KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_532868.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_532868.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_532855.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_532855.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_532854.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_532854.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_532867.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_532867.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_532866.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_532866.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_532853.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_532853.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【出處:台灣電腦緊急應變小組 TWCert】Juniper Networks CTP OS 存在重大資安漏洞(CVE-2026-33771,CVSS 4.x:9.1),此為弱密碼要求漏洞,可能允許未經身分驗證的網路攻擊者,利用本機帳號的弱密碼取得設備控制權。◎建議措施:請更新至以下版本:Juniper Networks CTP OS 9.3R1(含)之後版本◎相關IOC資訊:◎備註:◎參考資料:1. https://supportportal.juniper.net/s/article/2026-04-Security-Bulletin-CTP-OS-Configuring-password-requirements-does-not-work-which-permits-the-use-of-weak-passwords-CVE-2026-33771https://www.kjintelligent.com/en/hot_532860.html[TWCERT 分享資安情資]_Juniper Networks CTP OS 存在重大資安漏洞(CVE-2026-33771)2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_532860.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_532860.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
KJ Intelligent and Cloud Intelligent Operation jointly launch cybersecurity integration solution
Defend against cyberattacks and help businesses effectively enhance their cybersecurity capabilities during the digital transformation process.https://www.kjintelligent.com/en/hot_496856.htmlKJ Intelligent and Cloud Intelligent Operation jointly launch cybersecurity integration solution2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_496856.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_496856.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【出處:台灣電腦緊急應變小組 TWCert】近日Internet Systems Consortium (ISC)針對BIND發布重大資安公告(CVE-2026-3104,CVSS:7.5),此漏洞可透過精心設計的域名,造成BIND解析器中記憶體洩漏。◎建議措施:根據官方網站釋出的解決方式進行修補:https://kb.isc.org/docs/cve-2026-3104◎相關IOC資訊:◎備註:◎參考資料:1. https://kb.isc.org/docs/cve-2026-31042. https://nvd.nist.gov/vuln/detail/CVE-2026-3104https://www.kjintelligent.com/en/hot_532851.html[TWCERT 分享資安情資]_Internet Systems Consortium (ISC) 的BIND存在重大資安漏洞(CVE-2026-3104)2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_532851.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_532851.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 IBM WebSphere 產品存在多個漏洞,遠端攻擊者利用這些漏洞,於目標系統觸發權限提升、彷冒、洩露敏感資料、資料篡改及繞過身份驗證。二、存在風險 IBM WebSphere 產品存在多個漏洞,遠端攻擊者利用這些漏洞,於目標系統觸發權限提升、彷冒、洩露敏感資料、資料篡改及繞過身份驗證,其影響系統如下:受影響之系統/漏洞描述:WebSphere Application Server - Liberty 17.0.0.3 - 26.0.0.3三、建議改善措施 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://www.ibm.com/support/pages/node/7267345https://www.ibm.com/support/pages/node/7267347https://www.ibm.com/support/pages/node/7267351https://www.ibm.com/support/pages/node/7267362https://www.kjintelligent.com/en/hot_532865.html[資安漏洞通知-CIO]_IBM WebSphere 產品存在多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_532865.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_532865.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_532864.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_532864.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
科智數位 處於服務第一線 為客戶提供完善的資訊整合方案以及技術支援,深刻感受資訊安全對於企業營運的重要及影響,科智數位 以嚴謹的態度 透過第三方國際驗證公司 通過 ISO / IEC 27001:2022 資訊安全認證,以提供客戶安全及可信賴的資訊服務。目前通過 ISO / IEC 27001:2022 ,證明科智數位能鑑別資訊安全弱點,透過有效的計劃與管理及全體同仁的資訊安全專業能力、資訊安全共識來面對企業內外可能遭遇之資訊安全威脅並確保於最低風險下持續健康營運。
資訊安全政策[資安防護、人人有責].考量公司之核心資訊系統及相關利害關係者之需求及期望,基於保護資訊資產機密性、完整性、可用性為目標,將資訊系統開發維運、軟體專案服務及機房優先納入資訊安全管理範圍,展現本公司永續發展經營管理理念。.為避免因人為疏失、蓄意或天然災害等因素,導致資訊資產不當使用、洩漏、竄改、破壞等情事發生,對本公司帶來可能之風險及危害,應採用組織、人員、技術或實體等面向控制措施適切應對風險。資訊安全目標.維護資訊之機密性、完整性與可用性,並保障個人資料隱私。.保護業務服務資訊,避免未經授權的存取、修改,確保其正確完整。.建立資訊營運持續計畫,以確保業務服務之持續運作。.業務服務執行須符合相關法令或法規之要求。.組織每年依上述目標訂定量化量測項目,填寫於「目標管控及量測表」,依實際執行情形管控。https://www.kjintelligent.com/en/hot_516037.htmlKJ Intelligent CORP obtains ISO / IEC 27001:2022 Information Security Certification2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_516037.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_516037.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發遠端執行任意程式碼、阻斷服務狀況及洩露敏感資料。二、存在風險 Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發遠端執行任意程式碼、阻斷服務狀況及洩露敏感資料,其影響系統如下:受影響之系統/漏洞描述:Microsoft Edge 146.0.3856.84 之前的版本三、建議改善措施 企業及使用者如有上述漏洞版本應儘速更新: 請更新至 146.0.3856.84 或之後版本。 情資報告連結:https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#march-26-2026https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-4673https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-4674https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-4675https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-4677https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-4679https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-4680https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32187https://www.kjintelligent.com/en/hot_532863.html[資安漏洞通知-CIO]_Microsoft Edge 存在多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_532863.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_532863.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【出處:台灣電腦緊急應變小組 TWCert】近日Palo Alto Networks發布重大資安公告(CVE-2026-0234,CVSS:8.8),Cortex XSOAR 和 Cortex XSIAM 平台整合 Microsoft Teams 時,存在加密簽章不當漏洞,允許未經身分驗證的攻擊者存取或竄改受保護的資源。◎建議措施:請更新至以下版本:Cortex XSIAM Microsoft Teams Marketplace 1.5.52(含)之後版本、Cortex XSOAR Microsoft Teams Marketplace 1.5.52(含)之後版本◎相關IOC資訊:◎備註:◎參考資料:1. https://security.paloaltonetworks.com/CVE-2026-02342. https://nvd.nist.gov/vuln/detail/CVE-2026-26234https://www.kjintelligent.com/en/hot_532861.html[TWCERT 分享資安情資]_Palo Alto Cortex XSIAM / XSOAR 存在重大資安漏洞(CVE-2026-0234)2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_532861.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_532861.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_532862.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_532862.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_532850.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_532850.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【出處:台灣電腦緊急應變小組 TWCert】【CVE-2026-3055】Citrix NetScaler Out-of-Bounds Read Vulnerability (CVSS v3.1: 9.8)【是否遭勒索軟體利用:未知】Citrix NetScaler ADC、NetScaler Gateway 以及 NetScaler ADC FIPS 和 NDcPP 在被配置為 SAML IDP時,存在越界讀取漏洞,可能導致記憶體過度讀取。【CVE-2026-5281】Google Dawn Use-After-Free Vulnerability (CVSS v3.1: 8.8)【是否遭勒索軟體利用:未知】Google Dawn 存在使用釋放後記憶體漏洞,可能允許已入侵渲染程序的遠端攻擊者,透過特製的 HTML 頁面執行任意程式碼。此漏洞可能影響多個基於 Chromium 的產品,包括但不限於 Google Chrome、Microsoft Edge 及 Opera。【CVE-2026-3502】TrueConf Client Download of Code Without Integrity Check Vulnerability (CVSS v3.1: 7.8)【是否遭勒索軟體利用:未知】TrueConf Client 存在下載程式碼時未進行完整性檢查的漏洞。攻擊者若能影響更新傳輸路徑,可能替換為經竄改的更新酬載;一旦被更新程式執行或安裝,可能導致在更新程序或使用者權限範圍內執行任意程式碼。◎建議措施:【CVE-2026-3055】官方已針對漏洞釋出修復更新,請更新至相關版本https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300【CVE-2026-5281】官方已針對漏洞釋出修復更新,請更新至相關版本https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html【CVE-2026-3502】對應產品升級至以下版本(或更高)TrueConf 8.5.3.884◎相關IOC資訊:◎備註:◎參考資料:【CVE-2026-3055】1.https://nvd.nist.gov/vuln/detail/cve-2026-30552.https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300【CVE-2026-5281】1.https://nvd.nist.gov/vuln/detail/cve-2026-52812.https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html【CVE-2026-3502】1.https://nvd.nist.gov/vuln/detail/cve-2026-35022.https://trueconf.com/blog/update/trueconf-8-5https://www.kjintelligent.com/en/hot_532852.html[TWCERT 分享資安情資]_CISA新增3個已知遭駭客利用之漏洞至KEV目錄(2026/03/30-2026/04/05)2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_532852.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_532852.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
KJ Intelligent launches AI SOC Solutionhttps://www.kjintelligent.com/en/hot_514832.htmlKJ Intelligent launches AI SOC Solution2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_514832.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_514832.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_531095.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_531095.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_531094.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_531094.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_531096.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_531096.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_531093.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_531093.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_531091.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_531091.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_531097.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_531097.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_530446.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_530446.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 QNAP NAS 存在一個漏洞,允許遠端攻擊者利用這個漏洞,於目標系統觸發權限提升。二、存在風險 QNAP NAS 存在一個漏洞,允許遠端攻擊者利用這個漏洞,於目標系統觸發權限提升,其影響系統如下:受影響之系統/漏洞描述:QTS 4.3.x三、建議改善措施 企業及使用者如有上述漏洞版本應儘速更新: 請更新至QTS 5.2.x或更高版本。 情資報告連結:https://www.qnap.com/en/security-advisory/qsa-25-56https://www.kjintelligent.com/en/hot_530445.html[資安漏洞通知-CIO]__QNAP NAS 存在權限提升漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_530445.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_530445.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_531092.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_531092.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_531090.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_531090.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_530447.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_530447.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_530449.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_530449.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_531100.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_531100.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_531086.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_531086.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 Juniper Junos OS 存在一個漏洞,允許遠端攻擊者利用此漏洞,於目標系統觸發執行程式碼。二、存在風險 Juniper Junos OS 存在一個漏洞,允許遠端攻擊者利用此漏洞,於目標系統觸發執行程式碼,其影響系統如下:受影響之系統/漏洞描述:Junos OS Evolved on PTX Series 25.4 的 25.4R1-S1-EVO 之前的版本Junos OS Evolved on PTX Series 25.4 的 25.4R2-EVO 之前的版本三、建議改善措施 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://supportportal.juniper.net/s/article/2026-02-Out-of-Cycle-Security-Bulletin-Junos-OS-Evolved-PTX-Series-A-vulnerability-allows-a-unauthenticated-network-based-attacker-to-execute-code-as-root-CVE-2026-21902https://www.kjintelligent.com/en/hot_531099.html[資安漏洞通知-CIO]_Juniper Junos OS 存在遠端執行程式碼漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_531099.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_531099.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_531101.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_531101.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_531102.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_531102.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_530450.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_530450.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_531103.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_531103.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【出處:台灣電腦緊急應變小組 TWCert】Dell RecoverPoint for Virtual Machines 存在使用硬編碼之帳號通行碼(Use of Hard-coded Credentials)漏洞(CVE-2026-22769,CVSS:10.0),此漏洞允許未經身分認證的遠端攻擊者可使用硬編碼之帳號通行碼取得底層作業系統之root權限。備註:目前已觀察到有攻擊者利用此漏洞,建議儘速採取暫時緩解措施,以防止針對此漏洞可能的攻擊發生。◎建議措施:根據官方網站釋出的解決方式進行修補:https://www.dell.com/support/kbdoc/zh-tw/000426773/dsa-2026-079◎相關IOC資訊:◎備註:◎參考資料:1. https://www.dell.com/support/kbdoc/zh-tw/000426773/dsa-2026-0792. https://nvd.nist.gov/vuln/detail/CVE-2026-22769https://www.kjintelligent.com/en/hot_531088.html[TWCERT 分享資安情資]_Dell RecoverPoint for Virtual Machines存在重大資安漏洞(CVE-2026-22769)2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_531088.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_531088.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_531104.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_531104.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【出處:台灣電腦緊急應變小組 TWCert】Juniper Networks 針對旗下Junos OS Evolved PTX系列產品發布重大資安公告(CVE-2026-21902,CVSS:9.8),此為關鍵資源權限分配錯誤漏洞,允許未經身分驗證的攻擊者以root身分執行程式碼。◎建議措施:請更新至以下版本:Junos OS Evolved PTX系列 25.4R1-S1-EVO、25.4R2-EVO、26.2R1-EVO(含)之後版本◎相關IOC資訊:◎備註:◎參考資料:1. https://supportportal.juniper.net/s/article/2026-02-Out-of-Cycle-Security-Bulletin-Junos-OS-Evolved-PTX-Series-A-vulnerability-allows-a-unauthenticated-network-based-attacker-to-execute-code-as-root-CVE-2026-219022. https://nvd.nist.gov/vuln/detail/CVE-2026-21902https://www.kjintelligent.com/en/hot_531089.html[TWCERT 分享資安情資]_Junos OS Evolved PTX系列存在重大資安漏洞(CVE-2026-21902) Juniper2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_531089.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_531089.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 RedHat Linux核心存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升、遠端執行任意程式碼、洩露敏感資料及繞過身份驗證。二、存在風險 RedHat Linux核心存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升、遠端執行任意程式碼、洩露敏感資料及繞過身份驗證,其影響系統如下:受影響之系統/漏洞描述:Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.6 aarch64Red Hat CodeReady Linux Builder for ARM 64 8 aarch64Red Hat CodeReady Linux Builder for ARM 64 9 aarch64Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.6 s390xRed Hat CodeReady Linux Builder for IBM z Systems 9 s390xRed Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.6 ppc64leRed Hat CodeReady Linux Builder for Power, little endian 8 ppc64leRed Hat CodeReady Linux Builder for Power, little endian 9 ppc64leRed Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.6 x86_64Red Hat CodeReady Linux Builder for x86_64 8 x86_64Red Hat CodeReady Linux Builder for x86_64 9 x86_64Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.6 aarch64Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.6 aarch64Red Hat Enterprise Linux for ARM 64 8 aarch64Red Hat Enterprise Linux for ARM 64 9 aarch64Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.6 s390xRed Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.6 s390xRed Hat Enterprise Linux for IBM z Systems 8 s390xRed Hat Enterprise Linux for IBM z Systems 9 s390xRed Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64leRed Hat Enterprise Linux for Power, little endian - Extended Update Support 9.6 ppc64leRed Hat Enterprise Linux for Power, little endian 8 ppc64leRed Hat Enterprise Linux for Power, little endian 9 ppc64leRed Hat Enterprise Linux for Real Time 8 x86_64Red Hat Enterprise Linux for Real Time for NFV 8 x86_64Red Hat Enterprise Linux for Real Time for x86_64 - Extended Life Cycle Support 7 x86_64Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.6 x86_64Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.4 x86_64Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.6 x86_64Red Hat Enterprise Linux for x86_64 8 x86_64Red Hat Enterprise Linux for x86_64 9 x86_64Red Hat Enterprise Linux Server - AUS 8.4 x86_64Red Hat Enterprise Linux Server - AUS 9.2 x86_64Red Hat Enterprise Linux Server - AUS 9.4 x86_64Red Hat Enterprise Linux Server - AUS 9.6 x86_64Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 7 s390xRed Hat Enterprise Linux Server - Extended Life Cycle Support 7 x86_64Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, big endian 7 ppc64Red Hat Enterprise Linux Server - Extended Life Cycle Support for IBM Power, little endian 7 ppc64leRed Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64leRed Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64leRed Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64leRed Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.6 ppc64le三、建議改善措施 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://access.redhat.com/errata/RHSA-2026:1581https://access.redhat.com/errata/RHSA-2026:1617https://access.redhat.com/errata/RHSA-2026:1623https://access.redhat.com/errata/RHSA-2026:1661https://access.redhat.com/errata/RHSA-2026:1662https://access.redhat.com/errata/RHSA-2026:1703https://access.redhat.com/errata/RHSA-2026:1820https://access.redhat.com/errata/RHSA-2026:1886https://access.redhat.com/errata/RHSA-2026:1946https://access.redhat.com/errata/RHSA-2026:2096https://access.redhat.com/errata/RHSA-2026:2109https://access.redhat.com/errata/RHSA-2026:2115https://access.redhat.com/errata/RHSA-2026:2127https://access.redhat.com/errata/RHSA-2026:2212https://access.redhat.com/errata/RHSA-2026:2264https://access.redhat.com/errata/RHSA-2026:2352https://access.redhat.com/errata/RHSA-2026:2378https://www.kjintelligent.com/en/hot_530451.html[資安漏洞通知-CIO]_RedHat Linux 核心存在多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_530451.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_530451.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_531105.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_531105.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_530452.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_530452.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_530438.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_530438.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_530439.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_530439.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 Ubuntu Linux 核心存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、遠端執行任意程式碼、權限提升、洩露敏感資料、繞過身份驗證及資料篡改。