ºÉÀ¼²ÆÎñ²¿ÔâÍøÂç¹¥»÷²¿·ÖÔ±¹¤Êý¾Ýй¶
Ðû²¼Ê±¼ä 2026-03-261. ºÉÀ¼²ÆÎñ²¿ÔâÍøÂç¹¥»÷²¿·ÖÔ±¹¤Êý¾Ýй¶
3ÔÂ24ÈÕ£¬£¬£¬£¬ºÉÀ¼²ÆÎñ²¿¿ËÈÕÅû¶£¬£¬£¬£¬ÔÚ3ÔÂ19ÈÕ¼ì²âµ½ÍøÂç¹¥»÷ºó£¬£¬£¬£¬²¿·ÖÔ±¹¤µÄÄÚ²¿ÏµÍ³±»¹¥ÏÝ£¬£¬£¬£¬Êý¾Ýй¶ÊÂÎñÕýÔÚÊÓ²ìÖС£¡£¡£¡£¸Ã²¿ÔÚµÚÈý·½¾¯±¨ºó·¢Ã÷ÁËδ¾ÊÚȨ»á¼ûÆäÕþ²ß²¿·Ö¶à¸öÖ÷ÒªÀú³ÌϵͳµÄÐÐΪ¡£¡£¡£¡£ºÉÀ¼²ÆÎñ²¿ÔÚÉùÃ÷ÖÐÌåÏÖ£º"²ÆÎñ²¿ICTÇå¾²²¿·ÖÓÚ3ÔÂ19ÈÕÐÇÆÚËļì²âµ½¶ÔÕþ²ß²¿·Ö¶à¸öÖ÷ÒªÀú³ÌϵͳµÄδ¾ÊÚȨ»á¼û¡£¡£¡£¡£¾¯±¨·¢³öºóÁ¬Ã¦Æô¶¯ÊӲ죬£¬£¬£¬×Ô½ñÈÕÆðÒÑ×èÖ¹¶ÔÕâЩϵͳµÄ»á¼û¡£¡£¡£¡£ÕâÓ°ÏìÁ˲¿·ÖÔ±¹¤µÄÊÂÇé¡£¡£¡£¡£"×÷ΪÏìÓ¦£¬£¬£¬£¬²ÆÎñ²¿Á¬Ã¦Æô¶¯ÊӲ죬£¬£¬£¬²¢×èÖ¹Á˶ÔÊÜÓ°ÏìϵͳµÄ»á¼û¡£¡£¡£¡£¹«Ë¾Ö¸³ö£¬£¬£¬£¬Ë°ÎñºÍº£¹ØÖÎÀí¾Ö¡¢º£¹ØºÍ¸£Àû¾ÖÏò¹«ÃñºÍÆóÒµÌṩµÄЧÀÍδÊÜÓ°Ïì¡£¡£¡£¡£ºÉÀ¼²ÆÎñ²¿Î´Åû¶¹¥»÷µÄÊÖÒÕϸ½Ú£¬£¬£¬£¬ÏÖÔÚÉÐÎÞÍøÂç·¸·¨×éÖ¯Éù³Æ¶Ô´ËÈÏÕæ¡£¡£¡£¡£ÊÓ²ìÈÔÔÚ¼ÌÐø£¬£¬£¬£¬ÊÂÎñµÄÍêÕûÓ°ÏìÉÐδȷ¶¨¡£¡£¡£¡£
https://securityaffairs.com/189929/data-breach/data-breach-at-dutch-ministry-of-finance-impacts-staff-following-cyberattack.html
2. TeamPCP¹¥ÏÝLiteLLM Python°üÇÔÈ¡50Íò×°±¸Êý¾Ý
3ÔÂ24ÈÕ£¬£¬£¬£¬TeamPCPºÚ¿Í×éÖ¯¿ËÈÕ¹¥ÏÝÁËÊ¢ÐеÄPython°üLiteLLM£¬£¬£¬£¬ÔÚPyPIÉÏÐû²¼¶ñÒâ°æ±¾1.82.7ºÍ1.82.8£¬£¬£¬£¬°²ÅÅÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¡£¡£¡£LiteLLMÊÇ¿ªÔ´Python¿â£¬£¬£¬£¬×÷ΪͨÍù¶à¸ö´óÐÍÓïÑÔÄ£×ÓÌṩÉ̵ÄÍø¹Ø£¬£¬£¬£¬ÖðÈÕÏÂÔØÁ¿Áè¼Ý340Íò´Î£¬£¬£¬£¬ÒÑÍùÒ»¸öÔÂÏÂÔØÁ¿Áè¼Ý9500Íò´Î¡£¡£¡£¡£Endor