Modular DS²å¼þ¸ßΣ·ì϶CVE-2026-23550ÔâÀûÓÃ

°ä²¼¹¦·ò 2026-01-19

1. Modular DS²å¼þ¸ßΣ·ì϶CVE-2026-23550ÔâÀûÓÃ


1ÔÂ15ÈÕ£¬ÍøÂ簲ȫ×êÑÐÈËÔ±½üÈÕÅû¶£¬WordPress¶àÕ¾µãÖÎÀí²å¼þModular DSµÄ2.5.1¼°¸üÔç°æ±¾´æÔÚÑÏÖØ·ì϶CVE-2026-23550£¬¸Ã·ì϶Òѱ»ºÚ¿ÍÀûÓã¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÔ¶³ÌÈÆ¹ýÈÏÖ¤£¬ÒÔÖÎÀíԱȨÏÞ½Ó¼ûÊÜÓ°ÏìÍøÕ¾¡£¡£Modular DS×÷Ϊһ¿îÖÎÀí¶à¸öWordPressÕ¾µãµÄ¹¤¾ß£¬×°ÖÃÁ¿Òѳ¬4Íò´Î£¬ÆäÖ°ÄÜÔ̺¬Ô¶³Ì¼à¿Ø¡¢¡¢¡¢Ö´ÐиüС¢¡¢¡¢Óû§ÖÎÀí¡¢¡¢¡¢·þÎñÆ÷ÐÅÏ¢½Ó¼û¼°ÊØ»¤¹¤×÷µÈ¡£¡£¾ÝPatchstackÍŶӻ㱨£¬·ì϶³õ´Î¹¥»÷²úÉúÔÚ2026Äê1ÔÂ13ÈÕUTC¹¦·ò02:00×óÓÒ¡£¡£×êÑÐÈËÔ±·¢ÏÖ£¬·ì϶ԴÓÚ²å¼þÔÚÆôÓÃ"Ö±½ÓÒªÇó"ģʽʱ£¬Î´¶ÔÒªÇóÆðÔ´½øÐмÓÃÜÑéÖ¤¼´ÊÓΪ¿ÉÐÅ£¬µ¼ÖÂÃô¸Ð·Óɶ³ö²¢´¥·¢×Ô¶¯ÖÎÀíÔ±µÇ¼»ØÍË»úÖÆ¡£¡£¾ßÌå¶øÑÔ£¬ÔÚsrc/app/Http/Controllers/AuthController.phpµÄgetLogin²½ÖèÖУ¬´úÂë³¢ÊÔ´ÓÒªÇóÌå¶ÁÈ¡Óû§ID£¬ÈôδÌṩÔò×Ô¶¯»ñÈ¡ÏÖÓÐÖÎÀíÔ±»ò³¬µÈÖÎÀíÔ±Óû§²¢µÇ¼£¬Î´¾­Éí·ÝÑéÖ¤µÄÓû§¿ÉÀûÓôËõ辶ʵÏÖȨÏÞÌáÉý¡£¡£Modular DSÔÚÊÕµ½·ì϶»ã±¨ºóÊýСʱÄÚ°ä²¼2.5.2°æ±¾ÐÞ¸´·¨Ê½¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-exploit-modular-ds-wordpress-plugin-flaw-for-admin-access/


