KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_506219.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_506219.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_506218.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_506218.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_506217.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_506217.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - Google Chrome 存在多個漏洞
Google Chrome 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發遠端執行任意程式碼及阻斷服務狀況,其影響系統或版本如下:
受影響之系統/漏洞描述:
Google Chrome 131.0.6778.139 (Linux) 之前的版本
Google Chrome 131.0.6778.139/.140 (Mac) 之前的版本
Google Chrome 131.0.6778.139/.140 (Windows) 之前的版本
建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新:
請更新至 131.0.6778.139 (Linux) 或之後的版本。
請更新至 131.0.6778.139/.140 (Mac) 或之後的版本。
請更新至 131.0.6778.139/.140 (Windows) 或之後的版本。
情資報告連結:https://chromereleases.googleblog.com/2024/12/stable-channel-update-for-desktop_10.htmlhttps://www.kjintelligent.com/en/hot_506086.html[Cybersecurity Vulnerability Notice] Google Chrome2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_506086.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_506086.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_506084.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_506084.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_506083.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_506083.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - Microsoft Edge 存在多個漏洞
Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況及遠端執行任意程式碼,其影響系統或版本如下:
受影響之系統/漏洞描述:
Microsoft Edge (Stable) 131.0.2903.99 之前的版本
建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新。
請更新至Microsoft Edge (Stable) 131.0.2903.99 或之後的版本。
情資報告連結:https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#december-12-2024https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-12381https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-12382https://www.kjintelligent.com/en/hot_506082.html[Cybersecurity Vulnerability Notice] Microsoft Edge2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_506082.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_506082.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_506072.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_506072.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_505336.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_505336.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - 盛達電業路由器存在多個漏洞
盛達電業路由器存在多個漏洞,其將允許攻擊者利用該漏洞,並導致可直接操作特定功能取得部分設備資訊、修改WiFi SSID、重啟設備、讀取任意網頁資料、存取使用者設定頁面取得明文通行碼以及利用SSH的特定功能注入任意系統指令並執行,其影響系統或版本如下:
受影響之系統/漏洞描述:
Missing Authentication
CVE編號:CVE-2024-11980
漏洞描述:盛達電業部分路由器型號存在Missing Authentication漏洞,其允許未經身分鑑別之遠端攻擊者可直接操作特定功能取得部分設備資訊、修改WiFi SSID及重啟設備。
影響系統/版本:M100、M150、M120N及M500。
Authentication Bypass
CVE編號:CVE-2024-11981
漏洞描述:盛達電業部分路由器型號存在Authentication Bypass漏洞,其將允許未經身分鑑別之遠端攻擊者可利用此漏洞讀取任意網頁資料。
影響系統/版本:M100、M150、M120N及M500。
Plaintext Storage of a Password
CVE編號:CVE-2024-11982
漏洞描述:盛達電業部分路由器型號存在Plaintext Storage of a Password漏洞,其將允許已取得管理者權限的遠端攻擊者可存取使用者設定頁面取得明文通行碼。
影響系統/版本:M100、M150、M120N及M500。
OS Command Injection
CVE編號:CVE-2024-11983
漏洞描述:盛達電業部分路由器型號存在OS Command Injection漏洞,其將允許已取得管理員權限之遠端攻擊者可利用SSH的特定功能注入任意系統指令並執行。
影響系統/版本:M100、M150、M120N及M500。
建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新:
請將韌體為1.04.1.592.x請更新至1.04.1.592.8(含)以後版本。
請將韌體為1.04.1.613.x請更新至1.04.1.613.13(含)以後版本。
請將其餘韌體為1.04.1.x請更新至1.04.1.675(含)以後版本。
情資報告連結:https://www.twcert.org.tw/tw/cp-132-8273-95a07-1.htmlhttps://www.twcert.org.tw/tw/cp-132-8275-50f42-1.htmlhttps://www.twcert.org.tw/tw/cp-132-8277-88b20-1.htmlhttps://www.twcert.org.tw/tw/cp-132-8279-bf67e-1.htmlhttps://www.kjintelligent.com/en/hot_505335.html[Cybersecurity Vulnerability Notice] 盛達電業路由器2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_505335.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_505335.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - SonicWall SMA100 SSL-VPN 存在多個漏洞
