CISAÖÒÑÔBroadcom VMware vCenterÎó²îÔâʹÓÃ

Ðû²¼Ê±¼ä 2026-01-27

1. CISAÖÒÑÔBroadcom VMware vCenterÎó²îÔâʹÓÃ


1ÔÂ24ÈÕ£¬ £¬ £¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«Broadcom VMware vCenter ServerµÄÑÏÖØÎó²îCVE-2024-37079£¨CVSSÆÀ·Ö9.8£©ÄÉÈëÒÑ֪ʹÓÃÎó²î£¨KEV£©Ä¿Â¼¡£¡£¡£¸ÃÎó²îÔ´ÓÚvCenter Server¶ÔDCERPCЭÒéʵÏֵĶÑÒçÓÐȱÏÝ£¬ £¬ £¬¹¥»÷Õßͨ¹ýÍøÂç»á¼û¼´¿É·¢ËÍÌØÖÆÊý¾Ý°ü´¥·¢Îó²î£¬ £¬ £¬ÊµÏÖÔ¶³Ì´úÂëÖ´ÐлòȨÏÞÌáÉý¡£¡£¡£vCenter ServerÊÇVMware¿ª·¢µÄÐéÄ⻯ÇéÐμ¯ÖÐÖÎÀíÆ½Ì¨¡£¡£¡£2024Äê6Ô£¬ £¬ £¬VMwareÐÞ¸´ÁËCVE-2024-37079¼°¹ØÁªÎó²îCVE-2024-37080£¬ £¬ £¬¶þÕß¾ù±»ÆÀ¹ÀΪ¡°ÑÏÖØ¡±¼¶±ð¡£¡£¡£²©Í¨¹«Ë¾ËæºóÈ·ÈÏ£¬ £¬ £¬CVE-2024-37079ÒÑÔâÏÖʵʹÓ㬠£¬ £¬µ«Ïêϸ¹¥»÷ϸ½ÚÉÐδ¹ûÕæ¡£¡£¡£ÔÚ2025ÄêÑÇÖÞºÚñ´ó»áÉÏ£¬ £¬ £¬Ñо¿Ö°Ô±Åû¶CVE-2024-37079ʵΪËĸöDCE/RPCÎó²îÁ´µÄÒ»²¿·Ö£¬ £¬ £¬°üÀ¨Èý¸ö¶ÑÒç³öÎó²îºÍÒ»¸öȨÏÞÌáÉýÎó²î¡£¡£¡£ÆäÖÐÁ½¸öÏà¹ØÎó²îÒÑÓÚ2024Äê9ÔÂÐÞ¸´£¬ £¬ £¬¶øÌض¨¶ÑÒç³öÎó²î¿ÉÓëCVE-2024-38813Á¬Ïµ£¬ £¬ £¬ÔÚESXiÖ÷»úÉÏ»ñȡԶ³ÌrootȨÏÞ¡£¡£¡£Ñо¿Ö°Ô±Ç¿µ÷£¬ £¬ £¬Í¨¹ý×éºÏʹÓÃÕâЩÎó²î£¬ £¬ £¬ËûÃÇÀÖ³ÉÔÚ2024ÄêMatrix CupÎó²îÌôÕ½ÈüÖÐʵÏÖδ¾­ÊÚȨµÄÔ¶³Ìroot»á¼û¡£¡£¡£


https://securityaffairs.com/187267/security/u-s-cisa-adds-a-flaw-in-broadcom-vmware-vcenter-server-to-its-known-exploited-vulnerabilities-catalog.html


