Modular DS²å¼þ¸ßΣÎó²îCVE-2026-23550ÔâʹÓÃ

Ðû²¼Ê±¼ä 2026-01-19

1. Modular DS²å¼þ¸ßΣÎó²îCVE-2026-23550ÔâʹÓÃ


1ÔÂ15ÈÕ£¬£¬ÍøÂçÇå¾²Ñо¿Ö°Ô±¿ËÈÕÅû¶£¬£¬WordPress¶àÕ¾µãÖÎÀí²å¼þModular DSµÄ2.5.1¼°¸üÔç°æ±¾±£´æÑÏÖØÎó²îCVE-2026-23550£¬£¬¸ÃÎó²îÒѱ»ºÚ¿ÍʹÓ㬣¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÔ¶³ÌÈÆ¹ýÈÏÖ¤£¬£¬ÒÔÖÎÀíԱȨÏÞ»á¼ûÊÜÓ°ÏìÍøÕ¾ ¡£¡£Modular DS×÷Ϊһ¿îÖÎÀí¶à¸öWordPressÕ¾µãµÄ¹¤¾ß£¬£¬×°ÖÃÁ¿Òѳ¬4Íò´Î£¬£¬Æä¹¦Ð§°üÀ¨Ô¶³Ì¼à¿Ø¡¢Ö´ÐиüС¢Óû§ÖÎÀí¡¢Ð§ÀÍÆ÷ÐÅÏ¢»á¼û¼°Î¬»¤Ê¹ÃüµÈ ¡£¡£¾ÝPatchstackÍŶӱ¨¸æ£¬£¬Îó²îÊ״ι¥»÷±¬·¢ÔÚ2026Äê1ÔÂ13ÈÕUTCʱ¼ä02:00×óÓÒ ¡£¡£Ñо¿Ö°Ô±·¢Ã÷£¬£¬Îó²îÔ´ÓÚ²å¼þÔÚÆôÓÃ"Ö±½ÓÇëÇó"ģʽʱ£¬£¬Î´¶ÔÇëÇóȪԴ¾ÙÐмÓÃÜÑéÖ¤¼´ÊÓΪ¿ÉÐÅ£¬£¬µ¼ÖÂÃô¸Ð·ÓÉ̻¶²¢´¥·¢×Ô¶¯ÖÎÀíÔ±µÇ¼»ØÍË»úÖÆ ¡£¡£Ïêϸ¶øÑÔ£¬£¬ÔÚsrc/app/Http/Controllers/AuthController.phpµÄgetLoginÒªÁìÖУ¬£¬´úÂëʵÑé´ÓÇëÇóÌå¶ÁÈ¡Óû§ID£¬£¬ÈôδÌṩÔò×Ô¶¯»ñÈ¡ÏÖÓÐÖÎÀíÔ±»ò³¬µÈÖÎÀíÔ±Óû§²¢µÇ¼£¬£¬Î´¾­Éí·ÝÑéÖ¤µÄÓû§¿ÉʹÓôË·¾¶ÊµÏÖȨÏÞÌáÉý ¡£¡£Modular DSÔÚÊÕµ½Îó²î±¨¸æºóÊýСʱÄÚÐû²¼2.5.2°æ±¾ÐÞ¸´³ÌÐò ¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-exploit-modular-ds-wordpress-plugin-flaw-for-admin-access/


