½­É­×Ô¿Ø×îÏÈ֪ͨÊÜ2023ÄêÊý¾Ýй¶ÊÂÎñÓ°ÏìµÄÓû§

Ðû²¼Ê±¼ä 2025-07-03

1. ½­É­×Ô¿Ø×îÏÈ֪ͨÊÜ2023ÄêÊý¾Ýй¶ÊÂÎñÓ°ÏìµÄÓû§


7ÔÂ1ÈÕ£¬È«ÇòÂ¥Óî×Ô¶¯»¯¾ÞÍ·½­É­×Ô¿Ø¿ËÈÕÅû¶£¬Æä2023Äê9ÔÂÔâÊܵÄÀÕË÷Èí¼þ¹¥»÷µ¼ÖÂÁè¼Ý27TBÃô¸ÐÊý¾Ý±»µÁ£¬¹¥»÷ÕßÒªÇóÖ§¸¶5100ÍòÃÀÔªÊê½ðÒÔ»»È¡Êý¾Ý½âÃܺÍɾ³ý¡£´Ë´ÎÊÂÎñʼÓÚ2023Äê2ÔÂÑÇÖÞ·þÎñ´¦ÍøÂç±»ÈëÇÖ£¬¹¥»÷Õßͨ¹ýºáÏòÒÆ¶¯ÉøÍ¸ÖÁ½¹µãϵͳ£¬×îÖÕÔÚ9Ô°²ÅŶ¨ÖÆ»¯ÀÕË÷Èí¼þ£¬¼ÓÃÜVMware ESXiÐéÄâ»ú²¢Ì±»¾Òªº¦»ù´¡ÉèÊ©¡£×÷Ϊ¿ç¹ú¹¤Òµ¼¯ÍÅ£¬½­É­×Ô¿ØÔÚ150¸ö¹ú¼ÒÓµÓÐ10ÍòÃûÔ±¹¤£¬Æä°²·À¡¢Å¯Í¨¿Õµ÷¼°Ïû·ÀϵͳÆÕ±éÓ¦ÓÃÓÚÈ«ÇòµØ±êÐÞ½¨¡£´Ë´Î¹¥»÷µ¼ÖÂÆäÈ«ÇòITϵͳ´ó¹æÄ£å´»ú£¬¿Í»§¶©µ¥´¦Öóͷ£¡¢×°±¸Î¬»¤µÈ½¹µãÓªÒµÖÐÖ¹ÊýÖÜ¡£¹«Ë¾ÏòÃÀ¹ú֤ȯÉúÒâίԱ»á£¨SEC£©Ìá½»µÄÎļþÏÔʾ£¬ÊÂÎñÏìÓ¦ÓëÐÞ¸´±¾Ç®ÒÑ´ï2700ÍòÃÀÔª£¬ÇÒÔ¤¼Æ½«Ò»Á¬ÅÊÉý¡£ÊӲ췢Ã÷£¬¹¥»÷ÕßÇÔÈ¡µÄÊý¾Ýº­¸ÇÔ±¹¤ÐÅÏ¢¡¢¿Í»§ÌõÔ¼¡¢²úÆ·Ñз¢×ÊÁϼ°ÉÌÒµÉñÃØ£¬²¿·ÖÎļþ±»ÉÏ´«ÖÁÃûΪ¡°Dunghill Leaks¡±µÄ°µÍøÐ¹ÃÜÆ½Ì¨¡£ÍøÂçÇ徲ר¼Ò½«´Ë´Î¹¥»÷¹éÒòÓÚDark AngelsÀÕË÷×éÖ¯¡£¹«Ë¾Ç¿µ÷£¬Ö»¹ÜÖ§¸¶ÁË2700ÍòÃÀÔªÓ¦¼±ÓöÈ£¬µ«¾Ü¾øÏòÀÕË÷ÕßÍ×Э£¬ËùÓÐϵͳÒÑͨ¹ý±¸·Ý»Ö¸´ÔËÐС£


https://www.bleepingcomputer.com/news/security/johnson-controls-starts-notifying-people-affected-by-2023-breach/