2. 11ÄêδÐÞ¸´µÄGNU Telnetd¸ßΣÎó²îÔâЭͬ¹¥»÷


1ÔÂ23ÈÕ£¬ £¬ £¬¿ËÈÕ£¬ £¬ £¬Ò»¸ö±£´æ³¤´ï11ÄêµÄGNU InetUtils telnetdЧÀÍÆ÷ÑÏÖØÎó²î£¨CVE-2026-24061£©±»ÆØÔâЭͬ¹¥»÷¡£¡£¡£¸ÃÎó²îÔ´ÓÚtelnetdδÕûÀíÓû§¿ØÖƵÄUSERÇéÐαäÁ¿£¬ £¬ £¬¹¥»÷Õß¿ÉÉèÖÃUSER=-f root²¢Í¨¹ýtelnet -aÏÂÁîÅþÁ¬£¬ £¬ £¬Ö±½ÓÈÆ¹ýÉí·ÝÑéÖ¤»ñÈ¡rootȨÏÞ¡£¡£¡£Îó²îÓ°Ïì2015ÄêÐû²¼µÄ1.9.3ÖÁ2.7°æ±¾£¬ £¬ £¬2.8°æ±¾ÒÑÐÞ¸´£¬ £¬ £¬ÎÞ·¨Éý¼¶µÄÓû§¿Éͨ¹ý½ûÓÃЧÀÍ»ò·â±ÕTCP 23¶Ë¿Ú»º½â¡£¡£¡£GNU InetUtilsÊÇGNUÏîĿά»¤µÄ¾­µäÍøÂ繤¾ß¼¯£¬ £¬ £¬°üÀ¨telnet/ftpµÈ¿Í»§¶ËºÍЧÀÍÆ÷£¬ £¬ £¬ÆÕ±éÓ¦ÓÃÓÚLinux¿¯Ðаæ¡£¡£¡£Ö»¹ÜTelnetÒòÇå¾²ÐԲSSHÈ¡´ú£¬ £¬ £¬µ«ÔÚ¹¤ÒµÎïÁªÍø¡¢ÉãÏñÍ·¡¢´«¸ÐÆ÷¼°OTÍøÂçÖÐÈÔÆÕ±é±£´æ£¬ £¬ £¬ÕâЩװ±¸³£Òò¼æÈÝÐÔ»òÉý¼¶ÐèÖØÆô¶øºã¾ÃÔËÐоɰæÏµÍ³¡£¡£¡£Zerotak¹«Ë¾Ö¸³ö£¬ £¬ £¬OT/ICSÇéÐÎÖÐÒªº¦ÏµÍ³Ìæ»»ÄÑÌ⣬ £¬ £¬ÒÅÁô×°±¸µ¼ÖÂTelnetÄÑÒÔÍêÈ«ïÔÌ­¡£¡£¡£Íþв¼à¿Ø¹«Ë¾GreyNoise¼ì²âµ½Õë¶Ô¸ÃÎó²îµÄ¹¥»÷»î¶¯£º1ÔÂ21-22ÈÕ£¬ £¬ £¬18¸ö¹¥»÷IPͨ¹ý60´ÎTelnet»á»°Ìᳫ100%¶ñÒâ¹¥»÷£¬ £¬ £¬·¢ËÍ1525¸öÊý¾Ý°ü£¨×ܼÆ101.6KB£©¡£¡£¡£¹¥»÷ʹÓÃTelnet IACÑ¡ÏîЭÉÌ»ú֯עÈë"USER=-f "²ÎÊý£¬ £¬ £¬83.3%µÄÄ¿µÄÊÇrootÓû§¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-telnetd-auth-bypass-flaw-to-get-root/


