Fortinet³ÎÇåCVE-2025-24472·ÇÁãÈÕÎó²î£¬£¬£¬£¬£¬£¬ £¬£¬½öCVE-2024-55591±»Ê¹ÓÃ

Ðû²¼Ê±¼ä 2025-02-13

1. Fortinet³ÎÇåCVE-2025-24472·ÇÁãÈÕÎó²î£¬£¬£¬£¬£¬£¬ £¬£¬½öCVE-2024-55591±»Ê¹ÓÃ


2ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬ £¬£¬Fortinet¿ËÈÕÖÒÑԳƣ¬£¬£¬£¬£¬£¬ £¬£¬¹¥»÷ÕßÕýÔÚʹÓÃFortiOSºÍFortiProxyÖеÄÎó²îÀ´Ð®ÖÆ·À»ðǽ²¢ÇÖÈëÆóÒµÍøÂç¡£¡£¡£¡£¡£¡£¡£µ«ËæºóFortinet֪ͨ£¬£¬£¬£¬£¬£¬ £¬£¬ÐÂÅû¶µÄCVE-2025-24472Îó²î²¢·ÇÁãÈÕÎó²î£¬£¬£¬£¬£¬£¬ £¬£¬ÇÒÒÑÔÚÒ»Ô·ÝÐÞ¸´¡£¡£¡£¡£¡£¡£¡£Í¬Ê±È·ÈÏ£¬£¬£¬£¬£¬£¬ £¬£¬Ö»ÓÐCVE-2024-55591Îó²î±»ÏÖʵʹÓᣡ£¡£¡£¡£¡£¡£Èô¿Í»§ÒÑÆ¾Ö¤ÏÈǰָµ¼Éý¼¶£¬£¬£¬£¬£¬£¬ £¬£¬ÔòÒÑÊܱ£»£»£»£»£»¤¡£¡£¡£¡£¡£¡£¡£CVE-2025-24472Îó²îÔÊÐíÔ¶³Ì¹¥»÷Õßͨ¹ý¶ñÒâCSFÊðÀíÇëÇó»ñµÃ³¬µÈÖÎÀíԱȨÏÞ£¬£¬£¬£¬£¬£¬ £¬£¬Ó°ÏìFortiOS 7.0.0ÖÁ7.0.16¼°FortiProxy²¿·Ö°æ±¾£¬£¬£¬£¬£¬£¬ £¬£¬ÒÑÔÚ¸üа汾ÖÐÐÞ¸´¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß»¹Ê¹ÓÃCVE-2024-55591Îó²îÔÚ×°±¸ÉϽ¨ÉèËæ»úÖÎÀíÔ±ÕË»§£¬£¬£¬£¬£¬£¬ £¬£¬ÐÞ¸ÄÉèÖ㬣¬£¬£¬£¬£¬ £¬£¬²¢Í¨¹ý¶ñÒâÕÊ»§»á¼ûSSLVPN¡£¡£¡£¡£¡£¡£¡£ÍøÂçÇå¾²¹«Ë¾Arctic Wolf±¨¸æÁËÏà¹Ø¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬ £¬£¬°üÀ¨Îó²îɨÃè¡¢Õì̽¡¢SSL VPNÉèÖü°ºáÏòÒÆ¶¯µÈ½×¶Î£¬£¬£¬£¬£¬£¬ £¬£¬²¢½¨Òé½ûÓù«¹²½Ó¿ÚÉϵķÀ»ðǽÖÎÆÊÎö¼û¡£¡£¡£¡£¡£¡£¡£Fortinet½¨ÒéÎÞ·¨Á¬Ã¦¸üеÄÖÎÀíÔ±½ûÓÃHTTP/HTTPSÖÎÀí½çÃæ»òÏÞÖÆ»á¼ûIPµØµã×÷ΪÔÝʱ½â¾öÒªÁì¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/fortinet-discloses-second-firewall-auth-bypass-patched-in-january/


