CVE-2026-22719Îó²î±»ÄÉÈëCISAÒÑ֪ʹÓÃĿ¼

Ðû²¼Ê±¼ä 2026-03-04

1. CVE-2026-22719Îó²î±»ÄÉÈëCISAÒÑ֪ʹÓÃĿ¼


3ÔÂ3ÈÕ£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Òѽ«VMware Aria Operationsƽ̨µÄÏÂÁî×¢ÈëÎó²îCVE-2026-22719ÕýʽÁÐÈë¡°ÒÑ֪ʹÓÃÎó²î£¨KEV£©Ä¿Â¼¡±£¬£¬£¬£¬£¬²¢Ç¿µ÷¸ÃÎó²îÒѱ»ÏÖʵ¹¥»÷ʹÓᣡ£¡£¡£¡£Æ¾Ö¤VMwareĸ¹«Ë¾²©Í¨Ðû²¼µÄVMSA-2026-0001Ç徲ͨ¸æ£¬£¬£¬£¬£¬¸ÃÎó²îÓÚ2026Äê2ÔÂ24ÈÕÊ×´ÎÅû¶²¢ÐÞ¸´£¬£¬£¬£¬£¬CVSSÆÀ·Ö´ï8.1£¬£¬£¬£¬£¬±»ÆÀ¶¨Îª¡°Ö÷Òª¡±¼¶±ð¡£¡£¡£¡£¡£CISAÒªÇóÁª°îÃñÊ»ú¹¹±ØÐèÔÚ2026Äê3ÔÂ24ÈÕǰÍê³É²¹¶¡°²ÅÅ»òʵÑ黺½â²½·¥¡£¡£¡£¡£¡£¸ÃÎó²îÔ´ÓÚδÊÚȨ¹¥»÷Õß¿Éͨ¹ýÏÂÁî×¢ÈëÔÚÒ×Êܹ¥»÷µÄAria OperationsϵͳÉÏÖ´ÐÐí§ÒâÏÂÁ£¬£¬£¬£¬ÓÈÆäÔÚ²úƷǨáãÖ§³ÖÀú³ÌÖпÉÄÜ´¥·¢Ô¶³Ì´úÂëÖ´ÐС£¡£¡£¡£¡£²©Í¨ÔÚ¸üÐÂͨ¸æÖÐÈÏ¿É×¢ÖØµ½¸ÃÎó²î±»Ê¹Óõı¨µÀ£¬£¬£¬£¬£¬µ«ÌåÏÖÎÞ·¨×ÔÁ¦ÑéÖ¤ÆäÕæÊµÐÔ¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬ÊÖÒÕϸ½ÚÉÐδ¹ûÕæÅû¶¡£¡£¡£¡£¡£ÎªÓ¦¶ÔΣº¦£¬£¬£¬£¬£¬²©Í¨ÌṩÁËÁ½ÖÖ½â¾ö¼Æ»®£ºÒ»ÊÇÁ¬Ã¦Ó¦ÓÃÇå¾²²¹¶¡£¡£¡£¡£¡£»£»£»£»¶þÊÇÖ´ÐÐÔÝʱ»º½â¾ç±¾¡°aria-ops-rce-workaround.sh¡±¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-flags-vmware-aria-operations-rce-flaw-as-exploited-in-attacks/


