FortiGateÎó²î²¹¶¡Èƹý¹¥»÷Òý·¢½ôÆÈÏìÓ¦
Ðû²¼Ê±¼ä 2026-01-221. FortiGateÎó²î²¹¶¡Èƹý¹¥»÷Òý·¢½ôÆÈÏìÓ¦
1ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬½üÆÚ£¬£¬£¬£¬£¬£¬Fortinet¿Í»§ÔâÓöÑÏÖØÇå¾²ÊÂÎñ£º¹¥»÷ÕßʹÓÃÒÑÐÞ¸´µÄFortiGateÉí·ÝÑéÖ¤Îó²îCVE-2025-59718µÄ²¹¶¡ÈƹýÎó²î£¬£¬£¬£¬£¬£¬ÀÖ³ÉÈëÇÖÒÑ´ò²¹¶¡µÄ·À»ðǽװ±¸¡£¡£¡£¡£¡£¸ÃÎó²îÉæ¼°FortiCloudµ¥µãµÇ¼(SSO)¹¦Ð§£¬£¬£¬£¬£¬£¬Ö»¹ÜFortinetÔÚ³õʼͨ¸æÖÐÇ¿µ÷£¬£¬£¬£¬£¬£¬Î´×¢²áFortiCareµÄ×°±¸Ä¬ÈÏδÆôÓøù¦Ð§£¬£¬£¬£¬£¬£¬¿ÉïÔÌÊÜÓ°Ïì¹æÄ££¬£¬£¬£¬£¬£¬µ«Shadowserver»ù½ð»á12ÔÂÖÐÑ®µÄɨÃèÏÔʾ£¬£¬£¬£¬£¬£¬ÈÔÓÐÁè¼Ý25,000̨ÆôÓÃFortiCloud SSOµÄFortinet×°±¸Ì»Â¶ÔÚ»¥ÁªÍøÉÏ¡£¡£¡£¡£¡£Ö»¹ÜÏÖÔÚ³¬°ëÊý×°±¸ÒÑÊܱ£»£»£»£»£»£»£»¤£¬£¬£¬£¬£¬£¬ÈÔÓÐÁè¼Ý11,000̨װ±¸¿É±»¹ûÕæ»á¼û£¬£¬£¬£¬£¬£¬×é³ÉÖØ´óΣº¦¡£¡£¡£¡£¡£ÎªÓ¦¶ÔÍþв£¬£¬£¬£¬£¬£¬Fortinet½¨ÒéÖÎÀíÔ±ÔÚÌṩÍêÈ«ÐÞ¸´µÄFortiOS°æ±¾Ç°£¬£¬£¬£¬£¬£¬ÔÝʱ½ûÓÃFortiCloudµÇ¼¹¦Ð§¡£¡£¡£¡£¡£Ïêϸ²Ù×÷¿Éͨ¹ýWeb½çÃæ½øÈë"ϵͳ"¡ú"ÉèÖÃ"£¬£¬£¬£¬£¬£¬¹Ø±Õ"ÔÊÐíʹÓÃFortiCloud SSO¾ÙÐÐÖÎÀíÔ±µÇ¼"Ñ¡Ï£¬£¬£¬£¬£¬»òͨ¹ýÏÂÁîÐÐÖ´ÐÐ"config system global; set admin-forticloud-sso-login disable; end"ʵÏÖ¡£¡£¡£¡£¡£ÃÀ¹úÍøÂçÇå¾²Óë»ù´¡ÉèÊ©Çå¾²¾Ö(CISA)Òѽ«¸ÃÎó²îÁÐÈë"ÕýÔÚ±»Ê¹ÓõÄÎó²î"Çåµ¥£¬£¬£¬£¬£¬£¬ÒªÇóÁª°î»ú¹¹ÔÚÒ»ÖÜÄÚÍê³ÉÐÞ²¹¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/fortinet-admins-report-patched-fortigate-firewalls-getting-hacked/
