Fortinet³ÎÇåCVE-2025-24472·ÇÁãÈÕ·ì϶  £¬½öCVE-2024-55591±»ÀûÓÃ

°ä²¼¹¦·ò 2025-02-13

1. Fortinet³ÎÇåCVE-2025-24472·ÇÁãÈÕ·ì϶  £¬½öCVE-2024-55591±»ÀûÓÃ


2ÔÂ11ÈÕ  £¬Fortinet½üÈÕÖÒ¸æ³Æ  £¬¹¥»÷ÕßÔÚÀûÓÃFortiOSºÍFortiProxyÖеķì϶À´½Ù³Ö·À»ðǽ²¢ÇÖÈëÆóÒµÍøÂç ¡£µ«ËæºóFortinet֪ͨ  £¬ÐÂÅû¶µÄCVE-2025-24472·ì϶²¢·ÇÁãÈÕ·ì϶  £¬ÇÒÒÑÔÚÒ»Ô·ݽ¨¸´ ¡£Í¬Ê±È·ÈÏ  £¬Ö»ÓÐCVE-2024-55591·ì϶±»ÏÖʵÀûÓà ¡£Èô¿Í»§ÒÑÆ¾¾ÝÏÈǰÁìµ¼Éý¼¶  £¬ÔòÒÑÊܱ£»¤ ¡£CVE-2025-24472·ì϶ÔÊÐíÔ¶³Ì¹¥»÷Õßͨ¹ý¶ñÒâCSF´úÀíÒªÇó»ñµÃ³¬µÈÖÎÀíԱȨÏÞ  £¬Ó°ÏìFortiOS 7.0.0ÖÁ7.0.16¼°FortiProxy²¿ÃŰ汾  £¬ÒÑÔÚ¸üа汾Öн¨¸´ ¡£¹¥»÷Õß»¹ÀûÓÃCVE-2024-55591·ì϶ÔÚÉ豸ÉÏ´´½¨Ëæ»úÖÎÀíÔ¹ØË»§  £¬Åú¸ÄÅäÖà  £¬²¢Í¨¹ý¶ñÒâÕÊ»§½Ó¼ûSSLVPN ¡£ÍøÂ簲ȫ¹«Ë¾Arctic Wolf»ã±¨ÁËÓйع¥»÷»î¶¯  £¬Ô̺¬·ì϶ɨÃè¡¢¿úËÅ¡¢SSL VPNÅäÖü°ºáÏòÒÆ¶¯µÈ½×¶Î  £¬²¢½¨Òé½ûÓù«¹²½Ó¿ÚÉϵķÀ»ðǽÖÎÀí½Ó¼û ¡£Fortinet½¨ÒéÎÞ·¨µ±¼´¸üеÄÖÎÀíÔ±½ûÓÃHTTP/HTTPSÖÎÀí½çÃæ»òÏ޶ȽӼûIPµØÖ·×÷Ϊһʱ½â¾ö²½Öè ¡£


https://www.bleepingcomputer.com/news/security/fortinet-discloses-second-firewall-auth-bypass-patched-in-january/


