Framework LinuxµçÄÔUEFI°²È«·ìÏ¶ÆØ¹â

°ä²¼¹¦·ò 2025-10-16

1. Framework LinuxµçÄÔUEFI°²È«·ìÏ¶ÆØ¹â


10ÔÂ14ÈÕ£¬ÃÀ¹úÓ²¼þ³§ÉÌFramework³ö²úµÄÔ¼20Íǫ̀LinuxµçÄÔÒò³ö³§Ô¤×°º¬¡°ÄÚ´æÅú¸Ä¡±£¨mm£©ºÅÁîµÄÒÑÊðÃûUEFI±í¿Ç×é¼þ£¬´æÔÚÑϳÁ°²È«·ì϶£¬¿ÉÄܱ»¹¥»÷ÕßÀûÓÃÈÆ¹ý°²È«Æô¶¯±£»¤¡£¾Ý¹Ì¼þ°²È«¹«Ë¾Eclypsium·ÖÎö£¬¸ÃmmºÅÁîÕý±¾ÓÃÓڵͼ¶Õï¶ÏºÍ¹Ì¼þµ÷ÊÔ£¬¿ÉÖ±½Ó¶ÁдϵͳÄڴ棬µ«¿É±»ÀÄÓÃÕë¶ÔgSecurity2±äÁ¿£¨UEFIÄ£¿éÊðÃûÑéÖ¤µÄ¹Ø¼ü×é¼þ£©£¬Í¨¹ý¸²¸ÇÆäֵΪNULL»ò³Á¶¨ÏòÖÁÎÞÑéÖ¤º¯Êý£¬´Ó¶ø½ûÓÃÊðÃûÑéÖ¤»úÔì¡£¹¥»÷Õß¿Éͨ¹ý´Ë·ì϶¼ÓÔØBlackLotus¡¢HybridPetya¡¢BootkittyµÈ¶ñÒâÊèµ¼¹¤¾ß°ü£¬ÕâЩ¹¤¾ß¿É¶ã±Ü²Ù×÷ϵͳ¼¶°²È«½ÚÔ죬ÔÚϵͳ³Á×°ºóÈÔ³ÖÐø´æÔÚ£¬ÐγÉÄÑÒԶϸùµÄÓÆ¾ÃÐÔÍþв¡£·ì϶ӰÏìÁìÓòº­¸ÇFramework 13¼°16ϵÁеĶà¿îÐͺÅ£¬Ô̺¬IntelµÚ11-13´ú¡¢AMD Ryzen 7040/AI 300µÈ´¦ÖÃÆ÷°æ±¾£¬¾ßÌ彨¸´°æ±¾ÒÑÃ÷È·£¬Èç13´úIntel°æ±¾ÔÚ3.08°æ½¨¸´¡¢AMD Ryzen AI 300ÔÚ3.04°æ½¨¸´¡£


https://www.bleepingcomputer.com/news/security/secure-boot-bypass-risk-on-nearly-200-000-linux-framework-sytems/


