Òâ´óÀû¾Æµêס¿ÍÉí·ÝÖ¤¼þÔâ´ó¹æÄ£Ð¹Â¶

°ä²¼¹¦·ò 2025-08-18

1. Òâ´óÀû¾Æµêס¿ÍÉí·ÝÖ¤¼þÔâ´ó¹æÄ£Ð¹Â¶


8ÔÂ14ÈÕ £¬Òâ´óÀûµ±¾Ö½üÈÕ·¢³ö´¹Î£ÖÒ¸æ £¬³Æ¸Ã¹úÊýÍòÃû¾Æµêס¿ÍµÄÉí·ÝÖ¤¼þÐÅÏ¢ÔâÍøÂç·¸×ï·Ö×ÓÇÔÈ¡²¢ÔÚµØÏÂÂÛ̳·¸·¨ÏúÊÛ £¬Òý·¢¶ÔÓ×ÎÒÊý¾Ý°²È«¼°ºóÐøÚ²Æ­·çÏÕµÄ¿í·º¹Ø×¢ ¡£¾ÝÒâ´óÀûÊý×Ö»ú¹¹£¨CERT-AGID£©ÍÆËã»úÓ¦¼±ÏìÓ¦Ó××é´«µÝ £¬Ò»ÃûʹÓá°mydocs¡¹ØË»§µÄÍøÂç·¸×ï·Ö×Ó×ÔÉÏÖÜÆð £¬ÔÚij³ÛÃûµØÏÂÂÛ̳·ÖÅúÊÛÂô³¬¹ý9Íò·Ý¸ßÅųýÃèÎļþ £¬ÕâЩÎļþÔ´×Ô10¼ÒÒâ´óÀû¾Æµê £¬¾ùΪס¿Í½â¾öÈëסʱÌá½»µÄ»¤ÕÕ¡¢¹Ù·½Éí·ÝÖ¤µÈÑéÖ¤×ÊÁϵÄɨÃè¼þ ¡£Ö»¹Ü¾ßÌåÊÜÓ°Ïì¾ÆµêÃû³ÆÎ´±»¹«¿ª £¬ÇÒÊý¾Ý±£ÁôÄêÏÞÉв»Ã÷È· £¬µ«CERT-AGIDÈ·ÈÏÎ¥¹æÐÐΪ¼¯ÖвúÉúÓÚ2025Äê6ÔÂÖÁ7Ô¼ä £¬²¢ÖҸ桰½«À´¼¸Ìì¿ÉÄܳöÏÖ¸ü¶à´ËÀà°¸¼þ¡± ¡£Õâ´ÎÊÂÎñµÄÖ÷Ìâ·çÏÕÔÚÓÚ±»µÁÊý¾ÝµÄDZÔÚÀÄÓà ¡£AGIDÖ¸³ö £¬·¸·¨·Ö×Ó¿ÉÄÜÀûÓÃÕâЩÉí·ÝÖ¤¼þÖ´ÐÐαÔìÎļþ¡¢¿ªÉèÒøÐÐÕË»§¡¢Éç»á¹¤³Ì¹¥»÷¼°Êý×ÖÉí·Ý͵ÇÔµÈÐÐΪ £¬Êܺ¦Õß»ò½«Ãæ¶ÔÑϳÁµÄ¾­¼ÃÓë˾·¨ºó¹û ¡£Îª´Ë £¬Òâ´óÀûµ±¾Ö¶½´Ù½üÆÚÈëס¹ýÒâ´óÀû¾ÆµêµÄ´î¿ÍÇ×êÇ¼à¿ØÓ×ÎÒÐÅÓþ¼Í¼¼°½ðÈÚÕË»§¶¯Ì¬ £¬¾¯ÌèÒÔ×ÔÉíÃûÒåÌáÒéµÄδ¾­ÊÚȨ²Ù×÷ ¡£


