ºÚ¿ÍÉù³ÆÈëÇÖCheck PointÍøÂçÇå¾²¹«Ë¾²¢³öÊÛÃô¸ÐÊý¾Ý
Ðû²¼Ê±¼ä 2025-04-011. ºÚ¿ÍÉù³ÆÈëÇÖCheck PointÍøÂçÇå¾²¹«Ë¾²¢³öÊÛÃô¸ÐÊý¾Ý
4ÔÂ1ÈÕ£¬£¬£¬£¬£¬£¬£¬ºÚ¿Í×éÖ¯CoreInjectionÐû³ÆÈëÇÖÒÔÉ«ÁÐÍøÂçÇå¾²¾ÞÍ·Check Point£¬£¬£¬£¬£¬£¬£¬ÔÚ°µÍøÂÛ̳ÒÔ5±ÈÌØ±Ò£¨Ô¼ºÏ43.45ÍòÃÀÔª£©¶µÊÛÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯ÓÚ2025Äê3ÔÂ30ÈÕͨ¹ýBreach ForumsÐû²¼ÉùÃ÷£¬£¬£¬£¬£¬£¬£¬Éù³ÆÕÆÎÕCheck PointÄÚ²¿ÏîÄ¿Îĵµ¡¢Óû§Æ¾Ö¤£¨º¬Ã÷ÎÄÃÜÂ룩¡¢ÍøÂç¼Ü¹¹Í¼¡¢Ô´´úÂë¼°Ô±¹¤ÁªÏµÐÅÏ¢µÈ½¹µãÊý¾Ý£¬£¬£¬£¬£¬£¬£¬½ö½ÓÊܼÓÃÜÇ®±ÒÉúÒⲢͨ¹ýTOXͨѶ¹¤¾ßÁªÏµ¡£¡£¡£¡£¡£¡£Check PointѸËÙ»ØÓ¦£¬£¬£¬£¬£¬£¬£¬·ñ¶¨½üÆÚ±¬·¢´ó¹æÄ£ÈëÇÖ£¬£¬£¬£¬£¬£¬£¬³ÆÖ¸¿ØÔ´ÓÚÊýÔÂǰÒÑ´¦Öóͷ£µÄÁæØêÊÂÎñ£¬£¬£¬£¬£¬£¬£¬½öÉæ¼°·Ç½¹µãϵͳÇÒδӰÏì¿Í»§Êý¾Ý¡£¡£¡£¡£¡£¡£¹«Ë¾Ç¿µ÷±»ÈëÇÖµÄÃÅ»§Î´´¥¼°Éú²úÇéÐΣ¬£¬£¬£¬£¬£¬£¬ÊÜÓ°Ïì×éÖ¯ÒÑÐÞ¸´Îó²î£¬£¬£¬£¬£¬£¬£¬°µÍøÊÛÂôÊý¾ÝʵΪ¾ÉÐÅÏ¢½ÓÄÉ¡£¡£¡£¡£¡£¡£CoreInjection×Ô3ÔÂ15ÈÕÏÖÉíBreach ForumsÒÔÀ´£¬£¬£¬£¬£¬£¬£¬ÒѶà´ÎÕë¶ÔÒÔÉ«ÁÐÒªº¦»ù´¡ÉèÊ©Ìᳫ¹¥»÷£¬£¬£¬£¬£¬£¬£¬Õ¹ÏÖ³ö¶Ô¸ß¼ÛֵĿµÄµÄ¾«×¼¹¥»÷ÄÜÁ¦¡£¡£¡£¡£¡£¡£Æä¹¥»÷ģʽÏÔʾÓëµØÔµÕþÖθ߶ȹØÁª£¬£¬£¬£¬£¬£¬£¬Òý·¢¶ÔDZÔÚÎïÀíÆÆËð¹¥»÷µÄµ£ÐÄ¡£¡£¡£¡£¡£¡£Ö»¹ÜCheck Pointµ»¯ÊÂÎñÓ°Ï죬£¬£¬£¬£¬£¬£¬µ«ºÚ¿ÍÅû¶µÄÄÚ²¿¼Ü¹¹Í¼¡¢Î´¼ÓÃÜÆ¾Ö¤¼°Ô´´úÂëµÈϸ½Ú£¬£¬£¬£¬£¬£¬£¬ÈÔÒý·¢Íâ½ç¶ÔÈëÇÖÉî¶ÈµÄÖÊÒÉ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬Check Pointδ¹ûÕæÈëÇÖ·½·¨¡¢Îó²îÀàÐͼ°×·ÔðÏ£Íû£¬£¬£¬£¬£¬£¬£¬Æä͸Ã÷¶Èȱ·¦¿ÉÄÜÏ÷ÈõÐÐÒµÐÅÈΡ£¡£¡£¡£¡£¡£
https://hackread.com/hacker-breach-check-point-cybersecurity-firm-access/