2. 800ÃÀÔªÉ豸¼´¿ÉÀ¹½ØÎÀÐÇͨѶÊý¾Ý


10ÔÂ14ÈÕ£¬¼ÓÖÝ´óѧʥµØÑǸç·ÖУÓëÂíÀïÀ¼´óѧ½áºÏ×êÑнÒʾ£¬È«ÇòÔ¼°ëÊýÎÀÐÇͨѶÒòδ¼ÓÃÜÃæ¶ÔÑϳÁ°²È«·çÏÕ£¬½öÐè¼ÛÖµÔ¼800ÃÀÔªµÄÏÖ³ÉÉ豸¼´¿ÉÖ´ÐÐÀ¹½Ø¡£×êÑÐÍŶÓÔÚÊ¥µØÑǸç·ÖУÎݶ¥×é×°ÎÀÐǽӹÜϵͳ£¬Ô̺¬185ÃÀÔªÌìÏßµú¡¢140ÃÀÔªÖ§¼Ü¡¢195ÃÀÔªÂí´ï¼°230ÃÀÔªµ÷г¿¨£¬³É¹¦¶Ô×¼µØÇòͬ²½ÎÀÐǺó£¬ÊµÊ±²¶»ñÁËδ¼ÓÃܵĸöÈËÊý¾Ý¡£×êÑÐÏÔʾ£¬µçÐÅÔËÓªÉÌͨ¹ýÎÀÐÇÏÎ½ÓÆ«Ô¶»ùÕ¾ÓëÖ÷ÌâÍøÂçʱ£¬Êý¾Ý´«ÊäÆÕ±éδ¼ÓÃÜ¡£ÎÀÐǸ²¸ÇµØÇò±í±í»ý40%µÄ¸öÐÔ£¬Ê¹µÃÈκδ¦ÓÚ¸²¸ÇÁìÓòÄÚµÄÈËÔ±¾ù¿ÉÀ¹½ØÊý¾Ý¡£ÔÚÈýÄê×êÑÐÆÚ¼ä£¬ÍŶÓÍøÂçµ½´óÁ¿Î´Êܱ£»¤Í¨Ñ¶£¬Ô̺¬T-Mobile¡¢AT&TÄ«Î÷¸ç¼°Ä«Î÷¸çµçÐÅÓþ»§µÄͨ»°Óë¶ÌÐÅ£»º½°à³Ë¿ÍµÄWiFiä¯ÀÀ¼Í¼£»µçÁ¦¹«Ë¾¡¢Ê¯ÓÍÆ½Ì¨µÄÄÚ²¿ÐÅÏ¢£»ÒÔ¼°ÃÀ¹úºÍÄ«Î÷¸ç¾ü·½ÏµÍ³µÄ´«ÊäÄÚÈÝ¡£¾ßÌå¶³öµÄÊý¾Ýº­¸ÇÃÀ¹úˮʦ½¢´¬±êʶÓëÍøÂçÊý¾Ý¡¢Ä«Î÷¸ç¾ü·½µý±¨»ã±¨¡¢·É»úÊØ»¤ÈÕÖ¾¡¢ÊµÊ±¶Ó¸÷λÏàÐÅÏ¢£¬ÉõÖÁÄ«Î÷¸ç¹ú¶ÈµçÁ¦¹«Ë¾µÄÓû§ÐÅÏ¢¡¢¹¤×÷¶©µ¥¼°°²È«»ã±¨£¬²¿ÃÅÃÀ¹ú¹¤Òµ½ÚÔìϵͳÔËÐÐÊý¾ÝÒà±»²¶»ñ¡£


https://cybernews.com/security/satellite-surveillance-encryption-research/


3. CapitaÒòÊý¾Ýй¶ÊÂÎñÖ§¸¶1400ÍòÓ¢°÷


10ÔÂ15ÈÕ£¬Ó¢¹úÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©½üÈÕ¶ÔÊý¾ÝÇý¶¯ÒµÎñÁ÷³Ì·þÎñÌṩÉÌCapita´¦ÒÔ1400ÍòÓ¢°÷£¨Ô¼1870ÍòÃÀÔª£©·£¿î£¬ÆðÒòÊÇ2023Äê²úÉúµÄһ·ӰÏì660ÍòÈ˵ijÁ´óÊý¾Ýй¶ÊÂÎñ¡£Õâ´Î´¦·£Éæ¼°Capita plc¼°Æä×Ó¹«Ë¾Capita Pension Solutions Limited£¬±ðÀë±»·£800ÍòºÍ600ÍòÓ¢°÷£¬½Ï³õʼ4500ÍòÓ¢°÷µÄÄâ·£½ð¶î´ó·ùϵ÷£¬Òò¸Ã¹«Ë¾Òѳе£ÔðÈΡ¢Ö´Ðа²È«¸Ä½ø²¢×Ô¶¯ÏòÊÜÓ°ÏìÕßÌṩÊý¾Ý±£»¤·þÎñ¡£×÷ΪӢ¹ú´óÐͱí°üºÍרҵ·þÎñ¹«Ë¾£¬CapitaÕ¼ÓÐÔ¼3.4ÍòÃûÔ±¹¤¡¢ÄêÊÕÈë´ï30ÒÚÓ¢°÷£¬¿Í»§º­¸Ç´¦ËùÒé»á¡¢NHS¡¢¹ú·À²¿¼°ÒøÐÓ×¢µçÐŵÈÐÐÒµ¡£ÊÂÎñÔ´ÓÚ2023Äê3ÔÂ22ÈÕÒ»ÃûÔ±¹¤ÏÂÔØ¶ñÒâÎļþ£¬µ¼ÖºڿÍÈëÇÔìäMicrosoft 365»·¾³¡£Ö»¹Ü·ì϶ÔÚ10·ÖÖÓÄÚ±»¼ì²â£¬µ«Capitaδʵʱ¸ôÀëÊÜϰȾÉ豸£¬Ê¹¹¥»÷ÕßµÃÒÔÔÚ58Ó×ʱÄÚºáÏòÒÆ¶¯£¬×îÖÕÇÔÈ¡½ü1TBÊý¾Ý²¢²¿ÊðÀÕË÷Èí¼þ¡£Black BastaÍÅ»ïÐû³Æ¶Ô´ËÕÆ¹Ü£¬Íþвй¶Êý¾Ý¡£


https://www.bleepingcomputer.com/news/security/capita-to-pay-14-million-for-data-breach-impacting-66-million-people/


