ÊÓÆµ»áÒéÀûÓÃHuddle01й¶Óû§Êý¾Ý

°ä²¼¹¦·ò 2025-10-17

1. ÊÓÆµ»áÒéÀûÓÃHuddle01й¶Óû§Êý¾Ý


10ÔÂ15ÈÕ£¬È¥ÖÐÐÄ»¯ÊÓÆµ»áÒéÀûÓÃHuddle01Ðû³ÆÌṩ¸ß°²È«ÐÔWebRTC·þÎñ£¬È´ÒòδÊܱ £»¤µÄKafka BrokerÊ·ýµ¼Ö´ó¹æÄ£Óû§Êý¾Ýй¶¡£×êÑÐÍŶӷ¢ÏÖ£¬¸Ãƽ̨ÓÃÓÚ´«ÊäʵʱÈÕÖ¾µÄKafka BrokerδÆôÓÃÉí·ÝÑéÖ¤¡¢¼ÓÃÜ»ò½Ó¼û½ÚÔ죬¶³öÁË2025Äê8ÔÂ13ÈÕÖÁ26ÈÕÆÚ¼ä³¬621,000ÌõʵʱÈÕÖ¾Ìõ¿î£¬º­¸ÇÓû§µç×ÓÓʼþ¡¢IPµØÖ·¡¢¼ÓÃÜÇ®°üµØÖ·£¨Ö§³Ö±ÈÌØ±Ò¡¢ÒÔÌ«·»µÈÇø¿éÁ´£©¡¢Í¨»°²Î¼Ó¼Í¼¡¢¹ú¶È¡¢¹¦·ò¡¢Ê±³¤µÈÃô¸ÐÐÅÏ¢¡£ÕâЩÊý¾ÝÒÔÃ÷ÎÄ´ó¾Öʵʱ´«Ê䣬ÈκεÚÈý·½¾ù¿ÉÎÞ×è°­½Ó¼û¡£Ö»¹ÜHuddle01ÔÚÀûÓÃÉ̵êÉêÃ÷¡°²»ÍøÂç»ò¹²ÏíÊÜ»§Êý¾Ý¡±£¬ÇÒÒþÖÔÕþ²ßÇ¿µ÷¡°È¥ÖÐÐÄ»¯Í¨Ñ¶ÖеÄÊý¾ÝͨÃ÷ÓëÓû§½ÚÔ족£¬µ«ÏÖʵ¶³öµÄÊý¾ÝÏÔʾÆä´æÔÚÑϳÁ°²È«·ì϶¡£Æ½Ì¨ÓÉÃÀ¹úÌØÀ­»ªÖÝGraphene01 Labs¿ª·¢£¬ÔÚGoogle PlayÏÂÔØÁ¿³¬5Íò´Î£¬iOS¶Ë¾ùÔÈÆÀ·Ö4.7ÐÇ£¬ÉîÊܼÓÃÜÇ®±Ò°®ºÃÕßÇàíù¡£È»¶ø£¬Çø¿éÁ´¼¯³É·´¶ø¼Ó¾çÁË·çÏÕ£¬¹¥»÷Õß¿ÉÀûÓÃй¶µÄÇ®°üµØÖ·¹ØÁªÕæÊµÉí·Ý£¬»æÔìÓû§¹ØÏµÍ¼£¬½ø¶øÖ´Ðо«×¼´¹µö¹¥»÷»òÉç»á¹¤³Ì¹¥»÷¡£


https://cybernews.com/security/video-call-app-huddle01-leaks-sensitive-user-data/


