Modular DS²å¼þ¸ßΣ·ì϶CVE-2026-23550ÔâÀûÓÃ

°ä²¼¹¦·ò 2026-01-19

1. Modular DS²å¼þ¸ßΣ·ì϶CVE-2026-23550ÔâÀûÓÃ


1ÔÂ15ÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËÔ±½üÈÕÅû¶£¬WordPress¶àÕ¾µãÖÎÀí²å¼þModular DSµÄ2.5.1¼°¸üÔç°æ±¾´æÔÚÑϳÁ·ì϶CVE-2026-23550£¬¸Ã·ì϶Òѱ»ºÚ¿ÍÀûÓã¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÔ¶³ÌÈÆ¹ýÈÏÖ¤£¬ÒÔÖÎÀíԱȨÏÞ½Ó¼ûÊÜÓ°ÏìÍøÕ¾¡£Modular DS×÷Ϊһ¿îÖÎÀí¶à¸öWordPressÕ¾µãµÄ¹¤¾ß£¬×°ÖÃÁ¿Òѳ¬4Íò´Î£¬ÆäÖ°ÄÜÔ̺¬Ô¶³Ì¼à¿Ø¡¢Ö´ÐиüС¢Óû§ÖÎÀí¡¢·þÎñÆ÷ÐÅÏ¢½Ó¼û¼°ÊØ»¤¹¤×÷µÈ¡£¾ÝPatchstackÍŶӻ㱨£¬·ì϶³õ´Î¹¥»÷²úÉúÔÚ2026Äê1ÔÂ13ÈÕUTC¹¦·ò02:00×óÓÒ¡£×êÑÐÈËÔ±·¢ÏÖ£¬·ì϶ԴÓÚ²å¼þÔÚÆôÓÃ"Ö±½ÓÒªÇó"ģʽʱ£¬Î´¶ÔÒªÇóÆðÔ´½øÐмÓÃÜÑéÖ¤¼´ÊÓΪ¿ÉÐÅ£¬µ¼ÖÂÃô¸Ð·Óɶ³ö²¢´¥·¢×Ô¶¯ÖÎÀíÔ±µÇ¼»ØÍË»úÔì¡£¾ßÌå¶øÑÔ£¬ÔÚsrc/app/Http/Controllers/AuthController.phpµÄgetLogin²½ÖèÖУ¬´úÂë³¢ÊÔ´ÓÒªÇóÌå¶ÁÈ¡Óû§ID£¬ÈôδÌṩÔò×Ô¶¯»ñÈ¡ÏÖÓÐÖÎÀíÔ±»ò³¬µÈÖÎÀíÔ±Óû§²¢µÇ¼£¬Î´¾­Éí·ÝÑéÖ¤µÄÓû§¿ÉÀûÓôËõ辶ʵÏÖȨÏÞÌáÉý¡£Modular DSÔÚÊÕµ½·ì϶»ã±¨ºóÊýÓ×ʱÄÚ°ä²¼2.5.2°æ±¾½¨¸´·¨Ê½¡£


https://www.bleepingcomputer.com/news/security/hackers-exploit-modular-ds-wordpress-plugin-flaw-for-admin-access/


