CVE-2026-22719·ì϶±»ÄÉÈëCISAÒÑÖªÀûÓÃĿ¼
°ä²¼¹¦·ò 2026-03-041. CVE-2026-22719·ì϶±»ÄÉÈëCISAÒÑÖªÀûÓÃĿ¼
3ÔÂ3ÈÕ£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©Òѽ«VMware Aria Operationsƽ̨µÄºÅÁî×¢Èë·ì϶CVE-2026-22719ÕýʽÁÐÈë¡°ÒÑÖªÀûÓ÷ì϶£¨KEV£©Ä¿Â¼¡±£¬²¢Ç¿µ÷¸Ã·ì϶Òѱ»ÏÖʵ¹¥»÷ÀûÓá£Æ¾¾ÝVMwareĸ¹«Ë¾²©Í¨°ä²¼µÄVMSA-2026-0001°²È«²¼¸æ£¬¸Ã·ì϶ÓÚ2026Äê2ÔÂ24ÈÕ³õ´ÎÅû¶²¢½¨¸´£¬CVSSÆÀ·Ö´ï8.1£¬±»ÆÀ¶¨Îª¡°³ÁÒª¡±¼¶±ð¡£CISAÒªÇóÁª¹úÃñÊ»ú¹¹±ØÐëÔÚ2026Äê3ÔÂ24ÈÕǰʵÏÖ²¹¶¡²¿Êð»òÖ´Ðлº½â´ëÊ©¡£¸Ã·ì϶ԴÓÚδÊÚȨ¹¥»÷Õß¿Éͨ¹ýºÅÁî×¢ÈëÔÚÒ×Êܹ¥»÷µÄAria OperationsϵͳÉÏÖ´ÐÐËÁÒâºÅÁÓÈÆäÔÚ²úƷǨáãÖ§³Ö¹ý³ÌÖпÉÄÜ´¥·¢Ô¶³Ì´úÂëÖ´ÐС£²©Í¨ÔÚ¸üв¼¸æÖÐÈϿɰÑÎȵ½¸Ã·ì϶±»ÀûÓõı¨Â·£¬µ«°µÊ¾ÎÞ·¨¶ÀÁ¢ÑéÖ¤ÆäÕæÊµÐÔ¡£Ä¿Ç°£¬¼¼Êõϸ½ÚÉÐδ¹«¿ªÅû¶¡£ÎªÓ¦¶Ô·çÏÕ£¬²©Í¨ÌṩÁËÁ½ÖÖ½â¾ö¹æ»®£ºÒ»ÊÇÁ¢¼´ÀûÓð²È«²¹¶¡£»¶þÊÇÖ´ÐÐһʱ»º½â¾ç±¾¡°aria-ops-rce-workaround.sh¡±¡£
https://www.bleepingcomputer.com/news/security/cisa-flags-vmware-aria-operations-rce-flaw-as-exploited-in-attacks/
2. °¢¿ËËÕŵ±´¶ûÃÀ¹úÕ¾µãÔâAnubisÀÕË÷Èí¼þ¹¥»÷
