ÊÓÆµ»áÒéÀûÓÃHuddle01й¶Óû§Êý¾Ý

°ä²¼¹¦·ò 2025-10-17

1. ÊÓÆµ»áÒéÀûÓÃHuddle01й¶Óû§Êý¾Ý


10ÔÂ15ÈÕ £¬È¥ÖÐÐÄ»¯ÊÓÆµ»áÒéÀûÓÃHuddle01Ðû³ÆÌṩ¸ß°²È«ÐÔWebRTC·þÎñ £¬È´ÒòδÊܱ£»¤µÄKafka BrokerÊ·ýµ¼Ö´ó¹æÄ£Óû§Êý¾Ýй¶¡£×êÑÐÍŶӷ¢ÏÖ £¬¸Ãƽ̨ÓÃÓÚ´«ÊäʵʱÈÕÖ¾µÄKafka BrokerδÆôÓÃÉí·ÝÑéÖ¤¡¢¼ÓÃÜ»ò½Ó¼û½ÚÔì £¬Â¶³öÁË2025Äê8ÔÂ13ÈÕÖÁ26ÈÕÆÚ¼ä³¬621,000ÌõʵʱÈÕÖ¾Ìõ¿î £¬º­¸ÇÓû§µç×ÓÓʼþ¡¢IPµØÖ·¡¢¼ÓÃÜÇ®°üµØÖ·£¨Ö§³Ö±ÈÌØ±Ò¡¢ÒÔÌ«·»µÈÇø¿éÁ´£©¡¢Í¨»°²Î¼Ó¼Í¼¡¢¹ú¶È¡¢¹¦·ò¡¢Ê±³¤µÈÃô¸ÐÐÅÏ¢¡£ÕâЩÊý¾ÝÒÔÃ÷ÎÄ´ó¾Öʵʱ´«Êä £¬ÈκεÚÈý·½¾ù¿ÉÎÞ×è°­½Ó¼û¡£Ö»¹ÜHuddle01ÔÚÀûÓÃÉ̵êÉêÃ÷¡°²»ÍøÂç»ò¹²ÏíÊÜ»§Êý¾Ý¡± £¬ÇÒÒþÖÔÕþ²ßÇ¿µ÷¡°È¥ÖÐÐÄ»¯Í¨Ñ¶ÖеÄÊý¾ÝͨÃ÷ÓëÓû§½ÚÔ족 £¬µ«ÏÖʵ¶³öµÄÊý¾ÝÏÔʾÆä´æÔÚÑϳÁ°²È«·ì϶¡£Æ½Ì¨ÓÉÃÀ¹úÌØÀ­»ªÖÝGraphene01 Labs¿ª·¢ £¬ÔÚGoogle PlayÏÂÔØÁ¿³¬5Íò´Î £¬iOS¶Ë¾ùÔÈÆÀ·Ö4.7ÐÇ £¬ÉîÊܼÓÃÜÇ®±Ò°®ºÃÕßÇàíù¡£È»¶ø £¬Çø¿éÁ´¼¯³É·´¶ø¼Ó¾çÁË·çÏÕ £¬¹¥»÷Õß¿ÉÀûÓÃй¶µÄÇ®°üµØÖ·¹ØÁªÕæÊµÉí·Ý £¬»æÔìÓû§¹ØÏµÍ¼ £¬½ø¶øÖ´Ðо«×¼´¹µö¹¥»÷»òÉç»á¹¤³Ì¹¥»÷¡£


https://cybernews.com/security/video-call-app-huddle01-leaks-sensitive-user-data/