2. LazarusºÚ¿Í×éÖ¯½ÓÄÉClickFixÕ½ÂÔ¹¥»÷¼ÓÃÜÇ®±ÒÇóÖ°Õß
3ÔÂ31ÈÕ£¬£¬£¬£¬£¬£¬£¬³¯ÏÊLazarusºÚ¿Í×éÖ¯½üÆÚÉý¼¶Á˶ԼÓÃÜÇ®±ÒÁìÓòÇóÖ°Õߵ͍Ïò¹¥»÷Õ½ÂÔ£¬£¬£¬£¬£¬£¬£¬½ÓÄÉClickFixÊÖÒÕʵÑéѬȾÐÔÃæÊԻ¡£¡£¡£¡£¡£¡£¸Ã×é֯ð³äCoinbase¡¢KrakenµÈ14¼Ò×ÅÃû¼ÓÃܽðÈÚÆóÒµ£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÐéαְλÓÕÆÇóÖ°Õß»á¼ûº¬¶ñÒâ´úÂëµÄÃæÊÔÍøÕ¾¡£¡£¡£¡£¡£¡£µ±Êܺ¦ÕßʵÑéÂ¼ÖÆÊÓÆµ»Ø¸²ÃæÊÔÎÊÌâʱ£¬£¬£¬£¬£¬£¬£¬ÍøÕ¾»áµ¯³öÐéαϵͳ¹ýʧÌáÐÑ£¬£¬£¬£¬£¬£¬£¬ÒªÇóÓû§Ö´ÐÐÌØ¶¨²Ù×÷ϵͳµÄÖÕ¶ËÏÂÁîÒÔÐÞ¸´ÉãÏñÍ·Çý¶¯ÎÊÌâ¡£¡£¡£¡£¡£¡£ÕâЩÏÂÁîÏÖʵ»áÏÂÔØÃûΪGolangGhostµÄGoÓïÑÔºóÃųÌÐò£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÐÞ¸Ä×¢²á±í»òLaunchAgentʵÏÖϵͳפÁô¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ¾ß±¸ÇÔÈ¡Chromeä¯ÀÀÆ÷Cookie¡¢ä¯ÀÀÀúÊ·¡¢´æ´¢ÃÜÂ뼰ϵͳԪÊý¾ÝµÄÄÜÁ¦£¬£¬£¬£¬£¬£¬£¬²¢Óë¹¥»÷Õß¿ØÖƵÄC2ЧÀÍÆ÷½¨Éè¼ÓÃÜͨѶ¡£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬Lazarus½«¹¥»÷Ä¿µÄ´ÓÊÖÒÕ¿ª·¢Ö°Ô±À©Õ¹ÖÁÓªÒµ¿ª·¢¡¢Êг¡ÓªÏúµÈ·ÇÊÖÒÕ¸ÚλְԱ£¬£¬£¬£¬£¬£¬£¬Ê¹ÓÃReactJS¹¹½¨¸ß·ÂÆóÒµÕÐÆ¸Ò³ÃæÔöÇ¿ÓÕÆÐÔ¡£¡£¡£¡£¡£¡£¹¥»÷Á´Ê¼ÓÚLinkedInµÈÉ罻ƽ̨µÄÆóÒµÕ˺Åαװ£¬£¬£¬£¬£¬£¬£¬Í¨¹ýGitHubµÈƽ̨ÍйܶñÒâ±àÂë²âÊÔÏîÄ¿£¬£¬£¬£¬£¬£¬£¬×îÖÕÓÕµ¼Êܺ¦Õß×Ô¶¯Ö´Ðй¥»÷ÔØºÉ¡£¡£¡£¡£¡£¡£·ÀÓù½¨ÒéÇ¿µ÷ÇóÖ°ÕßÐèÑÏ¿áÑéÖ¤ÃæÊÔÔ¼ÇëȪԴ£¬£¬£¬£¬£¬£¬£¬×èÖ¹Ö´ÐÐÈκÎδ֪ÖÕ¶ËÏÂÁ£¬£¬£¬£¬£¬£¬ÆóÒµÔòÓ¦°²ÅÅYara¹æÔò¼ì²âÒì³£Àú³Ì£¬£¬£¬£¬£¬£¬£¬²¢¼à¿Ø×¢²á±í/plistÎļþ±ä»»¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/north-korean-hackers-adopt-clickfix-attacks-to-target-crypto-firms/
