Fortinet³ÎÇåCVE-2025-24472·ÇÁãÈÕ·ì϶ £¬½öCVE-2024-55591±»ÀûÓÃ

°ä²¼¹¦·ò 2025-02-13

1. Fortinet³ÎÇåCVE-2025-24472·ÇÁãÈÕ·ì϶ £¬½öCVE-2024-55591±»ÀûÓÃ


2ÔÂ11ÈÕ £¬Fortinet½üÈÕÖÒ¸æ³Æ £¬¹¥»÷ÕßÔÚÀûÓÃFortiOSºÍFortiProxyÖеķì϶À´½Ù³Ö·À»ðǽ²¢ÇÖÈëÆóÒµÍøÂç  ¡£µ«ËæºóFortinet֪ͨ £¬ÐÂÅû¶µÄCVE-2025-24472·ì϶²¢·ÇÁãÈÕ·ì϶ £¬ÇÒÒÑÔÚÒ»Ô·ݽ¨¸´  ¡£Í¬Ê±È·ÈÏ £¬Ö»ÓÐCVE-2024-55591·ì϶±»ÏÖʵÀûÓà  ¡£Èô¿Í»§ÒÑÆ¾¾ÝÏÈǰÁìµ¼Éý¼¶ £¬ÔòÒÑÊܱ£»¤  ¡£CVE-2025-24472·ì϶ÔÊÐíÔ¶³Ì¹¥»÷Õßͨ¹ý¶ñÒâCSF´úÀíÒªÇó»ñµÃ³¬µÈÖÎÀíԱȨÏÞ £¬Ó°ÏìFortiOS 7.0.0ÖÁ7.0.16¼°FortiProxy²¿ÃŰ汾 £¬ÒÑÔÚ¸üа汾Öн¨¸´  ¡£¹¥»÷Õß»¹ÀûÓÃCVE-2024-55591·ì϶ÔÚÉ豸ÉÏ´´½¨Ëæ»úÖÎÀíÔ¹ØË»§ £¬Åú¸ÄÅäÖà £¬²¢Í¨¹ý¶ñÒâÕÊ»§½Ó¼ûSSLVPN  ¡£ÍøÂ簲ȫ¹«Ë¾Arctic Wolf»ã±¨ÁËÓйع¥»÷»î¶¯ £¬Ô̺¬·ì϶ɨÃè¡¢¿úËÅ¡¢SSL VPNÅäÖü°ºáÏòÒÆ¶¯µÈ½×¶Î £¬²¢½¨Òé½ûÓù«¹²½Ó¿ÚÉϵķÀ»ðǽÖÎÀí½Ó¼û  ¡£Fortinet½¨ÒéÎÞ·¨Á¢¼´¸üеÄÖÎÀíÔ±½ûÓÃHTTP/HTTPSÖÎÀí½çÃæ»òÏ޶ȽӼûIPµØÖ·×÷Ϊһʱ½â¾ö²½Öè  ¡£


https://www.bleepingcomputer.com/news/security/fortinet-discloses-second-firewall-auth-bypass-patched-in-january/