2. CISA´¹Î£¸üÐÂKEVĿ¼£ºAdobeÓëSKYSEA·ì϶Ôâ×Ô¶¯ÀûÓÃ


10ÔÂ16ÈÕ£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©ÓÚ½üÈÕ½«Á½¸öÑϳÁ°²È«·ì϶ÄÉÈëÆäÒÑÖª±»ÀûÓ÷ì϶£¨KEV£©Ä¿Â¼£¬Í¹ÏÔµ±Ç°ÍøÂ簲ȫÍþвµÄ½ôÆÈÐÔ¡£ÆäÖУ¬Ó°ÏìAdobe Experience Manager£¨AEM£©µÄCVE-2025-54253·ì϶±»ÆÀ¶¨Îª×î¸ßÑϳÁÐԵȼ¶£¨CVSS 10.0£©£¬¸Ã·ì϶ԴÓÚAEM Forms JEE 6.5.23.0¼°¸üÔç°æ±¾ÖдæÔÚδ¾­ÑéÖ¤µÄ/adminui/debug servlet¶Ëµã£¬¹¥»÷Õß¿ÉÀûÓô˶˵ãÌá·´Ä¿ÒâOGNL±í°×ʽ£¬ÎÞÐèÉí·ÝÑéÖ¤¼´¿ÉÖ´ÐÐËÁÒâϵͳºÅÁî¡£AdobeÒÑÓÚ2025Äê8Ô°䲼µÄ6.5.0-0108°æ±¾Öн¨¸´´Ë·ì϶£¬Í¬Ê±½¨¸´µÄ»¹ÓÐCVSS 8.6·ÖµÄCVE-2025-54254¡£Ö»¹ÜAdobeÈϿɴæÔÚ¹«¿ª¸ÅÏëÑéÖ¤£¬µ«ÏÖʵ¹¥»÷ϸ½ÚÉÐδÅû¶¡£CISAÒªÇóÁª¹úÃñÊÂÐÐÕþ²¿ÃÅ£¨FCEB£©»ú¹¹±ØÐëÔÚ2025Äê11ÔÂ5ÈÕǰʵÏÖ½¨¸´¡£ÁíÒ»Ôò³ÁÒª¸üÐÂÉæ¼°SKYSEA Client ViewµÄCVE-2016-7836·ì϶£¨CVSS 9.8·Ö£©£¬¸Ã·ì϶ԴÓÚÉí·ÝÑéÖ¤»úÔìȱµã£¬¹¥»÷Õß¿Éͨ¹ýÖÎÀí½ÚÔį̀µÄTCPÏνÓÔ¶³ÌÖ´ÐдúÂë¡£ÈÕ±¾·ì϶עÃ÷£¨JVN£©ÔÚ2016Äêµ×µÄ°²È«²¼¸æÖÐÃ÷È·Ö¸³ö£¬Ò°±íÒѼì²âµ½Õë¶Ô´Ë·ì϶µÄ¹¥»÷ÐÐΪ¡£