2. ÖÐÑëÃåÒòÖÝÒ½ÁƱ£½¡ÖÐÐÄÊý¾Ýй¶ӰÏ쳬14.5Íò»¼Õß


1ÔÂ15ÈÕ£¬£¬ÖÐÑëÃåÒòÖÝÒ½ÁƱ£½¡ÖÐÐÄ¿ËÈÕÅû¶һÆðÖØ´óÊý¾ÝÇå¾²ÊÂÎñ£¬£¬Ó°Ïì145,381Ãû»¼Õß ¡£¡£¸Ã·ÇÓªÀûÐÔÒ½ÁÆÏµÍ³ÓÚ2025Äê6ÔÂ1ÈÕ¼ì²âµ½ITϵͳÒì³£» £»£»£»î¶¯£¬£¬Ëæ¼´Æô¶¯Çå¾²¼Ó¹Ì²¢ÁªºÏµÚÈý·½ÍøÂçÇ徲ר¼ÒÕö¿ªÊӲ죬£¬Í¬²½×ª´ïÖ´·¨²¿·Ö ¡£¡£ÊÓ²ìÓÚ11ÔÂ6ÈÕÍê³É£¬£¬È·ÈÏ2025Äê3ÔÂ19ÈÕÖÁ6ÔÂ1ÈÕʱ´ú£¬£¬Î´¾­ÊÚȨµÄµÚÈý·½»á¼ûÁËÆäITÇéÐΣ¬£¬¿ÉÄÜ»ñÈ¡»¼ÕßÃô¸ÐÐÅÏ¢£¬£¬°üÀ¨ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢ÖÎÁÆÏêÇ顢ЧÀÍÈÕÆÚ¡¢Ò½ÁÆÌṩÕßÐÕÃû¡¢°ü¹ÜÐÅÏ¢£¬£¬²¿·Ö²¡Àý»¹Éæ¼°Éç»á°ü¹ÜºÅÂë ¡£¡£×÷ΪÃåÒòÖÝÖв¿¼°Î÷²¿µØÇøÒªº¦Ò½ÁÆÐ§ÀÍÉÌ£¬£¬¸Ã»ú¹¹ÔËÓª¶à¼ÒÒ½Ôº¡¢ÕïËù¼°×¨¿ÆÐ§ÀÍ£¬£¬ÊÂÎñÒý·¢ÆÕ±é¹Ø×¢ ¡£¡£» £»£»£»ú¹¹ÓÚ2025Äê7ÔÂ31ÈÕÖÁ12ÔÂ29ÈÕʱ´úͨ¹ýÊéÃæÍ¨Öª¡¢ÈÈÏߵ绰¼°ÍøÕ¾Í¨¸æ¼û¸æÊÜÓ°Ï컼Õߣ¬£¬²¢ÌṩΪÆÚ12¸öÔµÄÃâ·ÑÐÅÓñ£» £»£»£»¤Ð§ÀÍ ¡£¡£¸ÃЧÀÍÓÉTransUnionÆìÏÂCyberScout¹«Ë¾³Ð±££¬£¬º­¸Çµ¥¾ÖÐÅÓÃ¼à¿Ø¡¢ÊµÊ±ÐÅÓñ¨¸æ¡¢ÐÅÓÃÆÀ·Ö±ä»»ÌáÐѼ°×Ô¶¯Ú²Æ­Ô®Öú£¬£¬Ð­ÖúÉí·Ý͵ÇÔÊܺ¦Õß½â¾öÎÊÌâ ¡£¡£


https://securityaffairs.com/186959/uncategorized/central-maine-healthcare-data-breach-impacted-over-145000-patients.html


