´óº«º½¿Õǰ×Ó¹«Ë¾ÔâClopÀÕË÷ÍŻ﹥»÷

Ðû²¼Ê±¼ä 2025-12-30

1. ´óº«º½¿Õǰ×Ó¹«Ë¾ÔâClopÀÕË÷ÍŻ﹥»÷


12ÔÂ29ÈÕ£¬£¬£¬£¬£¬º«¹ú¹ú¼Òº½¿Õ¹«Ë¾´óº«º½¿Õ¿ËÈÕÅû¶£¬£¬£¬£¬£¬Æä»úÉϲÍÒû¹©Ó¦É̼°Ç°×Ó¹«Ë¾´óº«º½¿Õ²ÍÒûÃâ˰¹«Ë¾£¨KC&D£©ÔâÓöºÚ¿Í¹¥»÷£¬£¬£¬£¬£¬µ¼ÖÂÔ¼3ÍòÃûÔ±¹¤Ð¡ÎÒ˽¼ÒÐÅϢй¶¡£¡£¡£¡£¡£¡£¡£KC&DÓÚ2020Äê´Ó´óº«º½¿Õ·Ö²ðΪ×ÔÁ¦¹«Ë¾£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñÖУ¬£¬£¬£¬£¬ÆäERPϵͳÖд洢µÄÔ±¹¤ÐÕÃû¡¢ÒøÐÐÕ˺ŵÈÃô¸ÐÐÅÏ¢±»ÇÔÈ¡¡£¡£¡£¡£¡£¡£¡£´óº«º½¿ÕÊ×ϯִÐйÙÓí»ùºéÔÚÄÚ²¿±¸Íü¼ÖÐÇ¿µ÷£¬£¬£¬£¬£¬Ö»¹ÜÊÂÎñ±¬·¢ÔÚÍⲿÏàÖúͬ°éÖÎÀí¹æÄ£ÄÚ£¬£¬£¬£¬£¬µ«Éæ¼°Ô±¹¤ÐÅÏ¢Çå¾²£¬£¬£¬£¬£¬¹«Ë¾¸ß¶ÈÖØÊÓ¡£¡£¡£¡£¡£¡£¡£×÷Ϊº«¹ú×î´óº½¿Õ¹«Ë¾£¬£¬£¬£¬£¬´óº«º½¿ÕÓµÓг¬2ÍòÃûÔ±¹¤¡¢160Óà¼Ü·É»ú£¬£¬£¬£¬£¬2024ÄêÔËËÍÂÿͳ¬2300ÍòÈ˴Σ¬£¬£¬£¬£¬ÓªÊÕ³¬110ÒÚÃÀÔª¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊý¾Ýй¶¹æÄ£Öش󣬣¬£¬£¬£¬ÍâµØÃ½Ì屨µÀ³Æ¹¥»÷ÕßÇÔÈ¡ÁËÔ¼3ÍòÌõÊý¾Ý¼Í¼£¬£¬£¬£¬£¬Ö»¹Ü´óº«º½¿ÕδÃ÷È·ÏêϸÊýÄ¿£¬£¬£¬£¬£¬µ«ÒÑÏòÓйز¿·Ö±¨¸æ²¢Æô¶¯ÊӲ졣¡£¡£¡£¡£¡£¡£ÏÖÔÚÉÐδ·¢Ã÷±»µÁÊý¾Ý±»ÓÃÓÚڲƭµÄÖ¤¾Ý£¬£¬£¬£¬£¬µ«¹«Ë¾ÌáÐÑÔ±¹¤Ð¡ÐÄðûÊÕ˾»ò½ðÈÚ»ú¹¹µÄÕ©Æ­Óʼþ¼°¶ÌÐÅ¡£¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬ClopÀÕË÷Èí¼þÍÅ»ïÒÑÐû³Æ¶Ô´Ë´Î¹¥»÷ÈÏÕæ£¬£¬£¬£¬£¬²¢ÔÚÆä°µÍøÐ¹Â¶ÍøÕ¾Ðû²¼±»µÁÊý¾Ý£¬£¬£¬£¬£¬ÔÊÐíͨ¹ýTorrentÏÂÔØ¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/korean-air-data-breach-exposes-data-of-thousands-of-employees/