2. ÀûÓþɰæ ThinkPHP ºÍ ownCloud ·ì϶µÄ¹¥»÷¼¤Ôö


2ÔÂ12ÈÕ  £¬½üÆÚºÚ¿Í»î¶¯³öÏÖÔö³¤Ç÷Ïò  £¬ËûÃÇÖØÒªÕë¶ÔÒ×ÊÜ2022ÄêºÍ2023Äê¾É°²È«ÎÊÌâÓ°ÏìµÄ¡¢ÊØ»¤²»ÉƵÄÉ豸ÌáÒé¹¥»÷ ¡£¾ÝÍþв¼à¿ØÆ½Ì¨GreyNoise»ã±¨  £¬ÀûÓÃCVE-2022-47945ºÍCVE-2023-49103·ì϶µÄ¹¥»÷ÐÐΪÕßÊýÁ¿¼¤Ôö ¡£CVE-2022-47945Éæ¼°ThinkPHP¿ò¼ÜµÄ±¾µØÎļþÔ̺¬£¨LFI£©ÎÊÌâ  £¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÖ´ÐÐËÁÒâ²Ù×÷ϵͳºÅÁ¶øCVE-2023-49103ÔòÓ°Ï쿪ԴÎļþ¹²ÏíÈí¼þownCloud  £¬ºÚ¿Í¿Éͨ¹ý¸Ã·ì϶ÇÔÈ¡Ãô¸ÐÐÅÏ¢ ¡£Ö»¹ÜÕâЩ·ì϶µÄ·ì϶Ԥ²âÆÀ·Öϵͳ£¨EPSS£©ÆÀ·Ö½ÏµÍ  £¬ÇÒδȫÊýÁÐÈëCISAµÄÒÑÖªÀûÓ÷ì϶£¨KEV£©Ä¿Â¼  £¬µ«GreyNoiseÒѹ۲쵽´óÁ¿Î¨Ò»IPÊÔIJÀûÓÃÕâЩ·ì϶  £¬ÇһÓÐËùÔö³¤ ¡£Îª±£»¤ÏµÍ³  £¬½¨ÒéÓû§Éý¼¶µ½ThinkPHP 6.0.14»ò¸ü¸ß°æ±¾  £¬½«ownCloud GraphAPIÉý¼¶µ½0.3.1¼°¸üа汾  £¬²¢½«Ç±ÔÚÒ×Êܹ¥»÷µÄÊ·ýÍÑ»ú»òÖÃÓÚ·À»ðǽºóÃæ ¡£


https://www.bleepingcomputer.com/news/security/surge-in-attacks-exploiting-old-thinkphp-and-owncloud-flaws/


3. KimsukyѡȡClickFixÕ½ÊõÌáÒéÐÂÐÍÍøÂç¹¥»÷


2ÔÂ12ÈÕ  £¬³¯Ïʹú¶ÈÑÝÔ±¡°Kimsuky¡±½üÆÚѡȡÁËÒ»ÖÖÊÜClickFix»î¶¯Æô·¢µÄÐÂÕ½Êõ½øÐÐÍøÂç¹¥»÷ ¡£ClickFixÊÇÒ»ÖÖÉç»á¹¤³ÌÕ½Êõ  £¬Í¨¹ýºýŪÐÔÃýÎóÐÂÎÅ»òÌáÐÑÓÕµ¼Êܺ¦ÕßÖ´ÐжñÒâ´úÂë  £¬³£ÓÃÓÚ´«²¼ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ ¡£Kimsuky¼Ù×°³Éº«¹úµ±¾Ö¹ÙÔ±  £¬ÓëÖ¸±ê³ÉÁ¢ÐÅÀµºó  £¬·¢ËÍ´øÓÐPDF¸½¼þµÄÓã²æÊ½ÍøÂç´¹µöµç×ÓÓʼþ ¡£È»¶ø  £¬ÕâЩPDFÎĵµÏÖʵÉÏÊèµ¼Êܺ¦Õß½Ó¼ûÐéÈç¹û±¸×¢²áÁ´½Ó  £¬ÒªÇóËûÃÇÒÔÖÎÀíÔ±Éí·ÝÔËÐÐPowerShell²¢Õ³Ìù¹¥»÷ÕßÌṩµÄ´úÂë ¡£Ò»µ©Ö´ÐÐ  £¬¸Ã´úÂë»á×°ÖÃÔ¶³Ì×ÀÃæ¹¤¾ß  £¬ÏÂÔØÖ¤Êé  £¬²¢½«Êܺ¦ÕßÉ豸ע²áµ½Ô¶³Ì·þÎñÆ÷  £¬Ê¹¹¥»÷Õß¿ÉÄÜÖ±½Ó½Ó¼û²¢ÇÔÈ¡Êý¾Ý ¡£Î¢Èí×Ô2025Äê1ÔÂÆðÔÚÓÐÏÞÁìÓòµÄ¹¥»÷Öй۲쵽ÕâÖÖÕ½Êõ  £¬Ö¸±êÉæ¼°¹ú¼ÊÊÂÎñ×éÖ¯¡¢·Çµ±¾Ö×éÖ¯¡¢µ±¾Ö»ú¹¹ºÍýÌ幫˾µÄÓ×ÎÒ ¡£Î¢ÈíÒÑ֪ͨÊÜÓ°Ïì¿Í»§  £¬²¢ÖÒ¸æÆäËûÈ˰ÑÎÈÕâÒ»ÐÂÕ½Êõ  £¬ÉóÉ÷¶Ô´ýËùÓÐδ¾­ÒªÇóµÄͨѶ ¡£Óû§Ó¦³ö¸ñÓ×ÐÄÔÚÏ߸´Ôì²¢Ö´ÐдúÂëµÄÒªÇó  £¬ÓÈÆäÊÇÔÚÒÔÖÎÀíԱȨÏÞÖ´ÐÐʱ ¡£


