ºÉÀ¼²ÆÎñ²¿ÔâÍøÂç¹¥»÷²¿·ÖÔ±¹¤Êý¾Ýй¶

Ðû²¼Ê±¼ä 2026-03-26

1. ºÉÀ¼²ÆÎñ²¿ÔâÍøÂç¹¥»÷²¿·ÖÔ±¹¤Êý¾Ýй¶


3ÔÂ24ÈÕ£¬£¬£¬£¬£¬ºÉÀ¼²ÆÎñ²¿¿ËÈÕÅû¶£¬£¬£¬£¬£¬ÔÚ3ÔÂ19ÈÕ¼ì²âµ½ÍøÂç¹¥»÷ºó£¬£¬£¬£¬£¬²¿·ÖÔ±¹¤µÄÄÚ²¿ÏµÍ³±»¹¥ÏÝ£¬£¬£¬£¬£¬Êý¾Ýй¶ÊÂÎñÕýÔÚÊÓ²ìÖС£¡£¡£¡£¸Ã²¿ÔÚµÚÈý·½¾¯±¨ºó·¢Ã÷ÁËδ¾­ÊÚȨ»á¼ûÆäÕþ²ß²¿·Ö¶à¸öÖ÷ÒªÀú³ÌϵͳµÄÐÐΪ¡£¡£¡£¡£ºÉÀ¼²ÆÎñ²¿ÔÚÉùÃ÷ÖÐÌåÏÖ£º"²ÆÎñ²¿ICTÇå¾²²¿·ÖÓÚ3ÔÂ19ÈÕÐÇÆÚËļì²âµ½¶ÔÕþ²ß²¿·Ö¶à¸öÖ÷ÒªÀú³ÌϵͳµÄδ¾­ÊÚȨ»á¼û¡£¡£¡£¡£¾¯±¨·¢³öºóÁ¬Ã¦Æô¶¯ÊӲ죬£¬£¬£¬£¬×Ô½ñÈÕÆðÒÑ×èÖ¹¶ÔÕâЩϵͳµÄ»á¼û¡£¡£¡£¡£ÕâÓ°ÏìÁ˲¿·ÖÔ±¹¤µÄÊÂÇé¡£¡£¡£¡£"×÷ΪÏìÓ¦£¬£¬£¬£¬£¬²ÆÎñ²¿Á¬Ã¦Æô¶¯ÊӲ죬£¬£¬£¬£¬²¢×èÖ¹Á˶ÔÊÜÓ°ÏìϵͳµÄ»á¼û¡£¡£¡£¡£¹«Ë¾Ö¸³ö£¬£¬£¬£¬£¬Ë°ÎñºÍº£¹ØÖÎÀí¾Ö¡¢º£¹ØºÍ¸£Àû¾ÖÏò¹«ÃñºÍÆóÒµÌṩµÄЧÀÍδÊÜÓ°Ïì¡£¡£¡£¡£ºÉÀ¼²ÆÎñ²¿Î´Åû¶¹¥»÷µÄÊÖÒÕϸ½Ú£¬£¬£¬£¬£¬ÏÖÔÚÉÐÎÞÍøÂç·¸·¨×éÖ¯Éù³Æ¶Ô´ËÈÏÕæ¡£¡£¡£¡£ÊÓ²ìÈÔÔÚ¼ÌÐø£¬£¬£¬£¬£¬ÊÂÎñµÄÍêÕûÓ°ÏìÉÐδȷ¶¨¡£¡£¡£¡£


https://securityaffairs.com/189929/data-breach/data-breach-at-dutch-ministry-of-finance-impacts-staff-following-cyberattack.html