2. ÒÁÀʵçÊǪ́ÔâºÚ¿Í¹¥»÷²¥·ÅÍõ´¢½²»°
1ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬ÒÁÀʶà¼ÒµçÊǪ́½ÚÄ¿1ÔÂ18ÈÕÍí¼äÔâºÚ¿ÍÖÐÖ¹£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ý°ÍµÂ¶ûÎÀÐÇ´«Êäϵͳ½ÓÊÜÐźţ¬£¬£¬£¬£¬£¬²¥·Åİͷ¿¹Òé»Ãæ¼°ÍöÃüÍõ´¢ÀñÈø¡¤°ÍÁÐάµÄÊ®·ÖÖÓÔ¤ÏÈÂ¼ÖÆ½²»°¡£¡£¡£¡£¡£°ÍÁÐάÔÚÊÓÆµÖкôÓõÒÁÀʹúÃñ¾üÓëÃñÖÚÍŽᣬ£¬£¬£¬£¬£¬Ö¸ÔðÇå¾²²½¶Ó¡°Ð§ÖÒÒÁ˹À¼¹²ºÍ¹ú¶ø·ÇÒÁÀÊ¡±£¬£¬£¬£¬£¬£¬²¢Éù³Æ²¿·ÖÊ¿±øÒѵ¹¸ê£¬£¬£¬£¬£¬£¬µ«Î´Ìṩ֤¾Ý¡£¡£¡£¡£¡£´Ë´Î¹¥»÷Ó°ÏìÁËÒÁÀÊÒÁ˹À¼¹²ºÍ¹ú¹ã²¥µçÊǪ́£¨IRIB£©ÁýÕÖÅ©´åµØÇøµÄÎÀÐÇÐźţ¬£¬£¬£¬£¬£¬Ïà¹ØÊÓÆµÆ¬¶ÏѸËÙ±»°ÍÁÐάÍŶӡ¢ÒÁÀʹú¼ÊµçÊǪ́¼°ÍâµØÃ½Ìåת·¢Èö²¥¡£¡£¡£¡£¡£ÊÂÎñ±¬·¢ÔÚÒÁÀÊÉîÏݾ¼ÃΣ»£»£»£»£»£»£»úÖ®¼Ê¡£¡£¡£¡£¡£×Ô2025Äê12ÔÂβÆð£¬£¬£¬£¬£¬£¬ÒÁÀÊÇ®±ÒÀïÑǶû´ó·ù±áÖµ£¬£¬£¬£¬£¬£¬Ê³Îï¼ÛǮʧ¿ØìÉý£¬£¬£¬£¬£¬£¬ÃñÖÚ½«¾¼ÃÄæ¾³¹é×ïÓÚÕþ¸®ÃÓÀᣡ£¡£¡£¡£Îª×èÖ¹±©Á¦ÐÂÎÅÈö²¥£¬£¬£¬£¬£¬£¬ÒÁÀÊÕþ¸®¹Ø±Õ»¥ÁªÍøºÍÒÆ¶¯Ð§Àͳ¤´ïÁ½ÖÜ¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬²¿·ÖסÃñͨ¹ýÐÇÁ´ÎÀÐÇÌ×¼þ½«ºÚ¿ÍÇÔÈ¡µÄÊÓÆµÈö²¥ÖÁÈ«Çò¡£¡£¡£¡£¡£ÓëÒÁÀʸïÃüÎÀ¶Ó¹ØÁªµÄ·¨¶û˹ͨѶÉçÔ®Òý¹ú¼Ò¹ã²¥¹«Ë¾Ëµ·¨£¬£¬£¬£¬£¬£¬³Æ²¿·ÖµØÇøÐźš°Òò²»Ã÷Ôµ¹ÊÔÓɶÌÔÝÖÐÖ¹¡±£¬£¬£¬£¬£¬£¬µ«Î´Ìá¼°¿¹ÒéÊÓÆµ»òÍõ´¢½²»°ÄÚÈÝ¡£¡£¡£¡£¡£
https://hackread.com/iranian-tv-transmission-hacked-exiled-prince-message/