3. WhisperPairÎó²î̻¶ÊýÒÚÀ¶ÑÀ×°±¸Ç徲Σº¦


1ÔÂ15ÈÕ£¬£¬Â³ãë´óѧÅÌËã»úÇå¾²ÍŶӷ¢Ã÷¹È¸è¿ìËÙÅä¶ÔЭÒé±£´æ¸ßΣÎó²îCVE-2025-36911£¨´úºÅWhisperPair£©£¬£¬Ó°ÏìÈ«ÇòÊýÒŲ֧́³Ö¸Ã¹¦Ð§µÄÎÞÏß¶ú»ú¡¢¶úÈûºÍÑïÉùÆ÷£¬£¬Éæ¼°Google¡¢Jabra¡¢JBL¡¢Ë÷ÄᡢСÃ×µÈÊ®Óà¸öÆ·ÅÆ ¡£¡£¸ÃÎó²îÔ´ÓÚ×°±¸ÖÆÔìÉ̶ԿìËÙÅä¶ÔЭÒéµÄ²»µ±ÊµÏÖ£¬£¬¹æ·¶ÒªÇó×°±¸ÔÚ·ÇÅä¶ÔģʽÏÂÓ¦ºöÂÔÅä¶ÔÇëÇ󣬣¬µ«´ó¶¼³§ÉÌÎ´Ç¿ÖÆÖ´Ðд˼ì²é£¬£¬µ¼Ö¹¥»÷Õß¿Éδ¾­Óû§ÊÚÈ¨Ç¿ÖÆÅä¶Ô×°±¸ ¡£¡£¹¥»÷ÕßʹÓÃÈκÎÀ¶ÑÀ×°±¸£¨ÈçÌõ¼Ç±¾µçÄÔ¡¢Ê÷Ý®ÅÉ»òÊÖ»ú£©£¬£¬ÔÚ14Ã×¹æÄ£ÄÚÎÞÐèÓû§½»»¥¼´¿ÉÍê³ÉÅä¶Ô ¡£¡£Åä¶Ôºó£¬£¬¹¥»÷Õß¿ÉÍêÈ«¿ØÖÆÒôƵװ±¸£ºÒÔ¸ßÒôÁ¿²¥·ÅÒôƵ×ÌÈÅÓû§£¬£¬»òͨ¹ýÂó¿Ë·çÇÔÌý¶Ô»° ¡£¡£¸üÑÏÖØµÄÊÇ£¬£¬Í¨¹ýGoogleµÄFind HubÍøÂ磬£¬¹¥»÷Õ߿ɽ«Êܺ¦Õß×°±¸°ó¶¨ÖÁ×Ô¼ºµÄGoogleÕË»§£¬£¬ÊµÏÖ¿ç×°±¸Î»Öøú×Ù ¡£¡£Êܺ¦Õß¿ÉÄÜÊÕµ½×°±¸×Ô´øµÄ¸ú×Ù֪ͨ£¬£¬µ«ÒòÏÔʾΪ×ÔÉí×°±¸¶øºöÊÓÖÒÑÔ£¬£¬µ¼Öºã¾ÃÒþ²Ø¸ú×Ù ¡£¡£¹È¸èÏòÑо¿Ö°Ô±·¢·Å1.5ÍòÃÀÔª×î¸ßÉͽ𣬣¬²¢Óë³§ÉÌÏàÖúÔÚ150ÌìÅû¶ÆÚÄÚÐû²¼²¹¶¡ ¡£¡£


https://www.bleepingcomputer.com/news/security/critical-whisperpair-flaw-lets-hackers-track-eavesdrop-via-bluetooth-audio-devices/


4. ¼ÓÄôóCIROÊý¾Ýй¶²¨¼°75ÍòͶ×ÊÕß


1ÔÂ18ÈÕ£¬£¬¼ÓÄôóͶ×Êî¿Ïµ×éÖ¯£¨CIRO£©¿ËÈÕ֤ʵ£¬£¬È¥Äê8ÔÂÔâÓöµÄÍøÂçÇå¾²ÊÂÎñ×îÖÕÈ·ÈÏÓ°ÏìÔ¼75ÍòÃû¼ÓÄôóͶ×ÊÕߣ¬£¬³ÉΪ¸Ã¹úÈ¥Äê×îÑÏÖØµÄÍøÂçÇå¾²ÊÂÎñÖ®Ò» ¡£¡£CIRO×÷Ϊ2023Ä꽨ÉèµÄ¼ÓÄôóͶ×ÊÉúÒâÉÌ¡¢ÅäºÏ»ù½ðÉúÒâÉ̼°ÉúÒâ»î¶¯µÄ¹ú¼Ò×ÔÂÉ»ú¹¹£¬£¬ÊǽðÈÚî¿Ïµ¿ò¼ÜµÄ½¹µãÖ§ÖùÖ®Ò» ¡£¡£CIRO·¢Ã÷ϵͳ±£´æÍøÂçÇå¾²Íþвºó£¬£¬Á¬Ã¦¹Ø±Õ²¿·Ö·ÇÒªº¦ÏµÍ³²¢Æô¶¯ÊÓ²ì ¡£¡£Ö»¹Ü8ÔÂ18ÈÕ¶ÔÍâÅû¶ÊÂÎñ£¬£¬µ«ÍêÕûÓ°Ïì¹æÄ£Ö±ÖÁ½ñÄê1ÔÂ14ÈÕÍê³ÉÆÕ±é·¨Ö¤ÊÓ²ìºó²ÅµÃÒÔÃ÷È· ¡£¡£ÊÓ²ìÏÔʾ£¬£¬²¿·Ö³ÉÔ±¹«Ë¾¼°Æä×¢²áÔ±¹¤µÄСÎÒ˽¼ÒÐÅÏ¢Ôâй¶£¬£¬ÏêϸÊý¾ÝÒòÈ˶øÒ죬£¬¿ÉÄܰüÀ¨³öÉúÈÕÆÚ¡¢µç»°ºÅÂë¡¢ÄêÊÕÈë¡¢Éç»á°ü¹ÜºÅÂë¡¢Õþ¸®½ÒÏþµÄÉí·ÝÖ¤ºÅÂ롢Ͷ×ÊÕË»§ºÅÂë¼°ÕË»§±¨±íµÈÃô¸ÐÐÅÏ¢ ¡£¡£ÖµµÃ×¢ÖØµÄÊÇ£¬£¬CIROÇ¿µ÷Æäϵͳδ´æ´¢µÇ¼ƾ֤»òÕË»§Çå¾²ÎÊÌ⣬£¬Òò´ËÕâЩÐÅϢδÊÜÓ°Ïì ¡£¡£Îª½µµÍΣº¦£¬£¬CIRO½«ÎªËùÓÐÊÜÓ°ÏìͶ×ÊÕßÌṩΪÆÚÁ½ÄêµÄÃâ·ÑÐÅÓÃ¼à¿ØºÍÉí·Ý͵ÇÔ±£» £»£»£»¤Ð§ÀÍ£¬£¬ÊÜÓ°ÏìÕß½«ÊÕµ½Ö±½Ó֪ͨ¼°×¢²áÖ¸Òý£¬£¬Î´ÊÕµ½Í¨ÖªÕß¿É×Ô¶¯ÁªÏµCIROÈ·ÈÏ״̬ ¡£¡£