2. °¢¿ËËÕŵ±´¶ûÃÀ¹úÕ¾µãÔâAnubisÀÕË÷Èí¼þ¹¥»÷


3ÔÂ3ÈÕ£¬£¬£¬£¬£¬ºÉÀ¼¿ç¹úÍ¿ÁϾÞÍ·°¢¿ËËÕŵ±´¶û¿ËÈÕ֤ʵ£¬£¬£¬£¬£¬ÆäλÓÚÃÀ¹úµÄÒ»´¦Õ¾µãÔâÓöºÚ¿ÍÈëÇÖ²¢Òý·¢Êý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¸Ã¹«Ë¾½²»°ÈËÌåÏÖ£¬£¬£¬£¬£¬¸ÃÇå¾²ÊÂÎñÒÑ»ñµÃ¿ØÖÆ£¬£¬£¬£¬£¬Ó°Ïì¹æÄ£½öÏÞÓÚÃÀ¹ú¼òµ¥Õ¾µã£¬£¬£¬£¬£¬ÇÒ¡°Ó°ÏìÓÐÏÞ¡±¡£¡£¡£¡£¡£ÏÖÔÚ¹«Ë¾Õý½ÓÄɲ½·¥Í¨Öª²¢Ö§³ÖÊÜÓ°Ïì·½£¬£¬£¬£¬£¬²¢½«ÓëÖ´·¨²¿·ÖÇ×½üÏàÖúÊÓ²ì´ËÊ¡£¡£¡£¡£¡£×÷ΪȫÇò×ÅÃûÍ¿ÁÏÆóÒµ£¬£¬£¬£¬£¬°¢¿ËËÕŵ±´¶ûÓµÓÐ3.5ÍòÃûÔ±¹¤£¬£¬£¬£¬£¬ÄêÊÕÈ볬120ÒÚÃÀÔª£¬£¬£¬£¬£¬ÓªÒµÁýÕÖ150¶à¸ö¹ú¼Ò£¬£¬£¬£¬£¬ÆìÏÂÆ·ÅưüÀ¨¶àÀÖÊ¿¡¢Ð¾¢¡¢¹ú¼ÊºÍÓ¢ÌØ°îµÈ¡£¡£¡£¡£¡£¾ÝÀÕË÷Èí¼þÍÅ»ïAnubisÐû³Æ£¬£¬£¬£¬£¬´Ë´Î¹¥»÷ÇÔÈ¡ÁËÔ¼170GBÊý¾Ý£¬£¬£¬£¬£¬Éæ¼°½ü17Íò¸öÎļþ£¬£¬£¬£¬£¬²¢ÔÚÆä°µÍøÐ¹Â¶ÍøÕ¾Ðû²¼Á˲¿·ÖÑù±¾£¬£¬£¬£¬£¬°üÀ¨Óë×ÅÃû¿Í»§µÄ±£ÃÜЭÒé¡¢Ô±¹¤¼°¿Í»§µÄµç×ÓÓʼþµØµã¡¢µç»°ºÅÂ롢˽ÈËͨѶ¼Í¼¡¢»¤ÕÕɨÃè¼þ¡¢ÖÊÁϲâÊÔÎļþ¼°ÄÚ²¿ÊÖÒÕ¹æ¸ñ±íµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£×èÖ¹±¨µÀÐû²¼Ê±£¬£¬£¬£¬£¬Êý¾Ýй¶¹æÄ£ÉÐδÍêÈ«¹ûÕæ£¬£¬£¬£¬£¬°¢¿ËËÕŵ±´¶ûÒàδ͸¶ÊÇ·ñÓë¹¥»÷Õß¾ÙÐйý½Ó´¥¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/paint-maker-giant-akzonobel-confirms-cyberattack-on-us-site/


