CISA½«Wing FTPЧÀÍÆ÷ÐÅϢй¶Îó²îÁÐÈëKEVĿ¼

Ðû²¼Ê±¼ä 2026-03-17

1. CISA½«Wing FTPЧÀÍÆ÷ÐÅϢй¶Îó²îÁÐÈëKEVĿ¼


3ÔÂ16ÈÕ£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«Wing FTPЧÀÍÆ÷Îó²î£¨±àºÅCVE-2025-47813£¬£¬£¬CVSSÆÀ·Ö4.3£©ÕýʽÄÉÈëÆäÒÑ֪ʹÓÃÎó²î£¨KEV£©Ä¿Â¼¡£¡£¡£¸ÃÎó²îÊôÓÚÐÅϢй¿ààÐÍ£¬£¬£¬Ó°ÏìWing FTP Server 7.4.4֮ǰµÄËùÓа汾£¬£¬£¬Ïêϸ±£´æÓÚloginok.htmlÒ³ÃæµÄWebÉí·ÝÑéÖ¤Á÷³ÌÖС£¡£¡£Æ¾Ö¤CISAÐû²¼µÄͨ¸æ£¬£¬£¬µ±¹¥»÷ÕßÏòЧÀÍÆ÷·¢ËͰüÀ¨³¬³¤ÖµµÄUID cookieʱ£¬£¬£¬»á´¥·¢loginok.htmlÒ³Ãæ·µ»Ø¹ýʧÐÅÏ¢£¬£¬£¬´Ó¶øÐ¹Â¶Ð§ÀÍÆ÷µÄÍêÕûÍâµØ×°Ö÷¾¶¡£¡£¡£Ö»¹Ü¸ÃÎó²îÎÞ·¨Ö±½Óµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬µ«Ð¹Â¶µÄÎļþϵͳÏêϸÐÅÏ¢¿ÉÄܱ»ÓÃÓÚÕì̽»î¶¯£¬£¬£¬½ø¶ø¸¨ÖúʵÑé·¾¶±éÀú¹¥»÷¡¢Îļþ°üÀ¨¹¥»÷µÈºóÐø¹¥»÷ÊֶΣ¬£¬£¬¶ÔϵͳÇå¾²×é³ÉDZÔÚÍþв¡£¡£¡£ÒÀ¾Ý¾ßÓÐÔ¼ÊøÁ¦µÄ²Ù×÷Ö¸ÁBOD£©22-01¡¶½µµÍÒÑÖªÎó²î±»Ê¹ÓõÄÖØ´óΣº¦¡·µÄÒªÇ󣬣¬£¬Áª°îÃñÊÂÖ´ÐÐίԱ»á£¨FCEB£©ÏÂÊô»ú¹¹±ØÐèÔÚ2026Äê3ÔÂ30ÈÕǰÍê³É¸ÃÎó²îµÄÐÞ¸´ÊÂÇ飬£¬£¬ÒÔÌá·ÀKEVĿ¼ÖмͼµÄÎó²î±»¶ñÒâʹÓᣡ£¡£


https://securityaffairs.com/189530/security/u-s-cisa-adds-a-flaw-in-wing-ftp-server-to-its-known-exploited-vulnerabilities-catalog.html