3ÔÂ3ÈÕ£¬ºÉÀ¼¿ç¹úÍ¿ÁϾÞÍ·°¢¿ËËÕŵ±´¶û½üÈÕ֤ʵ£¬ÆäλÓÚÃÀ¹úµÄÒ»´¦Õ¾µãÔâ·êºÚ¿ÍÈëÇÖ²¢Òý·¢Êý¾Ýй¶ÊÂÎñ¡£¸Ã¹«Ë¾½²»°È˰µÊ¾£¬¸Ã°²È«ÊÂÎñÒѵõ½½ÚÔ죬ӰÏìÁìÓò½öÏÞÓÚÃÀ¹úµ¥Ò»Õ¾µã£¬ÇÒ¡°Ó°ÏìÓÐÏÞ¡±¡£Ä¿Ç°¹«Ë¾Õý²ÉÈ¡´ëʩ֪ͨ²¢Ö§³ÖÊÜÓ°Ïì·½£¬²¢½«Óë·¨Âɲ¿ÃÅÇ×êǺÏ×÷µ÷²é´ËÊ¡£×÷ΪȫÇò³ÛÃûÍ¿ÁÏÆóÒµ£¬°¢¿ËËÕŵ±´¶ûÕ¼ÓÐ3.5ÍòÃûÔ±¹¤£¬ÄêÊÕÈ볬120ÒÚÃÀÔª£¬ÒµÎñ¸²¸Ç150¶à¸ö¹ú¶È£¬ÆìÏÂÆ·ÅÆÔ̺¬¶àÀÖÊ¿¡¢Ð¾¢¡¢¹ú¼ÊºÍÓ¢ÌØ¹úµÈ¡£¾ÝÀÕË÷Èí¼þÍÅ»ïAnubisÐû³Æ£¬Õâ´Î¹¥»÷ÇÔÈ¡ÁËÔ¼170GBÊý¾Ý£¬Éæ¼°½ü17Íò¸öÎļþ£¬²¢ÔÚÆä°µÍøÐ¹Â¶ÍøÕ¾°ä²¼Á˲¿ÃÅÑù±¾£¬Ô̺¬Óë³ÛÃû¿Í»§µÄ±£ÃܺÍ̸¡¢Ô±¹¤¼°¿Í»§µÄµç×ÓÓʼþµØÖ·¡¢µç»°ºÅÂë¡¢¸öÈËͨѶ¼Í¼¡¢»¤ÕÕɨÃè¼þ¡¢×ÊÁϲâÊÔÎļþ¼°ÄÚ²¿¼¼Êõ¹æ¸ñ±íµÈÃô¸ÐÐÅÏ¢¡£½ØÖÁ±¨Â·°ä²¼Ê±£¬Êý¾Ýй¶ÁìÓòÉÐδÆëÈ«¹«¿ª£¬°¢¿ËËÕŵ±´¶ûÒàδй©ÊÇ·ñÓë¹¥»÷Õß½øÐйý½Ó´¥¡£
https://www.bleepingcomputer.com/news/security/paint-maker-giant-akzonobel-confirms-cyberattack-on-us-site/
3. ÒÁÀÊAriomex¼ÓÃÜÇ®±ÒÂòÂôƽ̨ÔâÊý¾Ýй¶
3ÔÂ3ÈÕ£¬ÃÀ¹úÍøÂ簲ȫ¹«Ë¾Resecurity½üÈÕÅû¶£¬ÒÁÀʼÓÃÜÇ®±ÒÂòÂôƽ̨AriomexµÄÊý¾Ý¿â²úÉú´ó¹æÄ£Êý¾Ýй¶£¬Éæ¼°2022ÄêÖÁ2025ÄêÆÚ¼äÖÕ¶ËÓû§µÄÓ×ÎÒÐÅÏ¢¡¢ÂòÂô¼Í¼¼°²Ù×÷²¼¾°¡£Õâ´Îй¶Ô̺¬11,826±Ê¼Í¼£¬ÆäÖÐÔ¼7,710ÌõÔ´×ÔÒÁÀÊ£¬º¸ÇÓû§Éí·Ý¡¢µç×ÓÓʼþ¡¢IPµØÖ·¡¢¼ÓÃÜÇ®±ÒÂòÂôÏêÇéµÈÃô¸ÐÐÅÏ¢¡£¾ßÌå°¸ÀýÏÔʾ£¬Óû§Seyyed Younes Shokori BilankouhiÔøÒªÇó¡°ÔÚÒÁÀÊ´óʹ¹ÝÐÖúÏ¡±´æÈë300ÍòÃÀÔª£¬Ramin LakÊÔͼ¶Ò»»500ÍòÃÀÔª£¬¶øÓû§Eyraj