2. ÀûÓþɰæ ThinkPHP ºÍ ownCloud ·ì϶µÄ¹¥»÷¼¤Ôö


2ÔÂ12ÈÕ £¬½üÆÚºÚ¿Í»î¶¯³öÏÖÔö³¤Ç÷Ïò £¬ËûÃÇÖØÒªÕë¶ÔÒ×ÊÜ2022ÄêºÍ2023Äê¾É°²È«ÎÊÌâÓ°ÏìµÄ¡¢ÊØ»¤²»ÉƵÄÉ豸ÌáÒé¹¥»÷  ¡£¾ÝÍþв¼à¿ØÆ½Ì¨GreyNoise»ã±¨ £¬ÀûÓÃCVE-2022-47945ºÍCVE-2023-49103·ì϶µÄ¹¥»÷ÐÐΪÕßÊýÁ¿¼¤Ôö  ¡£CVE-2022-47945Éæ¼°ThinkPHP¿ò¼ÜµÄ±¾µØÎļþÔ̺¬£¨LFI£©ÎÊÌâ £¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÖ´ÐÐËÁÒâ²Ù×÷ϵͳºÅÁ¶øCVE-2023-49103ÔòÓ°Ï쿪ԴÎļþ¹²ÏíÈí¼þownCloud £¬ºÚ¿Í¿Éͨ¹ý¸Ã·ì϶ÇÔÈ¡Ãô¸ÐÐÅÏ¢  ¡£Ö»¹ÜÕâЩ·ì϶µÄ·ì϶Ԥ²âÆÀ·Öϵͳ£¨EPSS£©ÆÀ·Ö½ÏµÍ £¬ÇÒδȫÊýÁÐÈëCISAµÄÒÑÖªÀûÓ÷ì϶£¨KEV£©Ä¿Â¼ £¬µ«GreyNoiseÒѹ۲쵽´óÁ¿Î¨Ò»IPÊÔIJÀûÓÃÕâЩ·ì϶ £¬ÇһÓÐËùÔö³¤  ¡£Îª±£»¤ÏµÍ³ £¬½¨ÒéÓû§Éý¼¶µ½ThinkPHP 6.0.14»ò¸ü¸ß°æ±¾ £¬½«ownCloud GraphAPIÉý¼¶µ½0.3.1¼°¸üа汾 £¬²¢½«Ç±ÔÚÒ×Êܹ¥»÷µÄÊ·ýÍÑ»ú»òÖÃÓÚ·À»ðǽºóÃæ  ¡£


https://www.bleepingcomputer.com/news/security/surge-in-attacks-exploiting-old-thinkphp-and-owncloud-flaws/


3. KimsukyѡȡClickFixÕ½ÊõÌáÒéÐÂÐÍÍøÂç¹¥»÷


2ÔÂ12ÈÕ £¬³¯Ïʹú¶ÈÑÝÔ±¡°Kimsuky¡±½üÆÚѡȡÁËÒ»ÖÖÊÜClickFix»î¶¯Æô·¢µÄÐÂÕ½Êõ½øÐÐÍøÂç¹¥»÷  ¡£ClickFixÊÇÒ»ÖÖÉç»á¹¤³ÌÕ½Êõ £¬Í¨¹ýºýŪÐÔÃýÎóÐÂÎÅ»òÌáÐÑÓÕµ¼Êܺ¦ÕßÖ´ÐжñÒâ´úÂë £¬³£ÓÃÓÚ´«²¼ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ  ¡£Kimsuky¼Ù×°³Éº«¹úµ±¾Ö¹ÙÔ± £¬ÓëÖ¸±ê³ÉÁ¢ÐÅÀµºó £¬·¢ËÍ´øÓÐPDF¸½¼þµÄÓã²æÊ½ÍøÂç´¹µöµç×ÓÓʼþ  ¡£È»¶ø £¬ÕâЩPDFÎĵµÏÖʵÉÏÊèµ¼Êܺ¦Õß½Ó¼ûÐéÈç¹û±¸×¢²áÁ´½Ó £¬ÒªÇóËûÃÇÒÔÖÎÀíÔ±Éí·ÝÔËÐÐPowerShell²¢Õ³Ìù¹¥»÷ÕßÌṩµÄ´úÂë  ¡£Ò»µ©Ö´ÐÐ £¬¸Ã´úÂë»á×°ÖÃÔ¶³Ì×ÀÃæ¹¤¾ß £¬ÏÂÔØÖ¤Êé £¬²¢½«Êܺ¦ÕßÉ豸ע²áµ½Ô¶³Ì·þÎñÆ÷ £¬Ê¹¹¥»÷Õß¿ÉÄÜÖ±½Ó½Ó¼û²¢ÇÔÈ¡Êý¾Ý  ¡£Î¢Èí×Ô2025Äê1ÔÂÆðÔÚÓÐÏÞÁìÓòµÄ¹¥»÷Öй۲쵽ÕâÖÖÕ½Êõ £¬Ö¸±êÉæ¼°¹ú¼ÊÊÂÎñ×éÖ¯¡¢·Çµ±¾Ö×éÖ¯¡¢µ±¾Ö»ú¹¹ºÍýÌ幫˾µÄÓ×ÎÒ  ¡£Î¢ÈíÒÑ֪ͨÊÜÓ°Ïì¿Í»§ £¬²¢ÖÒ¸æÆäËûÈ˰ÑÎÈÕâÒ»ÐÂÕ½Êõ £¬ÉóÉ÷¶Ô´ýËùÓÐδ¾­ÒªÇóµÄͨѶ  ¡£Óû§Ó¦³ö¸ñÓ×ÐÄÔÚÏ߸´Ôì²¢Ö´ÐдúÂëµÄÒªÇó £¬ÓÈÆäÊÇÔÚÒÔÖÎÀíԱȨÏÞÖ´ÐÐʱ  ¡£