2. ÖÐÑëÃåÒòÖÝÒ½ÁƱ£½¡ÖÐÐÄÊý¾Ýй¶ӰÏ쳬14.5Íò»¼Õß


1ÔÂ15ÈÕ£¬ÖÐÑëÃåÒòÖÝÒ½ÁƱ£½¡ÖÐÐĽüÈÕÅûÂ¶Ò»Â·ÖØ´óÊý¾Ý°²È«ÊÂÎñ£¬Ó°Ïì145,381Ãû»¼Õß¡£¡£¸Ã·ÇͶ»úÐÔÒ½ÁÆÏµÍ³ÓÚ2025Äê6ÔÂ1ÈÕ¼ì²âµ½ITϵͳÒì³£»£»î¶¯£¬Ëæ¼´Æô¶¯°²È«¼Ó¹Ì²¢½áºÏµÚÈý·½ÍøÂ簲ȫר¼Ò·¢Õ¹µ÷²é£¬Í¬²½´«µÝ·¨Âɲ¿ÃÅ¡£¡£µ÷²éÓÚ11ÔÂ6ÈÕʵÏÖ£¬È·ÈÏ2025Äê3ÔÂ19ÈÕÖÁ6ÔÂ1ÈÕÆÚ¼ä£¬Î´¾­ÊÚȨµÄµÚÈý·½½Ó¼ûÁËÆäIT»·¾³£¬¿ÉÄÜ»ñÈ¡»¼ÕßÃô¸ÐÐÅÏ¢£¬Ô̺¬ÐÕÃû¡¢¡¢¡¢µ®ÉúÈÕÆÚ¡¢¡¢¡¢Ò½ÖÎÏêÇé¡¢¡¢¡¢·þÎñÈÕÆÚ¡¢¡¢¡¢Ò½ÁÆÌṩÕßÐÕÃû¡¢¡¢¡¢±£ÏÕÐÅÏ¢£¬²¿ÃŲ¡Àý»¹Éæ¼°Éç»á±£ÏÕºÅÂë¡£¡£×÷ΪÃåÒòÖÝÖв¿¼°Î÷²¿µØÓò¹Ø¼üÒ½ÁÆ·þÎñÉÌ£¬¸Ã»ú¹¹ÔËÓª¶à¼ÒÒ½Ôº¡¢¡¢¡¢ÕïËù¼°×¨¿Æ·þÎñ£¬ÊÂÎñÒý·¢¿í·º¹Ø×¢¡£¡£»£»ú¹¹ÓÚ2025Äê7ÔÂ31ÈÕÖÁ12ÔÂ29ÈÕÆÚ¼äͨ¹ýÊéÃæÍ¨Öª¡¢¡¢¡¢ÈÈÏߵ绰¼°ÍøÕ¾²¼¸æ·î¸æÊÜÓ°Ï컼Õߣ¬²¢ÌṩΪÆÚ12¸öÔµÄÃâ·ÑÐÅÓþ±£»£»¤·þÎñ¡£¡£¸Ã·þÎñÓÉTransUnionÆìÏÂCyberScout¹«Ë¾³Ð±££¬º­¸Çµ¥¾ÖÐÅÓþ¼à¿Ø¡¢¡¢¡¢ÊµÊ±ÐÅÓþ»ã±¨¡¢¡¢¡¢ÐÅÓþÆÀ·Öµ÷»»ÌáÐѼ°×Ô¶¯Ú²Æ­ÔöÔ®£¬Ð­ÖúÉí·Ý͵ÇÔÊܺ¦Õß½â¾öÎÊÌâ¡£¡£


https://securityaffairs.com/186959/uncategorized/central-maine-healthcare-data-breach-impacted-over-145000-patients.html


