CVE-2026-22719·ì϶±»ÄÉÈëCISAÒÑÖªÀûÓÃĿ¼

°ä²¼¹¦·ò 2026-03-04

1. CVE-2026-22719·ì϶±»ÄÉÈëCISAÒÑÖªÀûÓÃĿ¼


3ÔÂ3ÈÕ£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö£¨CISA£©Òѽ«VMware Aria Operationsƽ̨µÄºÅÁî×¢Èë·ì϶CVE-2026-22719ÕýʽÁÐÈë¡°ÒÑÖªÀûÓ÷ì϶£¨KEV£©Ä¿Â¼¡±£¬²¢Ç¿µ÷¸Ã·ì϶Òѱ»ÏÖʵ¹¥»÷ÀûÓᣡ£Æ¾¾ÝVMwareĸ¹«Ë¾²©Í¨°ä²¼µÄVMSA-2026-0001°²È«²¼¸æ£¬¸Ã·ì϶ÓÚ2026Äê2ÔÂ24ÈÕ³õ´ÎÅû¶²¢ÐÞ¸´£¬CVSSÆÀ·Ö´ï8.1£¬±»ÆÀ¶¨Îª¡°ÖØÒª¡±¼¶±ð¡£¡£CISAÒªÇóÁª°îÃñÊ»ú¹¹±ØÐëÔÚ2026Äê3ÔÂ24ÈÕǰʵÏÖ²¹¶¡²¿Êð»òÖ´Ðлº½â´ëÊ©¡£¡£¸Ã·ì϶ԴÓÚδÊÚȨ¹¥»÷Õß¿Éͨ¹ýºÅÁî×¢ÈëÔÚÒ×Êܹ¥»÷µÄAria OperationsϵͳÉÏÖ´ÐÐËÁÒâºÅÁÓÈÆäÔÚ²úƷǨáãÖ§³Ö¹ý³ÌÖпÉÄÜ´¥·¢Ô¶³Ì´úÂëÖ´ÐС£¡£²©Í¨ÔÚ¸üв¼¸æÖÐÈϿɰÑÎȵ½¸Ã·ì϶±»ÀûÓõı¨µÀ£¬µ«°µÊ¾ÎÞ·¨¶ÀÁ¢ÑéÖ¤ÆäÕæÊµÐÔ¡£¡£Ä¿Ç°£¬¼¼Êõϸ½ÚÉÐδ¹«¿ªÅû¶¡£¡£ÎªÓ¦¶Ô·çÏÕ£¬²©Í¨ÌṩÁËÁ½ÖÖ½â¾ö¹æ»®£º£ºÒ»ÊÇÁ¢¼´ÀûÓð²È«²¹¶¡£¡£»£»£»¶þÊÇÖ´ÐÐһʱ»º½â¾ç±¾¡°aria-ops-rce-workaround.sh¡±¡£¡£


https://www.bleepingcomputer.com/news/security/cisa-flags-vmware-aria-operations-rce-flaw-as-exploited-in-attacks/