3. StanleyÐÂÐÍMaaSͨ¹ýChromeÊÐËÁ·Ö·¢´¹ÂÚÀ©Õ¹


1ÔÂ26ÈÕ£¬ £¬ £¬Ò»ÖÖÃûΪ"Stanley"µÄÐÂÐͶñÒâÈí¼þ¼´Ð§ÀÍ£¨MaaS£©¿ËÈÕÒý·¢Çå¾²½ç¹Ø×¢£¬ £¬ £¬¸ÃЧÀÍͨ¹ýChromeÍøÉÏÓ¦ÓÃÊÐËÁ·Ö·¢¶ñÒâÀ©Õ¹³ÌÐòʵÑéÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¾Ý¶Ëµ½¶ËÊý¾ÝÇå¾²¹«Ë¾VaronisÑо¿£¬ £¬ £¬StanleyÓɼÙÃûÏàͬµÄÂô¼Ò¿ª·¢£¬ £¬ £¬Æä½¹µã¹¦Ð§ÊÇÔÚÓû§ä¯ÀÀÆ÷ÖÐÁýÕÖÈ«ÆÁiframeÏÔʾ´¹ÂÚÄÚÈÝ£¬ £¬ £¬Í¬Ê±¼á³ÖµØµãÀ¸ÏÔʾÕýµ±ÓòÃûÒÔÔöÇ¿ÓÕÆ­ÐÔ¡£¡£¡£¸ÃMaaSЧÀÍÖ§³ÖChrome¡¢EdgeºÍBraveä¯ÀÀÆ÷¾²Ä¬×Ô¶¯×°Ö㬠£¬ £¬²¢Ìṩ¶¨ÖÆ»¯¹¦Ð§¡£¡£¡£Æä¶©ÔÄģʽ°üÀ¨¶à¸ö²ã¼¶£¬ £¬ £¬×î¸ß¼¶µÄ"LuxeÌײÍ"Å䱸Web¿ØÖÆÃæ°å£¬ £¬ £¬Ö§³Ö½«¶ñÒâÀ©Õ¹Ö±½ÓÐû²¼ÖÁChromeÓ¦ÓÃÊÐËÁ¡£¡£¡£StanleyµÄ¹¥»÷»úÖÆÍ¨¹ý×èµ²Ò³Ãæµ¼º½²¢ÓÃiframeÁýÕÖÍøÒ³ÊµÏÖ£¬ £¬ £¬²Ù×÷Ö°Ô±¿Éͨ¹ý¿ØÖÆÃæ°åʵʱÆôÓÃ/½ûÓÃÐ®ÖÆ¹æÔò£¬ £¬ £¬ÉõÖÁÖ±½ÓÏòÊܺ¦Õßä¯ÀÀÆ÷ÍÆËÍ֪ͨÓÕµ¼»á¼ûÌØ¶¨Ò³Ãæ¡£¡£¡£ÊÖÒÕ²ãÃæ£¬ £¬ £¬Stanleyÿ10ÃëÖ´ÐÐC2ÂÖѯ²¢Ö§³Ö±¸·ÝÓòÂÖ»»ÒÔÔöÇ¿¿¹·â±ÕÄÜÁ¦¡£¡£¡£Æä´úÂë±£´æ¶íÓï×¢ÊÍ¡¢¿Õcatch¿éºÍ²»¹æ·¶¹ýʧ´¦Öóͷ£µÈÎÊÌ⣬ £¬ £¬±»ÆÀ¼ÛΪ"ÊÖÒÕ´Ö²Ú"¡£¡£¡£µ«ÕæÕýʹÆäÍÑÓ±¶ø³öµÄÊÇÆäÆæÒìµÄ·Ö·¢Õ½ÂÔ£¬ £¬ £¬Ê¹ÓÃChromeÓ¦ÓÃÊÐËÁ×÷Ϊ¿ÉÐÅÆ½Ì¨ÈƹýͨÀýÉóºËÁ÷³Ì¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-malware-service-guarantees-phishing-extensions-on-chrome-web-store/


4. αÔìCAPTCHAÓëApp-V¾ç±¾Èö²¥AmateraÇÔÃܳÌÐò


1ÔÂ26ÈÕ£¬ £¬ £¬Ò»ÏîÁ¬ÏµClickFixÒªÁ졢αÔìCAPTCHA¼°ÒÑÊðÃûMicrosoft App-V¾ç±¾µÄÐÂÐͶñÒâ¹¥»÷ÕýÈö²¥AmateraÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¡£¡£¾ÝBlackPoint CyberÑо¿£¬ £¬ £¬¹¥»÷ʼÓÚαÔìµÄCAPTCHAÑéÖ¤£¬ £¬ £¬ÓÕµ¼Êܺ¦Õßͨ¹ýWindowsÔËÐжԻ°¿òÖ´ÐжñÒâÏÂÁî¡£¡£¡£ÕâЩÏÂÁîÀÄÓÃÕýµ±µÄSyncAppvPublishingServer.vbs¾ç±¾£¬ £¬ £¬Í¨¹ýÊÜÐÅÈεÄwscript.exeÖ´ÐÐPowerShell´úÂ룬 £¬ £¬ÊµÏÖ¶ñÒâ»î¶¯Òþ²Ø»¯¡£¡£¡£¸Ã¹¥»÷Ê×´ÎÔÚClickFix³¡¾°Öм¯³ÉApp-V¾ç±¾¡£¡£¡£¹¥»÷Á÷³Ì°üÀ¨¶à½×¶ÎÑéÖ¤£º³õʼÏÂÁî»á¼ì²éÊÇ·ñÊÖ¶¯Ö´ÐС¢Ö´ÐÐ˳ÐòÊÇ·ñºÏ¹æ¼°¼ôÌù°åÄÚÈÝÊÇ·ñ±»¸Ä¶¯£¬ £¬ £¬ÒÔ¹æ±ÜɳÏä¼ì²â¡£¡£¡£Èô·¢Ã÷ÆÊÎöÇéÐΣ¬ £¬ £¬Ö´Ðн«ÎÞÏÞÆÚÔÝÍ£ÒÔÏûºÄ×Ô¶¯»¯ÆÊÎö×ÊÔ´¡£¡£¡£Öª×ãÌõ¼þºó£¬ £¬ £¬¶ñÒâÈí¼þ´ÓGoogleÈÕÀúÎļþÖмìË÷base64±àÂëµÄÉèÖÃÊý¾Ý£¬ £¬ £¬Í¨¹ýWMI¿ò¼ÜÌìÉúÒþ²ØµÄ32λPowerShellÀú³Ì£¬ £¬ £¬½«Ç¶Ì×ÓÐÓÃÔØºÉ½âÃܲ¢¼ÓÔØÖÁÄÚ´æ¡£¡£¡£ºóÐø½×¶Î½ÓÄÉÒþдÊõ£º¼ÓÃܵÄPowerShellÓÐÓÃÔØºÉǶÈ빫¹²CDNÍйܵÄPNGͼÏñ£¬ £¬ £¬Í¨¹ýWinINet API¶¯Ì¬ÌáÈ¡£¬ £¬ £¬¾­LSBÒþдÊõÆÊÎö¡¢GZip½âѹºóÄÚ´æÖ´ÐС£¡£¡£×îÖս׶νâÃܲ¢Æô¶¯Ô­Éúshellcode£¬ £¬ £¬Ó³ÉäÖ´ÐÐAmateraÇÔÃܳÌÐò¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-clickfix-attacks-abuse-windows-app-v-scripts-to-push-malware/


