FortiGateÎó²î²¹¶¡Èƹý¹¥»÷Òý·¢½ôÆÈÏìÓ¦

Ðû²¼Ê±¼ä 2026-01-22

1. FortiGateÎó²î²¹¶¡Èƹý¹¥»÷Òý·¢½ôÆÈÏìÓ¦


1ÔÂ21ÈÕ £¬ £¬£¬£¬£¬£¬½üÆÚ £¬ £¬£¬£¬£¬£¬Fortinet¿Í»§ÔâÓöÑÏÖØÇå¾²ÊÂÎñ£º¹¥»÷ÕßʹÓÃÒÑÐÞ¸´µÄFortiGateÉí·ÝÑéÖ¤Îó²îCVE-2025-59718µÄ²¹¶¡ÈƹýÎó²î £¬ £¬£¬£¬£¬£¬ÀÖ³ÉÈëÇÖÒÑ´ò²¹¶¡µÄ·À»ðǽװ±¸¡£¡£¡£¡£¡£¸ÃÎó²îÉæ¼°FortiCloudµ¥µãµÇ¼(SSO)¹¦Ð§ £¬ £¬£¬£¬£¬£¬Ö»¹ÜFortinetÔÚ³õʼͨ¸æÖÐÇ¿µ÷ £¬ £¬£¬£¬£¬£¬Î´×¢²áFortiCareµÄ×°±¸Ä¬ÈÏδÆôÓøù¦Ð§ £¬ £¬£¬£¬£¬£¬¿ÉïÔÌ­ÊÜÓ°Ïì¹æÄ£ £¬ £¬£¬£¬£¬£¬µ«Shadowserver»ù½ð»á12ÔÂÖÐÑ®µÄɨÃèÏÔʾ £¬ £¬£¬£¬£¬£¬ÈÔÓÐÁè¼Ý25,000̨ÆôÓÃFortiCloud SSOµÄFortinet×°±¸Ì»Â¶ÔÚ»¥ÁªÍøÉÏ¡£¡£¡£¡£¡£Ö»¹ÜÏÖÔÚ³¬°ëÊý×°±¸ÒÑÊܱ£»£»£»£»£»£»£»¤ £¬ £¬£¬£¬£¬£¬ÈÔÓÐÁè¼Ý11,000̨װ±¸¿É±»¹ûÕæ»á¼û £¬ £¬£¬£¬£¬£¬×é³ÉÖØ´óΣº¦¡£¡£¡£¡£¡£ÎªÓ¦¶ÔÍþв £¬ £¬£¬£¬£¬£¬Fortinet½¨ÒéÖÎÀíÔ±ÔÚÌṩÍêÈ«ÐÞ¸´µÄFortiOS°æ±¾Ç° £¬ £¬£¬£¬£¬£¬ÔÝʱ½ûÓÃFortiCloudµÇ¼¹¦Ð§¡£¡£¡£¡£¡£Ïêϸ²Ù×÷¿Éͨ¹ýWeb½çÃæ½øÈë"ϵͳ"¡ú"ÉèÖÃ" £¬ £¬£¬£¬£¬£¬¹Ø±Õ"ÔÊÐíʹÓÃFortiCloud SSO¾ÙÐÐÖÎÀíÔ±µÇ¼"Ñ¡Ïî £¬ £¬£¬£¬£¬£¬»òͨ¹ýÏÂÁîÐÐÖ´ÐÐ"config system global; set admin-forticloud-sso-login disable; end"ʵÏÖ¡£¡£¡£¡£¡£ÃÀ¹úÍøÂçÇå¾²Óë»ù´¡ÉèÊ©Çå¾²¾Ö(CISA)Òѽ«¸ÃÎó²îÁÐÈë"ÕýÔÚ±»Ê¹ÓõÄÎó²î"Çåµ¥ £¬ £¬£¬£¬£¬£¬ÒªÇóÁª°î»ú¹¹ÔÚÒ»ÖÜÄÚÍê³ÉÐÞ²¹¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/fortinet-admins-report-patched-fortigate-firewalls-getting-hacked/