2. À¶ÑÀ¶ú»ú¸ßΣÎó²îÆØ¹â£¬Ë÷ÄáµÈÆ·ÅÆ×°±¸ÃæÁÙ¼àÌýΣº¦


7ÔÂ1ÈÕ£¬µÂ¹úÍøÂçÇå¾²¹«Ë¾ERNW¿ËÈÕÅû¶£¬È«ÇòÊý°ÙÍǫ̀ʹÓÃAiroha SystemsоƬµÄÀ¶ÑÀ¶ú»ú±£´æÑÏÖØÇå¾²Îó²î£¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÔÚÎÞÐèÅä¶Ô»òÈÏÖ¤µÄÇéÐÎÏÂÍêÈ«¿ØÖÆ×°±¸£¬Ö±½ÓÍþвÓû§Òþ˽Çå¾²¡£´Ë´ÎÎó²îÓ°Ïì¹æÄ£ÆÕ±é£¬º­¸ÇË÷Äá¡¢Bose¡¢Marshall¡¢Jabra¡¢JBLµÈÊ®Óà¸öÖ÷Á÷Æ·ÅÆµÄÊýÊ®¿îÈÈÃÅÐͺÅ£¬°üÀ¨Ë÷ÄáWH-1000XMϵÁнµÔë¶ú»ú¡¢Bose QuietComfort¶úÈû¡¢Marshall STANMORE IIIÒôÏäµÈÊг¡ÍÑÏú²úÆ·¡£Ñо¿ÏÔʾ£¬Îó²î½¹µãÔ´ÓÚAirohaÀ¶ÑÀоƬµÄ×Ô½ç˵ЭÒéȱÏÝ£¨CVE-2025-20702£©¡£¹¥»÷Õß½öÐè´¦ÓÚÀ¶ÑÀÐźÅÁýÕÖ¹æÄ££¨Ô¼10Ã×ÄÚ£©£¬¼´¿Éͨ¹ý¸ÃЭÒéÖ±½Ó¶Áдװ±¸ÄÚ´æ»ò¹Ì¼þ£¬ÊµÏÖ¶ñÒâ´úÂë×¢Èë¡¢¹Ì¼þ¸Ä¶¯µÈ²Ù×÷¡£¸üÑÏËàµÄÊÇ£¬ºÚ¿Í¿Éð³äÒÑÅä¶Ô×°±¸ÏòÓû§ÊÖ»ú·¢ËÍÖ¸ÁÀýÈçÇÔȡͨ»°¼Í¼¡¢ÁªÏµÈËÐÅÏ¢£¬ÉõÖÁÔ¶³Ì²Ù¿ØÂó¿Ë·ç¾ÙÐÐʵʱ¼àÌý¡£Ö»¹ÜÏÖʵ¹¥»÷Ðè½Ï¸ßÊÖÒÕˮƽÇÒÒÀÀµÎïÀíÏà½üÐÔ£¬µ«Õë¶ÔÕþÒª¡¢¼ÇÕß¡¢ÆóÒµ¸ß¹ÜµÈ¸ß¼ÛֵĿµÄµÄDZÔÚΣº¦ÈÔÒý·¢µ£ÐÄ¡£AirohaËäÒÑÓÚ2025Äê6ÔÂÏò³§ÉÌÌṩÐÞ¸´²¹¶¡£¬µ«×°±¸ÖÆÔìÉ̵Ĺ̼þ¸üнø¶ÈÀǼ®²»Æë¡£


https://cybernews.com/security/millions-of-headphones-vulnerable-to-bluetooth-hacks/


