Modular DS²å¼þ¸ßΣÎó²îCVE-2026-23550ÔâʹÓÃ
Ðû²¼Ê±¼ä 2026-01-191. Modular DS²å¼þ¸ßΣÎó²îCVE-2026-23550ÔâʹÓÃ
1ÔÂ15ÈÕ£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±¿ËÈÕÅû¶£¬WordPress¶àÕ¾µãÖÎÀí²å¼þModular DSµÄ2.5.1¼°¸üÔç°æ±¾±£´æÑÏÖØÎó²îCVE-2026-23550£¬¸ÃÎó²îÒѱ»ºÚ¿ÍʹÓã¬ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÔ¶³ÌÈÆ¹ýÈÏÖ¤£¬ÒÔÖÎÀíԱȨÏÞ»á¼ûÊÜÓ°ÏìÍøÕ¾¡£Modular DS×÷Ϊһ¿îÖÎÀí¶à¸öWordPressÕ¾µãµÄ¹¤¾ß£¬×°ÖÃÁ¿Òѳ¬4Íò´Î£¬Æä¹¦Ð§°üÀ¨Ô¶³Ì¼à¿Ø¡¢Ö´ÐиüС¢Óû§ÖÎÀí¡¢·þÎñÆ÷ÐÅÏ¢»á¼û¼°Î¬»¤Ê¹ÃüµÈ¡£¾ÝPatchstackÍŶӱ¨¸æ£¬Îó²îÊ״ι¥»÷±¬·¢ÔÚ2026Äê1ÔÂ13ÈÕUTCʱ¼ä02:00×óÓÒ¡£Ñо¿Ö°Ô±·¢Ã÷£¬Îó²îÔ´ÓÚ²å¼þÔÚÆôÓÃ"Ö±½ÓÇëÇó"ģʽʱ£¬Î´¶ÔÇëÇóȪԴ¾ÙÐмÓÃÜÑéÖ¤¼´ÊÓΪ¿ÉÐÅ£¬µ¼ÖÂÃô¸Ð·ÓÉ̻¶²¢´¥·¢×Ô¶¯ÖÎÀíÔ±µÇ¼»ØÍË»úÖÆ¡£Ïêϸ¶øÑÔ£¬ÔÚsrc/app/Http/Controllers/AuthController.phpµÄgetLoginÒªÁìÖУ¬´úÂëʵÑé´ÓÇëÇóÌå¶ÁÈ¡Óû§ID£¬ÈôδÌṩÔò×Ô¶¯»ñÈ¡ÏÖÓÐÖÎÀíÔ±»ò³¬µÈÖÎÀíÔ±Óû§²¢µÇ¼£¬Î´¾Éí·ÝÑéÖ¤µÄÓû§¿ÉʹÓôË·¾¶ÊµÏÖȨÏÞÌáÉý¡£Modular DSÔÚÊÕµ½Îó²î±¨¸æºóÊýСʱÄÚÐû²¼2.5.2°æ±¾ÐÞ¸´³ÌÐò¡£
https://www.bleepingcomputer.com/news/security/hackers-exploit-modular-ds-wordpress-plugin-flaw-for-admin-access/
2. ÖÐÑëÃåÒòÖÝÒ½ÁƱ£½¡ÖÐÐÄÊý¾Ýй¶ӰÏ쳬14.5Íò»¼Õß
