CISAÖÒ¸æBroadcom VMware vCenter·ì϶ÔâÀûÓÃ

°ä²¼¹¦·ò 2026-01-27

1. CISAÖÒ¸æBroadcom VMware vCenter·ì϶ÔâÀûÓÃ


1ÔÂ24ÈÕ £¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©½üÈÕ½«Broadcom VMware vCenter ServerµÄÑϳÁ·ì϶CVE-2024-37079£¨CVSSÆÀ·Ö9.8£©ÄÉÈëÒÑÖªÀûÓ÷ì϶£¨KEV£©Ä¿Â¼¡£¸Ã·ì϶ԴÓÚvCenter Server¶ÔDCERPCºÍ̸ʵÏֵĶÑÒç³öȱµã £¬¹¥»÷Õßͨ¹ýÍøÂç½Ó¼û¼´¿É·¢ËÍÌØÔìÊý¾Ý°ü´¥·¢·ì϶ £¬ÊµÏÖÔ¶³Ì´úÂëÖ´ÐлòȨÏÞÌáÉý¡£vCenter ServerÊÇVMware¿ª·¢µÄÐé¹¹»¯»·¾³¼¯ÖÐÖÎÀíÆ½Ì¨¡£2024Äê6Ô £¬VMware½¨¸´ÁËCVE-2024-37079¼°¹ØÁª·ì϶CVE-2024-37080 £¬¶þÕß¾ù±»ÆÀ¹ÀΪ¡°ÑϳÁ¡±¼¶±ð¡£²©Í¨¹«Ë¾ËæºóÈ·ÈÏ £¬CVE-2024-37079ÒÑÔâÏÖʵÀûÓà £¬µ«¾ßÌå¹¥»÷ϸ½ÚÉÐδ¹«¿ª¡£ÔÚ2025ÄêÑÇÖÞºÚñ´ó»áÉÏ £¬×êÑÐÈËÔ±Åû¶CVE-2024-37079ʵΪËĸöDCE/RPC·ì϶Á´µÄÒ»²¿ÃÅ £¬Ô̺¬Èý¸ö¶ÑÒç¶Âí½ÅºÍÒ»¸öȨÏÞÌáÉý·ì϶¡£ÆäÖÐÁ½¸öÓйطì϶ÒÑÓÚ2024Äê9Ô½¨¸´ £¬¶øÌض¨¶ÑÒç¶Âí½Å¿ÉÓëCVE-2024-38813½áºÏ £¬ÔÚESXiÖ÷»úÉÏ»ñȡԶ³ÌrootȨÏÞ¡£×êÑÐÈËԱǿµ÷ £¬Í¨¹ý×éºÏÀûÓÃÕâЩ·ì϶ £¬ËûÃdzɹ¦ÔÚ2024ÄêMatrix Cup·ì϶ÌôÕ½ÈüÖÐʵÏÖδ¾­ÊÚȨµÄÔ¶³Ìroot½Ó¼û¡£


https://securityaffairs.com/187267/security/u-s-cisa-adds-a-flaw-in-broadcom-vmware-vcenter-server-to-its-known-exploited-vulnerabilities-catalog.html


