ºÉÀ¼²ÆÕþ²¿ÔâÍøÂç¹¥»÷²¿ÃÅÔ±¹¤Êý¾Ýй¶
°ä²¼¹¦·ò 2026-03-261. ºÉÀ¼²ÆÕþ²¿ÔâÍøÂç¹¥»÷²¿ÃÅÔ±¹¤Êý¾Ýй¶
3ÔÂ24ÈÕ£¬£¬ºÉÀ¼²ÆÕþ²¿½üÈÕÅû¶£¬£¬ÔÚ3ÔÂ19ÈÕ¼ì²âµ½ÍøÂç¹¥»÷ºó£¬£¬²¿ÃÅÔ±¹¤µÄÄÚ²¿ÏµÍ³±»¹¥Ï£¬£¬Êý¾Ýй¶ÊÂÎñÕýÔÚµ÷²éÖС£¸Ã²¿ÔÚµÚÈý·½¾¯±¨ºó·¢ÏÖÁËδ¾ÊÚȨ½Ó¼ûÆäÕþ²ß²¿ÃŶà¸öÖØÒª¹ý³ÌϵͳµÄÐÐΪ¡£º£º£ºÉÀ¼²ÆÕþ²¿ÔÚÉêÃ÷ÖаµÊ¾£º£º£º"²ÆÕþ²¿ICT°²È«ÊýÃÅÓÚ3ÔÂ19ÈÕÐÇÆÚËļì²âµ½¶ÔÕþ²ß²¿ÃŶà¸öÖØÒª¹ý³ÌϵͳµÄδ¾ÊÚȨ½Ó¼û¡£¾¯±¨·¢³öºóÁ¢¼´Æô¶¯µ÷²é£¬£¬×Ô½ñÈÕÆðÒÑ×èÖ¹¶ÔÕâЩϵͳµÄ½Ó¼û¡£ÕâÓ°ÏìÁ˲¿ÃÅÔ±¹¤µÄ¹¤×÷¡£"×÷ΪÏìÓ¦£¬£¬²ÆÕþ²¿Á¢¼´Æô¶¯µ÷²é£¬£¬²¢×èÖ¹Á˶ÔÊÜÓ°ÏìϵͳµÄ½Ó¼û¡£¹«Ë¾Ö¸³ö£¬£¬Ë°ÎñºÍº£¹ØÖÎÀí¾Ö¡¢¡¢º£¹ØºÍ¸£Àû¾ÖÏò¹«ÃñºÍÆóÒµÌṩµÄ·þÎñδÊÜÓ°Ïì¡£º£º£ºÉÀ¼²ÆÕþ²¿Î´Åû¶¹¥»÷µÄ¼¼Êõϸ½Ú£¬£¬Ä¿Ç°ÉÐÎÞÍøÂç·¸×ï×éÖ¯Ðû³Æ¶Ô´ËÕÆ¹Ü¡£µ÷²éÈÔÔÚ³ÖÐø£¬£¬ÊÂÎñµÄÆëȫӰÏìÉÐδȷ¶¨¡£
https://securityaffairs.com/189929/data-breach/data-breach-at-dutch-ministry-of-finance-impacts-staff-following-cyberattack.html
2. TeamPCP¹¥ÏÂLiteLLM Python°üÇÔÈ¡50ÍòÉ豸Êý¾Ý
3ÔÂ24ÈÕ£¬£¬TeamPCPºÚ¿Í×éÖ¯½üÈÕ¹¥ÏÂÁËÊ¢ÐеÄPython°üLiteLLM£¬£¬ÔÚPyPIÉϰ䲼¶ñÒâ°æ±¾1.82.7ºÍ1.82.8£¬£¬²¿ÊðÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£LiteLLMÊÇ¿ªÔ´Python¿â£¬£¬×÷ΪͨÍù¶à¸ö´óÐÍ˵»°Ä£ÐÍÌṩÉ̵ÄÍø¹Ø£¬£¬ÖðÈÕÏÂÔØÁ¿³¬¹ý340Íò´Î£¬£¬´Óǰһ¸öÔÂÏÂÔØÁ¿³¬¹ý9500Íò´Î¡£Endor Labs×êÑÐÈËÔ±°µÊ¾£¬£¬ÍþвÐÐΪÕß¹¥ÏÂÁ˸ÃÏîÄ¿£¬£¬°ä²¼µÄ¶ñÒâ°æ±¾Ô̺¬°µ²ØÓÐÐ§ÔØºÉ£¬£¬ÔÚµ¼Èë°üʱִÐС£¶ñÒâ´úÂë×¢Èëµ½litellm/proxy/proxy_server.pyÎļþÖУ¬£¬×÷Ϊbase64±àÂëµÄÓÐÐ§ÔØºÉ£¬£¬Ã¿´Îµ¼ÈëÄ£¿éʱ½âÂë²¢Ö´ÐС£°æ±¾1.82.8ÒýÈëÁ˸ü¼¤½øµÄÖ°ÄÜ£¬£¬½«ÃûΪlitellm_init.pthµÄÎļþ×°Öõ½Python»·¾³¡£ÓÉÓÚPythonÔÚÚ¹ÊÍÆ÷Æô¶¯Ê±×Ô¶¯´¦ÖÃËùÓÐ.pthÎļþ£¬£¬¶ñÒâ´úÂë»áÔÚÔËÐÐPythonʱִÐУ¬£¬¼´±ãδspecificallyʹÓÃLiteLLM¡£Ö´Ðк󣬣¬ÓÐÐ§ÔØºÉ×îÖÕ²¿ÊðºÚ¿ÍµÄTeamPCP