1ÔÂ15ÈÕ£¬ÖÐÑëÃåÒòÖÝÒ½ÁƱ£½¡ÖÐÐÄ¿ËÈÕÅû¶һÆðÖØ´óÊý¾ÝÇå¾²ÊÂÎñ£¬Ó°Ïì145,381Ãû»¼Õß¡£¸Ã·ÇÓªÀûÐÔÒ½ÁÆÏµÍ³ÓÚ2025Äê6ÔÂ1ÈÕ¼ì²âµ½ITϵͳÒì³£Ô˶¯£¬Ëæ¼´Æô¶¯Çå¾²¼Ó¹Ì²¢ÍŽáµÚÈý·½ÍøÂçÇ徲ר¼ÒÕö¿ªÊӲ죬ͬ²½×ª´ïÖ´·¨²¿·Ö¡£ÊÓ²ìÓÚ11ÔÂ6ÈÕÍê³É£¬È·ÈÏ2025Äê3ÔÂ19ÈÕÖÁ6ÔÂ1ÈÕʱ´ú£¬Î´¾ÊÚȨµÄµÚÈý·½»á¼ûÁËÆäITÇéÐΣ¬¿ÉÄÜ»ñÈ¡»¼ÕßÃô¸ÐÐÅÏ¢£¬°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢ÖÎÁÆÏêÇé¡¢·þÎñÈÕÆÚ¡¢Ò½ÁÆÌṩÕßÐÕÃû¡¢°ü¹ÜÐÅÏ¢£¬²¿·Ö²¡Àý»¹Éæ¼°Éç»á°ü¹ÜºÅÂë¡£×÷ΪÃåÒòÖÝÖв¿¼°Î÷²¿µØÇøÒªº¦Ò½ÁÆ·þÎñÉÌ£¬¸Ã»ú¹¹ÔËÓª¶à¼ÒÒ½Ôº¡¢ÕïËù¼°×¨¿Æ·þÎñ£¬ÊÂÎñÒý·¢ÆÕ±é¹Ø×¢¡£»ú¹¹ÓÚ2025Äê7ÔÂ31ÈÕÖÁ12ÔÂ29ÈÕʱ´úͨ¹ýÊéÃæÍ¨Öª¡¢ÈÈÏߵ绰¼°ÍøÕ¾Í¨¸æ¼û¸æÊÜÓ°Ï컼Õߣ¬²¢ÌṩΪÆÚ12¸öÔµÄÃâ·ÑÐÅÓñ£»¤·þÎñ¡£¸Ã·þÎñÓÉTransUnionÆìÏÂCyberScout¹«Ë¾³Ð±££¬º¸Çµ¥¾ÖÐÅÓÃ¼à¿Ø¡¢ÊµÊ±ÐÅÓñ¨¸æ¡¢ÐÅÓÃÆÀ·Ö±ä»»ÌáÐѼ°×Ô¶¯Ú²ÆÔ®Öú£¬ÐÖúÉí·Ý͵ÇÔÊܺ¦Õß½â¾öÎÊÌâ¡£
https://securityaffairs.com/186959/uncategorized/central-maine-healthcare-data-breach-impacted-over-145000-patients.html
3. WhisperPairÎó²î̻¶ÊýÒÚÀ¶ÑÀ×°±¸Ç徲Σº¦
1ÔÂ15ÈÕ£¬Â³ãë´óѧÅÌËã»úÇå¾²ÍŶӷ¢Ã÷¹È¸è¿ìËÙÅä¶ÔÐÒé±£´æ¸ßΣÎó²îCVE-2025-36911£¨´úºÅWhisperPair£©£¬Ó°ÏìÈ«ÇòÊýÒŲ֧́³Ö¸Ã¹¦Ð§µÄÎÞÏß¶ú»ú¡¢¶úÈûºÍÑïÉùÆ÷£¬Éæ¼°Google¡¢Jabra¡¢JBL¡¢Ë÷ÄᡢСÃ×µÈÊ®Óà¸öÆ·ÅÆ¡£¸ÃÎó²îÔ´ÓÚ×°±¸ÖÆÔìÉ̶ԿìËÙÅä¶ÔÐÒéµÄ²»µ±ÊµÏÖ£¬¹æ·¶ÒªÇó×°±¸ÔÚ·ÇÅä¶ÔģʽÏÂÓ¦ºöÂÔÅä¶ÔÇëÇ󣬵«´ó¶¼³§ÉÌÎ´Ç¿ÖÆÖ´Ðд˼ì²é£¬µ¼Ö¹¥»÷Õß¿Éδ¾Óû§ÊÚÈ¨Ç¿ÖÆÅä