2. ÖÐÑëÃåÒòÖÝÒ½ÁƱ£½¡ÖÐÐÄÊý¾Ýй¶ӰÏ쳬14.5Íò»¼Õß


1ÔÂ15ÈÕ£¬ÖÐÑëÃåÒòÖÝÒ½ÁƱ£½¡ÖÐÐĽüÈÕÅû¶һ·³Á´óÊý¾Ý°²È«ÊÂÎñ£¬Ó°Ïì145,381Ãû»¼Õß¡£¸Ã·ÇͶ»úÐÔÒ½ÁÆÏµÍ³ÓÚ2025Äê6ÔÂ1ÈÕ¼ì²âµ½ITϵͳÒì³£»î¶¯£¬Ëæ¼´Æô¶¯°²È«¼Ó¹Ì²¢½áºÏµÚÈý·½ÍøÂ簲ȫר¼Ò·¢Õ¹µ÷²é£¬Í¬²½´«µÝ·¨Âɲ¿ÃÅ¡£µ÷²éÓÚ11ÔÂ6ÈÕʵÏÖ£¬È·ÈÏ2025Äê3ÔÂ19ÈÕÖÁ6ÔÂ1ÈÕÆÚ¼ä£¬Î´¾­ÊÚȨµÄµÚÈý·½½Ó¼ûÁËÆäIT»·¾³£¬¿ÉÄÜ»ñÈ¡»¼ÕßÃô¸ÐÐÅÏ¢£¬Ô̺¬ÐÕÃû¡¢µ®ÉúÈÕÆÚ¡¢Ò½ÖÎÏêÇé¡¢·þÎñÈÕÆÚ¡¢Ò½ÁÆÌṩÕßÐÕÃû¡¢±£ÏÕÐÅÏ¢£¬²¿ÃŲ¡Àý»¹Éæ¼°Éç»á±£ÏÕºÅÂë¡£×÷ΪÃåÒòÖÝÖв¿¼°Î÷²¿µØÓò¹Ø¼üÒ½ÁÆ·þÎñÉÌ£¬¸Ã»ú¹¹ÔËÓª¶à¼ÒÒ½Ôº¡¢ÕïËù¼°×¨¿Æ·þÎñ£¬ÊÂÎñÒý·¢¿í·º¹Ø×¢¡£»ú¹¹ÓÚ2025Äê7ÔÂ31ÈÕÖÁ12ÔÂ29ÈÕÆÚ¼äͨ¹ýÊéÃæÍ¨Öª¡¢ÈÈÏߵ绰¼°ÍøÕ¾²¼¸æ·î¸æÊÜÓ°Ï컼Õߣ¬²¢ÌṩΪÆÚ12¸öÔµÄÃâ·ÑÐÅÓþ±£»¤·þÎñ¡£¸Ã·þÎñÓÉTransUnionÆìÏÂCyberScout¹«Ë¾³Ð±££¬º­¸Çµ¥¾ÖÐÅÓþ¼à¿Ø¡¢ÊµÊ±ÐÅÓþ»ã±¨¡¢ÐÅÓþÆÀ·Öµ÷»»ÌáÐѼ°×Ô¶¯Ú²Æ­ÔöÔ®£¬Ð­ÖúÉí·Ý͵ÇÔÊܺ¦Õß½â¾öÎÊÌâ¡£


https://securityaffairs.com/186959/uncategorized/central-maine-healthcare-data-breach-impacted-over-145000-patients.html