https://thehackernews.com/2025/10/cisa-flags-adobe-aem-flaw-with-perfect.html


3. ËÕ¸»±ÈÔâ·ê³Á´óÊý¾Ýй¶ÊÂÎñ£¬¿Í»§Ãô¸ÐÐÅÏ¢ÔâÇÔÈ¡


10ÔÂ16ÈÕ£¬È«Çò³ÛÃûÒÕÊõÆ·ÅÄÂôÐÐËÕ¸»±È½üÈÕ´«µÝһ·³Á´óÊý¾Ýй¶ÊÂÎñ£¬ÍþвÐÐΪÕßÇÔÈ¡Á˿ͻ§Ãô¸ÐÐÅÏ¢£¬Ô̺¬È«Ãû¡¢Éç»á°²È«ºÅÂ루SSN£©¼°½ðÈÚÕË»§ÏêÇé¡£¸ÃÊÂÎñÓÚ2025Äê7ÔÂ24ÈÕ±»·¢ÏÖ£¬¾­¹ýÁ½¸öÔµľßÌåµ÷²é£¬¹«Ë¾·½È·Èϱ»µÁÊý¾ÝÀàÐͼ°ÊÜÓ°ÏìÓ×ÎÒÁìÓò¡£×÷ΪȫÇòµ±Ïȵĸ߼ÛÖµÎïÆ·ÅÄÂôÐÐÓë×ʲúÖ§³Ö´û¿î·þÎñÉÌ£¬ËÕ¸»±ÈÿÄê´¦ÖÃÊýÊ®ÒÚÃÀÔªÅÄÂôÂòÂô£¬2024Äê×ÜÏúÊÛ¶î´ï60ÒÚÃÀÔª¡£Õâ´Îй¶ÊÂÎñÓ°ÏìÁìÓò¿í·º£¬Æ¾¾ÝÏòÃÀ¹úÃåÒòÖݼì²ì³¤°ì¹«ÊÒÌá½»µÄÎļþ£¬ÒÑÈ·ÈÏÔ̺¬ÃåÒòÖݺÍÂ޵µºÖÝÔÚÄڵIJ¿Ãſͻ§ÐÅÏ¢Ôâ·¸·¨»ñÈ¡£¬µ«¾ßÌåÊÜÓ°Ïì×ÜÈËÊýÉÐδÆëÈ«Åû¶¡£ËÕ¸»±ÈÔÚ֪ͨÖÐÇ¿µ÷£¬ÊÂÎñ²úÉúºóµ±¼´Æô¶¯È«Ãæµ÷²é£¬Í¨¹ýÊý¾ÝÉó²éÈ·¶¨ÐÅϢй¶ÁìÓò¡£½ØÖÁĿǰ£¬ÉÐÎÞÀÕË÷Èí¼þ×éÖ¯Ðû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü¡£ÎªÓ¦¶ÔÕâ´ÎÎ £»ú£¬ËÕ¸»±ÈΪÊÜÓ°Ïì¿Í»§Ìṩ²¹¾È´ëÊ©£ºÍ¨¹ýTransUnionÌṩΪÆÚ12¸öÔµÄÃâ·ÑÉí·Ý± £»¤ÓëÐÅÓþ¼à¿Ø·þÎñ£¬¿Í»§ÐèÔÚ90ÌìÄÚʵÏÖ×¢²á¡£


https://www.bleepingcomputer.com/news/security/auction-giant-sothebys-says-data-breach-exposed-customer-information/


4. ProsperÔâ´ó¹æÄ£Êý¾Ýй¶£¬1760ÍòÓû§ÐÅÏ¢±»ÇÔ


10ÔÂ16ÈÕ£¬ÃÀ¹úµã¶Ôµã½è´ûƽ̨ProsperÅû¶Æäϵͳ9ÔÂ2ÈÕÔâºÚ¿ÍÈëÇÖ£¬µ¼Ö³¬¹ý1760ÍòÈ˵ÄÓ×ÎÒÐÅÏ¢±»µÁ¡£Õâ´ÎÊÂÎñÉæ¼°¿Í»§¼°´û¿îÉêÇëÈ˵ÄÃô¸ÐÊý¾Ý£¬Ô̺¬Éç»á°²È«ºÅÂë¡¢ÐÕÃû¡¢µ±¾ÖÐû¸æµÄÉí·ÝÖ¤ºÅ¡¢¾ÍÒµÇé¿ö¡¢ÐÅÓþÆÀ·Ö¡¢ÊÕÈëˮƽ¡¢µ®ÉúÈÕÆÚ¡¢ÏÖʵµØÖ·¡¢IPµØÖ·¼°ä¯ÀÀÆ÷Óû§´úÀíÐÅÏ¢µÈ¡£Ö»¹ÜProsper°µÊ¾ÉÐδ·¢ÏÖ¹¥»÷Õß»ñÈ¡¿Í»§ÕË»§»ò×ʽð½Ó¼ûȨÏÞµÄÖ¤¾Ý£¬µ«È·ÈÏ»úÃÜÊý¾ÝÒÑͨ¹ýδ¾­ÊÚȨ²éÎʹ«Ë¾Êý¾Ý¿âµÄ·½Ê½±»ÇÔÈ¡¡£×÷Ϊ³ÉÁ¢ÓÚ2005ÄêµÄÀÏÅÆ½ðÈÚÆ½Ì¨£¬ProsperÒÑÔ®ÊÖ³¬200Íò¿Í»§ÊµÏÖ³¬300ÒÚÃÀÔª´û¿îÂòÂô¡£±¾´Î°²È«·ì϶δӰÏìÆäÃæÏò¿Í»§µÄÈÕ³£ÔËÓª£¬¹«Ë¾ÒÑÏò¼à¹Ü²¿Ãźͷ¨ÂÉ»ú¹Ø±¨°¸£¬²¢Æô¶¯½áºÏµ÷²é¡£ProsperÇ¿µ÷£¬µ÷²éÈÔ´¦ÓÚÔçÆÚ½×¶Î£¬ÔÚÈ·¶¨¾ßÌåÊÜÓ°ÏìÊý¾ÝÁìÓòºó£¬½«ÏòÊÜÓ°ÏìÓû§ÌṩÃâ·ÑÐÅÓþ¼à¿Ø·þÎñ¡£ÖµÍ×ÌùÐĵÄÊÇ£¬Êý¾Ýй¶֪ͨ·þÎñHave I Been Pwned£¨HIBP£©Åû¶ÊÂÎñÓ°ÏìÁìÓò´ï1760Íò¸öΨһµç×ÓÓʼþµØÖ·£¬µ«Prosper½²»°È˰µÊ¾¡°ÎÞ·¨ÑéÖ¤¡±¸ÃÊý¾ÝµÄÕýÈ·ÐÔ£¬²¢³ÁÉ깫˾ÈÔÔÚºËʵ¾ßÌåÊÜÓ°ÏìÊý¾Ý¼°ËùÓÐÕßÉí·Ý¡£


