CISA½«Wing FTPЧÀÍÆ÷ÐÅϢй¶Îó²îÁÐÈëKEVĿ¼
Ðû²¼Ê±¼ä 2026-03-171. CISA½«Wing FTPЧÀÍÆ÷ÐÅϢй¶Îó²îÁÐÈëKEVĿ¼
3ÔÂ16ÈÕ£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«Wing FTPЧÀÍÆ÷Îó²î£¨±àºÅCVE-2025-47813£¬£¬£¬£¬CVSSÆÀ·Ö4.3£©ÕýʽÄÉÈëÆäÒÑ֪ʹÓÃÎó²î£¨KEV£©Ä¿Â¼¡£¡£¡£¡£¡£¸ÃÎó²îÊôÓÚÐÅϢй¿ààÐÍ£¬£¬£¬£¬Ó°ÏìWing FTP Server 7.4.4֮ǰµÄËùÓа汾£¬£¬£¬£¬Ïêϸ±£´æÓÚloginok.htmlÒ³ÃæµÄWebÉí·ÝÑéÖ¤Á÷³ÌÖС£¡£¡£¡£¡£Æ¾Ö¤CISAÐû²¼µÄͨ¸æ£¬£¬£¬£¬µ±¹¥»÷ÕßÏòЧÀÍÆ÷·¢ËͰüÀ¨³¬³¤ÖµµÄUID cookieʱ£¬£¬£¬£¬»á´¥·¢loginok.htmlÒ³Ãæ·µ»Ø¹ýʧÐÅÏ¢£¬£¬£¬£¬´Ó¶øÐ¹Â¶Ð§ÀÍÆ÷µÄÍêÕûÍâµØ×°Ö÷¾¶¡£¡£¡£¡£¡£Ö»¹Ü¸ÃÎó²îÎÞ·¨Ö±½Óµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬£¬µ«Ð¹Â¶µÄÎļþϵͳÏêϸÐÅÏ¢¿ÉÄܱ»ÓÃÓÚÕì̽»î¶¯£¬£¬£¬£¬½ø¶ø¸¨ÖúʵÑé·¾¶±éÀú¹¥»÷¡¢Îļþ°üÀ¨¹¥»÷µÈºóÐø¹¥»÷ÊֶΣ¬£¬£¬£¬¶ÔϵͳÇå¾²×é³ÉDZÔÚÍþв¡£¡£¡£¡£¡£ÒÀ¾Ý¾ßÓÐÔ¼ÊøÁ¦µÄ²Ù×÷Ö¸ÁBOD£©22-01¡¶½µµÍÒÑÖªÎó²î±»Ê¹ÓõÄÖØ´óΣº¦¡·µÄÒªÇ󣬣¬£¬£¬Áª°îÃñÊÂÖ´ÐÐίԱ»á£¨FCEB£©ÏÂÊô»ú¹¹±ØÐèÔÚ2026Äê3ÔÂ30ÈÕǰÍê³É¸ÃÎó²îµÄÐÞ¸´ÊÂÇ飬£¬£¬£¬ÒÔÌá·ÀKEVĿ¼ÖмͼµÄÎó²î±»¶ñÒâʹÓᣡ£¡£¡£¡£
https://securityaffairs.com/189530/security/u-s-cisa-adds-a-flaw-in-wing-ftp-server-to-its-known-exploited-vulnerabilities-catalog.html
2. Laundry Bear APT×é֯ʹÓÃDRILLAPPºóÃŹ¥»÷ÎÚ¿ËÀ¼»ú¹¹
3ÔÂ16ÈÕ£¬£¬£¬£¬S2 GroupÆìÏÂÇ鱨ÍŶÓLAB52¿ËÈÕÅû¶£¬£¬£¬£¬Ò»¸öÃûΪDRILLAPPµÄÐÂÐͺóÃŻÕýÕë¶ÔÎÚ¿ËÀ¼×é֯ʵÑé¹¥»÷¡£¡£¡£¡£¡£¸Ã»î¶¯ÓÚ2026Äê2Ô±»·¢Ã÷£¬£¬£¬£¬Óë¶íÂÞ˹֧³ÖµÄLaundry Bear APT×éÖ¯£¨ÓÖÃûUAC-0190¡¢Void