2. TeamPCP¹¥ÏÝLiteLLM Python°üÇÔÈ¡50Íò×°±¸Êý¾Ý


3ÔÂ24ÈÕ£¬£¬£¬£¬£¬TeamPCPºÚ¿Í×éÖ¯¿ËÈÕ¹¥ÏÝÁËÊ¢ÐеÄPython°üLiteLLM£¬£¬£¬£¬£¬ÔÚPyPIÉÏÐû²¼¶ñÒâ°æ±¾1.82.7ºÍ1.82.8£¬£¬£¬£¬£¬°²ÅÅÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¡£¡£¡£LiteLLMÊÇ¿ªÔ´Python¿â£¬£¬£¬£¬£¬×÷ΪͨÍù¶à¸ö´óÐÍÓïÑÔÄ£×ÓÌṩÉ̵ÄÍø¹Ø£¬£¬£¬£¬£¬ÖðÈÕÏÂÔØÁ¿Áè¼Ý340Íò´Î£¬£¬£¬£¬£¬ÒÑÍùÒ»¸öÔÂÏÂÔØÁ¿Áè¼Ý9500Íò´Î¡£¡£¡£¡£Endor LabsÑо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬ÍþвÐÐΪÕß¹¥ÏÝÁ˸ÃÏîÄ¿£¬£¬£¬£¬£¬Ðû²¼µÄ¶ñÒâ°æ±¾°üÀ¨Òþ²ØÓÐÓÃÔØºÉ£¬£¬£¬£¬£¬ÔÚµ¼Èë°üʱִÐС£¡£¡£¡£¶ñÒâ´úÂë×¢Èëµ½litellm/proxy/proxy_server.pyÎļþÖУ¬£¬£¬£¬£¬×÷Ϊbase64±àÂëµÄÓÐÓÃÔØºÉ£¬£¬£¬£¬£¬Ã¿´Îµ¼ÈëÄ£¿£¿£¿£¿£¿£¿éʱ½âÂë²¢Ö´ÐС£¡£¡£¡£°æ±¾1.82.8ÒýÈëÁ˸ü¼¤½øµÄ¹¦Ð§£¬£¬£¬£¬£¬½«ÃûΪlitellm_init.pthµÄÎļþ×°Öõ½PythonÇéÐΡ£¡£¡£¡£ÓÉÓÚPythonÔÚÚ¹ÊÍÆ÷Æô¶¯Ê±×Ô¶¯´¦Öóͷ£ËùÓÐ.pthÎļþ£¬£¬£¬£¬£¬¶ñÒâ´úÂë»áÔÚÔËÐÐPythonʱִÐУ¬£¬£¬£¬£¬×ÝȻδspecificallyʹÓÃLiteLLM¡£¡£¡£¡£Ö´Ðк󣬣¬£¬£¬£¬ÓÐÓÃÔØºÉ×îÖÕ°²Åźڿ͵ÄTeamPCP Cloud Stealer±äÌåºÍ³¤ÆÚ»¯¾ç±¾¡£¡£¡£¡£Ò»µ©´¥·¢£¬£¬£¬£¬£¬ÓÐÓÃÔØºÉÔËÐÐÈý½×¶Î¹¥»÷£ºÍøÂçÆ¾Ö¤£¬£¬£¬£¬£¬ÊµÑé¿çKubernetes¼¯ÈººáÏòÒÆ¶¯£¬£¬£¬£¬£¬ÔÚÿ¸ö½Úµã°²ÅÅÌØÈ¨pod£¬£¬£¬£¬£¬²¢×°Öó¤ÆÚ»¯systemdºóÃÅÂÖÑ¯ÌØÊâ¶þ½øÖÆÎļþ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/popular-litellm-pypi-package-compromised-in-teampcp-supply-chain-attack/