二、存在風險 Ubuntu Linux 核心存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、遠端執行任意程式碼、權限提升、洩露敏感資料、繞過身份驗證及資料篡改,其影響系統如下:受影響之系統/漏洞描述:Ubuntu 14.04 LTSUbuntu 16.04 LTSUbuntu 18.04 LTSUbuntu 20.04 LTSUbuntu 22.04 LTSUbuntu 24.04 LTSUbuntu 25.10三、建議改善措施 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://ubuntu.com/security/notices/USN-7986-1https://ubuntu.com/security/notices/USN-7987-1https://ubuntu.com/security/notices/USN-7987-2https://ubuntu.com/security/notices/USN-7988-1https://ubuntu.com/security/notices/USN-7988-2https://ubuntu.com/security/notices/USN-7988-3https://ubuntu.com/security/notices/USN-7990-1https://ubuntu.com/security/notices/USN-7990-2https://ubuntu.com/security/notices/USN-8013-1https://ubuntu.com/security/notices/USN-8013-2https://ubuntu.com/security/notices/USN-8013-3https://ubuntu.com/security/notices/USN-8014-1https://ubuntu.com/security/notices/USN-8015-1https://ubuntu.com/security/notices/USN-8015-2https://ubuntu.com/security/notices/USN-8015-3https://ubuntu.com/security/notices/USN-8016-1https://www.kjintelligent.com/en/hot_530453.html[資安漏洞通知-CIO]_Ubuntu Linux 核心存在多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_530453.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_530453.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_530440.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_530440.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_530454.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_530454.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_530441.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_530441.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_530448.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_530448.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_530442.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_530442.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 SUSE Linux 內核存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、遠端執行任意程式碼、權限提升、洩露敏感資料、繞過身份驗證及資料篡改。二、存在風險 SUSE Linux 內核存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、遠端執行任意程式碼、權限提升、洩露敏感資料、繞過身份驗證及資料篡改,其影響系統如下:受影響之系統/漏洞描述:Basesystem Module 15-SP7Development Tools Module 15-SP7Legacy Module 15-SP7SUSE Linux Enterprise Desktop 15 SP7SUSE Linux Enterprise High Availability Extension 15 SP7SUSE Linux Enterprise High Performance Computing 12 SP5SUSE Linux Enterprise High Performance Computing 15 SP5SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5SUSE Linux Enterprise High Performance Computing LTSS 15 SP5SUSE Linux Enterprise Live Patching 12-SP5SUSE Linux Enterprise Live Patching 15-SP5SUSE Linux Enterprise Live Patching 15-SP7SUSE Linux Enterprise Micro 5.2SUSE Linux Enterprise Micro 5.3SUSE Linux Enterprise Micro 5.4SUSE Linux Enterprise Micro 5.5SUSE Linux Enterprise Micro for Rancher 5.2SUSE Linux Enterprise Micro for Rancher 5.3SUSE Linux Enterprise Micro for Rancher 5.4SUSE Linux Enterprise Real Time 15 SP5SUSE Linux Enterprise Real Time 15 SP7SUSE Linux Enterprise Server 11 SP4SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORESUSE Linux Enterprise Server 12 SP5SUSE Linux Enterprise Server 12 SP5 LTSSSUSE Linux Enterprise Server 12 SP5 LTSS Extended SecuritySUSE Linux Enterprise Server 15 SP5SUSE Linux Enterprise Server 15 SP5 LTSSSUSE Linux Enterprise Server 15 SP7SUSE Linux Enterprise Server 16.0SUSE Linux Enterprise Server for SAP Applications 12 SP5SUSE Linux Enterprise Server for SAP Applications 15 SP5SUSE Linux Enterprise Server for SAP Applications 15 SP7SUSE Linux Enterprise Server for SAP Applications 16.0SUSE Linux Enterprise Server High Availability Extension 16.0SUSE Linux Enterprise Workstation Extension 15 SP7SUSE Linux Micro 6.2SUSE Linux Micro Extras 6.2openSUSE Leap 15.3openSUSE Leap 15.5三、建議改善措施 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://www.suse.com/support/update/announcement/2026/suse-su-20260315-1https://www.suse.com/support/update/announcement/2026/suse-su-20260316-1https://www.suse.com/support/update/announcement/2026/suse-su-20260317-1https://www.suse.com/support/update/announcement/2026/suse-su-20260350-1https://www.suse.com/support/update/announcement/2026/suse-su-20260352-1https://www.suse.com/support/update/announcement/2026/suse-su-20260369-1https://www.suse.com/support/update/announcement/2026/suse-su-20260385-1https://www.suse.com/support/update/announcement/2026/suse-su-20260411-1/https://www.suse.com/support/update/announcement/2026/suse-su-202620207-1https://www.suse.com/support/update/announcement/2026/suse-su-202620220-1/https://www.suse.com/support/update/announcement/2026/suse-su-202620228-1/https://www.kjintelligent.com/en/hot_530455.html[資安漏洞通知-CIO]_SUSE Linux 內核存在多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_530455.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_530455.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_530443.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_530443.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529446.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529446.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 GitLab 發布 18.7.1、18.6.3、18.5.5 等版本,修補多項影響 GitLab Community Edition (CE) 及 Enterprise Edition (EE) 的安全漏洞及功能異常,涵蓋跨站指令碼(XSS)、授權檢查缺失、拒絕服務(DoS)與資訊洩露等風險。建議所有自我管理(self-managed) 的 GitLab 實例儘速升級以降低資安風險。 二、存在風險 GitLab Patch Release 修補了數項安全弱點,可能被惡意使用者利用造成 跨站腳本 (XSS)、未授權存取、阻斷服務 (DoS)、資訊洩漏 及 安全檢查繞過 等攻擊,其影響系統或版本如下:受影響之系統/漏洞描述:GitLab Community Edition (CE) 版本 18.2.2 起但低於 18.5.5 / 18.6.3 / 18.7.1 之版本GitLab Enterprise Edition (EE) 版本 18.2.2 起但低於 18.5.5 / 18.6.3 / 18.7.1 之版本主要漏洞修補摘要: CVE-2025-9222 — Stored Cross-site Scripting(XSS)可濫用GitLab Flavored Markdown標記語言的占位符(Placeholders)機制,發動儲存型跨站指令碼攻擊,此漏洞嚴重性屬 High (CVSS 8.7)。CVE-2025-13761 — Web IDE XSS未經身份驗證者可誘使合法使用者瀏覽特定頁面後,在其瀏覽器上下文執行任意程式碼,亦為 High (CVSS 8.0) 風險漏洞。CVE-2025-13772 — Duo Workflows API 權限不足已驗證使用者可能利用 API 的 namespace 參數擅自存取或變更 AI 模型設定,此為 High 級別漏洞。CVE-2025-10569 — 匯入功能 DoS攻擊者藉由對外部API呼叫提供特製回應,造成 GitLab 實例資源耗盡或阻斷服務。CVE-2025-11246 — GraphQL runnerUpdate 權限控制具備特定權限的使用者,移除不相關專案的Runner資源(runner)。CVE-2025-3950 — Mermaid 圖表資訊洩漏使用特製圖片可能繞過 Asset Proxy 行為,洩露連線相關敏感資訊。 三、建議改善措施: 企業及使用者如有遭受上述漏洞影響之 GitLab 版本,請儘速更新至最新版 Patch Release:請將 GitLab CE/EE 更新至以下版本之一:18.7.118.6.318.5.5升級前請依官方說明備份資料並評估資料庫遷移需求:單節點部署 (Single-node) 可能需要停機以完成升級及資料庫 migration。多節點部署則可透過 Zero-downtime 升級流程進行,以降低服務中斷影響。其他安全強化建議:限制 GitLab Web 介面及 API 存取僅允許內部網段或 VPN 存取。建立例行性版本更新通知與漏洞監控流程。確保系統日誌、資安事件監控與入侵偵測持續運作。 情資報告連結:https://about.gitlab.com/releases/2026/01/07/patch-release-gitlab-18-7-1-released/https://www.kjintelligent.com/en/hot_529448.html[資安漏洞通知-CIO]_GitLab 存在多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529448.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529448.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529449.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529449.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【出處:台灣電腦緊急應變小組 TWCert】【CVE-2021-39935】GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability (CVSS v3.1: 6.8)【是否遭勒索軟體利用:未知】GitLab Community 與 Enterprise 版本存在伺服器端請求偽造漏洞,可能允許未經授權的外部使用者透過 CI Lint API 執行伺服器端請求。【CVE-2025-64328】Sangoma FreePBX OS Command Injection Vulnerability (CVSS v3.1: 7.2)【是否遭勒索軟體利用:未知】Sangoma FreePBX Endpoint Manager 存在作業系統指令注入漏洞,通過身分驗證的已知使用者可能透過 testconnection -> check_ssh_connect() 函式進行指令注入,進而以 asterisk 使用者身分遠端存取系統。【CVE-2019-19006】Sangoma FreePBX Improper Authentication Vulnerability (CVSS v3.1: 9.8)【是否遭勒索軟體利用:未知】Sangoma FreePBX 存在不當驗證漏洞,可能允許未經授權的使用者繞過密碼驗證機制,進而存取 FreePBX 管理介面所提供的服務。【CVE-2025-40551】SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability (CVSS v3.1: 9.8)【是否遭勒索軟體利用:未知】SolarWinds Web Help Desk 存在不受信任資料反序列化漏洞,可能導致遠端程式碼執行,使攻擊者能在主機上執行任意指令。【CVE-2025-11953】React Native Community CLI OS Command InjectionVulnerability (CVSS v3.1: 9.8)【是否遭勒索軟體利用:未知】React Native Community CLI 存在作業系統指令注入漏洞,可能允許未經身分驗證的網路攻擊者向 Metro Development Server 發送POST 請求,並透過伺服器暴露的易受攻擊端點執行任意可執行檔。在 Windows 環境中,攻擊者亦可執行具完全可控參數的任意 shell 指令。【CVE-2026-24423】SmarterTools SmarterMail Missing Authentication for Critical Function Vulnerability (CVSS v3.1: 9.8)【是否遭勒索軟體利用:是】SmarterTools SmarterMail 的 ConnectToHub API 方法存在關鍵功能驗證缺失漏洞,可能允許攻擊者將 SmarterMail 執行個體指向惡意 HTTP 伺服器,可能導致執行惡意作業系統指令。◎建議措施:【CVE-2021-39935】官方已針對漏洞釋出修復更新,請更新至相關版本https://about.gitlab.com/releases/2021/12/06/security-release-gitlab-14-5-2-released/【CVE-2025-64328】官方已針對漏洞釋出修復更新,請更新至相關版本https://github.com/FreePBX/security-reporting/security/advisories/GHSA-vm9p-46mv-5xvw【CVE-2019-19006】官方已針對漏洞釋出修復更新,請更新至相關版本https://community.freepbx.org/t/freepbx-security-vulnerability-sec-2019-001/62772【CVE-2025-40551】官方已針對漏洞釋出修復更新,請更新至相關版本https://www.solarwinds.com/trust-center/security-advisories/cve-2025-40551【CVE-2025-11953】官方已針對漏洞釋出修復更新,請更新至相關版本https://github.com/advisories/GHSA-399j-vxmf-hjvr【CVE-2026-24423】對應產品升級至以下版本(或更高)SmarterMail Build 9511TLP: CLEAR TWCERT-TWISAC-202602-0006◎相關IOC資訊:◎備註:◎參考資料:【CVE-2021-39935】1.https://nvd.nist.gov/vuln/detail/cve-2021-399352.https://about.gitlab.com/releases/2021/12/06/security-release-gitlab-14-5-2-released/【CVE-2025-64328】1.https://nvd.nist.gov/vuln/detail/cve-2025-643282.https://github.com/FreePBX/security-reporting/security/advisories/GHSA-vm9p-46mv-5xvw【CVE-2019-19006】1.https://nvd.nist.gov/vuln/detail/cve-2019-190062.https://community.freepbx.org/t/freepbx-security-vulnerability-sec-2019-001/62772【CVE-2025-40551】1.https://nvd.nist.gov/vuln/detail/cve-2025-405512.https://www.solarwinds.com/trust-center/security-advisories/cve-2025-40551【CVE-2025-11953】1.https://nvd.nist.gov/vuln/detail/cve-2025-119532.https://github.com/advisories/GHSA-399j-vxmf-hjvr【CVE-2026-24423】1.https://nvd.nist.gov/vuln/detail/cve-2026-244232.https://www.smartertools.com/smartermail/release-notes/currenthttps://www.kjintelligent.com/en/hot_530444.html[TWCERT 分享資安情資]_CISA新增6個已知遭駭客利用之漏洞至KEV目錄(2026/02/02-2026/02/08)2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_530444.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_530444.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529433.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529433.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529450.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529450.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529451.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529451.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529444.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529444.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529434.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529434.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 Ubuntu Linux 核心存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況及洩露敏感資料。二、存在風險 Ubuntu Linux 核心存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況及洩露敏感資料,其影響系統如下:受影響之系統/漏洞描述:Ubuntu 18.04 LTSUbuntu 20.04 LTSUbuntu 22.04 LTSUbuntu 24.04 LTS三、建議改善措施 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://ubuntu.com/security/notices/USN-7922-4https://ubuntu.com/security/notices/USN-7922-5https://ubuntu.com/security/notices/USN-7928-5https://ubuntu.com/security/notices/USN-7931-5https://ubuntu.com/security/notices/USN-7940-2https://www.kjintelligent.com/en/hot_529452.html[資安漏洞通知-CIO]_Ubuntu Linux 核心存在多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529452.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529452.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【出處:台灣電腦緊急應變小組 TWCert】FortiFone Web Portal 是Fortinet FortiVoice系統的集中管理介面,用於遠端配置電話分機、監控通話紀錄與系統效能。日前,Fortinet發布重大資安漏洞公告,此漏洞(CVE-2025-47855,CVSS:9.8)可能允許未經身分驗證的攻擊者,透過精心設計的HTTP或HTTPS請求取得裝置配置,從而取得敏感資料。◎建議措施:請更新至以下版本:FortiFone 3.0.24(含)之後版本、FortiFone 7.0.2(含)之後版本◎相關IOC資訊:◎備註:◎參考資料:1. https://fortiguard.fortinet.com/psirt/FG-IR-25-2602. https://nvd.nist.gov/vuln/detail/CVE-2025-47855https://www.kjintelligent.com/en/hot_529436.html[TWCERT 分享資安情資]_Fortinet旗下 FortiFone Web Portal 存在重大資安漏洞(CVE-2025-47855)2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529436.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529436.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 RedHat Linux核心存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升、遠端執行任意程式碼、洩露敏感資料及繞過身份驗證。二、存在風險 RedHat Linux核心存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升、遠端執行任意程式碼、洩露敏感資料及繞過身份驗證,其影響系統如下:受影響之系統/漏洞描述:Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 10.0 aarch64Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.4 aarch64Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.6 aarch64Red Hat CodeReady Linux Builder for ARM 64 10 aarch64Red Hat CodeReady Linux Builder for ARM 64 8 aarch64Red Hat CodeReady Linux Builder for ARM 64 9 aarch64Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 10.0 s390xRed Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.4 s390xRed Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.6 s390xRed Hat CodeReady Linux Builder for IBM z Systems 10 s390xRed Hat CodeReady Linux Builder for IBM z Systems 9 s390xRed Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 10.0 ppc64leRed Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.4 ppc64leRed Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.6 ppc64leRed Hat CodeReady Linux Builder for Power, little endian 10 ppc64leRed Hat CodeReady Linux Builder for Power, little endian 8 ppc64leRed Hat CodeReady Linux Builder for Power, little endian 9 ppc64leRed Hat CodeReady Linux Builder for x86_64 - Extended Update Support 10.0 x86_64Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.4 x86_64Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.6 x86_64Red Hat CodeReady Linux Builder for x86_64 10 x86_64Red Hat CodeReady Linux Builder for x86_64 8 x86_64Red Hat CodeReady Linux Builder for x86_64 9 x86_64Red Hat Enterprise Linux Server - AUS 9.4 x86_64Red Hat Enterprise Linux Server - AUS 9.6 x86_64Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64leRed Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.6 ppc64leRed Hat Enterprise Linux for ARM 64 - 4 years of updates 10.0 aarch64Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.6 aarch64Red Hat Enterprise Linux for ARM 64 - Extended Update Support 10.0 aarch64Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.6 aarch64Red Hat Enterprise Linux for ARM 64 10 aarch64Red Hat Enterprise Linux for ARM 64 8 aarch64Red Hat Enterprise Linux for ARM 64 9 aarch64Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 10.0 s390xRed Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390xRed Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.6 s390xRed Hat Enterprise Linux for IBM z Systems - Extended Update Support 10.0 s390xRed Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390xRed Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.6 s390xRed Hat Enterprise Linux for IBM z Systems 10 s390xRed Hat Enterprise Linux for IBM z Systems 8 s390xRed Hat Enterprise Linux for IBM z Systems 9 s390xRed Hat Enterprise Linux for Power, little endian - 4 years of support 10.0 ppc64leRed Hat Enterprise Linux for Power, little endian - Extended Update Support 10.0 ppc64leRed Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64leRed Hat Enterprise Linux for Power, little endian - Extended Update Support 9.6 ppc64leRed Hat Enterprise Linux for Power, little endian 10 ppc64leRed Hat Enterprise Linux for Power, little endian 8 ppc64leRed Hat Enterprise Linux for Power, little endian 9 ppc64leRed Hat Enterprise Linux for Real Time 8 x86_64Red Hat Enterprise Linux for Real Time for NFV 8 x86_64Red Hat Enterprise Linux for x86_64 - 4 years of updates 10.0 x86_64Red Hat Enterprise Linux for x86_64 - Extended Update Support 10.0 x86_64Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.6 x86_64Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.6 x86_64Red Hat Enterprise Linux for x86_64 10 x86_64Red Hat Enterprise Linux for x86_64 8 x86_64Red Hat Enterprise Linux for x86_64 9 x86_64三、建議改善措施 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://access.redhat.com/errata/RHSA-2026:0443https://access.redhat.com/errata/RHSA-2026:0444https://access.redhat.com/errata/RHSA-2026:0445https://access.redhat.com/errata/RHSA-2026:0453https://access.redhat.com/errata/RHSA-2026:0457https://www.kjintelligent.com/en/hot_529453.html[資安漏洞通知-CIO]_RedHat Linux 核心存在多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529453.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529453.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529454.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529454.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529437.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529437.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529455.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529455.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【出處:台灣電腦緊急應變小組 TWCert】Microsoft SharePoint Server 是一款企業級協作平台,提供文件管理與團隊協作等功能,是企業資訊整合的核心平台。近期微軟發布重大資安公告(CVE-2026-20947,CVSS:8.8 和 CVE-2026-20963,CVSS:8.8),CVE-2026-20947為SQL注入漏洞,經授權的攻擊者可透過網路執行任意 SQL 命令;CVE-2026-20963 為不受信任資料之反序列化漏洞,允許經授權的攻擊者透過網路執行任意程式碼。◎建議措施:根據官方網站釋出解決方式進行修補:【CVE-2026-20947】https://msrc.microsoft.com/update-guide/zh-tw/vulnerability/CVE-2026-20947【CVE-2026-20963】https://msrc.microsoft.com/update-guide/zh-tw/vulnerability/CVE-2026-20963◎相關IOC資訊:◎備註:◎參考資料:1. https://msrc.microsoft.com/update-guide/zh-tw/vulnerability/CVE-2026-209472. https://msrc.microsoft.com/update-guide/zh-tw/vulnerability/CVE-2026-209633. https://nvd.nist.gov/vuln/detail/CVE-2026-209474. https://nvd.nist.gov/vuln/detail/CVE-2026-20963https://www.kjintelligent.com/en/hot_529438.html[TWCERT 分享資安情資]_Microsoft 旗下SharePoint Server 存在2個重大資安漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529438.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529438.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529456.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529456.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529439.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529439.