2. 11Äê佨¸´µÄGNU Telnetd¸ßΣ·ì϶ÔâЭͬ¹¥»÷


1ÔÂ23ÈÕ £¬½üÈÕ £¬Ò»¸ö´æÔÚ³¤´ï11ÄêµÄGNU InetUtils telnetd·þÎñÆ÷ÑϳÁ·ì϶£¨CVE-2026-24061£©±»ÆØÔâЭͬ¹¥»÷¡£¸Ã·ì϶ԴÓÚtelnetdδËãÕÊÓû§½ÚÔìµÄUSER»·¾³±äÁ¿ £¬¹¥»÷Õß¿ÉÉèÖÃUSER=-f root²¢Í¨¹ýtelnet -aºÅÁîÏνÓ £¬Ö±½ÓÈÆ¹ýÉí·ÝÑéÖ¤»ñÈ¡rootȨÏÞ¡£·ì϶ӰÏì2015Äê°ä²¼µÄ1.9.3ÖÁ2.7°æ±¾ £¬2.8°æ±¾Òѽ¨¸´ £¬ÎÞ·¨Éý¼¶µÄÓû§¿Éͨ¹ý½ûÓ÷þÎñ»ò¹Ø±ÕTCP 23¶Ë¿Ú»º½â¡£GNU InetUtilsÊÇGNUÏîÄ¿ÊØ»¤µÄ¾­µäÍøÂ繤¾ß¼¯ £¬Ô̺¬telnet/ftpµÈ¿Í»§¶ËºÍ·þÎñÆ÷ £¬¿í·ºÀûÓÃÓÚLinux¿¯Ðаæ¡£Ö»¹ÜTelnetÒò°²È«ÐԲSSHÈ¡´ú £¬µ«ÔÚ¹¤ÒµÎïÁªÍø¡¢ÉãÏñÍ·¡¢´«¸ÐÆ÷¼°OTÍøÂçÖÐÈÔÆÕ±é´æÔÚ £¬ÕâЩÉ豸³£Òò¼æÈÝÐÔ»òÉý¼¶Ðè³ÁÆô¶ø³Ö¾ÃÔËÐоɰæÏµÍ³¡£Zerotak¹«Ë¾Ö¸³ö £¬OT/ICS»·¾³Öйؼüϵͳ´úÌæÄÑÌâ £¬ÒÅÁôÉ豸µ¼ÖÂTelnetÄÑÒÔÆëÈ«²Ã¼õ¡£Íþв¼à¿Ø¹«Ë¾GreyNoise¼ì²âµ½Õë¶Ô¸Ã·ì϶µÄ¹¥»÷»î¶¯£º1ÔÂ21-22ÈÕ £¬18¸ö¹¥»÷IPͨ¹ý60´ÎTelnet»á»°ÌáÒé100%¶ñÒâ¹¥»÷ £¬·¢ËÍ1525¸öÊý¾Ý°ü£¨×ܼÆ101.6KB£©¡£¹¥»÷ÀûÓÃTelnet IACÑ¡ÏîЭÉÌ»úÔì×¢Èë"USER=-f "²ÎÊý £¬83.3%µÄÖ¸±êÊÇrootÓû§¡£


https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-telnetd-auth-bypass-flaw-to-get-root/