Cloud Stealer±äÌåºÍÓÆ¾Ã»¯¾ç±¾¡£Ò»µ©´¥·¢£¬£¬ÓÐÐ§ÔØºÉÔËÐÐÈý½×¶Î¹¥»÷£º£º£ºÍøÂçÍ´´¦£¬£¬³¢ÊÔ¿çKubernetes¼¯ÈººáÏòÒÆ¶¯£¬£¬ÔÚÿ¸ö½Úµã²¿ÊðÌØÈ¨pod£¬£¬²¢×°ÖÃÓÆ¾Ã»¯systemdºóÃÅÂÖѯ¶îÍâ¶þ½øÖÆÎļþ¡£
https://www.bleepingcomputer.com/news/security/popular-litellm-pypi-package-compromised-in-teampcp-supply-chain-attack/
3. CISA½«Langflow´úÂë×¢Èë·ì϶²ÎÓëKEVĿ¼
3ÔÂ25ÈÕ£¬£¬ÃÀ¹úÍøÂ簲ȫºÍ»ù´¡ÉèÊ©°²È«¾Ö(CISA)½üÈÕ½«Ò»¸öзì϶Ôö³¤µ½ÆäÒÑÖª±»ÀûÓ÷ì϶(KEV)Ŀ¼ÖУ¬£¬»ùÓÚ»îÔ¾ÀûÓõÄÖ¤¾Ý¡£¸Ã·ì϶ΪCVE-2026-33017Langflow´úÂë×¢Èë·ì϶¡£LangflowÊÇÊ¢ÐеĿÉÊÓ»¯¹¹½¨´óÐÍ˵»°Ä£ÐÍÀûÓõĿªÔ´Æ½Ì¨¡£´úÂë×¢Èë·ì϶ÔÊÐí¹¥»÷ÕßÔÚÖ¸±êϵͳÉÏÖ´ÐÐËÁÒâ´úÂ룬£¬¿ÉÄܵ¼ÖÂÆëÕûϵͳ¹¥Ï¡¢¡¢Êý¾ÝÇÔÈ¡ºÍºáÏòÒÆ¶¯¡£´ËÀà·ì϶ÊǶñÒâÍøÂçÐÐΪÕߵįµÈÔ¹¥»÷ÔØÌ壬£¬´ºÁª°îÆóÒµ×é³ÉÖØ´ó·çÏÕ¡£CISAµÄ°ó¶¨²Ù×÷Ö¸Áî(BOD)22-01³ÉÁ¢ÁËKEVĿ¼£¬£¬×÷ΪÒÑ֪ͨÓ÷ì϶ºÍ¶³ö(CVE)µÄʵʱÁÐ±í£¬£¬ÕâЩ·ì϶´ºÁª°îÆóÒµ×é³ÉÖØ´ó·çÏÕ¡£BOD22-01ÒªÇóÁª°îÃñÊÂÐÐÕþ·ÖÖ§(FCEB)»ú¹¹ÔÚ½ØÖ¹ÈÕÆÚǰÐÞ¸´ÒÑʶ´ËÍâ·ì϶£¬£¬ÒÔ±£»£»£»¤FCEBÍøÂçÃâÊÜ»îÔ¾Íþв¡£Ö»¹ÜBOD22-01½öºÏÓÃÓÚFCEB»ú¹¹£¬£¬µ«CISAÇ¿ÁÒ½¨ÒéËùÓÐ×é֯ͨ¹ýÓÅÏÈʵʱÐÞ¸´KEVĿ¼·ì϶×÷Ϊ·ì϶ÖÎÀíʵ¼ÊµÄÒ»²¿ÃÅ£¬£¬Ï÷¼õÍøÂç¹¥»÷¶³öÃæ¡£
https://www.cisa.gov/news-events/alerts/2026/03/25/cisa-adds-one-known-exploited-vulnerability-catalog
4. Torg Grabber¶ñÒâÈí¼þÕë¶Ô850¿îä¯ÀÀÆ÷À©´óÇÔÈ¡Êý¾Ý