2. CISA´¹Î£¸üÐÂKEVĿ¼£ºAdobeÓëSKYSEA·ì϶Ôâ×Ô¶¯ÀûÓÃ


10ÔÂ16ÈÕ £¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©ÓÚ½üÈÕ½«Á½¸öÑϳÁ°²È«·ì϶ÄÉÈëÆäÒÑÖª±»ÀûÓ÷ì϶£¨KEV£©Ä¿Â¼ £¬Í¹ÏÔµ±Ç°ÍøÂ簲ȫÍþвµÄ½ôÆÈÐÔ¡£ÆäÖÐ £¬Ó°ÏìAdobe Experience Manager£¨AEM£©µÄCVE-2025-54253·ì϶±»ÆÀ¶¨Îª×î¸ßÑϳÁÐԵȼ¶£¨CVSS 10.0£© £¬¸Ã·ì϶ԴÓÚAEM Forms JEE 6.5.23.0¼°¸üÔç°æ±¾ÖдæÔÚδ¾­ÑéÖ¤µÄ/adminui/debug servlet¶Ëµã £¬¹¥»÷Õß¿ÉÀûÓô˶˵ãÌá·´Ä¿ÒâOGNL±í°×ʽ £¬ÎÞÐèÉí·ÝÑéÖ¤¼´¿ÉÖ´ÐÐËÁÒâϵͳºÅÁî¡£AdobeÒÑÓÚ2025Äê8Ô°䲼µÄ6.5.0-0108°æ±¾Öн¨¸´´Ë·ì϶ £¬Í¬Ê±½¨¸´µÄ»¹ÓÐCVSS 8.6·ÖµÄCVE-2025-54254¡£Ö»¹ÜAdobeÈϿɴæÔÚ¹«¿ª¸ÅÏëÑéÖ¤ £¬µ«ÏÖʵ¹¥»÷ϸ½ÚÉÐδÅû¶¡£CISAÒªÇóÁª¹úÃñÊÂÐÐÕþ²¿ÃÅ£¨FCEB£©»ú¹¹±ØÐëÔÚ2025Äê11ÔÂ5ÈÕǰʵÏÖ½¨¸´¡£ÁíÒ»Ôò³ÁÒª¸üÐÂÉæ¼°SKYSEA Client ViewµÄCVE-2016-7836·ì϶£¨CVSS 9.8·Ö£© £¬¸Ã·ì϶ԴÓÚÉí·ÝÑéÖ¤»úÔìȱµã £¬¹¥»÷Õß¿Éͨ¹ýÖÎÀí½ÚÔį̀µÄTCPÏνÓÔ¶³ÌÖ´ÐдúÂë¡£ÈÕ±¾·ì϶עÃ÷£¨JVN£©ÔÚ2016Äêµ×µÄ°²È«²¼¸æÖÐÃ÷È·Ö¸³ö £¬Ò°±íÒѼì²âµ½Õë¶Ô´Ë·ì϶µÄ¹¥»÷ÐÐΪ¡£