2. ÒÁÀʵçÊǪ́ÔâºÚ¿Í¹¥»÷²¥·ÅÍõ´¢½²»°


1ÔÂ21ÈÕ £¬ £¬£¬£¬£¬£¬ÒÁÀʶà¼ÒµçÊǪ́½ÚÄ¿1ÔÂ18ÈÕÍí¼äÔâºÚ¿ÍÖÐÖ¹ £¬ £¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ý°ÍµÂ¶ûÎÀÐÇ´«Êäϵͳ½ÓÊÜÐźŠ£¬ £¬£¬£¬£¬£¬²¥·Åİͷ¿¹Òé»­Ãæ¼°ÍöÃüÍõ´¢ÀñÈø¡¤°ÍÁÐάµÄÊ®·ÖÖÓÔ¤ÏÈÂ¼ÖÆ½²»°¡£¡£¡£¡£¡£°ÍÁÐάÔÚÊÓÆµÖкôÓõÒÁÀʹúÃñ¾üÓëÃñÖÚÍÅ½á £¬ £¬£¬£¬£¬£¬Ö¸ÔðÇå¾²²½¶Ó¡°Ð§ÖÒÒÁ˹À¼¹²ºÍ¹ú¶ø·ÇÒÁÀÊ¡± £¬ £¬£¬£¬£¬£¬²¢Éù³Æ²¿·ÖÊ¿±øÒѵ¹¸ê £¬ £¬£¬£¬£¬£¬µ«Î´Ìṩ֤¾Ý¡£¡£¡£¡£¡£´Ë´Î¹¥»÷Ó°ÏìÁËÒÁÀÊÒÁ˹À¼¹²ºÍ¹ú¹ã²¥µçÊǪ́£¨IRIB£©ÁýÕÖÅ©´åµØÇøµÄÎÀÐÇÐźŠ£¬ £¬£¬£¬£¬£¬Ïà¹ØÊÓÆµÆ¬¶ÏѸËÙ±»°ÍÁÐάÍŶӡ¢ÒÁÀʹú¼ÊµçÊǪ́¼°ÍâµØÃ½Ìåת·¢Èö²¥¡£¡£¡£¡£¡£ÊÂÎñ±¬·¢ÔÚÒÁÀÊÉîÏݾ­¼ÃΣ»£»£»£»£»£»£»úÖ®¼Ê¡£¡£¡£¡£¡£×Ô2025Äê12ÔÂβÆð £¬ £¬£¬£¬£¬£¬ÒÁÀÊÇ®±ÒÀïÑǶû´ó·ù±áÖµ £¬ £¬£¬£¬£¬£¬Ê³Îï¼ÛǮʧ¿Øì­Éý £¬ £¬£¬£¬£¬£¬ÃñÖÚ½«¾­¼ÃÄæ¾³¹é×ïÓÚÕþ¸®ÃÓÀᣡ£¡£¡£¡£Îª×èÖ¹±©Á¦ÐÂÎÅÈö²¥ £¬ £¬£¬£¬£¬£¬ÒÁÀÊÕþ¸®¹Ø±Õ»¥ÁªÍøºÍÒÆ¶¯Ð§Àͳ¤´ïÁ½ÖÜ¡£¡£¡£¡£¡£È»¶ø £¬ £¬£¬£¬£¬£¬²¿·ÖסÃñͨ¹ýÐÇÁ´ÎÀÐÇÌ×¼þ½«ºÚ¿ÍÇÔÈ¡µÄÊÓÆµÈö²¥ÖÁÈ«Çò¡£¡£¡£¡£¡£ÓëÒÁÀʸïÃüÎÀ¶Ó¹ØÁªµÄ·¨¶û˹ͨѶÉçÔ®Òý¹ú¼Ò¹ã²¥¹«Ë¾Ëµ·¨ £¬ £¬£¬£¬£¬£¬³Æ²¿·ÖµØÇøÐźš°Òò²»Ã÷Ôµ¹ÊÔ­ÓɶÌÔÝÖÐÖ¹¡± £¬ £¬£¬£¬£¬£¬µ«Î´Ìá¼°¿¹ÒéÊÓÆµ»òÍõ´¢½²»°ÄÚÈÝ¡£¡£¡£¡£¡£


