Framework LinuxµçÄÔUEFIÇå¾²Îó²îÆØ¹â

Ðû²¼Ê±¼ä 2025-10-16

1. Framework LinuxµçÄÔUEFIÇå¾²Îó²îÆØ¹â


10ÔÂ14ÈÕ£¬ÃÀ¹úÓ²¼þ³§ÉÌFrameworkÉú²úµÄÔ¼20Íǫ̀LinuxµçÄÔÒò³ö³§Ô¤×°º¬¡°ÄÚ´æÐ޸ġ±£¨mm£©ÏÂÁîµÄÒÑÊðÃûUEFIÍâ¿Ç×é¼þ£¬±£´æÑÏÖØÇå¾²Îó²î£¬¿ÉÄܱ»¹¥»÷ÕßʹÓÃÈÆ¹ýÇå¾²Æô¶¯±£»¤¡£¾Ý¹Ì¼þÇå¾²¹«Ë¾EclypsiumÆÊÎö£¬¸ÃmmÏÂÁîÔ­±¾ÓÃÓÚ³õ¼¶Õï¶ÏºÍ¹Ì¼þµ÷ÊÔ£¬¿ÉÖ±½Ó¶ÁдϵͳÄڴ棬µ«¿É±»ÀÄÓÃÕë¶ÔgSecurity2±äÁ¿£¨UEFIÄ£¿éÊðÃûÑéÖ¤µÄÒªº¦×é¼þ£©£¬Í¨¹ýÁýÕÖÆäֵΪNULL»òÖØ¶¨ÏòÖÁÎÞÑéÖ¤º¯Êý£¬´Ó¶ø½ûÓÃÊðÃûÑéÖ¤»úÖÆ¡£¹¥»÷Õß¿Éͨ¹ý´ËÎó²î¼ÓÔØBlackLotus¡¢HybridPetya¡¢BootkittyµÈ¶ñÒâÖ¸µ¼¹¤¾ß°ü£¬ÕâЩ¹¤¾ß¿É¹æ±Ü²Ù×÷ϵͳ¼¶Çå¾²¿ØÖÆ£¬ÔÚÏµÍ³ÖØ×°ºóÈÔÒ»Á¬±£´æ£¬ÐγÉÄÑÒÔɨ³ýµÄ³¤ÆÚÐÔÍþв¡£Îó²îÓ°Ïì¹æÄ£º­¸ÇFramework 13¼°16ϵÁеĶà¿îÐͺÅ£¬°üÀ¨IntelµÚ11-13´ú¡¢AMD Ryzen 7040/AI 300µÈ´¦Öóͷ£Æ÷°æ±¾£¬ÏêϸÐÞ¸´°æ±¾ÒÑÃ÷È·£¬Èç13´úIntel°æ±¾ÔÚ3.08°æÐÞ¸´¡¢AMD Ryzen AI 300ÔÚ3.04°æÐÞ¸´¡£


https://www.bleepingcomputer.com/news/security/secure-boot-bypass-risk-on-nearly-200-000-linux-framework-sytems/