3. StanleyÐÂÐÍMaaSͨ¹ýChromeÉ̵ê·Ö·¢´¹µöÀ©´ó


1ÔÂ26ÈÕ £¬Ò»ÖÖÃûΪ"Stanley"µÄÐÂÐͶñÒâÈí¼þ¼´·þÎñ£¨MaaS£©½üÈÕÒý·¢°²È«½ç¹Ø×¢ £¬¸Ã·þÎñͨ¹ýChromeÍøÉÏÀûÓÃÉ̵ê·Ö·¢¶ñÒâÀ©´ó·¨Ê½Ö´ÐÐÍøÂç´¹µö¹¥»÷¡£¾Ý¶Ëµ½¶ËÊý¾Ý°²È«¹«Ë¾Varonis×êÑÐ £¬StanleyÓÉ»¯ÃûÒ»ÑùµÄÂô¼Ò¿ª·¢ £¬ÆäÖ÷ÌâÖ°ÄÜÊÇÔÚÓû§ä¯ÀÀÆ÷Öи²¸ÇÈ«ÆÁiframeÏÔʾ´¹µöÄÚÈÝ £¬Í¬Ê±Î¬³ÖµØÖ·À¸ÏÔʾºÏ·¨ÓòÃûÒÔ¼ÓÇ¿ºýŪÐÔ¡£¸ÃMaaS·þÎñÖ§³ÖChrome¡¢EdgeºÍBraveä¯ÀÀÆ÷¾²Ä¬×Ô¶¯×°Öà £¬²¢Ìṩ¶¨Ô컯ְÄÜ¡£Æä¶©ÔÄģʽÔ̺¬¶à¸ö²ã¼¶ £¬µÚÒ»Á÷µÄ"LuxeÌײÍ"½¨ÉèWeb½ÚÔìÃæ°å £¬Ö§³Ö½«¶ñÒâÀ©´óÖ±½Ó°ä²¼ÖÁChromeÀûÓÃÉ̵ê¡£StanleyµÄ¹¥»÷»úÔìͨ¹ýÀ¹½ØÒ³Ãæµ¼º½²¢ÓÃiframe¸²¸ÇÍøÒ³ÊµÏÖ £¬²Ù×÷ÈËÔ±¿Éͨ¹ý½ÚÔìÃæ°åʵʱÆôÓÃ/½ûÓýٳֹ涨 £¬ÉõÖÁÖ±½ÓÏòÊܺ¦Õßä¯ÀÀÆ÷ÍÆËÍ֪ͨÓÕµ¼½Ó¼ûÌØ¶¨Ò³Ãæ¡£¼¼Êõ²ãÃæ £¬Stanleyÿ10ÃëÖ´ÐÐC2ÂÖѯ²¢Ö§³Ö±¸·ÝÓòÂÖ»»ÒÔ¼ÓÇ¿¿¹¹Ø±ÕÄÜÁ¦¡£Æä´úÂë´æÔÚ¶íÓï×¢½â¡¢¿Õcatch¿éºÍ²»¹æ·¼ûýÎó´¦ÖõÈÎÊÌâ £¬±»ÆÀ¼ÛΪ"¼¼Êõ´Ö²Ú"¡£µ«ÕæÕýʹÆäÍÑÓ±¶ø³öµÄÊÇÆä¹ÖÒìµÄ·Ö·¢Õ½Êõ £¬ÀûÓÃChromeÀûÓÃÉ̵ê×÷Ϊ¿ÉÐÅÆ½Ì¨ÈƹýͨÀýÉóºËÁ÷³Ì¡£


https://www.bleepingcomputer.com/news/security/new-malware-service-guarantees-phishing-extensions-on-chrome-web-store/


4. αÔìCAPTCHAÓëApp-V¾ç±¾´«²¼AmateraÇÔÃÜ·¨Ê½


1ÔÂ26ÈÕ £¬Ò»Ïî½áºÏClickFix²½Ö衢αÔìCAPTCHA¼°ÒÑÊðÃûMicrosoft App-V¾ç±¾µÄÐÂÐͶñÒâ¹¥»÷Õý´«²¼AmateraÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¾ÝBlackPoint Cyber×êÑÐ £¬¹¥»÷ʼÓÚαÔìµÄCAPTCHAÑéÖ¤ £¬ÓÕµ¼Êܺ¦Õßͨ¹ýWindowsÔËÐжԻ°¿òÖ´ÐжñÒâºÅÁî¡£ÕâЩºÅÁîÀÄÓúϷ¨µÄSyncAppvPublishingServer.vbs¾ç±¾ £¬Í¨¹ýÊÜÐÅÀµµÄwscript.exeÖ´ÐÐPowerShell´úÂë £¬ÊµÏÖ¶ñÒâ»î¶¯Òñ±Î»¯¡£¸Ã¹¥»÷³õ´ÎÔÚClickFix³¡¾°Öм¯³ÉApp-V¾ç±¾¡£¹¥»÷Á÷³ÌÔ̺¬¶à½×¶ÎÑéÖ¤£º³õʼºÅÁî»á²é³­ÊÇ·ñÊÖ¶¯Ö´ÐÓ×¢Ö´Ðа¤´ÎÊÇ·ñºÏ¹æ¼°¼ôÌù°åÄÚÈÝÊÇ·ñ±»´Û¸Ä £¬ÒÔ¶ã±ÜɳÏä¼ì²â¡£Èô·¢ÏÖ·ÖÎö»·¾³ £¬Ö´Ðн«ÎÞÆÚÏÞÔÝÍ£ÒÔ¿÷Ëð×Ô¶¯»¯·ÖÎö×ÊÔ´¡£Âú×ãǰÌáºó £¬¶ñÒâÈí¼þ´ÓGoogleÈÕÀúÎļþÖмìË÷base64±àÂëµÄÅäÖÃÊý¾Ý £¬Í¨¹ýWMI¿ò¼ÜÌìÉú°µ²ØµÄ32λPowerShell¹ý³Ì £¬½«Ç¶Ì×ÓÐÐ§ÔØºÉ½âÃܲ¢¼ÓÔØÖÁÄÚ´æ¡£ºóÐø½×¶ÎѡȡÒþдÊõ£º¼ÓÃܵÄPowerShellÓÐÐ§ÔØºÉǶÈ빫¹²CDNÍйܵÄPNGͼÏñ £¬Í¨¹ýWinINet API¶¯Ì¬ÌáÈ¡ £¬¾­LSBÒþдÊõ½âÎö¡¢GZip½âѹºóÄÚ´æÖ´ÐС£×îÖս׶νâÃܲ¢Æô¶¯Ô­Éúshellcode £¬Ó³ÉäÖ´ÐÐAmateraÇÔÃÜ·¨Ê½¡£