3. WhisperPair·ì϶¶³öÊýÒÚÀ¶ÑÀÉ豸°²È«·çÏÕ


1ÔÂ15ÈÕ£¬Â³ãë´óÑ§ÍÆËã»ú°²È«ÍŶӷ¢Ïֹȸ輱¾çÅä¶ÔºÍ̸´æÔÚ¸ßΣ·ì϶CVE-2025-36911£¨´úºÅWhisperPair£©£¬Ó°ÏìÈ«ÇòÊýÒŲ֧́³Ö¸ÃÖ°ÄܵÄÎÞÏß¶ú»ú¡¢¡¢¡¢¶úÈûºÍÑïÉùÆ÷£¬Éæ¼°Google¡¢¡¢¡¢Jabra¡¢¡¢¡¢JBL¡¢¡¢¡¢Ë÷Äá¡¢¡¢¡¢Ð¡Ã×µÈÊ®Óà¸öÆ·ÅÆ¡£¡£¸Ã·ì϶ԴÓÚÉè±¸ÖÆ×÷É̶Լ±¾çÅä¶ÔºÍ̸µÄ²»µ±ÊµÏÖ£¬¹æ·¶ÒªÇóÉ豸ÔÚ·ÇÅä¶ÔģʽÏÂÓ¦ºöÂÔÅä¶ÔÒªÇ󣬵«ÎÞÊý³§ÉÌÎ´Ç¿ÖÆÖ´Ðд˲鳭£¬µ¼Ö¹¥»÷Õß¿Éδ¾­Óû§ÊÚÈ¨Ç¿ÖÆÅä¶ÔÉ豸¡£¡£¹¥»÷ÕßÀûÓÃÈκÎÀ¶ÑÀÉ豸£¨Èç±Ê¼Ç±¾µçÄÔ¡¢¡¢¡¢Ê÷Ý®ÅÉ»òÊÖ»ú£©£¬ÔÚ14Ã×ÁìÓòÄÚÎÞÐèÓû§½»»¥¼´¿ÉʵÏÖÅä¶Ô¡£¡£Åä¶Ôºó£¬¹¥»÷Õß¿ÉÆëÈ«½ÚÖÆÒôƵÉ豸£º£º£ºÒÔ¸ßÒôÁ¿²¥·ÅÒôƵ×ÌÈÅÓû§£¬»òͨ¹ýÂó¿Ë·çÇÔÌý¶Ô»°¡£¡£¸üÑÏÖØµÄÊÇ£¬Í¨¹ýGoogleµÄFind HubÍøÂ磬¹¥»÷Õ߿ɽ«Êܺ¦ÕßÉ豸°ó¶¨ÖÁ×Ô¼ºµÄGoogleÕË»§£¬ÊµÏÖ¿çÉ豸µØÎ»¸ú×Ù¡£¡£Êܺ¦Õß¿ÉÄÜÊÕµ½É豸×Ô´øµÄ¸ú×Ù֪ͨ£¬µ«ÒòÏÔʾΪ×ÔÉíÉ豸¶øºöÊÓÖҸ棬µ¼Ö³־ÃÒñ±Î¸ú×Ù¡£¡£¹È¸èÏò×êÑÐÈËÔ±·¢·Å1.5ÍòÃÀÔª×î¸ßÉͽ𣬲¢Óë³§É̺Ï×÷ÔÚ150ÌìÅû¶ÆÚÄÚ°ä²¼²¹¶¡¡£¡£


https://www.bleepingcomputer.com/news/security/critical-whisperpair-flaw-lets-hackers-track-eavesdrop-via-bluetooth-audio-devices/


4. ¼ÓÄôóCIROÊý¾Ýй¶²¨¼°75ÍòͶ×ÊÕß


1ÔÂ18ÈÕ£¬¼ÓÄôóͶ×ʼà¹Ü×éÖ¯£¨CIRO£©½üÈÕ֤ʵ£¬È¥Äê8ÔÂÔâ·êµÄÍøÂ簲ȫÊÂÎñ×îÖÕÈ·ÈÏÓ°ÏìÔ¼75ÍòÃû¼ÓÄôóͶ×ÊÕߣ¬³ÉΪ¸Ã¹úÈ¥Äê×îÑÏÖØµÄÍøÂ簲ȫÊÂÎñÖ®Ò»¡£¡£CIRO×÷Ϊ2023Äê³ÉÁ¢µÄ¼ÓÄôóͶ×ÊÂòÂôÉÌ¡¢¡¢¡¢¹²Í¬»ù½ðÂòÂôÉ̼°ÂòÂô»î¶¯µÄ¹ú¶È×ÔÂÉ»ú¹¹£¬ÊǽðÈÚ¼à¹Ü¿ò¼ÜµÄÖ÷ÌâÖ§ÖùÖ®Ò»¡£¡£CIRO·¢ÏÖϵͳ´æÔÚÍøÂ簲ȫÍþвºó£¬Á¢¼´¹Ø±Õ²¿Ãŷǹؼüϵͳ²¢Æô¶¯µ÷²é¡£¡£Ö»¹Ü8ÔÂ18ÈÕ¶ÔÍâÅû¶ÊÂÎñ£¬µ«ÆëȫӰÏìÁìÓòÖ±ÖÁ½ñÄê1ÔÂ14ÈÕʵÏÖ¿í·º·¨Ö¤µ÷²éºó²ÅµÃÒÔÃ÷È·¡£¡£µ÷²éÏÔʾ£¬²¿ÃųÉÔ±¹«Ë¾¼°Æä×¢²áÔ±¹¤µÄСÎÒÐÅÏ¢Ôâй¶£¬¾ßÌåÊý¾ÝÒòÈ˶øÒ죬¿ÉÄÜÔ̺¬µ®ÉúÈÕÆÚ¡¢¡¢¡¢µç»°ºÅÂë¡¢¡¢¡¢ÄêÊÕÈë¡¢¡¢¡¢Éç»á±£ÏÕºÅÂë¡¢¡¢¡¢µ±¾ÖÐû¸æµÄÉí·ÝÖ¤ºÅÂë¡¢¡¢¡¢Í¶×ÊÕË»§ºÅÂë¼°ÕË»§±¨±íµÈÃô¸ÐÐÅÏ¢¡£¡£ÖµÍ×ÌùÐĵÄÊÇ£¬CIROÇ¿µ÷Æäϵͳδ´æ´¢µÇ¼ƾ֤»òÕË»§°²È«ÎÊÌ⣬Òò¶øÕâЩÐÅϢδÊÜÓ°Ïì¡£¡£Îª½µµÍ·çÏÕ£¬CIRO½«ÎªËùÓÐÊÜÓ°ÏìͶ×ÊÕßÌṩΪÆÚÁ½ÄêµÄÃâ·ÑÐÅÓþ¼à¿ØºÍÉí·Ý͵ÇÔ±£»£»¤·þÎñ£¬ÊÜÓ°ÏìÕß½«ÊÕµ½Ö±½Ó֪ͨ¼°×¢²áÖ¸Òý£¬Î´ÊÕµ½Í¨ÖªÕß¿É×Ô¶¯ÁªÏµCIROÈ·ÈÏ״̬¡£¡£