SonicWall SMA100 SSL-VPN 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發繞過身份驗證、遠端執行任意程式碼、洩露敏感資料,其影響系統或版本如下:
受影響之系統/漏洞描述:
Path traversal vulnerability – attributed to publicly known Apache HTTP Server vulnerability
CVE編號:CVE-2024-38475
漏洞描述:在 Apache HTTP Server 2.4.59 及更早版本中,mod_rewrite 模組存在輸出轉義不當的問題,允許攻擊者將 URL 映射到伺服器允許提供的檔案系統位置。
影響系統/版本:
SMA 100 Series (SMA 200, 210, 400, 410, 500v) - 10.2.1.13-72sv 或更早之前版本。
SonicWALL SMA100 Heap-based buffer overflow vulnerability
CVE編號:CVE-2024-40763
漏洞描述:SonicWall SMA100 SSLVPN 中因使用 strcpy 函式,故導致存在基於堆(Heap-based)的緩衝區溢出漏洞,其將允許遠端已驗證的攻擊者可以導致堆緩衝區溢出,並可能進一步導致執行任意程式碼的風險。
影響系統/版本:
SMA 100 Series (SMA 200, 210, 400, 410, 500v) - 10.2.1.13-72sv 或更早之前版本。
Stack-based buffer overflow vulnerability
CVE編號:CVE-2024-45318
漏洞描述:SonicWall SMA100 SSLVPN web management interface存在漏洞,其將允許遠端攻擊者進行攻擊,並導致堆疊的緩衝區溢出以及任意執行代碼。
影響系統/版本:
SMA 100 Series (SMA 200, 210, 400, 410, 500v) - 10.2.1.13-72sv 或更早之前版本。
Certificate-based authentication bypass
CVE編號:CVE-2024-45319
漏洞描述:SonicWall SMA100 SSLVPN存在漏洞,其將允許遠端已取得授權之攻擊者在驗證過程中繞過憑證要求。
影響系統/版本:
SMA 100 Series (SMA 200, 210, 400, 410, 500v) - 10.2.1.13-72sv 或更早之前版本。
Insecure randomness
CVE編號:CVE-2024-53702
漏洞描述:SonicWall SMA100 SSLVPN 的備份代碼生成器中使用了加密強度不足的偽隨機數生成器(PRNG),其可能導致攻擊者可以預測其生成的結果,從而潛在地暴露生成的密碼或秘密資訊。
影響系統/版本:
SMA 100 Series (SMA 200, 210, 400, 410, 500v) - 10.2.1.13-72sv 或更早之前版本。
Stack-based buffer overflow vulnerability
CVE編號:CVE-2024-5370
漏洞描述:SonicWall SMA100 SSLVPN採用的Apache模組mod_httprp存在漏洞,其將允許遠端攻擊者針對漏洞進行攻擊,並導致堆疊的緩衝區溢出以及任意執行代碼。
影響系統/版本:
SMA 100 Series (SMA 200, 210, 400, 410, 500v) - 10.2.1.13-72sv 或更早之前版本。
建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新:
請將 SMA 100 Series (SMA 200, 210, 400, 410, 500v) - 10.2.1.13-72sv 更新至 10.2.1.14-75sv 或之後的版本。
情資報告連結:https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0018https://www.kjintelligent.com/en/hot_505334.html[Cybersecurity Vulnerability Notice] SonicWall SMA100 SSL-VPN2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_505334.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_505334.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - Microsoft Edge 存在多個漏洞
Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發彷冒及遠端執行任意程式碼,其影響系統或版本如下:
受影響之系統/漏洞描述:
Microsoft Edge (Stable) 131.0.2903.86 之前的版本
建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新:
請更新至 Microsoft Edge (Stable) 131.0.2903.86 或之後的版本。
情資報告連結:https://access.redhat.com/errata/RHSA-2024:10771https://access.redhat.com/errata/RHSA-2024:10772https://access.redhat.com/errata/RHSA-2024:10773https://www.kjintelligent.com/en/hot_505333.html[Cybersecurity Vulnerability Notice] Microsoft Edge2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_505333.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_505333.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - RedHat Linux 核心存在多個漏洞
RedHat Linux核心存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發遠端執行任意程式碼、洩露敏感資料、阻斷服務狀況及權限提升,其影響系統或版本如下:
受影響之系統/漏洞描述:
Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64
Red Hat Enterprise Linux Server - AUS 9.4 x86_64
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.4 x86_64
Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.4 ppc64le
Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.4 s390x
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.4 aarch64
Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64
Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x
Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.4 x86_64
Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.4 x86_64
Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2 x86_64
Red Hat Enterprise Linux Server - AUS 9.2 x86_64
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.2 s390x
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2 ppc64le
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.2 aarch64
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.2 x86_64
Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.2 ppc64le
Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.2 s390x
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.2 aarch64
Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.2 aarch64
Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.2 s390x
Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.2 x86_64
Red Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.2 x86_64
建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新。
情資報告連結:https://access.redhat.com/errata/RHSA-2024:10771https://access.redhat.com/errata/RHSA-2024:10772https://access.redhat.com/errata/RHSA-2024:10773https://www.kjintelligent.com/en/hot_505332.html[Cybersecurity Vulnerability Notice] RedHat Linux2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_505332.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_505332.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_505329.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_505329.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - SUSE Linux 內核存在多個漏洞
SUSE Linux 內核存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、敏感資料洩露、遠端執行任意程式碼及繞過身份驗證,其影響系統或版本如下:
受影響之系統/漏洞描述:
openSUSE Leap 15.3
openSUSE Leap 15.4
openSUSE Leap 15.5
SUSE Enterprise Storage 7.1
SUSE Linux Enterprise Desktop 15 SP4 LTSS
SUSE Linux Enterprise High Availability Extension 15 SP3
SUSE Linux Enterprise High Availability Extension 15 SP4
SUSE Linux Enterprise High Performance Computing 15 SP3
SUSE Linux Enterprise High Performance Computing 15 SP4
SUSE Linux Enterprise High Performance Computing 15 SP5
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
SUSE Linux Enterprise Live Patching 15-SP3
SUSE Linux Enterprise Live Patching 15-SP4
SUSE Linux Enterprise Live Patching 15-SP5
SUSE Linux Enterprise Live Patching 15-SP6
SUSE Linux Enterprise Micro 5.1
SUSE Linux Enterprise Micro 5.2
SUSE Linux Enterprise Micro 5.3
SUSE Linux Enterprise Micro 5.4
SUSE Linux Enterprise Micro 5.5
SUSE Linux Enterprise Micro for Rancher 5.2
SUSE Linux Enterprise Micro for Rancher 5.3
SUSE Linux Enterprise Micro for Rancher 5.4
SUSE Linux Enterprise Real Time 15 SP4
SUSE Linux Enterprise Real Time 15 SP5
SUSE Linux Enterprise Real Time 15 SP6
SUSE Linux Enterprise Server 15 SP3
SUSE Linux Enterprise Server 15 SP3 Business Critical Linux
SUSE Linux Enterprise Server 15 SP3 LTSS
SUSE Linux Enterprise Server 15 SP4
SUSE Linux Enterprise Server 15 SP4 LTSS
SUSE Linux Enterprise Server 15 SP5
SUSE Linux Enterprise Server 15 SP6
SUSE Linux Enterprise Server for SAP Applications 15 SP3
SUSE Linux Enterprise Server for SAP Applications 15 SP4
SUSE Linux Enterprise Server for SAP Applications 15 SP5
SUSE Linux Enterprise Server for SAP Applications 15 SP6
SUSE Manager Proxy 4.2
SUSE Manager Proxy 4.3
SUSE Manager Retail Branch Server 4.2
SUSE Manager Retail Branch Server 4.3
SUSE Manager Server 4.2
SUSE Manager Server 4.3
建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新。
情資報告連結:https://www.suse.com/support/update/announcement/2024/suse-su-20244141-1/https://www.suse.com/support/update/announcement/2024/suse-su-20244140-1/https://www.suse.com/support/update/announcement/2024/suse-su-20244139-1/https://www.suse.com/support/update/announcement/2024/suse-su-20244131-1/https://www.suse.com/support/update/announcement/2024/suse-su-20244129-1/https://www.suse.com/support/update/announcement/2024/suse-su-20244128-1/https://www.suse.com/support/update/announcement/2024/suse-su-20244127-1/https://www.suse.com/support/update/announcement/2024/suse-su-20244125-1/https://www.suse.com/support/update/announcement/2024/suse-su-20244124-1/https://www.suse.com/support/update/announcement/2024/suse-su-20244123-1/https://www.suse.com/support/update/announcement/2024/suse-su-20244122-1/https://www.suse.com/support/update/announcement/2024/suse-su-20244120-1/https://www.kjintelligent.com/en/hot_505045.html[Cybersecurity Vulnerability Notice] SUSE Linux2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_505045.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_505045.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_505044.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_505044.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_505043.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_505043.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_505226.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_505226.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - Google Chrome 存在遠端執行程式碼漏洞