2. ʹÓþɰæ ThinkPHP ºÍ ownCloud Îó²îµÄ¹¥»÷¼¤Ôö


2ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬ £¬£¬½üÆÚºÚ¿Í»î¶¯·ºÆðÔöÌíÇ÷ÊÆ£¬£¬£¬£¬£¬£¬ £¬£¬ËûÃÇÖ÷ÒªÕë¶ÔÒ×ÊÜ2022ÄêºÍ2023Äê¾ÉÇå¾²ÎÊÌâÓ°ÏìµÄ¡¢Î¬»¤²»ÉƵÄ×°±¸Ìᳫ¹¥»÷¡£¡£¡£¡£¡£¡£¡£¾ÝÍþв¼à¿ØÆ½Ì¨GreyNoise±¨¸æ£¬£¬£¬£¬£¬£¬ £¬£¬Ê¹ÓÃCVE-2022-47945ºÍCVE-2023-49103Îó²îµÄ¹¥»÷ÐÐΪÕßÊýÄ¿¼¤Ôö¡£¡£¡£¡£¡£¡£¡£CVE-2022-47945Éæ¼°ThinkPHP¿ò¼ÜµÄÍâµØÎļþ°üÀ¨£¨LFI£©ÎÊÌ⣬£¬£¬£¬£¬£¬ £¬£¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÖ´ÐÐí§Òâ²Ù×÷ϵͳÏÂÁ£»£»£»£»¶øCVE-2023-49103ÔòÓ°Ï쿪ԴÎļþ¹²ÏíÈí¼þownCloud£¬£¬£¬£¬£¬£¬ £¬£¬ºÚ¿Í¿Éͨ¹ý¸ÃÎó²îÇÔÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£Ö»¹ÜÕâЩÎó²îµÄÎó²îÕ¹ÍûÆÀ·Öϵͳ£¨EPSS£©ÆÀ·Ö½ÏµÍ£¬£¬£¬£¬£¬£¬ £¬£¬ÇÒδËùÓÐÁÐÈëCISAµÄÒÑ֪ʹÓÃÎó²î£¨KEV£©Ä¿Â¼£¬£¬£¬£¬£¬£¬ £¬£¬µ«GreyNoiseÒÑÊӲ쵽´ó×ÚΨһIPÊÔͼʹÓÃÕâЩÎó²î£¬£¬£¬£¬£¬£¬ £¬£¬ÇһÓÐËùÔöÌí¡£¡£¡£¡£¡£¡£¡£Îª±£»£»£»£»£»¤ÏµÍ³£¬£¬£¬£¬£¬£¬ £¬£¬½¨ÒéÓû§Éý¼¶µ½ThinkPHP 6.0.14»ò¸ü¸ß°æ±¾£¬£¬£¬£¬£¬£¬ £¬£¬½«ownCloud GraphAPIÉý¼¶µ½0.3.1¼°¸üа汾£¬£¬£¬£¬£¬£¬ £¬£¬²¢½«Ç±ÔÚÒ×Êܹ¥»÷µÄʵÀýÍÑ»ú»òÖÃÓÚ·À»ðǽºóÃæ¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/surge-in-attacks-exploiting-old-thinkphp-and-owncloud-flaws/