https://www.bleepingcomputer.com/news/security/ciro-data-breach-last-year-exposed-info-on-750-000-canadian-investors/


5. ¶ñÒâGhostPosterä¯ÀÀÆ÷À©´ó·¨Ê½×°ÖÃÁ¿´ï84Íò´Î


1ÔÂ17ÈÕ£¬½üÈÕ£¬×êÑÐÈËÔ±ÔÚChrome¡¢¡¢¡¢FirefoxºÍEdgeÀûÓÃÉ̵êÖз¢ÏÖ17¸öÓëGhostPoster¹¥»÷»î¶¯ÓйصĶñÒâä¯ÀÀÆ÷À©´ó·¨Ê½£¬×Ü×°ÖÃÁ¿´ï84Íò´Î¡£¡£¸Ã»î¶¯×îÔçÓÉKoi SecurityÓÚ2025Äê12ÔÂÅû¶£¬Éæ¼°À©´óͨ¹ýͼ±ê°µ²Ø¶ñÒâJavaScript´úÂ룬¼à¿ØÓû§ä¯ÀÀÆ÷»î¶¯²¢Ö²ÈëºóÃÅ¡£¡£ÕâЩ´úÂë»á´ÓÍⲿ»ñÈ¡»ìºÏµÄÓÐÐ§ÔØºÉ£¬¸ú×Ùä¯ÀÀÐÐΪ£¬½Ù³ÖµçÉÌÆ½Ì¨ÁªÃËÁ´½Ó£¬²¢×¢È벻˽¼ûiframeÖ´Ðиæ°×ڲƭºÍµã»÷ڲƭ¡£¡£LayerXµÄ×îл㱨ָ³ö£¬Ö»¹Ü»î¶¯ÒÑÆØ¹â£¬µ«ÈÔ³ÖÐø»îÔ¾¡£¡£17¸öÀ©´óÖУ¬×°ÖÃÁ¿×î¸ßµÄ"ÓÒ¼üµã»÷¹È¸è·­Òë"´ï52.2Íò´Î£¬"ʹÓÃGoogle·­ÒëÑ¡¶¨Îı¾"´ï15.9Íò´Î£¬ÆäÓàÈç"Ads Block Ultimate""¸¡¶¯²¥·ÅÆ÷"µÈ×°ÖÃÁ¿´ÓÊýǧµ½ÊýÍò²»µÈ¡£¡£»£»î¶¯×î³õÔÚMicrosoft Edgeƽ̨ÌáÒ飬ºóÀ©´óÖÁFirefoxºÍChrome£¬²¿ÃÅÀ©´ó×Ô2020ÄêÆð±ã´æÔÚÓÚ²å¼þÉ̵꣬ÏÔʾÆä³Ö¾ÃÔËÓªµÄ³É¹¦ÐÔ¡£¡£Ä¿Ç°£¬MozillaºÍ΢ÈíÒѽ«ÓйØÀ©´óϼÜ£¬¹È¸èҲȷÈÏChromeÉ̵êÖеÄÕâЩÀ©´óÒѱ»É¾³ý¡£¡£µ«ÒÑ×°ÖõÄÓû§ÈÔÃæ¶Ô·çÏÕ£¬Ðè×Ô¶¯Ð¶Ôز¢¼à¿ØÕË»§Òì³£¡£¡£