3. ¹ú·À³Ð°üÉÌNDC¼°AMTECÔâºÚ¿Í¹¥»÷ϵͳ±»¼ÓÃÜ
3ÔÂ31ÈÕ£¬£¬£¬£¬£¬£¬£¬¹ú·À³Ð°üÉÌNDC¼°Æäµ¯Ò©ÖÆÔì×Ó¹«Ë¾AMTEC½üÆÚÔâÓöÖØ´óÍøÂç¹¥»÷ÊÂÎñ¡£¡£¡£¡£¡£¡£¾Ý°µÍøÐ¹ÃÜ×éÖ¯InterLockÐû³Æ£¬£¬£¬£¬£¬£¬£¬ÒÑÀÖ³ÉÈëÇÖNDC¼°Æä¹ØÁªÏµÍ³£¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡4,200GBÃô¸ÐÊý¾Ý£¬£¬£¬£¬£¬£¬£¬°üÀ¨290ÓàÍò·ÝÎļþ¼°45Íò¸öÎļþ¼Ð¡£¡£¡£¡£¡£¡£¹¥»÷Õßͨ¹ý°µÍøÆ½Ì¨Ðû²¼²¿·Ö½ØÍ¼×÷Ϊ×ôÖ¤£¬£¬£¬£¬£¬£¬£¬²¢Ö¸³öÒѶÔAMTEC¡¢Tech Ord¼°PRESTOϵͳʵÑéͨÅ̼ÓÃÜ¡£¡£¡£¡£¡£¡£×÷ΪNational Presto IndustriesÈ«×Ê×Ó¹«Ë¾£¬£¬£¬£¬£¬£¬£¬NDCÖ÷Óª¾üÓÃ/¾¯Óõ¯Ò©Éú²ú£¬£¬£¬£¬£¬£¬£¬¾ß±¸Ï¸ÃÜ×é×°¡¢Õ¨Ò©×°ÔصȽ¹µãÄÜÁ¦¡£¡£¡£¡£¡£¡£Æä×Ó¹«Ë¾AMTEC¸üÊÇÈ«Çò40ºÁÃ×Áñµ¯µ¯Ò©¼°ÒýÐŵÄ×î´óÅúÁ¿¹©Ó¦ÉÌ¡£¡£¡£¡£¡£¡£InterLockÅû¶µÄNDCÄÚ²¿ÏàͬÄÚÈÝÏÔʾ£¬£¬£¬£¬£¬£¬£¬Ö»¹Ü¹«Ë¾Éù³ÆÒÑÏòÕþ¸®»ú¹¹ºÍ¹«ÖÚÅû¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬µ«¹ûÕæÇþµÀδ¼ûÏà¹ØÍ¨¸æ¡£¡£¡£¡£¡£¡£NDCÔÚ»ØÓ¦Öе»¯Êý¾Ý¼ÛÖµ£¬£¬£¬£¬£¬£¬£¬Ç¿µ÷ÆäÉú²úµÄµÍÊÖÒÕÉÌÆ·Éè¼ÆÄêÔ¾ÃÔ¶£¬£¬£¬£¬£¬£¬£¬±»µÁÐÅÏ¢¶ÔµÚÈý·½Ê¹ÓüÛÖµÓÐÏÞ£¬£¬£¬£¬£¬£¬£¬Í¬Ê±Í¸Â¶ÒÑͶ±£ÁýÕÖDZÔÚËðʧ¡£¡£¡£¡£¡£¡£Ä¸¹«Ë¾±¨¸æÔòÈÏ¿ÉÊÂÎñ¶Ô²ÆÎñ¼°ÔËÓª¿ÉÄÜÔì³ÉÖØ´óÓ°Ï죬£¬£¬£¬£¬£¬£¬ÏÖÔÚ·¨Ö¤ÊÓ²ìÈÔÔÚ¾ÙÐÐÖС£¡£¡£¡£¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬£¬£¬£¬£¬£¬InterLockÖ¸¿ØNDCÇå¾²¼à¿Ø±£´æÊè©£¬£¬£¬£¬£¬£¬£¬³ÆÆäδ±»·¢Ã÷»òÇýÖð³öϵͳ¡£¡£¡£¡£¡£¡£´Ë´Î¹¥»÷²»µ«Ôì³ÉÉú²ú¡¢ÎïÁ÷µÈÔËÓª¹¦Ð§ÔÝʱ̱»¾£¬£¬£¬£¬£¬£¬£¬¸ü̻¶ÁËÒªº¦»ù´¡ÉèÊ©ÍøÂçÇå¾²·À»¤µÄųÈõÐÔ¡£¡£¡£¡£¡£¡£