https://www.bleepingcomputer.com/news/security/dprk-hackers-dupe-targets-into-typing-powershell-commands-as-admin/


4. ¶íÂÞ˹ºÚ¿Í×éÖ¯APT44·ÖÖ§¡°±´¿Ç±©Ñ©¡±È«Çò¹¥»÷»î¶¯½ÒÃØ


2ÔÂ12ÈÕ  £¬¶íÂÞ˹µ±¾ÖÖ§³ÖµÄºÚ¿Í×éÖ¯APT44µÄÒ»¸ö·ÖÖ§  £¬±»³ÆÎª¡°±´¿Ç±©Ñ©¡±»ò¡°É³³æ¡±  £¬×Ô2021ÄêÒÔÀ´Ò»Ïò»îÔ¾ÓÚÕë¶Ô³ÁÒª×éÖ¯ºÍµ±¾ÖµÄÍøÂç¹¥»÷ÖÐ  £¬³ö¸ñÊÇÔÚÄÜÔ´¡¢Ê¯ÓͺÍÌìÈ»Æø¡¢µçÐÅ¡¢º½Ô˺ͱøÆ÷Ôì×÷ÁìÓò ¡£¸Ã×éÖ¯ÖÂÁ¦ÓÚ»ñȡָ±êϵͳµÄ³õʼ½Ó¼ûȨÏÞ  £¬²¢³ÉÁ¢ÓƾÃÐÔÒÔά³Ö´æÔÚ  £¬ÒÔ±ãÆäËûAPT44×Ó×éÊÕÊÜ ¡£Î¢ÈíÍþвµý±¨ÍŶӹ۲쵽  £¬¸Ã×éÖ¯Õë¶ÔÎÚ¿ËÀ¼¡¢Å·ÖÞ¡¢ÖÐÑÇ¡¢ÄÏÑǺÍÖж«µØÓòµÄ¹Ø¼üÁìÓò·¢Õ¹»úÓöÐÔÐж¯  £¬³ö¸ñÊÇÔÚ¶íÂÞ˹ÈëÇÖÎÚ¿ËÀ¼ºó  £¬¼ÓÇ¿Á˶ÔÎÚ¿ËÀ¼¹Ø¼ü»ù´¡ÉèÊ©µÄ¹¥»÷ ¡£´Ë±í  £¬¸Ã×éÖ¯»¹ÀûÓöàÖÖ¼¼Êõ·ÛËéÍøÂç  £¬Ô̺¬ÀûÓÃnÈÕ·ì϶¡¢Æ¾Ö¤ÍµÇԺ͹©¸øÁ´¹¥»÷µÈ ¡£ÔÚ»ñÈ¡½Ó¼ûȨÏÞºó  £¬ºÚ¿Íͨ¹ý²¿Êð×Ô½ç˵Web shell³ÉÁ¢ÓƾÃÐÔ  £¬²¢Ê¹ÓúϷ¨µÄITÔ¶³ÌÖÎÀí¹¤¾ßÖ´ÐкÅÁî  £¬Í¬Ê±¼ÙÒâITÖÎÀíÔ±ÒÔÌӱܼì²â ¡£¶ÔÓÚ³õʼ½Ó¼ûºóµÄ»î¶¯  £¬ÍþвÐÐΪÕßÇÔȡʹ´¦¡¢Ð¹Â¶Êý¾Ý  £¬²¢Í¨¹ýTorÍøÂç°µ²ØÏνÓ ¡£×îºó  £¬¸Ã×éÖ¯½øÐкáÏòÒÆ¶¯  £¬Åú¸Ä»ù´¡ÉèÊ©ÒÔÂú×ãÆäÔËÓªÐèÒª ¡£Î¢Èí°µÊ¾  £¬¸Ã¶íÂÞ˹ºÚ¿ÍÓ××éµÄÓ°ÏìÁ¦¿¿½üÈ«Çò  £¬²¢·ÖÏíÁËá÷ÁÔ²éÎÊ¡¢¹¥»÷Ö¸±êºÍYARA¹æ¶¨  £¬ÒÔÔ®ÊÖ·ÀÓùÕßʵʱ²¶»ñ²¢×èÖ¹¸ÃÍþвÐÐΪÕߵĻ ¡£