https://thehackernews.com/2025/10/cisa-flags-adobe-aem-flaw-with-perfect.html


3. ËÕ¸»±ÈÔâ·ê³Á´óÊý¾Ýй¶ÊÂÎñ £¬¿Í»§Ãô¸ÐÐÅÏ¢ÔâÇÔÈ¡


10ÔÂ16ÈÕ £¬È«Çò³ÛÃûÒÕÊõÆ·ÅÄÂôÐÐËÕ¸»±È½üÈÕ´«µÝһ·³Á´óÊý¾Ýй¶ÊÂÎñ £¬ÍþвÐÐΪÕßÇÔÈ¡Á˿ͻ§Ãô¸ÐÐÅÏ¢ £¬Ô̺¬È«Ãû¡¢Éç»á°²È«ºÅÂ루SSN£©¼°½ðÈÚÕË»§ÏêÇé¡£¸ÃÊÂÎñÓÚ2025Äê7ÔÂ24ÈÕ±»·¢ÏÖ £¬¾­¹ýÁ½¸öÔµľßÌåµ÷²é £¬¹«Ë¾·½È·Èϱ»µÁÊý¾ÝÀàÐͼ°ÊÜÓ°ÏìÓ×ÎÒÁìÓò¡£×÷ΪȫÇòµ±Ïȵĸ߼ÛÖµÎïÆ·ÅÄÂôÐÐÓë×ʲúÖ§³Ö´û¿î·þÎñÉÌ £¬ËÕ¸»±ÈÿÄê´¦ÖÃÊýÊ®ÒÚÃÀÔªÅÄÂôÂòÂô £¬2024Äê×ÜÏúÊÛ¶î´ï60ÒÚÃÀÔª¡£Õâ´Îй¶ÊÂÎñÓ°ÏìÁìÓò¿í·º £¬Æ¾¾ÝÏòÃÀ¹úÃåÒòÖݼì²ì³¤°ì¹«ÊÒÌá½»µÄÎļþ £¬ÒÑÈ·ÈÏÔ̺¬ÃåÒòÖݺÍÂ޵µºÖÝÔÚÄڵIJ¿Ãſͻ§ÐÅÏ¢Ôâ·¸·¨»ñÈ¡ £¬µ«¾ßÌåÊÜÓ°Ïì×ÜÈËÊýÉÐδÆëÈ«Åû¶¡£ËÕ¸»±ÈÔÚ֪ͨÖÐÇ¿µ÷ £¬ÊÂÎñ²úÉúºóÁ¢¼´Æô¶¯È«Ãæµ÷²é £¬Í¨¹ýÊý¾ÝÉó²éÈ·¶¨ÐÅϢй¶ÁìÓò¡£½ØÖÁĿǰ £¬ÉÐÎÞÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü¡£ÎªÓ¦¶ÔÕâ´ÎΣ»ú £¬ËÕ¸»±ÈΪÊÜÓ°Ïì¿Í»§Ìṩ²¹¾È´ëÊ©£ºÍ¨¹ýTransUnionÌṩΪÆÚ12¸öÔµÄÃâ·ÑÉí·Ý±£»¤ÓëÐÅÓþ¼à¿Ø·þÎñ £¬¿Í»§ÐèÔÚ90ÌìÄÚʵÏÖ×¢²á¡£


https://www.bleepingcomputer.com/news/security/auction-giant-sothebys-says-data-breach-exposed-customer-information/


4. ProsperÔâ´ó¹æÄ£Êý¾Ýй¶ £¬1760ÍòÓû§ÐÅÏ¢±»ÇÔ


10ÔÂ16ÈÕ £¬ÃÀ¹úµã¶Ôµã½è´ûƽ̨ProsperÅû¶Æäϵͳ9ÔÂ2ÈÕÔâºÚ¿ÍÈëÇÖ £¬µ¼Ö³¬¹ý1760ÍòÈ˵ÄÓ×ÎÒÐÅÏ¢±»µÁ¡£Õâ´ÎÊÂÎñÉæ¼°¿Í»§¼°´û¿îÉêÇëÈ˵ÄÃô¸ÐÊý¾Ý £¬Ô̺¬Éç»á°²È«ºÅÂë¡¢ÐÕÃû¡¢µ±¾ÖÐû¸æµÄÉí·ÝÖ¤ºÅ¡¢¾ÍÒµÇé¿ö¡¢ÐÅÓþÆÀ·Ö¡¢ÊÕÈëˮƽ¡¢µ®ÉúÈÕÆÚ¡¢ÏÖʵµØÖ·¡¢IPµØÖ·¼°ä¯ÀÀÆ÷Óû§´úÀíÐÅÏ¢µÈ¡£Ö»¹ÜProsper°µÊ¾ÉÐδ·¢ÏÖ¹¥»÷Õß»ñÈ¡¿Í»§ÕË»§»ò×ʽð½Ó¼ûȨÏÞµÄÖ¤¾Ý £¬µ«È·ÈÏ»úÃÜÊý¾ÝÒÑͨ¹ýδ¾­ÊÚȨ²éÎʹ«Ë¾Êý¾Ý¿âµÄ·½Ê½±»ÇÔÈ¡¡£×÷Ϊ³ÉÁ¢ÓÚ2005ÄêµÄÀÏÅÆ½ðÈÚÆ½Ì¨ £¬ProsperÒÑÔ®ÊÖ³¬200Íò¿Í»§ÊµÏÖ³¬300ÒÚÃÀÔª´û¿îÂòÂô¡£±¾´Î°²È«·ì϶δӰÏìÆäÃæÏò¿Í»§µÄÈÕ³£ÔËÓª £¬¹«Ë¾ÒÑÏò¼à¹Ü²¿Ãźͷ¨ÂÉ»ú¹Ø±¨°¸ £¬²¢Æô¶¯½áºÏµ÷²é¡£ProsperÇ¿µ÷ £¬µ÷²éÈÔ´¦ÓÚÔçÆÚ½×¶Î £¬ÔÚÈ·¶¨¾ßÌåÊÜÓ°ÏìÊý¾ÝÁìÓòºó £¬½«ÏòÊÜÓ°ÏìÓû§ÌṩÃâ·ÑÐÅÓþ¼à¿Ø·þÎñ¡£ÖµÍ×ÌùÐĵÄÊÇ £¬Êý¾Ýй¶֪ͨ·þÎñHave I Been Pwned£¨HIBP£©Åû¶ÊÂÎñÓ°ÏìÁìÓò´ï1760Íò¸öΨһµç×ÓÓʼþµØÖ· £¬µ«Prosper½²»°È˰µÊ¾¡°ÎÞ·¨ÑéÖ¤¡±¸ÃÊý¾ÝµÄÕýÈ·ÐÔ £¬²¢³ÁÉ깫˾ÈÔÔÚºËʵ¾ßÌåÊÜÓ°ÏìÊý¾Ý¼°ËùÓÐÕßÉí·Ý¡£