2. EmEditorÔ⹩ӦÁ´¹¥»÷£º¶ñÒâÈí¼þÇÔÈ¡Êý¾Ý²¢°²ÅÅÀ©Õ¹


12ÔÂ29ÈÕ£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬¹ãÊܽӴýµÄÎı¾ºÍ´úÂë±à¼­Èí¼þEmEditorÔâÓö¹©Ó¦Á´¹¥»÷£¬£¬£¬£¬£¬µ¼ÖÂÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þÈö²¥¡£¡£¡£¡£¡£¡£¡£EmEditorÓÉÀ×µÂÃɵÂEmurasoft¹«Ë¾¿ª·¢£¬£¬£¬£¬£¬ÊÇÒ»¿î¸ßÐÔÄÜWindows¹¤¾ß£¬£¬£¬£¬£¬×¨Îª±àÂë¡¢Îı¾±à¼­¼°´¦Öóͷ£´óÐÍÎļþÉè¼Æ¡£¡£¡£¡£¡£¡£¡£12ÔÂ19ÈÕ18:39ÖÁ22ÈÕ12:50ʱ´ú£¬£¬£¬£¬£¬Í¨¹ýEmEditorÖ÷Ò³¡°Á¬Ã¦ÏÂÔØ¡±°´Å¥ÏÂÔØ×°ÖóÌÐòµÄÓû§¿ÉÄÜÔâÓö¶ñÒâ°æ±¾¡£¡£¡£¡£¡£¡£¡£¸Ã°´Å¥µÄURL±»¸Ä¶¯£¬£¬£¬£¬£¬Ö¸ÏòÍøÕ¾²î±ðλÖÃÍйܵĶñÒâ.msiÎļþ¡£¡£¡£¡£¡£¡£¡£¼Ù×°ÖóÌÐòÓëÕæÆ·Ãû³Æ¡¢Ìå»ýÏàËÆ£¬£¬£¬£¬£¬µ«ÊðÃûÖ¤ÊéÊôÓÚÆäËû¹«Ë¾¡£¡£¡£¡£¡£¡£¡£ÔËÐк󣬣¬£¬£¬£¬¶ñÒâ³ÌÐòÖ´ÐÐPowerShellÏÂÁ£¬£¬£¬£¬´ÓαÔìÓòÏÂÔØ²¢Ö´ÐÐÎļþ¡£¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þÍøÂçϵͳÐÅÏ¢¡¢×ÀÃæ/Îĵµ/ÏÂÔØÎļþ¼ÐÎļþ¡¢VPNÉèÖá¢ä¯ÀÀÆ÷Êý¾Ý¼°Zoho Mail¡¢Discord¡¢SlackµÈÓ¦ÓÃÆ¾Ö¤¡£¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬ÈôϵͳÓïÑÔΪǰËÕÁª¹ú¼Ò»òÒÁÀÊ£¬£¬£¬£¬£¬¶ñÒâÈí¼þ»áÖÕÖ¹ÔËÐС£¡£¡£¡£¡£¡£¡£¸üÑÏÖØµÄÊÇ£¬£¬£¬£¬£¬¹¥»÷Õß°²ÅÅÁËÃûΪ¡°Google Drive Caching¡±µÄä¯ÀÀÆ÷À©Õ¹£¬£¬£¬£¬£¬¸ÃÀ©Õ¹¾ß±¸ÍêÕûÐÅÏ¢ÇÔÈ¡¹¦Ð§£¬£¬£¬£¬£¬¿É³¤ÆÚ»¯ÍøÂçä¯ÀÀÆ÷ÀúÊ·¡¢ÊéÇ©¡¢cookie£¬£¬£¬£¬£¬ÊµÑé¼ôÌù°åÐ®ÖÆ£¨Ìæ»»¼ÓÃÜÇ®±ÒµØµã£©¡¢¼üÅ̼ͼ¼°ÇÔÈ¡Facebook¹ã¸æÕË»§¡£¡£¡£¡£¡£¡£¡£


https://www.securityweek.com/infostealer-malware-delivered-in-emeditor-supply-chain-attack/