LabsÑо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬ÍþвÐÐΪÕß¹¥ÏÝÁ˸ÃÏîÄ¿£¬£¬£¬£¬Ðû²¼µÄ¶ñÒâ°æ±¾°üÀ¨Òþ²ØÓÐÓÃÔØºÉ£¬£¬£¬£¬ÔÚµ¼Èë°üʱִÐС£¡£¡£¡£¶ñÒâ´úÂë×¢Èëµ½litellm/proxy/proxy_server.pyÎļþÖУ¬£¬£¬£¬×÷Ϊbase64±àÂëµÄÓÐÓÃÔØºÉ£¬£¬£¬£¬Ã¿´Îµ¼ÈëÄ£¿£¿£¿£¿£¿£¿éʱ½âÂë²¢Ö´ÐС£¡£¡£¡£°æ±¾1.82.8ÒýÈëÁ˸ü¼¤½øµÄ¹¦Ð§£¬£¬£¬£¬½«ÃûΪlitellm_init.pthµÄÎļþ×°Öõ½PythonÇéÐΡ£¡£¡£¡£ÓÉÓÚPythonÔÚÚ¹ÊÍÆ÷Æô¶¯Ê±×Ô¶¯´¦Öóͷ£ËùÓÐ.pthÎļþ£¬£¬£¬£¬¶ñÒâ´úÂë»áÔÚÔËÐÐPythonʱִÐУ¬£¬£¬£¬×ÝȻδspecificallyʹÓÃLiteLLM¡£¡£¡£¡£Ö´Ðк󣬣¬£¬£¬ÓÐÓÃÔØºÉ×îÖÕ°²Åźڿ͵ÄTeamPCP Cloud Stealer±äÌåºÍ³¤ÆÚ»¯¾ç±¾¡£¡£¡£¡£Ò»µ©´¥·¢£¬£¬£¬£¬ÓÐÓÃÔØºÉÔËÐÐÈý½×¶Î¹¥»÷£ºÍøÂçÆ¾Ö¤£¬£¬£¬£¬ÊµÑé¿çKubernetes¼¯ÈººáÏòÒÆ¶¯£¬£¬£¬£¬ÔÚÿ¸ö½Úµã°²ÅÅÌØÈ¨pod£¬£¬£¬£¬²¢×°Öó¤ÆÚ»¯systemdºóÃÅÂÖÑ¯ÌØÊâ¶þ½øÖÆÎļþ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/popular-litellm-pypi-package-compromised-in-teampcp-supply-chain-attack/
3. CISA½«Langflow´úÂë×¢ÈëÎó²î¼ÓÈëKEVĿ¼
3ÔÂ25ÈÕ£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö(CISA)¿ËÈÕ½«Ò»¸öÐÂÎó²îÌí¼Óµ½ÆäÒÑÖª±»Ê¹ÓÃÎó²î(KEV)Ŀ¼ÖУ¬£¬£¬£¬»ùÓÚ»îԾʹÓõÄÖ¤¾Ý¡£¡£¡£¡£¸ÃÎó²îΪCVE-2026-33017Langflow´úÂë×¢ÈëÎó²î¡£¡£¡£¡£LangflowÊÇÊ¢ÐеĿÉÊÓ»¯¹¹½¨´óÐÍÓïÑÔÄ£×ÓÓ¦ÓõĿªÔ´Æ½Ì¨¡£¡£¡£¡£´úÂë×¢ÈëÎó²îÔÊÐí¹¥»÷ÕßÔÚÄ¿µÄϵͳÉÏÖ´ÐÐí§Òâ´úÂ룬£¬£¬£¬¿ÉÄܵ¼ÖÂÍêȫϵͳ¹¥ÏÝ¡¢Êý¾ÝÇÔÈ¡ºÍºáÏòÒÆ¶¯¡£¡£¡£¡£´ËÀàÎó²îÊǶñÒâÍøÂçÐÐΪÕߵįµÈÔ¹¥»÷ÔØÌ壬£¬£¬£¬´ºÁª°îÆóÒµ×é³ÉÖØ´óΣº