2. Laundry Bear APT×é֯ʹÓÃDRILLAPPºóÃŹ¥»÷ÎÚ¿ËÀ¼»ú¹¹


3ÔÂ16ÈÕ£¬£¬£¬S2 GroupÆìÏÂÇ鱨ÍŶÓLAB52¿ËÈÕÅû¶£¬£¬£¬Ò»¸öÃûΪDRILLAPPµÄÐÂÐͺóÃŻÕýÕë¶ÔÎÚ¿ËÀ¼×é֯ʵÑé¹¥»÷¡£¡£¡£¸Ã»î¶¯ÓÚ2026Äê2Ô±»·¢Ã÷£¬£¬£¬Óë¶íÂÞ˹֧³ÖµÄLaundry Bear APT×éÖ¯£¨ÓÖÃûUAC-0190¡¢Void Blizzard£©±£´æ¹ØÁª£¬£¬£¬Åú×¢¸Ã×éÖ¯Ò»Á¬¶ÔÎÚ¿ËÀ¼¾ÙÐÐÍøÂçÌØ¹¤»î¶¯¡£¡£¡£¹¥»÷ÕßʹÓÃMicrosoft Edgeä¯ÀÀÆ÷µÄµ÷ÊÔ¹¦Ð§¹æ±Ü¼ì²â¡£¡£¡£µÚÒ»¸öDRILLAPP±äÖÖͨ¹ýLNKÎļþÈö²¥£¬£¬£¬ÔÚÔÝʱÎļþ¼ÐÖн¨ÉèHTMLÎļþ£¬£¬£¬¼ÓÔØÀ´×Ôpastefy.appµÄ»ìÏý¾ç±¾¡£¡£¡£ÓÕ¶üÖ÷Ì⺭¸ÇStarlink×°ÖÃͼÏñµ½Come Back Alive´ÈÉÆÇëÇ󡣡£¡£ä¯ÀÀÆ÷ÒÔÎÞͷģʽִÐУ¬£¬£¬ÆôÓÃ-no-sandbox¡¢-disable-web-securityµÈ²ÎÊý£¬£¬£¬×Ô¶¯ÊÚÓèÉãÏñÍ·¡¢Âó¿Ë·çºÍÆÁÄ»²¶»ñȨÏÞ£¬£¬£¬ÎÞÐèÓû§½»»¥¡£¡£¡£¹¥»÷Õß¿Éͨ¹ýWebSocket C2ЧÀÍÆ÷¾ÙÐÐÔ¶³Ì¿ØÖÆ£¬£¬£¬ÌìÉú×°±¸Ö¸ÎƲ¢¼ì²âÌØ×¼Ê±Çø¡£¡£¡£µÚ¶þ¸ö±äÖÖ½«LNKÎļþÌæ»»ÎªCPLÎļþ£¬£¬£¬ÓÕ¶ü°üÀ¨ÎäÆ÷½É»ñ±¨¸æºÍÎÚ¿ËÀ¼¹ú¼ÒÉó¼ÆÊðÄÏ·½°ì¹«ÊÒÎļþ¡£¡£¡£¸Ã±äÖÖÐÂÔöµÝ¹éÎļþÁÐ±í¡¢ÅúÁ¿ÉÏ´«ºÍÔ¶³ÌÎļþÏÂÔØ¹¦Ð§¡£¡£¡£¹¥»÷ÕßʹÓÃChrome DevTools ProtocolÈÆ¹ýJavaScriptÏÂÔØÏÞÖÆ£¬£¬£¬Í¨¹ýremote-debugging¶Ë¿ÚÐÞ¸ÄÏÂÔØÂ·¾¶²¢×¢Èë¾ç±¾Ä£ÄâÓû§µã»÷¡£¡£¡£


https://securityaffairs.com/189519/malware/russia-linked-apt-uses-drillapp-backdoor-to-spy-on-ukrainian-targets.html


