Framework LinuxµçÄÔUEFIÇå¾²Îó²îÆØ¹â
Ðû²¼Ê±¼ä 2025-10-161. Framework LinuxµçÄÔUEFIÇå¾²Îó²îÆØ¹â
10ÔÂ14ÈÕ£¬£¬£¬£¬£¬ÃÀ¹úÓ²¼þ³§ÉÌFrameworkÉú²úµÄÔ¼20Íǫ̀LinuxµçÄÔÒò³ö³§Ô¤×°º¬¡°ÄÚ´æÐ޸ġ±£¨mm£©ÏÂÁîµÄÒÑÊðÃûUEFIÍâ¿Ç×é¼þ£¬£¬£¬£¬£¬±£´æÑÏÖØÇå¾²Îó²î£¬£¬£¬£¬£¬¿ÉÄܱ»¹¥»÷ÕßʹÓÃÈÆ¹ýÇå¾²Æô¶¯±£»£»£»£»£»£»£»¤¡£¡£¡£¡£¡£¡£¡£¾Ý¹Ì¼þÇå¾²¹«Ë¾EclypsiumÆÊÎö£¬£¬£¬£¬£¬¸ÃmmÏÂÁîÔ±¾ÓÃÓÚ³õ¼¶Õï¶ÏºÍ¹Ì¼þµ÷ÊÔ£¬£¬£¬£¬£¬¿ÉÖ±½Ó¶ÁдϵͳÄڴ棬£¬£¬£¬£¬µ«¿É±»ÀÄÓÃÕë¶ÔgSecurity2±äÁ¿£¨UEFIÄ£¿£¿£¿£¿£¿éÊðÃûÑéÖ¤µÄÒªº¦×é¼þ£©£¬£¬£¬£¬£¬Í¨¹ýÁýÕÖÆäֵΪNULL»òÖØ¶¨ÏòÖÁÎÞÑéÖ¤º¯Êý£¬£¬£¬£¬£¬´Ó¶ø½ûÓÃÊðÃûÑéÖ¤»úÖÆ¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß¿Éͨ¹ý´ËÎó²î¼ÓÔØBlackLotus¡¢HybridPetya¡¢BootkittyµÈ¶ñÒâÖ¸µ¼¹¤¾ß°ü£¬£¬£¬£¬£¬ÕâЩ¹¤¾ß¿É¹æ±Ü²Ù×÷ϵͳ¼¶Çå¾²¿ØÖÆ£¬£¬£¬£¬£¬ÔÚÏµÍ³ÖØ×°ºóÈÔÒ»Á¬±£´æ£¬£¬£¬£¬£¬ÐγÉÄÑÒÔɨ³ýµÄ³¤ÆÚÐÔÍþв¡£¡£¡£¡£¡£¡£¡£Îó²îÓ°Ïì¹æÄ£º¸ÇFramework 13¼°16ϵÁеĶà¿îÐͺţ¬£¬£¬£¬£¬°üÀ¨IntelµÚ11-13´ú¡¢AMD Ryzen 7040/AI 300µÈ´¦Öóͷ£Æ÷°æ±¾£¬£¬£¬£¬£¬ÏêϸÐÞ¸´°æ±¾ÒÑÃ÷È·£¬£¬£¬£¬£¬Èç13´úIntel°æ±¾ÔÚ3.08°æÐÞ¸´¡¢AMD Ryzen AI 300ÔÚ3.04°æÐÞ¸´¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/secure-boot-bypass-risk-on-nearly-200-000-linux-framework-sytems/
2. 800ÃÀԪװ±¸¼´¿É×èµ²ÎÀÐÇͨѶÊý¾Ý
10ÔÂ14ÈÕ£¬£¬£¬£¬£¬¼ÓÖÝ´óѧʥµØÑǸç·ÖУÓëÂíÀïÀ¼´óѧÁªºÏÑо¿Õ¹ÏÖ£¬£¬£¬£¬£¬È«ÇòÔ¼°ëÊýÎÀÐÇͨѶÒòδ¼ÓÃÜÃæÁÙÑÏÖØÇ徲Σº¦£¬£¬£¬£¬£¬½öÐè¼ÛÖµÔ¼800ÃÀÔªµÄÏÖ³É×°±¸¼´¿ÉʵÑé×èµ²¡£¡£¡£¡£¡£¡£¡£Ñо¿ÍŶÓÔÚÊ¥µØÑǸç·ÖУÎݶ¥×é×°ÎÀÐÇÎüÊÕϵͳ£¬£¬£¬£¬£¬°üÀ¨185ÃÀÔªÌìÏßµú¡¢140ÃÀÔªÖ§¼Ü¡¢