3. Cisco½ôÆÈÐÞ¸´¸ßΣÁãÈÕÎó²îCVE-2026-20045
1ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬Ë¼¿Æ¹«Ë¾¿ËÈÕÐÞ¸´ÁËÒ»¸öÑÏÖØµÄ¸ßΣÁãÈÕÔ¶³Ì´úÂëÖ´ÐÐÎó²îCVE-2026-20045£¨CVSSÆÀ·Ö8.2£©£¬£¬£¬£¬£¬£¬¸ÃÎó²îÒѱ»·¢Ã÷±»Æð¾¢Ê¹ÓÃÓÚ¹¥»÷¡£¡£¡£¡£¡£´ËÎó²îÔ´ÓÚHTTPÇëÇóÖÐÓû§ÊäÈëÐÅÏ¢ÑéÖ¤²»µ±£¬£¬£¬£¬£¬£¬Î´¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿Éͨ¹ýÏòÊÜÓ°Ïì×°±¸µÄWebÖÎÀí½çÃæ·¢ËÍÈ«ÐĽṹµÄHTTPÇëÇ󣬣¬£¬£¬£¬£¬ÔÚ×°±¸µ×²ã²Ù×÷ϵͳִÐÐí§ÒâÏÂÁ£¬£¬£¬£¬£¬×îÖÕ¿ÉÄÜ»ñÈ¡rootȨÏÞ¡£¡£¡£¡£¡£ÊÜÓ°Ïì²úÆ·°üÀ¨Cisco Unified CM¡¢Unified CM SME¡¢IM & Presence¡¢Unity Connection¼°Webex Calling Dedicated Instance¡£¡£¡£¡£¡£ÏêϸÐÞ¸´°æ±¾ÈçÏ£ºUnified CMµÈϵÁÐ12.5°æ±¾ÐèǨáãÖÁÀο¿°æ±¾£»£»£»£»£»£»£»14°æ±¾ÐèÉý¼¶ÖÁ14SU5»òÓ¦Óò¹¶¡Îļþ£»£»£»£»£»£»£»15°æ±¾ÐèÉý¼¶ÖÁ2026Äê3ÔÂÐû²¼µÄ15SU4»òÓ¦ÓöÔÓ¦²¹¶¡¡£¡£¡£¡£¡£Unity ConnectionͬÑùÐèÆ¾Ö¤°æ±¾Éý¼¶ÖÁ14SU5»ò15SU4²¢Ó¦Óò¹¶¡¡£¡£¡£¡£¡£Ë¼¿ÆÇ¿µ÷²¹¶¡Óë°æ±¾ÑÏ¿á¶ÔÓ¦£¬£¬£¬£¬£¬£¬Óû§Ðè²Î¿¼²¹¶¡READMEÎļþ²Ù×÷¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬´Ë´ÎÐÞ¸´ÎÞÔÝʱ½â¾ö¼Æ»®£¬£¬£¬£¬£¬£¬Ë¼¿ÆÇå¾²Ó¦¼±ÏìӦС×飨PSIRT£©ÒÑÈ·Èϱ£´æÊ¹ÓÃʵÑ飬£¬£¬£¬£¬£¬Ç¿ÁÒ½¨Òé¿Í»§Éý¼¶ÖÁÐÞ¸´°æ±¾¡£¡£¡£¡£¡£
https://securityaffairs.com/187177/security/cisco-fixed-actively-exploited-unified-communications-zero-day.html
4. Zendesk¹¤µ¥ÏµÍ³ÔâÈ«Çò´ó¹æÄ£À¬»øÓʼþ¹¥»÷
1ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬È«ÇòÓû§ÔâÓöÓÉZendeskÖ§³ÖϵͳÒý·¢µÄ´ó¹æÄ£À¬»øÓʼþ¹¥»÷£¬£¬£¬£¬£¬£¬Êܺ¦ÕßÊÕµ½Êý°Ù·âÖ÷Ìâ¹îÒìÇÒÄÚÈÝÔÓÂÒµÄÓʼþ£¬£¬£¬£¬£¬£¬Òý·¢ÆÕ±éÒÉÐÄÓë¿Ö»Å¡£¡£¡£¡£¡£´Ë´Î¹¥»÷Ô´ÓÚZendeskÔÊÐíδÂÄÀúÖ¤Óû§Ìá½»Ö§³Ö¹¤µ¥µÄÎó²î£¬£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ý±éÀúº£Á¿ÓʼþµØµãÁÐ±í½¨ÉèÐéα¹¤µ¥£¬£¬£¬£¬£¬£¬´¥·¢ÏµÍ³×Ô¶¯·¢ËÍÈ·ÈÏÓʼþ£¬£¬£¬£¬£¬£¬½«Õýµ±ÆóÒµµÄZendeskƽ̨±äΪÀ¬»øÓʼþÖмÌÕ¾¡£¡£¡£¡£¡£ÊÜÓ°ÏìÆóÒµº¸Ç¿Æ¼¼¡¢ÓÎÏ·¡¢ÕþÎñµÈ¶àÁìÓò£¬£¬£¬£¬£¬£¬°üÀ¨Discord¡¢Tinder¡¢Riot Games¡¢Dropbox¡¢CD Projekt¡¢ÌïÄÉÎ÷ÖÝÀ͹¤²¿µÈ³¬20¼Ò»ú¹¹¡£¡£¡£¡£¡£ÓʼþÖ÷Ìâ·ºÆð¸ß¶ÈÒÉ»óÐÔÌØÕ÷£º²¿·Öαװִ·¨Í¨Öª¡¢²¿·ÖÔÊÐíÃâ·Ñ¸£Àû¡¢¸üÓдó×ÚʹÓÃUnicode×°ÊÎ×ÖÌå±àдµÄÂÒÂëÄÚÈÝ¡£¡£¡£¡£¡£ÓÉÓÚÓʼþÔ´×ÔÕý¹æÆóҵϵͳ£¬£¬£¬£¬£¬£¬Æä¿ÉÐŶÈÔ¶³¬Í¨Ë×À¬»øÓʼþ£¬£¬£¬£¬£¬£¬ÀÖ³ÉÈÆ¹ýÀ¬»øÓʼþ¹ýÂËÆ÷£¬£¬£¬£¬£¬£¬Ðγɸü´óÈÅÂÒÐÔ¡£¡£¡£¡£¡£ÉæÊÂÆóҵѸËÙ»ØÓ¦£ºDropbox¡¢2KµÈÃ÷È·ÌåÏÖÓʼþΪϵͳÀÄÓòúÆ·£¬£¬£¬£¬£¬£¬Ç¿µ÷Æä"¿ªÏ°൥Ìá½»"Õþ²ßËä±ãµ±µ«±£´æÎ£º¦£¬£¬£¬£¬£¬£¬ÔÊÐíδ¾ÕË»§³ÖÓÐÈËÑéÖ¤²»»á´¦Öóͷ£Ãô¸ÐÇëÇ󣬣¬£¬£¬£¬£¬½¨ÒéÓû§Ö±½ÓºöÂÔÒì³£Óʼþ¡£¡£¡£¡£¡£Zendesk¹Ù·½Åû¶£¬£¬£¬£¬£¬£¬¹«Ë¾ÒѽôÆÈ°²ÅÅÐÂÐÍÇå¾²¹¦Ð§£¬£¬£¬£¬£¬£¬Í¨¹ýÔöÇ¿¼à¿ØËã·¨ÓëʵÑé»î¶¯ÏÞÖÆ£¬£¬£¬£¬£¬£¬ÌáÉý¶ÔÒì³£¹¤µ¥µÄ¼ì²âÓë×赲ЧÂÊ¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/zendesk-ticket-systems-hijacked-in-massive-global-spam-wave/