3. FortiGate·À»ðǽ2FAÈÆ¹ýÎó²îÒ»Á¬ÔâʹÓÃ


12ÔÂ29ÈÕ£¬£¬£¬£¬£¬ÍøÂçÇå¾²³§ÉÌFortinet¿ËÈÕÏò¿Í»§·¢³öÖÒÑÔ£¬£¬£¬£¬£¬ÍþвÐÐΪÕßÈÔÔÚÆð¾¢Ê¹ÓñàºÅΪCVE-2020-12812µÄÑÏÖØÎó²î¹¥»÷δÐÞ¸´µÄFortiGate·À»ðǽװ±¸¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î×îÔçÓÚ2020Äê7Ô±»Åû¶²¢ÐÞ¸´£¬£¬£¬£¬£¬¹¥»÷Õß¿Éͨ¹ýÐÞ¸ÄÓû§Ãû¾ÞÏ¸Ð´ÈÆ¹ýË«ÒòËØÉí·ÝÑéÖ¤£¨2FA£©»úÖÆ£¬£¬£¬£¬£¬ÔÚÉèÖÃÁËLDAPÔ¶³ÌÉí·ÝÑéÖ¤ÇÒÆôÓÃ"Óû§ÍâµØ"2FAµÄFortiGate SSL VPN×°±¸ÉÏʵÏÖδÊÚȨ»á¼û¡£¡£¡£¡£¡£¡£¡£Îó²î³ÉÒòÔÚÓÚÍâµØÉí·ÝÑéÖ¤ÓëÔ¶³ÌLDAPÉí·ÝÑéÖ¤Ö®¼äµÄ¾ÞϸдƥÅäÂß¼­·×ÆçÖ¡£¡£¡£¡£¡£¡£¡£FortinetÆäʱͨ¹ýÐû²¼FortiOS 6.4.1/6.2.4/6.0.10°æ±¾ÐÞ¸´¸ÃÎÊÌ⣬£¬£¬£¬£¬²¢½¨ÒéÎÞ·¨Á¬Ã¦Éý¼¶µÄ¿Í»§¹Ø±ÕÓû§ÃûÇø·Ö¾Þϸд¹¦Ð§¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬×îмà²âÏÔʾ£¬£¬£¬£¬£¬¹¥»÷ÕßÈÔÔÚÕë¶ÔÉèÖÃÁËLDAP¹ØÁªÍâµØÓû§ÇÒÆôÓÃ2FAµÄÌØ¶¨ÏµÍ³ÊµÑé¹¥»÷¡£¡£¡£¡£¡£¡£¡£Èô¸¨ÖúLDAP×éÉèÖò»µ±£¬£¬£¬£¬£¬¹¥»÷ÀÖ³ÉÂʽ«½øÒ»²½ÌáÉý£¬£¬£¬£¬£¬¸Ã×é±¾Ó¦ÔÚÖ÷LDAPÈÏ֤ʧ°ÜʱÆôÓ㬣¬£¬£¬£¬µ«Èô·ÇÐëÒªÓ¦Ö±½Óɾ³ý¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/fortinet-warns-of-5-year-old-fortios-2fa-bypass-still-exploited-in-attacks/


4. LangChain CoreÏÖ"LangGrinch"¸ßΣÎó²î


12ÔÂ27ÈÕ£¬£¬£¬£¬£¬Çå¾²Ñо¿Ô±Yarden PoratÓÚ2025Äê12ÔÂ4ÈÕÅû¶ÁËLangChainÉú̬½¹µãPython°ülangchain-coreÖеÄÑÏÖØÎó²îCVE-2025-68664£¨´úºÅ"LangGrinch"£©£¬£¬£¬£¬£¬CVSSÆÀ·Ö´ï9.3¡£¡£¡£¡£¡£¡£¡£Îó²î¸ùÒòÔÚÓÚº¯Êýδ¶Ôº¬"lc"¼üµÄÓû§×Öµä¾ÙÐÐתÒå´¦Öóͷ£¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿ÉʹÓÃmetadata¡¢responseµÈÓªÒµ×Ö¶Î×¢Èë¶ñÒ⹤¾ß½á¹¹£¬£¬£¬£¬£¬ÔÚºóÐøload()/loads()·´ÐòÁл¯Ê±£¬£¬£¬£¬£¬ÔÚlangchain_core¡¢langchain_communityµÈÊÜÐÅÈÎÃüÃû¿Õ¼äÄÚʵÀý»¯Serializable×ÓÀà¡£¡£¡£¡£¡£¡£¡£²¿·ÖÀàÔÚ³õʼ»¯Ê±¿ÉÄÜ´¥·¢¸±×÷Ó㬣¬£¬£¬£¬ÈçÇéÐαäÁ¿Ð¹Â¶¡¢Jinja2Ä£°å´úÂëÖ´ÐС¢Î£ÏÕÀàʵÀý»¯µÈ£¬£¬£¬£¬£¬ÉõÖÁ¿Éͨ¹ýÌáÐÑ×¢È뽫¶ñÒ⹤¾ßÒþ²ØÓÚÓû§¿É¿Ø×ֶΣ¬£¬£¬£¬£¬ÊµÏÖÒþ²Ø¹¥»÷¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓÈΪÑÏÖØ£ºÆäÒ»£¬£¬£¬£¬£¬Î»ÓÚlangchain-core±¾Ìå¶ø·ÇÍâΧ¹¤¾ß£¬£¬£¬£¬£¬Ó°ÏìÃæ¹ã£»£»£» £»£»Æä¶þ£¬£¬£¬£¬£¬dumps()/dumpd()×÷Ϊ¿ò¼Ü½¹µãAPI£¬£¬£¬£¬£¬È«ÇòÀÛ¼Æ×°ÖÃÁ¿ÊýÒÚ£»£»£» £»£»ÆäÈý£¬£¬£¬£¬£¬¹¥»÷¿Éͨ¹ýµ¥ÌõLLMÊä³ö¼ä½Ó´¥·¢£¬£¬£¬£¬£¬Õý³£ÓªÒµÁ÷³ÌÖУ¬£¬£¬£¬£¬LLMÌìÉúµÄmetadataÈô±»ÐòÁл¯£¬£¬£¬£¬£¬¼´¿É´¥·¢Îó²î£¬£¬£¬£¬£¬Òþ²ØÐÔÇ¿ÇÒ¹¥»÷Ãż÷µÍ¡£¡£¡£¡£¡£¡£¡£ÐÞ¸´¼Æ»®ÒÑËæ°æ±¾1.2.5¡¢0.3.81Ðû²¼¡£¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/186185/hacking/langchain-core-vulnerability-allows-prompt-injection-and-data-exposure.html