3. ¶íÂÞ˹¹ú·À¾ÞÍ·NPO MarsÔâºÚ¿Í¹¥»÷£¬Ë®Ê¦ÉñÃØÊý¾Ýй¶


7ÔÂ1ÈÕ£¬¶íÂÞ˹Áª°î¼¶¹ú·À³Ð°üÉÌNPO Mars¿ËÈÕÔâÓöÑÏÖØÊý¾Ýй¶ÊÂÎñ£¬¹¥»÷ÕßÐû³ÆÇÔÈ¡ÁË250GBÃô¸Ð¾üÊÂÎļþ£¬Éæ¼°¶íÂÞ˹ˮʦ½¹µãÖ¸»Ó¿ØÖÆÏµÍ³¡£Æ¾Ö¤Ñо¿ÍŶӵÄÊӲ죬й¶Êý¾Ý°üÀ¨´ó×Ú±êעΪ¡°¾øÃÜ¡±µÄPDFÎļþºÍÊÖÒÕÊֲᣬ²¿·ÖÎļþ¸üÐÂÖÁ2025Äê3Ô£¬Ö¤Êµ¹¥»÷¾ßÓи߶ÈʱЧÐÔ¡£ÆäÖУ¬ÃûΪ¡°SIGMA-20385¡±µÄ×÷Õ½ÐÅÏ¢Óë¿ØÖÆÏµÍ³ÊÖ²áÓÈΪҪº¦£¬¸ÃϵͳÈÏÕæ¶íÂÞ˹ˮʦ½¢Í§µÄÎÞа¿ØÖÆ¡¢·´Ç±·ÀÓù¼°µ¼µ¯ÎäÆ÷Эͬ¡£¹¥»÷ÕßÐû²¼µÄÊÓÆµ¹ã¸æ¸üÉù³ÆÒÑÈëÇÖ¡°TRASSA¡±×ÛºÏÖ¸»Óϵͳ¼°¡°DIEZ¡±É¨À×ͧ×Ô¶¯¿ØÖÆÏµÍ³£¬ÉõÖÁÑÝʾ¸Ä¶¯¶í¾ü½¢Í§×ø±êÊý¾ÝµÄ²Ù×÷½çÃæ£¬ÌåÏÖÆä¾ß±¸ÊµÊ±×ÌÈÅÄÜÁ¦¡£NPO Mars×÷Ϊ¶íÂÞ˹¾üÊ¿Ƽ¼½¹µãÆóÒµ£¬ÆäÓªÒµÁýÕÖ×Ô¶¯»¯Ö¸»Óϵͳ¡¢×°¼×³µÁ¾¿ØÖÆÆ½Ì¨¼°Ë®Ê¦½¢Í§µç×Ó×°±¸Ñз¢£¬Ô±¹¤¹æÄ£³¬1100ÈË¡£ÊÖÒÕÆÊÎöÏÔʾ£¬¹¥»÷Õß¿ÉÄÜͨ¹ý´¹ÂÚ¹¥»÷»ñÈ¡³õʼ»á¼ûȨÏÞ£¬¼Ì¶øÉøÍ¸ÖÁÄÚÍøÇÔÈ¡ÉñÃØÎĵµ¡£ÖµµÃ×¢ÖØµÄÊÇ£¬Ð¹Â¶Êý¾ÝÑù±¾ÖмȰüÀ¨2017ÄêµÄÀúÊ·Îļþ£¬Ò²º­¸Ç2024Äê¸üеÄÊÖÒÕÊֲᣬÅú×¢¹¥»÷Õ߾߱¸ºã¾ÃDZÔÚÄÜÁ¦¡£


https://cybernews.com/security/russian-defense-contractor-mars-breach-navy/


4. CISA½«TeleMessage TM SGNL¸ßΣÎó²îÄÉÈëKEVĿ¼


7ÔÂ2ÈÕ£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©Õýʽ½«TeleMessage TM SGNLͨѶƽ̨ÖеÄÁ½ÏîÑÏÖØÎó²î£¨CVE-2025-48927¡¢CVE-2025-48928£©ÁÐÈë¡°ÒÑÖª±»Ê¹ÓÃÎó²îĿ¼¡±£¨KEV£©£¬ÒªÇóÁª°î»ú¹¹ÓÚ2025Äê7ÔÂ22ÈÕǰÍê³ÉÐÞ¸´£¬²¢ºôÓõ˽Ӫ²¿·Öͬ²½×Բ顣CVE-2025-48927£¨CVSSÆÀ·Ö5.3£©Ô´ÓÚTeleMessage TM SGNLµÄSpring Boot Actuator×é¼þÉèÖùýʧ£¬µ¼ÖÂÃô¸ÐµÄ/heapdump¶Ñת´¢¶Ëµã̻¶¡£¹¥»÷Õß¿ÉʹÓøÃÎó²îÖ±½Ó»á¼ûÄÚ´æ¿ìÕÕ£¬ÇÔȡδ¼ÓÃܵį¾Ö¤¡¢»á»°ÁîÅÆµÈÃô¸ÐÊý¾Ý¡£CVE-2025-48928£¨CVSSÆÀ·Ö4.0£©ÔòÉæ¼°½¹µãת´¢Îļþ̻¶ÎÊÌ⣬TeleMessage·þÎñµÄJSPÓ¦ÓÃÔÚ´¦Öóͷ£HTTPÇëÇóʱ£¬½«Óû§ÃÜÂëµÈÃ÷ÎÄÐÅÏ¢Ö±½ÓдÈë¶ÑÄÚ´æ¿ìÕÕ£¬ÇÒÎļþȨÏÞ¿ØÖÆÈ±Ê§£¬Ê¹µÃδ¾­ÊÚȨµÄ¹¥»÷Õß¾ù¿É»ñÈ¡ÕâЩÊý¾Ý¡£CISAÔÚͨ¸æÖÐÇ¿µ÷£¬ÕâÁ½¸öÎó²îµÄ×éºÏʹÓÿÉÄÜÐγÉÍêÕû¹¥»÷Á´£º¹¥»÷ÕßÊ×ÏÈͨ¹ýCVE-2025-48927»ñȡϵͳÄÚ´æÊý¾Ý£¬ÔÙʹÓÃCVE-2025-48928ÌáÈ¡´æ´¢µÄÃÜÂ룬´Ó¶øºáÏòÉøÍ¸ÖÁÄÚ²¿ÍøÂç¡£ÖµµÃ¹Ø×¢µÄÊÇ£¬TeleMessage TM SGNL×÷ΪÆóÒµ¼¶Í¨Ñ¶Æ½Ì¨£¬±»¶à¼ÒÁª°î»ú¹¹ÓÃÓÚÃô¸ÐÐÅÏ¢´«Ê䣬Îó²îʹÓÿÉÄܵ¼ÖÂÉñÃØÊý¾Ýй¶»ò¹©Ó¦Á´¹¥»÷¡£


