Framework LinuxµçÄÔUEFI°²È«·ìÏ¶ÆØ¹â

°ä²¼¹¦·ò 2025-10-16

1. Framework LinuxµçÄÔUEFI°²È«·ìÏ¶ÆØ¹â


10ÔÂ14ÈÕ£¬£¬ÃÀ¹úÓ²¼þ³§ÉÌFramework³ö²úµÄÔ¼20Íǫ̀LinuxµçÄÔÒò³ö³§Ô¤×°º¬¡°ÄÚ´æÅú¸Ä¡±£¨mm£©ºÅÁîµÄÒÑÊðÃûUEFIÍâ¿Ç×é¼þ£¬£¬´æÔÚÑÏÖØ°²È«·ì϶£¬£¬¿ÉÄܱ»¹¥»÷ÕßÀûÓÃÈÆ¹ý°²È«Æô¶¯±£»£»¤¡£¡£¾Ý¹Ì¼þ°²È«¹«Ë¾Eclypsium·ÖÎö£¬£¬¸ÃmmºÅÁîÕý±¾ÓÃÓڵͼ¶Õï¶ÏºÍ¹Ì¼þµ÷ÊÔ£¬£¬¿ÉÖ±½Ó¶ÁдϵͳÄڴ棬£¬µ«¿É±»ÀÄÓÃÕë¶ÔgSecurity2±äÁ¿£¨UEFIÄ £¿£¿éÊðÃûÑéÖ¤µÄ¹Ø¼ü×é¼þ£©£¬£¬Í¨¹ý¸²¸ÇÆäֵΪNULL»òÖØ¶¨ÏòÖÁÎÞÑéÖ¤º¯Êý£¬£¬´Ó¶ø½ûÓÃÊðÃûÑéÖ¤»úÖÆ¡£¡£¹¥»÷Õß¿Éͨ¹ý´Ë·ì϶¼ÓÔØBlackLotus¡¢¡¢¡¢HybridPetya¡¢¡¢¡¢BootkittyµÈ¶ñÒâÊèµ¼¹¤¾ß°ü£¬£¬ÕâЩ¹¤¾ß¿É¶ã±Ü²Ù×÷ϵͳ¼¶°²È«½ÚÖÆ£¬£¬ÔÚÏµÍ³ÖØ×°ºóÈÔ³ÖÐø´æÔÚ£¬£¬ÐγÉÄÑÒԶϸùµÄÓÆ¾ÃÐÔÍþв¡£¡£·ì϶ӰÏìÁìÓòº­¸ÇFramework 13¼°16ϵÁеĶà¿îÐͺÅ£¬£¬Ô̺¬IntelµÚ11-13´ú¡¢¡¢¡¢AMD Ryzen 7040/AI 300µÈ´¦ÖÃÆ÷°æ±¾£¬£¬¾ßÌåÐÞ¸´°æ±¾ÒÑÃ÷È·£¬£¬Èç13´úIntel°æ±¾ÔÚ3.08°æÐÞ¸´¡¢¡¢¡¢AMD Ryzen AI 300ÔÚ3.04°æÐÞ¸´¡£¡£


https://www.bleepingcomputer.com/news/security/secure-boot-bypass-risk-on-nearly-200-000-linux-framework-sytems/