195ÃÀÔªÂí´ï¼°230ÃÀÔªµ÷г¿¨£¬£¬£¬£¬£¬ÀÖ³ÉÃé×¼µØÇòͬ²½ÎÀÐǺ󣬣¬£¬£¬£¬ÊµÊ±²¶»ñÁËδ¼ÓÃܵÄ˽ÈËÊý¾Ý¡£¡£¡£¡£¡£¡£¡£Ñо¿ÏÔʾ£¬£¬£¬£¬£¬µçÐÅÔËÓªÉÌͨ¹ýÎÀÐÇÅþÁ¬Æ«Ô¶»ùÕ¾Óë½¹µãÍøÂçʱ£¬£¬£¬£¬£¬Êý¾Ý´«ÊäÆÕ±éδ¼ÓÃÜ¡£¡£¡£¡£¡£¡£¡£ÎÀÐÇÁýÕÖµØÇòÍâò»ý40%µÄÌØÕ÷£¬£¬£¬£¬£¬Ê¹µÃÈÎÄÇÀïÓÚÁýÕÖ¹æÄ£ÄÚµÄÖ°Ô±¾ù¿É×èµ²Êý¾Ý¡£¡£¡£¡£¡£¡£¡£ÔÚÈýÄêÑо¿Ê±´ú£¬£¬£¬£¬£¬ÍŶÓÍøÂçµ½´ó×ÚδÊܱ£»£»£»£»£»£»£»¤Í¨Ñ¶£¬£¬£¬£¬£¬°üÀ¨T-Mobile¡¢AT&TÄ«Î÷¸ç¼°Ä«Î÷¸çµçÐÅÓû§µÄͨ»°Óë¶ÌÐÅ£»£»£»£»£»£»£»º½°àÂÿ͵ÄWiFiä¯ÀÀ¼Í¼£»£»£»£»£»£»£»µçÁ¦¹«Ë¾¡¢Ê¯ÓÍÆ½Ì¨µÄÄÚ²¿ÐÅÏ¢£»£»£»£»£»£»£»ÒÔ¼°ÃÀ¹úºÍÄ«Î÷¸ç¾ü·½ÏµÍ³µÄ´«ÊäÄÚÈÝ¡£¡£¡£¡£¡£¡£¡£Ïêϸ̻¶µÄÊý¾Ýº¸ÇÃÀ¹úˮʦ½¢´¬±êʶÓëÍøÂçÊý¾Ý¡¢Ä«Î÷¸ç¾ü·½Ç鱨±¨¸æ¡¢·É»úά»¤ÈÕÖ¾¡¢ÊµÊ±²½¶ÓλÖÃÐÅÏ¢£¬£¬£¬£¬£¬ÉõÖÁÄ«Î÷¸ç¹ú¼ÒµçÁ¦¹«Ë¾µÄÓû§ÐÅÏ¢¡¢ÊÂÇé¶©µ¥¼°Çå¾²±¨¸æ£¬£¬£¬£¬£¬²¿·ÖÃÀ¹ú¹¤Òµ¿ØÖÆÏµÍ³ÔËÐÐÊý¾ÝÒà±»²¶»ñ¡£¡£¡£¡£¡£¡£¡£
https://cybernews.com/security/satellite-surveillance-encryption-research/
3. CapitaÒòÊý¾Ýй¶ÊÂÎñÖ§¸¶1400ÍòÓ¢°÷
10ÔÂ15ÈÕ£¬£¬£¬£¬£¬Ó¢¹úÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©¿ËÈÕ¶ÔÊý¾ÝÇý¶¯ÓªÒµÁ÷³ÌЧÀÍÌṩÉÌCapita´¦ÒÔ1400ÍòÓ¢°÷£¨Ô¼1870ÍòÃÀÔª£©·£¿£¿£¿£¿£¿î£¬£¬£¬£¬£¬ÒòÓÉÊÇ2023Ä걬·¢µÄÒ»ÆðÓ°Ïì660ÍòÈ˵ÄÖØ´óÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£¡£´Ë´Î´¦·ÖÉæ¼°Capita plc¼°Æä×Ó¹«Ë¾Capita Pension Solutions