2. °¢¿ËËÕŵ±´¶ûÃÀ¹úÕ¾µãÔâAnubisÀÕË÷Èí¼þ¹¥»÷


3ÔÂ3ÈÕ£¬ºÉÀ¼¿ç¹úÍ¿ÁϾÞÍ·°¢¿ËËÕŵ±´¶û½üÈÕ֤ʵ£¬ÆäλÓÚÃÀ¹úµÄÒ»´¦Õ¾µãÔâ·êºÚ¿ÍÈëÇÖ²¢Òý·¢Êý¾Ýй¶ÊÂÎñ¡£¡£¸Ã¹«Ë¾½²»°È˰µÊ¾£¬¸Ã°²È«ÊÂÎñÒѵõ½½ÚÖÆ£¬Ó°ÏìÁìÓò½öÏÞÓÚÃÀ¹úµ¥Ò»Õ¾µã£¬ÇÒ¡°Ó°ÏìÓÐÏÞ¡±¡£¡£Ä¿Ç°¹«Ë¾Õý²ÉÈ¡´ëʩ֪ͨ²¢Ö§³ÖÊÜÓ°Ïì·½£¬²¢½«Óë·¨Âɲ¿ÃÅÇ×êǺÏ×÷µ÷²é´ËÊ¡£¡£×÷ΪȫÇò³ÛÃûÍ¿ÁÏÆóÒµ£¬°¢¿ËËÕŵ±´¶ûÕ¼ÓÐ3.5ÍòÃûÔ±¹¤£¬ÄêÊÕÈ볬120ÒÚÃÀÔª£¬ÒµÎñ¸²¸Ç150¶à¸ö¹ú¶È£¬ÆìÏÂÆ·ÅÆÔ̺¬¶àÀÖÊ¿¡¢¡¢¡¢Ð¾¢¡¢¡¢¡¢¹ú¼ÊºÍÓ¢ÌØ°îµÈ¡£¡£¾ÝÀÕË÷Èí¼þÍÅ»ïAnubisÐû³Æ£¬Õâ´Î¹¥»÷ÇÔÈ¡ÁËÔ¼170GBÊý¾Ý£¬Éæ¼°½ü17Íò¸öÎļþ£¬²¢ÔÚÆä°µÍøÐ¹Â¶ÍøÕ¾°ä²¼Á˲¿ÃÅÑù±¾£¬Ô̺¬Óë³ÛÃû¿Í»§µÄ±£ÃܺÍ̸¡¢¡¢¡¢Ô±¹¤¼°¿Í»§µÄµç×ÓÓʼþµØÖ·¡¢¡¢¡¢µç»°ºÅÂë¡¢¡¢¡¢¸öÈËͨѶ¼Í¼¡¢¡¢¡¢»¤ÕÕɨÃè¼þ¡¢¡¢¡¢×ÊÁϲâÊÔÎļþ¼°ÄÚ²¿¼¼Êõ¹æ¸ñ±íµÈÃô¸ÐÐÅÏ¢¡£¡£½ØÖÁ±¨µÀ°ä²¼Ê±£¬Êý¾Ýй¶ÁìÓòÉÐδÆëÈ«¹«¿ª£¬°¢¿ËËÕŵ±´¶ûÒàδй©ÊÇ·ñÓë¹¥»÷Õß½øÐйý½Ó´¥¡£¡£


https://www.bleepingcomputer.com/news/security/paint-maker-giant-akzonobel-confirms-cyberattack-on-us-site/


3. ÒÁÀÊAriomex¼ÓÃÜÇ®±ÒÂòÂôƽ̨ÔâÊý¾Ýй¶


3ÔÂ3ÈÕ£¬ÃÀ¹úÍøÂ簲ȫ¹«Ë¾Resecurity½üÈÕÅû¶£¬ÒÁÀʼÓÃÜÇ®±ÒÂòÂôƽ̨AriomexµÄÊý¾Ý¿â²úÉú´ó¹æÄ£Êý¾Ýй¶£¬Éæ¼°2022ÄêÖÁ2025ÄêÆÚ¼äÖÕ¶ËÓû§µÄСÎÒÐÅÏ¢¡¢¡¢¡¢ÂòÂô¼Í¼¼°²Ù×÷²¼¾°¡£¡£Õâ´Îй¶Ô̺¬11,826±Ê¼Í¼£¬ÆäÖÐÔ¼7,710ÌõÔ´×ÔÒÁÀÊ£¬º­¸ÇÓû§Éí·Ý¡¢¡¢¡¢µç×ÓÓʼþ¡¢¡¢¡¢IPµØÖ·¡¢¡¢¡¢¼ÓÃÜÇ®±ÒÂòÂôÏêÇéµÈÃô¸ÐÐÅÏ¢¡£¡£¾ßÌå°¸ÀýÏÔʾ£¬Óû§Seyyed Younes Shokori BilankouhiÔøÒªÇó¡°ÔÚÒÁÀÊ´óʹ¹ÝЭÖúÏ¡±´æÈë300ÍòÃÀÔª£¬Ramin LakÊÔͼ¶Ò»»500ÍòÃÀÔª£¬¶øÓû§Eyraj JaafariÔòÂŴβɰì¼ÛÖµ10ÍòÃÀÔªµÄÊý×Ö×ʲúµ«Ñ¡Ôñ¡°ÉÔºó¶ÒÏÖ¡±£¬·´Ó³³ö²¿ÃÅÓû§½«Æ½Ì¨×÷Ϊ¡°Êý×ÖÒøÐС±Ê¹ÓõÄÌØµã¡£¡£×¨¼ÒÖ¸³ö£¬²¿ÃÅ´ó¶îÕË»§´æÔÚKYCÈÏ֤ȱʧ»òÐÅÏ¢´Û¸ÄÎÊÌ⣬ÇÒ·¢ÏÖ¶à±Ê¿ÉÒÉÂòÂôÉæ¼°Êý°ÙÍòÃÀÔª¡£¡£Ð¹Â¶Êý¾Ý½øÒ»²½½ÒʾÒÁÀʼÓÃÜÇ®±Ò³ÖÓÐÕ߻ÁìÓò¿í·º£¬Éæ¼°ÃÀ¹ú¡¢¡¢¡¢Ó¢¹ú¡¢¡¢¡¢µÂ¹ú¡¢¡¢¡¢·¨¹ú¡¢¡¢¡¢ºÉÀ¼¡¢¡¢¡¢ÂÞÂíÄáÑÇ¡¢¡¢¡¢¶íÂÞ˹¡¢¡¢¡¢Èðµä¡¢¡¢¡¢ÍÁ¶úÆäµÈ¶à¸ö¹ú¶È£¬Îª×è¶ÏÒÁÀÊ·Å´ûÕß¼°·¸×ï·Ö×Ó½øÈëÍâÑóÊг¡ÌṩÁËÏßË÷¡£¡£Resecurityͨ¹ý¼¼Êõ¼¿Á©¸´Ô­ÁËȱʧ×ֶΣ¬²¢ÀûÓÃAI¹¹½¨Óû§»­Ïñ£¬·¢ÏÖй¶±¾Ô­¿ÉÄÜΪ¿Í»§Ö§³ÖϵͳÔâÈëÇÖ¡£¡£