https://databreaches.net/2025/03/31/national-defense-corporation-victim-of-ransomware-attack-discloses-breach-and-declines-to-pay-any-ransom/
4. ÈýÐǵ¹úƱÎñϵͳÒòƾ֤ʧÔôÖÂ27Íò¿Í»§Êý¾Ýй¶
3ÔÂ31ÈÕ£¬£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾Hudson RockÅû¶ÈýÐǵ¹úƱÎñϵͳÔâÓöÖØ´óÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßGHNAʹÓñ»µÁÕË»§Æ¾Ö¤ÇÔȡԼ27ÍòÌõ¿Í»§¼Í¼¡£¡£¡£¡£¡£¡£¾ÝÊӲ죬£¬£¬£¬£¬£¬£¬Ð¹Â¶Ô´Í·¿É×·ËÝÖÁ2021ÄêSpectos GmbHÔ±¹¤×°±¸Ñ¬È¾µÄRacoonÐÅÏ¢ÇÔÈ¡³ÌÐò£¬£¬£¬£¬£¬£¬£¬¸ÃÕË»§±¾ÓÃÓÚ¼à¿ØÐ§ÀÍÖÊÁ¿£¬£¬£¬£¬£¬£¬£¬µ«Ïà¹ØµÇ¼ƾ֤ºã¾ÃδÂÖ»»£¬£¬£¬£¬£¬£¬£¬ÏÐÖÃËÄÄêºó³ÉΪ¹¥»÷Í»ÆÆ¿Ú¡£¡£¡£¡£¡£¡£´Ë´Îй¶Êý¾Ýº¸Ç¿Í»§ÐÕÃû¡¢µØµã¡¢ÓÊÏäµÈÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°ÉúÒâ¼Í¼¡¢¶©µ¥ºÅ¡¢¸ú×ÙÁ´½ÓºÍÖ§³ÖÏàͬÄÚÈÝ¡£¡£¡£¡£¡£¡£Hudson RockÖÒÑÔ£¬£¬£¬£¬£¬£¬£¬´ËÀàÐÅÏ¢¿É±»ÓÃÓÚ¾«×¼ÍøÂç´¹ÂÚ¹¥»÷¡¢Ðéα¿Í»§Ö§³ÖÕ©Æ¡¢Î±Ôì±£ÐÞË÷Åâ¼°ÎïÀí͵ÇԵȷ¸·¨»î¶¯¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÉõÖÁ¿ÉÄÜÔËÓÃAIÊÖÒÕʶ±ð¸ß¼ÛֵĿµÄ£¬£¬£¬£¬£¬£¬£¬ÊµÑ鶍֯»¯Ú²Æ¡£¡£¡£¡£¡£¡£ÆÊÎö±¨¸æÖ¸³ö£¬£¬£¬£¬£¬£¬£¬Æ¾Ö¤ÖÎÀíÊèʧÊÇÊÂÎñÖ÷Òò£¬£¬£¬£¬£¬£¬£¬ÀàËÆÎÊÌâÔøµ¼Ö½ݱªÂ·»¢¡¢Ê©ÄÍµÂµçÆøµÈ¶à¼ÒÆóÒµÔâÏ®¡£¡£¡£¡£¡£¡£Hudson RockÇ¿µ÷£¬£¬£¬£¬£¬£¬£¬ÐÅÏ¢ÇÔÈ¡Íþв¾ßÓÐDZÔÚÐÔ£¬£¬£¬£¬£¬£¬£¬ÆóÒµÐ轨ÉèÒ»Á¬Æ¾Ö¤¼à¿Ø»úÖÆ£¬£¬£¬£¬£¬£¬£¬¶ø·Ç½öÒÀÀµÊºóµ÷½â¡£¡£¡£¡£¡£¡£¸Ã»ú¹¹½¨Òé×Ô¶¯×·×Ù±»µÁƾ֤Ӧ³ÉΪÇå¾²Õ½ÂÔ½¹µã£¬£¬£¬£¬£¬£¬£¬¶ø·Ç±»¶¯Ó¦¶ÔÎó²î¡£¡£¡£¡£¡£¡£×èÖ¹ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬ÈýÐÇÉÐδ¾Í´ËÊÂÎñ×÷³ö¹Ù·½»ØÓ¦£¬£¬£¬£¬£¬£¬£¬ºóÐøÏ£ÍûÈÔÐèÒ»Á¬¹Ø×¢¡£¡£¡£¡£¡£¡£
