ºÚ¿ÍÉù³ÆÈëÇÖCheck PointÍøÂçÇå¾²¹«Ë¾²¢³öÊÛÃô¸ÐÊý¾Ý

Ðû²¼Ê±¼ä 2025-04-01

1. ºÚ¿ÍÉù³ÆÈëÇÖCheck PointÍøÂçÇå¾²¹«Ë¾²¢³öÊÛÃô¸ÐÊý¾Ý


4ÔÂ1ÈÕ £¬£¬£¬£¬£¬ºÚ¿Í×éÖ¯CoreInjectionÐû³ÆÈëÇÖÒÔÉ«ÁÐÍøÂçÇå¾²¾ÞÍ·Check Point £¬£¬£¬£¬£¬ÔÚ°µÍøÂÛ̳ÒÔ5±ÈÌØ±Ò£¨Ô¼ºÏ43.45ÍòÃÀÔª£©¶µÊÛÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯ÓÚ2025Äê3ÔÂ30ÈÕͨ¹ýBreach ForumsÐû²¼ÉùÃ÷ £¬£¬£¬£¬£¬Éù³ÆÕÆÎÕCheck PointÄÚ²¿ÏîÄ¿Îĵµ¡¢Óû§Æ¾Ö¤£¨º¬Ã÷ÎÄÃÜÂ룩¡¢ÍøÂç¼Ü¹¹Í¼¡¢Ô´´úÂë¼°Ô±¹¤ÁªÏµÐÅÏ¢µÈ½¹µãÊý¾Ý £¬£¬£¬£¬£¬½ö½ÓÊܼÓÃÜÇ®±ÒÉúÒⲢͨ¹ýTOXͨѶ¹¤¾ßÁªÏµ¡£¡£¡£¡£¡£¡£Check PointѸËÙ»ØÓ¦ £¬£¬£¬£¬£¬·ñ¶¨½üÆÚ±¬·¢´ó¹æÄ£ÈëÇÖ £¬£¬£¬£¬£¬³ÆÖ¸¿ØÔ´ÓÚÊýÔÂǰÒÑ´¦Öóͷ£µÄÁæØêÊÂÎñ £¬£¬£¬£¬£¬½öÉæ¼°·Ç½¹µãϵͳÇÒδӰÏì¿Í»§Êý¾Ý¡£¡£¡£¡£¡£¡£¹«Ë¾Ç¿µ÷±»ÈëÇÖµÄÃÅ»§Î´´¥¼°Éú²úÇéÐÎ £¬£¬£¬£¬£¬ÊÜÓ°Ïì×éÖ¯ÒÑÐÞ¸´Îó²î £¬£¬£¬£¬£¬°µÍøÊÛÂôÊý¾ÝʵΪ¾ÉÐÅÏ¢½ÓÄÉ¡£¡£¡£¡£¡£¡£CoreInjection×Ô3ÔÂ15ÈÕÏÖÉíBreach ForumsÒÔÀ´ £¬£¬£¬£¬£¬ÒѶà´ÎÕë¶ÔÒÔÉ«ÁÐÒªº¦»ù´¡ÉèÊ©Ìᳫ¹¥»÷ £¬£¬£¬£¬£¬Õ¹ÏÖ³ö¶Ô¸ß¼ÛֵĿµÄµÄ¾«×¼¹¥»÷ÄÜÁ¦¡£¡£¡£¡£¡£¡£Æä¹¥»÷ģʽÏÔʾÓëµØÔµÕþÖθ߶ȹØÁª £¬£¬£¬£¬£¬Òý·¢¶ÔDZÔÚÎïÀíÆÆËð¹¥»÷µÄµ£ÐÄ¡£¡£¡£¡£¡£¡£Ö»¹ÜCheck Pointµ­»¯ÊÂÎñÓ°Ïì £¬£¬£¬£¬£¬µ«ºÚ¿ÍÅû¶µÄÄÚ²¿¼Ü¹¹Í¼¡¢Î´¼ÓÃÜÆ¾Ö¤¼°Ô´´úÂëµÈϸ½Ú £¬£¬£¬£¬£¬ÈÔÒý·¢Íâ½ç¶ÔÈëÇÖÉî¶ÈµÄÖÊÒÉ¡£¡£¡£¡£¡£¡£±ðµÄ £¬£¬£¬£¬£¬Check Pointδ¹ûÕæÈëÇÖ·½·¨¡¢Îó²îÀàÐͼ°×·ÔðÏ£Íû £¬£¬£¬£¬£¬Æä͸Ã÷¶Èȱ·¦¿ÉÄÜÏ÷ÈõÐÐÒµÐÅÈΡ£¡£¡£¡£¡£¡£