https://securityaffairs.com/188848/digital-id/ariomex-iran-based-crypto-exchange-suffers-data-leak.html


4. LexisNexisÔâºÚ¿Í¹¥»÷Öµ±¾Ö¹ÍÔ±Êý¾Ýй¶


3ÔÂ3ÈÕ£¬ÃÀ¹ú˾·¨ÓëóÒ×ÐÅÏ¢¾ÞÍ·LexisNexis Legal & Professional½üÈÕ֤ʵÔâ·êÖØ´óÊý¾Ýй¶ÊÂÎñ¡£¡£º£ºÚ¿Í×éÖ¯FulcrumSecÔÚµØÏÂÂÛ̳й¶2GBÎļþºó£¬¸Ã¹«Ë¾µ÷²éÈ·ÈÏ£¬¹¥»÷Õßͨ¹ýδÐÞ¸´µÄReactǰ¶ËÀûÓ÷ì϶£¨React2Shell£©ÇÖÈëÆäAWS»ù´¡ÉèÊ©£¬»ñÈ¡ÁË536¸öRedshift±í¡¢¡¢¡¢430¸öVPCÊý¾Ý¿â±í¡¢¡¢¡¢53¸öAWSÃÜÔ¿Ã÷ÎÄ¡¢¡¢¡¢390ÍòÌõÊý¾Ý¿â¼Í¼¼°21,042¸ö¿Í»§ÕË»§µÈ½á¹¹»¯Êý¾Ý¡£¡£Õâ´ÎÊÂÎñÉæ¼°Ô¼40Íò¸öÔÆ¶ËÓû§ÅäÖÃÎļþ£¬Ô̺¬ÕæÊµÐÕÃû¡¢¡¢¡¢ÓÊÏä¡¢¡¢¡¢µç»°¼°Ö°ÎñµÈ»ù´¡ÐÅÏ¢¡£¡£ÓÈΪÒýÈ˹Ø×¢µÄÊÇ£¬118¸ö.govÓòÃûÕË»§±»ÆØÊôÓÚÃÀ¹úµ±¾Ö¹ÍÔ±¡¢¡¢¡¢Áª°î·¨¹Ù¡¢¡¢¡¢Ë¾·¨ÖúÀí¡¢¡¢¡¢Ë¾·¨²¿ÂÉʦ¼°SEC¹¤×÷ÈËÔ±¡£¡£FulcrumSecÆ·ÆÀLexisNexis°²È«´ëÊ©´æÔÚÑÏÖØÈ±µã£¬µ¥¸öECS¹¤×÷½ÇÉ«¿É¶ÁÈ¡ËùÓÐÃÜÔ¿£¬Ô̺¬³ö²ú»·¾³RedshiftÖ÷ƾ֤¡£¡£LexisNexisÇ¿µ÷£¬±»µÁÊý¾Ý¶àΪ2020ÄêǰµÄ¹ýÆÚÐÅÏ¢£¬²»Ô̺¬Éç±£º£ºÅ¡¢¡¢¡¢¼ÝÕպ𢡢¡¢²ÆÕþÐÅÏ¢¡¢¡¢¡¢ÓÐЧÃÜÂë»ò¿Í»§ËÑË÷²éÎʵÈÃô¸ÐÄÚÈÝ¡£¡£¹«Ë¾ÒÑ֪ͨ·¨Âɲ¿ÃŲ¢ÀñƸÍⲿר¼ÒЭÖúµ÷²é£¬Í¬Ê±ÏòÏÖÓм°Ç°¿Í»§´«µÝÊÂÎñ¡£¡£