4. Slider Revolution²å¼þ·ì϶ӰÏìÊý°ÙÍòWordPressÍøÕ¾


10ÔÂ15ÈÕ£¬»îÔ¾×°Öó¬400ÍòµÄWordPress»¬¿é²å¼þSlider Revolution½üÈÕ±»ÆØ³ö±àºÅΪCVE-2025-9217µÄ°²È«·ì϶£¬Ó°Ïì6.7.36¼°ÒÔÉÏËùÓа汾¡£¸Ã·ì϶ԴÓÚ²å¼þÖÓ×°used_svg¡±ºÍ¡°used_images¡±Á½¸ö²ÎÊýµÄÑé֤ȱµã£¬ÕâÁ½¸ö²ÎÊýÓÃÓÚÖÎÀíͼÏñ/ÊÓÆµµ¼³öÖ°ÄÜ¡£ÓÉÓÚδÑϸñÏÞ¶ÈÎļþÀàÐͺÍõè¾¶£¬¹¥»÷Õß¿ÉÀûÓô˷ì϶¶ÁÈ¡·þÎñÆ÷ÉϵÄËÁÒâÎļþ£¬Ô̺¬´æ´¢Êý¾Ý¿âÍ´´¦ºÍ¼ÓÃÜÃÜÔ¿µÄwp-config.phpÎļþ£¬ÍþÐ²ÍøÕ¾Êý¾Ý°²È«¡£°²È«·ÖÎöʦƾ¾ÝͨÓ÷ì϶ÆÀ·Öϵͳ£¨CVSS£©ÆÀ¶¨¸Ã·ì϶Ϊ6.5·Ö£¬ÊôÓÚÖеÈÑϳÁÐÔ¡£·ì϶ÓɶÀÁ¢×êÑÐÔ±¡°stealthcopter¡±ÓÚ2025Äê8ÔÂ11ÈÕͨ¹ýWordfence·ì϶Éͽð´òËã³õ´Î»ã±¨¡£WordfenceÍŶÓÔÚ8ÔÂ19ÈÕʵÏÖÑéÖ¤ºó£¬½«ÏêÇé´«µÝ¸ø²å¼þ¿ª·¢ÉÌThemePunch¡£¿ª·¢ÍŶÓѸ¿ìÏìÓ¦£¬ÔÚÁ½ÌìÄÚÈ·ÈÏÎÊÌâ²¢Æô¶¯½¨¸´¹¤×÷£¬×îÖÕÓÚ8ÔÂ28ÈÕ°ä²¼6.7.37°æ±¾³¹µ×½¨¸´·ì϶¡£Îª´Ë£¬×êÑÐÈËÔ±»ñµÃ656ÃÀÔªµÄÉͽð¼Î½±¡£


https://www.infosecurity-magazine.com/news/flaw-slider-revolution-plugin/


5. Î÷°àÑÀʱÉоÞÍ·MANGO´«µÝÓªÏú·þÎñÉÌÊý¾Ýй¶ÊÂÎñ


10ÔÂ15ÈÕ£¬Î÷°àÑÀʱÉÐÁãÊÛÉÌMANGOÏòÈ«Çò¿Í»§·¢ËÍÊý¾Ýй¶֪ͨ£¬Åû¶Æä±í²¿ÓªÏú·þÎñ¹©¸øÉÌÔâ·êÍøÂç¹¥»÷£¬µ¼Ö²¿Ãſͻ§Ó×ÎÒÐÅÏ¢±»·¸·¨½Ó¼û¡£×÷Ϊ³ÉÁ¢ÓÚ1984Äê¡¢ÔÚ120¸ö¹ú¶ÈÕ¼ÓÐ2800¸öÏúÊÛÍøµã¡¢ÄêÊÕÈë33ÒÚÅ·Ôª¡¢Ô±¹¤16300È˵ÄʱÉоÞÍ·£¬MANGOÕâ´ÎÊÂÎñÉæ¼°¿Í»§ÐÕÃû£¨²»º¬ÐÕÊÏ£©¡¢¹ú¶È¡¢ÓÊÕþ±àÂë¡¢µç×ÓÓʼþµØÖ·¼°µç»°ºÅÂëµÅתÏú»î¶¯³£ÓÃÊý¾Ý£¬µ«Ã÷È·ÅųýÐÕÊÏ¡¢ÒøÐÐÕË»§¡¢ÐÅÓþ¿¨ÐÅÏ¢¡¢Éí·ÝÖ¤/»¤ÕÕºÅÂë¼°ÕË»§Æ¾Ö¤µÈ¸ßÃô¸ÐÐÅÏ¢¡£MANGOÇ¿µ÷£¬ÆäÖ÷ÌâÒµÎñϵͳ¼°IT»ù´¡ÉèʩδÊÜÓ°Ï죬¹«Ë¾ÔËӪά³ÖÕý³£¡£ÊÂÎñÔ´ÓÚµÚÈý·½ÓªÏú·þÎñÉ̵ݲȫ·ì϶£¬¹¥»÷Õßͨ¹ý¸Ã·ì϶»ñÈ¡ÁË´æ´¢ÔÚÓªÏúϵͳÖеĿͻ§Êý¾Ý¡£Ö»¹ÜȱʧÐÕÊϽµµÍÁËÖ±½ÓÉí·ÝµÁÓ÷çÏÕ£¬µ«Ð¹Â¶µÄÁªÏµ·½Ê½ÈÔ¿ÉÄܱ»ÓÃÓÚÍøÂç´¹µöµÈ¶þ´Î¹¥»÷¡£ÊÂÎñ²úÉúºó£¬MANGOµ±¼´Æô¶¯ËùÓа²È«ºÍ̸£¬²¢ÏòÎ÷°àÑÀÊý¾Ý±£»¤¾Ö£¨AEPD£©¼°¼à¹Ü²¿ÃŻ㱨¡£ÎªÐ­ÖúÊÜÓ°Ïì¿Í»§£¬¹«Ë¾ÉèÁ¢ÁËרÓÃÓÊÏäºÍÈÈÏߵ绰£¬Ìṩ·çÏÕÕ÷ѯ֧³Ö¡£