¶Ô×°±¸¡£¹¥»÷ÕßʹÓÃÈκÎÀ¶ÑÀ×°±¸£¨ÈçÌõ¼Ç±¾µçÄÔ¡¢Ê÷Ý®ÅÉ»òÊÖ»ú£©£¬ÔÚ14Ã×¹æÄ£ÄÚÎÞÐèÓû§½»»¥¼´¿ÉÍê³ÉÅä¶Ô¡£Åä¶Ôºó£¬¹¥»÷Õß¿ÉÍêÈ«¿ØÖÆÒôƵװ±¸£ºÒÔ¸ßÒôÁ¿²¥·ÅÒôƵ×ÌÈÅÓû§£¬»òͨ¹ýÂó¿Ë·çÇÔÌý¶Ô»°¡£¸üÑÏÖØµÄÊÇ£¬Í¨¹ýGoogleµÄFind HubÍøÂ磬¹¥»÷Õ߿ɽ«Êܺ¦Õß×°±¸°ó¶¨ÖÁ×Ô¼ºµÄGoogleÕË»§£¬ÊµÏÖ¿ç×°±¸Î»Öøú×Ù¡£Êܺ¦Õß¿ÉÄÜÊÕµ½×°±¸×Ô´øµÄ¸ú×Ù֪ͨ£¬µ«ÒòÏÔʾΪ×ÔÉí×°±¸¶øºöÊÓÖÒÑÔ£¬µ¼Öºã¾ÃÒþ²Ø¸ú×Ù¡£¹È¸èÏòÑо¿Ö°Ô±·¢·Å1.5ÍòÃÀÔª×î¸ßÉͽ𣬲¢Óë³§ÉÌÏàÖúÔÚ150ÌìÅû¶ÆÚÄÚÐû²¼²¹¶¡¡£
https://www.bleepingcomputer.com/news/security/critical-whisperpair-flaw-lets-hackers-track-eavesdrop-via-bluetooth-audio-devices/
4. ¼ÓÄôóCIROÊý¾Ýй¶²¨¼°75ÍòͶ×ÊÕß
1ÔÂ18ÈÕ£¬¼ÓÄôóͶ×Êî¿Ïµ×éÖ¯£¨CIRO£©¿ËÈÕ֤ʵ£¬È¥Äê8ÔÂÔâÓöµÄÍøÂçÇå¾²ÊÂÎñ×îÖÕÈ·ÈÏÓ°ÏìÔ¼75ÍòÃû¼ÓÄôóͶ×ÊÕߣ¬³ÉΪ¸Ã¹úÈ¥Äê×îÑÏÖØµÄÍøÂçÇå¾²ÊÂÎñÖ®Ò»¡£CIRO×÷Ϊ2023Ä꽨ÉèµÄ¼ÓÄôóͶ×ÊÉúÒâÉÌ¡¢ÅäºÏ»ù½ðÉúÒâÉ̼°ÉúÒâÔ˶¯µÄ¹ú¼Ò×ÔÂÉ»ú¹¹£¬ÊǽðÈÚî¿Ïµ¿ò¼ÜµÄ½¹µãÖ§ÖùÖ®Ò»¡£CIRO·¢Ã÷ϵͳ±£´æÍøÂçÇå¾²Íþвºó£¬Á¬Ã¦¹Ø±Õ²¿·Ö·ÇÒªº¦ÏµÍ³²¢Æô¶¯ÊӲ졣ֻ¹Ü8ÔÂ18ÈÕ¶ÔÍâÅû¶ÊÂÎñ£¬µ«ÍêÕûÓ°Ïì¹æÄ£Ö±ÖÁ½ñÄê1ÔÂ14ÈÕÍê³ÉÆÕ±é·¨Ö¤ÊÓ²ìºó²ÅµÃÒÔÃ÷È·¡£ÊÓ²ìÏÔʾ£¬²¿·Ö³ÉÔ±¹«Ë¾¼°Æä×¢²áÔ±¹¤µÄСÎÒ˽¼ÒÐÅÏ¢Ôâй¶£¬ÏêϸÊý¾ÝÒòÈ˶øÒ죬¿ÉÄܰüÀ¨³öÉúÈÕÆÚ¡¢µç»°ºÅÂë¡¢ÄêÊÕÈë¡¢Éç»á°ü¹ÜºÅÂë¡¢Õþ¸®½ÒÏþµÄÉí·ÝÖ¤ºÅÂ롢Ͷ×ÊÕË»§ºÅÂë¼°ÕË»§±¨±íµÈÃô¸ÐÐÅÏ¢¡£ÖµµÃ×¢ÖØµÄÊÇ£¬CIROÇ¿µ÷Æäϵͳδ´æ´¢µÇ¼ƾ֤»òÕË»§Çå¾²ÎÊÌ⣬Òò´ËÕâЩÐÅϢδÊÜÓ°Ï졣Ϊ½µµÍΣº¦£¬CIRO½«ÎªËùÓÐÊÜÓ°ÏìͶ×ÊÕßÌṩΪÆÚÁ½ÄêµÄÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý͵ÇÔ±£»¤·þÎñ£¬ÊÜÓ°ÏìÕß½«ÊÕµ½Ö±½Ó֪ͨ¼°×¢²áÖ¸Òý£¬Î´ÊÕµ½Í¨ÖªÕß¿É×Ô¶¯ÁªÏµCIROÈ·ÈÏ״̬¡£
https://www.bleepingcomputer.com/news/security/ciro-data-breach-last-year-exposed-info-on-750-000-canadian-investors/
5. ¶ñÒâGhostPosterä¯ÀÀÆ÷À©Õ¹³ÌÐò×°ÖÃÁ¿´ï84Íò´Î
1ÔÂ17ÈÕ£¬¿ËÈÕ£¬Ñо¿Ö°Ô±ÔÚChrome¡¢FirefoxºÍEdgeÓ¦ÓÃÊÐËÁÖз¢Ã÷17¸öÓëGhostPoster¹¥»÷Ô˶¯Ïà¹ØµÄ¶ñÒâä¯ÀÀÆ÷À©Õ¹³ÌÐò£¬×Ü×°ÖÃÁ¿´ï84Íò´Î¡£¸ÃÔ˶¯×îÔçÓÉKoi SecurityÓÚ2025Äê12ÔÂÅû¶£¬Éæ¼°À©Õ¹Í¨¹ýͼ±êÒþ²Ø¶ñÒâJavaScript´úÂ룬¼à¿ØÓû§ä¯ÀÀÆ÷Ô˶¯²¢Ö²ÈëºóÃÅ¡£ÕâЩ´úÂë»á´ÓÍⲿ»ñÈ¡»ìÏýµÄÓÐÓÃÔØºÉ£¬¸ú×Ùä¯ÀÀÐÐΪ£¬Ð®ÖƵçÉÌÆ½Ì¨Í¬ÃËÁ´½Ó£¬²¢×¢Èë²»¿É¼ûiframeʵÑé¹ã¸æÚ²ÆºÍµã»÷ڲơ£LayerXµÄ×îб¨¸æÖ¸³ö£¬Ö»¹ÜÔ˶¯ÒÑÆØ¹â£¬µ«ÈÔÒ»Á¬»îÔ¾¡£17¸öÀ©Õ¹ÖУ¬×°ÖÃÁ¿×î¸ßµÄ"ÓÒ¼üµã»÷¹È¸è·Òë"´ï52.2Íò´Î£¬"ʹÓÃGoogle·ÒëÑ¡¶¨Îı¾"´ï15.9Íò´Î£¬ÆäÓàÈç"Ads Block Ultimate""¸¡¶¯²¥·ÅÆ÷"µÈ×°ÖÃÁ¿´ÓÊýǧµ½ÊýÍò²»µÈ¡£Ô˶¯×î³õÔÚMicrosoft Edgeƽ̨Ìᳫ£¬ºóÀ©Õ¹ÖÁFirefoxºÍChrome£¬²¿·ÖÀ©Õ¹×Ô2020ÄêÆð±ã±£´æÓÚ²å¼þÊÐËÁ£¬ÏÔʾÆäºã¾ÃÔËÓªµÄÀÖ³ÉÐÔ¡£ÏÖÔÚ£¬MozillaºÍ΢ÈíÒѽ«Ïà¹ØÀ©Õ¹Ï¼ܣ¬¹È¸èҲȷÈÏChromeÊÐËÁÖеÄÕâЩÀ©Õ¹Òѱ»É¾³ý¡£µ«ÒÑ×°ÖõÄÓû§ÈÔÃæÁÙΣº¦£¬Ðè×Ô¶¯Ð¶Ôز¢¼à¿ØÕË»§Òì³£¡£
