CISAÖÒÑÔBroadcom VMware vCenterÎó²îÔâʹÓÃ

Ðû²¼Ê±¼ä 2026-01-27

1. CISAÖÒÑÔBroadcom VMware vCenterÎó²îÔâʹÓÃ


1ÔÂ24ÈÕ £¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«Broadcom VMware vCenter ServerµÄÑÏÖØÎó²îCVE-2024-37079£¨CVSSÆÀ·Ö9.8£©ÄÉÈëÒÑ֪ʹÓÃÎó²î£¨KEV£©Ä¿Â¼¡£¸ÃÎó²îÔ´ÓÚvCenter Server¶ÔDCERPCЭÒéʵÏֵĶÑÒçÓÐȱÏÝ £¬¹¥»÷Õßͨ¹ýÍøÂç»á¼û¼´¿É·¢ËÍÌØÖÆÊý¾Ý°ü´¥·¢Îó²î £¬ÊµÏÖÔ¶³Ì´úÂëÖ´ÐлòȨÏÞÌáÉý¡£vCenter ServerÊÇVMware¿ª·¢µÄÐéÄ⻯ÇéÐμ¯ÖÐÖÎÀíÆ½Ì¨¡£2024Äê6Ô £¬VMwareÐÞ¸´ÁËCVE-2024-37079¼°¹ØÁªÎó²îCVE-2024-37080 £¬¶þÕß¾ù±»ÆÀ¹ÀΪ¡°ÑÏÖØ¡±¼¶±ð¡£²©Í¨¹«Ë¾ËæºóÈ·ÈÏ £¬CVE-2024-37079ÒÑÔâÏÖʵʹÓà £¬µ«Ïêϸ¹¥»÷ϸ½ÚÉÐδ¹ûÕæ¡£ÔÚ2025ÄêÑÇÖÞºÚñ´ó»áÉÏ £¬Ñо¿Ö°Ô±Åû¶CVE-2024-37079ʵΪËĸöDCE/RPCÎó²îÁ´µÄÒ»²¿·Ö £¬°üÀ¨Èý¸ö¶ÑÒç³öÎó²îºÍÒ»¸öȨÏÞÌáÉýÎó²î¡£ÆäÖÐÁ½¸öÏà¹ØÎó²îÒÑÓÚ2024Äê9ÔÂÐÞ¸´ £¬¶øÌض¨¶ÑÒç³öÎó²î¿ÉÓëCVE-2024-38813ÍŽá £¬ÔÚESXiÖ÷»úÉÏ»ñȡԶ³ÌrootȨÏÞ¡£Ñо¿Ö°Ô±Ç¿µ÷ £¬Í¨¹ý×éºÏʹÓÃÕâЩÎó²î £¬ËûÃÇÀÖ³ÉÔÚ2024ÄêMatrix CupÎó²îÌôÕ½ÈüÖÐʵÏÖδ¾­ÊÚȨµÄÔ¶³Ìroot»á¼û¡£


https://securityaffairs.com/187267/security/u-s-cisa-adds-a-flaw-in-broadcom-vmware-vcenter-server-to-its-known-exploited-vulnerabilities-catalog.html