https://www.bleepingcomputer.com/news/security/dprk-hackers-dupe-targets-into-typing-powershell-commands-as-admin/


4. ¶íÂÞ˹ºÚ¿Í×éÖ¯APT44·ÖÖ§¡°±´¿Ç±©Ñ©¡±È«Çò¹¥»÷»î¶¯½ÒÃØ


2ÔÂ12ÈÕ £¬¶íÂÞ˹µ±¾ÖÖ§³ÖµÄºÚ¿Í×éÖ¯APT44µÄÒ»¸ö·ÖÖ§ £¬±»³ÆÎª¡°±´¿Ç±©Ñ©¡±»ò¡°É³³æ¡± £¬×Ô2021ÄêÒÔÀ´Ò»Ïò»îÔ¾ÓÚÕë¶Ô³ÁÒª×éÖ¯ºÍµ±¾ÖµÄÍøÂç¹¥»÷ÖÐ £¬³ö¸ñÊÇÔÚÄÜÔ´¡¢Ê¯ÓͺÍÌìÈ»Æø¡¢µçÐÅ¡¢º½Ô˺ͱøÆ÷Ôì×÷ÁìÓò  ¡£¸Ã×éÖ¯ÖÂÁ¦ÓÚ»ñȡָ±êϵͳµÄ³õʼ½Ó¼ûȨÏÞ £¬²¢³ÉÁ¢ÓƾÃÐÔÒÔά³Ö´æÔÚ £¬ÒÔ±ãÆäËûAPT44×Ó×éÊÕÊÜ  ¡£Î¢ÈíÍþвµý±¨ÍŶӹ۲쵽 £¬¸Ã×éÖ¯Õë¶ÔÎÚ¿ËÀ¼¡¢Å·ÖÞ¡¢ÖÐÑÇ¡¢ÄÏÑǺÍÖж«µØÓòµÄ¹Ø¼üÁìÓò·¢Õ¹»úÓöÐÔÐж¯ £¬³ö¸ñÊÇÔÚ¶íÂÞ˹ÈëÇÖÎÚ¿ËÀ¼ºó £¬¼ÓÇ¿Á˶ÔÎÚ¿ËÀ¼¹Ø¼ü»ù´¡ÉèÊ©µÄ¹¥»÷  ¡£´Ë±í £¬¸Ã×éÖ¯»¹ÀûÓöàÖÖ¼¼Êõ·ÛËéÍøÂç £¬Ô̺¬ÀûÓÃnÈÕ·ì϶¡¢Æ¾Ö¤ÍµÇԺ͹©¸øÁ´¹¥»÷µÈ  ¡£ÔÚ»ñÈ¡½Ó¼ûȨÏÞºó £¬ºÚ¿Íͨ¹ý²¿Êð×Ô½ç˵Web shell³ÉÁ¢ÓƾÃÐÔ £¬²¢Ê¹ÓúϷ¨µÄITÔ¶³ÌÖÎÀí¹¤¾ßÖ´ÐкÅÁî £¬Í¬Ê±¼ÙÒâITÖÎÀíÔ±ÒÔÌӱܼì²â  ¡£¶ÔÓÚ³õʼ½Ó¼ûºóµÄ»î¶¯ £¬ÍþвÐÐΪÕßÇÔȡʹ´¦¡¢Ð¹Â¶Êý¾Ý £¬²¢Í¨¹ýTorÍøÂç°µ²ØÏÎ½Ó  ¡£×îºó £¬¸Ã×éÖ¯½øÐкáÏòÒÆ¶¯ £¬Åú¸Ä»ù´¡ÉèÊ©ÒÔÂú×ãÆäÔËÓªÐèÒª  ¡£Î¢Èí°µÊ¾ £¬¸Ã¶íÂÞ˹ºÚ¿ÍÓ××éµÄÓ°ÏìÁ¦¿¿½üÈ«Çò £¬²¢·ÖÏíÁËá÷ÁÔ²éÎÊ¡¢¹¥»÷Ö¸±êºÍYARA¹æ¶¨ £¬ÒÔÔ®ÊÖ·ÀÓùÕßʵʱ²¶»ñ²¢×èÖ¹¸ÃÍþвÐÐΪÕߵĻ  ¡£