https://www.bleepingcomputer.com/news/security/have-i-been-pwned-warns-of-prosper-data-breach-impacting-176-million-accounts/


5. Ó¡¶ÈNetcoreCloud·þÎñÆ÷ÅäÖÃÃýÎóÖÂ400ÒÚÌõÃô¸ÐÊý¾Ýй¶


10ÔÂ16ÈÕ£¬Ó¡¶ÈÈ«Çòµç×ÓÓʼþÓªÏúÓë×Ô¶¯»¯ÆóÒµNetcoreCloudÒò·þÎñÆ÷ÅäÖÃÃýÎ󣬵¼ÖÂÔ̺¬400Òڱʼͼ¡¢×ܼÆ13.4TBµÄÃô¸ÐÊý¾Ýй¶£¬Éæ¼°È«Çò¿Í»§µç×ÓÓʼþ¡¢ÄÚ²¿¾ßÌåÐÅÏ¢¼°¼¼ÊõÅäÖõÈÖ÷ÌâÊý¾Ý¡£ÍøÂ簲ȫ×êÑÐÔ±Jeremiah FowlerÔÚ¹«¿ªÊý¾Ý¿âÖз¢Ïָ÷ì϶£¬Êý¾Ý¿âδ¼ÓÃÜÇÒδÊܱ £»¤£¬ÈκλñÈ¡IPµØÖ·Õß¾ù¿É½Ó¼ûº£Á¿ÓʼþͨѶ¼Í¼£¬Ô̺¬Ò½ÁƱ£½¡Í¨Öª¡¢ÒøÐл¾¯±¨¡¢¾ÍÒµÓйØÓʼþ¼°²¿ÃÅÕË»§¼¼ÊõÐÅÏ¢£¨ÈçIPµØÖ·¡¢SMTPÅäÖã©£¬²¿ÃżÍ¼ÉõÖÁÏóÕ÷Ϊ»úÃÜ¡£NetcoreCloud×ܲ¿Î»ÓÚÓ¡¶ÈÃÏÂò£¬Îª40¸ö¹ú¶È/µØÓòµÄ6500Óà¸öÆ·ÅÆÌṩµç×ÓÓʼþ¼°×Ô¶¯»¯·þÎñ£¬¸²¸ÇµçÉÌ¡¢½ðÈÚ¡¢Ã½Ìå¡¢ÓÎÀÀµÈÐÐÒµ¡£Fowler·¢ÏÖºóµ±¼´Í¨Öª¸Ã¹«Ë¾£¬Êý¾Ý¿âÓÚµ±ÈÕ±»´¹Î£± £»¤²¢Ï޶ȽӼû¡£Netcore»ØÓ¦³Æ½«·¢Õ¹ÄÚ²¿Éó²é£¬µ«Ä¿Ç°ÈÔ´æÔÚÈý´óÒɵ㣺й¶Êý¾Ý¿âÓÉNetcoreÖ±ÊÕÊÜÀí»òµÚÈý·½ÍйÜδÃ÷ £»Êý¾Ý¶³öʱ³¤¼°ÊÇ·ñ±»¶ñÒâ½Ó¼ûδȷÈÏ £»ÊÇ·ñÓÐÆäËûÖ÷ÌåÏÂÔØ»ò¸´ÔìÊý¾ÝÐèͨ¹ý·¨ÎñÉó¼ÆºËʵ¡£