2. 800ÃÀԪװ±¸¼´¿É×èµ²ÎÀÐÇͨѶÊý¾Ý


10ÔÂ14ÈÕ£¬¼ÓÖÝ´óѧʥµØÑǸç·ÖУÓëÂíÀïÀ¼´óѧÍŽáÑо¿Õ¹ÏÖ£¬È«ÇòÔ¼°ëÊýÎÀÐÇͨѶÒòδ¼ÓÃÜÃæÁÙÑÏÖØÇ徲Σº¦£¬½öÐè¼ÛÖµÔ¼800ÃÀÔªµÄÏÖ³É×°±¸¼´¿ÉʵÑé×èµ²¡£Ñо¿ÍŶÓÔÚÊ¥µØÑǸç·ÖУÎݶ¥×é×°ÎÀÐÇÎüÊÕϵͳ£¬°üÀ¨185ÃÀÔªÌìÏßµú¡¢140ÃÀÔªÖ§¼Ü¡¢195ÃÀÔªÂí´ï¼°230ÃÀÔªµ÷г¿¨£¬ÀÖ³ÉÃé×¼µØÇòͬ²½ÎÀÐǺó£¬ÊµÊ±²¶»ñÁËδ¼ÓÃܵÄ˽ÈËÊý¾Ý¡£Ñо¿ÏÔʾ£¬µçÐÅÔËÓªÉÌͨ¹ýÎÀÐÇÅþÁ¬Æ«Ô¶»ùÕ¾Óë½¹µãÍøÂçʱ£¬Êý¾Ý´«ÊäÆÕ±éδ¼ÓÃÜ¡£ÎÀÐÇÁýÕÖµØÇòÍâò»ý40%µÄÌØÕ÷£¬Ê¹µÃÈÎÄÇÀïÓÚÁýÕÖ¹æÄ£ÄÚµÄÖ°Ô±¾ù¿É×èµ²Êý¾Ý¡£ÔÚÈýÄêÑо¿Ê±´ú£¬ÍŶÓÍøÂçµ½´ó×ÚδÊܱ£»¤Í¨Ñ¶£¬°üÀ¨T-Mobile¡¢AT&TÄ«Î÷¸ç¼°Ä«Î÷¸çµçÐÅÓû§µÄͨ»°Óë¶ÌÐÅ£»º½°àÂÿ͵ÄWiFiä¯ÀÀ¼Í¼£»µçÁ¦¹«Ë¾¡¢Ê¯ÓÍÆ½Ì¨µÄÄÚ²¿ÐÅÏ¢£»ÒÔ¼°ÃÀ¹úºÍÄ«Î÷¸ç¾ü·½ÏµÍ³µÄ´«ÊäÄÚÈÝ¡£Ïêϸ̻¶µÄÊý¾Ýº­¸ÇÃÀ¹úˮʦ½¢´¬±êʶÓëÍøÂçÊý¾Ý¡¢Ä«Î÷¸ç¾ü·½Ç鱨±¨¸æ¡¢·É»úά»¤ÈÕÖ¾¡¢ÊµÊ±²½¶ÓλÖÃÐÅÏ¢£¬ÉõÖÁÄ«Î÷¸ç¹ú¼ÒµçÁ¦¹«Ë¾µÄÓû§ÐÅÏ¢¡¢ÊÂÇé¶©µ¥¼°Çå¾²±¨¸æ£¬²¿·ÖÃÀ¹ú¹¤Òµ¿ØÖÆÏµÍ³ÔËÐÐÊý¾ÝÒà±»²¶»ñ¡£


https://cybernews.com/security/satellite-surveillance-encryption-research/


3. CapitaÒòÊý¾Ýй¶ÊÂÎñÖ§¸¶1400ÍòÓ¢°÷


10ÔÂ15ÈÕ£¬Ó¢¹úÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©¿ËÈÕ¶ÔÊý¾ÝÇý¶¯ÓªÒµÁ÷³Ì·þÎñÌṩÉÌCapita´¦ÒÔ1400ÍòÓ¢°÷£¨Ô¼1870ÍòÃÀÔª£©·£¿î£¬ÒòÓÉÊÇ2023Ä걬·¢µÄÒ»ÆðÓ°Ïì660ÍòÈ˵ÄÖØ´óÊý¾Ýй¶ÊÂÎñ¡£´Ë´Î´¦·ÖÉæ¼°Capita plc¼°Æä×Ó¹«Ë¾Capita Pension Solutions Limited£¬»®·Ö±»·£800ÍòºÍ600ÍòÓ¢°÷£¬½Ï³õʼ4500ÍòÓ¢°÷µÄÄâ·£½ð¶î´ó·ùϵ÷£¬Òò¸Ã¹«Ë¾ÒѼ縺ÔðÈΡ¢ÊµÑéÇ徲ˢв¢×Ô¶¯ÏòÊÜÓ°ÏìÕßÌṩÊý¾Ý±£»¤·þÎñ¡£×÷ΪӢ¹ú´óÐÍÍâ°üºÍרҵ·þÎñ¹«Ë¾£¬CapitaÓµÓÐÔ¼3.4ÍòÃûÔ±¹¤¡¢ÄêÊÕÈë´ï30ÒÚÓ¢°÷£¬¿Í»§º­¸ÇµØ·½Òé»á¡¢NHS¡¢¹ú·À²¿¼°ÒøÐС¢µçÐŵÈÐÐÒµ¡£ÊÂÎñÔ´ÓÚ2023Äê3ÔÂ22ÈÕÒ»ÃûÔ±¹¤ÏÂÔØ¶ñÒâÎļþ£¬µ¼ÖºڿÍÈëÇÖÆäMicrosoft 365ÇéÐΡ£Ö»¹ÜÎó²îÔÚ10·ÖÖÓÄÚ±»¼ì²â£¬µ«Capitaδʵʱ¸ôÀëÊÜѬȾװ±¸£¬Ê¹¹¥»÷ÕßµÃÒÔÔÚ58СʱÄÚºáÏòÒÆ¶¯£¬×îÖÕÇÔÈ¡½ü1TBÊý¾Ý²¢°²ÅÅÀÕË÷Èí¼þ¡£Black BastaÍÅ»ïÐû³Æ¶Ô´ËÈÏÕæ£¬Íþвй¶Êý¾Ý¡£


https://www.bleepingcomputer.com/news/security/capita-to-pay-14-million-for-data-breach-impacting-66-million-people/