https://therecord.media/italy-hotel-guests-possible-data-breach-ids


2. CISA½«N-able N-Central·ì϶Ôö³¤µ½ÒÑÖª±»ÀûÓ÷ì϶Ŀ¼ÖÐ


8ÔÂ14ÈÕ £¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©½üÈÕ½«N-able N-CentralÔ¶³Ì¼à¿ØÓëÖÎÀí£¨RMM£©Æ½Ì¨µÄÁ½¸ö¸ßΣ·ì϶£ºCVE-2025-8875²»°²È«·´ÐòÁл¯·ì϶¡¢CVE-2025-8876ºÅÁî×¢Èë·ì϶ÄÉÈëÆä¡°ÒÑÖª±»ÀûÓ÷ì϶£¨KEV£©¡±Ä¿Â¼ £¬²¢ÒªÇóÁª¹ú»ú¹¹ÔÚ2025Äê8ÔÂ20ÈÕǰʵÏÖ½¨¸´ ¡£N-able N-Central×÷ÎªÃæÏòÍйܷþÎñÌṩÉÌ£¨MSP£©µÄ¿çƽ̨£¨Windows¡¢Apple¡¢Linux£©¶ËµãÖÎÀí¹¤¾ß £¬Æä2025.3.1°æ±¾ÒѰ䲼¹Ø¼ü°²È«²¹¶¡ £¬Ö±½ÓÕë¶ÔÉÏÊöÐèÉí·ÝÑéÖ¤·½¿ÉÀûÓõķì϶ ¡£CISAÇ¿µ÷ £¬Ö»¹Ü·ì϶ÀûÓÃÐèÈÏ֤ǰÌá £¬µ«Î´½¨²¹ÏµÍ³ÈÔ¿ÉÄÜÃæ¶ÔÊý¾Ýй¶¡¢ºÅÁîÖ´ÐеȰ²È«·çÏÕ ¡£³ýN-able·ì϶±í £¬CISAͬÆÚ½«Microsoft Internet Explorer¡¢Office Excel¼°WinRARµÄº¹Çà·ì϶ÁÐÈëKEVĿ¼ÖÐ ¡£


https://securityaffairs.com/181135/security/u-s-cisa-adds-n-able-n-central-flaws-to-its-known-exploited-vulnerabilities-catalog.html


3. ˼¿ÆÖÒ¸æFMC RADIUS·ì϶ÔÊÐíÔ¶³Ì´úÂëÖ´ÐÐ


8ÔÂ15ÈÕ £¬Ë¼¿Æ½üÈÕ°ä²¼°²È«¸üР£¬Õë¶ÔÆä°²È«·À»ðǽÖÎÀíÖÐÐÄ£¨FMC£©Èí¼þ¼°¶à¿î°²È«É豸²úÆ·½¨¸´Á˹²¼Æ12¸ö¸ßΣ°²È«·ì϶ £¬ÆäÖÐ×îÑϳÁµÄCVE-2025-20265·ì϶£¨CVSSÆÀ·Ö10.0£©±»½ç˵Ϊ¡°×î¸ßÑϳÁÐÔ¡± £¬¿ÉÄÜÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÔÚÊÜÓ°ÏìϵͳÉÏÖ´ÐÐËÁÒâ´úÂë ¡£¸Ã·ì϶ԴÓÚFMCµÄRADIUS×ÓϵͳÔÚÉí·ÝÑéÖ¤½×¶Î¶ÔÓû§ÊäÈë²»×ãÓÐЧ´¦Öà £¬µ±É豸ÅäÖÃΪ»ùÓÚWebÖÎÀí½çÃæ¡¢SSHÖÎÀí»òÁ½ÕßµÄRADIUSÉí·ÝÑé֤ʱ £¬¹¥»÷Õß¿Éͨ¹ý·¢ËÍÌØÔìÊäÈ루ÈçÅäÖõÄRADIUS·þÎñÆ÷ÈÏ֤ʹ´¦£©´¥·¢·ì϶ £¬½ø¶øÒÔ¸ßȨÏÞÖ´ÐÐËÁÒâshellºÅÁî ¡£ÊÜÓ°Ïì°æ±¾ÎªË¼¿ÆSecure FMCÈí¼þ7.0.7ºÍ7.7.0 £¬Ä¿Ç°½öÄÜͨ¹ý¹Ù·½²¹¶¡½¨¸´ £¬ÎÞÆäËûһʱ½â¾ö¹æ»® ¡£³ýCVE-2025-20265±í £¬Õâ´Î¸üл¹½¨¸´ÁË11¸ö¸ßΣ·ì϶ £¬¸²¸Ç¶à¿î˼¿Æ°²È«²úÆ· ¡£