https://www.bleepingcomputer.com/news/security/badpilot-network-hacking-campaign-fuels-russian-sandworm-attacks/


5. HipshipperÊý°ÙÍòÔËÊä±êÇ©ÆØ¹â £¬Ó×ÎÒÐÅÏ¢°²È«´¹Î£


2ÔÂ11ÈÕ £¬HipshipperÊÇΪeBay¡¢ShopifyºÍÑÇÂíÑ·Âô¼ÒÌṩ¹ú¼ÊÔËÊä·þÎñµÄƽ̨ £¬½üÆÚÔâ·êÁËһ·ÑϳÁµÄÊý¾Ýй¶ÊÂÎñ  ¡£ÔÚ2024Äê12ÔÂÕâ¸ö¹ú¼ÊÔËÊä¶¥·åÔ £¬Cybernews×êÑÐÍŶӷ¢ÏÖHipshipperµÄÒ»¸öδÊܱ£»¤µÄAWS´æ´¢Í°Â¶³öÁ˳¬¹ý1430Íò±Ê¼Í¼ £¬ÖØÒªÔ̺¬ÔËÊä±êÇ©ºÍº£¹ØÉ걨±í £¬Ð¹Â¶ÁËÂò¼ÒµÄÈ«Ãû¡¢¼Òͥסַ¡¢µç»°ºÅÂë¼°¶©µ¥ÏêÇéµÈÓ×ÎÒ¾ßÌåÐÅÏ¢  ¡£ÕâЩй¶µÄÊý¾Ý¿ÉÄܱ»ÍøÂç·¸×ï·Ö×ÓÓÃÓڲ߶¯¸ß¼¶Ú¿Æ­¡¢ÍøÂç´¹µö¹¥»÷»òÓÐÕë¶ÔÐԵĶñÒâÈí¼þ¹¥»÷ £¬Ôö³¤ÁËÊܺ¦ÕßÔâ·êڲƭ¡¢É§ÈÅ¡¢ÍµÇԺ;­¼ÃËðʧµÄ·çÏÕ  ¡£ÐÒÔ˵ÄÊÇ £¬ÔÚCybernewsÁªÏµHipshipperºó £¬¸Ã¹«Ë¾ÊµÊ±¹Ø¹ØÁ˶³öµÄ´æ´¢Í° £¬Ô¤·ÀÁËÊý¾ÝµÄ½øÒ»²½Ð¹Â¶  ¡£ÎªÁËÔ¤·ÀÀàËÆÊÂÎñÔٴβúÉú £¬×êÑÐÈËÔ±½¨ÒéÆóÒµ¼ÓÇ¿½Ó¼û½ÚÔì¡¢¼à¿Ø½Ó¼ûÈÕÖ¾¡¢ÆôÓ÷þÎñÆ÷¶Ë¼ÓÃÜ¡¢Ö´ÐÐSSL/TLS°²È«Í¨Ñ¶ £¬²¢Ë¼¿¼¶¨ÆÚÉ󼯡¢×Ô¶¯°²È«²é³­ºÍÔ±¹¤ÅàѵµÈ°²È«×î¼Ñʵ¼Ê  ¡£Õâ´ÎÊý¾Ýй¶µÄ·¢ÏÖÈÕÆÚΪ2024Äê12ÔÂ2ÈÕ £¬³õ´ÎÅû¶ÓÚ2024Äê12ÔÂ9ÈÕ £¬²¢ÓÚ2025Äê1ÔÂ8ÈÕʵÏÖй¶  ¡£