https://www.bleepingcomputer.com/news/security/badpilot-network-hacking-campaign-fuels-russian-sandworm-attacks/


5. HipshipperÊý°ÙÍòÔËÊä±êÇ©ÆØ¹â  £¬Ó×ÎÒÐÅÏ¢°²È«´¹Î£


2ÔÂ11ÈÕ  £¬HipshipperÊÇΪeBay¡¢ShopifyºÍÑÇÂíÑ·Âô¼ÒÌṩ¹ú¼ÊÔËÊä·þÎñµÄƽ̨  £¬½üÆÚÔâ·êÁËһ·ÑϳÁµÄÊý¾Ýй¶ÊÂÎñ ¡£ÔÚ2024Äê12ÔÂÕâ¸ö¹ú¼ÊÔËÊä¶¥·åÔ  £¬Cybernews×êÑÐÍŶӷ¢ÏÖHipshipperµÄÒ»¸öδÊܱ£»¤µÄAWS´æ´¢Í°Â¶³öÁ˳¬¹ý1430Íò±Ê¼Í¼  £¬ÖØÒªÔ̺¬ÔËÊä±êÇ©ºÍº£¹ØÉ걨±í  £¬Ð¹Â¶ÁËÂò¼ÒµÄÈ«Ãû¡¢¼Òͥסַ¡¢µç»°ºÅÂë¼°¶©µ¥ÏêÇéµÈÓ×ÎÒ¾ßÌåÐÅÏ¢ ¡£ÕâЩй¶µÄÊý¾Ý¿ÉÄܱ»ÍøÂç·¸×ï·Ö×ÓÓÃÓڲ߶¯¸ß¼¶Ú¿Æ­¡¢ÍøÂç´¹µö¹¥»÷»òÓÐÕë¶ÔÐԵĶñÒâÈí¼þ¹¥»÷  £¬Ôö³¤ÁËÊܺ¦ÕßÔâ·êڲƭ¡¢É§ÈÅ¡¢ÍµÇԺ;­¼ÃËðʧµÄ·çÏÕ ¡£ÐÒÔ˵ÄÊÇ  £¬ÔÚCybernewsÁªÏµHipshipperºó  £¬¸Ã¹«Ë¾ÊµÊ±¹Ø¹ØÁ˶³öµÄ´æ´¢Í°  £¬Ô¤·ÀÁËÊý¾ÝµÄ½øÒ»²½Ð¹Â¶ ¡£ÎªÁËÔ¤·ÀÀàËÆÊÂÎñÔٴβúÉú  £¬×êÑÐÈËÔ±½¨ÒéÆóÒµ¼ÓÇ¿½Ó¼û½ÚÔì¡¢¼à¿Ø½Ó¼ûÈÕÖ¾¡¢ÆôÓ÷þÎñÆ÷¶Ë¼ÓÃÜ¡¢Ö´ÐÐSSL/TLS°²È«Í¨Ñ¶  £¬²¢Ë¼¿¼¶¨ÆÚÉ󼯡¢×Ô¶¯°²È«²é³­ºÍÔ±¹¤ÅàѵµÈ°²È«×î¼Ñʵ¼Ê ¡£Õâ´ÎÊý¾Ýй¶µÄ·¢ÏÖÈÕÆÚΪ2024Äê12ÔÂ2ÈÕ  £¬³õ´ÎÅû¶ÓÚ2024Äê12ÔÂ9ÈÕ  £¬²¢ÓÚ2025Äê1ÔÂ8ÈÕʵÏÖй¶ ¡£