https://www.bleepingcomputer.com/news/security/ciro-data-breach-last-year-exposed-info-on-750-000-canadian-investors/


5. ¶ñÒâGhostPosterä¯ÀÀÆ÷À©Õ¹³ÌÐò×°ÖÃÁ¿´ï84Íò´Î


1ÔÂ17ÈÕ£¬£¬¿ËÈÕ£¬£¬Ñо¿Ö°Ô±ÔÚChrome¡¢FirefoxºÍEdgeÓ¦ÓÃÊÐËÁÖз¢Ã÷17¸öÓëGhostPoster¹¥»÷»î¶¯Ïà¹ØµÄ¶ñÒâä¯ÀÀÆ÷À©Õ¹³ÌÐò£¬£¬×Ü×°ÖÃÁ¿´ï84Íò´Î ¡£¡£¸Ã»î¶¯×îÔçÓÉKoi SecurityÓÚ2025Äê12ÔÂÅû¶£¬£¬Éæ¼°À©Õ¹Í¨¹ýͼ±êÒþ²Ø¶ñÒâJavaScript´úÂ룬£¬¼à¿ØÓû§ä¯ÀÀÆ÷»î¶¯²¢Ö²ÈëºóÃÅ ¡£¡£ÕâЩ´úÂë»á´ÓÍⲿ»ñÈ¡»ìÏýµÄÓÐÓÃÔØºÉ£¬£¬¸ú×Ùä¯ÀÀÐÐΪ£¬£¬Ð®ÖƵçÉÌÆ½Ì¨Í¬ÃËÁ´½Ó£¬£¬²¢×¢Èë²»¿É¼ûiframeʵÑé¹ã¸æÚ²Æ­ºÍµã»÷ڲƭ ¡£¡£LayerXµÄ×îб¨¸æÖ¸³ö£¬£¬Ö»¹Ü»î¶¯ÒÑÆØ¹â£¬£¬µ«ÈÔÒ»Á¬»îÔ¾ ¡£¡£17¸öÀ©Õ¹ÖУ¬£¬×°ÖÃÁ¿×î¸ßµÄ"ÓÒ¼üµã»÷¹È¸è·­Òë"´ï52.2Íò´Î£¬£¬"ʹÓÃGoogle·­ÒëÑ¡¶¨Îı¾"´ï15.9Íò´Î£¬£¬ÆäÓàÈç"Ads Block Ultimate""¸¡¶¯²¥·ÅÆ÷"µÈ×°ÖÃÁ¿´ÓÊýǧµ½ÊýÍò²»µÈ ¡£¡£» £»£»£»î¶¯×î³õÔÚMicrosoft Edgeƽ̨Ìᳫ£¬£¬ºóÀ©Õ¹ÖÁFirefoxºÍChrome£¬£¬²¿·ÖÀ©Õ¹×Ô2020ÄêÆð±ã±£´æÓÚ²å¼þÊÐËÁ£¬£¬ÏÔʾÆäºã¾ÃÔËÓªµÄÀÖ³ÉÐÔ ¡£¡£ÏÖÔÚ£¬£¬MozillaºÍ΢ÈíÒѽ«Ïà¹ØÀ©Õ¹Ï¼ܣ¬£¬¹È¸èҲȷÈÏChromeÊÐËÁÖеÄÕâЩÀ©Õ¹Òѱ»É¾³ý ¡£¡£µ«ÒÑ×°ÖõÄÓû§ÈÔÃæÁÙΣº¦£¬£¬Ðè×Ô¶¯Ð¶Ôز¢¼à¿ØÕË»§Òì³£ ¡£¡£