2. 11ÄêδÐÞ¸´µÄGNU Telnetd¸ßΣÎó²îÔâЭͬ¹¥»÷


1ÔÂ23ÈÕ £¬¿ËÈÕ £¬Ò»¸ö±£´æ³¤´ï11ÄêµÄGNU InetUtils telnetd·þÎñÆ÷ÑÏÖØÎó²î£¨CVE-2026-24061£©±»ÆØÔâЭͬ¹¥»÷¡£¸ÃÎó²îÔ´ÓÚtelnetdδÕûÀíÓû§¿ØÖƵÄUSERÇéÐαäÁ¿ £¬¹¥»÷Õß¿ÉÉèÖÃUSER=-f root²¢Í¨¹ýtelnet -aÏÂÁîÅþÁ¬ £¬Ö±½ÓÈÆ¹ýÉí·ÝÑéÖ¤»ñÈ¡rootȨÏÞ¡£Îó²îÓ°Ïì2015ÄêÐû²¼µÄ1.9.3ÖÁ2.7°æ±¾ £¬2.8°æ±¾ÒÑÐÞ¸´ £¬ÎÞ·¨Éý¼¶µÄÓû§¿Éͨ¹ý½ûÓ÷þÎñ»ò·â±ÕTCP 23¶Ë¿Ú»º½â¡£GNU InetUtilsÊÇGNUÏîĿά»¤µÄ¾­µäÍøÂ繤¾ß¼¯ £¬°üÀ¨telnet/ftpµÈ¿Í»§¶ËºÍ·þÎñÆ÷ £¬ÆÕ±éÓ¦ÓÃÓÚLinux¿¯Ðаæ¡£Ö»¹ÜTelnetÒòÇå¾²ÐԲSSHÈ¡´ú £¬µ«ÔÚ¹¤ÒµÎïÁªÍø¡¢ÉãÏñÍ·¡¢´«¸ÐÆ÷¼°OTÍøÂçÖÐÈÔÆÕ±é±£´æ £¬ÕâЩװ±¸³£Òò¼æÈÝÐÔ»òÉý¼¶ÐèÖØÆô¶øºã¾ÃÔËÐоɰæÏµÍ³¡£Zerotak¹«Ë¾Ö¸³ö £¬OT/ICSÇéÐÎÖÐÒªº¦ÏµÍ³Ìæ»»ÄÑÌâ £¬ÒÅÁô×°±¸µ¼ÖÂTelnetÄÑÒÔÍêÈ«ïÔÌ­¡£Íþв¼à¿Ø¹«Ë¾GreyNoise¼ì²âµ½Õë¶Ô¸ÃÎó²îµÄ¹¥»÷Ô˶¯£º1ÔÂ21-22ÈÕ £¬18¸ö¹¥»÷IPͨ¹ý60´ÎTelnet»á»°Ìᳫ100%¶ñÒâ¹¥»÷ £¬·¢ËÍ1525¸öÊý¾Ý°ü£¨×ܼÆ101.6KB£©¡£¹¥»÷ʹÓÃTelnet IACÑ¡ÏîЭÉÌ»ú֯עÈë"USER=-f "²ÎÊý £¬83.3%µÄÄ¿µÄÊÇrootÓû§¡£


https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-telnetd-auth-bypass-flaw-to-get-root/