¦¡£¡£¡£¡£CISAµÄ°ó¶¨²Ù×÷Ö¸Áî(BOD)22-01½¨ÉèÁËKEVĿ¼£¬£¬£¬£¬×÷ΪÒÑ֪ͨÓÃÎó²îºÍ̻¶(CVE)µÄʵʱÁÐ±í£¬£¬£¬£¬ÕâЩÎó²î´ºÁª°îÆóÒµ×é³ÉÖØ´óΣº¦¡£¡£¡£¡£BOD22-01ÒªÇóÁª°îÃñÊÂÐÐÕþ·ÖÖ§(FCEB)»ú¹¹ÔÚ×èÖ¹ÈÕÆÚǰÐÞ¸´ÒÑʶ±ðµÄÎó²î£¬£¬£¬£¬ÒÔ±£»£»£»¤FCEBÍøÂçÃâÊÜ»îÔ¾Íþв¡£¡£¡£¡£Ö»¹ÜBOD22-01½öÊÊÓÃÓÚFCEB»ú¹¹£¬£¬£¬£¬µ«CISAÇ¿ÁÒ½¨ÒéËùÓÐ×é֯ͨ¹ýÓÅÏÈʵʱÐÞ¸´KEVĿ¼Îó²î×÷ΪÎó²îÖÎÀíʵ¼ùµÄÒ»²¿·Ö£¬£¬£¬£¬ïÔÌÍøÂç¹¥»÷Ì»Â¶Ãæ¡£¡£¡£¡£
https://www.cisa.gov/news-events/alerts/2026/03/25/cisa-adds-one-known-exploited-vulnerability-catalog
4. Torg Grabber¶ñÒâÈí¼þÕë¶Ô850¿îä¯ÀÀÆ÷À©Õ¹ÇÔÈ¡Êý¾Ý
3ÔÂ25ÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾GenDigital¿ËÈÕ·¢Ã÷ÃûΪTorgGrabberµÄÐÂÐÍÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ£¬£¬£¬£¬¸ÃÈí¼þ´Ó850¸öä¯ÀÀÆ÷À©Õ¹ÇÔÈ¡Ãô¸ÐÊý¾Ý£¬£¬£¬£¬ÆäÖÐÁè¼Ý700¸öΪ¼ÓÃÜÇ®±ÒÇ®°üÀ©Õ¹¡£¡£¡£¡£³õʼ»á¼ûͨ¹ýClickFixÊÖÒÕ»ñµÃ£¬£¬£¬£¬Ð®ÖƼôÌù°å²¢ÓÕÆÓû§Ö´ÐжñÒâPowerShellÏÂÁî¡£¡£¡£¡£GenDigitalÑо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬TorgGrabberÕýÔÚÆð¾¢¿ª·¢ÖУ¬£¬£¬£¬Èý¸öÔÂÄÚ±àÒëÁË334¸öΨһÑù±¾£¬£¬£¬£¬Ã¿ÖÜ×¢²áеÄÏÂÁî¿ØÖÆ£¨C2£©Ð§ÀÍÆ÷¡£¡£¡£¡£³ý¼ÓÃÜÇ®±ÒÇ®°üÍ⣬£¬£¬£¬TorgGrabber»¹´Ó103¸öÃÜÂëÖÎÀíÆ÷ºÍË«ÒòËØÉí·ÝÑéÖ¤¹¤¾ßÒÔ¼°19¸öÌõ¼ÇÓ¦ÓÃÇÔÈ¡Êý¾Ý¡£¡£¡£¡£TorgGrabberµÄ³õʼ°æ±¾Ê¹ÓûùÓÚTelegramµÄÐÒ飬£¬£¬£¬È»ºóʹÓÃ×Ô½ç˵¼ÓÃÜTCPÐÒé¾ÙÐÐÊý¾ÝÍâй¡£¡£¡£¡£2025Äê12ÔÂ18ÈÕ£¬£¬£¬£¬ÕâÁ½ÖÖ»úÖÆ±»·ÅÆú£¬£¬£¬£¬×ª¶øÊ¹ÓÃͨ¹ýCloudflare»ù´¡Éèʩ·ÓɵÄHTTPSÅþÁ¬¡£¡£¡£¡£¸ÃÒªÁìÖ§³Ö·Ö¿éÊý¾ÝÉÏ´«ºÍÓÐÓÃÔØºÉת´ï¡£¡£¡£¡£¶ñÒâÈí¼þ¾ßÓжàÖÖ·´ÆÊÎö»úÖÆ¡¢¶à²ã»ìÏý£¬£¬£¬£¬²¢Ê¹ÓÃÖ±½ÓϵͳŲÓúͷ´Éä¼ÓÔØ¾ÙÐйæ±Ü£¬£¬£¬£¬ÍêÈ«ÔÚÄÚ´æÖÐÔËÐÐ×îÖÕÓÐÓÃÔØºÉ¡£¡£¡£¡£¶ñÒâÈí¼þ»¹¿ÉÆÊÎöÖ÷»ú¡¢½¨ÉèÓ²¼þÖ¸ÎÆ¡¢¼Í¼ÒÑ×°ÖÃÈí¼þ¡¢½ØÈ¡Óû§×ÀÃæ½ØÍ¼£¬£¬£¬£¬²¢´Ó×ÀÃæºÍÎĵµÎļþ¼ÐÇÔÈ¡Îļþ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/new-torg-grabber-infostealer-malware-targets-728-crypto-wallets/
5. CitrixÐÞ¸´NetScalerÀàËÆCitrixBleedµÄ¸ßΣÎó²î
3ÔÂ25ÈÕ£¬£¬£¬£¬Citrix¿ËÈÕÐÞ¸´ÁËÓ°ÏìNetScalerADCÍøÂç×°±¸ºÍNetScalerGatewayÇå¾²Ô¶³Ì»á¿´·¨¾ö¼Æ»®µÄÁ½¸öÎó²î£¬£¬£¬£¬ÆäÖÐÒ»¸öÓë½üÄêÀ´ÔÚÁãÈÕ¹¥»÷Öб»Ê¹ÓõÄCitrixBleedºÍCitrixBleed2ȱÏݺÜÊÇÏàËÆ¡£¡£¡£¡£¸ÃÒªº¦Çå¾²Îó²î£¨×·×ÙΪCVE-2026-3055£©Ô´ÓÚÊäÈëÑé֤ȱ·¦£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÉèÖÃΪSAMLÉí·ÝÌṩÉÌ£¨IDP£©µÄCitrixADC»òCitrixGateway×°±¸±¬·¢ÄÚ´æÌ«¹ý¶ÁÈ¡£¡£¡£¡£¬£¬£¬£¬Ê¹ÎÞÌØÈ¨µÄÔ¶³Ì¹¥»÷ÕßÄܹ»ÇÔÈ¡»á»°ÁîÅÆµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¹«Ë¾»¹·ÖÏíÁËʶ±ðºÍÐÞ¸´Ò×ÊÜCVE-2026-3055¹¥»÷µÄNetScalerʵÀýµÄÏêϸָÄÏ¡£¡£¡£¡£¹«Ë¾»¹ÐÞ¸´ÁËÓ°ÏìÉèÖÃÎªÍø¹Ø£¨SSLVPN¡¢ICAProxy¡¢CVPN¡¢RDPproxy£©»òAAAÐéÄâЧÀÍÆ÷µÄ×°±¸µÄCVE-2026-4368Îó²î£¬£¬£¬£¬¸ÃÎó²î¿ÉʹĿµÄϵͳÉϾßÓеÍÌØÈ¨µÄÍþвÐÐΪÕßʹÓþºÕùÌõ¼þ¾ÙÐеÍÖØÆ¯ºó¹¥»÷£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÓû§»á»°»ìÏý¡£¡£¡£¡£ÍøÂçÇå¾²×éÖ¯ShadowserverÏÖÔÚ×·×Ùµ½Áè¼Ý3Íò¸öNetScalerADCʵÀýºÍ2,300¶à¸öGatewayʵÀýÔÚÏß̻¶¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúÆäÖÐÓм¸¶àʹÓÃÒ×Êܹ¥»÷µÄÉèÖûòÒÑÕë¶Ô¹¥»÷¾ÙÐÐÐÞ¸´¡£¡£¡£¡£¶à¼ÒÍøÂçÇå¾²¹«Ë¾Ö¸³ö£¬£¬£¬£¬CVE-2026-3055Óë2023Äê±»ÆÕ±éʹÓõÄCitrixBleedÎó²îºÍ2025ÄêÅû¶µÄCitrixBleed2±äÌå±£´æÏÔ×ÅÏàËÆÐÔ¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/citrix-urges-admins-to-patch-netscaler-flaws-as-soon-as-possible/
6. TP-LinkÐÞ¸´Archer NXϵÁзÓÉÆ÷¶à¸ö¸ßΣÎó²î
3ÔÂ25ÈÕ£¬£¬£¬£¬TP-Link¿ËÈÕÐÞ¸´ÁËÆäArcherNXϵÁзÓÉÆ÷ÖеĶà¸öÎó²î£¬£¬£¬£¬°üÀ¨Ò»¸öÑÏÖØ¼¶±ðµÄȱÏÝ£¬£¬£¬£¬¿ÉÄÜÔÊÐí¹¥»÷ÕßÈÆ¹ýÉí·ÝÑéÖ¤²¢ÉÏ´«Ð¹̼þ¡£¡£¡£¡£×·×ÙΪCVE-2025-15517µÄÇå¾²Îó²îÓ°ÏìArcherNX200¡¢NX210¡¢NX500ºÍNX600ÎÞÏß·ÓÉÆ÷£¬£¬£¬£¬Ô´ÓÚȱʧÉí·ÝÑéÖ¤Èõµã£¬£¬£¬£¬¹¥»÷Õß¿ÉÔÚÎÞÌØÈ¨ÇéÐÎÏÂʹÓᣡ£¡£¡£TP-Link»¹ÒƳýÁËÉèÖûúÖÆÖеÄÓ²±àÂë¼ÓÃÜÃÜÔ¿£¨CVE-2025-15605£©£¬£¬£¬£¬¸ÃÃÜÔ¿ÔÊÐí¾ÓÉÉí·ÝÑéÖ¤µÄ¹¥»÷Õß½âÃÜÉèÖÃÎļþ¡¢Ð޸IJ¢ÖØÐÈÎÃüÜ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬¹«Ë¾ÐÞ¸´ÁËÁ½¸öÏÂÁî×¢ÈëÎó²î£¨CVE-2025-15518ºÍCVE-2025-15519£©£¬£¬£¬£¬ÕâЩÎó²îʹ¾ßÓÐÖÎÀíÔ±ÌØÈ¨µÄÍþвÐÐΪÕßÄܹ»Ö´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¹«Ë¾Ç¿ÁÒ½¨Òé¿Í»§ÏÂÔØ²¢×°ÖÃ×îй̼þ°æ±¾ÒÔ×èֹʹÓÃÕâЩÎó²îµÄDZÔÚ¹¥»÷¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/tp-link-warns-users-to-patch-critical-router-auth-bypass-flaw/


¾©¹«Íø°²±¸11010802024551ºÅ