5. ¾ÈÊÀ¾üÔâInterlockÀÕË÷ÍŻ﹥»÷


12ÔÂ29ÈÕ£¬£¬£¬£¬£¬¹ú¼Ê´ÈÉÆ×éÖ¯¾ÈÊÀ¾ü¿ËÈÕÔâÓöÑÏÖØÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬¹¥»÷ÕßÐû³ÆÇÔÈ¡ÁË93GBÃô¸ÐÐÅÏ¢²¢Ðû²¼ÔÚInterlockÀÕË÷Èí¼þÍÅ»ïµÄ°µÍø²©¿ÍÉÏ¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÐ¹Â¶Éæ¼°160Íò±ÊÃÀ¹úסÃñ¾èÇ®ÉúÒâ¼Í¼£¬£¬£¬£¬£¬×ܶî´ïÊýÍòÍòÃÀÔª£¬£¬£¬£¬£¬°üÀ¨È«Ãû¡¢µç»°¡¢×¡Ö·¡¢¾èÇ®½ð¶îµÈСÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©£¬£¬£¬£¬£¬Êý¾Ý½á¹¹ÏÔʾ¹¥»÷Õß»ñÈ¡ÁËÏ꾡µÄ¾èÔùÈËÃûµ¥¡£¡£¡£¡£¡£¡£¡£¾ÈÊÀ¾ü×÷ΪȫÇò×î´ó´ÈÉÆ»ú¹¹Ö®Ò»£¬£¬£¬£¬£¬½¨ÉèÓÚ1865Ä꣬£¬£¬£¬£¬2024ÄêÊÕÈë½ü50ÒÚÃÀÔª£¬£¬£¬£¬£¬Î»ÁÐÃÀ¹úµÚÁù´ó´ÈÉÆ»ú¹¹£¬£¬£¬£¬£¬ÔÚ134¸ö¹ú¼Ò¿ªÕ¹Ô®ÖúÏîÄ¿£¬£¬£¬£¬£¬²¢µ£µ±ÁªºÏ¹úÁ¥Êô»ú¹¹¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ²¢·ÇÊ×Àý£¬£¬£¬£¬£¬½ñÄê5Ô£¬£¬£¬£¬£¬ChaosÀÕË÷Èí¼þ¼¯ÍÅÔø¹¥»÷¾ÈÊÀ¾ü²¢Ðû²¼Êý¾Ý£»£»£» £»£»¶ø±¾´Î¹¥»÷ÕßInterlockÍÅ»ï×Ô2024Äêβ·ºÆð£¬£¬£¬£¬£¬ÒÑÍù12¸öÔÂÒÑËðº¦ÖÁÉÙ66¸ö×éÖ¯£¬£¬£¬£¬£¬½ÓÄÉË«ÖØÀÕË÷Õ½ÂÔ£¬£¬£¬£¬£¬Í¨¹ýÈëÇÖÍøÕ¾»òÉç»á¹¤³Ìѧ»ñÈ¡ÆðԴפ×ãµã£¬£¬£¬£¬£¬6ÔºÍ8Ô¹¥»÷ÓÈΪ»îÔ¾¡£¡£¡£¡£¡£¡£¡£ÍøÂçÇå¾²ÍŶӯÊÎöÖ¸³ö£¬£¬£¬£¬£¬Ð¹Â¶Êý¾ÝÔ´ÓÚ΢ÈíSQL ServerÊý¾Ý¿â±¸·Ý£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜʹÓÃÕâЩ½á¹¹»¯Êý¾ÝʵÑéÉí·Ý͵ÇÔ¡¢ÐéαÕË»§½¨Éè»òÕ©Æ­¡£¡£¡£¡£¡£¡£¡£ÓÈÆäÖµµÃ¹Ø×¢µÄÊÇ£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜð³ä¾ÈÊÀ¾ü»òÆäËû´ÈÉÆ»ú¹¹¾ÙÐÐÕ©Æ­£¬£¬£¬£¬£¬Ê¹ÓþèÔùÕßµÄÉÆÐÄÓÕµ¼×ªÕË£¬£¬£¬£¬£¬»òͨ¹ý²ÆÎñÆÊÎö¾«×¼¶¨Î»¸ß¼ÛֵĿµÄ¡£¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/salvation-army-data-breach-donors/