2. 800ÃÀÔªÉ豸¼´¿ÉÀ¹½ØÎÀÐÇͨѶÊý¾Ý


10ÔÂ14ÈÕ£¬£¬¼ÓÖÝ´óѧʥµØÑǸç·ÖУÓëÂíÀïÀ¼´óѧ½áºÏ×êÑнÒʾ£¬£¬È«ÇòÔ¼°ëÊýÎÀÐÇͨѶÒòδ¼ÓÃÜÃæ¶ÔÑÏÖØ°²È«·çÏÕ£¬£¬½öÐè¼ÛÖµÔ¼800ÃÀÔªµÄÏÖ³ÉÉ豸¼´¿ÉÖ´ÐÐÀ¹½Ø¡£¡£×êÑÐÍŶÓÔÚÊ¥µØÑǸç·ÖУÎݶ¥×é×°ÎÀÐǽӹÜϵͳ£¬£¬Ô̺¬185ÃÀÔªÌìÏßµú¡¢¡¢¡¢140ÃÀÔªÖ§¼Ü¡¢¡¢¡¢195ÃÀÔªÂí´ï¼°230ÃÀÔªµ÷г¿¨£¬£¬³É¹¦¶Ô×¼µØÇòͬ²½ÎÀÐǺ󣬣¬ÊµÊ±²¶»ñÁËδ¼ÓÃܵĸöÈËÊý¾Ý¡£¡£×êÑÐÏÔʾ£¬£¬µçÐÅÔËÓªÉÌͨ¹ýÎÀÐÇÏÎ½ÓÆ«Ô¶»ùÕ¾ÓëÖ÷ÌâÍøÂçʱ£¬£¬Êý¾Ý´«ÊäÆÕ±éδ¼ÓÃÜ¡£¡£ÎÀÐǸ²¸ÇµØÇòÀíÂÛ»ý40%µÄ¸öÐÔ£¬£¬Ê¹µÃÈκδ¦ÓÚ¸²¸ÇÁìÓòÄÚµÄÈËÔ±¾ù¿ÉÀ¹½ØÊý¾Ý¡£¡£ÔÚÈýÄê×êÑÐÆÚ¼ä£¬£¬ÍŶÓÍøÂçµ½´óÁ¿Î´Êܱ£»£»¤Í¨Ñ¶£¬£¬Ô̺¬T-Mobile¡¢¡¢¡¢AT&TÄ«Î÷¸ç¼°Ä«Î÷¸çµçÐÅÓþ»§µÄͨ»°Óë¶ÌÐÅ£»£»º½°à³Ë¿ÍµÄWiFiä¯ÀÀ¼Í¼£»£»µçÁ¦¹«Ë¾¡¢¡¢¡¢Ê¯ÓÍÆ½Ì¨µÄÄÚ²¿ÐÅÏ¢£»£»ÒÔ¼°ÃÀ¹úºÍÄ«Î÷¸ç¾ü·½ÏµÍ³µÄ´«ÊäÄÚÈÝ¡£¡£¾ßÌå¶³öµÄÊý¾Ýº­¸ÇÃÀ¹úˮʦ½¢´¬±êʶÓëÍøÂçÊý¾Ý¡¢¡¢¡¢Ä«Î÷¸ç¾ü·½µý±¨»ã±¨¡¢¡¢¡¢·É»úÊØ»¤ÈÕÖ¾¡¢¡¢¡¢ÊµÊ±¶Ó¸÷λÏàÐÅÏ¢£¬£¬ÉõÖÁÄ«Î÷¸ç¹ú¶ÈµçÁ¦¹«Ë¾µÄÓû§ÐÅÏ¢¡¢¡¢¡¢¹¤×÷¶©µ¥¼°°²È«»ã±¨£¬£¬²¿ÃÅÃÀ¹ú¹¤Òµ½ÚÖÆÏµÍ³ÔËÐÐÊý¾ÝÒà±»²¶»ñ¡£¡£