https://hackread.com/hacker-breach-check-point-cybersecurity-firm-access/


2. LazarusºÚ¿Í×éÖ¯½ÓÄÉClickFixÕ½ÂÔ¹¥»÷¼ÓÃÜÇ®±ÒÇóÖ°Õß


3ÔÂ31ÈÕ £¬£¬£¬£¬£¬³¯ÏÊLazarusºÚ¿Í×éÖ¯½üÆÚÉý¼¶Á˶ԼÓÃÜÇ®±ÒÁìÓòÇóÖ°Õߵ͍Ïò¹¥»÷Õ½ÂÔ £¬£¬£¬£¬£¬½ÓÄÉClickFixÊÖÒÕʵÑéѬȾÐÔÃæÊԻ¡£¡£¡£¡£¡£¡£¸Ã×é֯ð³äCoinbase¡¢KrakenµÈ14¼Ò×ÅÃû¼ÓÃܽðÈÚÆóÒµ £¬£¬£¬£¬£¬Í¨¹ýÐéαְλÓÕÆ­ÇóÖ°Õß»á¼ûº¬¶ñÒâ´úÂëµÄÃæÊÔÍøÕ¾¡£¡£¡£¡£¡£¡£µ±Êܺ¦ÕßʵÑéÂ¼ÖÆÊÓÆµ»Ø¸²ÃæÊÔÎÊÌâʱ £¬£¬£¬£¬£¬ÍøÕ¾»áµ¯³öÐéαϵͳ¹ýʧÌáÐÑ £¬£¬£¬£¬£¬ÒªÇóÓû§Ö´ÐÐÌØ¶¨²Ù×÷ϵͳµÄÖÕ¶ËÏÂÁîÒÔÐÞ¸´ÉãÏñÍ·Çý¶¯ÎÊÌâ¡£¡£¡£¡£¡£¡£ÕâЩÏÂÁîÏÖʵ»áÏÂÔØÃûΪGolangGhostµÄGoÓïÑÔºóÃųÌÐò £¬£¬£¬£¬£¬Í¨¹ýÐÞ¸Ä×¢²á±í»òLaunchAgentʵÏÖϵͳפÁô¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ¾ß±¸ÇÔÈ¡Chromeä¯ÀÀÆ÷Cookie¡¢ä¯ÀÀÀúÊ·¡¢´æ´¢ÃÜÂ뼰ϵͳԪÊý¾ÝµÄÄÜÁ¦ £¬£¬£¬£¬£¬²¢Óë¹¥»÷Õß¿ØÖƵÄC2ЧÀÍÆ÷½¨Éè¼ÓÃÜͨѶ¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ £¬£¬£¬£¬£¬Lazarus½«¹¥»÷Ä¿µÄ´ÓÊÖÒÕ¿ª·¢Ö°Ô±À©Õ¹ÖÁÓªÒµ¿ª·¢¡¢Êг¡ÓªÏúµÈ·ÇÊÖÒÕ¸ÚλְԱ £¬£¬£¬£¬£¬Ê¹ÓÃReactJS¹¹½¨¸ß·ÂÆóÒµÕÐÆ¸Ò³ÃæÔöÇ¿ÓÕÆ­ÐÔ¡£¡£¡£¡£¡£¡£¹¥»÷Á´Ê¼ÓÚLinkedInµÈÉ罻ƽ̨µÄÆóÒµÕ˺Åαװ £¬£¬£¬£¬£¬Í¨¹ýGitHubµÈƽ̨ÍйܶñÒâ±àÂë²âÊÔÏîÄ¿ £¬£¬£¬£¬£¬×îÖÕÓÕµ¼Êܺ¦Õß×Ô¶¯Ö´Ðй¥»÷ÔØºÉ¡£¡£¡£¡£¡£¡£·ÀÓù½¨ÒéÇ¿µ÷ÇóÖ°ÕßÐèÑÏ¿áÑéÖ¤ÃæÊÔÔ¼ÇëȪԴ £¬£¬£¬£¬£¬×èÖ¹Ö´ÐÐÈκÎδ֪ÖÕ¶ËÏÂÁî £¬£¬£¬£¬£¬ÆóÒµÔòÓ¦°²ÅÅYara¹æÔò¼ì²âÒì³£Àú³Ì £¬£¬£¬£¬£¬²¢¼à¿Ø×¢²á±í/plistÎļþ±ä»»¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/north-korean-hackers-adopt-clickfix-attacks-to-target-crypto-firms/