3. CISA½«Langflow´úÂë×¢ÈëÎó²î¼ÓÈëKEVĿ¼


3ÔÂ25ÈÕ£¬£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö(CISA)¿ËÈÕ½«Ò»¸öÐÂÎó²îÌí¼Óµ½ÆäÒÑÖª±»Ê¹ÓÃÎó²î(KEV)Ŀ¼ÖУ¬£¬£¬£¬£¬»ùÓÚ»îԾʹÓõÄÖ¤¾Ý¡£¡£¡£¡£¸ÃÎó²îΪCVE-2026-33017Langflow´úÂë×¢ÈëÎó²î¡£¡£¡£¡£LangflowÊÇÊ¢ÐеĿÉÊÓ»¯¹¹½¨´óÐÍÓïÑÔÄ£×ÓÓ¦ÓõĿªÔ´Æ½Ì¨¡£¡£¡£¡£´úÂë×¢ÈëÎó²îÔÊÐí¹¥»÷ÕßÔÚÄ¿µÄϵͳÉÏÖ´ÐÐí§Òâ´úÂ룬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÍêȫϵͳ¹¥ÏÝ¡¢Êý¾ÝÇÔÈ¡ºÍºáÏòÒÆ¶¯¡£¡£¡£¡£´ËÀàÎó²îÊǶñÒâÍøÂçÐÐΪÕߵįµÈÔ¹¥»÷ÔØÌ壬£¬£¬£¬£¬´ºÁª°îÆóÒµ×é³ÉÖØ´óΣº¦¡£¡£¡£¡£CISAµÄ°ó¶¨²Ù×÷Ö¸Áî(BOD)22-01½¨ÉèÁËKEVĿ¼£¬£¬£¬£¬£¬×÷ΪÒÑ֪ͨÓÃÎó²îºÍ̻¶(CVE)µÄʵʱÁбí£¬£¬£¬£¬£¬ÕâЩÎó²î´ºÁª°îÆóÒµ×é³ÉÖØ´óΣº¦¡£¡£¡£¡£BOD22-01ÒªÇóÁª°îÃñÊÂÐÐÕþ·ÖÖ§(FCEB)»ú¹¹ÔÚ×èÖ¹ÈÕÆÚǰÐÞ¸´ÒÑʶ±ðµÄÎó²î£¬£¬£¬£¬£¬ÒÔ±£»£»£»£»£»¤FCEBÍøÂçÃâÊÜ»îÔ¾Íþв¡£¡£¡£¡£Ö»¹ÜBOD22-01½öÊÊÓÃÓÚFCEB»ú¹¹£¬£¬£¬£¬£¬µ«CISAÇ¿ÁÒ½¨ÒéËùÓÐ×é֯ͨ¹ýÓÅÏÈʵʱÐÞ¸´KEVĿ¼Îó²î×÷ΪÎó²îÖÎÀíʵ¼ùµÄÒ»²¿·Ö£¬£¬£¬£¬£¬ïÔÌ­ÍøÂç¹¥»÷Ì»Â¶Ãæ¡£¡£¡£¡£


https://www.cisa.gov/news-events/alerts/2026/03/25/cisa-adds-one-known-exploited-vulnerability-catalog