https://www.bleepingcomputer.com/news/security/malicious-ghostposter-browser-extensions-found-with-840-000-installs/


6. Fortinet FortiSIEM¸ßΣ·ì϶Ôâ»ý¼«ÀûÓÃ


1ÔÂ16ÈÕ£¬½üÈÕ£¬Fortinet FortiSIEM±»ÆØ´æÔÚÑÏÖØ·ì϶£¨CVE-2025-64155£©£¬Æä¸ÅÄîÑéÖ¤ÀûÓôúÂëÒѹ«¿ª£¬ÇÒÕý±»¹¥»÷Õß»ý¼«ÀûÓᣡ£¸Ã·ì϶ÓÉHorizon3.ai°²È«×êÑÐÔ±Zach Hanley·¢ÏÖ£¬ÐÔÖÊÊDzÙ×÷ϵͳºÅÁî×¢È루CWE-78£©ÓëȨÏÞÌáÉýµÄ×éºÏ£¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õßͨ¹ý¾«ÐÄ»ú¹ØµÄTCPÒªÇóÖ´ÐÐËÁÒâ´úÂ룬×îÖÕ¿É»ñÈ¡root½Ó¼ûȨÏÞ¡£¡£·ì϶ӰÏìFortiSIEM 6.7ÖÁ7.5°æ±¾£¬FortinetÒѰ䲼°²È«¸üУ¬½¨ÒéÓû§Éý¼¶ÖÁ7.4.1¼°ÒÔÉÏ¡¢¡¢¡¢7.3.5¼°ÒÔÉÏ¡¢¡¢¡¢7.2.7¼°ÒÔÉÏ»ò7.1.9¼°ÒÔÉϰ汾£»£»Ê¹Óþɰ汾µÄÓû§ÐèǨáãÖÁÐÞ¸´°æ±¾¡£¡£Ò»Ê±½â¾ö¹æ»®ÎªÏÞ¶ÈphMonitor·þÎñ¶Ë¿Ú£¨7900£©µÄ½Ó¼û£¬ÒÔ»º½âÎÞ·¨Á¢¼´Éý¼¶µÄÇé¿ö¡£¡£¼¼Êõϸ½ÚÏÔʾ£¬·ì϶±¾Ô­ÔÚÓÚphMonitor·þÎñ¶³öµÄÊýÊ®¸öδ¾­ÑéÖ¤µÄÔ¶³Ì¿ÉŲÓúÅÁî´¦Ö÷¨Ê½¡£¡£¹¥»÷Õß¿ÉÀÄÓòÎÊý×¢È븲¸Ç/opt/charting/redishb.shÎļþ£¬´Ó¶øÒÔrootȨÏÞÖ´ÐдúÂë¡£¡£Horizon3.aiÒѰ䲼¼¼ÊõÎÄÕ¼°ÈëÇÖÖ¸±ê£¬ÖÎÀíÔ±¿Éͨ¹ý²é³­/opt/phoenix/log/phoenix.logsÖеÄphMonitorÈÕÖ¾£¬²éÕÒÔ̺¬PHL_ERRORÌõ¿îÖеĶñÒâÔØºÉURLÒÔ¼ø±ðÈëÇÖ¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-now-exploiting-critical-fortinet-fortisiem-vulnerability-in-attacks/