https://hackread.com/iranian-tv-transmission-hacked-exiled-prince-message/


3. Cisco½ôÆÈÐÞ¸´¸ßΣÁãÈÕÎó²îCVE-2026-20045


1ÔÂ21ÈÕ £¬ £¬£¬£¬£¬£¬Ë¼¿Æ¹«Ë¾¿ËÈÕÐÞ¸´ÁËÒ»¸öÑÏÖØµÄ¸ßΣÁãÈÕÔ¶³Ì´úÂëÖ´ÐÐÎó²îCVE-2026-20045£¨CVSSÆÀ·Ö8.2£© £¬ £¬£¬£¬£¬£¬¸ÃÎó²îÒѱ»·¢Ã÷±»Æð¾¢Ê¹ÓÃÓÚ¹¥»÷¡£¡£¡£¡£¡£´ËÎó²îÔ´ÓÚHTTPÇëÇóÖÐÓû§ÊäÈëÐÅÏ¢ÑéÖ¤²»µ± £¬ £¬£¬£¬£¬£¬Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿Éͨ¹ýÏòÊÜÓ°Ïì×°±¸µÄWebÖÎÀí½çÃæ·¢ËÍÈ«ÐĽṹµÄHTTPÇëÇó £¬ £¬£¬£¬£¬£¬ÔÚ×°±¸µ×²ã²Ù×÷ϵͳִÐÐí§ÒâÏÂÁî £¬ £¬£¬£¬£¬£¬×îÖÕ¿ÉÄÜ»ñÈ¡rootȨÏÞ¡£¡£¡£¡£¡£ÊÜÓ°Ïì²úÆ·°üÀ¨Cisco Unified CM¡¢Unified CM SME¡¢IM & Presence¡¢Unity Connection¼°Webex Calling Dedicated Instance¡£¡£¡£¡£¡£ÏêϸÐÞ¸´°æ±¾ÈçÏ£ºUnified CMµÈϵÁÐ12.5°æ±¾ÐèǨáãÖÁÀο¿°æ±¾£»£»£»£»£»£»£»14°æ±¾ÐèÉý¼¶ÖÁ14SU5»òÓ¦Óò¹¶¡Îļþ£»£»£»£»£»£»£»15°æ±¾ÐèÉý¼¶ÖÁ2026Äê3ÔÂÐû²¼µÄ15SU4»òÓ¦ÓöÔÓ¦²¹¶¡¡£¡£¡£¡£¡£Unity ConnectionͬÑùÐèÆ¾Ö¤°æ±¾Éý¼¶ÖÁ14SU5»ò15SU4²¢Ó¦Óò¹¶¡¡£¡£¡£¡£¡£Ë¼¿ÆÇ¿µ÷²¹¶¡Óë°æ±¾ÑÏ¿á¶ÔÓ¦ £¬ £¬£¬£¬£¬£¬Óû§Ðè²Î¿¼²¹¶¡READMEÎļþ²Ù×÷¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ £¬ £¬£¬£¬£¬£¬´Ë´ÎÐÞ¸´ÎÞÔÝʱ½â¾ö¼Æ»® £¬ £¬£¬£¬£¬£¬Ë¼¿ÆÇå¾²Ó¦¼±ÏìӦС×飨PSIRT£©ÒÑÈ·Èϱ£´æÊ¹ÓÃʵÑé £¬ £¬£¬£¬£¬£¬Ç¿ÁÒ½¨Òé¿Í»§Éý¼¶ÖÁÐÞ¸´°æ±¾¡£¡£¡£¡£¡£


https://securityaffairs.com/187177/security/cisco-fixed-actively-exploited-unified-communications-zero-day.html