3. WhisperPair·ì϶¶³öÊýÒÚÀ¶ÑÀÉ豸°²È«·çÏÕ


1ÔÂ15ÈÕ£¬Â³ãë´óÑ§ÍÆËã»ú°²È«ÍŶӷ¢Ïֹȸ輱¾çÅä¶ÔºÍ̸´æÔÚ¸ßΣ·ì϶CVE-2025-36911£¨´úºÅWhisperPair£©£¬Ó°ÏìÈ«ÇòÊýÒŲ֧́³Ö¸ÃÖ°ÄܵÄÎÞÏß¶ú»ú¡¢¶úÈûºÍÑïÉùÆ÷£¬Éæ¼°Google¡¢Jabra¡¢JBL¡¢Ë÷Äá¡¢Ó×Ã×µÈÊ®Óà¸öÆ·ÅÆ¡£¸Ã·ì϶ԴÓÚÉ豸Ôì×÷É̶Լ±¾çÅä¶ÔºÍ̸µÄ²»µ±ÊµÏÖ£¬¹æ·¶ÒªÇóÉ豸ÔÚ·ÇÅä¶ÔģʽÏÂÓ¦ºöÂÔÅä¶ÔÒªÇ󣬵«ÎÞÊý³§ÉÌδǿÔìÖ´Ðд˲鳭£¬µ¼Ö¹¥»÷Õß¿Éδ¾­Óû§ÊÚȨǿÔìÅä¶ÔÉ豸¡£¹¥»÷ÕßÀûÓÃÈκÎÀ¶ÑÀÉ豸£¨Èç±Ê¼Ç±¾µçÄÔ¡¢Ê÷Ý®ÅÉ»òÊÖ»ú£©£¬ÔÚ14Ã×ÁìÓòÄÚÎÞÐèÓû§½»»¥¼´¿ÉʵÏÖÅä¶Ô¡£Åä¶Ôºó£¬¹¥»÷Õß¿ÉÆëÈ«½ÚÔìÒôƵÉ豸£ºÒÔ¸ßÒôÁ¿²¥·ÅÒôƵ×ÌÈÅÓû§£¬»òͨ¹ýÂó¿Ë·çÇÔÌý¶Ô»°¡£¸üÑϳÁµÄÊÇ£¬Í¨¹ýGoogleµÄFind HubÍøÂ磬¹¥»÷Õ߿ɽ«Êܺ¦ÕßÉ豸°ó¶¨ÖÁ×Ô¼ºµÄGoogleÕË»§£¬ÊµÏÖ¿çÉ豸µØÎ»¸ú×Ù¡£Êܺ¦Õß¿ÉÄÜÊÕµ½É豸×Ô´øµÄ¸ú×Ù֪ͨ£¬µ«ÒòÏÔʾΪ×ÔÉíÉ豸¶øºöÊÓÖҸ棬µ¼Ö³־ÃÒñ±Î¸ú×Ù¡£¹È¸èÏò×êÑÐÈËÔ±·¢·Å1.5ÍòÃÀÔª×î¸ßÉͽ𣬲¢Óë³§É̺Ï×÷ÔÚ150ÌìÅû¶ÆÚÄÚ°ä²¼²¹¶¡¡£


https://www.bleepingcomputer.com/news/security/critical-whisperpair-flaw-lets-hackers-track-eavesdrop-via-bluetooth-audio-devices/


4. ¼ÓÄôóCIROÊý¾Ýй¶²¨¼°75ÍòͶ×ÊÕß


1ÔÂ18ÈÕ£¬¼ÓÄôóͶ×ʼà¹Ü×éÖ¯£¨CIRO£©½üÈÕ֤ʵ£¬È¥Äê8ÔÂÔâ·êµÄÍøÂ簲ȫÊÂÎñ×îÖÕÈ·ÈÏÓ°ÏìÔ¼75ÍòÃû¼ÓÄôóͶ×ÊÕߣ¬³ÉΪ¸Ã¹úÈ¥Äê×îÑϳÁµÄÍøÂ簲ȫÊÂÎñÖ®Ò»¡£CIRO×÷Ϊ2023Äê³ÉÁ¢µÄ¼ÓÄôóͶ×ÊÂòÂôÉÌ¡¢¹²Í¬»ù½ðÂòÂôÉ̼°ÂòÂô»î¶¯µÄ¹ú¶È×ÔÂÉ»ú¹¹£¬ÊǽðÈÚ¼à¹Ü¿ò¼ÜµÄÖ÷ÌâÖ§ÖùÖ®Ò»¡£CIRO·¢ÏÖϵͳ´æÔÚÍøÂ簲ȫÍþвºó£¬µ±¼´¹Ø¹Ø²¿Ãŷǹؼüϵͳ²¢Æô¶¯µ÷²é¡£Ö»¹Ü8ÔÂ18ÈÕ¶Ô±íÅû¶ÊÂÎñ£¬µ«ÆëȫӰÏìÁìÓòÖ±ÖÁ½ñÄê1ÔÂ14ÈÕʵÏÖ¿í·º·¨Ö¤µ÷²éºó²ÅµÃÒÔÃ÷È·¡£µ÷²éÏÔʾ£¬²¿ÃųÉÔ±¹«Ë¾¼°Æä×¢²áÔ±¹¤µÄÓ×ÎÒÐÅÏ¢Ôâй¶£¬¾ßÌåÊý¾ÝÒòÈ˶øÒ죬¿ÉÄÜÔ̺¬µ®ÉúÈÕÆÚ¡¢µç»°ºÅÂë¡¢ÄêÊÕÈë¡¢Éç»á±£ÏÕºÅÂë¡¢µ±¾ÖÐû¸æµÄÉí·ÝÖ¤ºÅÂ롢Ͷ×ÊÕË»§ºÅÂë¼°ÕË»§±¨±íµÈÃô¸ÐÐÅÏ¢¡£ÖµÍ×ÌùÐĵÄÊÇ£¬CIROÇ¿µ÷Æäϵͳδ´æ´¢µÇ¼ƾ֤»òÕË»§°²È«ÎÊÌ⣬Òò¶øÕâЩÐÅϢδÊÜÓ°Ï졣Ϊ½µµÍ·çÏÕ£¬CIRO½«ÎªËùÓÐÊÜÓ°ÏìͶ×ÊÕßÌṩΪÆÚÁ½ÄêµÄÃâ·ÑÐÅÓþ¼à¿ØºÍÉí·Ý͵ÇÔ±£»¤·þÎñ£¬ÊÜÓ°ÏìÕß½«ÊÕµ½Ö±½Ó֪ͨ¼°×¢²áÖ¸Òý£¬Î´ÊÕµ½Í¨ÖªÕß¿É×Ô¶¯ÁªÏµCIROÈ·ÈÏ״̬¡£