https://cybernews.com/security/hipshipper-data-leak-exposed-shipping-records/


6. CISA½«WindowsºÍZyxelÉ豸·ì϶Ôö³¤µ½ÒÑÖª±»ÀûÓ÷ì϶Ŀ¼


2ÔÂ12ÈÕ  £¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©½üÆÚ¸üÐÂÁËÆäÒÑÖª±»ÀûÓ÷ì϶£¨KEV£©Ä¿Â¼  £¬ÐÂÔöÁËÉæ¼°WindowsºÍZyxelÉ豸µÄ¶à¸ö·ì϶ ¡£ÆäÖÐÔ̺¬Zyxel DSL CPE OSµÄºÅÁî×¢Èë·ì϶CVE-2024-40891ºÍCVE-2024-40890  £¬ÒÔ¼°Microsoft WindowsµÄÁ½¸ö·ì϶£º¸¨ÖúÖ°ÄÜÇý¶¯·¨Ê½µÄWinSock»ùÓڶѵĻº³åÇøÒç¶Âí½ÅCVE-2025-21418ºÍ´æ´¢Á´½Ó¸ú×Ù·ì϶CVE-2025-21391 ¡£CVE-2024-40891ºÍCVE-2024-40890ÔÊÐí¹¥»÷ÕßÔÚδ¾­ÑéÖ¤µÄÇé¿öÏÂÖ´ÐÐËÁÒâºÅÁî  £¬¿ÉÄܵ¼ÖÂÉ豸ÊÕÊܵÈÑϳÁºó¹û  £¬ÇÒCVE-2024-40891Òѱ»¹Û²ìµ½Êýǧ´Î¹¥»÷³¢ÊÔ ¡£¶øWindowsµÄÁ½¸ö·ì϶Ҳ±»»ý¼«ÀûÓà  £¬CVE-2025-21391ÔÊÐí¹¥»÷Õßɾ³ýÎļþ²¢¿ÉÄܽáºÏ´úÂëÖ´ÐÐÊÕÊÜϵͳ  £¬CVE-2025-21418ÔòÔÊÐí¾­¹ýÉí·ÝÑéÖ¤µÄÓû§»ñÈ¡ÏµÍ³ÌØÈ¨ ¡£Î¢ÈíÒÑÔÚ2025Äê2Եݲȫ¸üÐÂÖн¨¸´ÁËÕâÁ½¸öWindows·ì϶  £¬µ«ZyxelÉ豸µÄ·ì϶ÉÐδµÃµ½¹©¸øÉ̽¨¸´ºÍ¹«¿ªÅû¶ ¡£


https://securityaffairs.com/174135/security/u-s-cisa-adds-microsoft-windows-zyxel-device-flaws-known-exploited-vulnerabilities-catalog.htm