https://cybernews.com/security/satellite-surveillance-encryption-research/


3. CapitaÒòÊý¾Ýй¶ÊÂÎñÖ§¸¶1400ÍòÓ¢°÷


10ÔÂ15ÈÕ£¬£¬Ó¢¹úÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©½üÈÕ¶ÔÊý¾ÝÇý¶¯ÒµÎñÁ÷³Ì·þÎñÌṩÉÌCapita´¦ÒÔ1400ÍòÓ¢°÷£¨Ô¼1870ÍòÃÀÔª£©· £¿£¿î£¬£¬ÆðÒòÊÇ2023Äê²úÉúµÄһ·ӰÏì660ÍòÈ˵ÄÖØ´óÊý¾Ýй¶ÊÂÎñ¡£¡£Õâ´Î´¦·£Éæ¼°Capita plc¼°Æä×Ó¹«Ë¾Capita Pension Solutions Limited£¬£¬±ðÀë±»·£800ÍòºÍ600ÍòÓ¢°÷£¬£¬½Ï³õʼ4500ÍòÓ¢°÷µÄÄâ·£½ð¶î´ó·ùϵ÷£¬£¬Òò¸Ã¹«Ë¾Òѳе£ÔðÈΡ¢¡¢¡¢Ö´Ðа²È«¸Ä½ø²¢×Ô¶¯ÏòÊÜÓ°ÏìÕßÌṩÊý¾Ý±£»£»¤·þÎñ¡£¡£×÷ΪӢ¹ú´óÐÍÍâ°üºÍרҵ·þÎñ¹«Ë¾£¬£¬CapitaÕ¼ÓÐÔ¼3.4ÍòÃûÔ±¹¤¡¢¡¢¡¢ÄêÊÕÈë´ï30ÒÚÓ¢°÷£¬£¬¿Í»§º­¸Ç´¦ËùÒé»á¡¢¡¢¡¢NHS¡¢¡¢¡¢¹ú·À²¿¼°ÒøÐС¢¡¢¡¢µçÐŵÈÐÐÒµ¡£¡£ÊÂÎñÔ´ÓÚ2023Äê3ÔÂ22ÈÕÒ»ÃûÔ±¹¤ÏÂÔØ¶ñÒâÎļþ£¬£¬µ¼ÖºڿÍÈëÇÖÆäMicrosoft 365»·¾³¡£¡£Ö»¹Ü·ì϶ÔÚ10·ÖÖÓÄÚ±»¼ì²â£¬£¬µ«Capitaδʵʱ¸ôÀëÊÜϰȾÉ豸£¬£¬Ê¹¹¥»÷ÕßµÃÒÔÔÚ58СʱÄÚºáÏòÒÆ¶¯£¬£¬×îÖÕÇÔÈ¡½ü1TBÊý¾Ý²¢²¿ÊðÀÕË÷Èí¼þ¡£¡£Black BastaÍÅ»ïÐû³Æ¶Ô´ËÕÆ¹Ü£¬£¬Íþвй¶Êý¾Ý¡£¡£


https://www.bleepingcomputer.com/news/security/capita-to-pay-14-million-for-data-breach-impacting-66-million-people/


4. Slider Revolution²å¼þ·ì϶ӰÏìÊý°ÙÍòWordPressÍøÕ¾


10ÔÂ15ÈÕ£¬£¬»îÔ¾×°Öó¬400ÍòµÄWordPress»¬¿é²å¼þSlider Revolution½üÈÕ±»ÆØ³ö±àºÅΪCVE-2025-9217µÄ°²È«·ì϶£¬£¬Ó°Ïì6.7.36¼°ÒÔÉÏËùÓа汾¡£¡£¸Ã·ì϶ԴÓÚ²å¼þÖС°used_svg¡±ºÍ¡°used_images¡±Á½¸ö²ÎÊýµÄÑé֤ȱµã£¬£¬ÕâÁ½¸ö²ÎÊýÓÃÓÚÖÎÀíͼÏñ/ÊÓÆµµ¼³öÖ°ÄÜ¡£¡£ÓÉÓÚδÑϸñÏÞ¶ÈÎļþÀàÐͺÍõè¾¶£¬£¬¹¥»÷Õß¿ÉÀûÓô˷ì϶¶ÁÈ¡·þÎñÆ÷ÉϵÄËÁÒâÎļþ£¬£¬Ô̺¬´æ´¢Êý¾Ý¿âÍ´´¦ºÍ¼ÓÃÜÃÜÔ¿µÄwp-config.phpÎļþ£¬£¬ÍþÐ²ÍøÕ¾Êý¾Ý°²È«¡£¡£°²È«·ÖÎöʦƾ¾ÝͨÓ÷ì϶ÆÀ·Öϵͳ£¨CVSS£©ÆÀ¶¨¸Ã·ì϶Ϊ6.5·Ö£¬£¬ÊôÓÚÖеÈÑÏÖØÐÔ¡£¡£·ì϶ÓɶÀÁ¢×êÑÐÔ±¡°stealthcopter¡±ÓÚ2025Äê8ÔÂ11ÈÕͨ¹ýWordfence·ì϶Éͽð´òËã³õ´Î»ã±¨¡£¡£WordfenceÍŶÓÔÚ8ÔÂ19ÈÕʵÏÖÑéÖ¤ºó£¬£¬½«ÏêÇé´«µÝ¸ø²å¼þ¿ª·¢ÉÌThemePunch¡£¡ £¿£¿ª·¢ÍŶÓѸËÙÏìÓ¦£¬£¬ÔÚÁ½ÌìÄÚÈ·ÈÏÎÊÌâ²¢Æô¶¯ÐÞ¸´¹¤×÷£¬£¬×îÖÕÓÚ8ÔÂ28ÈÕ°ä²¼6.7.37°æ±¾³¹µ×ÐÞ¸´·ì϶¡£¡£Îª´Ë£¬£¬×êÑÐÈËÔ±»ñµÃ656ÃÀÔªµÄÉͽð¼Î½±¡£¡£