5. ÐÂÐͰ²×¿µã»÷Ú²ÆÄ¾ÂíʹÓÃTensorFlowÊÖÒÕÈö²¥
1ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬½üÆÚ£¬£¬£¬£¬£¬£¬Ò»ÖÖÐÂÐͰ²×¿µã»÷Ú²ÆÄ¾Âíͨ¹ýСÃ×¹Ù·½Ó¦ÓÃÊÐËÁGetAppsÈö²¥£¬£¬£¬£¬£¬£¬Ê¹ÓÃTensorFlow»úеѧϰģ×Ó×Ô¶¯¼ì²â²¢½»»¥¹ã¸æÔªËØ£¬£¬£¬£¬£¬£¬Òý·¢Çå¾²¹Ø×¢¡£¡£¡£¡£¡£¸ÃľÂí½ÓÄÉÁ½ÖÖÔËÐÐģʽ£º"»ÃÓ°"ģʽͨ¹ýÒþ²ØµÄWebViewä¯ÀÀÆ÷¼ÓÔØÄ¿µÄÒ³Ãæ£¬£¬£¬£¬£¬£¬½ØÈ¡ÆÁÄ»½ØÍ¼ºóÓÉTensorFlow.jsÆÊÎö¹ã¸æÔªËØ£¬£¬£¬£¬£¬£¬Ä£ÄâÓû§µã»÷£»£»£»£»£»£»£»"ÐźÅת´ï"ģʽÔòͨ¹ýWebRTC´«ÊäʵʱÊÓÆµÁ÷ÖÁ¹¥»÷Õߣ¬£¬£¬£¬£¬£¬Ö§³ÖÔ¶³Ì²Ù×÷µã»÷¡¢×ª¶¯µÈÐÐΪ¡£¡£¡£¡£¡£ÕâÖÖ»ùÓÚÊÓ¾õÆÊÎöµÄ»úÖÆÍ»ÆÆÁ˹Űå¾ç±¾DOM½»»¥µÄÏÞÖÆ£¬£¬£¬£¬£¬£¬Äܸü¸ßЧӦ¶Ô¶¯Ì¬¹ã¸æµÄƵÈԽṹת±ä¡£¡£¡£¡£¡£Ä¾ÂíÈö²¥Â·¾¶Òþ²Ø£º¹¥»÷ÕßÊ×ÏȽ«Õý³£ÓÎÏ·Ó¦ÓÃÌá½»ÖÁGetApps£¬£¬£¬£¬£¬£¬ºóÐøÍ¨¹ý¸üÐÂÌí¼Ó¶ñÒâ×é¼þ¡£¡£¡£¡£¡£Dr.WebÑо¿ÏÔʾ£¬£¬£¬£¬£¬£¬ÊÜѬȾÓÎÏ·°üÀ¨¡¶ÏÀµÁÁÔ³µÊÖ£ººÚÊÖµ³¡·£¨6.1Íò´ÎÏÂÔØ£©¡¢¡¶¿É°®³èÎïÎÝ¡·£¨3.4Íò´ÎÏÂÔØ£©µÈ£¬£¬£¬£¬£¬£¬ÁýÕÖ¶à¸öÈÈÃÅÓÎÏ·¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬Ä¾Âí»¹Í¨¹ýµÚÈý·½APKÍøÕ¾£¨ÈçApkmody¡¢Moddroid£©¡¢TelegramƵµÀ¼°ÓµÓÐ2.4Íò¶©ÔÄÕßµÄDiscordЧÀÍÆ÷À©É¢£¬£¬£¬£¬£¬£¬Éæ¼°Spotify Pro¡¢Netflix modµÈÐ޸İæÓ¦Óᣡ£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-android-malware-uses-ai-to-click-on-hidden-browser-ads/
6. Î÷°àÑÀPcComponentes·ñ¶¨1600Íò¿Í»§Êý¾Ýй¶