https://www.bleepingcomputer.com/news/security/new-clickfix-attacks-abuse-windows-app-v-scripts-to-push-malware/


5. ¶à¶ûÂí¿¨°ÍÃŽûϵͳ·ì϶»òÖÂÔ¶³Ì¿ªÃÅ


1ÔÂ26ÈÕ £¬½üÈÕ £¬¶à¶ûÂí¿¨°Í£¨Dormakaba£©ÎïÀíÃŽûϵͳ±»ÆØ´æÔÚÑϳÁ°²È«·ì϶ £¬¿ÉÄÜʹºÚ¿ÍÔ¶³Ì´ò¿ª´óÐÍ»ú¹¹´óÃÅ¡£¸Ã·ì϶ÓÉAtosÆìÏÂEviden¹«Ë¾µÄÍøÂ簲ȫÕ÷ѯ¹«Ë¾SEC Consultר¼Ò·¢ÏÖ £¬Ó°ÏìÁìÓòº­¸ÇDormakabaµÄExosÖÐÑëÖÎÀíÈí¼þ¡¢Ó²¼þ½Ó¼ûÖÎÀíÆ÷¼°Ö§³Ö¼üÅÌ¡¢Ö¸ÎÆ¡¢Ð¾Æ¬¿¨½Ó¼ûµÄ×¢²áµ¥ÔªµÈÖ÷Ìâ²úÆ·¡£×êÑÐÍŶӹ²·¢ÏÖ20Óà¸ö·ì϶ÀàÐÍ £¬Ô̺¬Ó²±àÂëÍ´´¦Óë¼ÓÃÜÃÜÔ¿¡¢ÈõÃÜÂë¡¢Éí·ÝÑé֤ȱʧ¡¢²»°²È«ÃÜÂëÌìÉú¡¢±¾µØÈ¨ÏÞÌáÉý¡¢Êý¾Ýй¶¡¢õè¾¶±éÀú¼°ºÅÁî×¢ÈëµÈ¡£ÕâЩ·ìÏ¶ÖØÒª±»Å·ÖÞ´óÐÍÆóҵʹÓà £¬Éæ¼°¹¤Òµ¹«Ë¾¡¢ÄÜÔ´¹©¸øÉÌ¡¢ÎïÁ÷ÆóÒµ¼°»ú³¡ÔËÓªÉ̵ȸ߰²È«ÐèÒª³¡¾°¡£SEC ConsultÖ¸³ö £¬¹¥»÷ÕßÈôÀûÓÃÕâЩ·ì϶ £¬¿ÉÖ±½Ó½âËøÃŽû¡¢ÇÔÈ¡½Ó¼ûPINÂë £¬»òÔÚÊܿػ·¾³ÖÐÌáÒé½øÒ»²½¹¥»÷¡£Dormakabaй© £¬¿ÉÄÜÊýǧÃû¿Í»§ÊÜÓ°Ïì £¬ÆäÖв¿ÃŸ߰²È«ÐèÒª¿Í»§·çÏÕÓÈΪ͹Æð¡£DormakabaÔÚ´ÓǰһÄê°ëÄÚ³ÖÐø°ä²¼²¹¶¡¼°¼Ó¹ÌÖ¸ÄÏ £¬²¢ÓëÖØÒª¿Í»§ºÏ×÷½¨¸´ÏµÍ³·ì϶ £¬Í¬Ê±°µÊ¾ÉÐδ·¢ÏÖÏÖʵÀûÓð¸Àý¡£