Blizzard£©±£´æ¹ØÁª£¬£¬£¬£¬Åú×¢¸Ã×éÖ¯Ò»Á¬¶ÔÎÚ¿ËÀ¼¾ÙÐÐÍøÂçÌØ¹¤»î¶¯¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃMicrosoft Edgeä¯ÀÀÆ÷µÄµ÷ÊÔ¹¦Ð§¹æ±Ü¼ì²â¡£¡£¡£¡£¡£µÚÒ»¸öDRILLAPP±äÖÖͨ¹ýLNKÎļþÈö²¥£¬£¬£¬£¬ÔÚÔÝʱÎļþ¼ÐÖн¨ÉèHTMLÎļþ£¬£¬£¬£¬¼ÓÔØÀ´×Ôpastefy.appµÄ»ìÏý¾ç±¾¡£¡£¡£¡£¡£ÓÕ¶üÖ÷Ì⺸ÇStarlink×°ÖÃͼÏñµ½Come Back Alive´ÈÉÆÇëÇ󡣡£¡£¡£¡£ä¯ÀÀÆ÷ÒÔÎÞͷģʽִÐУ¬£¬£¬£¬ÆôÓÃ-no-sandbox¡¢-disable-web-securityµÈ²ÎÊý£¬£¬£¬£¬×Ô¶¯ÊÚÓèÉãÏñÍ·¡¢Âó¿Ë·çºÍÆÁÄ»²¶»ñȨÏÞ£¬£¬£¬£¬ÎÞÐèÓû§½»»¥¡£¡£¡£¡£¡£¹¥»÷Õß¿Éͨ¹ýWebSocket C2ЧÀÍÆ÷¾ÙÐÐÔ¶³Ì¿ØÖÆ£¬£¬£¬£¬ÌìÉú×°±¸Ö¸ÎƲ¢¼ì²âÌØ×¼Ê±Çø¡£¡£¡£¡£¡£µÚ¶þ¸ö±äÖÖ½«LNKÎļþÌæ»»ÎªCPLÎļþ£¬£¬£¬£¬ÓÕ¶ü°üÀ¨ÎäÆ÷½É»ñ±¨¸æºÍÎÚ¿ËÀ¼¹ú¼ÒÉó¼ÆÊðÄÏ·½°ì¹«ÊÒÎļþ¡£¡£¡£¡£¡£¸Ã±äÖÖÐÂÔöµÝ¹éÎļþÁÐ±í¡¢ÅúÁ¿ÉÏ´«ºÍÔ¶³ÌÎļþÏÂÔØ¹¦Ð§¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃChrome DevTools ProtocolÈÆ¹ýJavaScriptÏÂÔØÏÞÖÆ£¬£¬£¬£¬Í¨¹ýremote-debugging¶Ë¿ÚÐÞ¸ÄÏÂÔØÂ·¾¶²¢×¢Èë¾ç±¾Ä£ÄâÓû§µã»÷¡£¡£¡£¡£¡£
https://securityaffairs.com/189519/malware/russia-linked-apt-uses-drillapp-backdoor-to-spy-on-ukrainian-targets.html
3.Ò½ÁÆ»úеÈ˹«Ë¾IntuitiveÔâ´¹ÂÚ¹¥»÷ÖÂÊý¾Ýй¶
3ÔÂ16ÈÕ£¬£¬£¬£¬Ò½ÁÆ»úеÈËÊÖÊõÊÖÒÕ¹«Ë¾Intuitive¿ËÈÕÐû²¼£¬£¬£¬£¬Î´¾ÊÚȨµÄ¹¥»÷Õßͨ¹ý´¹ÂÚ¹¥»÷ÇÔȡԱ¹¤Æ¾Ö¤ºó£¬£¬£¬£¬ÀÖ³ÉÈëÇÖÆä²¿·ÖÄÚ²¿ITÓªÒµÓ¦ÓóÌÐò¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÊÇ»úеÈ˸¨ÖúÊÖÊõƽ̨µÄÁìÏÈÖÆÔìÉÌ£¬£¬£¬£¬Ö÷Òª²úÆ·°üÀ¨da