3. Kimsuky½ÓÄÉClickFixÕ½ÂÔÌᳫÐÂÐÍÍøÂç¹¥»÷


2ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬ £¬£¬³¯Ïʹú¼ÒÑÝÔ±¡°Kimsuky¡±½üÆÚ½ÓÄÉÁËÒ»ÖÖÊÜClickFix»î¶¯Æô·¢µÄÐÂÕ½ÂÔ¾ÙÐÐÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£¡£ClickFixÊÇÒ»ÖÖÉç»á¹¤³ÌÕ½ÂÔ£¬£¬£¬£¬£¬£¬ £¬£¬Í¨¹ýÓÕÆ­ÐÔ¹ýʧÐÂÎÅ»òÌáÐÑÓÕµ¼Êܺ¦ÕßÖ´ÐжñÒâ´úÂ룬£¬£¬£¬£¬£¬ £¬£¬³£ÓÃÓÚÈö²¥ÐÅÏ¢ÇÔÈ¡¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£Kimsukyαװ³Éº«¹úÕþ¸®¹ÙÔ±£¬£¬£¬£¬£¬£¬ £¬£¬ÓëÄ¿µÄ½¨ÉèÐÅÈκ󣬣¬£¬£¬£¬£¬ £¬£¬·¢ËÍ´øÓÐPDF¸½¼þµÄÓã²æÊ½ÍøÂç´¹ÂÚµç×ÓÓʼþ¡£¡£¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬ £¬£¬ÕâЩPDFÎĵµÏÖʵÉÏÖ¸µ¼Êܺ¦Õß»á¼ûÐéαװ±¸×¢²áÁ´½Ó£¬£¬£¬£¬£¬£¬ £¬£¬ÒªÇóËûÃÇÒÔÖÎÀíÔ±Éí·ÝÔËÐÐPowerShell²¢Õ³Ìù¹¥»÷ÕßÌṩµÄ´úÂë¡£¡£¡£¡£¡£¡£¡£Ò»µ©Ö´ÐУ¬£¬£¬£¬£¬£¬ £¬£¬¸Ã´úÂë»á×°ÖÃÔ¶³Ì×ÀÃæ¹¤¾ß£¬£¬£¬£¬£¬£¬ £¬£¬ÏÂÔØÖ¤Ê飬£¬£¬£¬£¬£¬ £¬£¬²¢½«Êܺ¦Õß×°±¸×¢²áµ½Ô¶³ÌЧÀÍÆ÷£¬£¬£¬£¬£¬£¬ £¬£¬Ê¹¹¥»÷ÕßÄܹ»Ö±½Ó»á¼û²¢ÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£¡£¡£Î¢Èí×Ô2025Äê1ÔÂÆðÔÚÓÐÏÞ¹æÄ£µÄ¹¥»÷ÖÐÊӲ쵽ÕâÖÖÕ½ÂÔ£¬£¬£¬£¬£¬£¬ £¬£¬Ä¿µÄÉæ¼°¹ú¼ÊÊÂÎñ×éÖ¯¡¢·ÇÕþ¸®×éÖ¯¡¢Õþ¸®»ú¹¹ºÍýÌ幫˾µÄСÎÒ˽¼Ò¡£¡£¡£¡£¡£¡£¡£Î¢ÈíÒÑ֪ͨÊÜÓ°Ïì¿Í»§£¬£¬£¬£¬£¬£¬ £¬£¬²¢ÖÒÑÔÆäËûÈË×¢ÖØÕâÒ»ÐÂÕ½ÂÔ£¬£¬£¬£¬£¬£¬ £¬£¬ÉóÉ÷¿´´ýËùÓÐδ¾­ÇëÇóµÄͨѶ¡£¡£¡£¡£¡£¡£¡£Óû§Ó¦ÌØÊâСÐÄÔÚÏ߸´ÖƲ¢Ö´ÐдúÂëµÄÇëÇ󣬣¬£¬£¬£¬£¬ £¬£¬ÓÈÆäÊÇÔÚÒÔÖÎÀíԱȨÏÞÖ´ÐÐʱ¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/dprk-hackers-dupe-targets-into-typing-powershell-commands-as-admin/