JaafariÔòÂŴβɰì¼ÛÖµ10ÍòÃÀÔªµÄÊý×Ö×ʲúµ«Ñ¡Ôñ¡°ÉÔºó¶ÒÏÖ¡±£¬·´Ó³³ö²¿ÃÅÓû§½«Æ½Ì¨×÷Ϊ¡°Êý×ÖÒøÐÓױʹÓõÄÌØµã¡£×¨¼ÒÖ¸³ö£¬²¿ÃÅ´ó¶îÕË»§´æÔÚKYCÈÏ֤ȱʧ»òÐÅÏ¢´Û¸ÄÎÊÌ⣬ÇÒ·¢ÏÖ¶à±Ê¿ÉÒÉÂòÂôÉæ¼°Êý°ÙÍòÃÀÔª¡£Ð¹Â¶Êý¾Ý½øÒ»²½½ÒʾÒÁÀʼÓÃÜÇ®±Ò³ÖÓÐÕ߻ÁìÓò¿í·º£¬Éæ¼°ÃÀ¹ú¡¢Ó¢¹ú¡¢µÂ¹ú¡¢·¨¹ú¡¢ºÉÀ¼¡¢ÂÞÂíÄáÑÇ¡¢¶íÂÞ˹¡¢Èðµä¡¢ÍÁ¶úÆäµÈ¶à¸ö¹ú¶È£¬Îª×è¶ÏÒÁÀÊ·Å´ûÕß¼°·¸×ï·Ö×Ó½øÈ뺣±íÊг¡ÌṩÁËÏßË÷¡£Resecurityͨ¹ý¼¼Êõ¼¿Á©¸´ÔÁËȱʧ×ֶΣ¬²¢ÀûÓÃAI¹¹½¨Óû§»Ïñ£¬·¢ÏÖй¶±¾Ô¿ÉÄÜΪ¿Í»§Ö§³ÖϵͳÔâÈëÇÖ¡£
https://securityaffairs.com/188848/digital-id/ariomex-iran-based-crypto-exchange-suffers-data-leak.html
4. LexisNexisÔâºÚ¿Í¹¥»÷Öµ±¾Ö¹ÍÔ±Êý¾Ýй¶
3ÔÂ3ÈÕ£¬ÃÀ¹ú˾·¨ÓëóÒ×ÐÅÏ¢¾ÞÍ·LexisNexis Legal & Professional½üÈÕ֤ʵÔâ·ê³Á´óÊý¾Ýй¶ÊÂÎñ¡£ºÚ¿Í×éÖ¯FulcrumSecÔÚµØÏÂÂÛ̳й¶2GBÎļþºó£¬¸Ã¹«Ë¾µ÷²éÈ·ÈÏ£¬¹¥»÷Õßͨ¹ý佨¸´µÄReactǰ¶ËÀûÓ÷ì϶£¨React2Shell£©ÇÖÈëÆäAWS»ù´¡ÉèÊ©£¬»ñÈ¡ÁË536¸öRedshift±í¡¢430¸öVPCÊý¾Ý¿â±í¡¢53¸öAWSÃÜÔ¿Ã÷ÎÄ¡¢390ÍòÌõÊý¾Ý¿â¼Í¼¼°21,042¸ö¿Í»§ÕË»§µÈ½á¹¹»¯Êý¾Ý¡£Õâ´ÎÊÂÎñÉæ¼°Ô¼40Íò¸öÔÆ¶ËÓû§ÅäÖÃÎļþ£¬Ô̺¬ÕæÊµÐÕÃû¡¢ÓÊÏä¡¢µç»°¼°Ö°ÎñµÈ»ù´¡ÐÅÏ¢¡£ÓÈΪÒýÈ˹Ø×¢µÄÊÇ£¬118¸ö.govÓòÃûÕË»§±»ÆØÊôÓÚÃÀ¹úµ±¾Ö¹ÍÔ±¡¢ÁªÍõ·¨¹Ù¡¢Ë¾·¨ÖúÀí¡¢Ë¾·¨²¿ÂÉʦ¼°SEC¹¤×÷ÈËÔ±¡£FulcrumSecÆ·ÆÀLexisNexis°²È«´ëÊ©´æÔÚÑϳÁȱµã£¬µ¥¸öECS¹¤×÷½ÇÉ«¿É¶ÁÈ¡ËùÓÐÃÜÔ¿£¬Ô̺¬³ö²ú»·¾³RedshiftÖ÷ƾ֤¡£LexisNexisÇ¿µ÷£¬±»µÁÊý¾Ý¶àΪ2020ÄêǰµÄ¹ýÆÚÐÅÏ¢£¬²»Ô̺¬Éç±£ºÅ¡¢¼ÝÕպ𢲯ÕþÐÅÏ¢¡¢ÓÐЧÃÜÂë»ò¿Í»§ËÑË÷²éÎʵÈÃô¸ÐÄÚÈÝ¡£¹«Ë¾ÒÑ֪ͨ·¨Âɲ¿ÃŲ¢ÀñƸ±í²¿×¨¼ÒÐÖúµ÷²é£¬Í¬Ê±ÏòÏÖÓм°Ç°¿Í»§´«µÝÊÂÎñ¡£
https://www.bleepingcomputer.com/news/security/lexisnexis-confirms-data-breach-as-hackers-leak-stolen-files/
5. ÏÄÍþÒÄ´óѧ°©Ö¢ÖÐÐÄÔâÀÕË÷Èí¼þ¹¥»÷
3ÔÂ3ÈÕ£¬ÀÕË÷Èí¼þÍÅ»ï2025Äê8ÔÂÈëÇÖÏÄÍþÒÄ´óѧ°©Ö¢ÖÐÐÄÊ¢Ðв¡Ñ§²¿ÃÅ£¬ÇÔÈ¡½ü120ÍòÈ˵ÄÃô¸ÐÊý¾Ý¡£ÏÄÍþÒÄ´óѧϵͳ³ÉÁ¢ÓÚ1907Ä꣬ÆìÏÂÔ̺¬3Ëù´óѧ¡¢7ËùÉçÇøÑ§Ôº¼°¶à¸ö×êÑÐÖÐÐÄ£¬ÆäÖа©Ö¢ÖÐÐÄÕ¼ÓÐ300ÓàÃû½ÌÈËÔ±¹¤¼°200ÓàÃû´ÓÊô³ÉÔ±¡£Õâ´ÎÊÂÎñÉæ¼°Á½·ÝÔ̺¬2000ÄêÖݽ»Í¨²¿Îļþ£¨ÐÕÃû¡¢SSN£©¼°1998ÄêÑ¡ÃñµÇ¼ÇÊý¾ÝµÄÎļþ£»Ò»·Ýº¸Ç1993-1996Äê¶àÃñ×å¶ÓÁУ¨MEC£©×êÑУ¨SSN¡¢DLºÅÂë¡¢½¡È«ÐÅÏ¢£©µÄÎļþ£»ÈýÏîÒûʳÓë°©Ö¢×êÑÐÎļþ£»ÒÔ¼°1999Äê¡¢2000Äê´úÖÐÆÚ´Ó¹«¹²ÎÀÉúµÇ¼Ç´¦ÍøÂçµÄSSNºÍÐÕÃûÊý¾Ý¡£´óѧµ÷²éÏÔʾ£¬¹¥»÷½öÓ°ÏìÊ¢Ðв¡Ñ§²¿ÃÅϵͳ£¬Î´²¨¼°ÁÙ´²ÊÔÑé¡¢»¼Õß»¤Àí»òѧÉú¼Í¼¡£µ«¹¥»÷Õß¶Ôϵͳ½øÐмÓÃÜ£¬µ¼Ö¸´Ô¹¤×÷Åö±Ú¡£ÏÄÍþÒÄ´óѧÏò¹¥»÷ÕßÖ§¸¶ÓöÈÒÔ»ñÈ¡½âÃܹ¤¾ß£¬²¢ÒªÇó¡°°²È«Ïú»Ù·¸·¨»ñÈ¡µÄÐÅÏ¢¡±£¬ÒÔ±£»¤Ãô¸ÐÊý¾Ý¡£Í¨Öª¹¤×÷ÒÑ·¢Õ¹£ºÏò1993-1996ÄêMEC×êÑеÄ87,493Ãû²Î¼ÓÕß·¢ËÍ֪ͨÐÅ£¬²¢ÁªÏµÆäËûÔ¼90Íò¸ö¿ÉÄÜÊÜÓ°ÏìµÄµç×ÓÓʼþµØÖ·¡£´óѧǿµ÷£¬Õâ´ÎÊÂÎñδӰÏìÁÙ´²ÔËÓª»ò»¼Õß»¤Àí£¬µ«Ô¼115ÍòÈ˵ÄÓ×ÎÒÐÅÏ¢£¨º¬SSN±êʶ·û£©¿ÉÄÜͨ¹ýº¹Çà¼ÝÊ»ÅÆÕÕºÍÑ¡ÃñµÇ¼Ç¼Í¼й¶¡£
