CISA½«Wing FTPЧÀÍÆ÷ÐÅϢй¶Îó²îÁÐÈëKEVĿ¼

Ðû²¼Ê±¼ä 2026-03-17

1. CISA½«Wing FTPЧÀÍÆ÷ÐÅϢй¶Îó²îÁÐÈëKEVĿ¼


3ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©¿ËÈÕ½«Wing FTPЧÀÍÆ÷Îó²î£¨±àºÅCVE-2025-47813£¬£¬£¬£¬£¬£¬CVSSÆÀ·Ö4.3£©ÕýʽÄÉÈëÆäÒÑ֪ʹÓÃÎó²î£¨KEV£©Ä¿Â¼¡£ ¡£¡£¡£¡£¡£¸ÃÎó²îÊôÓÚÐÅϢй¿ààÐÍ£¬£¬£¬£¬£¬£¬Ó°ÏìWing FTP Server 7.4.4֮ǰµÄËùÓа汾£¬£¬£¬£¬£¬£¬Ïêϸ±£´æÓÚloginok.htmlÒ³ÃæµÄWebÉí·ÝÑéÖ¤Á÷³ÌÖС£ ¡£¡£¡£¡£¡£Æ¾Ö¤CISAÐû²¼µÄͨ¸æ£¬£¬£¬£¬£¬£¬µ±¹¥»÷ÕßÏòЧÀÍÆ÷·¢ËͰüÀ¨³¬³¤ÖµµÄUID cookieʱ£¬£¬£¬£¬£¬£¬»á´¥·¢loginok.htmlÒ³Ãæ·µ»Ø¹ýʧÐÅÏ¢£¬£¬£¬£¬£¬£¬´Ó¶øÐ¹Â¶Ð§ÀÍÆ÷µÄÍêÕûÍâµØ×°Ö÷¾¶¡£ ¡£¡£¡£¡£¡£Ö»¹Ü¸ÃÎó²îÎÞ·¨Ö±½Óµ¼ÖÂÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬£¬£¬£¬µ«Ð¹Â¶µÄÎļþϵͳÏêϸÐÅÏ¢¿ÉÄܱ»ÓÃÓÚÕì̽»î¶¯£¬£¬£¬£¬£¬£¬½ø¶ø¸¨ÖúʵÑé·¾¶±éÀú¹¥»÷¡¢Îļþ°üÀ¨¹¥»÷µÈºóÐø¹¥»÷ÊֶΣ¬£¬£¬£¬£¬£¬¶ÔϵͳÇå¾²×é³ÉDZÔÚÍþв¡£ ¡£¡£¡£¡£¡£ÒÀ¾Ý¾ßÓÐÔ¼ÊøÁ¦µÄ²Ù×÷Ö¸ÁBOD£©22-01¡¶½µµÍÒÑÖªÎó²î±»Ê¹ÓõÄÖØ´óΣº¦¡·µÄÒªÇ󣬣¬£¬£¬£¬£¬Áª°îÃñÊÂÖ´ÐÐίԱ»á£¨FCEB£©ÏÂÊô»ú¹¹±ØÐèÔÚ2026Äê3ÔÂ30ÈÕǰÍê³É¸ÃÎó²îµÄÐÞ¸´ÊÂÇ飬£¬£¬£¬£¬£¬ÒÔÌá·ÀKEVĿ¼ÖмͼµÄÎó²î±»¶ñÒâʹÓᣠ¡£¡£¡£¡£¡£


https://securityaffairs.com/189530/security/u-s-cisa-adds-a-flaw-in-wing-ftp-server-to-its-known-exploited-vulnerabilities-catalog.html