3. StanleyÐÂÐÍMaaSͨ¹ýChromeÊÐËÁ·Ö·¢´¹ÂÚÀ©Õ¹


1ÔÂ26ÈÕ £¬Ò»ÖÖÃûΪ"Stanley"µÄÐÂÐͶñÒâÈí¼þ¼´·þÎñ£¨MaaS£©¿ËÈÕÒý·¢Çå¾²½ç¹Ø×¢ £¬¸Ã·þÎñͨ¹ýChromeÍøÉÏÓ¦ÓÃÊÐËÁ·Ö·¢¶ñÒâÀ©Õ¹³ÌÐòʵÑéÍøÂç´¹ÂÚ¹¥»÷¡£¾Ý¶Ëµ½¶ËÊý¾ÝÇå¾²¹«Ë¾VaronisÑо¿ £¬StanleyÓɼÙÃûÏàͬµÄÂô¼Ò¿ª·¢ £¬Æä½¹µã¹¦Ð§ÊÇÔÚÓû§ä¯ÀÀÆ÷ÖÐÁýÕÖÈ«ÆÁiframeÏÔʾ´¹ÂÚÄÚÈÝ £¬Í¬Ê±¼á³ÖµØµãÀ¸ÏÔʾÕýµ±ÓòÃûÒÔÔöÇ¿ÓÕÆ­ÐÔ¡£¸ÃMaaS·þÎñÖ§³ÖChrome¡¢EdgeºÍBraveä¯ÀÀÆ÷¾²Ä¬×Ô¶¯×°Öà £¬²¢Ìṩ¶¨ÖÆ»¯¹¦Ð§¡£Æä¶©ÔÄģʽ°üÀ¨¶à¸ö²ã¼¶ £¬×î¸ß¼¶µÄ"LuxeÌײÍ"Å䱸Web¿ØÖÆÃæ°å £¬Ö§³Ö½«¶ñÒâÀ©Õ¹Ö±½ÓÐû²¼ÖÁChromeÓ¦ÓÃÊÐËÁ¡£StanleyµÄ¹¥»÷»úÖÆÍ¨¹ý×èµ²Ò³Ãæµ¼º½²¢ÓÃiframeÁýÕÖÍøÒ³ÊµÏÖ £¬²Ù×÷Ö°Ô±¿Éͨ¹ý¿ØÖÆÃæ°åʵʱÆôÓÃ/½ûÓÃÐ®ÖÆ¹æÔò £¬ÉõÖÁÖ±½ÓÏòÊܺ¦Õßä¯ÀÀÆ÷ÍÆËÍ֪ͨÓÕµ¼»á¼ûÌØ¶¨Ò³Ãæ¡£ÊÖÒÕ²ãÃæ £¬Stanleyÿ10ÃëÖ´ÐÐC2ÂÖѯ²¢Ö§³Ö±¸·ÝÓòÂÖ»»ÒÔÔöÇ¿¿¹·â±ÕÄÜÁ¦¡£Æä´úÂë±£´æ¶íÓï×¢ÊÍ¡¢¿Õcatch¿éºÍ²»¹æ·¶¹ýʧ´¦Öóͷ£µÈÎÊÌâ £¬±»ÆÀ¼ÛΪ"ÊÖÒÕ´Ö²Ú"¡£µ«ÕæÕýʹÆäÍÑÓ±¶ø³öµÄÊÇÆäÆæÒìµÄ·Ö·¢Õ½ÂÔ £¬Ê¹ÓÃChromeÓ¦ÓÃÊÐËÁ×÷Ϊ¿ÉÐÅÆ½Ì¨ÈƹýͨÀýÉóºËÁ÷³Ì¡£


https://www.bleepingcomputer.com/news/security/new-malware-service-guarantees-phishing-extensions-on-chrome-web-store/


4. αÔìCAPTCHAÓëApp-V¾ç±¾Èö²¥AmateraÇÔÃܳÌÐò


1ÔÂ26ÈÕ £¬Ò»ÏîÍŽáClickFixÒªÁ졢αÔìCAPTCHA¼°ÒÑÊðÃûMicrosoft App-V¾ç±¾µÄÐÂÐͶñÒâ¹¥»÷ÕýÈö²¥AmateraÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¾ÝBlackPoint CyberÑо¿ £¬¹¥»÷ʼÓÚαÔìµÄCAPTCHAÑéÖ¤ £¬ÓÕµ¼Êܺ¦Õßͨ¹ýWindowsÔËÐжԻ°¿òÖ´ÐжñÒâÏÂÁî¡£ÕâЩÏÂÁîÀÄÓÃÕýµ±µÄSyncAppvPublishingServer.vbs¾ç±¾ £¬Í¨¹ýÊÜÐÅÍеÄwscript.exeÖ´ÐÐPowerShell´úÂë £¬ÊµÏÖ¶ñÒâÔ˶¯Òþ²Ø»¯¡£¸Ã¹¥»÷Ê×´ÎÔÚClickFix³¡¾°Öм¯³ÉApp-V¾ç±¾¡£¹¥»÷Á÷³Ì°üÀ¨¶à½×¶ÎÑéÖ¤£º³õʼÏÂÁî»á¼ì²éÊÇ·ñÊÖ¶¯Ö´ÐС¢Ö´ÐÐ˳ÐòÊÇ·ñºÏ¹æ¼°¼ôÌù°åÄÚÈÝÊÇ·ñ±»¸Ä¶¯ £¬ÒÔ¹æ±ÜɳÏä¼ì²â¡£Èô·¢Ã÷ÆÊÎöÇéÐÎ £¬Ö´Ðн«ÎÞÏÞÆÚÔÝÍ£ÒÔÏûºÄ×Ô¶¯»¯ÆÊÎö×ÊÔ´¡£Öª×ãÌõ¼þºó £¬¶ñÒâÈí¼þ´ÓGoogleÈÕÀúÎļþÖмìË÷base64±àÂëµÄÉèÖÃÊý¾Ý £¬Í¨¹ýWMI¿ò¼ÜÌìÉúÒþ²ØµÄ32λPowerShellÀú³Ì £¬½«Ç¶Ì×ÓÐÓÃÔØºÉ½âÃܲ¢¼ÓÔØÖÁÄÚ´æ¡£ºóÐø½×¶Î½ÓÄÉÒþдÊõ£º¼ÓÃܵÄPowerShellÓÐÓÃÔØºÉǶÈ빫¹²CDNÍйܵÄPNGͼÏñ £¬Í¨¹ýWinINet API¶¯Ì¬ÌáÈ¡ £¬¾­LSBÒþдÊõÆÊÎö¡¢GZip½âѹºóÄÚ´æÖ´ÐС£×îÖս׶νâÃܲ¢Æô¶¯Ô­Éúshellcode £¬Ó³ÉäÖ´ÐÐAmateraÇÔÃܳÌÐò¡£