Google Chrome 存在一個漏洞,允許遠端攻擊者利用這個漏洞,於目標系統觸發遠端執行程式碼,其影響系統或版本如下:
受影響之系統/漏洞描述:
Google Chrome 131.0.6778.108 (Linux) 之前的版本
Google Chrome 131.0.6778.108/.109 (Mac) 之前的版本
Google Chrome 131.0.6778.108/.109 (Windows) 之前的版本
建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新。
請更新至 131.0.6778.108 (Linux) 或之後版本。
請更新至 131.0.6778.108/.109 (Mac) 或之後版本。
請更新至 131.0.6778.108/.109 (Windows) 或之後版本。
情資報告連結:https://chromereleases.googleblog.com/2024/12/stable-channel-update-for-desktop.htmlhttps://www.kjintelligent.com/en/hot_505042.html[Cybersecurity Vulnerability Notice] Google Chrome2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_505042.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_505042.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_504781.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_504781.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_504780.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_504780.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_504779.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_504779.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_504778.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_504778.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_504775.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_504775.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_504774.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_504774.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - Microsoft Edge 存在多個漏洞
Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況及彷冒,其影響系統或版本如下:
受影響之系統/漏洞描述:
Microsoft Edge (Stable) 131.0.2903.63 之前的版本
建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新:
請更新至 Microsoft Edge (Stable) 131.0.2903.63 或之後的版本。
情資報告連結:https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#november-21-2024https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-11395https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49054https://www.kjintelligent.com/en/hot_504773.html[Cybersecurity Vulnerability Notice] Microsoft Edge2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_504773.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_504773.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_504333.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_504333.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_504328.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_504328.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_504022.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_504022.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_504021.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_504021.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_504020.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_504020.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - Google Chrome 存在阻斷服務漏洞
Google Chrome 存在一個漏洞,允許遠端攻擊者利用這個漏洞,於目標系統觸發阻斷服務狀況,其影響系統或版本如下:
受影響之系統/漏洞描述:
Google Chrome 131.0.6778.85 (Linux) 之前的版本
Google Chrome 131.0.6778.85/.86 (Mac) 之前的版本
Google Chrome 131.0.6778.85/.86 (Windows) 之前的版本
建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新:
請更新至 131.0.6778.85 (Linux) 或之後版本。
請更新至 131.0.6778.85/.86 (Mac) 或之後版本。
請更新至 131.0.6778.85/.86 (Windows) 或之後版本。