6. LynxÀÕË÷ÍŻ﹥»÷ÂíÈøÖîÈûÖÝ»á¼ÆÊÂÎñËù


12ÔÂ29ÈÕ£¬£¬£¬£¬£¬¿ËÈÕ£¬£¬£¬£¬£¬Óë¶íÂÞ˹¹ØÁªµÄLynxÀÕË÷Èí¼þÍÅ»ïÐû³Æ£¬£¬£¬£¬£¬´ÓÓµÓÐ75ÄêÀúÊ·µÄÂíÈøÖîÈûÖÝ»á¼ÆÊÂÎñËùCSA Tax & AdvisoryÇÔÈ¡ÁË´ó×ÚÄÉ˰É걨Êý¾Ý¼°Éç»á°ü¹ÜºÅÂ룬£¬£¬£¬£¬²¢ÒÔ´ËÀÕË÷Êê½ð¡£¡£¡£¡£¡£¡£¡£CSA×÷ΪרӪ˰ÎñЧÀ͵Ļú¹¹£¬£¬£¬£¬£¬Æä¿Í»§Êý¾ÝÈôÔâй¶£¬£¬£¬£¬£¬½«ÃæÁÙÑÏÖØÍøÂç´¹ÂÚ¹¥»÷ºÍÉí·Ý͵ÇÔΣº¦¡£¡£¡£¡£¡£¡£¡£LynxÍÅ»ïÓÚ12ÔÂ26ÈÕÔÚ°µÍøÐ¹Â¶ÍøÕ¾Ðû²¼Í¨¸æ£¬£¬£¬£¬£¬Éù³ÆÒÑ»ñÈ¡¸Ã¹«Ë¾¼°¿Í»§µÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬²¢Ç¿µ÷¡°ÃãÀø¶Ô»°½â¾öÎÊÌâ¶ø·ÇÔÓÂÒÆÆË𡱡£¡£¡£¡£¡£¡£¡£ÎªÖ¤Êµ¹¥»÷ÕæÊµÐÔ£¬£¬£¬£¬£¬¸ÃÍÅ»ïÐû²¼Á˰üÀ¨È«Ãû¡¢Éç»áÇå¾²ºÅÂë¡¢ÎïÀíµØµã¡¢ÅäżҽÁưü¹ÜЭÒ顢ЧÀÍ·¢Æ±¡¢Ð¡ÎÒ˽¼ÒËùµÃ˰É걨Êý¾Ý¡¢¹ú˰¾Öµç×ÓÉ걨ÊðÃûÊÚȨ±í¸ñ¼°¹«Ë¾ÄÚ²¿ÐꝵĽØÍ¼¡£¡£¡£¡£¡£¡£¡£ÈôÊý¾ÝÊôʵ£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓÃÕâЩÏêϸСÎÒ˽¼ÒÐÅϢʵÑ龫׼թƭ£¬£¬£¬£¬£¬ÀýÈçð³ä˰Îñ»ú¹¹»òÒøÐУ¬£¬£¬£¬£¬ÓÕµ¼Êܺ¦ÕßתÕË»òй¶¸ü¶àÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/lynx-ransomware-csa-tax-breach/