https://thehackernews.com/2025/08/cisco-warns-of-cvss-100-fmc-radius-flaw.html


4. Ó¢¹úµçÐŹ©¸øÉÌColtÔâÍøÂç¹¥»÷Ö·þÎñÖжÏ


8ÔÂ16ÈÕ £¬×ܲ¿Î»ÓÚÂ׶صĿƼ¼ÓëµçÕÛ·þÎñÉÌColt Technology Services½üÈÕÔâ·êÍøÂç¹¥»÷ £¬µ¼ÖÂÆäÖ÷Ìâ·þÎñƽ̨³öÏÖ´ó¹æÄ£ÖжÏ ¡£¸Ã¹«Ë¾ÖÜËÄÈ·ÈÏ £¬Òò"ÄÚ²¿ÏµÍ³²úÉúÍøÂçÊÂÎñ" £¬ÆäColt OnlineÖÎÀíÆ½Ì¨¼°Voice APIÓïÒô·þÎñÒÑÈ«ÃæÏÂÏß £¬Ä¿Ç°ÈÔ´¦ÓÚ¸´Ô­½×¶Î ¡£×÷Ϊ¸»´ïͶ×ʼ¯ÍÅÆìϵĿç¹úÆóÒµ £¬ColtÕ¼Óи²¸Ç¹âÏËÍøÂç¡¢ÔÆ·þÎñ¡¢Êý¾ÝÖÐÐļ°°²È«¹¤¾ßµÄ¶àÔª»¯ÒµÎñϵͳ £¬Õâ´ÎÊÂÎñËäδֱ½ÓÓ°Ïì¿Í»§»ù´¡¼Ü¹¹ £¬µ«ÈÔ¶³ö³öµçÐÅ»ù´¡ÉèÊ©Ãæ¶ÔµÄÑϸñ°²È«ÌôÕ½ ¡£¾Ý¹«Ë¾×îÐÂÉêÃ÷ £¬ÆäÍøÂç¼à¿ØÄÜÁ¦ÒÑתΪÊÖ¶¯²Ù×÷ģʽ £¬×Ô¶¯¼à¿ØÏµÍ³µÄÆëÈ«¸´Ô­ÈÔÐ蹦·ò ¡£Colt·½ÃæÇ¿µ÷ £¬Ö»¹Üµ±Ç°ÏìÓ¦¿ìÂÊ¿ÉÄÜ·Å»º £¬µ«¼¼ÊõÍŶÓÕýÈ«Á¦±£ÏÕ¿Í»§·þÎñ £¬²¢½¨ÒéÓû§Í¨¹ýÓʼþ»òµç»°½øÐйµÍ¨ ¡£ÖµÍ×ÌùÐĵÄÊÇ £¬Õâ´Î¹¥»÷²úÉúǰ £¬ColtÔøÒÔ"¼¼ÊõÎÊÌâ"ΪÓɰ䲼ϵÁиüР£¬µ«Î´ÊµÊ±Åû¶ÊÂÎñµÄÍøÂ簲ȫÊôÐÔ £¬Òý°ä·¢½ç¶ÔÐÅϢͨÃ÷¶ÈµÄ¹Ø×¢ ¡£


https://therecord.media/uk-colt-outages-cyber-incident


5. Fundamental Executive Services 5.6Íò»¼ÕßÐÅÏ¢ÔâÇÔ


8ÔÂ16ÈÕ £¬ÃÀ¹úÂíÀïÀ¼Öݳ־û¤Àí»ú¹¹·þÎñÌṩÉÌFundamental Executive Services, LLC½üÈÕÅû¶һ·³Á´óÊý¾Ýй¶ÊÂÎñ £¬Éæ¼°56,325Ãû»¼ÕßÃô¸ÐÐÅÏ¢±»ÇÔ ¡£ÊÂÎñÔ´ÓÚ2024Äê10ÔÂ27ÈÕÖÁ2025Äê1ÔÂ13ÈÕÆÚ¼ä £¬Î´Öª¹¥»÷Õßδ¾­ÊÚȨ½Ó¼ûÆäÍøÂç £¬µ«¸Ã¹«Ë¾Ö±ÖÁ2025Äê1ÔÂ20Èղžõ²ìÒì³£ £¬ÑÓ³¤¼ì²â½üÈý¸öÔ ¡£Æ¾¾ÝFundamentalÏòÃÀ¹úÎÀÉúÓ빫¼Ò·þÎñ²¿£¨HHS£©Ìá½»µÄ¸üл㱨¼°°ä²¼µÄÐÂΟå £¬Ð¹Â¶Êý¾Ýº­¸Ç»¼ÕßÐÕÃû¡¢Éç»á°²È«ºÅÂë¡¢¼ÝÊ»ÅÆÕÕ/Öݼø±ðºÅÂë¡¢½ðÈÚÕË»§ÐÅÏ¢¡¢µ®ÉúÈÕÆÚ¡¢Ò½ÁƼͼ¡¢½¡È«±£ÏÕµ¥ºÅÂë¼°Ò½ÁƱ£ÏÕ/Ò½ÁƲ¹Öú´òËãÐÅÏ¢µÈ¸ß¶ÈÃô¸ÐÄÚÈÝ ¡£Õâ´ÎÊÂÎñ²¨¼°¸Ã¹«Ë¾ÆìÏÂÊýÊ®¼Ò»¤Àí»ú¹¹ £¬Ô̺¬°¢À­Äª¸ßµØ½¡È«Ó뿵¸´ÖÐÐÄ¡¢±¾ÄÚ´Äά¶û½¡È«Ó뿵¸´ÖÐÐÄ¡¢À­Ë¹Î¬¼Ó˹µØÆ½Ïßר¿ÆÒ½ÔºµÈ±é²¼È«ÃÀµÄ³Ö¾Ã»¤ÀíÉèÊ© ¡£Ä¿Ç° £¬FundamentalÒÑͨ¹ýÍøÕ¾°ä²¼´úÌæÍ¨Öª £¬²¢³ÐŵΪÊÜÓ°Ïì¸ö±ðÌṩÐÅÓþ¼à¿Ø·þÎñ £¬µ«Î´Ìá¼°ÊÇ·ñ¶ÔµÚÈý·½¹©¸øÉ̽øÐÐ×·Ôð»òÉý¼¶°²È«´ëÊ© ¡£