VinciÊÖÊõϵͳºÍÓÃÓڷλî¼ìµÄIonÇ»ÄÚϵͳ¡£¡£¡£¡£¡£Ð¹Â¶µÄÊý¾Ý°üÀ¨²¿·Ö¿Í»§ÓªÒµºÍÁªÏµÐÅÏ¢£¬£¬£¬£¬ÒÔ¼°IntuitiveÔ±¹¤ºÍÆóÒµÊý¾Ý¡£¡£¡£¡£¡£¹«Ë¾ÌåÏÖ£¬£¬£¬£¬´Ë´ÎÍøÂçÈëÇÖ¶ÔÆä»úеÈËϵͳƽ̨»òʹÓÃÆäϵͳµÄҽԺûÓÐÔì³ÉÔËÓªÓ°Ïì¡£¡£¡£¡£¡£IntuitiveÇ¿µ÷£¬£¬£¬£¬Æä»úеÈËϵͳӵÓÐ×ÔÁ¦µÄÇå¾²ÐÒ飬£¬£¬£¬Ó빫˾ÄÚ²¿ÓªÒµÍøÂçÏ໥¸ôÀë¡£¡£¡£¡£¡£IntuitiveÌåÏÖÒÑ¶ÔÆäÍøÂç»ù´¡ÉèÊ©¾ÙÐзֶΣ¬£¬£¬£¬ËùÓÐÖ§³ÖÄÚ²¿ITӪҵϵͳ¡¢ÖÆÔìÔËÓªºÍÊý×Ö²úÆ·µÄ»ù´¡ÉèÊ©¾ù¼á³Ö×ÔÁ¦¡£¡£¡£¡£¡£ÓÉÓÚÕâÖÖÍøÂç·Ö¶Î²½·¥£¬£¬£¬£¬¹«Ë¾µÄda Vinci¡¢IonºÍÊý×ÖÆ½Ì¨Î´ÊÜ´Ë´Îй¶ӰÏ죬£¬£¬£¬¼ÌÐøÇå¾²ÔËÐС£¡£¡£¡£¡£Ò½Ôº¿Í»§ÍøÂçÓëIntuitiveÍøÂç¼á³Ö×ÔÁ¦£¬£¬£¬£¬Óɿͻ§ITÍŶÓÖÎÀíºÍ±£»£»£»£»£»£»£»¤£¬£¬£¬£¬Òò´ËҲδÊÜÓ°Ïì¡£¡£¡£¡£¡£·¢Ã÷ÈëÇֺ󣬣¬£¬£¬IntuitiveÒѽÓÄɽôÆÈ²½·¥¿ØÖÆÐ¹Â¶²¢Õö¿ªÊӲ죬£¬£¬£¬ÏÖÔÚÊÓ²ìÈÔÔÚ¾ÙÐÐÖС£¡£¡£¡£¡£
https://www.theregister.com/2026/03/16/robotics_surgical_biz_intuitive_discloses/
4. Ò½ÁƿƼ¼¾ÞÍ·StrykerÔâºÚ¿Í¹¥»÷ÖÂÊýÍò×°±¸±»²Á³ý
3ÔÂ16ÈÕ£¬£¬£¬£¬Ò½ÁÆÊÖÒÕ¾ÞÍ·Stryker¿ËÈÕÅû¶£¬£¬£¬£¬ÉÏÖܱ¬·¢µÄÍøÂç¹¥»÷½öÏÞÓÚÆäÄÚ²¿MicrosoftÇéÐΣ¬£¬£¬£¬¹¥»÷ÕßÔ¶³Ì²Á³ýÁËÊýÍǫ̀Ա¹¤×°±¸¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÖÜÈÕ¸üÐÂÌåÏÖ£¬£¬£¬£¬ËùÓÐÒ½ÁÆ×°±¸¾ù¿ÉÇ徲ʹÓ㬣¬£¬£¬µ«µç×Ó¶©¹ºÏµÍ³ÈÔÀëÏߣ¬£¬£¬£¬¿Í»§Ðèͨ¹ýÏúÊÛ´ú±íÊÖ¶¯Ïµ¥¡£¡£¡£¡£¡£StrykerÇ¿µ÷´Ë´ÎÊÂÎñ²¢·ÇÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬ÍþвÐÐΪÕßδÔÚÆäϵͳÉϰ²ÅÅÈκζñÒâÈí¼þ¡£¡£¡£¡£¡£¹¥»÷ÕßHandalaºÚ¿Í×éÖ¯Éù³Æ²Á³ýÁËÁè¼Ý20Íǫ̀ϵͳ¡¢Ð§ÀÍÆ÷ºÍÒÆ¶¯×°±¸£¬£¬£¬£¬²¢ÇÔÈ¡ÁË50TBÊý¾Ý£¬£¬£¬£¬µ«ÊÓ²ìְԱδ·¢Ã÷Êý¾ÝÍâй¼£Ï󡣡£¡£¡£¡£¹¥»÷±¬·¢ºó£¬£¬£¬£¬¶à¹úStrykerÔ±¹¤Í¶Ë߯äÍйÜ×°±¸ÔÚÒ»Ò¹Ö®¼ä±»Ô¶³Ì²Á³ý¡£¡£¡£¡£¡£²¿·Ö½«Ð¡ÎÒ˽¼Ò×°±¸½ÓÈë¹«Ë¾ÍøÂçµÄÔ±¹¤ÔÚ²Á³ýÀú³ÌÖÐɥʧÁËСÎÒ˽¼ÒÊý¾Ý¡£¡£¡£¡£¡£ÊìϤ¹¥»÷µÄÐÂÎÅÈËʿ͸¶£¬£¬£¬£¬ÍþвÐÐΪÕßʹÓÃMicrosoftÔÆ¶Ë¶ËµãÖÎÀíЧÀÍIntuneÖеIJÁ³ýÏÂÁ£¬£¬£¬ÔÚ3ÔÂ11ÈÕUTCʱ¼ä5:00ÖÁ8:00Ö®¼ä²Á³ýÁ˽ü8Íǫ̀װ±¸¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚÈëÇÖÖÎÀíÔ±ÕË»§²¢½¨ÉèеÄÈ«¾ÖÖÎÀíÔ±ÕË»§ºóÖ´ÐÐÁ˴˲Ù×÷¡£¡£¡£¡£¡£¹«Ë¾ÕýÓëÈ«ÇòÖÆÔì»ùµØÏàÖúÓ¦¶ÔDZÔÚÔËÓªÓ°Ï죬£¬£¬£¬Ä¿½ñÓÅÏÈÊÂÏîÊǻָ´¹©Ó¦Á´ÏµÍ³²¢»Ö¸´¿Í»§¶©µ¥ºÍÔËÊä¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/stryker-attack-wiped-tens-of-thousands-of-devices-no-malware-needed/
5. Microsoft Exchange Online¹ÊÕÏÖÂÓû§ÎÞ·¨»á¼ûÓÊÏä
3ÔÂ16ÈÕ£¬£¬£¬£¬Microsoft¿ËÈÕÈ·ÈÏÆäExchange OnlineЧÀͱ¬·¢¹ÊÕÏ£¬£¬£¬£¬µ¼Ö¿ͻ§ÎÞ·¨»á¼ûÓÊÏäºÍÈÕÀú¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚUTCʱ¼äÉÏÎç6:42ÈÏ¿ÉÎÊÌ⣬£¬£¬£¬ÌåÏÖÕýÔÚÊӲ첿·ÖÓû§Í¨¹ýÒ»ÖÖ»ò¶àÖÖÅþÁ¬ÒªÌå»á¼ûExchange OnlineÓÊÏäʱÓöµ½µÄÎÊÌâ¡£¡£¡£¡£¡£Æ¾Ö¤Microsoft 365ÖÎÀíÖÐÐĸüР(EX1253275)£¬£¬£¬£¬Outlook on the web¡¢Outlook×ÀÃæ¿Í»§¶Ë¡¢Exchange ActiveSync¼°ÆäËûExchange OnlineÅþÁ¬ÐÒé¾ùÊܴ˹ÊÕÏÓ°Ïì¡£¡£¡£¡£¡£MicrosoftÌåÏÖÒ£²âÊý¾ÝÏÔʾÊÜÓ°ÏìÓû§µÄÎÊÌâÒѲ»ÔÙ±¬·¢£¬£¬£¬£¬¹¤³Ìʦ¼ÌÐø¼à¿ØÐ§ÀÍ¿µ½¡×´Ì¬ÒÔÆÀ¹ÀÊÇ·ñÐèÒª½ÓÄÉÌØÊâ²½·¥È·±£Ò»Á¬»Ö¸´£¬£¬£¬£¬µ«¿Í»§ÈÔ±¨¸æÎÞ·¨»á¼ûµç×ÓÓʼþ¡£¡£¡£¡£¡£¹ÊÕϱ¬·¢Ç°£¬£¬£¬£¬Office.comÃÅ»§ÍøÕ¾ÔøÏÔʾ"Ç¸ØÆ£¬£¬£¬£¬·ºÆðÎÊÌ⣬£¬£¬£¬ÇëʵÑéË¢ÐÂÒ³Ãæ"µÄ¹ýʧÐÅÏ¢¡£¡£¡£¡£¡£Microsoft»¹ÔÚÊÓ²ìÁíÒ»×ÔÁ¦¹ÊÕÏ£¬£¬£¬£¬¸Ã¹ÊÕÏÓ°ÏìMicrosoft 365 