4. Zendesk¹¤µ¥ÏµÍ³ÔâÈ«Çò´ó¹æÄ£À¬»øÓʼþ¹¥»÷


1ÔÂ21ÈÕ £¬ £¬£¬£¬£¬£¬È«ÇòÓû§ÔâÓöÓÉZendeskÖ§³ÖϵͳÒý·¢µÄ´ó¹æÄ£À¬»øÓʼþ¹¥»÷ £¬ £¬£¬£¬£¬£¬Êܺ¦ÕßÊÕµ½Êý°Ù·âÖ÷Ìâ¹îÒìÇÒÄÚÈÝÔÓÂÒµÄÓʼþ £¬ £¬£¬£¬£¬£¬Òý·¢ÆÕ±éÒÉÐÄÓë¿Ö»Å¡£¡£¡£¡£¡£´Ë´Î¹¥»÷Ô´ÓÚZendeskÔÊÐíδÂÄÀúÖ¤Óû§Ìá½»Ö§³Ö¹¤µ¥µÄÎó²î £¬ £¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ý±éÀúº£Á¿ÓʼþµØµãÁÐ±í½¨ÉèÐéα¹¤µ¥ £¬ £¬£¬£¬£¬£¬´¥·¢ÏµÍ³×Ô¶¯·¢ËÍÈ·ÈÏÓʼþ £¬ £¬£¬£¬£¬£¬½«Õýµ±ÆóÒµµÄZendeskƽ̨±äΪÀ¬»øÓʼþÖмÌÕ¾¡£¡£¡£¡£¡£ÊÜÓ°ÏìÆóÒµº­¸Ç¿Æ¼¼¡¢ÓÎÏ·¡¢ÕþÎñµÈ¶àÁìÓò £¬ £¬£¬£¬£¬£¬°üÀ¨Discord¡¢Tinder¡¢Riot Games¡¢Dropbox¡¢CD Projekt¡¢ÌïÄÉÎ÷ÖÝÀ͹¤²¿µÈ³¬20¼Ò»ú¹¹¡£¡£¡£¡£¡£ÓʼþÖ÷Ìâ·ºÆð¸ß¶ÈÒÉ»óÐÔÌØÕ÷£º²¿·Öαװִ·¨Í¨Öª¡¢²¿·ÖÔÊÐíÃâ·Ñ¸£Àû¡¢¸üÓдó×ÚʹÓÃUnicode×°ÊÎ×ÖÌå±àдµÄÂÒÂëÄÚÈÝ¡£¡£¡£¡£¡£ÓÉÓÚÓʼþÔ´×ÔÕý¹æÆóҵϵͳ £¬ £¬£¬£¬£¬£¬Æä¿ÉÐŶÈÔ¶³¬Í¨Ë×À¬»øÓʼþ £¬ £¬£¬£¬£¬£¬ÀÖ³ÉÈÆ¹ýÀ¬»øÓʼþ¹ýÂËÆ÷ £¬ £¬£¬£¬£¬£¬Ðγɸü´óÈÅÂÒÐÔ¡£¡£¡£¡£¡£ÉæÊÂÆóҵѸËÙ»ØÓ¦£ºDropbox¡¢2KµÈÃ÷È·ÌåÏÖÓʼþΪϵͳÀÄÓòúÆ· £¬ £¬£¬£¬£¬£¬Ç¿µ÷Æä"¿ªÏ°൥Ìá½»"Õþ²ßËä±ãµ±µ«±£´æÎ£º¦ £¬ £¬£¬£¬£¬£¬ÔÊÐíδ¾­ÕË»§³ÖÓÐÈËÑéÖ¤²»»á´¦Öóͷ£Ãô¸ÐÇëÇó £¬ £¬£¬£¬£¬£¬½¨ÒéÓû§Ö±½ÓºöÂÔÒì³£Óʼþ¡£¡£¡£¡£¡£Zendesk¹Ù·½Åû¶ £¬ £¬£¬£¬£¬£¬¹«Ë¾ÒѽôÆÈ°²ÅÅÐÂÐÍÇå¾²¹¦Ð§ £¬ £¬£¬£¬£¬£¬Í¨¹ýÔöÇ¿¼à¿ØËã·¨ÓëʵÑé»î¶¯ÏÞÖÆ £¬ £¬£¬£¬£¬£¬ÌáÉý¶ÔÒì³£¹¤µ¥µÄ¼ì²âÓë×赲ЧÂÊ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/zendesk-ticket-systems-hijacked-in-massive-global-spam-wave/