https://www.bleepingcomputer.com/news/security/university-of-hawaii-cancer-center-ransomware-attack-affects-nearly-12-million-people/
6. ºÚ¿ÍÀÄÓÃOAuth³Á¶¨Ïò»úÔìÖ´Ðо«×¼´¹µö¹¥»÷
3ÔÂ3ÈÕ£¬Î¢ÈíDefender×êÑÐÈËÔ±Åû¶£¬ºÚ¿ÍÕýͨ¹ýÀÄÓúϷ¨µÄOAuth³Á¶¨Ïò»úÔìÈÆ¹ýµç×ÓÓʼþºÍä¯ÀÀÆ÷µÄÍøÂç´¹µö±£»¤£¬¶Ôµ±¾Ðݹ«¹²²¿ÃÅÌáÒ龫׼¹¥»÷¡£¹¥»÷ÕßÀûÓÃÔ̺¬OAuth³Á¶¨ÏòURLµÄ´¹µöÓʼþ£¨Èçµç×ÓÊðÃûÒªÇó¡¢É籣֪ͨ¡¢»áÒéÔ¼ÇëµÈ£©£¬ÉõÖÁ½«URLǶÈëPDFÎļþÌӱܼì²â£¬ÓÕµ¼Óû§¶Ô¶ñÒâÀûÓ÷¨Ê½½øÐÐÉí·ÝÑéÖ¤¡£¹¥»÷Ö÷ÌâÔÚÓÚ¶ñÒâOAuthÀûÓ÷¨Ê½µÄ¹¹½¨ÓëÅäÖ᣹¥»÷ÕßÔÚ½ÚÔìµÄ×â»§Öд´½¨¶ñÒâÀûÓã¬ÅäÖóÁ¶¨ÏòURIÖ¸Ïò×ÔÉí»ù´¡ÉèÊ©¡£µ±Óû§µã»÷´¹µöÁ´½Óºó£¬¼´±ãMicrosoft Entra IDµÄURL¿´ËƺϷ¨ÊÚȨҪÇ󣬵«Í¨¹ýÎÞЧ²ÎÊý£¨Èçscope OAuth»òprompt=none£©´¥·¢¾²Ä¬Éí·ÝÑéÖ¤ÃýÎó£¬Ç¿ÔìÓû§³Á¶¨ÏòÖÁ¹¥»÷Õß½ÚÔìµÄ´¹µöÒ³Ãæ¡£Î¢ÈíÇ¿µ÷£¬´ËÀ๥»÷ÐÔÖÊÊÇÉí·ÝÍþв£¬ÀûÓÃÁËOAuth¿ò¼ÜÖÐͨ¹ý³Á¶¨ÏòÖÎÀíÊÚȨÃýÎóµÄÔ¤ÆÚÐÐΪ¡£½¨Òé×éÖ¯¼ÓÇ¿OAuthÀûÓÃȨÏ޹ܿأ¬Ö´ÐÐÇ¿Éí·Ý±£»¤ÓëǰÌá½Ó¼ûÕ½Êõ£¬²¢ÔÚÓʼþ¡¢Éí·Ý¡¢Öն˲ãÃæ²¿Êð¿çÓò¼ì²â»úÔì¡£
https://www.bleepingcomputer.com/news/security/microsoft-hackers-abuse-oauth-error-flows-to-spread-malware/


¾©¹«Íø°²±¸11010802024551ºÅ