https://www.bleepingcomputer.com/news/security/lexisnexis-confirms-data-breach-as-hackers-leak-stolen-files/


5. ÏÄÍþÒÄ´óѧ°©Ö¢ÖÐÐÄÔâÀÕË÷Èí¼þ¹¥»÷


3ÔÂ3ÈÕ£¬ÀÕË÷Èí¼þÍÅ»ï2025Äê8ÔÂÈëÇÖÏÄÍþÒÄ´óѧ°©Ö¢ÖÐÐÄÊ¢Ðв¡Ñ§²¿ÃÅ£¬ÇÔÈ¡½ü120ÍòÈ˵ÄÃô¸ÐÊý¾Ý¡£¡£ÏÄÍþÒÄ´óѧϵͳ³ÉÁ¢ÓÚ1907Ä꣬ÆìÏÂÔ̺¬3Ëù´óѧ¡¢¡¢¡¢7ËùÉçÇøÑ§Ôº¼°¶à¸ö×êÑÐÖÐÐÄ£¬ÆäÖа©Ö¢ÖÐÐÄÕ¼ÓÐ300ÓàÃû½ÌÈËÔ±¹¤¼°200ÓàÃû´ÓÊô³ÉÔ±¡£¡£Õâ´ÎÊÂÎñÉæ¼°Á½·ÝÔ̺¬2000ÄêÖݽ»Í¨²¿Îļþ£¨ÐÕÃû¡¢¡¢¡¢SSN£©¼°1998ÄêÑ¡ÃñµÇ¼ÇÊý¾ÝµÄÎļþ£»£»£»Ò»·Ýº­¸Ç1993-1996Äê¶àÃñ×å¶ÓÁУ¨MEC£©×êÑУ¨SSN¡¢¡¢¡¢DLºÅÂë¡¢¡¢¡¢½¡¿µÐÅÏ¢£©µÄÎļþ£»£»£»ÈýÏîÒûʳÓë°©Ö¢×êÑÐÎļþ£»£»£»ÒÔ¼°1999Äê¡¢¡¢¡¢2000Äê´úÖÐÆÚ´Ó¹«¹²ÎÀÉúµÇ¼Ç´¦ÍøÂçµÄSSNºÍÐÕÃûÊý¾Ý¡£¡£´óѧµ÷²éÏÔʾ£¬¹¥»÷½öÓ°ÏìÊ¢Ðв¡Ñ§²¿ÃÅϵͳ£¬Î´²¨¼°ÁÙ´²ÊÔÑé¡¢¡¢¡¢»¼Õß»¤Àí»òѧÉú¼Í¼¡£¡£µ«¹¥»÷Õß¶Ôϵͳ½øÐмÓÃÜ£¬µ¼Ö¸´Ô­¹¤×÷Åö±Ú¡£¡£ÏÄÍþÒÄ´óѧÏò¹¥»÷ÕßÖ§¸¶ÓöÈÒÔ»ñÈ¡½âÃܹ¤¾ß£¬²¢ÒªÇó¡°°²È«Ïú»Ù·¸·¨»ñÈ¡µÄÐÅÏ¢¡±£¬ÒÔ±£»£»£»¤Ãô¸ÐÊý¾Ý¡£¡£Í¨Öª¹¤×÷ÒÑ·¢Õ¹£º£ºÏò1993-1996ÄêMEC×êÑеÄ87,493Ãû²Î¼ÓÕß·¢ËÍ֪ͨÐÅ£¬²¢ÁªÏµÆäËûÔ¼90Íò¸ö¿ÉÄÜÊÜÓ°ÏìµÄµç×ÓÓʼþµØÖ·¡£¡£´óѧǿµ÷£¬Õâ´ÎÊÂÎñδӰÏìÁÙ´²ÔËÓª»ò»¼Õß»¤Àí£¬µ«Ô¼115ÍòÈ˵ÄСÎÒÐÅÏ¢£¨º¬SSN±êʶ·û£©¿ÉÄÜͨ¹ýº¹Çà¼ÝÊ»ÅÆÕÕºÍÑ¡ÃñµÇ¼Ç¼Í¼й¶¡£¡£