4. Torg Grabber¶ñÒâÈí¼þÕë¶Ô850¿îä¯ÀÀÆ÷À©Õ¹ÇÔÈ¡Êý¾Ý


3ÔÂ25ÈÕ£¬£¬£¬£¬£¬ÍøÂçÇå¾²¹«Ë¾GenDigital¿ËÈÕ·¢Ã÷ÃûΪTorgGrabberµÄÐÂÐÍÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ£¬£¬£¬£¬£¬¸ÃÈí¼þ´Ó850¸öä¯ÀÀÆ÷À©Õ¹ÇÔÈ¡Ãô¸ÐÊý¾Ý£¬£¬£¬£¬£¬ÆäÖÐÁè¼Ý700¸öΪ¼ÓÃÜÇ®±ÒÇ®°üÀ©Õ¹¡£¡£¡£¡£³õʼ»á¼ûͨ¹ýClickFixÊÖÒÕ»ñµÃ£¬£¬£¬£¬£¬Ð®ÖƼôÌù°å²¢ÓÕÆ­Óû§Ö´ÐжñÒâPowerShellÏÂÁî¡£¡£¡£¡£GenDigitalÑо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬TorgGrabberÕýÔÚÆð¾¢¿ª·¢ÖУ¬£¬£¬£¬£¬Èý¸öÔÂÄÚ±àÒëÁË334¸öΨһÑù±¾£¬£¬£¬£¬£¬Ã¿ÖÜ×¢²áеÄÏÂÁî¿ØÖÆ£¨C2£©Ð§ÀÍÆ÷¡£¡£¡£¡£³ý¼ÓÃÜÇ®±ÒÇ®°üÍ⣬£¬£¬£¬£¬TorgGrabber»¹´Ó103¸öÃÜÂëÖÎÀíÆ÷ºÍË«ÒòËØÉí·ÝÑéÖ¤¹¤¾ßÒÔ¼°19¸öÌõ¼ÇÓ¦ÓÃÇÔÈ¡Êý¾Ý¡£¡£¡£¡£TorgGrabberµÄ³õʼ°æ±¾Ê¹ÓûùÓÚTelegramµÄЭÒ飬£¬£¬£¬£¬È»ºóʹÓÃ×Ô½ç˵¼ÓÃÜTCPЭÒé¾ÙÐÐÊý¾ÝÍâй¡£¡£¡£¡£2025Äê12ÔÂ18ÈÕ£¬£¬£¬£¬£¬ÕâÁ½ÖÖ»úÖÆ±»·ÅÆú£¬£¬£¬£¬£¬×ª¶øÊ¹ÓÃͨ¹ýCloudflare»ù´¡Éèʩ·ÓɵÄHTTPSÅþÁ¬¡£¡£¡£¡£¸ÃÒªÁìÖ§³Ö·Ö¿éÊý¾ÝÉÏ´«ºÍÓÐÓÃÔØºÉת´ï¡£¡£¡£¡£¶ñÒâÈí¼þ¾ßÓжàÖÖ·´ÆÊÎö»úÖÆ¡¢¶à²ã»ìÏý£¬£¬£¬£¬£¬²¢Ê¹ÓÃÖ±½ÓϵͳŲÓúͷ´Éä¼ÓÔØ¾ÙÐйæ±Ü£¬£¬£¬£¬£¬ÍêÈ«ÔÚÄÚ´æÖÐÔËÐÐ×îÖÕÓÐÓÃÔØºÉ¡£¡£¡£¡£¶ñÒâÈí¼þ»¹¿ÉÆÊÎöÖ÷»ú¡¢½¨ÉèÓ²¼þÖ¸ÎÆ¡¢¼Í¼ÒÑ×°ÖÃÈí¼þ¡¢½ØÈ¡Óû§×ÀÃæ½ØÍ¼£¬£¬£¬£¬£¬²¢´Ó×ÀÃæºÍÎĵµÎļþ¼ÐÇÔÈ¡Îļþ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/new-torg-grabber-infostealer-malware-targets-728-crypto-wallets/