CopilotÍøÒ³µÇÂ¼Ò³Ãæ¼°office.com/chat¡¢m365.cloud.microsoft¡¢m365.cloud.microsoft/chatºÍcopilot.cloud.microsoftµÈCopilotÍøÒ³¿Í»§¶Ë¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/microsoft/microsoft-exchange-online-outage-blocks-access-to-mailboxes/
6. AWS Bedrock´úÂëÚ¹ÊÍÆ÷Îó²î¿ÉÖÂÃô¸ÐÊý¾Ýй¶
3ÔÂ16ÈÕ£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷Amazon Web Services(AWS) ¹¤¾ßÖб£´æÒ»¸öÎó²î£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÇÔÈ¡¹«Ë¾Ãô¸ÐÊý¾Ý¡£¡£¡£¡£¡£BeyondTrustÆìÏÂPhantom LabsµÄÑо¿Ö°Ô±½«ÊÓ²ìÖØµã·ÅÔÚAWS Bedrock AgentCore Code InterpreterÉÏ¡£¡£¡£¡£¡£AWS BedrockÊÇÓÃÓÚ¹¹½¨AIÓ¦ÓóÌÐòµÄƽ̨£¬£¬£¬£¬¶øAgentCore Code InterpreterÔÊÐí̸Ìì»úеÈ˱àдºÍÔËÐдúÂëÒÔÖ´ÐÐÊý¾ÝÆÊÎöºÍÅÌËãµÈʹÃü¡£¡£¡£¡£¡£Îª±£»£»£»£»£»£»£»¤ÏµÍ³Çå¾²£¬£¬£¬£¬AWSʹÓÃSandboxģʽ×÷ΪÊý×Ö¸ôÀëÊÒ£¬£¬£¬£¬×èÖ¹AI´úÂëÓëÍⲿÌìÏÂͨѶ¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬Ê×ϯÑо¿Ô±Kinnaird McQuade·¢Ã÷£¬£¬£¬£¬Ö»¹ÜɳºÐ×èÖ¹Á˴󲿷ÖÁ÷Á¿£¬£¬£¬£¬µ«ÈÔÔÊÐíDNSÅÌÎÊ£¬£¬£¬£¬ÌØÊâÊÇAºÍAAAA¼Í¼¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¤Êµ£¬£¬£¬£¬¹¥»÷Õ߿ɽ«ÇÔÈ¡µÄÊý¾Ý»òÉñÃØÏÂÁîÒþ²ØÔÚÕâЩDNSÇëÇóÖС£¡£¡£¡£¡£ÍŶӹ¹½¨ÁËÒ»¸öϵͳ£¬£¬£¬£¬Í¨¹ýÕâЩÅÌÎÊÔËÐÐÊý¾Ý£¬£¬£¬£¬Óë±»¸ôÀëµÄAI¾ÙÐÐʵʱ˫ÏòͨѶ£¬£¬£¬£¬ÓÐÓÃÈÆ¹ýÁËAWSÔÊÐíµÄÇå¾²¸ôÀë¡£¡£¡£¡£¡£AWS½¨ÒéÇл»ÖÁVPCģʽÒÔ»ñµÃ¸üºÃ¿ØÖÆ£¬£¬£¬£¬²¢È·±£AI¹¤¾ß½öÓµÓÐ×îµÍÐëҪȨÏÞ¡£¡£¡£¡£¡£
https://hackread.com/data-leak-risk-in-aws-bedrock-ai-code-interpreter/


¾©¹«Íø°²±¸11010802024551ºÅ