3.Ò½ÁÆ»úеÈ˹«Ë¾IntuitiveÔâ´¹ÂÚ¹¥»÷ÖÂÊý¾Ýй¶


3ÔÂ16ÈÕ£¬£¬£¬Ò½ÁÆ»úеÈËÊÖÊõÊÖÒÕ¹«Ë¾Intuitive¿ËÈÕÐû²¼£¬£¬£¬Î´¾­ÊÚȨµÄ¹¥»÷Õßͨ¹ý´¹ÂÚ¹¥»÷ÇÔȡԱ¹¤Æ¾Ö¤ºó£¬£¬£¬ÀÖ³ÉÈëÇÖÆä²¿·ÖÄÚ²¿ITÓªÒµÓ¦ÓóÌÐò¡£¡£¡£¸Ã¹«Ë¾ÊÇ»úеÈ˸¨ÖúÊÖÊõƽ̨µÄÁìÏÈÖÆÔìÉÌ£¬£¬£¬Ö÷Òª²úÆ·°üÀ¨da VinciÊÖÊõϵͳºÍÓÃÓڷλî¼ìµÄIonÇ»ÄÚϵͳ¡£¡£¡£Ð¹Â¶µÄÊý¾Ý°üÀ¨²¿·Ö¿Í»§ÓªÒµºÍÁªÏµÐÅÏ¢£¬£¬£¬ÒÔ¼°IntuitiveÔ±¹¤ºÍÆóÒµÊý¾Ý¡£¡£¡£¹«Ë¾ÌåÏÖ£¬£¬£¬´Ë´ÎÍøÂçÈëÇÖ¶ÔÆä»úеÈËϵͳƽ̨»òʹÓÃÆäϵͳµÄҽԺûÓÐÔì³ÉÔËÓªÓ°Ïì¡£¡£¡£IntuitiveÇ¿µ÷£¬£¬£¬Æä»úеÈËϵͳӵÓÐ×ÔÁ¦µÄÇ徲ЭÒ飬£¬£¬Ó빫˾ÄÚ²¿ÓªÒµÍøÂçÏ໥¸ôÀë¡£¡£¡£IntuitiveÌåÏÖÒÑ¶ÔÆäÍøÂç»ù´¡ÉèÊ©¾ÙÐзֶΣ¬£¬£¬ËùÓÐÖ§³ÖÄÚ²¿ITӪҵϵͳ¡¢ÖÆÔìÔËÓªºÍÊý×Ö²úÆ·µÄ»ù´¡ÉèÊ©¾ù¼á³Ö×ÔÁ¦¡£¡£¡£ÓÉÓÚÕâÖÖÍøÂç·Ö¶Î²½·¥£¬£¬£¬¹«Ë¾µÄda Vinci¡¢IonºÍÊý×ÖÆ½Ì¨Î´ÊÜ´Ë´Îй¶ӰÏ죬£¬£¬¼ÌÐøÇå¾²ÔËÐС£¡£¡£Ò½Ôº¿Í»§ÍøÂçÓëIntuitiveÍøÂç¼á³Ö×ÔÁ¦£¬£¬£¬Óɿͻ§ITÍŶÓÖÎÀíºÍ±£»£»£»¤£¬£¬£¬Òò´ËҲδÊÜÓ°Ïì¡£¡£¡£·¢Ã÷ÈëÇֺ󣬣¬£¬IntuitiveÒѽÓÄɽôÆÈ²½·¥¿ØÖÆÐ¹Â¶²¢Õö¿ªÊӲ죬£¬£¬ÏÖÔÚÊÓ²ìÈÔÔÚ¾ÙÐÐÖС£¡£¡£


https://www.theregister.com/2026/03/16/robotics_surgical_biz_intuitive_discloses/