https://cybernews.com/security/hipshipper-data-leak-exposed-shipping-records/


6. CISA½«WindowsºÍZyxelÉ豸·ì϶Ôö³¤µ½ÒÑÖª±»ÀûÓ÷ì϶Ŀ¼


2ÔÂ12ÈÕ £¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©½üÆÚ¸üÐÂÁËÆäÒÑÖª±»ÀûÓ÷ì϶£¨KEV£©Ä¿Â¼ £¬ÐÂÔöÁËÉæ¼°WindowsºÍZyxelÉ豸µÄ¶à¸ö·ì϶  ¡£ÆäÖÐÔ̺¬Zyxel DSL CPE OSµÄºÅÁî×¢Èë·ì϶CVE-2024-40891ºÍCVE-2024-40890 £¬ÒÔ¼°Microsoft WindowsµÄÁ½¸ö·ì϶£º¸¨ÖúÖ°ÄÜÇý¶¯·¨Ê½µÄWinSock»ùÓڶѵĻº³åÇøÒç¶Âí½ÅCVE-2025-21418ºÍ´æ´¢Á´½Ó¸ú×Ù·ì϶CVE-2025-21391  ¡£CVE-2024-40891ºÍCVE-2024-40890ÔÊÐí¹¥»÷ÕßÔÚδ¾­ÑéÖ¤µÄÇé¿öÏÂÖ´ÐÐËÁÒâºÅÁî £¬¿ÉÄܵ¼ÖÂÉ豸ÊÕÊܵÈÑϳÁºó¹û £¬ÇÒCVE-2024-40891Òѱ»¹Û²ìµ½Êýǧ´Î¹¥»÷³¢ÊÔ  ¡£¶øWindowsµÄÁ½¸ö·ì϶Ҳ±»»ý¼«ÀûÓà £¬CVE-2025-21391ÔÊÐí¹¥»÷Õßɾ³ýÎļþ²¢¿ÉÄܽáºÏ´úÂëÖ´ÐÐÊÕÊÜϵͳ £¬CVE-2025-21418ÔòÔÊÐí¾­¹ýÉí·ÝÑéÖ¤µÄÓû§»ñÈ¡ÏµÍ³ÌØÈ¨  ¡£Î¢ÈíÒÑÔÚ2025Äê2Եݲȫ¸üÐÂÖн¨¸´ÁËÕâÁ½¸öWindows·ì϶ £¬µ«ZyxelÉ豸µÄ·ì϶ÉÐδµÃµ½¹©¸øÉ̽¨¸´ºÍ¹«¿ªÅû¶  ¡£


https://securityaffairs.com/174135/security/u-s-cisa-adds-microsoft-windows-zyxel-device-flaws-known-exploited-vulnerabilities-catalog.htm