5. ¶à¶ûÂí¿¨°ÍÃŽûϵͳÎó²î»òÖÂÔ¶³Ì¿ªÃÅ


1ÔÂ26ÈÕ£¬ £¬ £¬¿ËÈÕ£¬ £¬ £¬¶à¶ûÂí¿¨°Í£¨Dormakaba£©ÎïÀíÃŽûϵͳ±»ÆØ±£´æÑÏÖØÇå¾²Îó²î£¬ £¬ £¬¿ÉÄÜʹºÚ¿ÍÔ¶³Ì·­¿ª´óÐÍ»ú¹¹´óÃÅ¡£¡£¡£¸ÃÎó²îÓÉAtosÆìÏÂEviden¹«Ë¾µÄÍøÂçÇå¾²×Éѯ¹«Ë¾SEC Consultר¼Ò·¢Ã÷£¬ £¬ £¬Ó°Ïì¹æÄ£º­¸ÇDormakabaµÄExosÖÐÑëÖÎÀíÈí¼þ¡¢Ó²¼þ»á¼ûÖÎÀíÆ÷¼°Ö§³Ö¼üÅÌ¡¢Ö¸ÎÆ¡¢Ð¾Æ¬¿¨»á¼ûµÄ×¢²áµ¥Î»µÈ½¹µã²úÆ·¡£¡£¡£Ñо¿ÍŶӹ²·¢Ã÷20Óà¸öÎó²îÀàÐÍ£¬ £¬ £¬°üÀ¨Ó²±àÂëÆ¾Ö¤Óë¼ÓÃÜÃÜÔ¿¡¢ÈõÃÜÂë¡¢Éí·ÝÑé֤ȱʧ¡¢²»Çå¾²ÃÜÂëÌìÉú¡¢ÍâµØÈ¨ÏÞÌáÉý¡¢Êý¾Ýй¶¡¢Â·¾¶±éÀú¼°ÏÂÁî×¢ÈëµÈ¡£¡£¡£ÕâЩÎó²îÖ÷Òª±»Å·ÖÞ´óÐÍÆóҵʹÓ㬠£¬ £¬Éæ¼°¹¤Òµ¹«Ë¾¡¢ÄÜÔ´¹©Ó¦ÉÌ¡¢ÎïÁ÷ÆóÒµ¼°»ú³¡ÔËÓªÉ̵ȸßÇå¾²ÐèÇ󳡾°¡£¡£¡£SEC ConsultÖ¸³ö£¬ £¬ £¬¹¥»÷ÕßÈôʹÓÃÕâЩÎó²î£¬ £¬ £¬¿ÉÖ±½Ó½âËøÃŽû¡¢ÇÔÈ¡»á¼ûPINÂ룬 £¬ £¬»òÔÚÊÜ¿ØÇéÐÎÖÐÌᳫ½øÒ»²½¹¥»÷¡£¡£¡£Dormakaba͸¶£¬ £¬ £¬¿ÉÄÜÊýǧÃû¿Í»§ÊÜÓ°Ï죬 £¬ £¬ÆäÖв¿·Ö¸ßÇå¾²ÐèÇó¿Í»§Î£º¦ÓÈΪͻ³ö¡£¡£¡£DormakabaÔÚÒÑÍùÒ»Äê°ëÄÚÒ»Á¬Ðû²¼²¹¶¡¼°¼Ó¹ÌÖ¸ÄÏ£¬ £¬ £¬²¢ÓëÖ÷Òª¿Í»§ÏàÖúÐÞ¸´ÏµÍ³Îó²î£¬ £¬ £¬Í¬Ê±ÌåÏÖÉÐδ·¢Ã÷ÏÖʵʹÓð¸Àý¡£¡£¡£