3ÔÂ25ÈÕ£¬£¬ÍøÂ簲ȫ¹«Ë¾GenDigital½üÈÕ·¢ÏÖÃûΪTorgGrabberµÄÐÂÐÍÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ£¬£¬¸ÃÈí¼þ´Ó850¸öä¯ÀÀÆ÷À©´óÇÔÈ¡Ãô¸ÐÊý¾Ý£¬£¬ÆäÖг¬¹ý700¸öΪ¼ÓÃÜÇ®±ÒÇ®°üÀ©´ó¡£³õʼ½Ó¼ûͨ¹ýClickFix¼¼Êõ»ñµÃ£¬£¬½Ù³Ö¼ôÌù°å²¢ÓÕÆÓû§Ö´ÐжñÒâPowerShellºÅÁî¡£GenDigital×êÑÐÈËÔ±°µÊ¾£¬£¬TorgGrabberÕýÔÚ»ý¼«¿ª·¢ÖУ¬£¬Èý¸öÔÂÄÚ±àÒëÁË334¸öΨһÑù±¾£¬£¬Ã¿ÖÜ×¢²áеĺÅÁî½ÚÖÆ£¨C2£©·þÎñÆ÷¡£³ý¼ÓÃÜÇ®±ÒÇ®°üÍ⣬£¬TorgGrabber»¹´Ó103¸öÃÜÂëÖÎÀíÆ÷ºÍË«³É·ÖÉí·ÝÑéÖ¤¹¤¾ßÒÔ¼°19¸ö±Ê¼ÇÀûÓÃÇÔÈ¡Êý¾Ý¡£TorgGrabberµÄ³õʼ°æ±¾Ê¹ÓûùÓÚTelegramµÄºÍ̸£¬£¬¶øºóʹÓÃ×Ô½ç˵¼ÓÃÜTCPºÍ̸½øÐÐÊý¾ÝÍâй¡£2025Äê12ÔÂ18ÈÕ£¬£¬ÕâÁ½ÖÖ»úÖÆ±»ÉÕ»Ù£¬£¬×ª¶øÊ¹ÓÃͨ¹ýCloudflare»ù´¡Éèʩ·ÓɵÄHTTPSÏνӡ£¸Ã²½ÖèÖ§³Ö·Ö¿éÊý¾ÝÉÏ´«ºÍÓÐÐ§ÔØºÉ´«µÝ¡£¶ñÒâÈí¼þÓµÓжàÖÖ·´·ÖÎö»úÖÆ¡¢¡¢¶à²ã»ìºÏ£¬£¬²¢Ê¹ÓÃÖ±½ÓϵͳŲÓúͷ´Éä¼ÓÔØ½øÐжã±Ü£¬£¬ÆëÈ«ÔÚÄÚ´æÖÐÔËÐÐ×îÖÕÓÐÐ§ÔØºÉ¡£¶ñÒâÈí¼þ»¹¿É·ÖÎöÖ÷»ú¡¢¡¢´´½¨Ó²¼þÖ¸ÎÆ¡¢¡¢¼Í¼ÒÑ×°ÖÃÈí¼þ¡¢¡¢½ØÈ¡Óû§×ÀÃæ½ØÍ¼£¬£¬²¢´Ó×ÀÃæºÍÎĵµÎļþ¼ÐÇÔÈ¡Îļþ¡£
https://www.bleepingcomputer.com/news/security/new-torg-grabber-infostealer-malware-targets-728-crypto-wallets/
5. CitrixÐÞ¸´NetScalerÀàËÆCitrixBleedµÄ¸ßΣ·ì϶
3ÔÂ25ÈÕ£¬£¬Citrix½üÈÕÐÞ¸´ÁËÓ°ÏìNetScalerADCÍøÂçÉ豸ºÍNetScalerGateway°²È«Ô¶³Ì½Ó¼û½â¾ö¹æ»®µÄÁ½¸ö·ì϶£¬£¬ÆäÖÐÒ»¸öÓë½üÄêÀ´ÔÚÁãÈÕ¹¥»÷Öб»ÀûÓõÄCitrixBleedºÍCitrixBleed2ȱµã¼«¶ÈÀàËÆ¡£¸Ã¹Ø¼ü°²È«·ì϶£¨×·×ÙΪCVE-2026-3055£©Ô´ÓÚÊäÈëÑéÖ¤²»¼°£¬£¬¿ÉÄܵ¼ÖÂÅäÖÃΪSAMLÉí·ÝÌṩÉÌ£¨IDP£©µÄCitrixADC»òCitrixGatewayÉ豸²úÉúÄÚ´æ¹ý¶È¶ÁÈ¡£¬£¬Ê¹ÎÞÌØÈ¨µÄÔ¶³Ì¹¥»÷Õß¿ÉÄÜÇÔÈ¡»á»°ÁîÅÆµÈÃô¸ÐÐÅÏ¢¡£¹«Ë¾»¹·ÖÏíÁ˼ø±ðºÍÐÞ¸´Ò×ÊÜCVE-2026-3055¹¥»÷µÄNetScalerʵÀýµÄ¾ßÌåÖ¸ÄÏ¡£¹«Ë¾»¹ÐÞ¸´ÁËÓ°ÏìÅäÖÃÎªÍø¹Ø£¨SSLVPN¡¢¡¢ICAProxy¡¢¡¢CVPN¡¢¡¢RDPproxy£©»òAAAÐé¹¹·þÎñÆ÷µÄÉ豸µÄCVE-2026-4368·ì϶£¬£¬¸Ã·ì϶¿Éʹָ±êϵͳÉÏÓµÓеÍÌØÈ¨µÄÍþвÐÐΪÕßÀûÓþºÕùǰÌá½øÐе͸´ÔӶȹ¥»÷£¬£¬¿ÉÄܵ¼ÖÂÓû§»á»°»ìºÏ¡£ÍøÂ簲ȫ×éÖ¯ShadowserverĿǰ׷×Ùµ½³¬¹ý3Íò¸öNetScalerADCʵÀýºÍ2,300¶à¸öGatewayʵÀýÔÚÏß¶³ö¡£Ä¿Ç°Éв»Ã÷ÏÔÆäÖÐÓм¸¶àʹÓÃÒ×Êܹ¥»÷µÄÅäÖûòÒÑÕë¶Ô¹¥»÷½øÐÐÐÞ¸´¡£¶à¼ÒÍøÂ簲ȫ¹«Ë¾Ö¸³ö£¬£¬CVE-2026-3055Óë2023Äê±»¿í·ºÀûÓõÄCitrixBleed·ì϶ºÍ2025ÄêÅû¶µÄCitrixBleed2±äÌå´æÔÚÏÔÖøÀàËÆÐÔ¡£
https://www.bleepingcomputer.com/news/security/citrix-urges-admins-to-patch-netscaler-flaws-as-soon-as-possible/
6. TP-LinkÐÞ¸´Archer NXϵÁзÓÉÆ÷¶à¸ö¸ßΣ·ì϶
3ÔÂ25ÈÕ£¬£¬TP-Link½üÈÕÐÞ¸´ÁËÆäArcherNXϵÁзÓÉÆ÷ÖеĶà¸ö·ì϶£¬£¬Ô̺¬Ò»¸öÑÏÖØ¼¶´ËÍâȱµã£¬£¬¿ÉÄÜÔÊÐí¹¥»÷ÕßÈÆ¹ýÉí·ÝÑéÖ¤²¢ÉÏ´«Ð¹̼þ¡£×·×ÙΪCVE-2025-15517µÄ°²È«·ì϶ӰÏìArcherNX200¡¢¡¢NX210¡¢¡¢NX500ºÍNX600ÎÞÏß·ÓÉÆ÷£¬£¬Ô´ÓÚȱʧÉí·ÝÑéÖ¤Èõµã£¬£¬¹¥»÷Õß¿ÉÔÚÎÞÌØÈ¨Çé¿öÏÂÀûÓá£TP-Link»¹ÒƳýÁËÅäÖûúÖÆÖеÄÓ²±àÂë¼ÓÃÜÃÜÔ¿£¨CVE-2025-15605£©£¬£¬¸ÃÃÜÔ¿ÔÊÐí¾¹ýÉí·ÝÑéÖ¤µÄ¹¥»÷Õß½âÃÜÅäÖÃÎļþ¡¢¡¢Åú¸Ä²¢ÖØÐ¼ÓÃÜ¡£´ËÍ⣬£¬¹«Ë¾ÐÞ¸´ÁËÁ½¸öºÅÁî×¢Èë·ì϶£¨CVE-2025-15518ºÍCVE-2025-15519£©£¬£¬ÕâЩ·ì϶ʹӵÓÐÖÎÀíÔ±ÌØÈ¨µÄÍþвÐÐΪÕß¿ÉÄÜÖ´ÐÐËÁÒâºÅÁî¡£¹«Ë¾Ç¿ÁÒ½¨Òé¿Í»§ÏÂÔØ²¢×°ÖÃ×îй̼þ°æ±¾ÒÔ×èÖ¹ÀûÓÃÕâЩ·ì϶µÄDZÔÚ¹¥»÷¡£
https://www.bleepingcomputer.com/news/security/tp-link-warns-users-to-patch-critical-router-auth-bypass-flaw/


¾©¹«Íø°²±¸11010802024551ºÅ