ä²¼ÁËÕë¶ÔBIG-IP¡¢F5OSµÈ²úÆ·µÄ°²È«¸üР£¬½¨Òé¿Í»§ÓÅÏÈ×°ÖÃÒÔ·À±¸Ç±ÔÚ·çÏÕ £¬²¢ÌṩÍþвËÑË÷Ö¸Äϼ°iHealthÕï¶Ï¹¤¾ßµÄ×Ô¶¯²é³­Ö°ÄÜ¡£


https://www.bleepingcomputer.com/news/security/hackers-breach-f5-to-steal-undisclosed-big-ip-flaws-source-code/