https://www.securityweek.com/access-system-flaws-enabled-hackers-to-unlock-doors-at-major-european-firms/


6. CrunchbaseÔâShinyHunters¹¥»÷Ö³¬200ÍòÌõÊý¾Ýй¶


1ÔÂ26ÈÕ£¬ £¬ £¬¿ËÈÕ£¬ £¬ £¬ÆóÒµÊý¾Ýƽ̨Crunchbase֤ʵ±¬·¢ÑÏÖØÊý¾Ýй¶ÊÂÎñ¡£¡£¡£ÍøÂç·¸·¨×éÖ¯ShinyHuntersÐû³Æ´ÓÆäϵͳÖÐÇÔÈ¡ÁËÁè¼Ý200ÍòÌõСÎÒ˽¼Ò¼Í¼£¬ £¬ £¬ÒòÀÕË÷δ¹û£¬ £¬ £¬¸Ã×éÖ¯ÔÚTor°µÍøÍøÕ¾Ð¹Â¶Á˰üÀ¨402MBÊý¾ÝµÄѹËõÎļþ¡£¡£¡£Crunchbase»ØÓ¦³Æ£¬ £¬ £¬´Ë´ÎÇå¾²ÊÂÎñδ¶ÔÓªÒµÔËÓªÔì³É×ÌÈÅ£¬ £¬ £¬ÏÖÔÚÎó²îÒÑ»ñµÃ¿ØÖÆ£¬ £¬ £¬ÏµÍ³Ç徲״̬Òѻָ´¡£¡£¡£¾ÝCrunchbaseÅû¶£¬ £¬ £¬ÊÂÎñ±¬·¢ºó£¬ £¬ £¬¹«Ë¾Á¬Ã¦Ô¼ÇëÍøÂçÇ徲ר¼ÒЭÖúÊӲ죬 £¬ £¬²¢ÒÑ֪ͨÁª°îÖ´·¨²¿·Ö¡£¡£¡£×÷ΪÊÂÎñÏìÓ¦Á÷³ÌµÄÒ»²¿·Ö£¬ £¬ £¬CrunchbaseÕýÔÚÉó²éй¶Êý¾ÝµÄÏêϸÄÚÈÝ£¬ £¬ £¬ÒÔÈ·¶¨ÊÇ·ñÐèÒªÒÀ¾ÝÏà¹ØÖ´·¨ÒªÇóÏòÊÜÓ°ÏìÓû§·¢ËÍÕýʽ֪ͨ¡£¡£¡£¸Ã¹«Ë¾Ç¿µ÷£¬ £¬ £¬¹¥»÷ÕßÐû²¼µÄÎļþ°üÀ¨ÆóÒµÍøÂçÖеÄÌØ¶¨ÐÅÏ¢£¬ £¬ £¬µ«½¹µãӪҵϵͳδÊÜʵÖÊÐÔÓ°Ïì¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬ £¬ £¬ShinyHunters×éÖ¯½üÆÚÖØÆôÁËÆäTorÊý¾Ýй¶վµã£¬ £¬ £¬½«CrunchbaseÓëSoundCloud¡¢BettermentÅäºÏÁÐÈë"Êý¾Ýй¶Êܺ¦ÕßÃûµ¥"£¬ £¬ £¬ºóÁ½¼Ò¹«Ë¾´Ëǰ¾ùÒÑ֤ʵÔâÓöÀàËÆ¹¥»÷¡£¡£¡£


https://securityaffairs.com/187340/data-breach/shinyhunters-claims-2-million-crunchbase-records-company-confirms-breach.html