3. ÒÁÀÊAriomex¼ÓÃÜÇ®±ÒÉúÒâÆ½Ì¨ÔâÊý¾Ýй¶


3ÔÂ3ÈÕ£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²¹«Ë¾Resecurity¿ËÈÕÅû¶£¬£¬£¬£¬£¬ÒÁÀʼÓÃÜÇ®±ÒÉúÒâÆ½Ì¨AriomexµÄÊý¾Ý¿â±¬·¢´ó¹æÄ£Êý¾Ýй¶£¬£¬£¬£¬£¬Éæ¼°2022ÄêÖÁ2025Äêʱ´úÖÕ¶ËÓû§µÄСÎÒ˽¼ÒÐÅÏ¢¡¢ÉúÒâ¼Í¼¼°²Ù×÷Åä¾°¡£¡£¡£¡£¡£´Ë´Îй¶°üÀ¨11,826Ìõ¼Í¼£¬£¬£¬£¬£¬ÆäÖÐÔ¼7,710ÌõÔ´×ÔÒÁÀÊ£¬£¬£¬£¬£¬º­¸ÇÓû§Éí·Ý¡¢µç×ÓÓʼþ¡¢IPµØµã¡¢¼ÓÃÜÇ®±ÒÉúÒâÏêÇéµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£Ïêϸ°¸ÀýÏÔʾ£¬£¬£¬£¬£¬Óû§Seyyed Younes Shokori BilankouhiÔøÇëÇó¡°ÔÚÒÁÀÊ´óʹ¹ÝЭÖúÏ¡±´æÈë300ÍòÃÀÔª£¬£¬£¬£¬£¬Ramin LakÊÔͼ¶Ò»»500ÍòÃÀÔª£¬£¬£¬£¬£¬¶øÓû§Eyraj JaafariÔò¶à´Î¹ºÖüÛÖµ10ÍòÃÀÔªµÄÊý×Ö×ʲúµ«Ñ¡Ôñ¡°ÉÔºó¶ÒÏÖ¡±£¬£¬£¬£¬£¬·´Ó¦³ö²¿·ÖÓû§½«Æ½Ì¨×÷Ϊ¡°Êý×ÖÒøÐС±Ê¹ÓõÄÌØÕ÷¡£¡£¡£¡£¡£×¨¼ÒÖ¸³ö£¬£¬£¬£¬£¬²¿·Ö´ó¶îÕË»§±£´æKYCÈÏ֤ȱʧ»òÐÅÏ¢¸Ä¶¯ÎÊÌ⣬£¬£¬£¬£¬ÇÒ·¢Ã÷¶à±Ê¿ÉÒÉÉúÒâÉæ¼°Êý°ÙÍòÃÀÔª¡£¡£¡£¡£¡£Ð¹Â¶Êý¾Ý½øÒ»²½Õ¹ÏÖÒÁÀʼÓÃÜÇ®±Ò³ÖÓÐÕ߻¹æÄ£ÆÕ±é£¬£¬£¬£¬£¬Éæ¼°ÃÀ¹ú¡¢Ó¢¹ú¡¢µÂ¹ú¡¢·¨¹ú¡¢ºÉÀ¼¡¢ÂÞÂíÄáÑÇ¡¢¶íÂÞ˹¡¢Èðµä¡¢ÍÁ¶úÆäµÈ¶à¸ö¹ú¼Ò£¬£¬£¬£¬£¬Îª×è¶ÏÒÁÀÊ·Å´ûÕß¼°·¸·¨·Ö×Ó½øÈëÍâÑóÊг¡ÌṩÁËÏßË÷¡£¡£¡£¡£¡£Resecurityͨ¹ýÊÖÒÕÊֶλָ´ÁËȱʧ×ֶΣ¬£¬£¬£¬£¬²¢Ê¹ÓÃAI¹¹½¨Óû§»­Ïñ£¬£¬£¬£¬£¬·¢Ã÷й¶ȪԴ¿ÉÄÜΪ¿Í»§Ö§³ÖϵͳÔâÈëÇÖ¡£¡£¡£¡£¡£


https://securityaffairs.com/188848/digital-id/ariomex-iran-based-crypto-exchange-suffers-data-leak.html


4. LexisNexisÔâºÚ¿Í¹¥»÷ÖÂÕþ¸®¹ÍÔ±Êý¾Ýй¶


3ÔÂ3ÈÕ£¬£¬£¬£¬£¬ÃÀ¹úÖ´·¨ÓëÉÌÒµÐÅÏ¢¾ÞÍ·LexisNexis Legal & Professional¿ËÈÕ֤ʵÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£ºÚ¿Í×éÖ¯FulcrumSecÔÚµØÏÂÂÛ̳й¶2GBÎļþºó£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÊÓ²ìÈ·ÈÏ£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ýδÐÞ¸´µÄReactǰ¶ËÓ¦ÓÃÎó²î£¨React2Shell£©ÇÖÈëÆäAWS»ù´¡ÉèÊ©£¬£¬£¬£¬£¬»ñÈ¡ÁË536¸öRedshift±í¡¢430¸öVPCÊý¾Ý¿â±í¡¢53¸öAWSÃÜÔ¿Ã÷ÎÄ¡¢390ÍòÌõÊý¾Ý¿â¼Í¼¼°21,042¸ö¿Í»§ÕË»§µÈ½á¹¹»¯Êý¾Ý¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÉæ¼°Ô¼40Íò¸öÔÆ¶ËÓû§ÉèÖÃÎļþ£¬£¬£¬£¬£¬°üÀ¨ÕæÊµÐÕÃû¡¢ÓÊÏä¡¢µç»°¼°Ö°ÎñµÈ»ù´¡ÐÅÏ¢¡£¡£¡£¡£¡£ÓÈΪÒýÈ˹Ø×¢µÄÊÇ£¬£¬£¬£¬£¬118¸ö.govÓòÃûÕË»§±»ÆØÊôÓÚÃÀ¹úÕþ¸®¹ÍÔ±¡¢Áª°î·¨¹Ù¡¢Ö´·¨ÖúÀí¡¢Ë¾·¨²¿×´Ê¦¼°SECÊÂÇéÖ°Ô±¡£¡£¡£¡£¡£FulcrumSecÆ·ÆÀLexisNexisÇå¾²²½·¥±£´æÑÏÖØÈ±ÏÝ£¬£¬£¬£¬£¬µ¥¸öECSʹÃü½ÇÉ«¿É¶ÁÈ¡ËùÓÐÃÜÔ¿£¬£¬£¬£¬£¬°üÀ¨Éú²úÇéÐÎRedshiftÖ÷ƾ֤¡£¡£¡£¡£¡£LexisNexisÇ¿µ÷£¬£¬£¬£¬£¬±»µÁÊý¾Ý¶àΪ2020ÄêǰµÄ¹ýʱÐÅÏ¢£¬£¬£¬£¬£¬²»°üÀ¨Éç±£ºÅ¡¢¼ÝÕպ𢲯ÎñÐÅÏ¢¡¢ÓÐÓÃÃÜÂë»ò¿Í»§ËÑË÷ÅÌÎʵÈÃô¸ÐÄÚÈÝ¡£¡£¡£¡£¡£¹«Ë¾ÒÑִ֪ͨ·¨²¿·Ö²¢Ô¼ÇëÍⲿר¼ÒЭÖúÊӲ죬£¬£¬£¬£¬Í¬Ê±ÏòÏÖÓм°Ç°¿Í»§×ª´ïÊÂÎñ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/lexisnexis-confirms-data-breach-as-hackers-leak-stolen-files/