3. ¹ú·À³Ð°üÉÌNDC¼°AMTECÔâºÚ¿Í¹¥»÷ϵͳ±»¼ÓÃÜ


3ÔÂ31ÈÕ £¬£¬£¬£¬£¬¹ú·À³Ð°üÉÌNDC¼°Æäµ¯Ò©ÖÆÔì×Ó¹«Ë¾AMTEC½üÆÚÔâÓöÖØ´óÍøÂç¹¥»÷ÊÂÎñ¡£¡£¡£¡£¡£¡£¾Ý°µÍøÐ¹ÃÜ×éÖ¯InterLockÐû³Æ £¬£¬£¬£¬£¬ÒÑÀÖ³ÉÈëÇÖNDC¼°Æä¹ØÁªÏµÍ³ £¬£¬£¬£¬£¬ÇÔÈ¡4,200GBÃô¸ÐÊý¾Ý £¬£¬£¬£¬£¬°üÀ¨290ÓàÍò·ÝÎļþ¼°45Íò¸öÎļþ¼Ð¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ý°µÍøÆ½Ì¨Ðû²¼²¿·Ö½ØÍ¼×÷Ϊ×ôÖ¤ £¬£¬£¬£¬£¬²¢Ö¸³öÒѶÔAMTEC¡¢Tech Ord¼°PRESTOϵͳʵÑéͨÅ̼ÓÃÜ¡£¡£¡£¡£¡£¡£×÷ΪNational Presto IndustriesÈ«×Ê×Ó¹«Ë¾ £¬£¬£¬£¬£¬NDCÖ÷Óª¾üÓÃ/¾¯Óõ¯Ò©Éú²ú £¬£¬£¬£¬£¬¾ß±¸Ï¸ÃÜ×é×°¡¢Õ¨Ò©×°ÔصȽ¹µãÄÜÁ¦¡£¡£¡£¡£¡£¡£Æä×Ó¹«Ë¾AMTEC¸üÊÇÈ«Çò40ºÁÃ×Áñµ¯µ¯Ò©¼°ÒýÐŵÄ×î´óÅúÁ¿¹©Ó¦ÉÌ¡£¡£¡£¡£¡£¡£InterLockÅû¶µÄNDCÄÚ²¿ÏàͬÄÚÈÝÏÔʾ £¬£¬£¬£¬£¬Ö»¹Ü¹«Ë¾Éù³ÆÒÑÏòÕþ¸®»ú¹¹ºÍ¹«ÖÚÅû¶ÊÂÎñ £¬£¬£¬£¬£¬µ«¹ûÕæÇþµÀδ¼ûÏà¹ØÍ¨¸æ¡£¡£¡£¡£¡£¡£NDCÔÚ»ØÓ¦Öе­»¯Êý¾Ý¼ÛÖµ £¬£¬£¬£¬£¬Ç¿µ÷ÆäÉú²úµÄµÍÊÖÒÕÉÌÆ·Éè¼ÆÄêÔ¾ÃÔ¶ £¬£¬£¬£¬£¬±»µÁÐÅÏ¢¶ÔµÚÈý·½Ê¹ÓüÛÖµÓÐÏÞ £¬£¬£¬£¬£¬Í¬Ê±Í¸Â¶ÒÑͶ±£ÁýÕÖDZÔÚËðʧ¡£¡£¡£¡£¡£¡£Ä¸¹«Ë¾±¨¸æÔòÈÏ¿ÉÊÂÎñ¶Ô²ÆÎñ¼°ÔËÓª¿ÉÄÜÔì³ÉÖØ´óÓ°Ïì £¬£¬£¬£¬£¬ÏÖÔÚ·¨Ö¤ÊÓ²ìÈÔÔÚ¾ÙÐÐÖС£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ £¬£¬£¬£¬£¬InterLockÖ¸¿ØNDCÇå¾²¼à¿Ø±£´æÊè© £¬£¬£¬£¬£¬³ÆÆäδ±»·¢Ã÷»òÇýÖð³öϵͳ¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷²»µ«Ôì³ÉÉú²ú¡¢ÎïÁ÷µÈÔËÓª¹¦Ð§ÔÝʱ̱»¾ £¬£¬£¬£¬£¬¸ü̻¶ÁËÒªº¦»ù´¡ÉèÊ©ÍøÂçÇå¾²·À»¤µÄųÈõÐÔ¡£¡£¡£¡£¡£¡£