https://databreaches.net/2025/08/16/data-breach-at-fundamental-administrative-services-affected-56235-patients-at-long-term-care-facilities/?pk_campaign=feed&pk_kwd=data-breach-at-fundamental-administrative-services-affected-56235-patients-at-long-term-care-facilities


6. ¶íÂÞ˹ºÚ¿Í×éÖ¯EncryptHubÀûÓÃWindows·ì϶·¢ÆðÍøÂç¹¥»÷


8ÔÂ16ÈÕ £¬¶íÂÞ˹ºÚ¿Í×éÖ¯EncryptHub£¨±ðºÅLARVA-208¡¢Water Gamayun£©Õýͨ¹ýÒѽ¨²¹µÄMicrosoft Windows·ì϶£¨CVE-2025-26633£©·¢ÆðÐÂÒ»ÂÖ¹¥»÷ £¬½áºÏÉç»á¹¤³ÌѧÓëϵͳ·ì϶ִÐÐÊý¾ÝÇÔÈ¡ ¡£¾ÝTrustwave SpiderLabs×êÑÐ £¬¸Ã×éÖ¯×Ô2024ÄêÖÐÆÚ»îÔ¾ÒÔÀ´ £¬ÒÔ¾­¼ÃÀûÒæÎªµ¼Ïò £¬Ñ¡È¡¶àά¶È¼¿Á©Ï°È¾Ö¸±ê £¬Ô̺¬Ðéα¹¤×÷»úÓö¡¢ÎÄÕ¼¯ÉóºË¼°ÈëÇÖSteamÓÎϷƽ̨ £¬½üÆÚ¸üÀûÓÃ΢ÈíÖÎÀí½ÚÔį̀£¨MMC£©¿ò¼Ü·ì϶´«²¼¶ñÒâ¸ºÔØ ¡£×îй¥»÷ÖÐ £¬EncryptHub¼Ù×°³ÉIT²¿ÃÅÏòÖ¸±ê·¢ËÍMicrosoft TeamsÒªÇó £¬ÓÕµ¼Óû§Ö´ÐжñÒâMSCÎļþ ¡£¹¥»÷ÕßÀûÓÃͬÃûÁ¼ÐÔÎļþ¸²¸Ç¶ñÒâMSC £¬´¥·¢CVE-2025-26633·ì϶ºó £¬Í¨¹ýPowerShell¾ç±¾´Ó±í²¿·þÎñÆ÷ÏÂÔØ²¢Ö´ÐÐÇÔÈ¡·¨Ê½Fickle Stealer ¡£¸Ã¶ñÒâÈí¼þÍøÂçϵͳÐÅÏ¢¡¢³ÉÁ¢ÓƾÃÐÔ £¬²¢Óë¼ÓÃܵÄC2·þÎñÆ÷ͨѶÒÔ½Ó¹ÜÖ¸Áî £¬ÉõÖÁÌìÉúÐéαä¯ÀÀÆ÷Á÷Á¿»ìºÏÁ÷Á¿Ìصã ¡£


https://thehackernews.com/2025/08/russian-group-encrypthub-exploits-msc.html