4. Ò½ÁƿƼ¼¾ÞÍ·StrykerÔâºÚ¿Í¹¥»÷ÖÂÊýÍò×°±¸±»²Á³ý


3ÔÂ16ÈÕ£¬£¬£¬Ò½ÁÆÊÖÒÕ¾ÞÍ·Stryker¿ËÈÕÅû¶£¬£¬£¬ÉÏÖܱ¬·¢µÄÍøÂç¹¥»÷½öÏÞÓÚÆäÄÚ²¿MicrosoftÇéÐΣ¬£¬£¬¹¥»÷ÕßÔ¶³Ì²Á³ýÁËÊýÍǫ̀Ա¹¤×°±¸¡£¡£¡£¸Ã¹«Ë¾ÖÜÈÕ¸üÐÂÌåÏÖ£¬£¬£¬ËùÓÐÒ½ÁÆ×°±¸¾ù¿ÉÇ徲ʹÓ㬣¬£¬µ«µç×Ó¶©¹ºÏµÍ³ÈÔÀëÏߣ¬£¬£¬¿Í»§Ðèͨ¹ýÏúÊÛ´ú±íÊÖ¶¯Ïµ¥¡£¡£¡£StrykerÇ¿µ÷´Ë´ÎÊÂÎñ²¢·ÇÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬ÍþвÐÐΪÕßδÔÚÆäϵͳÉϰ²ÅÅÈκζñÒâÈí¼þ¡£¡£¡£¹¥»÷ÕßHandalaºÚ¿Í×éÖ¯Éù³Æ²Á³ýÁËÁè¼Ý20Íǫ̀ϵͳ¡¢Ð§ÀÍÆ÷ºÍÒÆ¶¯×°±¸£¬£¬£¬²¢ÇÔÈ¡ÁË50TBÊý¾Ý£¬£¬£¬µ«ÊÓ²ìְԱδ·¢Ã÷Êý¾ÝÍâй¼£Ï󡣡£¡£¹¥»÷±¬·¢ºó£¬£¬£¬¶à¹úStrykerÔ±¹¤Í¶Ë߯äÍйÜ×°±¸ÔÚÒ»Ò¹Ö®¼ä±»Ô¶³Ì²Á³ý¡£¡£¡£²¿·Ö½«Ð¡ÎÒ˽¼Ò×°±¸½ÓÈë¹«Ë¾ÍøÂçµÄÔ±¹¤ÔÚ²Á³ýÀú³ÌÖÐɥʧÁËСÎÒ˽¼ÒÊý¾Ý¡£¡£¡£ÊìϤ¹¥»÷µÄÐÂÎÅÈËʿ͸¶£¬£¬£¬ÍþвÐÐΪÕßʹÓÃMicrosoftÔÆ¶Ë¶ËµãÖÎÀíЧÀÍIntuneÖеIJÁ³ýÏÂÁ£¬£¬ÔÚ3ÔÂ11ÈÕUTCʱ¼ä5:00ÖÁ8:00Ö®¼ä²Á³ýÁ˽ü8Íǫ̀װ±¸¡£¡£¡£¹¥»÷ÕßÔÚÈëÇÖÖÎÀíÔ±ÕË»§²¢½¨ÉèеÄÈ«¾ÖÖÎÀíÔ±ÕË»§ºóÖ´ÐÐÁ˴˲Ù×÷¡£¡£¡£¹«Ë¾ÕýÓëÈ«ÇòÖÆÔì»ùµØÏàÖúÓ¦¶ÔDZÔÚÔËÓªÓ°Ï죬£¬£¬Ä¿½ñÓÅÏÈÊÂÏîÊǻָ´¹©Ó¦Á´ÏµÍ³²¢»Ö¸´¿Í»§¶©µ¥ºÍÔËÊä¡£¡£¡£


https://www.bleepingcomputer.com/news/security/stryker-attack-wiped-tens-of-thousands-of-devices-no-malware-needed/


5. Microsoft Exchange Online¹ÊÕÏÖÂÓû§ÎÞ·¨»á¼ûÓÊÏä


3ÔÂ16ÈÕ£¬£¬£¬Microsoft¿ËÈÕÈ·ÈÏÆäExchange OnlineЧÀͱ¬·¢¹ÊÕÏ£¬£¬£¬µ¼Ö¿ͻ§ÎÞ·¨»á¼ûÓÊÏäºÍÈÕÀú¡£¡£¡£¸Ã¹«Ë¾ÔÚUTCʱ¼äÉÏÎç6:42ÈÏ¿ÉÎÊÌ⣬£¬£¬ÌåÏÖÕýÔÚÊӲ첿·ÖÓû§Í¨¹ýÒ»ÖÖ»ò¶àÖÖÅþÁ¬ÒªÌå»á¼ûExchange OnlineÓÊÏäʱÓöµ½µÄÎÊÌâ¡£¡£¡£Æ¾Ö¤Microsoft 365ÖÎÀíÖÐÐĸüР(EX1253275)£¬£¬£¬Outlook on the web¡¢Outlook×ÀÃæ¿Í»§¶Ë¡¢Exchange ActiveSync¼°ÆäËûExchange OnlineÅþÁ¬Ð­Òé¾ùÊܴ˹ÊÕÏÓ°Ïì¡£¡£¡£MicrosoftÌåÏÖÒ£²âÊý¾ÝÏÔʾÊÜÓ°ÏìÓû§µÄÎÊÌâÒѲ»ÔÙ±¬·¢£¬£¬£¬¹¤³Ìʦ¼ÌÐø¼à¿ØÐ§ÀÍ¿µ½¡×´Ì¬ÒÔÆÀ¹ÀÊÇ·ñÐèÒª½ÓÄÉÌØÊâ²½·¥È·±£Ò»Á¬»Ö¸´£¬£¬£¬µ«¿Í»§ÈÔ±¨¸æÎÞ·¨»á¼ûµç×ÓÓʼþ¡£¡£¡£¹ÊÕϱ¬·¢Ç°£¬£¬£¬Office.comÃÅ»§ÍøÕ¾ÔøÏÔʾ"Ç¸ØÆ£¬£¬£¬·ºÆðÎÊÌ⣬£¬£¬ÇëʵÑéË¢ÐÂÒ³Ãæ"µÄ¹ýʧÐÅÏ¢¡£¡£¡£Microsoft»¹ÔÚÊÓ²ìÁíÒ»×ÔÁ¦¹ÊÕÏ£¬£¬£¬¸Ã¹ÊÕÏÓ°ÏìMicrosoft 365 CopilotÍøÒ³µÇÂ¼Ò³Ãæ¼°office.com/chat¡¢m365.cloud.microsoft¡¢m365.cloud.microsoft/chatºÍcopilot.cloud.microsoftµÈCopilotÍøÒ³¿Í»§¶Ë¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-exchange-online-outage-blocks-access-to-mailboxes/