https://www.securityweek.com/access-system-flaws-enabled-hackers-to-unlock-doors-at-major-european-firms/


6. CrunchbaseÔâShinyHunters¹¥»÷Ö³¬200ÍòÌõÊý¾Ýй¶


1ÔÂ26ÈÕ £¬½üÈÕ £¬ÆóÒµÊý¾Ýƽ̨Crunchbase֤ʵ²úÉúÑϳÁÊý¾Ýй¶ÊÂÎñ¡£ÍøÂç·¸×ï×éÖ¯ShinyHuntersÐû³Æ´ÓÆäϵͳÖÐÇÔÈ¡Á˳¬¹ý200ÍòÌõÓ×ÎҼͼ £¬ÒòÀÕË÷δ¹û £¬¸Ã×éÖ¯ÔÚTor°µÍøÍøÕ¾Ð¹Â¶ÁËÔ̺¬402MBÊý¾ÝµÄѹËõÎļþ¡£Crunchbase»ØÓ¦³Æ £¬Õâ´Î°²È«ÊÂÎñδ¶ÔÒµÎñÔËÓªÔì³É×ÌÈÅ £¬Ä¿Ç°·ì϶Òѵõ½½ÚÔì £¬ÏµÍ³°²È«×´Ì¬ÒѸ´Ô­¡£¾ÝCrunchbaseÅû¶ £¬ÊÂÎñ²úÉúºó £¬¹«Ë¾Á¢¼´ÀñÆ¸ÍøÂ簲ȫר¼ÒЭÖúµ÷²é £¬²¢ÒÑ֪ͨÁª¹ú·¨Âɲ¿ÃÅ¡£×÷ΪÊÂÎñÏìÓ¦Á÷³ÌµÄÒ»²¿ÃÅ £¬CrunchbaseÔÚÉó²éй¶Êý¾ÝµÄ¾ßÌåÄÚÈÝ £¬ÒÔÈ·¶¨ÊÇ·ñ±ØÒªÆ¾¾ÝÓйØË¾·¨ÒªÇóÏòÊÜÓ°ÏìÓû§·¢ËÍÕýʽ֪ͨ¡£¸Ã¹«Ë¾Ç¿µ÷ £¬¹¥»÷Õß°ä²¼µÄÎļþÔ̺¬ÆóÒµÍøÂçÖеÄÌØ¶¨ÐÅÏ¢ £¬µ«Ö÷ÌâÒµÎñϵͳδÊÜÄÚÈÝÐÔÓ°Ïì¡£ÖµÍ×ÌùÐĵÄÊÇ £¬ShinyHunters×éÖ¯½üÆÚ³ÁÆôÁËÆäTorÊý¾Ýй¶վµã £¬½«CrunchbaseÓëSoundCloud¡¢Betterment¹²Í¬ÁÐÈë"Êý¾Ýй¶Êܺ¦ÕßÃûµ¥" £¬ºóÁ½¼Ò¹«Ë¾´Ëǰ¾ùÒÑ֤ʵÔâ·êÀàËÆ¹¥»÷¡£


https://securityaffairs.com/187340/data-breach/shinyhunters-claims-2-million-crunchbase-records-company-confirms-breach.html