5. CitrixÐÞ¸´NetScalerÀàËÆCitrixBleedµÄ¸ßΣÎó²î


3ÔÂ25ÈÕ£¬£¬£¬£¬£¬Citrix¿ËÈÕÐÞ¸´ÁËÓ°ÏìNetScalerADCÍøÂç×°±¸ºÍNetScalerGatewayÇå¾²Ô¶³Ì»á¿´·¨¾ö¼Æ»®µÄÁ½¸öÎó²î£¬£¬£¬£¬£¬ÆäÖÐÒ»¸öÓë½üÄêÀ´ÔÚÁãÈÕ¹¥»÷Öб»Ê¹ÓõÄCitrixBleedºÍCitrixBleed2ȱÏݺÜÊÇÏàËÆ¡£¡£¡£¡£¸ÃÒªº¦Çå¾²Îó²î£¨×·×ÙΪCVE-2026-3055£©Ô´ÓÚÊäÈëÑé֤ȱ·¦£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÉèÖÃΪSAMLÉí·ÝÌṩÉÌ£¨IDP£©µÄCitrixADC»òCitrixGateway×°±¸±¬·¢ÄÚ´æÌ«¹ý¶ÁÈ¡£¬£¬£¬£¬£¬Ê¹ÎÞÌØÈ¨µÄÔ¶³Ì¹¥»÷ÕßÄܹ»ÇÔÈ¡»á»°ÁîÅÆµÈÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¹«Ë¾»¹·ÖÏíÁËʶ±ðºÍÐÞ¸´Ò×ÊÜCVE-2026-3055¹¥»÷µÄNetScalerʵÀýµÄÏêϸָÄÏ¡£¡£¡£¡£¹«Ë¾»¹ÐÞ¸´ÁËÓ°ÏìÉèÖÃÎªÍø¹Ø£¨SSLVPN¡¢ICAProxy¡¢CVPN¡¢RDPproxy£©»òAAAÐéÄâЧÀÍÆ÷µÄ×°±¸µÄCVE-2026-4368Îó²î£¬£¬£¬£¬£¬¸ÃÎó²î¿ÉʹĿµÄϵͳÉϾßÓеÍÌØÈ¨µÄÍþвÐÐΪÕßʹÓþºÕùÌõ¼þ¾ÙÐеÍÖØÆ¯ºó¹¥»÷£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÓû§»á»°»ìÏý¡£¡£¡£¡£ÍøÂçÇå¾²×éÖ¯ShadowserverÏÖÔÚ×·×Ùµ½Áè¼Ý3Íò¸öNetScalerADCʵÀýºÍ2,300¶à¸öGatewayʵÀýÔÚÏß̻¶¡£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúÆäÖÐÓм¸¶àʹÓÃÒ×Êܹ¥»÷µÄÉèÖûòÒÑÕë¶Ô¹¥»÷¾ÙÐÐÐÞ¸´¡£¡£¡£¡£¶à¼ÒÍøÂçÇå¾²¹«Ë¾Ö¸³ö£¬£¬£¬£¬£¬CVE-2026-3055Óë2023Äê±»ÆÕ±éʹÓõÄCitrixBleedÎó²îºÍ2025ÄêÅû¶µÄCitrixBleed2±äÌå±£´æÏÔ×ÅÏàËÆÐÔ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/citrix-urges-admins-to-patch-netscaler-flaws-as-soon-as-possible/


6. TP-LinkÐÞ¸´Archer NXϵÁзÓÉÆ÷¶à¸ö¸ßΣÎó²î


3ÔÂ25ÈÕ£¬£¬£¬£¬£¬TP-Link¿ËÈÕÐÞ¸´ÁËÆäArcherNXϵÁзÓÉÆ÷ÖеĶà¸öÎó²î£¬£¬£¬£¬£¬°üÀ¨Ò»¸öÑÏÖØ¼¶±ðµÄȱÏÝ£¬£¬£¬£¬£¬¿ÉÄÜÔÊÐí¹¥»÷ÕßÈÆ¹ýÉí·ÝÑéÖ¤²¢ÉÏ´«Ð¹̼þ¡£¡£¡£¡£×·×ÙΪCVE-2025-15517µÄÇå¾²Îó²îÓ°ÏìArcherNX200¡¢NX210¡¢NX500ºÍNX600ÎÞÏß·ÓÉÆ÷£¬£¬£¬£¬£¬Ô´ÓÚȱʧÉí·ÝÑéÖ¤Èõµã£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÔÚÎÞÌØÈ¨ÇéÐÎÏÂʹÓᣡ£¡£¡£TP-Link»¹ÒƳýÁËÉèÖûúÖÆÖеÄÓ²±àÂë¼ÓÃÜÃÜÔ¿£¨CVE-2025-15605£©£¬£¬£¬£¬£¬¸ÃÃÜÔ¿ÔÊÐí¾­ÓÉÉí·ÝÑéÖ¤µÄ¹¥»÷Õß½âÃÜÉèÖÃÎļþ¡¢Ð޸IJ¢ÖØÐÈÎÃüÜ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬¹«Ë¾ÐÞ¸´ÁËÁ½¸öÏÂÁî×¢ÈëÎó²î£¨CVE-2025-15518ºÍCVE-2025-15519£©£¬£¬£¬£¬£¬ÕâЩÎó²îʹ¾ßÓÐÖÎÀíÔ±ÌØÈ¨µÄÍþвÐÐΪÕßÄܹ»Ö´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¹«Ë¾Ç¿ÁÒ½¨Òé¿Í»§ÏÂÔØ²¢×°ÖÃ×îй̼þ°æ±¾ÒÔ×èֹʹÓÃÕâЩÎó²îµÄDZÔÚ¹¥»÷¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/tp-link-warns-users-to-patch-critical-router-auth-bypass-flaw/