https://hackread.com/misconfigured-netcorecloud-server-40-billion-records/


6. ³¯ÏʺڿÍÀûÓÃEtherHidingÔÚÇø¿éÁ´Éϰµ²Ø¶ñÒâÈí¼þ


10ÔÂ16ÈÕ£¬³¯Ïʹú¶ÈÖ§³ÖµÄºÚ¿Í×éÖ¯UNC5342×Ô2025Äê2ÔÂÆð£¬ÔÚÕë¶ÔÈí¼þ¼°ÍøÂ翪·¢ÈËÔ±µÄÉç»á¹¤³Ì¹¥»÷ÖУ¬³õ´ÎѡȡÃûΪ"EtherHiding"µÄÇø¿éÁ´ÖÇÄܺÏÔ¼¶ñÒâÈí¼þ´«²¼¼¼Êõ¡£¸Ã¼¼ÊõÓÉGuardio LabsÓÚ2023ÄêÌá³ö£¬Í¨¹ý½«¶ñÒâÔØºÉǶÈë±Ò°²ÖÇÄÜÁ´»òÒÔÌ«·»µÄÖÇÄܺÏÔ¼ÖУ¬ÊµÏֵͳɱ¾¡¢¸ßÄäÃûÐԵĶñÒâÈí¼þÍйÜÓ붯̬¸üС£¹¥»÷Á÷³ÌÒÔÐéαÇóÖ°¿ÚÊÔΪµö¶ü£¬ÓÉαÔìʵÌ壨ÈçBlockNovas LLC¡¢Angeloper Agency£©ÌáÒé¡£Êܺ¦ÕßÔÚ¼¼ÊõÆÀ¹À»·½Ú±»ÓÕÆ­Ö´ÐÐJavaScriptÏÂÔØ·¨Ê½£¬¸Ã·¨Ê½Í¨¹ýÖÇÄܺÏÔ¼ÓëÒÔÌ«·»½»»¥£¬»ñÈ¡Ô̺¬InvisibleFerret¼äµýÈí¼þJS°æ±¾µÄµÚÈý½×¶ÎÓÐЧ¸ºÔØ¡£Çø¿éÁ´¸öÐÔʹ¹¥»÷¾ß±¸Èý´óÓÅÊÆ£ºÆäÒ»£¬Í¨¹ýÖ»¶ÁŲÓûñÈ¡ÔØºÉ²»ÁôÂòÂô¼Í¼£¬Òñ±ÎÐÔ¼«Ç¿ £»Æä¶þ£¬ºÏÔ¼ÔÚǰËĸöÔ¸üг¬20´Î£¬Ã¿´Î½öÐè1.37ÃÀÔªgas·Ñ£¬Ö§³Ö¼±¾ç½Ã½Ýµ÷Õû £»ÆäÈý£¬¶àÁ´Ê¹ÓÃÅú×¢³¯ÏʺڿÍÍŶӴæÔÚ²Ù×÷¸ôÀë¡£¶ñÒâÈí¼þÔÚÄÚ´æÖÐÔËÐУ¬¿É¶¯Ì¬¼ÓÔØÆ¾Ö¤ÇÔȡģ¿é£¬Ö¸±êÖ±Ö¸Chrome¡¢EdgeµÈä¯ÀÀÆ÷µÄÃÜÂë¡¢ÐÅÓþ¿¨¼°¼ÓÃÜÇ®°üÊý¾Ý¡£ÆäºÅÁî½ÚÔ죨C2£©Í¨Â·Ö§³ÖÖ´ÐÐËÁÒâºÅÁî¡¢ZIPѹËõÎļþ±íйÖÁTelegramµÈ²Ù×÷¡£


https://www.bleepingcomputer.com/news/security/north-korean-hackers-use-etherhiding-to-hide-malware-on-the-blockchain/