https://www.bleepingcomputer.com/news/security/new-clickfix-attacks-abuse-windows-app-v-scripts-to-push-malware/


5. ¶à¶ûÂí¿¨°ÍÃŽûϵͳÎó²î»òÖÂÔ¶³Ì¿ªÃÅ


1ÔÂ26ÈÕ £¬¿ËÈÕ £¬¶à¶ûÂí¿¨°Í£¨Dormakaba£©ÎïÀíÃŽûϵͳ±»ÆØ±£´æÑÏÖØÇå¾²Îó²î £¬¿ÉÄÜʹºÚ¿ÍÔ¶³Ì·­¿ª´óÐÍ»ú¹¹´óÃÅ¡£¸ÃÎó²îÓÉAtosÆìÏÂEviden¹«Ë¾µÄÍøÂçÇå¾²×Éѯ¹«Ë¾SEC Consultר¼Ò·¢Ã÷ £¬Ó°Ïì¹æÄ£º­¸ÇDormakabaµÄExosÖÐÑëÖÎÀíÈí¼þ¡¢Ó²¼þ»á¼ûÖÎÀíÆ÷¼°Ö§³Ö¼üÅÌ¡¢Ö¸ÎÆ¡¢Ð¾Æ¬¿¨»á¼ûµÄ×¢²áµ¥Î»µÈ½¹µã²úÆ·¡£Ñо¿ÍŶӹ²·¢Ã÷20Óà¸öÎó²îÀàÐÍ £¬°üÀ¨Ó²±àÂëÆ¾Ö¤Óë¼ÓÃÜÃÜÔ¿¡¢ÈõÃÜÂë¡¢Éí·ÝÑé֤ȱʧ¡¢²»Çå¾²ÃÜÂëÌìÉú¡¢ÍâµØÈ¨ÏÞÌáÉý¡¢Êý¾Ýй¶¡¢Â·¾¶±éÀú¼°ÏÂÁî×¢ÈëµÈ¡£ÕâЩÎó²îÖ÷Òª±»Å·ÖÞ´óÐÍÆóҵʹÓà £¬Éæ¼°¹¤Òµ¹«Ë¾¡¢ÄÜÔ´¹©Ó¦ÉÌ¡¢ÎïÁ÷ÆóÒµ¼°»ú³¡ÔËÓªÉ̵ȸßÇå¾²ÐèÇ󳡾°¡£SEC ConsultÖ¸³ö £¬¹¥»÷ÕßÈôʹÓÃÕâЩÎó²î £¬¿ÉÖ±½Ó½âËøÃŽû¡¢ÇÔÈ¡»á¼ûPINÂë £¬»òÔÚÊÜ¿ØÇéÐÎÖÐÌᳫ½øÒ»²½¹¥»÷¡£Dormakaba͸¶ £¬¿ÉÄÜÊýǧÃû¿Í»§ÊÜÓ°Ïì £¬ÆäÖв¿·Ö¸ßÇå¾²ÐèÇó¿Í»§Î£º¦ÓÈΪͻ³ö¡£DormakabaÔÚÒÑÍùÒ»Äê°ëÄÚÒ»Á¬Ðû²¼²¹¶¡¼°¼Ó¹ÌÖ¸ÄÏ £¬²¢ÓëÖ÷Òª¿Í»§ÏàÖúÐÞ¸´ÏµÍ³Îó²î £¬Í¬Ê±ÌåÏÖÉÐδ·¢Ã÷ÏÖʵʹÓð¸Àý¡£


https://www.securityweek.com/access-system-flaws-enabled-hackers-to-unlock-doors-at-major-european-firms/


6. CrunchbaseÔâShinyHunters¹¥»÷Ö³¬200ÍòÌõÊý¾Ýй¶


1ÔÂ26ÈÕ £¬¿ËÈÕ £¬ÆóÒµÊý¾Ýƽ̨Crunchbase֤ʵ±¬·¢ÑÏÖØÊý¾Ýй¶ÊÂÎñ¡£ÍøÂç·¸·¨×éÖ¯ShinyHuntersÐû³Æ´ÓÆäϵͳÖÐÇÔÈ¡ÁËÁè¼Ý200ÍòÌõСÎÒ˽¼Ò¼Í¼ £¬ÒòÀÕË÷δ¹û £¬¸Ã×éÖ¯ÔÚTor°µÍøÍøÕ¾Ð¹Â¶Á˰üÀ¨402MBÊý¾ÝµÄѹËõÎļþ¡£Crunchbase»ØÓ¦³Æ £¬´Ë´ÎÇå¾²ÊÂÎñδ¶ÔÓªÒµÔËÓªÔì³É×ÌÈÅ £¬ÏÖÔÚÎó²îÒÑ»ñµÃ¿ØÖÆ £¬ÏµÍ³Ç徲״̬Òѻָ´¡£¾ÝCrunchbaseÅû¶ £¬ÊÂÎñ±¬·¢ºó £¬¹«Ë¾Á¬Ã¦Ô¼ÇëÍøÂçÇ徲ר¼ÒЭÖúÊÓ²ì £¬²¢ÒÑ֪ͨÁª°îÖ´·¨²¿·Ö¡£×÷ΪÊÂÎñÏìÓ¦Á÷³ÌµÄÒ»²¿·Ö £¬CrunchbaseÕýÔÚÉó²éй¶Êý¾ÝµÄÏêϸÄÚÈÝ £¬ÒÔÈ·¶¨ÊÇ·ñÐèÒªÒÀ¾ÝÏà¹ØÖ´·¨ÒªÇóÏòÊÜÓ°ÏìÓû§·¢ËÍÕýʽ֪ͨ¡£¸Ã¹«Ë¾Ç¿µ÷ £¬¹¥»÷ÕßÐû²¼µÄÎļþ°üÀ¨ÆóÒµÍøÂçÖеÄÌØ¶¨ÐÅÏ¢ £¬µ«½¹µãӪҵϵͳδÊÜʵÖÊÐÔÓ°Ïì¡£ÖµµÃ×¢ÖØµÄÊÇ £¬ShinyHunters×éÖ¯½üÆÚÖØÆôÁËÆäTorÊý¾Ýй¶վµã £¬½«CrunchbaseÓëSoundCloud¡¢BettermentÅäºÏÁÐÈë"Êý¾Ýй¶Êܺ¦ÕßÃûµ¥" £¬ºóÁ½¼Ò¹«Ë¾´Ëǰ¾ùÒÑ֤ʵÔâÓöÀàËÆ¹¥»÷¡£


https://securityaffairs.com/187340/data-breach/shinyhunters-claims-2-million-crunchbase-records-company-confirms-breach.html