6. AWS Bedrock´úÂëÚ¹ÊÍÆ÷Îó²î¿ÉÖÂÃô¸ÐÊý¾Ýй¶


3ÔÂ16ÈÕ£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷Amazon Web Services(AWS) ¹¤¾ßÖб£´æÒ»¸öÎó²î£¬£¬£¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÇÔÈ¡¹«Ë¾Ãô¸ÐÊý¾Ý¡£¡£¡£BeyondTrustÆìÏÂPhantom LabsµÄÑо¿Ö°Ô±½«ÊÓ²ìÖØµã·ÅÔÚAWS Bedrock AgentCore Code InterpreterÉÏ¡£¡£¡£AWS BedrockÊÇÓÃÓÚ¹¹½¨AIÓ¦ÓóÌÐòµÄƽ̨£¬£¬£¬¶øAgentCore Code InterpreterÔÊÐí̸Ìì»úеÈ˱àдºÍÔËÐдúÂëÒÔÖ´ÐÐÊý¾ÝÆÊÎöºÍÅÌËãµÈʹÃü¡£¡£¡£Îª±£»£»£»¤ÏµÍ³Çå¾²£¬£¬£¬AWSʹÓÃSandboxģʽ×÷ΪÊý×Ö¸ôÀëÊÒ£¬£¬£¬×èÖ¹AI´úÂëÓëÍⲿÌìÏÂͨѶ¡£¡£¡£È»¶ø£¬£¬£¬Ê×ϯÑо¿Ô±Kinnaird McQuade·¢Ã÷£¬£¬£¬Ö»¹ÜɳºÐ×èÖ¹Á˴󲿷ÖÁ÷Á¿£¬£¬£¬µ«ÈÔÔÊÐíDNSÅÌÎÊ£¬£¬£¬ÌØÊâÊÇAºÍAAAA¼Í¼¡£¡£¡£Ñо¿Ö°Ô±Ö¤Êµ£¬£¬£¬¹¥»÷Õ߿ɽ«ÇÔÈ¡µÄÊý¾Ý»òÉñÃØÏÂÁîÒþ²ØÔÚÕâЩDNSÇëÇóÖС£¡£¡£ÍŶӹ¹½¨ÁËÒ»¸öϵͳ£¬£¬£¬Í¨¹ýÕâЩÅÌÎÊÔËÐÐÊý¾Ý£¬£¬£¬Óë±»¸ôÀëµÄAI¾ÙÐÐʵʱ˫ÏòͨѶ£¬£¬£¬ÓÐÓÃÈÆ¹ýÁËAWSÔÊÐíµÄÇå¾²¸ôÀë¡£¡£¡£AWS½¨ÒéÇл»ÖÁVPCģʽÒÔ»ñµÃ¸üºÃ¿ØÖÆ£¬£¬£¬²¢È·±£AI¹¤¾ß½öÓµÓÐ×îµÍÐëҪȨÏÞ¡£¡£¡£


https://hackread.com/data-leak-risk-in-aws-bedrock-ai-code-interpreter/