https://www.bleepingcomputer.com/news/security/malicious-ghostposter-browser-extensions-found-with-840-000-installs/


6. Fortinet FortiSIEM¸ßΣÎó²îÔâÆð¾¢Ê¹ÓÃ


1ÔÂ16ÈÕ£¬£¬¿ËÈÕ£¬£¬Fortinet FortiSIEM±»ÆØ±£´æÑÏÖØÎó²î£¨CVE-2025-64155£©£¬£¬Æä¿´·¨Ñé֤ʹÓôúÂëÒѹûÕæ£¬£¬ÇÒÕý±»¹¥»÷Õ߯ð¾¢Ê¹Óà ¡£¡£¸ÃÎó²îÓÉHorizon3.aiÇå¾²Ñо¿Ô±Zach Hanley·¢Ã÷£¬£¬ÊµÖÊÊDzÙ×÷ϵͳÏÂÁî×¢È루CWE-78£©ÓëȨÏÞÌáÉýµÄ×éºÏ£¬£¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¹¥»÷Õßͨ¹ýÈ«ÐĽṹµÄTCPÇëÇóÖ´ÐÐí§Òâ´úÂ룬£¬×îÖÕ¿É»ñÈ¡root»á¼ûȨÏÞ ¡£¡£Îó²îÓ°ÏìFortiSIEM 6.7ÖÁ7.5°æ±¾£¬£¬FortinetÒÑÐû²¼Çå¾²¸üУ¬£¬½¨ÒéÓû§Éý¼¶ÖÁ7.4.1¼°ÒÔÉÏ¡¢7.3.5¼°ÒÔÉÏ¡¢7.2.7¼°ÒÔÉÏ»ò7.1.9¼°ÒÔÉϰ汾£» £»£»£»Ê¹Óþɰ汾µÄÓû§ÐèǨáãÖÁÐÞ¸´°æ±¾ ¡£¡£ÔÝʱ½â¾ö¼Æ»®ÎªÏÞÖÆphMonitorЧÀͶ˿ڣ¨7900£©µÄ»á¼û£¬£¬ÒÔ»º½âÎÞ·¨Á¬Ã¦Éý¼¶µÄÇéÐÎ ¡£¡£ÊÖÒÕϸ½ÚÏÔʾ£¬£¬Îó²îȪԴÔÚÓÚphMonitorЧÀÍ̻¶µÄÊýÊ®¸öδÂÄÀúÖ¤µÄÔ¶³Ì¿ÉŲÓÃÏÂÁî´¦Öóͷ£³ÌÐò ¡£¡£¹¥»÷Õß¿ÉÀÄÓòÎÊý×¢ÈëÁýÕÖ/opt/charting/redishb.shÎļþ£¬£¬´Ó¶øÒÔrootȨÏÞÖ´ÐдúÂë ¡£¡£Horizon3.aiÒÑÐû²¼ÊÖÒÕÎÄÕ¼°ÈëÇÖÖ¸±ê£¬£¬ÖÎÀíÔ±¿Éͨ¹ý¼ì²é/opt/phoenix/log/phoenix.logsÖеÄphMonitorÈÕÖ¾£¬£¬²éÕÒ°üÀ¨PHL_ERRORÌõÄ¿ÖеĶñÒâÔØºÉURLÒÔʶ±ðÈëÇÖ ¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-now-exploiting-critical-fortinet-fortisiem-vulnerability-in-attacks/