4. ¶íÂÞ˹ºÚ¿Í×éÖ¯APT44·ÖÖ§¡°±´¿Ç±©Ñ©¡±È«Çò¹¥»÷»î¶¯½ÒÃØ


2ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬ £¬£¬¶íÂÞ˹Õþ¸®Ö§³ÖµÄºÚ¿Í×éÖ¯APT44µÄÒ»¸ö·ÖÖ§£¬£¬£¬£¬£¬£¬ £¬£¬±»³ÆÎª¡°±´¿Ç±©Ñ©¡±»ò¡°É³³æ¡±£¬£¬£¬£¬£¬£¬ £¬£¬×Ô2021ÄêÒÔÀ´Ò»Ö±»îÔ¾ÓÚÕë¶ÔÖ÷Òª×éÖ¯ºÍÕþ¸®µÄÍøÂç¹¥»÷ÖУ¬£¬£¬£¬£¬£¬ £¬£¬ÌØÊâÊÇÔÚÄÜÔ´¡¢Ê¯ÓͺÍ×ÔÈ»Æø¡¢µçÐÅ¡¢º½Ô˺ÍÎäÆ÷ÖÆÔìÁìÓò¡£¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯ÖÂÁ¦ÓÚ»ñȡĿµÄϵͳµÄ³õʼ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬ £¬£¬²¢½¨É賤ÆÚÐÔÒÔά³Ö±£´æ£¬£¬£¬£¬£¬£¬ £¬£¬ÒÔ±ãÆäËûAPT44×Ó×é½ÓÊÜ¡£¡£¡£¡£¡£¡£¡£Î¢ÈíÍþвÇ鱨ÍŶÓÊӲ쵽£¬£¬£¬£¬£¬£¬ £¬£¬¸Ã×éÖ¯Õë¶ÔÎÚ¿ËÀ¼¡¢Å·ÖÞ¡¢ÖÐÑÇ¡¢ÄÏÑǺÍÖж«µØÇøµÄÒªº¦ÁìÓò¿ªÕ¹Ê±»úÐÔÐж¯£¬£¬£¬£¬£¬£¬ £¬£¬ÌØÊâÊÇÔÚ¶íÂÞ˹ÈëÇÖÎÚ¿ËÀ¼ºó£¬£¬£¬£¬£¬£¬ £¬£¬ÔöÇ¿Á˶ÔÎÚ¿ËÀ¼Òªº¦»ù´¡ÉèÊ©µÄ¹¥»÷¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ £¬£¬¸Ã×éÖ¯»¹Ê¹ÓöàÖÖÊÖÒÕÆÆËðÍøÂ磬£¬£¬£¬£¬£¬ £¬£¬°üÀ¨Ê¹ÓÃnÈÕÎó²î¡¢Æ¾Ö¤ÍµÇԺ͹©Ó¦Á´¹¥»÷µÈ¡£¡£¡£¡£¡£¡£¡£ÔÚ»ñÈ¡»á¼ûȨÏ޺󣬣¬£¬£¬£¬£¬ £¬£¬ºÚ¿Íͨ¹ý°²ÅÅ×Ô½ç˵Web shell½¨É賤ÆÚÐÔ£¬£¬£¬£¬£¬£¬ £¬£¬²¢Ê¹ÓÃÕýµ±µÄITÔ¶³ÌÖÎÀí¹¤¾ßÖ´ÐÐÏÂÁ£¬£¬£¬£¬£¬ £¬£¬Í¬Ê±Ã°³äITÖÎÀíÔ±ÒÔÌӱܼì²â¡£¡£¡£¡£¡£¡£¡£¹ØÓÚ³õʼ»á¼ûºóµÄ»î¶¯£¬£¬£¬£¬£¬£¬ £¬£¬ÍþвÐÐΪÕßÇÔȡƾ֤¡¢Ð¹Â¶Êý¾Ý£¬£¬£¬£¬£¬£¬ £¬£¬²¢Í¨¹ýTorÍøÂçÒþ²ØÅþÁ¬¡£¡£¡£¡£¡£¡£¡£×îºó£¬£¬£¬£¬£¬£¬ £¬£¬¸Ã×éÖ¯¾ÙÐкáÏòÒÆ¶¯£¬£¬£¬£¬£¬£¬ £¬£¬Ð޸Ļù´¡ÉèÊ©ÒÔÖª×ãÆäÔËÓªÐèÇ󡣡£¡£¡£¡£¡£¡£Î¢ÈíÌåÏÖ£¬£¬£¬£¬£¬£¬ £¬£¬¸Ã¶íÂÞ˹ºÚ¿ÍС×éµÄÓ°ÏìÁ¦¿¿½üÈ«Çò£¬£¬£¬£¬£¬£¬ £¬£¬²¢·ÖÏíÁËá÷ÁÔÅÌÎÊ¡¢¹¥»÷Ö¸±êºÍYARA¹æÔò£¬£¬£¬£¬£¬£¬ £¬£¬ÒÔ×ÊÖú·ÀÓùÕßʵʱ²¶»ñ²¢×èÖ¹¸ÃÍþвÐÐΪÕߵĻ¡£¡£¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/badpilot-network-hacking-campaign-fuels-russian-sandworm-attacks/