1ÔÂ21ÈÕ£¬£¬£¬£¬£¬£¬Î÷°àÑÀ¿Æ¼¼ÁãÊÛÉÌPcComponentes¿ËÈÕ·ñ¶¨ÆäϵͳÔâÓö´ó¹æÄ£Êý¾Ýй¶ӰÏì1600Íò¿Í»§µÄ˵·¨£¬£¬£¬£¬£¬£¬µ«Ö¤ÊµÔâÊÜײ¿â¹¥»÷¡£¡£¡£¡£¡£´Ëǰ£¬£¬£¬£¬£¬£¬ºÚ¿Í×éÖ¯"daghetiaw"Éù³ÆÇÔÈ¡¸Ã¹«Ë¾1630ÍòÌõ¿Í»§¼Í¼£¬£¬£¬£¬£¬£¬²¢Ð¹Â¶50ÍòÌõÑù±¾£¬£¬£¬£¬£¬£¬Ê£Óà¼Í¼¶Ú»ý¾ÓÆæ¡£¡£¡£¡£¡£Ð¹Â¶Êý¾Ý°üÀ¨¶©µ¥ÏêÇé¡¢ÏÖʵµØµã¡¢È«Ãû¡¢µç»°ºÅÂë¡¢IPµØµã¡¢²úÆ·Ô¸ÍûÇåµ¥¼°ZendeskÖ§³Ö¶Ô»°¼Í¼¡£¡£¡£¡£¡£PcComponentesÔÚÊÓ²ìºóÉùÃ÷£¬£¬£¬£¬£¬£¬ÆäÊý¾Ý¿âºÍÄÚ²¿ÏµÍ³Î´·¢Ã÷²»·¨»á¼ûÖ¤¾Ý£¬£¬£¬£¬£¬£¬Ç¿µ÷"1600ÍòÊÜÓ°Ïì¿Í»§"Êý×Ö²»Êµ£¬£¬£¬£¬£¬£¬Òò»îÔ¾ÕË»§ÊýĿԶµÍÓÚ´Ë£¬£¬£¬£¬£¬£¬ÇÒϵͳÖдÓδ´æ´¢²ÆÎñÐÅÏ¢»ò¿Í»§ÃÜÂë¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬¹«Ë¾ÈϿɼì²âµ½×²¿â¹¥»÷ºÛ¼££¬£¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÆäËûƽ̨й¶µÄÓÊÏäÃÜÂë×éºÏ£¬£¬£¬£¬£¬£¬Í¨¹ý×Ô¶¯»¯¹¤¾ßʵÑéµÇ¼PcComponentesÕË»§¡£¡£¡£¡£¡£ÍþвÇ鱨¹«Ë¾Hudson RockÆÊÎö·¢Ã÷£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜͨ¹ýѬȾÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þµÄÅÌËã»úÍøÂçµÇ¼ƾ֤£¬£¬£¬£¬£¬£¬²¿·Ö¼Í¼¿É×·ËÝÖÁ2020Äê¡£¡£¡£¡£¡£ÆäÑéÖ¤µÄÁù¸öÓÊÏä¾ùÔÚÒÑÖªÇÔÃÜÈÕÖ¾Öб£´æ£¬£¬£¬£¬£¬£¬Ö¤Êµ¹¥»÷ÓëÀúʷй¶Êý¾Ý±£´æ¹ØÁª¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/online-retailer-pccomponentes-says-data-breach-claims-are-fake/


¾©¹«Íø°²±¸11010802024551ºÅ