https://databreaches.net/2025/03/31/national-defense-corporation-victim-of-ransomware-attack-discloses-breach-and-declines-to-pay-any-ransom/


4. ÈýÐǵ¹úƱÎñϵͳÒòƾ֤ʧÔôÖÂ27Íò¿Í»§Êý¾Ýй¶


3ÔÂ31ÈÕ £¬£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾Hudson RockÅû¶ÈýÐǵ¹úƱÎñϵͳÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ £¬£¬£¬£¬£¬ÍþвÐÐΪÕßGHNAʹÓñ»µÁÕË»§Æ¾Ö¤ÇÔȡԼ27ÍòÌõ¿Í»§¼Í¼¡£¡£¡£¡£¡£¡£¾ÝÊÓ²ì £¬£¬£¬£¬£¬Ð¹Â¶Ô´Í·¿É×·ËÝÖÁ2021ÄêSpectos GmbHÔ±¹¤×°±¸Ñ¬È¾µÄRacoonÐÅÏ¢ÇÔÈ¡³ÌÐò £¬£¬£¬£¬£¬¸ÃÕË»§±¾ÓÃÓÚ¼à¿ØÐ§ÀÍÖÊÁ¿ £¬£¬£¬£¬£¬µ«Ïà¹ØµÇ¼ƾ֤ºã¾ÃδÂÖ»» £¬£¬£¬£¬£¬ÏÐÖÃËÄÄêºó³ÉΪ¹¥»÷Í»ÆÆ¿Ú¡£¡£¡£¡£¡£¡£´Ë´Îй¶Êý¾Ýº­¸Ç¿Í»§ÐÕÃû¡¢µØµã¡¢ÓÊÏäµÈÃô¸ÐÐÅÏ¢ £¬£¬£¬£¬£¬ÒÔ¼°ÉúÒâ¼Í¼¡¢¶©µ¥ºÅ¡¢¸ú×ÙÁ´½ÓºÍÖ§³ÖÏàͬÄÚÈÝ¡£¡£¡£¡£¡£¡£Hudson RockÖÒÑÔ £¬£¬£¬£¬£¬´ËÀàÐÅÏ¢¿É±»ÓÃÓÚ¾«×¼ÍøÂç´¹ÂÚ¹¥»÷¡¢Ðéα¿Í»§Ö§³ÖÕ©Æ­¡¢Î±Ôì±£ÐÞË÷Åâ¼°ÎïÀí͵ÇԵȷ¸·¨»î¶¯¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÉõÖÁ¿ÉÄÜÔËÓÃAIÊÖÒÕʶ±ð¸ß¼ÛֵĿµÄ £¬£¬£¬£¬£¬ÊµÑ鶍֯»¯Ú²Æ­¡£¡£¡£¡£¡£¡£ÆÊÎö±¨¸æÖ¸³ö £¬£¬£¬£¬£¬Æ¾Ö¤ÖÎÀíÊèʧÊÇÊÂÎñÖ÷Òò £¬£¬£¬£¬£¬ÀàËÆÎÊÌâÔøµ¼Ö½ݱªÂ·»¢¡¢Ê©ÄÍµÂµçÆøµÈ¶à¼ÒÆóÒµÔâÏ®¡£¡£¡£¡£¡£¡£Hudson RockÇ¿µ÷ £¬£¬£¬£¬£¬ÐÅÏ¢ÇÔÈ¡Íþв¾ßÓÐDZÔÚÐÔ £¬£¬£¬£¬£¬ÆóÒµÐ轨ÉèÒ»Á¬Æ¾Ö¤¼à¿Ø»úÖÆ £¬£¬£¬£¬£¬¶ø·Ç½öÒÀÀµÊºóµ÷½â¡£¡£¡£¡£¡£¡£¸Ã»ú¹¹½¨Òé×Ô¶¯×·×Ù±»µÁƾ֤Ӧ³ÉΪÇå¾²Õ½ÂÔ½¹µã £¬£¬£¬£¬£¬¶ø·Ç±»¶¯Ó¦¶ÔÎó²î¡£¡£¡£¡£¡£¡£×èÖ¹ÏÖÔÚ £¬£¬£¬£¬£¬ÈýÐÇÉÐδ¾Í´ËÊÂÎñ×÷³ö¹Ù·½»ØÓ¦ £¬£¬£¬£¬£¬ºóÐøÏ£ÍûÈÔÐèÒ»Á¬¹Ø×¢¡£¡£¡£¡£¡£¡£