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529457.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529457.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529458.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529458.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529440.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529440.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529459.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529459.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529441.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529441.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529443.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529443.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529442.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529442.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529435.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529435.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【出處:台灣電腦緊急應變小組 TWCert】【CVE-2025-14847】MongoDB and MongoDB Server Improper Handling of Length Parameter Inconsistency Vulnerability (CVSS v3.1: 7.5)【是否遭勒索軟體利用:未知】MongoDB伺服器存在 Zlib 壓縮協定標頭中長度參數不一致處理不當的漏洞。此漏洞可能允許未經身份驗證的用戶端讀取未初始化的堆記憶體。◎建議措施:【CVE-2025-14847】官方已針對漏洞釋出修復更新,請更新至相關版本https://jira.mongodb.org/browse/SERVER-115508◎相關IOC資訊:◎備註:◎參考資料:【CVE-2025-14847】1.https://nvd.nist.gov/vuln/detail/cve-2025-148472.https://jira.mongodb.org/browse/SERVER-115508https://www.kjintelligent.com/en/hot_529432.html[TWCERT 分享資安情資]_CISA新增1個已知遭駭客利用之漏洞至KEV目錄(2025/12/29-2026/01/04)2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529432.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_529432.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_528073.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_528073.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527513.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527513.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【出處:台灣電腦緊急應變小組 TWCert】WatchGuard Firebox 是一款次世代防火牆產品,提供多層次防護,包括防毒、IPS、APT 阻擋及垃圾郵件過濾。WatchGuard發布重大資安漏洞(CVE-2025-14733,CVSS 4.x:9.3)公告,該漏洞為越界寫入漏洞,可能允許遠端未經驗證的攻擊者執行任意程式碼,目前WatchGuard已觀察到攻擊者正積極嘗試利用此漏洞,詳細說明請見WatchGuard官網。◎建議措施:請更新至以下版本:WatchGuard Fireware OS 2025.1.4版本、WatchGuard FirewareOS 12.5.15版本、WatchGuard Fireware OS 12.11.6版本、WatchGuard Fireware OS 12.3.1_Update4 (B728352)版本備註:WatchGuard Fireware OS 11.x版本已是EoL(End of Life)的產品,建議升級至支援版本◎相關IOC資訊:◎備註:◎參考資料:1. https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-000272. https://nvd.nist.gov/vuln/detail/CVE-2025-14733https://www.kjintelligent.com/en/hot_528074.html[TWCERT 分享資安情資]_WatchGuard Firebox存在重大資安漏洞(CVE-2025-14733)2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_528074.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_528074.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527512.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527512.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_528076.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_528076.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 RedHat Linux核心存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升、遠端執行任意程式碼及洩露敏感資料。二、存在風險 RedHat Linux核心存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升、遠端執行任意程式碼及洩露敏感資料,其影響系統如下:受影響之系統/漏洞描述:Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.4 aarch64Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.4 s390xRed Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.4 ppc64leRed Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.4 x86_64Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390xRed Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390xRed Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64leRed Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.4 x86_64Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64Red Hat Enterprise Linux Server - AUS 8.4 x86_64Red Hat Enterprise Linux Server - AUS 9.4 x86_64Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le三、建議改善措施 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://access.redhat.com/errata/RHSA-2025:22661https://access.redhat.com/errata/RHSA-2025:22752https://www.kjintelligent.com/en/hot_527505.html[Cybersecurity Vulnerability Notice]_RedHat Linux 核心存在多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527505.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527505.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升、彷冒、遠端執行任意程式碼、洩露敏感資料及繞過身份驗證。二、存在風險 Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升、彷冒、遠端執行任意程式碼、洩露敏感資料及繞過身份驗證,其影響系統如下:受影響之系統/漏洞描述:Microsoft Edge 143.0.3650.66 之前的版本三、建議改善措施 企業及使用者如有上述漏洞版本應儘速更新:請更新至 143.0.3650.66 或之後版本。 情資報告連結:https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13630https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13631https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13632https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13633https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13634https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13635https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13636https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13637https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13638https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13639https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13640https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13720https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13721https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62223https://www.kjintelligent.com/en/hot_527507.html[資安漏洞通知-CIO]_Microsoft Edge 存在多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527507.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527507.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_528077.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_528077.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【出處:台灣電腦緊急應變小組 TWCert】React是一個由Meta開發的開源JavaScript函式庫,用於建構使用者介面。近日Meta發布重大資安漏洞公告(CVE-2025-55182,CVSS:10.0),指出 React Server Components 存在遠端程式碼執行漏洞。由於 React 在解析傳送至 React Server Function 端點的資料時存在安全弱點,攻擊者無需通過身分驗證,即可能透過特製有效負載觸發任意程式碼執行。◎建議措施:根據官方網站釋出的解決方式進行修補:https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components◎相關IOC資訊:◎備註:◎參考資料:1. https://www.facebook.com/security/advisories/cve-2025-551822. https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components3. https://nvd.nist.gov/vuln/detail/CVE-2025-55182https://www.kjintelligent.com/en/hot_527501.html[TWCERT 分享資安情資]_Meta旗下React Server Components存在重大資安漏洞(CVE-2025-55182)2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527501.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527501.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 Mozilla Thunderbird 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發仿冒、權限提升、遠端執行任意程式碼及繞過身份驗證。二、存在風險 Mozilla Thunderbird 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發仿冒、權限提升、遠端執行任意程式碼及繞過身份驗證,其影響系統如下:受影響之系統/漏洞描述:Thunderbird 140.6 之前的版本Thunderbird 146 之前的版本三、建議改善措施 企業及使用者如有上述漏洞版本應儘速更新:請更新至 Thunderbird 140.6。請更新至 Thunderbird 146。 情資報告連結:https://www.mozilla.org/en-US/security/advisories/mfsa2025-95/https://www.mozilla.org/en-US/security/advisories/mfsa2025-96/https://www.kjintelligent.com/en/hot_527511.html[資安漏洞通知-CIO]_Mozilla Thunderbird 存在多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527511.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527511.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527502.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527502.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527508.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527508.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527500.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527500.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527509.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527509.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_528075.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_528075.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_526321.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_526321.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況及遠端執行任意程式碼。二、存在風險 Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況及遠端執行任意程式碼,其影響系統如下:受影響之系統/漏洞描述:Microsoft Edge 143.0.3650.80 之前的版本三、建議改善措施 企業及使用者如有上述漏洞版本應儘速更新:請更新至 143.0.3650.80 或之後版本。 情資報告連結:https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#december-11-2025https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-14372https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-14373https://www.kjintelligent.com/en/hot_527514.html[Cybersecurity Vulnerability Notice]_Microsoft Edge 存在多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527514.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527514.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527498.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527498.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527510.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527510.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527499.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527499.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527497.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527497.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527496.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527496.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524297.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524297.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_526317.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_526317.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【出處:台灣電腦緊急應變小組 TWCert】【CVE-2025-48633】Android Framework Information Disclosure Vulnerability (CVSS : 暫無)【是否遭勒索軟體利用:未知】Android Framework 存在未具體說明的漏洞,可能導致資訊外洩。【CVE-2025-48572】Android Framework Privilege Escalation Vulnerability (CVSS: 暫無)【是否遭勒索軟體利用:未知】Android Framework 存在未具體說明的漏洞,可能導致權限提升。【CVE-2021-26828】OpenPLC ScadaBR Unrestricted Upload of File with Dangerous Type Vulnerability (CVSS v3.1: 8.8)【是否遭勒索軟體利用:未知】OpenPLC ScadaBR 存在未受限制的危險類型檔案上傳漏洞,允許經身份驗證的遠端使用者透過 view_edit.shtm 上傳並執行任意JSP 檔案。【CVE-2025-55182】Meta React Server Components Remote Code Execution Vulnerability (CVSS v3.1: 10.0)【是否遭勒索軟體利用:未知】Meta React Server Components 存在遠端程式碼執行漏洞,攻擊者可透過利用 React 在解碼傳送至 React Server Function 端點的有效負載時的缺陷,在未經身份驗證的情況下實現遠端程式碼執行。◎建議措施:【CVE-2025-48633】官方已針對漏洞釋出修復更新,請更新至相關版本https://source.android.com/docs/security/bulletin/2025-12-01【CVE-2025-48572】官方已針對漏洞釋出修復更新,請更新至相關版本https://source.android.com/docs/security/bulletin/2025-12-01【CVE-2021-26828】對應產品升級至以下版本(或更高)OpenPLC ScadaBR Linux 0.9.1(不含)之後的版本OpenPLC ScadaBR Windows 1.12.4(不含)之後的版本【CVE-2025-55182】官方已針對漏洞釋出修復更新,請更新至相關版本https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components◎相關IOC資訊:◎備註:◎參考資料:【CVE-2025-48633】1.https://nvd.nist.gov/vuln/detail/cve-2025-486332.https://source.android.com/docs/security/bulletin/2025-12-01【CVE-2025-48572】1.https://nvd.nist.gov/vuln/detail/cve-2025-485722.https://source.android.com/docs/security/bulletin/2025-12-01【CVE-2021-26828】1.https://nvd.nist.gov/vuln/detail/cve-2021-268282.httTLP: CLEAR TWCERT-TWISAC-202512-0006ps://forum.scadabr.com.br/t/report-falhas-de-seguranca-em-versoes-do-scadabr/3615/4【CVE-2025-55182】1.https://nvd.nist.gov/vuln/detail/cve-2025-551822. https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-componentshttps://www.kjintelligent.com/en/hot_527504.html[TWCERT 分享資安情資]_CISA新增4個已知遭駭客利用之漏洞至KEV目錄(2025/12/01-2025/12/07)2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527504.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527504.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527503.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527503.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_526320.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_526320.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527086.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527086.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_526314.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_526314.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【出處:台灣電腦緊急應變小組 TWCert】【CVE-2021-26829】OpenPLC ScadaBR Cross-site Scripting Vulnerability (CVSS v3.1: 5.4)【是否遭勒索軟體利用:未知】OpenPLC ScadaBR 存在可透過 system_settings.shtm 檔案觸發的跨網站指令碼漏洞。◎建議措施:【CVE-2021-26829】對應產品升級至以下版本(或更高)OpenPLC ScadaBR Linux 0.9.1(不含)之後的版本OpenPLC ScadaBR Windows 1.12.4(不含)之後的版本◎相關IOC資訊:◎備註:◎參考資料:【CVE-2021-26829】1.https://nvd.nist.gov/vuln/detail/cve-2021-268292.https://forum.scadabr.com.br/t/report-falhas-de-seguranca-em-versoes-do-scadabr/3615/4https://www.kjintelligent.com/en/hot_527089.html[TWCERT 分享資安情資]_CISA新增1個已知遭駭客利用之漏洞至KEV目錄(2025/11/24-2025/11/30)2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527089.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_527089.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_526312.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_526312.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_526316.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_526316.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525182.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525182.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【出處:台灣電腦緊急應變小組 TWCert】Catalyst Center是Cisco提供的網路管理平台,藉由自動化配置和部署功能,可協助網路管理人員更有效率管理和監控企業網路環境。近日,Cisco發布重大資安漏洞公告(CVE-2025-20341,CVSS:8.8),該漏洞源於使用者輸入資料驗證不足,允許攻擊者可向受影響的系統發送精心設計的HTTP請求,對系統進行未授權的修改。備註:攻擊者若要使用此漏洞,必須至少具有「Observer」角色的有效憑證◎建議措施:請更新至以下版本:Cisco Catalyst Center 2.3.7.10-VA(含)之後版本◎相關IOC資訊:◎備註:◎參考資料:1. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-catc-priv-esc-VS8EeCuX2. https://nvd.nist.gov/vuln/detail/CVE-2025-20341https://www.kjintelligent.com/en/hot_525869.html[TWCERT 分享資安情資]_Cisco旗下Catalyst Center存在重大資安漏洞(CVE-2025-20341)2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525869.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525869.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_526319.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_526319.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_526315.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_526315.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_526313.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_526313.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525874.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525874.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【出處:台灣電腦緊急應變小組 TWCert】Catalyst Center是Cisco提供的網路管理平台,藉由自動化配置和部署功能,可協助網路管理人員更有效率管理和監控企業網路環境。近日,Cisco發布重大資安漏洞公告(CVE-2025-20341,CVSS:8.8),該漏洞源於使用者輸入資料驗證不足,允許攻擊者可向受影響的系統發送精心設計的HTTP請求,對系統進行未授權的修改。備註:攻擊者若要使用此漏洞,必須至少具有「Observer」角色的有效憑證◎建議措施:請更新至以下版本:Cisco Catalyst Center 2.3.7.10-VA(含)之後版本◎相關IOC資訊:◎備註:◎參考資料:1. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-catc-priv-esc-VS8EeCuX2. https://nvd.nist.gov/vuln/detail/CVE-2025-20341https://www.kjintelligent.com/en/hot_526309.html[TWCERT 分享資安情資]_Cisco旗下Catalyst Center存在重大資安漏洞(CVE-2025-20341)2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_526309.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_526309.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_526311.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_526311.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 Synology 存在漏洞,遠端攻擊者可利用此漏洞,於目標系統觸發遠端執行任意程式碼。二、存在風險 Synology 產品存在漏洞,允許遠端攻擊者利用這個漏洞,於目標系統觸發遠端執行任意程式碼,其影響系統或版本如下:BeeStation OS 1.3BeeStation OS 1.2BeeStation OS 1.1BeeStation OS 1.0三、建議改善措施: 請將BeeStation OS更新至1.3.2-65648或更高版本。 情資報告連結:https://www.synology.com/en-global/security/advisory/Synology_SA_25_12https://www.kjintelligent.com/en/hot_525872.html[Cybersecurity Vulnerability Notice]_Synology 零日遠端執行程式碼漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525872.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525872.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【出處:台灣電腦緊急應變小組 TWCert】微軟針對旗下產品SQL Server發布重大資安漏洞公告(CVE-2025-59499,CVSS:8.8),此漏洞為SQL注入漏洞,允許經授權的攻擊者透過網路注入精心設計的SQL指令並提升權限。◎建議措施:根據官方網站釋出解決方式進行修補:https://msrc.microsoft.com/update-guide/zh-tw/vulnerability/CVE-2025-59499◎相關IOC資訊:◎備註:◎參考資料:1. https://msrc.microsoft.com/update-guide/zh-tw/vulnerability/CVE-2025-594992. https://nvd.nist.gov/vuln/detail/CVE-2025-59499https://www.kjintelligent.com/en/hot_525868.html[TWCERT 分享資安情資]_Microsoft SQL Server 存在重大資安漏洞(CVE-2025-59499)2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525868.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525868.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 SAP 存在多個漏洞,遠端攻擊者可利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升、遠端執行任意程式碼、洩露敏感資料及資料篡改。二、存在風險 漏洞出現在名為SQL Anywhere Monitor的系統,是屬於安全性不足的金鑰及機密管理而造成的漏洞,起因是此應用程式將憑證嵌入程式碼,導致特定資源或功能曝露,攻擊者有機會藉此執行任何程式碼,使得相關系統的機密性、完整性,以及可用性面臨高風險。一旦IT人員套用修補程式,將會完全移除SQL Anywhere Monitor,假如無法及時套用修補程式,應停止使用此系統,並且刪除所有SQL Anywhere Monitor資料庫的實體。 另一項重大漏洞CVE-2025-42887,影響SAP Solution Manager,為程式碼注入型態的弱點,CVSS風險值為9.9,問題出在對於置入的程式碼缺乏過濾與管控,通過身分驗證的攻擊者在呼叫能遠端啟用的功能模組過程裡,插入惡意程式碼,進而對系統完全控制,對於機密性、完整性,以及可用性造成重大影響。Onapsis也透露SAP對此漏洞的處理方法,是增加輸入檢查機制,大量排除非英數的字元因應。受影響之系統/漏洞描述:SQL Anywhere Monitor (Non-Gui)SYBASE_SQL_ANYWHERE_SERVER v17.0SAP NetWeaver AS JavaSERVERCORE 7.50SAP Solution ManagerST 720SAP CommonCryptoLibCRYPTOLIB 8SAP HANA JDBC ClientHDB_CLIENT 2.0SAP Business ConnectorSAP BC 4.8(OS Command Injection)SAP BC 4.8(Path Traversal)SAP BC 4.8(Open Redirect)SAP BC 4.8(Reflected XSS)SAP NetWeaver Enterprise PortalEP-BASIS 7.50EP-RUNTIME 7.50SAP S/4HANA Landscape (SAP E-Recruiting BSP)S4ERECRT 100/200ERECRUIT 600-617ERECRUIT 800-802SAP HANA 2.0 (hdbrss)HDB 2.00SAP GUI for WindowsBC-FES-GUI 8.00BC-FES-GUI 8.10SAP Starter Solution (PL SAFT)SAP_APPL 600-606, 616SAP_FIN 617-618, 700, 720, 730S4CORE 100-104SAP NetWeaver Application Server JavaENGINEAPI 7.50EP-BASIS 7.50SAP Business One (SLD)B1_ON_HANA 10.0SAP-M-BO 10.0SAP S4CORE (Manage Journal Entries)S4CORE 104-108SAP NetWeaver Application Server for ABAP (Migration Workbench)SAP_BASIS 700-758SAP_BASIS 816SAP Fiori for SAP ERPSAP_GWFND 740-758 三、建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://support.sap.com/en/my-support/knowledge-base/security-notes-news/november-2025.htmlhttps://www.kjintelligent.com/en/hot_525873.html[Cybersecurity Vulnerability Notice]_SAP 產品多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525873.