https://www.bleepingcomputer.com/news/security/have-i-been-pwned-warns-of-prosper-data-breach-impacting-176-million-accounts/


5. Ó¡¶ÈNetcoreCloud·þÎñÆ÷ÅäÖÃÃýÎóÖÂ400ÒÚÌõÃô¸ÐÊý¾Ýй¶


10ÔÂ16ÈÕ £¬Ó¡¶ÈÈ«Çòµç×ÓÓʼþÓªÏúÓë×Ô¶¯»¯ÆóÒµNetcoreCloudÒò·þÎñÆ÷ÅäÖÃÃýÎó £¬µ¼ÖÂÔ̺¬400Òڱʼͼ¡¢×ܼÆ13.4TBµÄÃô¸ÐÊý¾Ýй¶ £¬Éæ¼°È«Çò¿Í»§µç×ÓÓʼþ¡¢ÄÚ²¿¾ßÌåÐÅÏ¢¼°¼¼ÊõÅäÖõÈÖ÷ÌâÊý¾Ý¡£ÍøÂ簲ȫ×êÑÐÔ±Jeremiah FowlerÔÚ¹«¿ªÊý¾Ý¿âÖз¢Ïָ÷ì϶ £¬Êý¾Ý¿âδ¼ÓÃÜÇÒδÊܱ£»¤ £¬ÈκλñÈ¡IPµØÖ·Õß¾ù¿É½Ó¼ûº£Á¿ÓʼþͨѶ¼Í¼ £¬Ô̺¬Ò½ÁƱ£½¡Í¨Öª¡¢ÒøÐл¾¯±¨¡¢¾ÍÒµÓйØÓʼþ¼°²¿ÃÅÕË»§¼¼ÊõÐÅÏ¢£¨ÈçIPµØÖ·¡¢SMTPÅäÖã© £¬²¿ÃżÍ¼ÉõÖÁÏóÕ÷Ϊ»úÃÜ¡£NetcoreCloud×ܲ¿Î»ÓÚÓ¡¶ÈÃÏÂò £¬Îª40¸ö¹ú¶È/µØÓòµÄ6500Óà¸öÆ·ÅÆÌṩµç×ÓÓʼþ¼°×Ô¶¯»¯·þÎñ £¬¸²¸ÇµçÉÌ¡¢½ðÈÚ¡¢Ã½Ìå¡¢ÓÎÀÀµÈÐÐÒµ¡£Fowler·¢ÏÖºóÁ¢¼´Í¨Öª¸Ã¹«Ë¾ £¬Êý¾Ý¿âÓÚµ±ÈÕ±»´¹Î£±£»¤²¢Ï޶ȽӼû¡£Netcore»ØÓ¦³Æ½«·¢Õ¹ÄÚ²¿Éó²é £¬µ«Ä¿Ç°ÈÔ´æÔÚÈý´óÒɵ㣺й¶Êý¾Ý¿âÓÉNetcoreÖ±ÊÕÊÜÀí»òµÚÈý·½ÍйÜδÃ÷£»Êý¾Ý¶³öʱ³¤¼°ÊÇ·ñ±»¶ñÒâ½Ó¼ûδȷÈÏ£»ÊÇ·ñÓÐÆäËûÖ÷ÌåÏÂÔØ»ò¸´ÔìÊý¾ÝÐèͨ¹ý·¨ÎñÉó¼ÆºËʵ¡£