Limited£¬£¬£¬£¬£¬»®·Ö±»·£800ÍòºÍ600ÍòÓ¢°÷£¬£¬£¬£¬£¬½Ï³õʼ4500ÍòÓ¢°÷µÄÄâ·£½ð¶î´ó·ùϵ÷£¬£¬£¬£¬£¬Òò¸Ã¹«Ë¾ÒѼ縺ÔðÈΡ¢ÊµÑéÇ徲ˢв¢×Ô¶¯ÏòÊÜÓ°ÏìÕßÌṩÊý¾Ý±£»£»£»£»£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£¡£¡£¡£×÷ΪӢ¹ú´óÐÍÍâ°üºÍרҵЧÀ͹«Ë¾£¬£¬£¬£¬£¬CapitaÓµÓÐÔ¼3.4ÍòÃûÔ±¹¤¡¢ÄêÊÕÈë´ï30ÒÚÓ¢°÷£¬£¬£¬£¬£¬¿Í»§º¸ÇµØ·½Òé»á¡¢NHS¡¢¹ú·À²¿¼°ÒøÐС¢µçÐŵÈÐÐÒµ¡£¡£¡£¡£¡£¡£¡£ÊÂÎñÔ´ÓÚ2023Äê3ÔÂ22ÈÕÒ»ÃûÔ±¹¤ÏÂÔØ¶ñÒâÎļþ£¬£¬£¬£¬£¬µ¼ÖºڿÍÈëÇÖÆäMicrosoft 365ÇéÐΡ£¡£¡£¡£¡£¡£¡£Ö»¹ÜÎó²îÔÚ10·ÖÖÓÄÚ±»¼ì²â£¬£¬£¬£¬£¬µ«Capitaδʵʱ¸ôÀëÊÜѬȾװ±¸£¬£¬£¬£¬£¬Ê¹¹¥»÷ÕßµÃÒÔÔÚ58СʱÄÚºáÏòÒÆ¶¯£¬£¬£¬£¬£¬×îÖÕÇÔÈ¡½ü1TBÊý¾Ý²¢°²ÅÅÀÕË÷Èí¼þ¡£¡£¡£¡£¡£¡£¡£Black BastaÍÅ»ïÐû³Æ¶Ô´ËÈÏÕæ£¬£¬£¬£¬£¬Íþвй¶Êý¾Ý¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/capita-to-pay-14-million-for-data-breach-impacting-66-million-people/
4. Slider Revolution²å¼þÎó²îÓ°ÏìÊý°ÙÍòWordPressÍøÕ¾
10ÔÂ15ÈÕ£¬£¬£¬£¬£¬»îÔ¾×°Öó¬400ÍòµÄWordPress»¬¿é²å¼þSlider Revolution¿ËÈÕ±»ÆØ³ö±àºÅΪCVE-2025-9217µÄÇå¾²Îó²î£¬£¬£¬£¬£¬Ó°Ïì6.7.36¼°ÒÔÉÏËùÓа汾¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÔ´ÓÚ²å¼þÖС°used_svg¡±ºÍ¡°used_images¡±Á½¸ö²ÎÊýµÄÑé֤ȱÏÝ£¬£¬£¬£¬£¬ÕâÁ½¸ö²ÎÊýÓÃÓÚÖÎÀíͼÏñ/ÊÓÆµµ¼³ö¹¦Ð§¡£¡£¡£¡£¡£¡£¡£ÓÉÓÚδÑÏ¿áÏÞÖÆÎļþÀàÐͺÍ·¾¶£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓôËÎó²î¶ÁȡЧÀÍÆ÷ÉϵÄí§ÒâÎļþ£¬£¬£¬£¬£¬°üÀ¨´æ´¢Êý¾Ý¿âƾ֤ºÍ¼ÓÃÜÃÜÔ¿µÄwp-config.phpÎļþ£¬£¬£¬£¬£¬ÍþÐ²ÍøÕ¾Êý¾ÝÇå¾²¡£¡£¡£¡£¡£¡£¡£Çå¾²ÆÊÎöʦƾ֤ͨÓÃÎó²îÆÀ·Öϵͳ£¨CVSS£©ÆÀ¶¨¸ÃÎó²îΪ6.5·Ö£¬£¬£¬£¬£¬ÊôÓÚÖеÈÑÏÖØÐÔ¡£¡£¡£¡£¡£¡£¡£Îó²îÓÉ×ÔÁ¦Ñо¿Ô±¡°stealthcopter¡±ÓÚ2025Äê8ÔÂ11ÈÕͨ¹ýWordfenceÎó²îÉͽðÍýÏëÊ״α¨¸æ¡£¡£¡£¡£¡£¡£¡£WordfenceÍŶÓÔÚ8ÔÂ19ÈÕÍê³ÉÑéÖ¤ºó£¬£¬£¬£¬£¬½«ÏêÇéת´ï¸ø²å¼þ¿ª·¢ÉÌThemePunch¡£¡£¡£¡£¡£¡£¡£¿£¿£¿£¿£¿ª·¢ÍŶÓѸËÙÏìÓ¦£¬£¬£¬£¬£¬ÔÚÁ½ÌìÄÚÈ·ÈÏÎÊÌâ²¢Æô¶¯ÐÞ¸´ÊÂÇ飬£¬£¬£¬£¬×îÖÕÓÚ8ÔÂ28ÈÕÐû²¼6.7.37°æ±¾³¹µ×ÐÞ¸´Îó²î¡£¡£¡£¡£¡£¡£¡£Îª´Ë£¬£¬£¬£¬£¬Ñо¿Ö°Ô±»ñµÃ656ÃÀÔªµÄÉͽð½±Àø¡£¡£¡£¡£¡£¡£¡£