5. HipshipperÊý°ÙÍòÔËÊä±êÇ©ÆØ¹â£¬£¬£¬£¬£¬£¬ £¬£¬Ð¡ÎÒ˽¼ÒÐÅÏ¢Çå¾²½ôÆÈ


2ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬ £¬£¬HipshipperÊÇΪeBay¡¢ShopifyºÍÑÇÂíÑ·Âô¼ÒÌṩ¹ú¼ÊÔËÊäЧÀÍµÄÆ½Ì¨£¬£¬£¬£¬£¬£¬ £¬£¬½üÆÚÔâÓöÁËÒ»ÆðÑÏÖØµÄÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£¡£ÔÚ2024Äê12ÔÂÕâ¸ö¹ú¼ÊÔËÊäá¯ÁëÔ£¬£¬£¬£¬£¬£¬ £¬£¬CybernewsÑо¿ÍŶӷ¢Ã÷HipshipperµÄÒ»¸öδÊܱ£»£»£»£»£»¤µÄAWS´æ´¢Í°Ì»Â¶ÁËÁè¼Ý1430ÍòÌõ¼Í¼£¬£¬£¬£¬£¬£¬ £¬£¬Ö÷Òª°üÀ¨ÔËÊä±êÇ©ºÍº£¹ØÉ걨±í£¬£¬£¬£¬£¬£¬ £¬£¬Ð¹Â¶ÁËÂò¼ÒµÄÈ«Ãû¡¢¼Òͥסַ¡¢µç»°ºÅÂë¼°¶©µ¥ÏêÇéµÈСÎÒ˽¼ÒÏêϸÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£ÕâЩй¶µÄÊý¾Ý¿ÉÄܱ»ÍøÂç·¸·¨·Ö×ÓÓÃÓڲ߻®¸ß¼¶Õ©Æ­¡¢ÍøÂç´¹ÂÚ¹¥»÷»òÓÐÕë¶ÔÐԵĶñÒâÈí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬ £¬£¬ÔöÌíÁËÊܺ¦ÕßÔâÊÜڲƭ¡¢É§ÈÅ¡¢ÍµÇԺ;­¼ÃËðʧµÄΣº¦¡£¡£¡£¡£¡£¡£¡£ÐÒÔ˵ÄÊÇ£¬£¬£¬£¬£¬£¬ £¬£¬ÔÚCybernewsÁªÏµHipshipperºó£¬£¬£¬£¬£¬£¬ £¬£¬¸Ã¹«Ë¾ÊµÊ±¹Ø±ÕÁË̻¶µÄ´æ´¢Í°£¬£¬£¬£¬£¬£¬ £¬£¬±ÜÃâÁËÊý¾ÝµÄ½øÒ»²½Ð¹Â¶¡£¡£¡£¡£¡£¡£¡£ÎªÁË×èÖ¹ÀàËÆÊÂÎñÔٴα¬·¢£¬£¬£¬£¬£¬£¬ £¬£¬Ñо¿Ö°Ô±½¨ÒéÆóÒµÔöÇ¿»á¼û¿ØÖÆ¡¢¼à¿Ø»á¼ûÈÕÖ¾¡¢ÆôÓÃЧÀÍÆ÷¶Ë¼ÓÃÜ¡¢ÊµÑéSSL/TLSÇ徲ͨѶ£¬£¬£¬£¬£¬£¬ £¬£¬²¢Ë¼Á¿°´ÆÚÉ󼯡¢×Ô¶¯Çå¾²¼ì²éºÍÔ±¹¤ÅàѵµÈÇå¾²×î¼Ñʵ¼ù¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÊý¾Ýй¶µÄ·¢Ã÷ÈÕÆÚΪ2024Äê12ÔÂ2ÈÕ£¬£¬£¬£¬£¬£¬ £¬£¬Ê×´ÎÅû¶ÓÚ2024Äê12ÔÂ9ÈÕ£¬£¬£¬£¬£¬£¬ £¬£¬²¢ÓÚ2025Äê1ÔÂ8ÈÕ¿¢ÊÂй¶¡£¡£¡£¡£¡£¡£¡£