https://www.bleepingcomputer.com/news/security/malicious-ghostposter-browser-extensions-found-with-840-000-installs/
6. Fortinet FortiSIEM¸ßΣÎó²îÔâÆð¾¢Ê¹ÓÃ
1ÔÂ16ÈÕ£¬¿ËÈÕ£¬Fortinet FortiSIEM±»ÆØ±£´æÑÏÖØÎó²î£¨CVE-2025-64155£©£¬Æä¿´·¨Ñé֤ʹÓôúÂëÒѹûÕæ£¬ÇÒÕý±»¹¥»÷Õ߯ð¾¢Ê¹Ó᣸ÃÎó²îÓÉHorizon3.aiÇå¾²Ñо¿Ô±Zach Hanley·¢Ã÷£¬ÊµÖÊÊDzÙ×÷ϵͳÏÂÁî×¢È루CWE-78£©ÓëȨÏÞÌáÉýµÄ×éºÏ£¬ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õßͨ¹ýÈ«ÐĽṹµÄTCPÇëÇóÖ´ÐÐí§Òâ´úÂ룬×îÖÕ¿É»ñÈ¡root»á¼ûȨÏÞ¡£Îó²îÓ°ÏìFortiSIEM 6.7ÖÁ7.5°æ±¾£¬FortinetÒÑÐû²¼Çå¾²¸üУ¬½¨ÒéÓû§Éý¼¶ÖÁ7.4.1¼°ÒÔÉÏ¡¢7.3.5¼°ÒÔÉÏ¡¢7.2.7¼°ÒÔÉÏ»ò7.1.9¼°ÒÔÉϰ汾£»Ê¹Óþɰ汾µÄÓû§ÐèǨáãÖÁÐÞ¸´°æ±¾¡£ÔÝʱ½â¾ö¼Æ»®ÎªÏÞÖÆphMonitor·þÎñ¶Ë¿Ú£¨7900£©µÄ»á¼û£¬ÒÔ»º½âÎÞ·¨Á¬Ã¦Éý¼¶µÄÇéÐΡ£ÊÖÒÕϸ½ÚÏÔʾ£¬Îó²îȪԴÔÚÓÚphMonitor·þÎñ̻¶µÄÊýÊ®¸öδÂÄÀúÖ¤µÄÔ¶³Ì¿ÉŲÓÃÏÂÁî´¦Öóͷ£³ÌÐò¡£¹¥»÷Õß¿ÉÀÄÓòÎÊý×¢ÈëÁýÕÖ/opt/charting/redishb.shÎļþ£¬´Ó¶øÒÔrootȨÏÞÖ´ÐдúÂë¡£Horizon3.aiÒÑÐû²¼ÊÖÒÕÎÄÕ¼°ÈëÇÖÖ¸±ê£¬ÖÎÀíÔ±¿Éͨ¹ý¼ì²é/opt/phoenix/log/phoenix.logsÖеÄphMonitorÈÕÖ¾£¬²éÕÒ°üÀ¨PHL_ERRORÌõÄ¿ÖеĶñÒâÔØºÉURLÒÔʶ±ðÈëÇÖ¡£
https://www.bleepingcomputer.com/news/security/hackers-now-exploiting-critical-fortinet-fortisiem-vulnerability-in-attacks/


¾©¹«Íø°²±¸11010802024551ºÅ