https://www.infosecurity-magazine.com/news/flaw-slider-revolution-plugin/
5. Î÷°àÑÀʱÉоÞÍ·MANGOת´ïÓªÏúЧÀÍÉÌÊý¾Ýй¶ÊÂÎñ
10ÔÂ15ÈÕ£¬£¬£¬£¬£¬Î÷°àÑÀʱÉÐÁãÊÛÉÌMANGOÏòÈ«Çò¿Í»§·¢ËÍÊý¾Ýй¶֪ͨ£¬£¬£¬£¬£¬Åû¶ÆäÍⲿӪÏúЧÀ͹©Ó¦ÉÌÔâÓöÍøÂç¹¥»÷£¬£¬£¬£¬£¬µ¼Ö²¿·Ö¿Í»§Ð¡ÎÒ˽¼ÒÐÅÏ¢±»²»·¨»á¼û¡£¡£¡£¡£¡£¡£¡£×÷Ϊ½¨ÉèÓÚ1984Äê¡¢ÔÚ120¸ö¹ú¼ÒÓµÓÐ2800¸öÏúÊÛÍøµã¡¢ÄêÊÕÈë33ÒÚÅ·Ôª¡¢Ô±¹¤16300È˵ÄʱÉоÞÍ·£¬£¬£¬£¬£¬MANGO´Ë´ÎÊÂÎñÉæ¼°¿Í»§ÐÕÃû£¨²»º¬ÐÕÊÏ£©¡¢¹ú¼Ò¡¢ÓÊÕþ±àÂë¡¢µç×ÓÓʼþµØµã¼°µç»°ºÅÂëµÈÓªÏú»î¶¯³£ÓÃÊý¾Ý£¬£¬£¬£¬£¬µ«Ã÷ȷɨ³ýÐÕÊÏ¡¢ÒøÐÐÕË»§¡¢ÐÅÓÿ¨ÐÅÏ¢¡¢Éí·ÝÖ¤/»¤ÕÕºÅÂë¼°ÕË»§Æ¾Ö¤µÈ¸ßÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£MANGOÇ¿µ÷£¬£¬£¬£¬£¬Æä½¹µãӪҵϵͳ¼°IT»ù´¡ÉèʩδÊÜÓ°Ï죬£¬£¬£¬£¬¹«Ë¾ÔËÓª¼á³ÖÕý³£¡£¡£¡£¡£¡£¡£¡£ÊÂÎñÔ´ÓÚµÚÈý·½ÓªÏúЧÀÍÉ̵ÄÇå¾²Îó²î£¬£¬£¬£¬£¬¹¥»÷Õßͨ¹ý¸ÃÎó²î»ñÈ¡ÁË´æ´¢ÔÚÓªÏúϵͳÖеĿͻ§Êý¾Ý¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜȱʧÐÕÊϽµµÍÁËÖ±½ÓÉí·ÝµÁÓÃΣº¦£¬£¬£¬£¬£¬µ«Ð¹Â¶µÄÁªÏµ·½·¨ÈÔ¿ÉÄܱ»ÓÃÓÚÍøÂç´¹Âڵȶþ´Î¹¥»÷¡£¡£¡£¡£¡£¡£¡£ÊÂÎñ±¬·¢ºó£¬£¬£¬£¬£¬MANGOÁ¬Ã¦Æô¶¯ËùÓÐÇå¾²ÐÒ飬£¬£¬£¬£¬²¢ÏòÎ÷°àÑÀÊý¾Ý±£»£»£»£»£»£»£»¤¾Ö£¨AEPD£©¼°î¿Ïµ²¿·Ö±¨¸æ¡£¡£¡£¡£¡£¡£¡£ÎªÐÖúÊÜÓ°Ïì¿Í»§£¬£¬£¬£¬£¬¹«Ë¾ÉèÁ¢ÁËרÓÃÓÊÏäºÍÈÈÏߵ绰£¬£¬£¬£¬£¬ÌṩΣº¦×Éѯ֧³Ö¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/clothing-giant-mango-discloses-data-breach-exposing-customer-info/