https://www.securityweek.com/hacker-leaks-samsung-customer-data/


5. ÌïÄÉÎ÷ÑÀ¿Æ¼¯ÍÅÓʼþÈëÇÖÖÂ17Íò»¼ÕßÊý¾Ýй¶


3ÔÂ31ÈÕ £¬£¬£¬£¬£¬ÌïÄÉÎ÷ÖÝÑÀ¿ÆÐ§Àͼ¯ÍÅChord Specialty Dental Partners£¨º¬CDHA ManagementºÍSpark DSO£©¿ËÈÕÅû¶ÔâÓöµç×ÓÓʼþϵͳÇå¾²ÊÂÎñ £¬£¬£¬£¬£¬Ó°Ïì¹æÄ£ÁýÕÖÆäÔÚÃÀ¹úÁù¸öÖÝÔËÓªµÄ60Óà¼ÒÕïËù¡£¡£¡£¡£¡£¡£¾ÝÆóҵͨ¸æ £¬£¬£¬£¬£¬2024Äê8ÔÂ18ÈÕÖÁ9ÔÂ25ÈÕʱ´ú £¬£¬£¬£¬£¬¶à¸öÔ±¹¤ÓÊÏäÔâδ¾­ÊÚȨ»á¼û £¬£¬£¬£¬£¬´æ´¢µÄÃô¸ÐÐÅÏ¢°üÀ¨»¼ÕßÐÕÃû¡¢×¡Ö·¡¢³öÉúÈÕÆÚ¡¢Éç±£ºÅ¡¢¼ÝÕպš¢ÒøÐÐÕË»§¼°Ö§¸¶¿¨Êý¾Ý¡¢Ò½ÁƼͼºÍ¿µ½¡°ü¹ÜÏêÇéµÈ¡£¡£¡£¡£¡£¡£Ö»¹ÜÆóÒµÉùÃ÷ÏÖÔÚδ·¢Ã÷ÐÅÏ¢±»¶ñÒâÀÄÓõÄÖ¤¾Ý £¬£¬£¬£¬£¬µ«ÈÔÇ¿µ÷ÎÞ·¨É¨³ýÊý¾ÝÒѱ»»ñÈ¡µÄ¿ÉÄÜÐÔ¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ²¨¼°³¬17.3ÍòÃû»¼Õß £¬£¬£¬£¬£¬ChordÒÑÏòHHS±¨±¸ £¬£¬£¬£¬£¬²¢ÔÊÐíΪÊÜÓ°ÏìÕßÌṩÐÅÓÃ¼à¿Ø¼°Éí·Ý±£»£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£¡£¡£Ç徲ר¼ÒÖ¸³ö £¬£¬£¬£¬£¬Ò½ÁÆ»ú¹¹Òò´æ´¢´ó×ڸ߼ÛֵСÎÒ˽¼Ò¿µ½¡ÐÅÏ¢ £¬£¬£¬£¬£¬ºã¾Ã³ÉÎªÍøÂç¹¥»÷ÖØµãÄ¿µÄ¡£¡£¡£¡£¡£¡£µç×ÓÓʼþ×÷Ϊ³£¼û¹¥»÷Èë¿Ú £¬£¬£¬£¬£¬ÆäÕË»§Çå¾²·À»¤±¡ÈõÐÔÍùÍù³ÉΪΣº¦Í»ÆÆ¿Ú¡£¡£¡£¡£¡£¡£´ËÀàÊÂÎñ¾¯Ê¾Ò½ÁÆ×éÖ¯ÐèÇ¿»¯ÓÊÏäϵͳµÄ¶àÒòËØÈÏÖ¤¡¢°´ÆÚÉ󼯼°ÈëÇÖ¼ì²â»úÖÆ £¬£¬£¬£¬£¬Í¬Ê±½¨ÉèÍêÕûµÄÊÂÎñÏìÓ¦Ô¤°¸ÒÔ±£»£»£»£»¤»¼ÕßÊý¾ÝÇå¾²¡£¡£¡£¡£¡£¡£


https://www.securityweek.com/170000-impacted-by-data-breach-at-chord-specialty-dental-partners/