5. ÏÄÍþÒÄ´óѧ°©Ö¢ÖÐÐÄÔâÀÕË÷Èí¼þ¹¥»÷


3ÔÂ3ÈÕ£¬£¬£¬£¬£¬ÀÕË÷Èí¼þÍÅ»ï2025Äê8ÔÂÈëÇÖÏÄÍþÒÄ´óѧ°©Ö¢ÖÐÐÄÊ¢Ðв¡Ñ§²¿·Ö£¬£¬£¬£¬£¬ÇÔÈ¡½ü120ÍòÈ˵ÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£ÏÄÍþÒÄ´óѧϵͳ½¨ÉèÓÚ1907Ä꣬£¬£¬£¬£¬ÆìϰüÀ¨3Ëù´óѧ¡¢7ËùÉçÇøÑ§Ôº¼°¶à¸öÑо¿ÖÐÐÄ£¬£¬£¬£¬£¬ÆäÖа©Ö¢ÖÐÐÄÓµÓÐ300ÓàÃû½ÌÖ°Ô±¹¤¼°200ÓàÃûÁ¥Êô³ÉÔ±¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñÉæ¼°Á½·Ý°üÀ¨2000ÄêÖݽ»Í¨²¿Îļþ£¨ÐÕÃû¡¢SSN£©¼°1998ÄêÑ¡Ãñ¹ÒºÅÊý¾ÝµÄÎļþ£»£»£»£»Ò»·Ýº­¸Ç1993-1996Äê¶àÃñ×åÐÐÁУ¨MEC£©Ñо¿£¨SSN¡¢DLºÅÂë¡¢¿µ½¡ÐÅÏ¢£©µÄÎļþ£»£»£»£»ÈýÏîÒûʳÓë°©Ö¢Ñо¿Îļþ£»£»£»£»ÒÔ¼°1999Äê¡¢2000ÄêÔÂÖÐÆÚ´Ó¹«¹²ÎÀÉú¹ÒºÅ´¦ÍøÂçµÄSSNºÍÐÕÃûÊý¾Ý¡£¡£¡£¡£¡£´óѧÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬¹¥»÷½öÓ°ÏìÊ¢Ðв¡Ñ§²¿·Öϵͳ£¬£¬£¬£¬£¬Î´²¨¼°ÁÙ´²ÊÔÑé¡¢»¼ÕßÕչ˻¤Ê¿»òѧÉú¼Í¼¡£¡£¡£¡£¡£µ«¹¥»÷Õß¶Ôϵͳ¾ÙÐмÓÃÜ£¬£¬£¬£¬£¬µ¼Ö»ָ´ÊÂÇéÊÜ×è¡£¡£¡£¡£¡£ÏÄÍþÒÄ´óѧÏò¹¥»÷ÕßÖ§¸¶ÓöÈÒÔ»ñÈ¡½âÃܹ¤¾ß£¬£¬£¬£¬£¬²¢ÒªÇó¡°Çå¾²Ïú»Ù²»·¨»ñÈ¡µÄÐÅÏ¢¡±£¬£¬£¬£¬£¬ÒÔ±£»£»£»£»¤Ãô¸ÐÊý¾Ý¡£¡£¡£¡£¡£Í¨ÖªÊÂÇéÒÑÕö¿ª£ºÏò1993-1996ÄêMECÑо¿µÄ87,493Ãû¼ÓÈëÕß·¢ËÍ֪ͨÐÅ£¬£¬£¬£¬£¬²¢ÁªÏµÆäËûÔ¼90Íò¸ö¿ÉÄÜÊÜÓ°ÏìµÄµç×ÓÓʼþµØµã¡£¡£¡£¡£¡£´óѧǿµ÷£¬£¬£¬£¬£¬´Ë´ÎÊÂÎñδӰÏìÁÙ´²ÔËÓª»ò»¼ÕßÕչ˻¤Ê¿£¬£¬£¬£¬£¬µ«Ô¼115ÍòÈ˵ÄСÎÒ˽¼ÒÐÅÏ¢£¨º¬SSN±êʶ·û£©¿ÉÄÜͨ¹ýÀúÊ·¼ÝʻִÕÕºÍÑ¡Ãñ¹ÒºÅ¼Í¼й¶¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/university-of-hawaii-cancer-center-ransomware-attack-affects-nearly-12-million-people/