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525873.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525870.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525870.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 QNAP於近期釋出QTS和QuTS hero的 漏洞更新,其修補 7 個在國際駭客競賽 Pwn2Own Ireland 2025 中被成功利用的零日漏洞(Zero-Day Vulnerability),其漏洞允許遠端攻擊者可利用這些漏洞,於目標系統觸發遠端執行任意程式碼及權限提升。 二、存在風險 QNAP NAS 於近期釋出QTS和QuTS hero的漏洞更新,此次修補的漏洞涵蓋多個方面,其漏洞允許遠端攻擊者可利用這些漏洞,於目標系統觸發遠端執行任意程式碼及權限提升。 作業系統層面,QTS 與 QuTS hero 存在三項漏洞(CVE-2025-62847、CVE-2025-62848、CVE-2025-62849)。 應用程式方面,Hyper Data Protector 資料保護軟體存在 CVE-2025-59389 漏洞、Malware Remover 惡意軟體移除工具存在 CVE-2025-11837 漏洞、HBS 3 Hybrid Backup Sync 混合備份同步軟體則有 CVE-2025-62840 與 CVE-2025-62842 兩項漏洞。其影響系統或版本如下:QTS 5.2.x QuTS hero h5.2.xQuTS hero h5.3.xQuLog Center 1.8.xQsync Central 5.0.x QuMagie 2.6.xHBS 3 Hybrid Backup Sync 26.1.xNotification Center 1.9.x (for QTS 5.2.x, QuTS hero h5.2.x)Notification Center 2.1.x (for QuTS hero h5.3.x)Notification Center 3.0.x (for QuTS hero h5.6.x, h6.0.x)File Station 5 version 5.5.xDownload Station 5.10.x (for QTS 5.2.1)Download Station 5.10.x (for QuTS hero h5.2.1)Malware Remover 6.6.x Hyper Data Protector 2.2.x三、建議改善措施:請將QTS 5.2.x更新至20251024或更高版本。請將QuTS hero h5.2.x更新至20251024或更高版本。請將QuTS hero h5.3.x更新至20251024或更高版本。請將QuLog Center更新至1.8.2.923或更高版本。請將Qsync Central更新至5.0.0.3 或更高版本。請將QuMagie更新至2.7.3或更高版本。請將HBS 3 Hybrid Backup Sync更新至26.2.0.938或更高版本。請將Notification Center更新至1.9.2.3163或更高版本。請將Notification Center更新至2.1.0.3443或更高版本。請將Notification Center更新至3.0.0.3466或更高版本。請將File Station更新至5.5.6.5018或更高版本。請將Download Station更新至5.10.0.305或更高版本。請將Malware Remover更新至6.6.8.20251023或更高版本。請將Hyper Data Protector更新至2.2.4.1或更高版本。 情資報告連結:https://www.qnap.com/zh-tw/security-advisory/qsa-25-33https://www.qnap.com/zh-tw/security-advisory/qsa-25-37https://www.qnap.com/zh-tw/security-advisory/qsa-25-38https://www.qnap.com/zh-tw/security-advisory/qsa-25-40https://www.qnap.com/zh-tw/security-advisory/qsa-25-41https://www.qnap.com/zh-tw/security-advisory/qsa-25-42https://www.qnap.com/zh-tw/security-advisory/qsa-25-43https://www.qnap.com/zh-tw/security-advisory/qsa-25-45https://www.qnap.com/zh-tw/security-advisory/qsa-25-46https://www.qnap.com/zh-tw/security-advisory/qsa-25-47https://www.qnap.com/zh-tw/security-advisory/qsa-25-48https://www.kjintelligent.com/en/hot_525871.html[Cybersecurity Vulnerability Notice]_QNAP釋出QTS和QuTS多個的漏洞更新2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525871.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525871.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525181.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525181.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 Ubuntu Linux 核心存在多個漏洞,允許攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升、遠端執行任意程式碼、洩露敏感資料、繞過身份驗證及資料篡改。二、存在風險 Ubuntu Linux 核心存在多個漏洞,允許攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升、遠端執行任意程式碼、洩露敏感資料、繞過身份驗證及資料篡改,其影響系統如下:受影響之系統/漏洞描述:Ubuntu 22.04 LTSUbuntu 24.04 LTS三、建議改善措施 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://ubuntu.com/security/notices/USN-7833-4https://ubuntu.com/security/notices/USN-7835-4https://www.kjintelligent.com/en/hot_525184.html[Cybersecurity Vulnerability Notice]_Ubuntu Linux 核心存在多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525184.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525184.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【出處:台灣電腦緊急應變小組 TWCert】Cisco Unified Contact Center Express (Unified CCX)是一款企業建立客服中心的解決方案,整合語音、即時訊息、電子郵件等多種客服管道,提升客戶服務效率。日前,Cisco發布重大資安漏洞公告(CVE-2025-20354,CVSS:9.8和CVE-2025-20358,CVSS:9.4),CVE-2025-20354為遠端執行程式碼漏洞,允許未經身分驗證的攻擊者在受影響的系統上傳任意檔案,使用root權限執行任意命令;CVE-2025-20358為繞過身分驗證漏洞,可能允許未經身分驗證的遠端攻擊者繞過身分驗證,取得腳本建立和執行相關的管理權限。◎建議措施:請更新至以下版本Cisco Unified Contact Center Express 12.5 SU3 ES07(含)之後版本、Cisco Unified Contact Center Express 15.0 ES01(含)之後版本◎相關IOC資訊:◎備註:◎參考資料:1. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cc-unauth-rce-QeN8h7mQ2. https://www.cve.org/CVERecord?id=CVE-2025-203543. https://www.cve.org/CVERecord?id=CVE-2025-20358https://www.kjintelligent.com/en/hot_525733.html[TWCERT 分享資安情資]_Cisco旗下Unified Contact Center Express(Unified CCX)存在2個重大資安漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525733.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525733.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525180.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525180.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【出處:台灣電腦緊急應變小組 TWCert】【CVE-2025-48703】CWP Control Web Panel OS Command Injection Vulnerability (CVSS v3.1: 9.0)【是否遭勒索軟體利用:未知】CWP(又稱 Control Web Panel 或 CentOS Web Panel)存在作業系統指令注入漏洞,該漏洞允許透過檔案總管changePerm請求中t_total參數執行未經驗證的遠端程式碼。【CVE-2025-11371】Gladinet CentreStack and Triofox Files or Directories Accessible to External Parties Vulnerability (CVSS v3.1:7.5)【是否遭勒索軟體利用:未知】Gladinet CentreStack 和 TrioFox 的預設安裝和設定,允許未經身分驗證的攻擊者可存取本機檔案漏洞。◎建議措施:【CVE-2025-48703】對應產品升級至以下版本(或更高)CentOS Web Panel 0.9.8.1205(含)之後的版本【CVE-2025-11371】對應產品升級至以下版本(或更高)CentreStack and TrioFox 16.7.10368.56560(不含)之後的版本◎相關IOC資訊:◎備註:◎參考資料:【CVE-2025-48703】1.https://nvd.nist.gov/vuln/detail/cve-2025-487032. https://control-webpanel.com/changelog【CVE-2025-11371】1.https://nvd.nist.gov/vuln/detail/cve-2025-113712. https://www.centrestack.com/p/gce_latest_release.htmlhttps://www.kjintelligent.com/en/hot_525732.html[TWCERT 分享資安情資]_CISA新增2個已知遭駭客利用之漏洞至KEV目錄(2025/11/03-2025/11/09)2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525732.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525732.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發洩露敏感資料、繞過身份驗證、仿冒及遠端執行任意程式碼。二、存在風險 Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發洩露敏感資料、繞過身份驗證、仿冒及遠端執行任意程式碼,其影響系統如下:受影響之系統/漏洞描述:Microsoft Edge 142.0.3595.53 之前的版本三、建議改善措施 企業及使用者如有上述漏洞版本應儘速更新:請更新至 142.0.3595.53 或之後版本。 情資報告連結:http://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#october-31-2025https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12036https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12428https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12429https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12430https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12431https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12432https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12433https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12434https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12435https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12436https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12437https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12438https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12439https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12440https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12441https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12443https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12444https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12445https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12446https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12447https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60711https://www.kjintelligent.com/en/hot_525185.html[Cybersecurity Vulnerability Notice]_Microsoft Edge 存在多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525185.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525185.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 IBM WebSphere 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發洩露敏感資料及繞過身份驗證。二、存在風險 IBM WebSphere 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發洩露敏感資料及繞過身份驗證,其影響系統如下:受影響之系統/漏洞描述:IBM WebSphere Application Server 9.0IBM WebSphere Application Server 8.5WebSphere Application Server - Liberty (Continuous delivery)三、建議改善措施 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://www.ibm.com/support/pages/node/7250035https://www.kjintelligent.com/en/hot_525186.html[Cybersecurity Vulnerability Notice]_IBM WebSphere 產品存在多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525186.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525186.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525183.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525183.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525179.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525179.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 SUSE Linux 內核存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、遠端執行任意程式碼及繞過身份驗證。二、存在風險 SUSE Linux 內核存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、遠端執行任意程式碼及繞過身份驗證,其影響系統如下:受影響之系統/漏洞描述:openSUSE Leap 15.3openSUSE Leap 15.4SUSE Linux Enterprise High Performance Computing 12 SP5SUSE Linux Enterprise High Performance Computing 15 SP3SUSE Linux Enterprise High Performance Computing 15 SP4SUSE Linux Enterprise Live Patching 12-SP5SUSE Linux Enterprise Live Patching 15-SP3SUSE Linux Enterprise Live Patching 15-SP4SUSE Linux Enterprise Live Patching 15-SP6SUSE Linux Enterprise Live Patching 15-SP7SUSE Linux Enterprise Micro 5.1SUSE Linux Enterprise Micro 5.2SUSE Linux Enterprise Micro 5.3SUSE Linux Enterprise Micro 5.4SUSE Linux Enterprise Real Time 15 SP4SUSE Linux Enterprise Real Time 15 SP6SUSE Linux Enterprise Real Time 15 SP7SUSE Linux Enterprise Server 12 SP5SUSE Linux Enterprise Server 15 SP3SUSE Linux Enterprise Server 15 SP4SUSE Linux Enterprise Server 15 SP6SUSE Linux Enterprise Server 15 SP7SUSE Linux Enterprise Server for SAP Applications 12 SP5SUSE Linux Enterprise Server for SAP Applications 15 SP3SUSE Linux Enterprise Server for SAP Applications 15 SP4SUSE Linux Enterprise Server for SAP Applications 15 SP6SUSE Linux Enterprise Server for SAP Applications 15 SP7三、建議改善措施 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://www.suse.com/support/update/announcement/2025/suse-su-202503465-1/https://www.suse.com/support/update/announcement/2025/suse-su-202503468-1/https://www.suse.com/support/update/announcement/2025/suse-su-202503469-1/https://www.suse.com/support/update/announcement/2025/suse-su-202503470-1/https://www.suse.com/support/update/announcement/2025/suse-su-202503472-1/https://www.suse.com/support/update/announcement/2025/suse-su-202503473-1/https://www.suse.com/support/update/announcement/2025/suse-su-202503475-1/https://www.suse.com/support/update/announcement/2025/suse-su-202503476-1/https://www.suse.com/support/update/announcement/2025/suse-su-202503479-1/https://www.suse.com/support/update/announcement/2025/suse-su-202503480-1/https://www.suse.com/support/update/announcement/2025/suse-su-202503482-1https://www.suse.com/support/update/announcement/2025/suse-su-202503483-1https://www.suse.com/support/update/announcement/2025/suse-su-202503485-1https://www.suse.com/support/update/announcement/2025/suse-su-202503494-1https://www.suse.com/support/update/announcement/2025/suse-su-202503495-1https://www.suse.com/support/update/announcement/2025/suse-su-202503496-1https://www.suse.com/support/update/announcement/2025/suse-su-202503497-1https://www.suse.com/support/update/announcement/2025/suse-su-202503498-1https://www.suse.com/support/update/announcement/2025/suse-su-202503503-1https://www.suse.com/support/update/announcement/2025/suse-su-202503504-1https://www.suse.com/support/update/announcement/2025/suse-su-202503514-1https://www.suse.com/support/update/announcement/2025/suse-su-202503515-1https://www.suse.com/support/update/announcement/2025/suse-su-202503528-1https://www.suse.com/support/update/announcement/2025/suse-su-202503529-1https://www.suse.com/support/update/announcement/2025/suse-su-202503538-1https://www.suse.com/support/update/announcement/2025/suse-su-202503539-1https://www.kjintelligent.com/en/hot_524302.html[資安漏洞通知-CIO]_SUSE Linux 內核存在多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524302.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524302.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 Zoom 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發洩露敏感資料。二、存在風險 Zoom 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發洩露敏感資料,其影響系統如下:受影響之系統/漏洞描述:Zoom Meeting SDK for Windows 6.5.5 之前的版本Zoom Rooms for Windows 6.5.1 之前的版本Zoom Rooms for macOS 6.5.1 之前的版本Zoom Rooms for Android 6.5.1 之前的版本Zoom Rooms for iOS 6.5.1 之前的版本Zoom Rooms for iPad 6.5.1 之前的版本Zoom Workplace for Windows 6.5.5 之前的版本Zoom Workplace VDI Client for Windows 6.3.15 及 6.4.13 之前的版本三、建議改善措施 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://www.zoom.com/en/trust/security-bulletin/zsb-25038/https://www.zoom.com/en/trust/security-bulletin/zsb-25039/https://www.kjintelligent.com/en/hot_524304.html[資安漏洞通知-CIO]_Zoom 產品存在資料洩露漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524304.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524304.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524301.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524301.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525177.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525177.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525178.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_525178.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524306.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524306.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 7-Zip 壓縮工具存在 2 個非常嚴重的漏洞,分別為(CVE-2025-11001&CVE-2025-11002),其允許攻擊者透過誘騙方式,令使用者開啟含惡意代碼的 ZIP 壓縮檔,攻擊者即可在使用者電腦上執行代碼並取得系統控制權。二、存在風險 7-Zip 壓縮工具存在 2 個非常嚴重的漏洞,分別為(CVE-2025-11001&CVE-2025-11002),其允許攻擊者透過誘騙方式,令使用者開啟含惡意代碼的 ZIP 壓縮檔,攻擊者即可在使用者電腦上執行代碼並取得系統控制權,其影響系統如下:受影響之系統/漏洞描述:7-Zip Windows App 25.00 先前版本三、建議改善措施 企業及使用者如有上述漏洞版本應儘速更新: 請更新至 25.01 或更高版本。 情資報告連結:https://www.ithome.com/0/888/789.htmhttps://today.line.me/hk/v3/article/RBVKkVMhttps://www.kjintelligent.com/en/hot_524303.html[資安漏洞通知-CIO] 7-zip 存在安全性漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524303.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524303.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524298.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524298.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521471.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521471.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
一、摘要
Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發遠端執行任意程式碼及阻斷服務狀況。
二、存在風險
Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發遠端執行任意程式碼及阻斷服務狀況,其影響系統如下:
受影響之系統/漏洞描述:
Microsoft Edge 141.0.3537.71 之前的版本
三、建議改善措施
企業及使用者如有上述漏洞版本應儘速更新:
請更新至 141.0.3537.71 或之後版本。
情資報告連結:
https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#october-9-2025
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11458
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11460https://www.kjintelligent.com/en/hot_524295.html[Cybersecurity Vulnerability Notice]_Microsoft Edge 存在多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524295.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524295.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 Zimbra Collaboration Suite 存在一個漏洞,允許遠端攻擊者利用此漏洞,於目標系統觸發跨網站指令碼。二、存在風險 Zimbra Collaboration Suite 存在一個漏洞,允許遠端攻擊者利用此漏洞,於目標系統觸發跨網站指令碼,其影響系統如下:受影響之系統/漏洞描述:Zimbra Collaboration Kepler 9.0.0 P44 之前的版本Zimbra Collaboration Daffodil 10.0.13 之前的版本Zimbra Collaboration Daffodil 10.1.5 之前的版本三、建議改善措施 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P44#Security_Fixeshttps://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.13#Security_Fixeshttps://wiki.zimbra.com/wiki/Zimbra_Releases/10.1.5#Security_Fixeshttps://www.kjintelligent.com/en/hot_524300.html[資安漏洞通知-CIO] Zimbra Collaboration Suite 存在跨網站指令碼漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524300.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524300.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 甲骨文 E-Business Suite 存在一個漏洞,允許遠端攻擊者利用此漏洞,於目標系統觸發遠端執行任意程式碼。二、存在風險 甲骨文 E-Business Suite 存在一個漏洞,允許遠端攻擊者利用此漏洞,於目標系統觸發遠端執行任意程式碼,其影響系統如下:受影響之系統/漏洞描述:甲骨文 E-Business Suite 版本 12.2.3-12.2.14三、建議改善措施 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://www.oracle.com/security-alerts/alert-cve-2025-61882.htmlhttps://www.kjintelligent.com/en/hot_524299.html[資安漏洞通知-CIO] 甲骨文 E-Business Suite 存在遠端執行程式碼漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524299.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524299.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【出處:台灣電腦緊急應變小組 TWCert】Microsoft SharePoint Server 是一款企業級協作平台,提供文件管理與團隊協作等功能,是企業資訊整合的核心平台。【CVE-2025-59228,CVSS:8.8】此為不正確輸入驗證漏洞,允許經授權的攻擊者透過網路執行程式碼。【CVE-2025-59237,CVSS:8.8】此為未受信任之資料反序列化漏洞,允許經授權的攻擊者透過網路執行程式碼。◎建議措施:根據官方網站釋出解決方式進行修補:【CVE-2025-59228】https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59228【CVE-2025-59237】https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59237◎相關IOC資訊:◎備註:◎參考資料:1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-592282. https://nvd.nist.gov/vuln/detail/CVE-2025-592283. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-592374. https://nvd.nist.gov/vuln/detail/CVE-2025-59237https://www.kjintelligent.com/en/hot_524287.html[TWCERT 分享資安情資]_Microsoft 旗下SharePoint Server 存在2個重大資安漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524287.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524287.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_523526.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_523526.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524285.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524285.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524293.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524293.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524305.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524305.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524288.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524288.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【出處:台灣電腦緊急應變小組 TWCert】微軟針對旗下產品Exchange Server發布重大資安漏洞公告(CVE-2025-59249,CVSS:8.8),此漏洞為弱身分驗證漏洞,允許經授權的攻擊透過網路提升權限。◎建議措施:根據官方網站釋出解決方式進行修補:https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59249◎相關IOC資訊:◎備註:◎參考資料:1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-592492. https://nvd.nist.gov/vuln/detail/CVE-2025-59249https://www.kjintelligent.com/en/hot_524286.html[TWCERT 分享資安情資]_Microsoft Exchange Server 存在重大資安漏洞(CVE-2025-59249)2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524286.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524286.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524289.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524289.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