https://cybernews.com/security/hipshipper-data-leak-exposed-shipping-records/


6. CISA½«WindowsºÍZyxel×°±¸Îó²îÌí¼Óµ½ÒÑÖª±»Ê¹ÓÃÎó²îĿ¼


2ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬ £¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©½üÆÚ¸üÐÂÁËÆäÒÑÖª±»Ê¹ÓÃÎó²î£¨KEV£©Ä¿Â¼£¬£¬£¬£¬£¬£¬ £¬£¬ÐÂÔöÁËÉæ¼°WindowsºÍZyxel×°±¸µÄ¶à¸öÎó²î¡£¡£¡£¡£¡£¡£¡£ÆäÖаüÀ¨Zyxel DSL CPE OSµÄÏÂÁî×¢ÈëÎó²îCVE-2024-40891ºÍCVE-2024-40890£¬£¬£¬£¬£¬£¬ £¬£¬ÒÔ¼°Microsoft WindowsµÄÁ½¸öÎó²î£º¸¨Öú¹¦Ð§Çý¶¯³ÌÐòµÄWinSock»ùÓڶѵĻº³åÇøÒç³öÎó²îCVE-2025-21418ºÍ´æ´¢Á´½Ó¸ú×ÙÎó²îCVE-2025-21391¡£¡£¡£¡£¡£¡£¡£CVE-2024-40891ºÍCVE-2024-40890ÔÊÐí¹¥»÷ÕßÔÚδÂÄÀúÖ¤µÄÇéÐÎÏÂÖ´ÐÐí§ÒâÏÂÁ£¬£¬£¬£¬£¬ £¬£¬¿ÉÄܵ¼ÖÂ×°±¸½ÓÊܵÈÑÏÖØÐ§¹û£¬£¬£¬£¬£¬£¬ £¬£¬ÇÒCVE-2024-40891Òѱ»ÊӲ쵽Êýǧ´Î¹¥»÷ʵÑé¡£¡£¡£¡£¡£¡£¡£¶øWindowsµÄÁ½¸öÎó²îÒ²±»Æð¾¢Ê¹Ó㬣¬£¬£¬£¬£¬ £¬£¬CVE-2025-21391ÔÊÐí¹¥»÷Õßɾ³ýÎļþ²¢¿ÉÄÜÁ¬Ïµ´úÂëÖ´ÐнÓÊÜϵͳ£¬£¬£¬£¬£¬£¬ £¬£¬CVE-2025-21418ÔòÔÊÐí¾­ÓÉÉí·ÝÑéÖ¤µÄÓû§»ñÈ¡ÏµÍ³ÌØÈ¨¡£¡£¡£¡£¡£¡£¡£Î¢ÈíÒÑÔÚ2025Äê2ÔµÄÇå¾²¸üÐÂÖÐÐÞ¸´ÁËÕâÁ½¸öWindowsÎó²î£¬£¬£¬£¬£¬£¬ £¬£¬µ«Zyxel×°±¸µÄÎó²îÉÐδ»ñµÃ¹©Ó¦ÉÌÐÞ¸´ºÍ¹ûÕæÅû¶¡£¡£¡£¡£¡£¡£¡£


https://securityaffairs.com/174135/security/u-s-cisa-adds-microsoft-windows-zyxel-device-flaws-known-exploited-vulnerabilities-catalog.htm