6. ºÚ¿ÍÀÄÓÃOAuthÖØ¶¨Ïò»úÖÆÊµÑ龫׼´¹ÂÚ¹¥»÷


3ÔÂ3ÈÕ£¬£¬£¬£¬£¬Î¢ÈíDefenderÑо¿Ö°Ô±Åû¶£¬£¬£¬£¬£¬ºÚ¿ÍÕýͨ¹ýÀÄÓÃÕýµ±µÄOAuthÖØ¶¨Ïò»úÖÆÈÆ¹ýµç×ÓÓʼþºÍä¯ÀÀÆ÷µÄÍøÂç´¹ÂÚ±£»£»£»£»¤£¬£¬£¬£¬£¬¶ÔÕþ¸®¼°¹«¹²²¿·ÖÌᳫ¾«×¼¹¥»÷¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓðüÀ¨OAuthÖØ¶¨ÏòURLµÄ´¹ÂÚÓʼþ£¨Èçµç×ÓÊðÃûÇëÇó¡¢É籣֪ͨ¡¢¾Û»áÔ¼ÇëµÈ£©£¬£¬£¬£¬£¬ÉõÖÁ½«URLǶÈëPDFÎļþÌӱܼì²â£¬£¬£¬£¬£¬ÓÕµ¼Óû§¶Ô¶ñÒâÓ¦ÓóÌÐò¾ÙÐÐÉí·ÝÑéÖ¤¡£¡£¡£¡£¡£¹¥»÷½¹µãÔÚÓÚ¶ñÒâOAuthÓ¦ÓóÌÐòµÄ¹¹½¨ÓëÉèÖᣡ£¡£¡£¡£¹¥»÷ÕßÔÚ¿ØÖƵÄ×â»§Öн¨Éè¶ñÒâÓ¦Ó㬣¬£¬£¬£¬ÉèÖÃÖØ¶¨ÏòURIÖ¸Ïò×ÔÉí»ù´¡ÉèÊ©¡£¡£¡£¡£¡£µ±Óû§µã»÷´¹ÂÚÁ´½Óºó£¬£¬£¬£¬£¬×ÝÈ»Microsoft Entra IDµÄURL¿´ËÆÕýµ±ÊÚȨÇëÇ󣬣¬£¬£¬£¬µ«Í¨¹ýÎÞЧ²ÎÊý£¨Èçscope OAuth»òprompt=none£©´¥·¢¾²Ä¬Éí·ÝÑéÖ¤¹ýʧ£¬£¬£¬£¬£¬Ç¿ÖÆÓû§Öض¨ÏòÖÁ¹¥»÷Õß¿ØÖƵĴ¹ÂÚÒ³Ãæ¡£¡£¡£¡£¡£Î¢ÈíÇ¿µ÷£¬£¬£¬£¬£¬´ËÀ๥»÷ʵÖÊÊÇÉí·ÝÍþв£¬£¬£¬£¬£¬Ê¹ÓÃÁËOAuth¿ò¼ÜÖÐͨ¹ýÖØ¶¨ÏòÖÎÀíÊÚȨ¹ýʧµÄÔ¤ÆÚÐÐΪ¡£¡£¡£¡£¡£½¨Òé×éÖ¯ÔöÇ¿OAuthÓ¦ÓÃȨÏ޹ܿأ¬£¬£¬£¬£¬ÊµÑéÇ¿Éí·Ý±£»£»£»£»¤ÓëÌõ¼þ»á¼ûÕ½ÂÔ£¬£¬£¬£¬£¬²¢ÔÚÓʼþ¡¢Éí·Ý¡¢Öն˲ãÃæ°²ÅÅ¿çÓò¼ì²â»úÖÆ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/microsoft-hackers-abuse-oauth-error-flows-to-spread-malware/