https://www.infosecurity-magazine.com/news/flaw-slider-revolution-plugin/


5. Î÷°àÑÀʱÉоÞÍ·MANGO´«µÝÓªÏú·þÎñÉÌÊý¾Ýй¶ÊÂÎñ


10ÔÂ15ÈÕ£¬£¬Î÷°àÑÀʱÉÐÁãÊÛÉÌMANGOÏòÈ«Çò¿Í»§·¢ËÍÊý¾Ýй¶֪ͨ£¬£¬Åû¶ÆäÍⲿӪÏú·þÎñ¹©¸øÉÌÔâ·êÍøÂç¹¥»÷£¬£¬µ¼Ö²¿Ãſͻ§Ð¡ÎÒÐÅÏ¢±»·¸·¨½Ó¼û¡£¡£×÷Ϊ³ÉÁ¢ÓÚ1984Äê¡¢¡¢¡¢ÔÚ120¸ö¹ú¶ÈÕ¼ÓÐ2800¸öÏúÊÛÍøµã¡¢¡¢¡¢ÄêÊÕÈë33ÒÚÅ·Ôª¡¢¡¢¡¢Ô±¹¤16300È˵ÄʱÉоÞÍ·£¬£¬MANGOÕâ´ÎÊÂÎñÉæ¼°¿Í»§ÐÕÃû£¨²»º¬ÐÕÊÏ£©¡¢¡¢¡¢¹ú¶È¡¢¡¢¡¢ÓÊÕþ±àÂë¡¢¡¢¡¢µç×ÓÓʼþµØÖ·¼°µç»°ºÅÂëµÈÓªÏú»î¶¯³£ÓÃÊý¾Ý£¬£¬µ«Ã÷È·ÅųýÐÕÊÏ¡¢¡¢¡¢ÒøÐÐÕË»§¡¢¡¢¡¢ÐÅÓþ¿¨ÐÅÏ¢¡¢¡¢¡¢Éí·ÝÖ¤/»¤ÕÕºÅÂë¼°ÕË»§Æ¾Ö¤µÈ¸ßÃô¸ÐÐÅÏ¢¡£¡£MANGOÇ¿µ÷£¬£¬ÆäÖ÷ÌâÒµÎñϵͳ¼°IT»ù´¡ÉèʩδÊÜÓ°Ï죬£¬¹«Ë¾ÔËӪά³ÖÕý³£¡£¡£¡£¡£ÊÂÎñÔ´ÓÚµÚÈý·½ÓªÏú·þÎñÉ̵ݲȫ·ì϶£¬£¬¹¥»÷Õßͨ¹ý¸Ã·ì϶»ñÈ¡ÁË´æ´¢ÔÚÓªÏúϵͳÖеĿͻ§Êý¾Ý¡£¡£Ö»¹ÜȱʧÐÕÊϽµµÍÁËÖ±½ÓÉí·ÝµÁÓ÷çÏÕ£¬£¬µ«Ð¹Â¶µÄÁªÏµ·½Ê½ÈÔ¿ÉÄܱ»ÓÃÓÚÍøÂç´¹µöµÈ¶þ´Î¹¥»÷¡£¡£ÊÂÎñ²úÉúºó£¬£¬MANGOÁ¢¼´Æô¶¯ËùÓа²È«ºÍ̸£¬£¬²¢ÏòÎ÷°àÑÀÊý¾Ý±£»£»¤¾Ö£¨AEPD£©¼°¼à¹Ü²¿ÃŻ㱨¡£¡£ÎªÐ­ÖúÊÜÓ°Ïì¿Í»§£¬£¬¹«Ë¾ÉèÁ¢ÁËרÓÃÓÊÏäºÍÈÈÏߵ绰£¬£¬Ìṩ·çÏÕÕ÷ѯ֧³Ö¡£¡£


https://www.bleepingcomputer.com/news/security/clothing-giant-mango-discloses-data-breach-exposing-customer-info/