4. Slider Revolution²å¼þÎó²îÓ°ÏìÊý°ÙÍòWordPressÍøÕ¾


10ÔÂ15ÈÕ£¬»îÔ¾×°Öó¬400ÍòµÄWordPress»¬¿é²å¼þSlider Revolution¿ËÈÕ±»ÆØ³ö±àºÅΪCVE-2025-9217µÄÇå¾²Îó²î£¬Ó°Ïì6.7.36¼°ÒÔÉÏËùÓа汾¡£¸ÃÎó²îÔ´ÓÚ²å¼þÖС°used_svg¡±ºÍ¡°used_images¡±Á½¸ö²ÎÊýµÄÑé֤ȱÏÝ£¬ÕâÁ½¸ö²ÎÊýÓÃÓÚÖÎÀíͼÏñ/ÊÓÆµµ¼³ö¹¦Ð§¡£ÓÉÓÚδÑÏ¿áÏÞÖÆÎļþÀàÐͺÍ·¾¶£¬¹¥»÷Õß¿ÉʹÓôËÎó²î¶ÁÈ¡·þÎñÆ÷ÉϵÄí§ÒâÎļþ£¬°üÀ¨´æ´¢Êý¾Ý¿âƾ֤ºÍ¼ÓÃÜÃÜÔ¿µÄwp-config.phpÎļþ£¬ÍþÐ²ÍøÕ¾Êý¾ÝÇå¾²¡£Çå¾²ÆÊÎöʦƾ֤ͨÓÃÎó²îÆÀ·Öϵͳ£¨CVSS£©ÆÀ¶¨¸ÃÎó²îΪ6.5·Ö£¬ÊôÓÚÖеÈÑÏÖØÐÔ¡£Îó²îÓÉ×ÔÁ¦Ñо¿Ô±¡°stealthcopter¡±ÓÚ2025Äê8ÔÂ11ÈÕͨ¹ýWordfenceÎó²îÉͽðÍýÏëÊ״α¨¸æ¡£WordfenceÍŶÓÔÚ8ÔÂ19ÈÕÍê³ÉÑéÖ¤ºó£¬½«ÏêÇéת´ï¸ø²å¼þ¿ª·¢ÉÌThemePunch¡£¿ª·¢ÍŶÓѸËÙÏìÓ¦£¬ÔÚÁ½ÌìÄÚÈ·ÈÏÎÊÌâ²¢Æô¶¯ÐÞ¸´ÊÂÇ飬×îÖÕÓÚ8ÔÂ28ÈÕÐû²¼6.7.37°æ±¾³¹µ×ÐÞ¸´Îó²î¡£Îª´Ë£¬Ñо¿Ö°Ô±»ñµÃ656ÃÀÔªµÄÉͽð½±Àø¡£


https://www.infosecurity-magazine.com/news/flaw-slider-revolution-plugin/


5. Î÷°àÑÀʱÉоÞÍ·MANGOת´ïÓªÏú·þÎñÉÌÊý¾Ýй¶ÊÂÎñ


10ÔÂ15ÈÕ£¬Î÷°àÑÀʱÉÐÁãÊÛÉÌMANGOÏòÈ«Çò¿Í»§·¢ËÍÊý¾Ýй¶֪ͨ£¬Åû¶ÆäÍⲿӪÏú·þÎñ¹©Ó¦ÉÌÔâÓöÍøÂç¹¥»÷£¬µ¼Ö²¿·Ö¿Í»§Ð¡ÎÒ˽¼ÒÐÅÏ¢±»²»·¨»á¼û¡£×÷Ϊ½¨ÉèÓÚ1984Äê¡¢ÔÚ120¸ö¹ú¼ÒÓµÓÐ2800¸öÏúÊÛÍøµã¡¢ÄêÊÕÈë33ÒÚÅ·Ôª¡¢Ô±¹¤16300È˵ÄʱÉоÞÍ·£¬MANGO´Ë´ÎÊÂÎñÉæ¼°¿Í»§ÐÕÃû£¨²»º¬ÐÕÊÏ£©¡¢¹ú¼Ò¡¢ÓÊÕþ±àÂë¡¢µç×ÓÓʼþµØµã¼°µç»°ºÅÂëµÈÓªÏúÔ˶¯³£ÓÃÊý¾Ý£¬µ«Ã÷ȷɨ³ýÐÕÊÏ¡¢ÒøÐÐÕË»§¡¢ÐÅÓÿ¨ÐÅÏ¢¡¢Éí·ÝÖ¤/»¤ÕÕºÅÂë¼°ÕË»§Æ¾Ö¤µÈ¸ßÃô¸ÐÐÅÏ¢¡£MANGOÇ¿µ÷£¬Æä½¹µãӪҵϵͳ¼°IT»ù´¡ÉèʩδÊÜÓ°Ï죬¹«Ë¾ÔËÓª¼á³ÖÕý³£¡£ÊÂÎñÔ´ÓÚµÚÈý·½ÓªÏú·þÎñÉ̵ÄÇå¾²Îó²î£¬¹¥»÷Õßͨ¹ý¸ÃÎó²î»ñÈ¡ÁË´æ´¢ÔÚÓªÏúϵͳÖеĿͻ§Êý¾Ý¡£Ö»¹ÜȱʧÐÕÊϽµµÍÁËÖ±½ÓÉí·ÝµÁÓÃΣº¦£¬µ«Ð¹Â¶µÄÁªÏµ·½·¨ÈÔ¿ÉÄܱ»ÓÃÓÚÍøÂç´¹Âڵȶþ´Î¹¥»÷¡£ÊÂÎñ±¬·¢ºó£¬MANGOÁ¬Ã¦Æô¶¯ËùÓÐÇ徲ЭÒ飬²¢ÏòÎ÷°àÑÀÊý¾Ý±£»¤¾Ö£¨AEPD£©¼°î¿Ïµ²¿·Ö±¨¸æ¡£ÎªÐ­ÖúÊÜÓ°Ïì¿Í»§£¬¹«Ë¾ÉèÁ¢ÁËרÓÃÓÊÏäºÍÈÈÏߵ绰£¬ÌṩΣº¦×Éѯ֧³Ö¡£


https://www.bleepingcomputer.com/news/security/clothing-giant-mango-discloses-data-breach-exposing-customer-info/


6. F5ÔâÓö¹ú¼Ò¼¶ºÚ¿ÍÈëÇÖ£¬Î´¹ûÕæÎó²îÔ´´úÂëÔâÇÔÈ¡


10ÔÂ15ÈÕ£¬ÃÀ¹úÍøÂçÇå¾²¹«Ë¾F5ÓÚ2025Äê8ÔÂ9ÈÕÅû¶ÔâÓö¹ú¼Ò¼¶ºÚ¿ÍÈëÇÖ£¬¹¥»÷Õߺã¾Ã»á¼ûÆäϵͳ²¢ÇÔÈ¡ÁËÆì½¢²úÆ·BIG-IPµÄδ¹ûÕæÇå¾²Îó²î¼°Ô´´úÂë¡£ÊÓ²ìÏÔʾ£¬ºÚ¿ÍÈëÇÖÁËF5µÄBIG-IP²úÆ·¿ª·¢ÇéÐμ°¹¤³Ì֪ʶÖÎÀíÆ½Ì¨£¬ÇÔÈ¡Á˰üÀ¨BIG-IP²¿·ÖÔ´´úÂ롢δ¹ûÕæÎó²îÐÅÏ¢¼°¿Í»§ÉèÖÃϸ½ÚµÄÎļþ¡£Ö»¹Ü±£´æÊý¾Ýй¶£¬µ«F5Ç¿µ÷¹¥»÷ÕßδʹÓÃÕâЩÎó²î¾ÙÐÐÏÖʵ¹¥»÷£¬Ò²Î´·¢Ã÷¹©Ó¦Á´Î£º¦»ò´úÂë±»¸Ä¶¯µÄÖ¤¾Ý£¬ÆäCRM¡¢²ÆÎñ¡¢Ö§³Ö°¸ÀýÖÎÀíµÈ°üÀ¨¿Í»§Êý¾ÝµÄƽ̨¾ùδÊÜÓ°Ïì¡£ÊÂÎñ±¬·¢ºó£¬F5ѸËÙ½ÓÄɵ÷½â²½·¥£ºÂÖ»»Æ¾Ö¤¡¢Ç¿»¯»á¼û¿ØÖÆ¡¢°²ÅÅ×Ô¶¯»¯²¹¶¡ÖÎÀí¹¤¾ß£¬²¢ÔöÇ¿ÍøÂçÇå¾²¼Ü¹¹¡£¸Ã¹«Ë¾ÓëNCC GroupºÍIOActiveÏàÖú£¬Í¨¹ý76ÃûÕÕÁ϶ÔBIG-IPÒªº¦Èí¼þ×é¼þ¼°¿ª·¢Á÷³Ì¾ÙÐÐÇå¾²Éó²é£¬Î´·¢Ã÷¶ñÒâ´úÂëÖ²È롣ͬʱ£¬F5Ðû²¼ÁËÕë¶ÔBIG-IP¡¢F5OSµÈ²úÆ·µÄÇå¾²¸üУ¬½¨Òé¿Í»§ÓÅÏÈ×°ÖÃÒÔÌá·ÀDZÔÚΣº¦£¬²¢ÌṩÍþвÕ÷²ÉÖ¸Äϼ°iHealthÕï¶Ï¹¤¾ßµÄ×Ô¶¯¼ì²é¹¦Ð§¡£


https://www.bleepingcomputer.com/news/security/hackers-breach-f5-to-steal-undisclosed-big-ip-flaws-source-code/