https://www.securityweek.com/hacker-leaks-samsung-customer-data/
5. ÌïÄÉÎ÷ÑÀ¿Æ¼¯ÍÅÓʼþÈëÇÖÖÂ17Íò»¼ÕßÊý¾Ýй¶
3ÔÂ31ÈÕ£¬£¬£¬£¬£¬£¬£¬ÌïÄÉÎ÷ÖÝÑÀ¿ÆÐ§Àͼ¯ÍÅChord Specialty Dental Partners£¨º¬CDHA ManagementºÍSpark DSO£©¿ËÈÕÅû¶ÔâÓöµç×ÓÓʼþϵͳÇå¾²ÊÂÎñ£¬£¬£¬£¬£¬£¬£¬Ó°Ïì¹æÄ£ÁýÕÖÆäÔÚÃÀ¹úÁù¸öÖÝÔËÓªµÄ60Óà¼ÒÕïËù¡£¡£¡£¡£¡£¡£¾ÝÆóҵͨ¸æ£¬£¬£¬£¬£¬£¬£¬2024Äê8ÔÂ18ÈÕÖÁ9ÔÂ25ÈÕʱ´ú£¬£¬£¬£¬£¬£¬£¬¶à¸öÔ±¹¤ÓÊÏäÔâδ¾ÊÚȨ»á¼û£¬£¬£¬£¬£¬£¬£¬´æ´¢µÄÃô¸ÐÐÅÏ¢°üÀ¨»¼ÕßÐÕÃû¡¢×¡Ö·¡¢³öÉúÈÕÆÚ¡¢Éç±£ºÅ¡¢¼ÝÕպš¢ÒøÐÐÕË»§¼°Ö§¸¶¿¨Êý¾Ý¡¢Ò½ÁƼͼºÍ¿µ½¡°ü¹ÜÏêÇéµÈ¡£¡£¡£¡£¡£¡£Ö»¹ÜÆóÒµÉùÃ÷ÏÖÔÚδ·¢Ã÷ÐÅÏ¢±»¶ñÒâÀÄÓõÄÖ¤¾Ý£¬£¬£¬£¬£¬£¬£¬µ«ÈÔÇ¿µ÷ÎÞ·¨É¨³ýÊý¾ÝÒѱ»»ñÈ¡µÄ¿ÉÄÜÐÔ¡£¡£¡£¡£¡£¡£´Ë´ÎÊÂÎñ²¨¼°³¬17.3ÍòÃû»¼Õߣ¬£¬£¬£¬£¬£¬£¬ChordÒÑÏòHHS±¨±¸£¬£¬£¬£¬£¬£¬£¬²¢ÔÊÐíΪÊÜÓ°ÏìÕßÌṩÐÅÓÃ¼à¿Ø¼°Éí·Ý±£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£¡£¡£Ç徲ר¼ÒÖ¸³ö£¬£¬£¬£¬£¬£¬£¬Ò½ÁÆ»ú¹¹Òò´æ´¢´ó×ڸ߼ÛֵСÎÒ˽¼Ò¿µ½¡ÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ºã¾Ã³ÉÎªÍøÂç¹¥»÷ÖØµãÄ¿µÄ¡£¡£¡£¡£¡£¡£µç×ÓÓʼþ×÷Ϊ³£¼û¹¥»÷Èë¿Ú£¬£¬£¬£¬£¬£¬£¬ÆäÕË»§Çå¾²·À»¤±¡ÈõÐÔÍùÍù³ÉΪΣº¦Í»ÆÆ¿Ú¡£¡£¡£¡£¡£¡£´ËÀàÊÂÎñ¾¯Ê¾Ò½ÁÆ×éÖ¯ÐèÇ¿»¯ÓÊÏäϵͳµÄ¶àÒòËØÈÏÖ¤¡¢°´ÆÚÉ󼯼°ÈëÇÖ¼ì²â»úÖÆ£¬£¬£¬£¬£¬£¬£¬Í¬Ê±½¨ÉèÍêÕûµÄÊÂÎñÏìÓ¦Ô¤°¸ÒÔ±£»£»£»¤»¼ÕßÊý¾ÝÇå¾²¡£¡£¡£¡£¡£¡£
https://www.securityweek.com/170000-impacted-by-data-breach-at-chord-specialty-dental-partners/