6. CISA½«Ë¼¿ÆÖÇÄÜÔÊÐíÎó²îÁÐÈ뱻ʹÓÃĿ¼²¢ÉèÐÞ¸´ÏÞÆÚ


3ÔÂ31ÈÕ £¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²Óë»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«Ë¼¿ÆÖÇÄÜÔÊÐí¹¤¾ßµÄÁ½Ïî¸ßΣÎó²î£¨CVE-2024-20439ºÍCVE-2024-20440£©ÁÐÈëÒÑÖª±»Ê¹ÓÃÎó²îĿ¼ £¬£¬£¬£¬£¬ÒªÇóÁª°î»ú¹¹ÔÚ2025Äê4ÔÂ21ÈÕǰÍê³ÉÐÞ¸´¡£¡£¡£¡£¡£¡£Îó²îϸ½ÚÏÔʾ £¬£¬£¬£¬£¬CVE-2024-20439Ϊ¾²Ì¬Æ¾Ö¤ºóÃÅ £¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓÃÔ¤ÉèÖÎÀíÔ±ÕË»§ÎÞÑéÖ¤µÇ¼ϵͳ£»£»£»£»CVE-2024-20440ΪÐÅϢй¶Îó²î £¬£¬£¬£¬£¬Í¨¹ý½á¹¹HTTPÇëÇó¿É»ñÈ¡º¬Ãô¸ÐÊý¾ÝµÄµ÷ÊÔÈÕÖ¾ £¬£¬£¬£¬£¬°üÀ¨API»á¼ûƾ֤¡£¡£¡£¡£¡£¡£Ë¼¿ÆÒÑÐû²¼Çå¾²¸üР£¬£¬£¬£¬£¬µ«SANS»¥ÁªÍø·ç±©ÖÐÐÄÖÒÑÔ £¬£¬£¬£¬£¬Îó²îϸ½Ú¹ûÕæºóÒÑ·ºÆð»îԾʹÓü£Ïó £¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜÁ¬ÏµÆäËûÎó²î£¨ÈçCVE-2024-0305£©À©´ó¹¥»÷Ãæ¡£¡£¡£¡£¡£¡£Ç徲ר¼ÒÖ¸³ö £¬£¬£¬£¬£¬ÕâÁ½¸öÎó²î±£´æ¹ØÁª£ººóÃÅÆ¾Ö¤¿ÉÖ±½Ó»á¼ûÈÕÖ¾Îļþ £¬£¬£¬£¬£¬¶øÌ«¹ý¼Í¼µÄÈÕÖ¾ÓÖ̻¶¸ü¶àϵͳÐÅÏ¢¡£¡£¡£¡£¡£¡£Ö»¹ÜÎó²îÅû¶³õÆÚδ¼û¹ûÕæÊ¹Óà £¬£¬£¬£¬£¬µ«ÊÖÒÕϸ½ÚÍâй¼ÓËÙÁ˹¥»÷ÉìÕÅ¡£¡£¡£¡£¡£¡£Æ¾Ö¤CISAµÄÔ¼ÊøÐÔ²Ù×÷Ö¸ÁîBOD 22-01 £¬£¬£¬£¬£¬Áª°î»ú¹¹ÐèÑÏ¿á×ñÊØÐÞ¸´Ê±ÏÞ £¬£¬£¬£¬£¬Ë½Óª²¿·ÖÒà±»½¨ÒéÁ¬Ã¦Éó²éÍøÂç»ù´¡ÉèÊ© £¬£¬£¬£¬£¬ÓÅÏÈÐÞ²¹ÕâЩҪº¦Îó²î¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/176073/hacking/u-s-cisa-adds-cisco-smart-licensing-utility-flaw-known-exploited-vulnerabilities-catalog.html