https://www.bleepingcomputer.com/news/security/ciro-data-breach-last-year-exposed-info-on-750-000-canadian-investors/


5. ¶ñÒâGhostPosterä¯ÀÀÆ÷À©´ó·¨Ê½×°ÖÃÁ¿´ï84Íò´Î


1ÔÂ17ÈÕ£¬½üÈÕ£¬×êÑÐÈËÔ±ÔÚChrome¡¢FirefoxºÍEdgeÀûÓÃÉ̵êÖз¢ÏÖ17¸öÓëGhostPoster¹¥»÷»î¶¯ÓйصĶñÒâä¯ÀÀÆ÷À©´ó·¨Ê½£¬×Ü×°ÖÃÁ¿´ï84Íò´Î¡£¸Ã»î¶¯×îÔçÓÉKoi SecurityÓÚ2025Äê12ÔÂÅû¶£¬Éæ¼°À©´óͨ¹ýͼ±ê°µ²Ø¶ñÒâJavaScript´úÂ룬¼à¿ØÓû§ä¯ÀÀÆ÷»î¶¯²¢Ö²ÈëºóÃÅ¡£ÕâЩ´úÂë»á´Ó±í²¿»ñÈ¡»ìºÏµÄÓÐÐ§ÔØºÉ£¬¸ú×Ùä¯ÀÀÐÐΪ£¬½Ù³ÖµçÉÌÆ½Ì¨Í¬ÃËÁ´½Ó£¬²¢×¢È벻˽¼ûiframeÖ´Ðиæ°×ڲƭºÍµã»÷ڲƭ¡£LayerXµÄ×îл㱨ָ³ö£¬Ö»¹Ü»î¶¯ÒÑÆØ¹â£¬µ«ÈÔ³ÖÐø»îÔ¾¡£17¸öÀ©´óÖУ¬×°ÖÃÁ¿×î¸ßµÄ"ÓÒ¼üµã»÷¹È¸è·­Òë"´ï52.2Íò´Î£¬"ʹÓÃGoogle·­ÒëÑ¡¶¨Îı¾"´ï15.9Íò´Î£¬ÆäÓàÈç"Ads Block Ultimate""¸¡¶¯²¥·ÅÆ÷"µÈ×°ÖÃÁ¿´ÓÊýǧµ½ÊýÍò²»µÈ¡£»î¶¯×î³õÔÚMicrosoft Edgeƽ̨ÌáÒ飬ºóÀ©´óÖÁFirefoxºÍChrome£¬²¿ÃÅÀ©´ó×Ô2020ÄêÆð±ã´æÔÚÓÚ²å¼þÉ̵꣬ÏÔʾÆä³Ö¾ÃÔËÓªµÄ³É¹¦ÐÔ¡£Ä¿Ç°£¬MozillaºÍ΢ÈíÒѽ«ÓйØÀ©´óϼÜ£¬¹È¸èҲȷÈÏChromeÉ̵êÖеÄÕâЩÀ©´óÒѱ»É¾³ý¡£µ«ÒÑ×°ÖõÄÓû§ÈÔÃæ¶Ô·çÏÕ£¬Ðè×Ô¶¯Ð¶Ôز¢¼à¿ØÕË»§Òì³£¡£