一、摘要
甲骨文 E-Business Suite 存在一個漏洞,允許遠端攻擊者利用此漏洞,於目標系統觸發敏感資料洩露。
二、存在風險
甲骨文 E-Business Suite 存在一個漏洞,允許遠端攻擊者利用此漏洞,於目標系統觸發敏感資料洩露,其影響系統如下:
受影響之系統/漏洞描述:
甲骨文 E-Business Suite 版本 12.2.3-12.2.14
三、建議改善措施
企業及使用者如有上述漏洞版本應儘速更新。
情資報告連結:https://www.oracle.com/security-alerts/alert-cve-2025-61884.htmlhttps://www.kjintelligent.com/en/hot_524296.html[Cybersecurity Vulnerability Notice]_甲骨文 E-Business Suite 存在資料洩露漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524296.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524296.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【出處:台灣電腦緊急應變小組 TWCert】
【CVE-2021-22555】Linux Kernel Heap Out-of-Bounds Write Vulnerability (CVSSv3.1: 8.3)【是否遭勒索軟體利用:未知】Linux核心存在堆積越界寫入漏洞,攻擊者可利用該漏洞透過使用者命名空間提升權限或造成DoS(透過堆積記憶體損毀方式)。【CVE-2010-3962】Microsoft Internet Explorer Uninitialized Memory Corruption Vulnerability (CVSS v3.1: 8.1)【是否遭勒索軟體利用:未知】Microsoft Internet Explorer存在未初始化記憶體損毀漏洞,可能允許遠端程式碼執行。【CVE-2021-43226】Microsoft Windows Privilege Escalation Vulnerability(CVSS v3.1: 7.8)【是否遭勒索軟體利用:已知】Microsoft Windows 通用日誌檔案系統驅動程式存在權限提升漏洞,可能允許具備本地特權的攻擊者繞過特定安全機制。【CVE-2013-3918】Microsoft Windows Out-of-Bounds Write Vulnerability (CVSS v3.1: 8.8)【是否遭勒索軟體利用:未知】Microsoft Windows在InformationCardSigninHelper類別的ActiveX控制項 (icardie.dll) 存在越界寫入漏洞。攻擊者可透過特製的網頁來利用此漏洞。當使用者瀏覽該網頁時,此漏洞可能導致遠端程式碼執行。成功利用此漏洞的攻擊者可取得與當前使用者相同的權限。受影響的產品可能已達生命週期終止(EoL)或停止服務(EoS),建議使用者停止使用該產品。【CVE-2011-3402】MicrosoftWindows Remote Code Execution Vulnerability (CVSS v3.1: 8.8)【是否遭勒索軟體利用:未知】Microsoft Windows Kernel在核心模式驅動程式win32k.sys中的TrueType字型解析引擎存在漏洞,可能允許遠端攻擊者透過特製的字型資料,在Word文件或網頁中執行任意程式碼。【CVE-2010-3765】Mozilla Multiple Products Remote Code Execution Vulnerability (CVSS v3.1: 9.8)【是否遭勒索軟體利用:未知】Mozilla Firefox、SeaMonkey與Thunderbird在啟用JavaScript時存在未具體說明的漏洞。遠端攻擊者可透過與 nsCSSFrameConstructor::ContentAppended、appendChild方法、不正確的索引追蹤,及建立多個框架等相關的攻擊向量,導致記憶體損毀,進而執行任意程式碼。【CVE-2025-61882】Oracle E-Business Suite Unspecified Vulnerability (CVSS v3.1: 9.8)【是否遭勒索軟體利用:是】Oracle E-Business Suite 的 BI Publisher 整合元件存在未具體說明的漏洞,可能允許透過 HTTP 且未經驗證的攻擊者入侵並接管 Oracle Concurrent Processing。【CVE-2025-27915】Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability (CVSS v3.1: 5.4)【是否遭勒索軟體利用:未知】Synacor Zimbra Collaboration Suite(ZCS)的經典 Web 用戶端存在跨站指令碼(XSS)漏洞,起因於系統對 ICS 檔案中 HTML 內容的過濾不足。當使用者檢視含有惡意 ICS 項目的電子郵件時,內嵌的 JavaScript 會透過標籤內的 ontoggle 事件被執行。攻擊者可藉此在受害者的工作階段中執行任意 JavaScript 程式碼,進而執行未經授權的操作,例如設定郵件篩選器以將郵件轉寄至攻擊者控制的地址。最終,攻擊者可能對受害者帳戶執行未經授權的操作,進行郵件轉寄或資料外洩等行為。【CVE-2021-43798】Grafana Path Traversal Vulnerability (CVSS v3.1: 7.5)【是否遭勒索軟體利用:未知】Grafana存在路徑遍歷漏洞,可能允許攻擊者存取本機檔案。TLP: CLEAR TWCERT-TWISAC-202510-0008◎建議措施:【CVE-2021-22555】官方已針對漏洞釋出修復更新,請更新至相關版本1.https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa212.https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d【CVE-2010-3962】官方已針對漏洞釋出修復更新,請更新至相關版本https://learn.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-090【CVE-2021-43226】官方已針對漏洞釋出修復更新,請更新至相關版本https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2021-43226【CVE-2013-3918】官方已針對漏洞釋出修復更新,請更新至相關版本https://learn.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-090【CVE-2011-3402】官方已針對漏洞釋出修復更新,請更新至相關版本https://learn.microsoft.com/en-us/security-updates/SecurityBulletins/2011/ms11-087【CVE-2010-3765】官方已針對漏洞釋出修復更新,請更新至相關版本https://blog.mozilla.org/security/2010/10/26/critical-vulnerability-in-firefox-3-5-and-firefox-3-6/【CVE-2025-61882】官方已針對漏洞釋出修復更新,請更新至相關版本https://www.oracle.com/security-alerts/alert-cve-2025-61882.html【CVE-2025-27915】官方已針對漏洞釋出修復更新,請更新至相關版本https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories【CVE-2021-43798】官方已針對漏洞釋出修復更新,請更新至相關版本https://github.com/grafana/grafana/security/advisories/GHSA-8pjx-jj86-j47p◎相關IOC資訊:◎備註:◎參考資料:【CVE-2021-22555】1.https://nvd.nist.gov/vuln/detail/cve-2021-225552.https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=9fa492cdc160cd27ce1046cb36f47d3b2b1efa213.https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/x_tables.c?id=b29c457a6511435960115c0f548c4360d5f4801d【CVE-2010-3962】1.https://nvd.nist.gov/vuln/detail/cve-2010-39622.https://learn.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-090【CVE-2021-43226】1.https://nvd.nist.gov/vuln/detail/cve-2021-432262.https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2021-43226【CVE-2013-3918】1.https://nvd.nist.gov/vuln/detail/cve-2013-39182.https://learn.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-090【CVE-2011-3402】1.https://nvd.nist.gov/vuln/detail/cve-20TLP: CLEAR TWCERT-TWISAC-202510-000811-34022.https://learn.microsoft.com/en-us/security-updates/SecurityBulletins/2011/ms11-087【CVE-2010-3765】1.https://nvd.nist.gov/vuln/detail/cve-2010-37652.https://blog.mozilla.org/security/2010/10/26/critical-vulnerability-in-firefox-3-5-and-firefox-3-6/【CVE-2025-61882】1.https://nvd.nist.gov/vuln/detail/cve-2025-618822.https://www.oracle.com/security-alerts/alert-cve-2025-61882.html【CVE-2025-27915】1.https://nvd.nist.gov/vuln/detail/cve-2025-279152.https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories【CVE-2021-43798】1.https://nvd.nist.gov/vuln/detail/cve-2021-437982.https://github.com/grafana/grafana/security/advisories/GHSA-8pjx-jj86-j47phttps://www.kjintelligent.com/en/hot_524290.html[TWCERT 分享資安情資] CISA新增9個已知遭駭客利用之漏洞至KEV目錄(2025/10/06-2025/10/12)2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524290.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_524290.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_523524.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_523524.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_523520.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_523520.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_523800.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_523800.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 SolarWinds Web Help Desk 存在一個漏洞,允許遠端攻擊者利用此漏洞,於目標系統觸發遠端執行任意程式碼。二、存在風險 SolarWinds Web Help Desk 存在一個漏洞,允許遠端攻擊者利用此漏洞,於目標系統觸發遠端執行任意程式碼,其影響系統如下:受影響之系統/漏洞描述:SolarWinds Web Help Desk 12.8.7 及之前的版本三、建議改善措施 企業及使用者如有上述漏洞版本應儘速更新:請更新至 SolarWinds Web Help Desk 12.8.7 HF1 或之後的版本。 情資報告連結:https://www.solarwinds.com/trust-center/security-advisories/cve-2025-26399https://www.kjintelligent.com/en/hot_523525.html[Cybersecurity Vulnerability Notice] SolarWinds Web Help Desk 存在遠端執行程式碼漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_523525.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_523525.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_523798.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_523798.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發遠端執行任意程式碼、阻斷服務狀況及敏感資料洩露。二、存在風險 Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發遠端執行任意程式碼、阻斷服務狀況及敏感資料洩露,其影響系統如下:受影響之系統/漏洞描述:Microsoft Edge 140.0.3485.81 之前的版本三、建議改善措施 企業及使用者如有上述漏洞版本應儘速更新:請更新至 140.0.3485.81 或之後版本。 情資報告連結:https://learn.microsoft.com/en-us/deployedge/microsoft-edge-relnotes-security#september-18-2025https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-10500https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-10501https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-10502https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-10585https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59251https://www.kjintelligent.com/en/hot_523523.html[Cybersecurity Vulnerability Notice] Microsoft Edge 存在多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_523523.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_523523.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】開源軟體領導品牌 Red Hat 的資安考驗一、摘要 全球開源軟體領導品牌 Red Hat 近期遭遇重大資安挑戰,駭客集團 Crimson Collective 聲稱竊取大量敏感資料後,將行動接力交棒給惡名昭彰的 Shiny Hunters駭客集團,威脅將於 2025 年 10 月 10 日公開約 570GB 的資料,涉及 Walmart、匯豐銀行、美國國防部等知名企業與機構的關鍵報告。 這場危機不僅暴露開源生態的潛在風險,更提醒企業:資安防護已成為生存關鍵!透過導入「雲智維資訊顧問代管代維方案」,企業可獲得專業資安支援,抵禦日益複雜的威脅!二、事件始末:駭客聯手掀起勒索風暴 這場資安風暴始於 Crimson Collective 入侵 Red Hat 的 GitLab 系統,竊取約 28,000 個開發儲存庫,包含大量客戶參與報告,涵蓋網路架構與基礎設施資訊等內容。Red Hat 已確認其 GitLab 平台受損,凸顯供應鏈資安的脆弱性。 隨後,Crimson Collective 與 Scattered Lapsus$ Hunters 合作,將攻擊行動轉交給 ShinyHunters。後者在專屬資料外洩網站上公開部分資料樣本,涉及全球知名企業與政府機構,並設定 10 月 10 日為贖金支付期限,否則將公開全部資料。這場精心策劃的攻擊不僅顯示駭客團體的高度協同能力,更凸顯企業資安防護的迫切需求。三、新興威脅:勒索即服務(EaaS)的崛起 ShinyHunters 採用的「勒索即服務」(Extortion-as-a-Service, EaaS)模式,標誌著駭客犯罪的新階段。不同於傳統勒索軟體鎖定檔案加密,EaaS 專注竊取敏感資料,透過公開或販售威脅受害者,迫使其支付贖金。ShinyHunters 提供平台與談判服務,抽取贖金分成,讓攻擊更具規模與效率。 面對這種跨組織、連環攻擊模式凸顯駭客團體的協同作戰能力,企業內部若無專業資安團隊或是資安防護,將難以應對。「雲智維資訊顧問代管代維方案」透過即時監控與威脅情資分析,協助企業提前發現並化解潛在風險,防患於未然。 四、企業的應對策略:資安代管代維的關鍵角色 Red Hat 事件為許多企業敲響警鐘,資安不再是可有可無的選項,而是生存基礎。以下是針對企業的實務建議,結合「雲智維資訊顧問代管代維方案」的核心價值:1. 守護供應鏈安全:Red Hat 事件顯示供應鏈漏洞可能引發連鎖危機。台灣企業應全面審查與技術供應商的合作,確保資料安全。「雲智維資訊顧問代管代維方案」提供持續監控,協助企業找出潛藏的資安威脅。2. 強化核心系統防護:GitLab 等平台成為駭客目標,企業需加強系統安全,啟用多因素驗證(MFA)、限制存取並定期審計,確保系統隨時處於最佳防護狀態。3. 保護敏感資料:外洩報告包含關鍵基礎設施資訊,企業應限制資料共享範圍並加密儲存。4. 快速應變勒索攻擊:EaaS 攻擊需要專業應對策略。「雲智維資訊顧問代管代維方案」在異常事件發生時,主動偵測、分析問題根源,並提供客製化應變建議,協助企業分階段處理危機,防止事件擴大。五、攜手專業資安,迎戰未來威脅 隨著 10 月 10 日期限逼近,Red Hat 及其客戶正面臨巨大壓力。ShinyHunters 主導的 EaaS 模式凸顯資料勒索的破壞力,也揭示駭客犯罪的進化。對企業而言,這是重新審視資安策略的關鍵時刻。 透過「雲智維資訊顧問代管代維方案」,企業可獲得主動監控、快速應變與專業諮詢,全面提升資安防護能力。立即採取行動,強化供應鏈安全、完善系統防護,發生異常事件時,可以幫助企業主動發現事件,主動幫企業找出問題點所在,並給予企業相關建議,而企業也可以逐步進行處理後,成功預防內部資安事件擴大。資料來源:https://www.informationsecurity.com.tw/article/article_detail.aspx?aid=12309&fbclid=IwZnRzaANS1JpleHRuA2FlbQIxMQABHvJgtqoPqMbhs5yNJU0q9DCYOQauICIof1GDSiqFavKJG1_B-ih-HzPsD09j_aem_nLBPFlSAQYUEX6HFuIlMDQhttps://www.kjintelligent.com/en/hot_523803.html[Cybersecurity Vulnerability Notice] 資安威脅趨勢 - 資安警鐘響起:Red Hat 遭駭危機,企業如何自保?2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_523803.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_523803.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 RedHat Linux核心存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發遠端執行任意程式碼及阻斷服務狀況。二、存在風險 RedHat Linux核心存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發遠端執行任意程式碼及阻斷服務狀況,其影響系統如下:受影響之系統/漏洞描述:Red Hat Enterprise Linux Server - AUS 8.6 x86_64Red Hat Enterprise Linux Server - TUS 8.6 x86_64Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64leRed Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.6 x86_64Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64三、建議改善措施 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://access.redhat.com/errata/RHSA-2025:17123https://access.redhat.com/errata/RHSA-2025:17124https://access.redhat.com/errata/RHSA-2025:17192https://www.kjintelligent.com/en/hot_523802.html[Cybersecurity Vulnerability Notice] RedHat Linux 核心存在多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_523802.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_523802.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_523799.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_523799.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_523522.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_523522.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_523519.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_523519.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_523521.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_523521.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_522931.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_522931.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_522934.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_522934.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_522933.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_522933.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【出處:台灣電腦緊急應變小組 TWCert】【CVE-2025-42944,CVSS:10.0】SAP NetWeaver 存在反序列化漏洞。未經驗證的攻擊者可透過 RMI-P4 模組,向對外開放的連接埠傳送惡意負載,進而執行任意作業系統命令,對應用程式的機密性、完整性及可用性構成潛在威脅。【CVE-2025-42922,CVSS:9.9】SAP NetWeaverAS Java 存在允許經過管理身分驗證的攻擊者上傳任意檔案的漏洞,可能導致系統的機密性、完整性和可用性造成破壞。【CVE-2025-42958,CVSS:9.1】IBM i-series 的SAP NetWeaver 應用程式缺少身分驗證檢查,允許高權限的未經授權使用者讀取、修改或刪除敏感資料,並進一步存取管理功能或以特權權限操作,對應用程式的機密性、完整性與可用性構成重大風險。【CVE-2025-42933,CVSS:8.8】當用戶透過 SAP Business One 原生用戶端登入時,由於 SLD 後端服務未對部分 API強制使用適當的加密機制,導致敏感憑證可能在 HTTP 回應主體中外洩,進而嚴重影響應用程式的機密性、完整性與可用性。◎建議措施:根據官方網站釋出的解決方式進行修補:https://support.sap.com/en/my-support/knowledge-base/security-notes-news/september-2025.html◎相關IOC資訊:◎備註:◎參考資料:1. https://support.sap.com/en/my-support/knowledge-base/security-notes-news/september-2025.html2. https://www.cve.org/CVERecord?id=CVE-2025-429443. https://www.cve.org/CVERecord?id=CVE-2025-429224. https://www.cve.org/CVERecord?id=CVE-2025-429585.https://www.cve.org/CVERecord?id=CVE-2025-42933https://www.kjintelligent.com/en/hot_522929.html[TWCERT 分享資安情資] SAP針對旗下多款產品發布重大資安公告2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_522929.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_522929.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 思科 IOS XR 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況及繞過身份驗證。二、存在風險 思科 IOS XR 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況及繞過身份驗證,其影響系統如下:受影響之系統/漏洞描述:Cisco IOS XR Software Management Interface ACL Bypass VulnerabilityCVE編號:CVE-2025-20159漏洞描述:Cisco IOS XR 管理介面存取控制清單(ACL)處理功能存在,可能允許未經驗證的遠端攻擊者繞過針對 SSH、NetConf 和 gRPC 功能所設定的 ACL。影響系統/版本:8000 Series RoutersASR 9000 Series Aggregation Services RoutersIOS XR White box (IOSXRWBD)IOS XRd vRoutersIOS XRv 9000 RoutersNetwork Convergence Series (NCS) 540 Series Routers (NCS540-iosxr base image)NCS 540 Series Routers (NCS540L-iosxr base image)NCS 560 Series RoutersNCS 1010 PlatformsNCS 1014 PlatformsNCS 5500 Series RoutersNCS 5700 Series Routers檢查方式:show running-config interface mgmtEth 0/RP0/CPU0/0 show running-config grpcshow running-config sshshow running-config ssh server netconfCisco IOS XR Software Image Verification Bypass VulnerabilityCVE編號:CVE-2025-20248漏洞描述:Cisco IOS XR 軟體安裝過程中的一個漏洞可能允許已驗證的本地攻擊者繞過軟體映像簽章驗證,並在受影響設備上載入未簽章的軟體。影響系統/版本:ASR 9000 Series Aggregation Services Routers (64-bit)IOS XR White box (IOSXRWBD)IOS XRv 9000 RoutersNetwork Convergence System (NCS) 540 Series Routers that are running an NCS 540-iosxr base imageNCS 560 Series RoutersNCS 1000 Series (NCS 1001, NCS 1002, and NCS 1004)NCS 5000 Series RoutersNCS 5500 Series RoutersNCS 5700 Series Line Cards and Routers that are running an NCS 5500 base imageNCS 6000 Series RoutersCisco IOS XR ARP Broadcast Storm Denial of Service VulnerabilityCVE編號:CVE-2025-20340漏洞描述:Cisco IOS XR 軟體的地址解析協定(ARP)存在漏洞,可能允許未經驗證的鄰近攻擊者觸發廣播風暴,導致受影響設備發生拒絕服務(DoS)。影響系統/版本:Cisco IOS XR檢查方式:show interfaces MgmtEth 0/RP0/CPU0/0三、建議改善措施 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-arp-storm-EjUU55yMhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xrsig-UY4zRUCGhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-acl-packetio-Swjhhbtzhttps://www.kjintelligent.com/en/hot_522935.html[Cybersecurity Vulnerability Notice] 思科 IOS XR 存在多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_522935.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_522935.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_522930.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_522930.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 Zoom 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發洩露敏感資料、篡改、權限提升及阻斷服務狀況。二、存在風險 Zoom 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發洩露敏感資料、篡改、權限提升及阻斷服務狀況,其影響系統如下:受影響之系統/漏洞描述:Zoom Meeting SDK for Android 6.5.0 之前的版本Zoom Meeting SDK for Linux 6.5.0 之前的版本Zoom Meeting SDK for macOS 6.5.0 之前的版本Zoom Meeting SDK for Windows 6.5.0 之前的版本Zoom Rooms Client for Android 6.5.0 之前的版本Zoom Rooms Client for iPad 6.5.0 之前的版本Zoom Rooms Client for macOS 6.5.0 之前的版本Zoom Rooms Client for Windows 6.5.0 之前的版本Zoom Rooms Controller for Android 6.5.0 之前的版本Zoom Rooms Controller for Linux 6.5.0 之前的版本Zoom Rooms Controller for macOS 6.5.0 之前的版本Zoom Rooms Controller for Windows 6.5.0 之前的版本Zoom Rooms for iOS 6.5.0 之前的版本Zoom Rooms for macOS 6.5.0 之前的版本Zoom Rooms for Windows 6.5.0 之前的版本Zoom Workplace App for iOS 6.5.0 之前的版本Zoom Workplace Desktop for Linux 6.5.0 之前的版本Zoom Workplace Desktop for macOS 6.5.0 之前的版本Zoom Workplace Desktop for Windows 6.5.0 之前的版本Zoom Workplace for Linux 6.5.0 之前的版本Zoom Workplace for macOS 6.5.0 之前的版本Zoom Workplace for Windows 6.5.0 之前的版本Zoom Workplace for Windows on ARM 6.5.0 之前的版本Zoom Workplace VDI Client for Windows 6.3.14 及 6.4.12 之前的版本Zoom Workplace VDI Plugin macOS Universal installer for VMware Horizon 6.4.10 之前的版本 (或 6.2.15 及 6.3.12 之前的版本)三、建議改善措施 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://www.zoom.com/en/trust/security-bulletin/zsb-25031/https://www.zoom.com/en/trust/security-bulletin/zsb-25032/https://www.zoom.com/en/trust/security-bulletin/zsb-25034/https://www.zoom.com/en/trust/security-bulletin/zsb-25035/https://www.zoom.com/en/trust/security-bulletin/zsb-25036/https://www.zoom.com/en/trust/security-bulletin/zsb-25037/https://www.zoom.com/en/trust/security-bulletin/zsb-25033/https://www.kjintelligent.com/en/hot_522932.html[Cybersecurity Vulnerability Notice] Zoom 產品存在多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_522932.