2. Laundry Bear APT×é֯ʹÓÃDRILLAPPºóÃŹ¥»÷ÎÚ¿ËÀ¼»ú¹¹


3ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬S2 GroupÆìÏÂÇ鱨ÍŶÓLAB52¿ËÈÕÅû¶£¬£¬£¬£¬£¬£¬Ò»¸öÃûΪDRILLAPPµÄÐÂÐͺóÃŻÕýÕë¶ÔÎÚ¿ËÀ¼×é֯ʵÑé¹¥»÷¡£ ¡£¡£¡£¡£¡£¸Ã»î¶¯ÓÚ2026Äê2Ô±»·¢Ã÷£¬£¬£¬£¬£¬£¬Óë¶íÂÞ˹֧³ÖµÄLaundry Bear APT×éÖ¯£¨ÓÖÃûUAC-0190¡¢Void Blizzard£©±£´æ¹ØÁª£¬£¬£¬£¬£¬£¬Åú×¢¸Ã×éÖ¯Ò»Á¬¶ÔÎÚ¿ËÀ¼¾ÙÐÐÍøÂçÌØ¹¤»î¶¯¡£ ¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃMicrosoft Edgeä¯ÀÀÆ÷µÄµ÷ÊÔ¹¦Ð§¹æ±Ü¼ì²â¡£ ¡£¡£¡£¡£¡£µÚÒ»¸öDRILLAPP±äÖÖͨ¹ýLNKÎļþÈö²¥£¬£¬£¬£¬£¬£¬ÔÚÔÝʱÎļþ¼ÐÖн¨ÉèHTMLÎļþ£¬£¬£¬£¬£¬£¬¼ÓÔØÀ´×Ôpastefy.appµÄ»ìÏý¾ç±¾¡£ ¡£¡£¡£¡£¡£ÓÕ¶üÖ÷Ì⺭¸ÇStarlink×°ÖÃͼÏñµ½Come Back Alive´ÈÉÆÇëÇó¡£ ¡£¡£¡£¡£¡£ä¯ÀÀÆ÷ÒÔÎÞͷģʽִÐУ¬£¬£¬£¬£¬£¬ÆôÓÃ-no-sandbox¡¢-disable-web-securityµÈ²ÎÊý£¬£¬£¬£¬£¬£¬×Ô¶¯ÊÚÓèÉãÏñÍ·¡¢Âó¿Ë·çºÍÆÁÄ»²¶»ñȨÏÞ£¬£¬£¬£¬£¬£¬ÎÞÐèÓû§½»»¥¡£ ¡£¡£¡£¡£¡£¹¥»÷Õß¿Éͨ¹ýWebSocket C2ЧÀÍÆ÷¾ÙÐÐÔ¶³Ì¿ØÖÆ£¬£¬£¬£¬£¬£¬ÌìÉú×°±¸Ö¸ÎƲ¢¼ì²âÌØ×¼Ê±Çø¡£ ¡£¡£¡£¡£¡£µÚ¶þ¸ö±äÖÖ½«LNKÎļþÌæ»»ÎªCPLÎļþ£¬£¬£¬£¬£¬£¬ÓÕ¶ü°üÀ¨ÎäÆ÷½É»ñ±¨¸æºÍÎÚ¿ËÀ¼¹ú¼ÒÉó¼ÆÊðÄÏ·½°ì¹«ÊÒÎļþ¡£ ¡£¡£¡£¡£¡£¸Ã±äÖÖÐÂÔöµÝ¹éÎļþÁÐ±í¡¢ÅúÁ¿ÉÏ´«ºÍÔ¶³ÌÎļþÏÂÔØ¹¦Ð§¡£ ¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓÃChrome DevTools ProtocolÈÆ¹ýJavaScriptÏÂÔØÏÞÖÆ£¬£¬£¬£¬£¬£¬Í¨¹ýremote-debugging¶Ë¿ÚÐÞ¸ÄÏÂÔØÂ·¾¶²¢×¢Èë¾ç±¾Ä£ÄâÓû§µã»÷¡£ ¡£¡£¡£¡£¡£


https://securityaffairs.com/189519/malware/russia-linked-apt-uses-drillapp-backdoor-to-spy-on-ukrainian-targets.html