https://securityaffairs.com/179542/hacking/u-s-cisa-adds-telemessage-tm-sgnl-flaws-to-its-known-exploited-vulnerabilities-catalog.html


5. ³¯ÏʺڿͰ²ÅÅNimDoorÖØ´ó¶ñÒâÈí¼þ


7ÔÂ2ÈÕ£¬³¯ÏÊÕþ¸®Åä¾°µÄºÚ¿Í×éÖ¯ÕýʹÓÃÒ»¿îÃûΪNimDoorµÄÐÂÐÍmacOS¶ñÒâÈí¼þ£¬¶ÔÈ«Çòweb3¼°¼ÓÃÜÇ®±ÒÁìÓòÌᳫ¾«×¼¹¥»÷¡£ÍøÂçÇå¾²¹«Ë¾SentinelLabsÔÚ×îб¨¸æÖÐÅû¶£¬¸Ã¹¥»÷Á´Í¨¹ýTelegramÉç½»¹¤³ÌÓÕÆ­Êܺ¦ÕßÔËÐÐαװ³ÉZoom SDK¸üеĶñÒâ³ÌÐò£¬ÆäÊÖÒÕÖØÆ¯ºóÓëÒþ²ØÐԵִﳯÏʺڿ͹¤¾ß¿âµÄȫи߶È¡£Ñо¿ÏÔʾ£¬NimDoor½ÓÄÉC++ÓëNimÓïÑÔ»ìÏý±àÒëµÄ¶þ½øÖÆ×é¼þ£¬ÐγÉÄ£¿é»¯¹¥»÷¿ò¼Ü¡£³õʼѬȾ½×¶Î£¬ÃûΪ"installer"µÄ¶þ½øÖÆÎļþÈÏÕæÏµÍ³ÇéÐΰ²ÅÅ£¬Ö²Èë"GoogIe LLC"ºÍ"CoreKitAgent"Á½¸ö½¹µãÄ£¿é¡£×÷Ϊ½¹µãÔØºÉµÄCoreKitAgentÕ¹ÏÖ³ö¶àÏîÍ»ÆÆÐÔÊÖÒÕ£ºÆäÒ»£¬½ÓÄÉÊÂÎñÇý¶¯¼Ü¹¹£¬Í¨¹ýmacOSµÄkqueue»úÖÆÊµÏÖÒ첽ʹÃüÖÎÀí£»Æä¶þ£¬ÄÚÖÃ10Àý״̬»ú¿ØÖÆÁ÷£¬¿Éƾ֤ÔËÐÐʱÌõ¼þ¶¯Ì¬µ÷½â¹¥»÷Âß¼­£»ÆäÈý£¬¿ª´´ÐÔµØÊ¹ÓûùÓÚÐźŵij¤ÆÚ»¯»úÖÆ¡£ÔÚÊý¾ÝÇÔÈ¡²ãÃæ£¬NimDoor¹¹½¨ÁË˫ͨµÀ¹¥»÷Á´¡£Ö÷Á´Í¨¹ý½âÂëÊ®Áù½øÖÆAppleScript£¬Ã¿30ÃëÏòC2·þÎñÆ÷·¢ËÍϵͳÐű꣬²¢Ö´ÐÐÔ¶³ÌosascriptÏÂÁîʵÏÖÇáÁ¿¼¶ºóÃÅ¿ØÖÆ¡£¸¨ÖúÁ´ÔòʹÓÃ"zoom_sdk_support.scpt"¼ÓÔØÆ÷Æô¶¯WebSocketͨѶ£¬ÏÂÔØuplºÍtlgrmÁ½¸ö¾ç±¾£¬ÐγɴÓϵͳÐÅÏ¢µ½¼ÓÃÜÇ®±ÒÇ®°üµÄÍêÕûÇÔÈ¡Á´Â·¡£