6. F5ÔâÓö¹ú¼Ò¼¶ºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬Î´¹ûÕæÎó²îÔ´´úÂëÔâÇÔÈ¡
10ÔÂ15ÈÕ£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²¹«Ë¾F5ÓÚ2025Äê8ÔÂ9ÈÕÅû¶ÔâÓö¹ú¼Ò¼¶ºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬¹¥»÷Õߺã¾Ã»á¼ûÆäϵͳ²¢ÇÔÈ¡ÁËÆì½¢²úÆ·BIG-IPµÄδ¹ûÕæÇå¾²Îó²î¼°Ô´´úÂë¡£¡£¡£¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬£¬ºÚ¿ÍÈëÇÖÁËF5µÄBIG-IP²úÆ·¿ª·¢ÇéÐμ°¹¤³Ì֪ʶÖÎÀíÆ½Ì¨£¬£¬£¬£¬£¬ÇÔÈ¡Á˰üÀ¨BIG-IP²¿·ÖÔ´´úÂ롢δ¹ûÕæÎó²îÐÅÏ¢¼°¿Í»§ÉèÖÃϸ½ÚµÄÎļþ¡£¡£¡£¡£¡£¡£¡£Ö»¹Ü±£´æÊý¾Ýй¶£¬£¬£¬£¬£¬µ«F5Ç¿µ÷¹¥»÷ÕßδʹÓÃÕâЩÎó²î¾ÙÐÐÏÖʵ¹¥»÷£¬£¬£¬£¬£¬Ò²Î´·¢Ã÷¹©Ó¦Á´Î£º¦»ò´úÂë±»¸Ä¶¯µÄÖ¤¾Ý£¬£¬£¬£¬£¬ÆäCRM¡¢²ÆÎñ¡¢Ö§³Ö°¸ÀýÖÎÀíµÈ°üÀ¨¿Í»§Êý¾ÝµÄƽ̨¾ùδÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£¡£ÊÂÎñ±¬·¢ºó£¬£¬£¬£¬£¬F5ѸËÙ½ÓÄɵ÷½â²½·¥£ºÂÖ»»Æ¾Ö¤¡¢Ç¿»¯»á¼û¿ØÖÆ¡¢°²ÅÅ×Ô¶¯»¯²¹¶¡ÖÎÀí¹¤¾ß£¬£¬£¬£¬£¬²¢ÔöÇ¿ÍøÂçÇå¾²¼Ü¹¹¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÓëNCC GroupºÍIOActiveÏàÖú£¬£¬£¬£¬£¬Í¨¹ý76ÃûÕÕÁ϶ÔBIG-IPÒªº¦Èí¼þ×é¼þ¼°¿ª·¢Á÷³Ì¾ÙÐÐÇå¾²Éó²é£¬£¬£¬£¬£¬Î´·¢Ã÷¶ñÒâ´úÂëÖ²Èë¡£¡£¡£¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬F5Ðû²¼ÁËÕë¶ÔBIG-IP¡¢F5OSµÈ²úÆ·µÄÇå¾²¸üУ¬£¬£¬£¬£¬½¨Òé¿Í»§ÓÅÏÈ×°ÖÃÒÔÌá·ÀDZÔÚΣº¦£¬£¬£¬£¬£¬²¢ÌṩÍþвÕ÷²ÉÖ¸Äϼ°iHealthÕï¶Ï¹¤¾ßµÄ×Ô¶¯¼ì²é¹¦Ð§¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/hackers-breach-f5-to-steal-undisclosed-big-ip-flaws-source-code/


¾©¹«Íø°²±¸11010802024551ºÅ