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_522932.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【出處:台灣電腦緊急應變小組 TWCert】【CVE-2025-5086】Dassault Systèmes DELMIA Apriso Deserialization of Untrusted Data Vulnerability (CVSS v3.1: 9.0)【是否遭勒索軟體利用:未知】Dassault Systèmes的DELMIA Apriso存在未經信任資料反序列化漏洞,可能導致遠端程式碼執行。◎建議措施:【CVE-2025-5086】依照供應商指示採取緩解措施,遵循適用的BOD 22-01指南以確保雲端服務的安全,若無法實施緩解措施則應停止使用該產品。◎相關IOC資訊:◎備註:◎參考資料:【CVE-2025-5086】1.https://nvd.nist.gov/vuln/detail/cve-2025-50862.https://www.3ds.com/trust-center/security/security-advisories/cve-2025-5086https://www.kjintelligent.com/en/hot_522928.html[TWCERT 分享資安情資] CISA新增1個已知遭駭客利用之漏洞至KEV目錄(2025/09/08-2025/09/14)2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_522928.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_522928.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 Debian Linux 內核存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升及洩露敏感資料。二、存在風險 Debian Linux 內核存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升及洩露敏感資料,其影響系統如下:受影響之系統/漏洞描述:Debian stable 6.12.41-1 以前的版本Debian bookworm 6.1.147-1 以前的版本三、建議改善措施 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://lists.debian.org/debian-security-announce/2025/msg00137.htmlhttps://lists.debian.org/debian-security-announce/2025/msg00139.htmlhttps://www.kjintelligent.com/en/hot_521457.html[Cybersecurity Vulnerability Notice] Debian Linux 內核存在多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521457.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521457.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_519157.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_519157.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521462.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521462.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 Ubuntu Linux 核心存在多個漏洞,允許攻擊者利用這些漏洞,於目標系統觸發權限提升、阻斷服務狀況、遠端執行程式碼、敏感資料洩露及繞過身份驗證。 二、存在風險 Ubuntu Linux 核心存在多個漏洞,允許攻擊者利用這些漏洞,於目標系統觸發權限提升、阻斷服務狀況、遠端執行程式碼、敏感資料洩露及繞過身份驗證,受影響之系統或技術如下: 受影響之系統/漏洞描述:Ubuntu 14.04 LTSUbuntu 16.04 LTSUbuntu 20.04 LTSUbuntu 22.04 LTSUbuntu 24.04 LTSUbuntu 25.04三、建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://ubuntu.com/security/notices/USN-7671-3https://ubuntu.com/security/notices/USN-7681-2https://ubuntu.com/security/notices/USN-7681-3https://ubuntu.com/security/notices/USN-7682-2https://ubuntu.com/security/notices/USN-7682-3https://ubuntu.com/security/notices/USN-7682-4https://ubuntu.com/security/notices/USN-7682-5https://ubuntu.com/security/notices/USN-7683-1https://ubuntu.com/security/notices/USN-7683-2https://ubuntu.com/security/notices/USN-7683-3https://ubuntu.com/security/notices/USN-7684-1https://ubuntu.com/security/notices/USN-7684-2https://ubuntu.com/security/notices/USN-7684-3https://ubuntu.com/security/notices/USN-7685-1https://ubuntu.com/security/notices/USN-7685-2https://ubuntu.com/security/notices/USN-7685-3https://ubuntu.com/security/notices/USN-7685-4https://ubuntu.com/security/notices/USN-7686-1https://www.kjintelligent.com/en/hot_521458.html[Cybersecurity Vulnerability Notice] Ubuntu Linux 核心存在多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521458.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521458.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 Docker Desktop 存在一個漏洞,允許遠端攻擊者利用此漏洞,於目標系統觸發繞過身份驗證。二、存在風險 Docker Desktop 存在一個漏洞,允許遠端攻擊者利用此漏洞,於目標系統觸發繞過身份驗證,受影響之系統或技術如下:受影響之系統/漏洞描述:Docker Desktop on Windows 4.44.3 之前的版本Docker Desktop on MacOS 4.44.3 之前的版本三、建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://docs.docker.com/desktop/release-notes/#4443https://pvotal.tech/breaking-dockers-isolation-using-docker-cve-2025-9074/https://www.kjintelligent.com/en/hot_521866.html[Cybersecurity Vulnerability Notice] Docker Desktop 存在繞過身份驗證漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521866.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521866.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_522304.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_522304.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 思科產品存在多個漏洞,允許遠端攻擊者可利用這些漏洞,於目標系統觸發阻斷服務狀況、洩露敏感資料及遠端執行任意程式碼。二、存在風險 思科產品存在多個漏洞,允許遠端攻擊者可利用這些漏洞,於目標系統觸發阻斷服務狀況、洩露敏感資料及遠端執行任意程式碼,其影響系統如下:受影響之系統/漏洞描述:MDS 9000 Series Multilayer SwitchesNexus 1000 Virtual Edge for VMware vSphereNexus 3000 Series SwitchesNexus 3000 Series SwitchesNexus 5500 Platform SwitchesNexus 5600 Platform SwitchesNexus 6000 Series SwitchesNexus 7000 Series SwitchesNexus 9000 Series Fabric Switches in ACI modeNexus 9000 Series Switches in standalone NX-OS modeNexus 9000 Series Switches in standalone NX-OS modeUCS 6400 Series Fabric InterconnectsUCS 6400 Series Fabric InterconnectsUCS 6500 Series Fabric InterconnectsUCS 6500 Series Fabric InterconnectsUCS X-Series Direct Fabric Interconnect 9108 100G三、建議改善措施 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-n39k-isis-dos-JhJA8Rfxhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxospc-pim6-vG4jFPhhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-infodis-TEcTYSFGhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmdinj-qhNze5Sshttps://www.kjintelligent.com/en/hot_522302.html[Cybersecurity Vulnerability Notice] 思科產品存在多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_522302.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_522302.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 WhatsApp 存在一個漏洞,允許遠端攻擊者利用此漏洞,於目標系統觸發繞過身份驗證。二、存在風險 WhatsApp 存在一個漏洞,允許遠端攻擊者利用此漏洞,於目標系統觸發繞過身份驗證,其影響系統如下:受影響之系統/漏洞描述:WhatsApp for iOS v2.25.21.73 之前的版本WhatsApp Business for iOS v2.25.21.7WhatsApp for Mac v2.25.21.78三、建議改善措施 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://www.whatsapp.com/security/advisories/2025https://www.kjintelligent.com/en/hot_522303.html[Cybersecurity Vulnerability Notice] WhatsApp 存在繞過保安限制漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_522303.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_522303.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維一、摘要 Zoom 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發權限提升及阻斷服務狀況。二、存在風險 Zoom 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發權限提升及阻斷服務狀況,其影響系統如下:受影響之系統/漏洞描述:Zoom Workplace for Windows 6.3.10 之前的版本Zoom Workplace for Windows 6.4.10 之前的版本Zoom Workplace VDI for Windows 6.3.10 之前的版本 (除了 6.1.16 及 6.2.12版本)Zoom Workplace VDI for Windows 6.3.12 之前的版本 (除了 6.2.15 版本)Zoom Rooms for Windows 6.3.10 之前的版本Zoom Rooms for Windows 6.4.5 之前的版本Zoom Rooms Controller for Windows 6.3.10 之前的版本Zoom Rooms Controller for Windows 6.4.5 之前的版本Zoom Meeting SDK for Windows 6.3.10 之前的版本Zoom Meeting SDK for Windows 6.4.10 之前的版本三、建議改善措施 企業及使用者如有上述漏洞版本應儘速更新: 情資報告連結:https://www.zoom.com/en/trust/security-bulletin/zsb-25029/https://www.zoom.com/en/trust/security-bulletin/zsb-25030/資安預警通知】https://www.kjintelligent.com/en/hot_521464.html[Cybersecurity Vulnerability Notice] Zoom 產品存在多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521464.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521464.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_522301.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_522301.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 Microsoft Edge 存在一個漏洞,允許遠端攻擊者利用此漏洞,於目標系統觸發遠端執行任意程式碼。二、存在風險 Microsoft Edge 存在一個漏洞,允許遠端攻擊者利用此漏洞,於目標系統觸發遠端執行任意程式碼,其影響系統如下:受影響之系統/漏洞描述:Microsoft Edge Stable Channel 139.0.3405.125 之前的版本三、建議改善措施 企業及使用者如有上述漏洞版本應儘速更新。請更新至 Microsoft Edge Stable Channel 139.0.3405.125 或之後的版本。 情資報告連結:https://learn.microsoft.com/en-us/deployedge/microsoft-edge-relnotes-security#august-28-2025https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-9478https://www.kjintelligent.com/en/hot_522300.html[Cybersecurity Vulnerability Notice] Microsoft Edge 存在遠端執行程式碼漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_522300.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_522300.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521456.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521456.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521867.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521867.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_522299.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_522299.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521871.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521871.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 Ubuntu Linux 核心存在多個漏洞,允許攻擊者利用這些漏洞,於目標系統觸發權限提升、阻斷服務狀況、遠端執行程式碼、敏感資料洩露及繞過身份驗證。二、存在風險 Ubuntu Linux 核心存在多個漏洞,允許攻擊者利用這些漏洞,於目標系統觸發權限提升、阻斷服務狀況、遠端執行程式碼、敏感資料洩露及繞過身份驗證,受影響之系統或技術如下:受影響之系統/漏洞描述:Ubuntu 14.04 LTSUbuntu 16.04 LTSUbuntu 18.04 LTSUbuntu 20.04 LTSUbuntu 22.04 LTSUbuntu 24.04 LTSUbuntu 25.04三、建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://ubuntu.com/security/notices/USN-7671-3https://ubuntu.com/security/notices/USN-7681-2https://ubuntu.com/security/notices/USN-7681-3https://ubuntu.com/security/notices/USN-7682-2https://ubuntu.com/security/notices/USN-7682-3https://ubuntu.com/security/notices/USN-7682-4https://ubuntu.com/security/notices/USN-7682-5https://ubuntu.com/security/notices/USN-7683-1https://ubuntu.com/security/notices/USN-7683-2https://ubuntu.com/security/notices/USN-7683-3https://ubuntu.com/security/notices/USN-7684-1https://ubuntu.com/security/notices/USN-7684-2https://ubuntu.com/security/notices/USN-7684-3https://ubuntu.com/security/notices/USN-7685-1https://ubuntu.com/security/notices/USN-7685-2https://ubuntu.com/security/notices/USN-7685-3https://ubuntu.com/security/notices/USN-7685-4https://ubuntu.com/security/notices/USN-7685-5https://ubuntu.com/security/notices/USN-7686-1https://ubuntu.com/security/notices/USN-7699-1https://ubuntu.com/security/notices/USN-7699-2https://ubuntu.com/security/notices/USN-7701-1https://ubuntu.com/security/notices/USN-7701-2https://ubuntu.com/security/notices/USN-7701-3https://ubuntu.com/security/notices/USN-7703-1https://ubuntu.com/security/notices/USN-7703-2https://ubuntu.com/security/notices/USN-7704-1https://ubuntu.com/security/notices/USN-7704-2https://ubuntu.com/security/notices/USN-7704-3https://www.kjintelligent.com/en/hot_521865.html[Cybersecurity Vulnerability Notice] Ubuntu Linux 存在核心多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521865.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521865.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 SUSE Linux 內核存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發洩露敏感資料、權限提升、繞過身份驗證遠端執行程式碼、阻斷服務狀況及資料篡改。二、存在風險 SUSE Linux 內核存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發洩露敏感資料、權限提升、繞過身份驗證遠端執行程式碼、阻斷服務狀況及資料篡改,受影響之系統或技術如下:受影響之系統/漏洞描述:Confidential Computing Module 15-SP6openSUSE Leap 15.3SUSE Linux Enterprise High Performance Computing 15 SP3SUSE Linux Enterprise Live Patching 15-SP3SUSE Linux Enterprise Micro 5.1SUSE Linux Enterprise Micro 5.2SUSE Linux Enterprise Server 15 SP3openSUSE Leap 15.4openSUSE Leap 15.5openSUSE Leap 15.6SUSE Enterprise Storage 7.1SUSE Linux Enterprise High Availability Extension 15 SP3SUSE Linux Enterprise High Availability Extension 15 SP4SUSE Linux Enterprise High Performance Computing 12 SP5SUSE Linux Enterprise High Performance Computing 15 SP4SUSE Linux Enterprise High Performance Computing 15 SP5SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5SUSE Linux Enterprise High Performance Computing LTSS 15 SP4SUSE Linux Enterprise High Performance Computing LTSS 15 SP5SUSE Linux Enterprise Live Patching 12-SP5SUSE Linux Enterprise Live Patching 15-SP4SUSE Linux Enterprise Live Patching 15-SP5SUSE Linux Enterprise Live Patching 15-SP6SUSE Linux Enterprise Live Patching 15-SP7SUSE Linux Enterprise Micro 5.3SUSE Linux Enterprise Micro 5.4SUSE Linux Enterprise Micro 5.5SUSE Linux Enterprise Micro for Rancher 5.2SUSE Linux Enterprise Micro for Rancher 5.3SUSE Linux Enterprise Micro for Rancher 5.4SUSE Linux Enterprise Real Time 15 SP4SUSE Linux Enterprise Real Time 15 SP5SUSE Linux Enterprise Real Time 15 SP6SUSE Linux Enterprise Real Time 15 SP7SUSE Linux Enterprise Server 11 SP4SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORESUSE Linux Enterprise Server 12 SP5SUSE Linux Enterprise Server 12 SP5 LTSSSUSE Linux Enterprise Server 12 SP5 LTSS Extended SecuritySUSE Linux Enterprise Server 15 SP3 Business Critical LinuxSUSE Linux Enterprise Server 15 SP3 LTSSSUSE Linux Enterprise Server 15 SP4SUSE Linux Enterprise Server 15 SP4 LTSSSUSE Linux Enterprise Server 15 SP5SUSE Linux Enterprise Server 15 SP5 LTSSSUSE Linux Enterprise Server 15 SP6SUSE Linux Enterprise Server 15 SP7SUSE Linux Enterprise Server for SAP Applications 12 SP5SUSE Linux Enterprise Server for SAP Applications 15 SP3SUSE Linux Enterprise Server for SAP Applications 15 SP4SUSE Linux Enterprise Server for SAP Applications 15 SP5SUSE Linux Enterprise Server for SAP Applications 15 SP6SUSE Linux Enterprise Server for SAP Applications 15 SP7SUSE Manager Proxy 4.2SUSE Manager Proxy 4.3SUSE Manager Proxy 4.3 LTSSUSE Manager Retail Branch Server 4.2SUSE Manager Retail Branch Server 4.3SUSE Manager Retail Branch Server 4.3 LTSSUSE Manager Server 4.2SUSE Manager Server 4.3SUSE Manager Server 4.3 LTSSUSE Real Time Module 15-SP7 三、建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://www.suse.com/support/update/announcement/2025/suse-su-202502588-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502601-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502602-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502604-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502606-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502607-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502608-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502610-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502611-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502618-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502619-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502626-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502627-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502632-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502637-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502638-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502647-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502648-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502652-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502671-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502673-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502676-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502687-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502688-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502691-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502689-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502693-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502697-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502698-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502699-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502704-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502707-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502708-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502710-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502821-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502820-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502823-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502827-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502830-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502832-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502833-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502834-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502844-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502846-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502848-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502849-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502850-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502851-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502852-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502853-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502854-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502857-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502858-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502859-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502860-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502871-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502873-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502878-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502876-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502883-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502884-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502875-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502894-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502902-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502897-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502908-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502909-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502911-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502917-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502918-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502922-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502923-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502926-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502930-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502932-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502933-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502934-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502936-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502937-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502938-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502942-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502943-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502944-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502945-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502955-1/https://www.kjintelligent.com/en/hot_521863.html[Cybersecurity Vulnerability Notice] SUSE Linux 內核存在多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521863.