6. CISA½«Ë¼¿ÆÖÇÄÜÔÊÐíÎó²îÁÐÈ뱻ʹÓÃĿ¼²¢ÉèÐÞ¸´ÏÞÆÚ
3ÔÂ31ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²Óë»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«Ë¼¿ÆÖÇÄÜÔÊÐí¹¤¾ßµÄÁ½Ïî¸ßΣÎó²î£¨CVE-2024-20439ºÍCVE-2024-20440£©ÁÐÈëÒÑÖª±»Ê¹ÓÃÎó²îĿ¼£¬£¬£¬£¬£¬£¬£¬ÒªÇóÁª°î»ú¹¹ÔÚ2025Äê4ÔÂ21ÈÕǰÍê³ÉÐÞ¸´¡£¡£¡£¡£¡£¡£Îó²îϸ½ÚÏÔʾ£¬£¬£¬£¬£¬£¬£¬CVE-2024-20439Ϊ¾²Ì¬Æ¾Ö¤ºóÃÅ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓÃÔ¤ÉèÖÎÀíÔ±ÕË»§ÎÞÑéÖ¤µÇ¼ϵͳ£»£»£»CVE-2024-20440ΪÐÅϢй¶Îó²î£¬£¬£¬£¬£¬£¬£¬Í¨¹ý½á¹¹HTTPÇëÇó¿É»ñÈ¡º¬Ãô¸ÐÊý¾ÝµÄµ÷ÊÔÈÕÖ¾£¬£¬£¬£¬£¬£¬£¬°üÀ¨API»á¼ûƾ֤¡£¡£¡£¡£¡£¡£Ë¼¿ÆÒÑÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬µ«SANS»¥ÁªÍø·ç±©ÖÐÐÄÖÒÑÔ£¬£¬£¬£¬£¬£¬£¬Îó²îϸ½Ú¹ûÕæºóÒÑ·ºÆð»îԾʹÓü£Ï󣬣¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜÁ¬ÏµÆäËûÎó²î£¨ÈçCVE-2024-0305£©À©´ó¹¥»÷Ãæ¡£¡£¡£¡£¡£¡£Ç徲ר¼ÒÖ¸³ö£¬£¬£¬£¬£¬£¬£¬ÕâÁ½¸öÎó²î±£´æ¹ØÁª£ººóÃÅÆ¾Ö¤¿ÉÖ±½Ó»á¼ûÈÕÖ¾Îļþ£¬£¬£¬£¬£¬£¬£¬¶øÌ«¹ý¼Í¼µÄÈÕÖ¾ÓÖ̻¶¸ü¶àϵͳÐÅÏ¢¡£¡£¡£¡£¡£¡£Ö»¹ÜÎó²îÅû¶³õÆÚδ¼û¹ûÕæÊ¹Ó㬣¬£¬£¬£¬£¬£¬µ«ÊÖÒÕϸ½ÚÍâй¼ÓËÙÁ˹¥»÷ÉìÕÅ¡£¡£¡£¡£¡£¡£Æ¾Ö¤CISAµÄÔ¼ÊøÐÔ²Ù×÷Ö¸ÁîBOD 22-01£¬£¬£¬£¬£¬£¬£¬Áª°î»ú¹¹ÐèÑÏ¿á×ñÊØÐÞ¸´Ê±ÏÞ£¬£¬£¬£¬£¬£¬£¬Ë½Óª²¿·ÖÒà±»½¨ÒéÁ¬Ã¦Éó²éÍøÂç»ù´¡ÉèÊ©£¬£¬£¬£¬£¬£¬£¬ÓÅÏÈÐÞ²¹ÕâЩҪº¦Îó²î¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/176073/hacking/u-s-cisa-adds-cisco-smart-licensing-utility-flaw-known-exploited-vulnerabilities-catalog.html


¾©¹«Íø°²±¸11010802024551ºÅ