Framework LinuxµçÄÔUEFIÇå¾²Îó²îÆØ¹â

Ðû²¼Ê±¼ä 2025-10-16

1. Framework LinuxµçÄÔUEFIÇå¾²Îó²îÆØ¹â


10ÔÂ14ÈÕ£¬£¬£¬£¬ÃÀ¹úÓ²¼þ³§ÉÌFrameworkÉú²úµÄÔ¼20Íǫ̀LinuxµçÄÔÒò³ö³§Ô¤×°º¬¡°ÄÚ´æÐ޸ġ±£¨mm£©ÏÂÁîµÄÒÑÊðÃûUEFIÍâ¿Ç×é¼þ£¬£¬£¬£¬±£´æÑÏÖØÇå¾²Îó²î£¬£¬£¬£¬¿ÉÄܱ»¹¥»÷ÕßʹÓÃÈÆ¹ýÇå¾²Æô¶¯±£»£»£»£»¤¡£¡£¡£¡£¾Ý¹Ì¼þÇå¾²¹«Ë¾EclypsiumÆÊÎö£¬£¬£¬£¬¸ÃmmÏÂÁîÔ­±¾ÓÃÓÚ³õ¼¶Õï¶ÏºÍ¹Ì¼þµ÷ÊÔ£¬£¬£¬£¬¿ÉÖ±½Ó¶ÁдϵͳÄڴ棬£¬£¬£¬µ«¿É±»ÀÄÓÃÕë¶ÔgSecurity2±äÁ¿£¨UEFIÄ£¿£¿ £¿éÊðÃûÑéÖ¤µÄÒªº¦×é¼þ£©£¬£¬£¬£¬Í¨¹ýÁýÕÖÆäֵΪNULL»òÖØ¶¨ÏòÖÁÎÞÑéÖ¤º¯Êý£¬£¬£¬£¬´Ó¶ø½ûÓÃÊðÃûÑéÖ¤»úÖÆ¡£¡£¡£¡£¹¥»÷Õß¿Éͨ¹ý´ËÎó²î¼ÓÔØBlackLotus¡¢HybridPetya¡¢BootkittyµÈ¶ñÒâÖ¸µ¼¹¤¾ß°ü£¬£¬£¬£¬ÕâЩ¹¤¾ß¿É¹æ±Ü²Ù×÷ϵͳ¼¶Çå¾²¿ØÖÆ£¬£¬£¬£¬ÔÚÏµÍ³ÖØ×°ºóÈÔÒ»Á¬±£´æ£¬£¬£¬£¬ÐγÉÄÑÒÔɨ³ýµÄ³¤ÆÚÐÔÍþв¡£¡£¡£¡£Îó²îÓ°Ïì¹æÄ£º­¸ÇFramework 13¼°16ϵÁеĶà¿îÐͺÅ£¬£¬£¬£¬°üÀ¨IntelµÚ11-13´ú¡¢AMD Ryzen 7040/AI 300µÈ´¦Öóͷ£Æ÷°æ±¾£¬£¬£¬£¬ÏêϸÐÞ¸´°æ±¾ÒÑÃ÷È·£¬£¬£¬£¬Èç13´úIntel°æ±¾ÔÚ3.08°æÐÞ¸´¡¢AMD Ryzen AI 300ÔÚ3.04°æÐÞ¸´¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/secure-boot-bypass-risk-on-nearly-200-000-linux-framework-sytems/