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521863.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 Microsoft Edge 存在漏洞,允許遠端攻擊者可利用此漏洞,於目標系統觸發遠端執行任意程式碼。二、存在風險 Microsoft Edge 存在漏洞,允許遠端攻擊者可利用此漏洞,於目標系統觸發遠端執行任意程式碼,受影響之系統或技術如下:受影響之系統/漏洞描述:Microsoft Edge Stable Channel 139.0.3405.111 之前的版本Microsoft Edge Extended Stable Channel 138.0.3351.144 之前的版本 三、建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://learn.microsoft.com/en-us/deployedge/microsoft-edge-relnotes-security#august-21-2025https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-9132https://www.kjintelligent.com/en/hot_521864.html[Cybersecurity Vulnerability Notice] Microsoft Edge 存在遠端執行程式碼漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521864.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521864.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_522225.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_522225.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521868.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521868.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521733.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521733.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 RedHat Linux核心存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發彷冒、遠端執行任意程式碼、洩露敏感資料、權限提升及繞過身份驗證。二、存在風險 RedHat Linux核心存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發彷冒、遠端執行任意程式碼、洩露敏感資料、權限提升及繞過身份驗證,受影響之系統或技術如下:受影響之系統或技術描述:Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 10.0 aarch64Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.4 aarch64Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.6 aarch64Red Hat CodeReady Linux Builder for ARM 64 10 aarch64Red Hat CodeReady Linux Builder for ARM 64 9 aarch64Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 10.0 s390xRed Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.4 s390xRed Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.6 s390xRed Hat CodeReady Linux Builder for IBM z Systems 10 s390xRed Hat CodeReady Linux Builder for IBM z Systems 9 s390xRed Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 10.0 ppc64leRed Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.4 ppc64leRed Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.6 ppc64leRed Hat CodeReady Linux Builder for Power, little endian 10 ppc64leRed Hat CodeReady Linux Builder for Power, little endian 9 ppc64leRed Hat CodeReady Linux Builder for x86_64 - Extended Update Support 10.0 x86_64Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.4 x86_64Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.6 x86_64Red Hat CodeReady Linux Builder for x86_64 10 x86_64Red Hat CodeReady Linux Builder for x86_64 9 x86_64Red Hat Enterprise Linux for ARM 64 - 4 years of updates 10.0 aarch64Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.0 aarch64Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.6 aarch64Red Hat Enterprise Linux for ARM 64 - Extended Update Support 10.0 aarch64Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.6 aarch64Red Hat Enterprise Linux for ARM 64 10 aarch64Red Hat Enterprise Linux for ARM 64 9 aarch64Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 10.0 s390xRed Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.0 s390xRed Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390xRed Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.6 s390xRed Hat Enterprise Linux for IBM z Systems - Extended Update Support 10.0 s390xRed Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390xRed Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.6 s390xRed Hat Enterprise Linux for IBM z Systems 10 s390xRed Hat Enterprise Linux for IBM z Systems 9 s390xRed Hat Enterprise Linux for Power, little endian - 4 years of support 10.0 ppc64leRed Hat Enterprise Linux for Power, little endian - Extended Update Support 10.0 ppc64leRed Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64leRed Hat Enterprise Linux for Power, little endian - Extended Update Support 9.6 ppc64leRed Hat Enterprise Linux for Power, little endian 10 ppc64leRed Hat Enterprise Linux for Power, little endian 9 ppc64leRed Hat Enterprise Linux for Real Time 8 x86_64Red Hat Enterprise Linux for Real Time for NFV 8 x86_64Red Hat Enterprise Linux for x86_64 - 4 years of updates 10.0 x86_64Red Hat Enterprise Linux for x86_64 - Extended Update Support 10.0 x86_64Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.6 x86_64Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.4 x86_64Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.8 x86_64Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8 x86_64Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.6 x86_64Red Hat Enterprise Linux for x86_64 10 x86_64Red Hat Enterprise Linux for x86_64 9 x86_64Red Hat Enterprise Linux Server - AUS 8.2 x86_64Red Hat Enterprise Linux Server - AUS 8.4 x86_64Red Hat Enterprise Linux Server - AUS 9.4 x86_64Red Hat Enterprise Linux Server - AUS 9.6 x86_64Red Hat Enterprise Linux Server - TUS 8.8 x86_64Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64leRed Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64leRed Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64leRed Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.6 ppc64leRed Hat OpenShift Container Platform 4.14 for RHEL 8 x86_64Red Hat OpenShift Container Platform 4.14 for RHEL 9 x86_64Red Hat OpenShift Container Platform 4.18 for RHEL 8 x86_64Red Hat OpenShift Container Platform 4.18 for RHEL 9 x86_64Red Hat OpenShift Container Platform for ARM 64 4.14 for RHEL 8 aarch64Red Hat OpenShift Container Platform for ARM 64 4.14 for RHEL 9 aarch64Red Hat OpenShift Container Platform for ARM 64 4.18 for RHEL 8 aarch64Red Hat OpenShift Container Platform for ARM 64 4.18 for RHEL 9 aarch64Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.14 for RHEL 8 s390xRed Hat OpenShift Container Platform for IBM Z and LinuxONE 4.14 for RHEL 9 s390xRed Hat OpenShift Container Platform for IBM Z and LinuxONE 4.18 for RHEL 8 s390xRed Hat OpenShift Container Platform for IBM Z and LinuxONE 4.18 for RHEL 9 s390xRed Hat OpenShift Container Platform for Power 4.14 for RHEL 8 ppc64leRed Hat OpenShift Container Platform for Power 4.14 for RHEL 9 ppc64leRed Hat OpenShift Container Platform for Power 4.18 for RHEL 8 ppc64leRed Hat OpenShift Container Platform for Power 4.18 for RHEL 9 ppc64le三、存在風險: 盡速更新受影響之系統或技術、解決方案、漏洞識別碼及相關連結。 情資報告連結:https://access.redhat.com/errata/RHSA-2025:11669https://access.redhat.com/errata/RHSA-2025:11677https://access.redhat.com/errata/RHSA-2025:11678https://access.redhat.com/errata/RHSA-2025:12525https://access.redhat.com/errata/RHSA-2025:12623https://access.redhat.com/errata/RHSA-2025:12662https://access.redhat.com/errata/RHSA-2025:12746https://access.redhat.com/errata/RHSA-2025:12753https://access.redhat.com/errata/RHSA-2025:12976https://access.redhat.com/errata/RHSA-2025:12977https://access.redhat.com/errata/RHSA-2025:13029https://access.redhat.com/errata/RHSA-2025:13030https://access.redhat.com/errata/RHSA-2025:13061https://access.redhat.com/errata/RHSA-2025:13120https://access.redhat.com/errata/RHSA-2025:13135https://www.kjintelligent.com/en/hot_520920.html[Cybersecurity Vulnerability Notice] RedHat Linux核心多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_520920.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_520920.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521870.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521870.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521734.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521734.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 Mozilla 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、遠端執行任意程式碼、仿冒、跨網站指令碼及繞過身份驗證。二、存在風險 Mozilla 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、遠端執行任意程式碼、仿冒、跨網站指令碼及繞過身份驗證,受影響之系統或技術如下:受影響之系統/漏洞描述:Firefox 142Firefox ESR 115.27Firefox ESR 128.14Firefox ESR 140.2Firefox for iOS 142Focus for iOS 142Thunderbird 128.14Thunderbird 140.2Thunderbird 142 三、建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://www.mozilla.org/en-US/security/advisories/mfsa2025-64https://www.mozilla.org/en-US/security/advisories/mfsa2025-65https://www.mozilla.org/en-US/security/advisories/mfsa2025-66https://www.mozilla.org/en-US/security/advisories/mfsa2025-67https://www.mozilla.org/en-US/security/advisories/mfsa2025-68https://www.mozilla.org/en-US/security/advisories/mfsa2025-69https://www.mozilla.org/en-US/security/advisories/mfsa2025-70https://www.mozilla.org/en-US/security/advisories/mfsa2025-71https://www.mozilla.org/en-US/security/advisories/mfsa2025-72https://www.kjintelligent.com/en/hot_521732.html[Cybersecurity Vulnerability Notice] Mozilla 產品存在多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521732.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521732.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521869.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521869.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521731.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521731.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 SUSE Linux 核心存在多個安全漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發彷冒、遠端執行任意程式碼、洩露敏感資料、阻斷服務狀況、資料篡改、權限提升及繞過身份驗證。二、存在風險 SUSE Linux 核心存在多個安全漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發彷冒、遠端執行任意程式碼、洩露敏感資料、阻斷服務狀況、資料篡改、權限提升及繞過身份驗證,其影響系統或版本如下:受影響之系統/漏洞描述:Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 10.0 aarch64Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.4 aarch64Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.6 aarch64Red Hat CodeReady Linux Builder for ARM 64 10 aarch64Red Hat CodeReady Linux Builder for ARM 64 9 aarch64Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 10.0 s390xRed Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.4 s390xRed Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.6 s390xRed Hat CodeReady Linux Builder for IBM z Systems 10 s390xRed Hat CodeReady Linux Builder for IBM z Systems 9 s390xRed Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 10.0 ppc64leRed Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.4 ppc64leRed Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.6 ppc64leRed Hat CodeReady Linux Builder for Power, little endian 10 ppc64leRed Hat CodeReady Linux Builder for Power, little endian 9 ppc64leRed Hat CodeReady Linux Builder for x86_64 - Extended Update Support 10.0 x86_64Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.4 x86_64Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.6 x86_64Red Hat CodeReady Linux Builder for x86_64 10 x86_64Red Hat CodeReady Linux Builder for x86_64 9 x86_64Red Hat Enterprise Linux for ARM 64 - 4 years of updates 10.0 aarch64Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.0 aarch64Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.6 aarch64Red Hat Enterprise Linux for ARM 64 - Extended Update Support 10.0 aarch64Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.6 aarch64Red Hat Enterprise Linux for ARM 64 10 aarch64Red Hat Enterprise Linux for ARM 64 9 aarch64Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 10.0 s390xRed Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.0 s390xRed Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390xRed Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.6 s390xRed Hat Enterprise Linux for IBM z Systems - Extended Update Support 10.0 s390xRed Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390xRed Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.6 s390xRed Hat Enterprise Linux for IBM z Systems 10 s390xRed Hat Enterprise Linux for IBM z Systems 9 s390xRed Hat Enterprise Linux for Power, little endian - 4 years of support 10.0 ppc64leRed Hat Enterprise Linux for Power, little endian - Extended Update Support 10.0 ppc64leRed Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64leRed Hat Enterprise Linux for Power, little endian - Extended Update Support 9.6 ppc64leRed Hat Enterprise Linux for Power, little endian 10 ppc64leRed Hat Enterprise Linux for Power, little endian 9 ppc64leRed Hat Enterprise Linux for Real Time 8 x86_64Red Hat Enterprise Linux for Real Time for NFV 8 x86_64Red Hat Enterprise Linux for x86_64 - 4 years of updates 10.0 x86_64Red Hat Enterprise Linux for x86_64 - Extended Update Support 10.0 x86_64Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.6 x86_64Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.4 x86_64Red Hat Enterprise Linux for x86_64 - Extended Update Support Extension 8.8 x86_64Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8 x86_64Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.6 x86_64Red Hat Enterprise Linux for x86_64 10 x86_64Red Hat Enterprise Linux for x86_64 9 x86_64Red Hat Enterprise Linux Server - AUS 8.2 x86_64Red Hat Enterprise Linux Server - AUS 8.4 x86_64Red Hat Enterprise Linux Server - AUS 9.4 x86_64Red Hat Enterprise Linux Server - AUS 9.6 x86_64Red Hat Enterprise Linux Server - TUS 8.8 x86_64Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64leRed Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64leRed Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64leRed Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.6 ppc64leRed Hat OpenShift Container Platform 4.14 for RHEL 8 x86_64Red Hat OpenShift Container Platform 4.14 for RHEL 9 x86_64Red Hat OpenShift Container Platform 4.18 for RHEL 8 x86_64Red Hat OpenShift Container Platform 4.18 for RHEL 9 x86_64Red Hat OpenShift Container Platform for ARM 64 4.14 for RHEL 8 aarch64Red Hat OpenShift Container Platform for ARM 64 4.14 for RHEL 9 aarch64Red Hat OpenShift Container Platform for ARM 64 4.18 for RHEL 8 aarch64Red Hat OpenShift Container Platform for ARM 64 4.18 for RHEL 9 aarch64Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.14 for RHEL 8 s390xRed Hat OpenShift Container Platform for IBM Z and LinuxONE 4.14 for RHEL 9 s390xRed Hat OpenShift Container Platform for IBM Z and LinuxONE 4.18 for RHEL 8 s390xRed Hat OpenShift Container Platform for IBM Z and LinuxONE 4.18 for RHEL 9 s390xRed Hat OpenShift Container Platform for Power 4.14 for RHEL 8 ppc64leRed Hat OpenShift Container Platform for Power 4.14 for RHEL 9 ppc64leRed Hat OpenShift Container Platform for Power 4.18 for RHEL 8 ppc64leRed Hat OpenShift Container Platform for Power 4.18 for RHEL 9 ppc64le三、建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://www.suse.com/support/update/announcement/2025/suse-su-202502588-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502601-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502602-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502604-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502606-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502607-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502608-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502610-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502611-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502618-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502619-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502626-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502627-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502632-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502637-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502638-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502647-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502648-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502652-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502671-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502673-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502676-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502687-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502688-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502691-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502689-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502693-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502697-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502698-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502699-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502704-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502707-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502708-1/https://www.suse.com/support/update/announcement/2025/suse-su-202502710-1/https://www.kjintelligent.com/en/hot_520921.html[Cybersecurity Vulnerability Notice] SUSE Linux 內核多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_520921.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_520921.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521466.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521466.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521465.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521465.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521467.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521467.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【出處:台灣電腦緊急應變小組 TWCert】【CVE-2025-54948】Trend Micro Apex One OS Command Injection Vulnerability (CVSS v3.1: 9.4)【是否遭勒索軟體利用:未知】Trend Micro Apex One本地部署版本存在作業系統指令注入漏洞,未經身分鑑別之遠端攻擊者可於管理主控台上傳惡意程式碼並達成遠端執行任意程式碼。