https://www.bleepingcomputer.com/news/security/university-of-hawaii-cancer-center-ransomware-attack-affects-nearly-12-million-people/


6. ºÚ¿ÍÀÄÓÃOAuthÖØ¶¨Ïò»úÖÆÖ´Ðо«×¼´¹µö¹¥»÷


3ÔÂ3ÈÕ£¬Î¢ÈíDefender×êÑÐÈËÔ±Åû¶£¬ºÚ¿ÍÕýͨ¹ýÀÄÓúϷ¨µÄOAuthÖØ¶¨Ïò»úÖÆÈÆ¹ýµç×ÓÓʼþºÍä¯ÀÀÆ÷µÄÍøÂç´¹µö±£»£»£»¤£¬¶Ôµ±¾Ðݹ«¹²²¿ÃÅÌáÒ龫׼¹¥»÷¡£¡£¹¥»÷ÕßÀûÓÃÔ̺¬OAuthÖØ¶¨ÏòURLµÄ´¹µöÓʼþ£¨Èçµç×ÓÊðÃûÒªÇ󡢡¢¡¢É籣֪ͨ¡¢¡¢¡¢»áÒéÔ¼ÇëµÈ£©£¬ÉõÖÁ½«URLǶÈëPDFÎļþÌӱܼì²â£¬ÓÕµ¼Óû§¶Ô¶ñÒâÀûÓ÷¨Ê½½øÐÐÉí·ÝÑéÖ¤¡£¡£¹¥»÷Ö÷ÌâÔÚÓÚ¶ñÒâOAuthÀûÓ÷¨Ê½µÄ¹¹½¨ÓëÅäÖᣡ£¹¥»÷ÕßÔÚ½ÚÖÆµÄ×â»§Öд´½¨¶ñÒâÀûÓã¬ÅäÖÃÖØ¶¨ÏòURIÖ¸Ïò×ÔÉí»ù´¡ÉèÊ©¡£¡£µ±Óû§µã»÷´¹µöÁ´½Óºó£¬¼´±ãMicrosoft Entra IDµÄURL¿´ËƺϷ¨ÊÚȨҪÇ󣬵«Í¨¹ýÎÞЧ²ÎÊý£¨Èçscope OAuth»òprompt=none£©´¥·¢¾²Ä¬Éí·ÝÑéÖ¤ÃýÎó£¬Ç¿ÖÆÓû§Öض¨ÏòÖÁ¹¥»÷Õß½ÚÖÆµÄ´¹µöÒ³Ãæ¡£¡£Î¢ÈíÇ¿µ÷£¬´ËÀ๥»÷ÐÔÖÊÊÇÉí·ÝÍþв£¬ÀûÓÃÁËOAuth¿ò¼ÜÖÐͨ¹ýÖØ¶¨ÏòÖÎÀíÊÚȨÃýÎóµÄÔ¤ÆÚÐÐΪ¡£¡£½¨Òé×éÖ¯¼ÓÇ¿OAuthÀûÓÃȨÏ޹ܿØ£¬Ö´ÐÐÇ¿Éí·Ý±£»£»£»¤ÓëǰÌá½Ó¼ûÕ½Êõ£¬²¢ÔÚÓʼþ¡¢¡¢¡¢Éí·Ý¡¢¡¢¡¢Öն˲ãÃæ²¿Êð¿çÓò¼ì²â»úÖÆ¡£¡£


https://www.bleepingcomputer.com/news/security/microsoft-hackers-abuse-oauth-error-flows-to-spread-malware/