https://www.bleepingcomputer.com/news/security/clothing-giant-mango-discloses-data-breach-exposing-customer-info/


6. F5Ôâ·ê¹ú¶È¼¶ºÚ¿ÍÈëÇÖ£¬Î´¹«¿ª·ì϶Դ´úÂëÔâÇÔÈ¡


10ÔÂ15ÈÕ£¬ÃÀ¹úÍøÂ簲ȫ¹«Ë¾F5ÓÚ2025Äê8ÔÂ9ÈÕÅû¶Ôâ·ê¹ú¶È¼¶ºÚ¿ÍÈëÇÖ£¬¹¥»÷Õ߳־ýӼûÆäϵͳ²¢ÇÔÈ¡ÁËÆì½¢²úÆ·BIG-IPµÄδ¹«¿ª°²È«·ì϶¼°Ô´´úÂë¡£µ÷²éÏÔʾ£¬ºÚ¿ÍÈëÇÖÁËF5µÄBIG-IP²úÆ·¿ª·¢»·¾³¼°¹¤³Ì֪ʶÖÎÀíÆ½Ì¨£¬ÇÔÈ¡ÁËÔ̺¬BIG-IP²¿ÃÅÔ´´úÂ롢δ¹«¿ª·ì϶ÐÅÏ¢¼°¿Í»§ÅäÖÃϸ½ÚµÄÎļþ¡£Ö»¹Ü´æÔÚÊý¾Ýй¶£¬µ«F5Ç¿µ÷¹¥»÷ÕßδÀûÓÃÕâЩ·ì϶½øÐÐÏÖʵ¹¥»÷£¬Ò²Î´·¢ÏÖ¹©¸øÁ´·çÏÕ»ò´úÂë±»´Û¸ÄµÄÖ¤¾Ý£¬ÆäCRM¡¢²ÆÕþ¡¢Ö§³Ö°¸ÀýÖÎÀíµÈÔ̺¬¿Í»§Êý¾ÝµÄƽ̨¾ùδÊÜÓ°Ïì¡£ÊÂÎñ²úÉúºó£¬F5Ѹ¿ì²ÉÈ¡²¹¾È´ëÊ©£ºÂÖ»»Æ¾Ö¤¡¢Ç¿»¯½Ó¼û½ÚÔì¡¢²¿Êð×Ô¶¯»¯²¹¶¡ÖÎÀí¹¤¾ß£¬²¢¼ÓÇ¿ÍøÂ簲ȫ¼Ü¹¹¡£¸Ã¹«Ë¾ÓëNCC GroupºÍIOActiveºÏ×÷£¬Í¨¹ý76ÃûÕÕ·÷¶ÔBIG-IP¹Ø¼üÈí¼þ×é¼þ¼°¿ª·¢Á÷³Ì½øÐа²È«Éó²é£¬Î´·¢ÏÖ¶ñÒâ´úÂëÖ²È롣ͬʱ£¬F5°ä²¼ÁËÕë¶ÔBIG-IP¡¢F5OSµÈ²úÆ·µÄ°²È«¸üУ¬½¨Òé¿Í»§ÓÅÏÈ×°ÖÃÒÔ·À±¸Ç±ÔÚ·çÏÕ£¬²¢ÌṩÍþвËÑË÷Ö¸Äϼ°iHealthÕï¶Ï¹¤¾ßµÄ×Ô¶¯²é³­Ö°ÄÜ¡£


https://www.bleepingcomputer.com/news/security/hackers-breach-f5-to-steal-undisclosed-big-ip-flaws-source-code/