5. ÐÂÐͰ²×¿µã»÷ڲƭľÂíʹÓÃTensorFlowÊÖÒÕÈö²¥


1ÔÂ21ÈÕ £¬ £¬£¬£¬£¬£¬½üÆÚ £¬ £¬£¬£¬£¬£¬Ò»ÖÖÐÂÐͰ²×¿µã»÷ڲƭľÂíͨ¹ýСÃ×¹Ù·½Ó¦ÓÃÊÐËÁGetAppsÈö²¥ £¬ £¬£¬£¬£¬£¬Ê¹ÓÃTensorFlow»úеѧϰģ×Ó×Ô¶¯¼ì²â²¢½»»¥¹ã¸æÔªËØ £¬ £¬£¬£¬£¬£¬Òý·¢Çå¾²¹Ø×¢¡£¡£¡£¡£¡£¸ÃľÂí½ÓÄÉÁ½ÖÖÔËÐÐģʽ£º"»ÃÓ°"ģʽͨ¹ýÒþ²ØµÄWebViewä¯ÀÀÆ÷¼ÓÔØÄ¿µÄÒ³Ãæ £¬ £¬£¬£¬£¬£¬½ØÈ¡ÆÁÄ»½ØÍ¼ºóÓÉTensorFlow.jsÆÊÎö¹ã¸æÔªËØ £¬ £¬£¬£¬£¬£¬Ä£ÄâÓû§µã»÷£»£»£»£»£»£»£»"ÐźÅת´ï"ģʽÔòͨ¹ýWebRTC´«ÊäʵʱÊÓÆµÁ÷ÖÁ¹¥»÷Õß £¬ £¬£¬£¬£¬£¬Ö§³ÖÔ¶³Ì²Ù×÷µã»÷¡¢×ª¶¯µÈÐÐΪ¡£¡£¡£¡£¡£ÕâÖÖ»ùÓÚÊÓ¾õÆÊÎöµÄ»úÖÆÍ»ÆÆÁ˹Űå¾ç±¾DOM½»»¥µÄÏÞÖÆ £¬ £¬£¬£¬£¬£¬Äܸü¸ßЧӦ¶Ô¶¯Ì¬¹ã¸æµÄƵÈԽṹת±ä¡£¡£¡£¡£¡£Ä¾ÂíÈö²¥Â·¾¶Òþ²Ø£º¹¥»÷ÕßÊ×ÏȽ«Õý³£ÓÎÏ·Ó¦ÓÃÌá½»ÖÁGetApps £¬ £¬£¬£¬£¬£¬ºóÐøÍ¨¹ý¸üÐÂÌí¼Ó¶ñÒâ×é¼þ¡£¡£¡£¡£¡£Dr.WebÑо¿ÏÔʾ £¬ £¬£¬£¬£¬£¬ÊÜѬȾÓÎÏ·°üÀ¨¡¶ÏÀµÁÁÔ³µÊÖ£ººÚÊÖµ³¡·£¨6.1Íò´ÎÏÂÔØ£©¡¢¡¶¿É°®³èÎïÎÝ¡·£¨3.4Íò´ÎÏÂÔØ£©µÈ £¬ £¬£¬£¬£¬£¬ÁýÕÖ¶à¸öÈÈÃÅÓÎÏ·¡£¡£¡£¡£¡£±ðµÄ £¬ £¬£¬£¬£¬£¬Ä¾Âí»¹Í¨¹ýµÚÈý·½APKÍøÕ¾£¨ÈçApkmody¡¢Moddroid£©¡¢TelegramƵµÀ¼°ÓµÓÐ2.4Íò¶©ÔÄÕßµÄDiscordЧÀÍÆ÷À©É¢ £¬ £¬£¬£¬£¬£¬Éæ¼°Spotify Pro¡¢Netflix modµÈÐ޸İæÓ¦Óᣡ£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-android-malware-uses-ai-to-click-on-hidden-browser-ads/


6. Î÷°àÑÀPcComponentes·ñ¶¨1600Íò¿Í»§Êý¾Ýй¶


1ÔÂ21ÈÕ £¬ £¬£¬£¬£¬£¬Î÷°àÑÀ¿Æ¼¼ÁãÊÛÉÌPcComponentes¿ËÈÕ·ñ¶¨ÆäϵͳÔâÓö´ó¹æÄ£Êý¾Ýй¶ӰÏì1600Íò¿Í»§µÄ˵·¨ £¬ £¬£¬£¬£¬£¬µ«Ö¤ÊµÔâÊÜײ¿â¹¥»÷¡£¡£¡£¡£¡£´Ëǰ £¬ £¬£¬£¬£¬£¬ºÚ¿Í×éÖ¯"daghetiaw"Éù³ÆÇÔÈ¡¸Ã¹«Ë¾1630ÍòÌõ¿Í»§¼Í¼ £¬ £¬£¬£¬£¬£¬²¢Ð¹Â¶50ÍòÌõÑù±¾ £¬ £¬£¬£¬£¬£¬Ê£Óà¼Í¼¶Ú»ý¾ÓÆæ¡£¡£¡£¡£¡£Ð¹Â¶Êý¾Ý°üÀ¨¶©µ¥ÏêÇé¡¢ÏÖʵµØµã¡¢È«Ãû¡¢µç»°ºÅÂë¡¢IPµØµã¡¢²úÆ·Ô¸ÍûÇåµ¥¼°ZendeskÖ§³Ö¶Ô»°¼Í¼¡£¡£¡£¡£¡£PcComponentesÔÚÊÓ²ìºóÉùÃ÷ £¬ £¬£¬£¬£¬£¬ÆäÊý¾Ý¿âºÍÄÚ²¿ÏµÍ³Î´·¢Ã÷²»·¨»á¼ûÖ¤¾Ý £¬ £¬£¬£¬£¬£¬Ç¿µ÷"1600ÍòÊÜÓ°Ïì¿Í»§"Êý×Ö²»Êµ £¬ £¬£¬£¬£¬£¬Òò»îÔ¾ÕË»§ÊýĿԶµÍÓÚ´Ë £¬ £¬£¬£¬£¬£¬ÇÒϵͳÖдÓδ´æ´¢²ÆÎñÐÅÏ¢»ò¿Í»§ÃÜÂë¡£¡£¡£¡£¡£È»¶ø £¬ £¬£¬£¬£¬£¬¹«Ë¾ÈϿɼì²âµ½×²¿â¹¥»÷ºÛ¼£ £¬ £¬£¬£¬£¬£¬¹¥»÷ÕßʹÓÃÆäËûƽ̨й¶µÄÓÊÏäÃÜÂë×éºÏ £¬ £¬£¬£¬£¬£¬Í¨¹ý×Ô¶¯»¯¹¤¾ßʵÑéµÇ¼PcComponentesÕË»§¡£¡£¡£¡£¡£ÍþвÇ鱨¹«Ë¾Hudson RockÆÊÎö·¢Ã÷ £¬ £¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜͨ¹ýѬȾÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þµÄÅÌËã»úÍøÂçµÇ¼ƾ֤ £¬ £¬£¬£¬£¬£¬²¿·Ö¼Í¼¿É×·ËÝÖÁ2020Äê¡£¡£¡£¡£¡£ÆäÑéÖ¤µÄÁù¸öÓÊÏä¾ùÔÚÒÑÖªÇÔÃÜÈÕÖ¾Öб£´æ £¬ £¬£¬£¬£¬£¬Ö¤Êµ¹¥»÷ÓëÀúʷй¶Êý¾Ý±£´æ¹ØÁª¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/online-retailer-pccomponentes-says-data-breach-claims-are-fake/