3.Ò½ÁÆ»úеÈ˹«Ë¾IntuitiveÔâ´¹ÂÚ¹¥»÷ÖÂÊý¾Ýй¶


3ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬Ò½ÁÆ»úеÈËÊÖÊõÊÖÒÕ¹«Ë¾Intuitive¿ËÈÕÐû²¼£¬£¬£¬£¬£¬£¬Î´¾­ÊÚȨµÄ¹¥»÷Õßͨ¹ý´¹ÂÚ¹¥»÷ÇÔȡԱ¹¤Æ¾Ö¤ºó£¬£¬£¬£¬£¬£¬ÀÖ³ÉÈëÇÖÆä²¿·ÖÄÚ²¿ITÓªÒµÓ¦ÓóÌÐò¡£ ¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÊÇ»úеÈ˸¨ÖúÊÖÊõƽ̨µÄÁìÏÈÖÆÔìÉÌ£¬£¬£¬£¬£¬£¬Ö÷Òª²úÆ·°üÀ¨da VinciÊÖÊõϵͳºÍÓÃÓڷλî¼ìµÄIonÇ»ÄÚϵͳ¡£ ¡£¡£¡£¡£¡£Ð¹Â¶µÄÊý¾Ý°üÀ¨²¿·Ö¿Í»§ÓªÒµºÍÁªÏµÐÅÏ¢£¬£¬£¬£¬£¬£¬ÒÔ¼°IntuitiveÔ±¹¤ºÍÆóÒµÊý¾Ý¡£ ¡£¡£¡£¡£¡£¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬£¬´Ë´ÎÍøÂçÈëÇÖ¶ÔÆä»úеÈËϵͳƽ̨»òʹÓÃÆäϵͳµÄҽԺûÓÐÔì³ÉÔËÓªÓ°Ïì¡£ ¡£¡£¡£¡£¡£IntuitiveÇ¿µ÷£¬£¬£¬£¬£¬£¬Æä»úеÈËϵͳӵÓÐ×ÔÁ¦µÄÇ徲ЭÒ飬£¬£¬£¬£¬£¬Ó빫˾ÄÚ²¿ÓªÒµÍøÂçÏ໥¸ôÀë¡£ ¡£¡£¡£¡£¡£IntuitiveÌåÏÖÒÑ¶ÔÆäÍøÂç»ù´¡ÉèÊ©¾ÙÐзֶΣ¬£¬£¬£¬£¬£¬ËùÓÐÖ§³ÖÄÚ²¿ITӪҵϵͳ¡¢ÖÆÔìÔËÓªºÍÊý×Ö²úÆ·µÄ»ù´¡ÉèÊ©¾ù¼á³Ö×ÔÁ¦¡£ ¡£¡£¡£¡£¡£ÓÉÓÚÕâÖÖÍøÂç·Ö¶Î²½·¥£¬£¬£¬£¬£¬£¬¹«Ë¾µÄda Vinci¡¢IonºÍÊý×ÖÆ½Ì¨Î´ÊÜ´Ë´Îй¶ӰÏ죬£¬£¬£¬£¬£¬¼ÌÐøÇå¾²ÔËÐС£ ¡£¡£¡£¡£¡£Ò½Ôº¿Í»§ÍøÂçÓëIntuitiveÍøÂç¼á³Ö×ÔÁ¦£¬£¬£¬£¬£¬£¬Óɿͻ§ITÍŶÓÖÎÀíºÍ±£»£»£»£»£»£»£»¤£¬£¬£¬£¬£¬£¬Òò´ËҲδÊÜÓ°Ïì¡£ ¡£¡£¡£¡£¡£·¢Ã÷ÈëÇֺ󣬣¬£¬£¬£¬£¬IntuitiveÒѽÓÄɽôÆÈ²½·¥¿ØÖÆÐ¹Â¶²¢Õö¿ªÊӲ죬£¬£¬£¬£¬£¬ÏÖÔÚÊÓ²ìÈÔÔÚ¾ÙÐÐÖС£ ¡£¡£¡£¡£¡£


https://www.theregister.com/2026/03/16/robotics_surgical_biz_intuitive_discloses/