https://www.bleepingcomputer.com/news/security/malicious-ghostposter-browser-extensions-found-with-840-000-installs/


6. Fortinet FortiSIEM¸ßΣ·ì϶Ôâ»ý¼«ÀûÓÃ


1ÔÂ16ÈÕ£¬½üÈÕ£¬Fortinet FortiSIEM±»ÆØ´æÔÚÑϳÁ·ì϶£¨CVE-2025-64155£©£¬Æä¸ÅÏëÑéÖ¤ÀûÓôúÂëÒѹ«¿ª£¬ÇÒÕý±»¹¥»÷Õß»ý¼«ÀûÓ᣸÷ì϶ÓÉHorizon3.ai°²È«×êÑÐÔ±Zach Hanley·¢ÏÖ£¬ÐÔÖÊÊDzÙ×÷ϵͳºÅÁî×¢È루CWE-78£©ÓëȨÏÞÌáÉýµÄ×éºÏ£¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õßͨ¹ý¾«ÐÄ»ú¹ØµÄTCPÒªÇóÖ´ÐÐËÁÒâ´úÂ룬×îÖÕ¿É»ñÈ¡root½Ó¼ûȨÏÞ¡£·ì϶ӰÏìFortiSIEM 6.7ÖÁ7.5°æ±¾£¬FortinetÒѰ䲼°²È«¸üУ¬½¨ÒéÓû§Éý¼¶ÖÁ7.4.1¼°ÒÔÉÏ¡¢7.3.5¼°ÒÔÉÏ¡¢7.2.7¼°ÒÔÉÏ»ò7.1.9¼°ÒÔÉϰ汾£»Ê¹Óþɰ汾µÄÓû§ÐèǨáãÖÁ½¨¸´°æ±¾¡£Ò»Ê±½â¾ö¹æ»®ÎªÏÞ¶ÈphMonitor·þÎñ¶Ë¿Ú£¨7900£©µÄ½Ó¼û£¬ÒÔ»º½âÎÞ·¨µ±¼´Éý¼¶µÄÇé¿ö¡£¼¼Êõϸ½ÚÏÔʾ£¬·ì϶±¾Ô­ÔÚÓÚphMonitor·þÎñ¶³öµÄÊýÊ®¸öδ¾­ÑéÖ¤µÄÔ¶³Ì¿ÉŲÓúÅÁî´¦Ö÷¨Ê½¡£¹¥»÷Õß¿ÉÀÄÓòÎÊý×¢È븲¸Ç/opt/charting/redishb.shÎļþ£¬´Ó¶øÒÔrootȨÏÞÖ´ÐдúÂë¡£Horizon3.aiÒѰ䲼¼¼ÊõÎÄÕ¼°ÈëÇÖÖ¸±ê£¬ÖÎÀíÔ±¿Éͨ¹ý²é³­/opt/phoenix/log/phoenix.logsÖеÄphMonitorÈÕÖ¾£¬²éÕÒÔ̺¬PHL_ERRORÌõ¿îÖеĶñÒâÔØºÉURLÒÔ¼ø±ðÈëÇÖ¡£


https://www.bleepingcomputer.com/news/security/hackers-now-exploiting-critical-fortinet-fortisiem-vulnerability-in-attacks/