https://www.bleepingcomputer.com/news/security/nimdoor-crypto-theft-macos-malware-revives-itself-when-killed/


6. Ò½ÁÆÆ÷е¹«Ë¾Surmodics±¨¸æÔâÊÜÍøÂç¹¥»÷


7ÔÂ3ÈÕ£¬ÃÀ¹úÒ½ÁÆ×°±¸ÖÆÔìÉÌSurmodics¿ËÈÕÅû¶£¬ÆäÓÚ6ÔÂ5ÈÕÔâÊÜÍøÂç¹¥»÷µ¼Ö²¿·ÖITϵͳ̱»¾£¬³ÉΪ½ñÄêµÚÈý¼ÒÏòÃÀ¹ú֤ȯÉúÒâίԱ»á£¨SEC£©±¨¸æ´ËÀàÊÂÎñµÄÉÏÊÐÒ½ÁÆÆ÷е¹«Ë¾¡£Õâ¼Ò×ܲ¿Î»¾ÓÃ÷ÄáËÕ´ïÖÝµÄÆóÒµ×÷ΪȫÇò×î´óÍâ°üÇ×ˮͿ²ã¹©Ó¦ÉÌ£¬Æä²úÆ·ÆÕ±éÓ¦ÓÃÓÚѪ¹ÜÄÚÒ½ÁÆÆ÷еÒÔ½µµÍĦ²ÁϵÊý¡£¹¥»÷±¬·¢ºó£¬¹«Ë¾ITÍŶÓѸËÙ¼ì²âµ½Òì³£»á¼û²¢×Ô¶¯ÇжÏϵͳ£¬×ª¶øÍ¨¹ýÊÖ¹¤Á÷³Ìά³Ö¿Í»§¶©µ¥´¦Öóͷ£Óë·¢»õ£¬µ«´Ë´ÎÊÂÎñÈÔ̻¶³öÒ½Áƹ©Ó¦Á´Êý×Ö»¯×ªÐÍÖеÄÉî²ãÇå¾²Òþ»¼¡£Æ¾Ö¤SEC±¸°¸Îļþ£¬SurmodicsÔÚÍøÂçÇ徲ר¼ÒЭÖúÏÂÒѲ¿·Ö»Ö¸´Òªº¦ÏµÍ³£¬µ«ºÚ¿ÍÇÔÈ¡Êý¾ÝµÄÏêϸ¹æÄ£ÈÔÔÚÆÀ¹ÀÖС£¹«Ë¾Ê×ϯ²ÆÎñ¹ÙµÙĪÎ÷¡¤°¢Â×˹£¨Timothy Arens£©¾¯Ê¾£¬´Ë´ÎÊÂÎñ´øÀ´µÄΣº¦Ô¶Î´Ïû³ý£º³ýÒ»Á¬¾ÙÐеÄϵͳÐÞ¸´Í⣬ÖÎÀí²ãÐè·ÖÉñÓ¦¶ÔDZÔÚËßËÏ¡¢¿Í»§ÐÅÍÐΣ»ú¼°î¿ÏµÉó²é¡£Ö»¹Ü¹«Ë¾¼á³ÆÎ´·¢Ã÷¿Í»§»òµÚÈý·½Êý¾Ýй¶£¬µ«Ò½ÁÆÐÐÒµ½üÆÚÕûÌåËßËÏÆµ·¢£¬Ê¹µÃSurmodics¶ÔÖ´·¨Î£º¦¼á³Ö¸ß¶ÈСÐÄ¡£


https://therecord.media/surmodics-medical-device-company-reports-cybersecurity-incident