【CVE-2025-43300】Apple iOS, iPadOS, and macOS Out-of-Bounds Write Vulnerability (CVSS v3.1: 8.8)【是否遭勒索軟體利用:未知】Apple iOS、iPadOS和macOS的Image I/O架構中存在越界寫入漏洞。◎建議措施:【CVE-2025-54948】官方已針對漏洞釋出修復更新,請更新至相關版本https://success.trendmicro.com/en-US/solution/KA-0020652【CVE-2025-43300】官方已針對漏洞釋出修復更新,請更新至相關版本https://support.apple.com/en-us/124925https://support.apple.com/en-us/124926https://support.apple.com/en-us/124927https://support.apple.com/en-us/124928https://support.apple.com/en-us/124929◎相關IOC資訊:◎備註:◎參考資料:【CVE-2025-54948】1.https://nvd.nist.gov/vuln/detail/cve-2025-549482.https://success.trendmicro.com/en-US/solution/KA-0020652【CVE-2025-43300】1.https://nvd.nist.gov/vuln/detail/cve-2025-433002.https://support.apple.com/en-us/1249253.https://support.apple.com/en-us/1249264.https://support.apple.com/en-us/1249275.https://support.apple.com/en-us/1249286.https://support.apple.com/en-us/124929https://www.kjintelligent.com/en/hot_521730.html[TWCERT 分享資安情資] CISA新增2個已知遭駭客利用之漏洞至KEV目錄(2025/08/18-2025/08/24)2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521730.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521730.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發資料篡改、阻斷服務狀況及遠端執行任意程式碼。 二、存在風險 Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發資料篡改、阻斷服務狀況及遠端執行任意程式碼,受影響之系統或技術如下: 受影響之系統/漏洞描述:Microsoft Edge 139.0.3405.102 之前的版本三、建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新:請更新至 139.0.3405.102 或之後版本。 情資報告連結:https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-8879https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-8880https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-8881https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-8882https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-8901https://www.kjintelligent.com/en/hot_521469.html[Cybersecurity Vulnerability Notice] Microsoft Edge 存在多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521469.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521469.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521474.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521474.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 Ubuntu Linux 核心存在多個漏洞,允許攻擊者利用這些漏洞,於目標系統觸發權限提升、阻斷服務狀況、遠端執行程式碼、敏感資料洩露及繞過身份驗證。二、存在風險 Ubuntu Linux 核心存在多個漏洞,允許攻擊者利用這些漏洞,於目標系統觸發權限提升、阻斷服務狀況、遠端執行程式碼、敏感資料洩露及繞過身份驗證,受影響之系統或技術如下:受影響之系統或技術描述:Ubuntu 14.04 LTSUbuntu 16.04 LTSUbuntu 20.04 LTSUbuntu 22.04 LTSUbuntu 24.04 LTSUbuntu 25.04三、存在風險: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://ubuntu.com/security/notices/USN-7671-3https://ubuntu.com/security/notices/USN-7681-2https://ubuntu.com/security/notices/USN-7682-2https://ubuntu.com/security/notices/USN-7682-3https://ubuntu.com/security/notices/USN-7682-4https://ubuntu.com/security/notices/USN-7683-1https://ubuntu.com/security/notices/USN-7683-2https://ubuntu.com/security/notices/USN-7683-3https://ubuntu.com/security/notices/USN-7684-1https://ubuntu.com/security/notices/USN-7684-2https://ubuntu.com/security/notices/USN-7684-3https://ubuntu.com/security/notices/USN-7685-1https://ubuntu.com/security/notices/USN-7685-2https://ubuntu.com/security/notices/USN-7685-3https://ubuntu.com/security/notices/USN-7685-4https://ubuntu.com/security/notices/USN-7686-1https://www.kjintelligent.com/en/hot_521099.html[Cybersecurity Vulnerability Notice] Ubuntu Linux 核心存在多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521099.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521099.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521472.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521472.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521463.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521463.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521470.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521470.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521174.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521174.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521468.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521468.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521473.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521473.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_520928.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_520928.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發遠端執行任意程式碼及阻斷服務狀況。二、存在風險 Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發遠端執行任意程式碼及阻斷服務狀況,其影響系統或版本如下:受影響之系統/漏洞描述:Microsoft Edge 138.0.3351.95 之前的版本 三、建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請更新至 138.0.3351.95 或之後版本。 情資報告連結:https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#july-16-2025https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-6558https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-7656https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-7657https://www.kjintelligent.com/en/hot_519820.html[Cybersecurity Vulnerability Notice] Microsoft Edge 存在多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_519820.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_519820.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 Trend Micro 產品存在多個漏洞,允許攻擊者利用這些漏洞,於目標系統觸發遠端執行程式碼。二、存在風險 於 Trend Micro 產品發現多個漏洞。攻擊者可利用這些漏洞,於目標系統觸發遠端執行程式碼,其影響系統如下:受影響之系統/漏洞描述:Trend Micro Apex One - 2019 (On-prem)Trend Micro Apex One - Management Server 14039 及之前的版本Trend Micro Apex One as a Service (SaaS)Trend Vision One™ Endpoint Security - Standard Endpoint Protection三、建議改善措施 企業及使用者如有上述漏洞版本應儘速更新:請將Trend Micro Apex One (on-prem) 更新至FixTool_Aug2025或更高版本。 情資報告連結:https://success.trendmicro.com/en-US/solution/KA-0020652https://www.kjintelligent.com/en/hot_520919.html[Cybersecurity Vulnerability Notice] Trend Micro 產品多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_520919.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_520919.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521173.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521173.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【出處:台灣電腦緊急應變小組 TWCert】微軟針對旗下產品Exchange Server發布重大資安漏洞公告(CVE-2025-53786,CVSS:8.0),此漏洞允許取得管理者權限的攻擊者,針對雲地混合部署的環境提升權限。目前雲端環境的日誌監控工具無法紀錄此漏洞的惡意活動。該漏洞相關PoC已於近日在美國黑帽大會 (Black Hat) 公開展示,可能加速攻擊者的後續利用,Microsoft 已釋出安全性更新與提供暫時緩解措施,建議儘速採取暫時緩解措施,以防止針對此漏洞可能的攻擊發生。◎建議措施:根據官方網站釋出解決方式進行修補:https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53786◎相關IOC資訊:◎備註:◎參考資料:1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-537862. https://www.cisa.gov/news-events/alerts/2025/08/06/microsoft-releases-guidance-high-severity-vulnerability-cve-2025-53786-hybrid-exchange-deployments3. https://nvd.nist.gov/vuln/detail/CVE-2025-53786https://www.kjintelligent.com/en/hot_520917.html[TWCERT 分享資安情資] Microsoft Exchange Server 存在重大資安漏洞(CVE-2025-53786)2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_520917.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_520917.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521172.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521172.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_520918.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_520918.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【出處:台灣電腦緊急應變小組 TWCert】【CVE-2020-25078】D-Link DCS-2530L and DCS-2670L Devices Unspecified Vulnerability (CVSS v3.1: 7.5)【是否遭勒索軟體利用:未知】D-Link DCS-2530L和DCS-2670L裝置存在一個未具體說明的漏洞,可能導致遠端管理員密碼洩露。【CVE-2020-25079】D-Link DCS-2530L and DCS-2670L Command Injection Vulnerability (CVSS v3.1: 8.8)【是否遭勒索軟體利用:未知】D-Link DCS-2530L和DCS-2670L裝置在cgi-bin/ddns_enc.cgi存在指令注入漏洞。【CVE-2022-40799】D-Link DNR-322L Download of Code Without Integrity Check Vulnerability (CVSS v3.1:8.8)【是否遭勒索軟體利用:未知】D-Link DNR-322L存在下載程式碼時未進行完整性檢查漏洞,可能允許已驗證的攻擊者在裝置上執行作業系統層級的指令。◎建議措施:【CVE-2020-25078】受影響的產品可能已達到產品生命週期終點(EoL)和/或終止服務(EoS)。建議使用者停止使用這些產品。【CVE-2020-25079】受影響的產品可能已達到產品生命週期終點(EoL)和/或終止服務(EoS)。建議使用者停止使用這些產品。【CVE-2022-40799】受影響的產品可能已達到產品生命週期終點(EoL)和/或終止服務(EoS)。建議使用者停止使用這些產品。◎相關IOC資訊:◎備註:◎參考資料:【CVE-2020-25078】1.https://nvd.nist.gov/vuln/detail/cve-2020-250782.https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10180【CVE-2020-25079】1.https://nvd.nist.gov/vuln/detail/cve-2020-250792.https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10180【CVE-2022-40799】1.https://nvd.nist.gov/vuln/detail/cve-2022-407992.https://gitlab.com/rtfmkiesel/cve-2022-40799https://www.kjintelligent.com/en/hot_521101.html[TWCERT 分享資安情資] CISA新增3個已知遭駭客利用之漏洞至KEV目錄(2025/08/04-2025/08/10)2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521101.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_521101.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_520836.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_520836.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_520833.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_520833.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_520835.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_520835.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_520834.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_520834.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_520510.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_520510.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_520511.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_520511.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 Sophos 防火牆存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發遠端執行任意程式碼。二、存在風險 Sophos 防火牆存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發遠端執行任意程式碼,其影響系統或版本如下:受影響之系統/漏洞描述:CVE-2024-13974, CVE-2024-13973影響版本:Sophos Firewall v21.0 GA (21.0.0) and olderCVE-2025-6704, CVE-2025-7624, CVE-2025-7382影響版本:Sophos Firewall v21.5 GA (21.5.0) and older 三、建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://www.sophos.com/en-us/security-advisories/sophos-sa-20250721-sfos-rcehttps://www.kjintelligent.com/en/hot_519822.html[Cybersecurity Vulnerability Notice] Sophos 防火牆存在多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_519822.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_519822.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 Google Chrome 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發遠端執行任意程式碼及阻斷服務狀況。二、存在風險 Google Chrome 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發遠端執行任意程式碼及阻斷服務狀況,其影響系統或版本如下:受影響之系統/漏洞描述:Google Chrome prior to 138.0.7204.157 (Linux) 之前的版本Google Chrome 138.0.7204.157/.158 (Mac) 之前的版本Google Chrome 138.0.7204.157/.158 (Windows) 之前的版本 三、建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請更新至 138.0.7204.157 (Linux) 或之後版本。請更新至 138.0.7204.157/.158 (Mac) 或之後版本。請更新至 138.0.7204.157/.158 (Windows) 或之後版本。 情資報告連結:https://chromereleases.googleblog.com/2025/07/stable-channel-update-for-desktop_15.htmlhttps://www.kjintelligent.com/en/hot_519819.html[Cybersecurity Vulnerability Notice] Google Chrome 存在多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_519819.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_519819.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_519817.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_519817.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 IBM WebSphere 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況及繞過身份驗證。二、存在風險 IBM WebSphere 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況及繞過身份驗證,其影響系統或版本如下:受影響之系統/漏洞描述:IBM WebSphere Application Server 9.0IBM WebSphere Application Server Liberty 17.0.0.3-25.0.0.7 三、建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://www.ibm.com/support/pages/node/7239856https://www.ibm.com/support/pages/node/7239955https://www.kjintelligent.com/en/hot_519823.html[Cybersecurity Vulnerability Notice] IBM WebSphere 產品存在多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_519823.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_519823.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_519866.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_519866.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_519818.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_519818.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【出處:台灣電腦緊急應變小組 TWCert】近日Sophos發布關於 Intercept X for Windows 的資安公告,指出旗下該產品存在2個重大資安漏洞,並提出修補版本,呼籲用戶儘快檢查系統是否套用相關更新。【CVE-2024-13972,CVSS:8.8】此漏洞存在於Sophos Intercept X for Windows 的更新程式中,與登錄檔權限設定有關。攻擊者可能在產品升級期間,透過本機使用者取得系統層級的權限。【CVE-2025-7433,CVSS:8.8】在Sophos Intercept X for Windows 的裝置加密元件中存在本機權限提升漏洞,此漏洞允許攻擊者執行任意程式碼。◎建議措施:根據官方網站釋出解決方式進行修補:https://www.sophos.com/en-us/security-advisories/sophos-sa-20250717-cix-lpe◎相關IOC資訊:◎備註:◎參考資料:1. https://www.sophos.com/en-us/security-advisories/sophos-sa-20250717-cix-lpe2. https://www.cve.org/CVERecord?id=CVE-2024-139723. https://www.cve.org/CVERecord?id=CVE-2025-7433https://www.kjintelligent.com/en/hot_519724.html[TWCERT 分享資安情資] Sophos 旗下Intercept X for Windows 存在2個重大資安漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_519724.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_519724.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 Zoom 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發繞過身份驗證、阻斷服務狀況及洩露敏感資料。二、存在風險 Zoom 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發繞過身份驗證、阻斷服務狀況及洩露敏感資料,其影響系統或版本如下:受影響之系統/漏洞描述:Zoom Meeting SDK for Android 6.4.5 之前的版本Zoom Meeting SDK for iOS 6.4.5 之前的版本Zoom Meeting SDK for Linux 6.4.13 之前的版本Zoom Meeting SDK for Linux 6.4.5 之前的版本Zoom Meeting SDK for macOS 6.4.5 之前的版本Zoom Meeting SDK for Windows 6.4.0 之前的版本Zoom Meeting SDK for Windows 6.4.5 之前的版本Zoom Rooms Controller for Android 6.4.5 之前的版本Zoom Rooms Controller for iPad 6.4.5 之前的版本Zoom Rooms Controller for Linux 6.4.5 之前的版本Zoom Rooms Controller for macOS 6.4.5 之前的版本Zoom Rooms Controller for Windows 6.4.0 之前的版本Zoom Rooms Controller for Windows 6.4.5 之前的版本Zoom Rooms Client for Android 6.4.5 之前的版本Zoom Rooms Client for iPad 6.4.5 之前的版本Zoom Rooms Client for macOS 6.4.5 之前的版本Zoom Rooms Client for Windows 6.4.0 之前的版本Zoom Rooms Client for Windows 6.4.5 之前的版本Zoom Workplace VDI Client for Windows 6.3.10 之前的版本 (除了 6.1.7 及 6.2.15 版本)Zoom Workplace VDI Client for Windows 6.3.12 之前的版本 (除了 6.2.15 版本)Zoom Workplace App for Android 6.4.5 之前的版本Zoom Workplace Desktop App for Linux 6.4.13 之前的版本Zoom Workplace Desktop App for Linux 6.4.5 之前的版本Zoom Workplace Desktop App for Windows 6.4.0 之前的版本Zoom Workplace Desktop App for Windows 6.4.5 之前的版本Zoom Workplace App for iOS 6.4.5 之前的版本Zoom Workplace Desktop App for macOS 6.4.5 之前的版本 三、建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新。 情資報告連結:https://www.zoom.com/en/trust/security-bulletin/zsb-25023https://www.zoom.com/en/trust/security-bulletin/zsb-25024https://www.zoom.com/en/trust/security-bulletin/zsb-25025https://www.zoom.com/en/trust/security-bulletin/zsb-25026https://www.zoom.com/en/trust/security-bulletin/zsb-25027https://www.zoom.com/en/trust/security-bulletin/zsb-25028https://www.kjintelligent.com/en/hot_519375.html[Cybersecurity Vulnerability Notice] Zoom 產品存在多個漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_519375.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_519375.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_519821.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_519821.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_519815.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_519815.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【出處:台灣電腦緊急應變小組 TWCert】【CVE-2025-47812】Wing FTP Server Improper Neutralization of Null Byte or NUL Character Vulnerability (CVSS v3.1: 10.0)【是否遭勒索軟體利用:未知】Wing FTP Server存在對空位元組或NUL字元處理不當漏洞,可能允許將任意Lua程式碼注入使用者工作階段檔案。攻擊者可藉此執行任意系統指令,並以FTP服務的權限執行(預設為root或SYSTEM權限)。【CVE-2025-25257】Fortinet FortiWeb SQL Injection Vulnerability (CVSS v3.1: 9.8)【是否遭勒索軟體利用:未知】Fortinet FortiWeb存在SQL注入漏洞,可能允許未經驗證的攻擊者透過特製的HTTP或HTTPS請求執行未經授權的SQL程式碼或指令。【CVE-2025-53770】Microsoft SharePoint Deserialization of Untrusted Data Vulnerability (CVSS v3.1: 9.8)【是否遭勒索軟體利用:未知】本地端部署的Microsoft SharePoint Server存在未信任資料反序列化漏洞,可能允許未經授權的攻擊者透過網路執行程式碼。◎建議措施:【CVE-2025-47812】對應產品升級至以下版本(或更高)Wing FTP Server 7.4.4【CVE-2025-25257】官方已針對漏洞釋出修復更新,請更新至相關版本https://fortiguard.fortinet.com/psirt/FG-IR-25-151【CVE-2025-53770】官方已針對漏洞釋出修復更新,請更新至相關版本https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53770◎相關IOC資訊:◎備註:◎參考資料:【CVE-2025-47812】1.https://nvd.nist.gov/vuln/detail/cve-2025-478122.https://www.wftpserver.com/serverhistory.htm【CVE-2025-25257】1.https://nvd.nist.gov/vuln/detail/cve-2025-252572.https://fortiguard.fortinet.com/psirt/FG-IR-25-151【CVE-2025-53770】1.https://nvd.nist.gov/vuln/detail/cve-2025-537702.https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53770https://www.kjintelligent.com/en/hot_519816.html[TWCERT 分享資安情資] CISA新增3個已知遭駭客利用之漏洞至KEV目錄(2025/07/14-2025/07/20)2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_519816.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_519816.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】一、摘要 IBM WebSphere Application Server存在一個漏洞,允許遠端攻擊者利用這個漏洞,於目標系統觸發遠端執行任意程式碼。二、存在風險 IBM WebSphere Application Server存在一個漏洞,允許遠端攻擊者利用這個漏洞,於目標系統觸發遠端執行任意程式碼,其影響系統或版本如下:受影響之系統/漏洞描述:IBM WebSphere Application Server 8.5.0.0 ~ 8.5.5.27IBM WebSphere Application Server 9.0.0.0 ~ 9.0.5.24 三、建議改善措施: 企業及使用者如有上述漏洞版本應儘速更新: 請將 IBM WebSphere Application Server 8.5.0.0 ~ 8.5.5.27 更新至8.5.5.28 或更高版本。請將 IBM WebSphere Application Server 9.0.0.0 ~ 9.0.5.24更新至9.0.5.25 或更高版本。 情資報告連結:https://www.ibm.com/support/pages/node/7237967https://www.kjintelligent.com/en/hot_519153.html[Cybersecurity Vulnerability Notice] IBM WebSphere Application Server 存在遠端執行程式碼漏洞2026-05-082027-05-08
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_519153.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_519153.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_519155.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_519155.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_519590.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_519590.html