4. Ò½ÁƿƼ¼¾ÞÍ·StrykerÔâºÚ¿Í¹¥»÷ÖÂÊýÍò×°±¸±»²Á³ý


3ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬Ò½ÁÆÊÖÒÕ¾ÞÍ·Stryker¿ËÈÕÅû¶£¬£¬£¬£¬£¬£¬ÉÏÖܱ¬·¢µÄÍøÂç¹¥»÷½öÏÞÓÚÆäÄÚ²¿MicrosoftÇéÐΣ¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔ¶³Ì²Á³ýÁËÊýÍǫ̀Ա¹¤×°±¸¡£ ¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÖÜÈÕ¸üÐÂÌåÏÖ£¬£¬£¬£¬£¬£¬ËùÓÐÒ½ÁÆ×°±¸¾ù¿ÉÇ徲ʹÓ㬣¬£¬£¬£¬£¬µ«µç×Ó¶©¹ºÏµÍ³ÈÔÀëÏߣ¬£¬£¬£¬£¬£¬¿Í»§Ðèͨ¹ýÏúÊÛ´ú±íÊÖ¶¯Ïµ¥¡£ ¡£¡£¡£¡£¡£StrykerÇ¿µ÷´Ë´ÎÊÂÎñ²¢·ÇÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßδÔÚÆäϵͳÉϰ²ÅÅÈκζñÒâÈí¼þ¡£ ¡£¡£¡£¡£¡£¹¥»÷ÕßHandalaºÚ¿Í×éÖ¯Éù³Æ²Á³ýÁËÁè¼Ý20Íǫ̀ϵͳ¡¢Ð§ÀÍÆ÷ºÍÒÆ¶¯×°±¸£¬£¬£¬£¬£¬£¬²¢ÇÔÈ¡ÁË50TBÊý¾Ý£¬£¬£¬£¬£¬£¬µ«ÊÓ²ìְԱδ·¢Ã÷Êý¾ÝÍâй¼£Ïó¡£ ¡£¡£¡£¡£¡£¹¥»÷±¬·¢ºó£¬£¬£¬£¬£¬£¬¶à¹úStrykerÔ±¹¤Í¶Ë߯äÍйÜ×°±¸ÔÚÒ»Ò¹Ö®¼ä±»Ô¶³Ì²Á³ý¡£ ¡£¡£¡£¡£¡£²¿·Ö½«Ð¡ÎÒ˽¼Ò×°±¸½ÓÈë¹«Ë¾ÍøÂçµÄÔ±¹¤ÔÚ²Á³ýÀú³ÌÖÐɥʧÁËСÎÒ˽¼ÒÊý¾Ý¡£ ¡£¡£¡£¡£¡£ÊìϤ¹¥»÷µÄÐÂÎÅÈËʿ͸¶£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßʹÓÃMicrosoftÔÆ¶Ë¶ËµãÖÎÀíЧÀÍIntuneÖеIJÁ³ýÏÂÁ£¬£¬£¬£¬£¬ÔÚ3ÔÂ11ÈÕUTCʱ¼ä5:00ÖÁ8:00Ö®¼ä²Á³ýÁ˽ü8Íǫ̀װ±¸¡£ ¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚÈëÇÖÖÎÀíÔ±ÕË»§²¢½¨ÉèеÄÈ«¾ÖÖÎÀíÔ±ÕË»§ºóÖ´ÐÐÁ˴˲Ù×÷¡£ ¡£¡£¡£¡£¡£¹«Ë¾ÕýÓëÈ«ÇòÖÆÔì»ùµØÏàÖúÓ¦¶ÔDZÔÚÔËÓªÓ°Ï죬£¬£¬£¬£¬£¬Ä¿½ñÓÅÏÈÊÂÏîÊǻָ´¹©Ó¦Á´ÏµÍ³²¢»Ö¸´¿Í»§¶©µ¥ºÍÔËÊä¡£ ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/stryker-attack-wiped-tens-of-thousands-of-devices-no-malware-needed/


5. Microsoft Exchange Online¹ÊÕÏÖÂÓû§ÎÞ·¨»á¼ûÓÊÏä


3ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬Microsoft¿ËÈÕÈ·ÈÏÆäExchange OnlineЧÀͱ¬·¢¹ÊÕÏ£¬£¬£¬£¬£¬£¬µ¼Ö¿ͻ§ÎÞ·¨»á¼ûÓÊÏäºÍÈÕÀú¡£ ¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÚUTCʱ¼äÉÏÎç6:42ÈÏ¿ÉÎÊÌ⣬£¬£¬£¬£¬£¬ÌåÏÖÕýÔÚÊӲ첿·ÖÓû§Í¨¹ýÒ»ÖÖ»ò¶àÖÖÅþÁ¬ÒªÌå»á¼ûExchange OnlineÓÊÏäʱÓöµ½µÄÎÊÌâ¡£ ¡£¡£¡£¡£¡£Æ¾Ö¤Microsoft 365ÖÎÀíÖÐÐĸüР(EX1253275)£¬£¬£¬£¬£¬£¬Outlook on the web¡¢Outlook×ÀÃæ¿Í»§¶Ë¡¢Exchange ActiveSync¼°ÆäËûExchange OnlineÅþÁ¬Ð­Òé¾ùÊܴ˹ÊÕÏÓ°Ïì¡£ ¡£¡£¡£¡£¡£MicrosoftÌåÏÖÒ£²âÊý¾ÝÏÔʾÊÜÓ°ÏìÓû§µÄÎÊÌâÒѲ»ÔÙ±¬·¢£¬£¬£¬£¬£¬£¬¹¤³Ìʦ¼ÌÐø¼à¿ØÐ§ÀÍ¿µ½¡×´Ì¬ÒÔÆÀ¹ÀÊÇ·ñÐèÒª½ÓÄÉÌØÊâ²½·¥È·±£Ò»Á¬»Ö¸´£¬£¬£¬£¬£¬£¬µ«¿Í»§ÈÔ±¨¸æÎÞ·¨»á¼ûµç×ÓÓʼþ¡£ ¡£¡£¡£¡£¡£¹ÊÕϱ¬·¢Ç°£¬£¬£¬£¬£¬£¬Office.comÃÅ»§ÍøÕ¾ÔøÏÔʾ"Ç¸ØÆ£¬£¬£¬£¬£¬£¬·ºÆðÎÊÌ⣬£¬£¬£¬£¬£¬ÇëʵÑéË¢ÐÂÒ³Ãæ"µÄ¹ýʧÐÅÏ¢¡£ ¡£¡£¡£¡£¡£Microsoft»¹ÔÚÊÓ²ìÁíÒ»×ÔÁ¦¹ÊÕÏ£¬£¬£¬£¬£¬£¬¸Ã¹ÊÕÏÓ°ÏìMicrosoft 365 CopilotÍøÒ³µÇÂ¼Ò³Ãæ¼°office.com/chat¡¢m365.cloud.microsoft¡¢m365.cloud.microsoft/chatºÍcopilot.cloud.microsoftµÈCopilotÍøÒ³¿Í»§¶Ë¡£ ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-exchange-online-outage-blocks-access-to-mailboxes/