2. 800ÃÀԪװ±¸¼´¿É×èµ²ÎÀÐÇͨѶÊý¾Ý


10ÔÂ14ÈÕ£¬£¬£¬£¬¼ÓÖÝ´óѧʥµØÑǸç·ÖУÓëÂíÀïÀ¼´óѧÁªºÏÑо¿Õ¹ÏÖ£¬£¬£¬£¬È«ÇòÔ¼°ëÊýÎÀÐÇͨѶÒòδ¼ÓÃÜÃæÁÙÑÏÖØÇ徲Σº¦£¬£¬£¬£¬½öÐè¼ÛÖµÔ¼800ÃÀÔªµÄÏÖ³É×°±¸¼´¿ÉʵÑé×èµ²¡£¡£¡£¡£Ñо¿ÍŶÓÔÚÊ¥µØÑǸç·ÖУÎݶ¥×é×°ÎÀÐÇÎüÊÕϵͳ£¬£¬£¬£¬°üÀ¨185ÃÀÔªÌìÏßµú¡¢140ÃÀÔªÖ§¼Ü¡¢195ÃÀÔªÂí´ï¼°230ÃÀÔªµ÷г¿¨£¬£¬£¬£¬ÀÖ³ÉÃé×¼µØÇòͬ²½ÎÀÐǺ󣬣¬£¬£¬ÊµÊ±²¶»ñÁËδ¼ÓÃܵÄ˽ÈËÊý¾Ý¡£¡£¡£¡£Ñо¿ÏÔʾ£¬£¬£¬£¬µçÐÅÔËÓªÉÌͨ¹ýÎÀÐÇÅþÁ¬Æ«Ô¶»ùÕ¾Óë½¹µãÍøÂçʱ£¬£¬£¬£¬Êý¾Ý´«ÊäÆÕ±éδ¼ÓÃÜ¡£¡£¡£¡£ÎÀÐÇÁýÕÖµØÇòÍâò»ý40%µÄÌØÕ÷£¬£¬£¬£¬Ê¹µÃÈÎÄÇÀïÓÚÁýÕÖ¹æÄ£ÄÚµÄÖ°Ô±¾ù¿É×èµ²Êý¾Ý¡£¡£¡£¡£ÔÚÈýÄêÑо¿Ê±´ú£¬£¬£¬£¬ÍŶÓÍøÂçµ½´ó×ÚδÊܱ£»£»£»£»¤Í¨Ñ¶£¬£¬£¬£¬°üÀ¨T-Mobile¡¢AT&TÄ«Î÷¸ç¼°Ä«Î÷¸çµçÐÅÓû§µÄͨ»°Óë¶ÌÐÅ£»£»£»£»º½°àÂÿ͵ÄWiFiä¯ÀÀ¼Í¼£»£»£»£»µçÁ¦¹«Ë¾¡¢Ê¯ÓÍÆ½Ì¨µÄÄÚ²¿ÐÅÏ¢£»£»£»£»ÒÔ¼°ÃÀ¹úºÍÄ«Î÷¸ç¾ü·½ÏµÍ³µÄ´«ÊäÄÚÈÝ¡£¡£¡£¡£Ïêϸ̻¶µÄÊý¾Ýº­¸ÇÃÀ¹úˮʦ½¢´¬±êʶÓëÍøÂçÊý¾Ý¡¢Ä«Î÷¸ç¾ü·½Ç鱨±¨¸æ¡¢·É»úά»¤ÈÕÖ¾¡¢ÊµÊ±²½¶ÓλÖÃÐÅÏ¢£¬£¬£¬£¬ÉõÖÁÄ«Î÷¸ç¹ú¼ÒµçÁ¦¹«Ë¾µÄÓû§ÐÅÏ¢¡¢ÊÂÇé¶©µ¥¼°Çå¾²±¨¸æ£¬£¬£¬£¬²¿·ÖÃÀ¹ú¹¤Òµ¿ØÖÆÏµÍ³ÔËÐÐÊý¾ÝÒà±»²¶»ñ¡£¡£¡£¡£