https://hackread.com/misconfigured-netcorecloud-server-40-billion-records/


6. ³¯ÏʺڿÍÀûÓÃEtherHidingÔÚÇø¿éÁ´Éϰµ²Ø¶ñÒâÈí¼þ


10ÔÂ16ÈÕ £¬³¯Ïʹú¶ÈÖ§³ÖµÄºÚ¿Í×éÖ¯UNC5342×Ô2025Äê2ÔÂÆð £¬ÔÚÕë¶ÔÈí¼þ¼°ÍøÂ翪·¢ÈËÔ±µÄÉç»á¹¤³Ì¹¥»÷ÖÐ £¬³õ´ÎѡȡÃûΪ"EtherHiding"µÄÇø¿éÁ´ÖÇÄܺÏÔ¼¶ñÒâÈí¼þ´«²¼¼¼Êõ¡£¸Ã¼¼ÊõÓÉGuardio LabsÓÚ2023ÄêÌá³ö £¬Í¨¹ý½«¶ñÒâÔØºÉǶÈë±Ò°²ÖÇÄÜÁ´»òÒÔÌ«·»µÄÖÇÄܺÏÔ¼ÖÐ £¬ÊµÏֵͳɱ¾¡¢¸ßÄäÃûÐԵĶñÒâÈí¼þÍйÜÓ붯̬¸üС£¹¥»÷Á÷³ÌÒÔÐéαÇóÖ°¿ÚÊÔΪµö¶ü £¬ÓÉαÔìʵÌ壨ÈçBlockNovas LLC¡¢Angeloper Agency£©ÌáÒé¡£Êܺ¦ÕßÔÚ¼¼ÊõÆÀ¹À»·½Ú±»ÓÕÆ­Ö´ÐÐJavaScriptÏÂÔØ·¨Ê½ £¬¸Ã·¨Ê½Í¨¹ýÖÇÄܺÏÔ¼ÓëÒÔÌ«·»½»»¥ £¬»ñÈ¡Ô̺¬InvisibleFerret¼äµýÈí¼þJS°æ±¾µÄµÚÈý½×¶ÎÓÐЧ¸ºÔØ¡£Çø¿éÁ´¸öÐÔʹ¹¥»÷¾ß±¸Èý´óÓÅÊÆ£ºÆäÒ» £¬Í¨¹ýÖ»¶ÁŲÓûñÈ¡ÔØºÉ²»ÁôÂòÂô¼Í¼ £¬Òñ±ÎÐÔ¼«Ç¿£»Æä¶þ £¬ºÏÔ¼ÔÚǰËĸöÔ¸üг¬20´Î £¬Ã¿´Î½öÐè1.37ÃÀÔªgas·Ñ £¬Ö§³Ö¼±¾ç½Ã½Ýµ÷Õû£»ÆäÈý £¬¶àÁ´Ê¹ÓÃÅú×¢³¯ÏʺڿÍÍŶӴæÔÚ²Ù×÷¸ôÀë¡£¶ñÒâÈí¼þÔÚÄÚ´æÖÐÔËÐÐ £¬¿É¶¯Ì¬¼ÓÔØÆ¾Ö¤ÇÔȡģ¿é £¬Ö¸±êÖ±Ö¸Chrome¡¢EdgeµÈä¯ÀÀÆ÷µÄÃÜÂë¡¢ÐÅÓþ¿¨¼°¼ÓÃÜÇ®°üÊý¾Ý¡£ÆäºÅÁî½ÚÔ죨C2£©Í¨Â·Ö§³ÖÖ´ÐÐËÁÒâºÅÁî¡¢ZIPѹËõÎļþ±íйÖÁTelegramµÈ²Ù×÷¡£


https://www.bleepingcomputer.com/news/security/north-korean-hackers-use-etherhiding-to-hide-malware-on-the-blockchain/