6. F5Ôâ·ê¹ú¶È¼¶ºÚ¿ÍÈëÇÖ£¬£¬Î´¹«¿ª·ì϶Դ´úÂëÔâÇÔÈ¡


10ÔÂ15ÈÕ£¬£¬ÃÀ¹úÍøÂ簲ȫ¹«Ë¾F5ÓÚ2025Äê8ÔÂ9ÈÕÅû¶Ôâ·ê¹ú¶È¼¶ºÚ¿ÍÈëÇÖ£¬£¬¹¥»÷Õ߳־ýӼûÆäϵͳ²¢ÇÔÈ¡ÁËÆì½¢²úÆ·BIG-IPµÄδ¹«¿ª°²È«·ì϶¼°Ô´´úÂë¡£¡£µ÷²éÏÔʾ£¬£¬ºÚ¿ÍÈëÇÖÁËF5µÄBIG-IP²úÆ·¿ª·¢»·¾³¼°¹¤³Ì֪ʶÖÎÀíÆ½Ì¨£¬£¬ÇÔÈ¡ÁËÔ̺¬BIG-IP²¿ÃÅÔ´´úÂë¡¢¡¢¡¢Î´¹«¿ª·ì϶ÐÅÏ¢¼°¿Í»§ÅäÖÃϸ½ÚµÄÎļþ¡£¡£Ö»¹Ü´æÔÚÊý¾Ýй¶£¬£¬µ«F5Ç¿µ÷¹¥»÷ÕßδÀûÓÃÕâЩ·ì϶½øÐÐÏÖʵ¹¥»÷£¬£¬Ò²Î´·¢ÏÖ¹©¸øÁ´·çÏÕ»ò´úÂë±»´Û¸ÄµÄÖ¤¾Ý£¬£¬ÆäCRM¡¢¡¢¡¢²ÆÕþ¡¢¡¢¡¢Ö§³Ö°¸ÀýÖÎÀíµÈÔ̺¬¿Í»§Êý¾ÝµÄƽ̨¾ùδÊÜÓ°Ïì¡£¡£ÊÂÎñ²úÉúºó£¬£¬F5ѸËÙ²ÉÈ¡²¹¾È´ëÊ©£ºÂÖ»»Æ¾Ö¤¡¢¡¢¡¢Ç¿»¯½Ó¼û½ÚÖÆ¡¢¡¢¡¢²¿Êð×Ô¶¯»¯²¹¶¡ÖÎÀí¹¤¾ß£¬£¬²¢¼ÓÇ¿ÍøÂ簲ȫ¼Ü¹¹¡£¡£¸Ã¹«Ë¾ÓëNCC GroupºÍIOActiveºÏ×÷£¬£¬Í¨¹ý76ÃûÕÕ·÷¶ÔBIG-IP¹Ø¼üÈí¼þ×é¼þ¼°¿ª·¢Á÷³Ì½øÐа²È«Éó²é£¬£¬Î´·¢ÏÖ¶ñÒâ´úÂëÖ²Èë¡£¡£Í¬Ê±£¬£¬F5°ä²¼ÁËÕë¶ÔBIG-IP¡¢¡¢¡¢F5OSµÈ²úÆ·µÄ°²È«¸üУ¬£¬½¨Òé¿Í»§ÓÅÏÈ×°ÖÃÒÔ·À±¸Ç±ÔÚ·çÏÕ£¬£¬²¢ÌṩÍþвËÑË÷Ö¸Äϼ°iHealthÕï¶Ï¹¤¾ßµÄ×Ô¶¯²é³­Ö°ÄÜ¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-breach-f5-to-steal-undisclosed-big-ip-flaws-source-code/