https://cybernews.com/security/satellite-surveillance-encryption-research/


3. CapitaÒòÊý¾Ýй¶ÊÂÎñÖ§¸¶1400ÍòÓ¢°÷


10ÔÂ15ÈÕ£¬£¬£¬£¬Ó¢¹úÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©¿ËÈÕ¶ÔÊý¾ÝÇý¶¯ÓªÒµÁ÷³ÌЧÀÍÌṩÉÌCapita´¦ÒÔ1400ÍòÓ¢°÷£¨Ô¼1870ÍòÃÀÔª£©·£¿£¿ £¿î£¬£¬£¬£¬ÒòÓÉÊÇ2023Ä걬·¢µÄÒ»ÆðÓ°Ïì660ÍòÈ˵ÄÖØ´óÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£´Ë´Î´¦·ÖÉæ¼°Capita plc¼°Æä×Ó¹«Ë¾Capita Pension Solutions Limited£¬£¬£¬£¬»®·Ö±»·£800ÍòºÍ600ÍòÓ¢°÷£¬£¬£¬£¬½Ï³õʼ4500ÍòÓ¢°÷µÄÄâ·£½ð¶î´ó·ùϵ÷£¬£¬£¬£¬Òò¸Ã¹«Ë¾ÒѼ縺ÔðÈΡ¢ÊµÑéÇ徲ˢв¢×Ô¶¯ÏòÊÜÓ°ÏìÕßÌṩÊý¾Ý±£»£»£»£»¤Ð§ÀÍ¡£¡£¡£¡£×÷ΪӢ¹ú´óÐÍÍâ°üºÍרҵЧÀ͹«Ë¾£¬£¬£¬£¬CapitaÓµÓÐÔ¼3.4ÍòÃûÔ±¹¤¡¢ÄêÊÕÈë´ï30ÒÚÓ¢°÷£¬£¬£¬£¬¿Í»§º­¸ÇµØ·½Òé»á¡¢NHS¡¢¹ú·À²¿¼°ÒøÐС¢µçÐŵÈÐÐÒµ¡£¡£¡£¡£ÊÂÎñÔ´ÓÚ2023Äê3ÔÂ22ÈÕÒ»ÃûÔ±¹¤ÏÂÔØ¶ñÒâÎļþ£¬£¬£¬£¬µ¼ÖºڿÍÈëÇÖÆäMicrosoft 365ÇéÐΡ£¡£¡£¡£Ö»¹ÜÎó²îÔÚ10·ÖÖÓÄÚ±»¼ì²â£¬£¬£¬£¬µ«Capitaδʵʱ¸ôÀëÊÜѬȾװ±¸£¬£¬£¬£¬Ê¹¹¥»÷ÕßµÃÒÔÔÚ58СʱÄÚºáÏòÒÆ¶¯£¬£¬£¬£¬×îÖÕÇÔÈ¡½ü1TBÊý¾Ý²¢°²ÅÅÀÕË÷Èí¼þ¡£¡£¡£¡£Black BastaÍÅ»ïÐû³Æ¶Ô´ËÈÏÕæ£¬£¬£¬£¬Íþвй¶Êý¾Ý¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/capita-to-pay-14-million-for-data-breach-impacting-66-million-people/


4. Slider Revolution²å¼þÎó²îÓ°ÏìÊý°ÙÍòWordPressÍøÕ¾


10ÔÂ15ÈÕ£¬£¬£¬£¬»îÔ¾×°Öó¬400ÍòµÄWordPress»¬¿é²å¼þSlider Revolution¿ËÈÕ±»ÆØ³ö±àºÅΪCVE-2025-9217µÄÇå¾²Îó²î£¬£¬£¬£¬Ó°Ïì6.7.36¼°ÒÔÉÏËùÓа汾¡£¡£¡£¡£¸ÃÎó²îÔ´ÓÚ²å¼þÖС°used_svg¡±ºÍ¡°used_images¡±Á½¸ö²ÎÊýµÄÑé֤ȱÏÝ£¬£¬£¬£¬ÕâÁ½¸ö²ÎÊýÓÃÓÚÖÎÀíͼÏñ/ÊÓÆµµ¼³ö¹¦Ð§¡£¡£¡£¡£ÓÉÓÚδÑÏ¿áÏÞÖÆÎļþÀàÐͺÍ·¾¶£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓôËÎó²î¶ÁȡЧÀÍÆ÷ÉϵÄí§ÒâÎļþ£¬£¬£¬£¬°üÀ¨´æ´¢Êý¾Ý¿âƾ֤ºÍ¼ÓÃÜÃÜÔ¿µÄwp-config.phpÎļþ£¬£¬£¬£¬ÍþÐ²ÍøÕ¾Êý¾ÝÇå¾²¡£¡£¡£¡£Çå¾²ÆÊÎöʦƾ֤ͨÓÃÎó²îÆÀ·Öϵͳ£¨CVSS£©ÆÀ¶¨¸ÃÎó²îΪ6.5·Ö£¬£¬£¬£¬ÊôÓÚÖеÈÑÏÖØÐÔ¡£¡£¡£¡£Îó²îÓÉ×ÔÁ¦Ñо¿Ô±¡°stealthcopter¡±ÓÚ2025Äê8ÔÂ11ÈÕͨ¹ýWordfenceÎó²îÉͽðÍýÏëÊ״α¨¸æ¡£¡£¡£¡£WordfenceÍŶÓÔÚ8ÔÂ19ÈÕÍê³ÉÑéÖ¤ºó£¬£¬£¬£¬½«ÏêÇéת´ï¸ø²å¼þ¿ª·¢ÉÌThemePunch¡£¡£¡£¡£¿£¿ £¿ª·¢ÍŶÓѸËÙÏìÓ¦£¬£¬£¬£¬ÔÚÁ½ÌìÄÚÈ·ÈÏÎÊÌâ²¢Æô¶¯ÐÞ¸´ÊÂÇ飬£¬£¬£¬×îÖÕÓÚ8ÔÂ28ÈÕÐû²¼6.7.37°æ±¾³¹µ×ÐÞ¸´Îó²î¡£¡£¡£¡£Îª´Ë£¬£¬£¬£¬Ñо¿Ö°Ô±»ñµÃ656ÃÀÔªµÄÉͽð½±Àø¡£¡£¡£¡£


https://www.infosecurity-magazine.com/news/flaw-slider-revolution-plugin/


5. Î÷°àÑÀʱÉоÞÍ·MANGOת´ïÓªÏúЧÀÍÉÌÊý¾Ýй¶ÊÂÎñ


10ÔÂ15ÈÕ£¬£¬£¬£¬Î÷°àÑÀʱÉÐÁãÊÛÉÌMANGOÏòÈ«Çò¿Í»§·¢ËÍÊý¾Ýй¶֪ͨ£¬£¬£¬£¬Åû¶ÆäÍⲿӪÏúЧÀ͹©Ó¦ÉÌÔâÓöÍøÂç¹¥»÷£¬£¬£¬£¬µ¼Ö²¿·Ö¿Í»§Ð¡ÎÒ˽¼ÒÐÅÏ¢±»²»·¨»á¼û¡£¡£¡£¡£×÷Ϊ½¨ÉèÓÚ1984Äê¡¢ÔÚ120¸ö¹ú¼ÒÓµÓÐ2800¸öÏúÊÛÍøµã¡¢ÄêÊÕÈë33ÒÚÅ·Ôª¡¢Ô±¹¤16300È˵ÄʱÉоÞÍ·£¬£¬£¬£¬MANGO´Ë´ÎÊÂÎñÉæ¼°¿Í»§ÐÕÃû£¨²»º¬ÐÕÊÏ£©¡¢¹ú¼Ò¡¢ÓÊÕþ±àÂë¡¢µç×ÓÓʼþµØµã¼°µç»°ºÅÂëµÈÓªÏú»î¶¯³£ÓÃÊý¾Ý£¬£¬£¬£¬µ«Ã÷ȷɨ³ýÐÕÊÏ¡¢ÒøÐÐÕË»§¡¢ÐÅÓÿ¨ÐÅÏ¢¡¢Éí·ÝÖ¤/»¤ÕÕºÅÂë¼°ÕË»§Æ¾Ö¤µÈ¸ßÃô¸ÐÐÅÏ¢¡£¡£¡£¡£MANGOÇ¿µ÷£¬£¬£¬£¬Æä½¹µãӪҵϵͳ¼°IT»ù´¡ÉèʩδÊÜÓ°Ï죬£¬£¬£¬¹«Ë¾ÔËÓª¼á³ÖÕý³£¡£¡£¡£¡£ÊÂÎñÔ´ÓÚµÚÈý·½ÓªÏúЧÀÍÉ̵ÄÇå¾²Îó²î£¬£¬£¬£¬¹¥»÷Õßͨ¹ý¸ÃÎó²î»ñÈ¡ÁË´æ´¢ÔÚÓªÏúϵͳÖеĿͻ§Êý¾Ý¡£¡£¡£¡£Ö»¹ÜȱʧÐÕÊϽµµÍÁËÖ±½ÓÉí·ÝµÁÓÃΣº¦£¬£¬£¬£¬µ«Ð¹Â¶µÄÁªÏµ·½·¨ÈÔ¿ÉÄܱ»ÓÃÓÚÍøÂç´¹Âڵȶþ´Î¹¥»÷¡£¡£¡£¡£ÊÂÎñ±¬·¢ºó£¬£¬£¬£¬MANGOÁ¬Ã¦Æô¶¯ËùÓÐÇ徲ЭÒ飬£¬£¬£¬²¢ÏòÎ÷°àÑÀÊý¾Ý±£»£»£»£»¤¾Ö£¨AEPD£©¼°î¿Ïµ²¿·Ö±¨¸æ¡£¡£¡£¡£ÎªÐ­ÖúÊÜÓ°Ïì¿Í»§£¬£¬£¬£¬¹«Ë¾ÉèÁ¢ÁËרÓÃÓÊÏäºÍÈÈÏߵ绰£¬£¬£¬£¬ÌṩΣº¦×Éѯ֧³Ö¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/clothing-giant-mango-discloses-data-breach-exposing-customer-info/