6. AWS Bedrock´úÂëÚ¹ÊÍÆ÷Îó²î¿ÉÖÂÃô¸ÐÊý¾Ýй¶


3ÔÂ16ÈÕ£¬£¬£¬£¬£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±·¢Ã÷Amazon Web Services(AWS) ¹¤¾ßÖб£´æÒ»¸öÎó²î£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓøÃÎó²îÇÔÈ¡¹«Ë¾Ãô¸ÐÊý¾Ý¡£ ¡£¡£¡£¡£¡£BeyondTrustÆìÏÂPhantom LabsµÄÑо¿Ö°Ô±½«ÊÓ²ìÖØµã·ÅÔÚAWS Bedrock AgentCore Code InterpreterÉÏ¡£ ¡£¡£¡£¡£¡£AWS BedrockÊÇÓÃÓÚ¹¹½¨AIÓ¦ÓóÌÐòµÄƽ̨£¬£¬£¬£¬£¬£¬¶øAgentCore Code InterpreterÔÊÐí̸Ìì»úеÈ˱àдºÍÔËÐдúÂëÒÔÖ´ÐÐÊý¾ÝÆÊÎöºÍÅÌËãµÈʹÃü¡£ ¡£¡£¡£¡£¡£Îª±£»£»£»£»£»£»£»¤ÏµÍ³Çå¾²£¬£¬£¬£¬£¬£¬AWSʹÓÃSandboxģʽ×÷ΪÊý×Ö¸ôÀëÊÒ£¬£¬£¬£¬£¬£¬×èÖ¹AI´úÂëÓëÍⲿÌìÏÂͨѶ¡£ ¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬Ê×ϯÑо¿Ô±Kinnaird McQuade·¢Ã÷£¬£¬£¬£¬£¬£¬Ö»¹ÜɳºÐ×èÖ¹Á˴󲿷ÖÁ÷Á¿£¬£¬£¬£¬£¬£¬µ«ÈÔÔÊÐíDNSÅÌÎÊ£¬£¬£¬£¬£¬£¬ÌØÊâÊÇAºÍAAAA¼Í¼¡£ ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ö¤Êµ£¬£¬£¬£¬£¬£¬¹¥»÷Õ߿ɽ«ÇÔÈ¡µÄÊý¾Ý»òÉñÃØÏÂÁîÒþ²ØÔÚÕâЩDNSÇëÇóÖС£ ¡£¡£¡£¡£¡£ÍŶӹ¹½¨ÁËÒ»¸öϵͳ£¬£¬£¬£¬£¬£¬Í¨¹ýÕâЩÅÌÎÊÔËÐÐÊý¾Ý£¬£¬£¬£¬£¬£¬Óë±»¸ôÀëµÄAI¾ÙÐÐʵʱ˫ÏòͨѶ£¬£¬£¬£¬£¬£¬ÓÐÓÃÈÆ¹ýÁËAWSÔÊÐíµÄÇå¾²¸ôÀë¡£ ¡£¡£¡£¡£¡£AWS½¨ÒéÇл»ÖÁVPCģʽÒÔ»ñµÃ¸üºÃ¿ØÖÆ£¬£¬£¬£¬£¬£¬²¢È·±£AI¹¤¾ß½öÓµÓÐ×îµÍÐëҪȨÏÞ¡£ ¡£¡£¡£¡£¡£


https://hackread.com/data-leak-risk-in-aws-bedrock-ai-code-interpreter/