6. F5ÔâÓö¹ú¼Ò¼¶ºÚ¿ÍÈëÇÖ£¬£¬£¬£¬Î´¹ûÕæÎó²îÔ´´úÂëÔâÇÔÈ¡


10ÔÂ15ÈÕ£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²¹«Ë¾F5ÓÚ2025Äê8ÔÂ9ÈÕÅû¶ÔâÓö¹ú¼Ò¼¶ºÚ¿ÍÈëÇÖ£¬£¬£¬£¬¹¥»÷Õߺã¾Ã»á¼ûÆäϵͳ²¢ÇÔÈ¡ÁËÆì½¢²úÆ·BIG-IPµÄδ¹ûÕæÇå¾²Îó²î¼°Ô´´úÂë¡£¡£¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬ºÚ¿ÍÈëÇÖÁËF5µÄBIG-IP²úÆ·¿ª·¢ÇéÐμ°¹¤³Ì֪ʶÖÎÀíÆ½Ì¨£¬£¬£¬£¬ÇÔÈ¡Á˰üÀ¨BIG-IP²¿·ÖÔ´´úÂ롢δ¹ûÕæÎó²îÐÅÏ¢¼°¿Í»§ÉèÖÃϸ½ÚµÄÎļþ¡£¡£¡£¡£Ö»¹Ü±£´æÊý¾Ýй¶£¬£¬£¬£¬µ«F5Ç¿µ÷¹¥»÷ÕßδʹÓÃÕâЩÎó²î¾ÙÐÐÏÖʵ¹¥»÷£¬£¬£¬£¬Ò²Î´·¢Ã÷¹©Ó¦Á´Î£º¦»ò´úÂë±»¸Ä¶¯µÄÖ¤¾Ý£¬£¬£¬£¬ÆäCRM¡¢²ÆÎñ¡¢Ö§³Ö°¸ÀýÖÎÀíµÈ°üÀ¨¿Í»§Êý¾ÝµÄƽ̨¾ùδÊÜÓ°Ïì¡£¡£¡£¡£ÊÂÎñ±¬·¢ºó£¬£¬£¬£¬F5ѸËÙ½ÓÄɵ÷½â²½·¥£ºÂÖ»»Æ¾Ö¤¡¢Ç¿»¯»á¼û¿ØÖÆ¡¢°²ÅÅ×Ô¶¯»¯²¹¶¡ÖÎÀí¹¤¾ß£¬£¬£¬£¬²¢ÔöÇ¿ÍøÂçÇå¾²¼Ü¹¹¡£¡£¡£¡£¸Ã¹«Ë¾ÓëNCC GroupºÍIOActiveÏàÖú£¬£¬£¬£¬Í¨¹ý76ÃûÕÕÁ϶ÔBIG-IPÒªº¦Èí¼þ×é¼þ¼°¿ª·¢Á÷³Ì¾ÙÐÐÇå¾²Éó²é£¬£¬£¬£¬Î´·¢Ã÷¶ñÒâ´úÂëÖ²Èë¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬F5Ðû²¼ÁËÕë¶ÔBIG-IP¡¢F5OSµÈ²úÆ·µÄÇå¾²¸üУ¬£¬£¬£¬½¨Òé¿Í»§ÓÅÏÈ×°ÖÃÒÔÌá·ÀDZÔÚΣº¦£¬£¬£¬£¬²¢ÌṩÍþвÕ÷²ÉÖ¸Äϼ°iHealthÕï¶Ï¹¤¾ßµÄ×Ô¶¯¼ì²é¹¦Ð§¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/hackers-breach-f5-to-steal-undisclosed-big-ip-flaws-source-code/