情資報告連結:https://chromereleases.googleblog.com/2024/11/stable-channel-update-for-desktop_19.htmlhttps://www.kjintelligent.com/en/hot_504019.html[Cybersecurity Vulnerability Notice] Google Chrome2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_504019.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_504019.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_504018.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_504018.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_503607.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_503607.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_503606.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_503606.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - Microsoft Edge 存在多個漏洞
Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發敏感資料洩露、繞過身份驗證、及遠端執行任意程式碼,其影響系統或版本如下:
受影響之系統/漏洞描述:
Microsoft Edge (Stable) 131.0.2903.48 之前的版本
建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新:
請更新至 Microsoft Edge (Stable) 131.0.2903.48 或之後的版本。
情資報告連結:https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#november-14-2024https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-11110https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-11111https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-11112https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-11113https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-11114https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-11115https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-11116https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-11117https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49025https://www.kjintelligent.com/en/hot_503605.html[Cybersecurity Vulnerability Notice] Microsoft Edge2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_503605.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_503605.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_503604.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_503604.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_503603.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_503603.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - Mozilla Thunderbird 存在資料洩露漏洞
Mozilla Thunderbird 存在一個漏洞,允許遠端攻擊者利用此漏洞,於目標系統觸發敏感資料洩露,其影響系統或版本如下:
受影響之系統/漏洞描述:
Thunderbird 128.4.3以前版本
Thunderbird 132.0.1以前版本
建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新:
請更新至 Thunderbird 128.4.3。
請更新至 Thunderbird 132.0.1。
情資報告連結:https://www.mozilla.org/en-US/security/advisories/mfsa2024-61/https://www.mozilla.org/en-US/security/advisories/mfsa2024-62/https://www.kjintelligent.com/en/hot_503602.html[Cybersecurity Vulnerability Notice] Mozilla Thunderbird2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_503602.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_503602.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_503598.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_503598.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_503597.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_503597.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - Google Chrome 多個存在漏洞
Google Chrome 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發遠端執行任意程式碼及繞過身份驗證,其影響系統或版本如下:
受影響之系統/漏洞描述:
Google Chrome 131.0.6778.69 (Linux) 之前的版本
Google Chrome 131.0.6778.69/.70 (Mac) 之前的版本
Google Chrome 131.0.6778.69/.70 (Windows) 之前的版本
建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新:
請更新至 131.0.6778.69 (Linux) 或之後的版本。
請更新至 131.0.6778.69/.70 (Mac) 或之後的版本。
請更新至 131.0.6778.69/.70 (Windows) 或之後的版本。
情資報告連結:https://chromereleases.googleblog.com/2024/11/stable-channel-update-for-desktop_12.htmlhttps://www.kjintelligent.com/en/hot_503303.html[Cybersecurity Vulnerability Notice] Google Chrome2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_503303.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_503303.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - Veeam 產品存在多個漏洞
Veeam 產品存在多個漏洞,允許遠端攻擊者利用此漏洞,於目標系統觸發權限提升、遠端執行任意程式碼、篡改、繞過身份驗證及敏感資料洩露。CVE-2024-40711 正在被廣泛利用,該漏洞是由於反序列化不信任資料的弱點所導致,將允許未經身份驗證的攻擊者利用此漏洞觸發遠端執行任意程式碼,其影響系統或版本如下:
受影響之系統/漏洞描述:
Veeam Backup & Replication 12.1.2.172 及所有早於版本 12 的版本
Veeam Agent for Linux 6.1.2.1781 及所有早於版本 6 的版本
Veeam ONE 12.1.0.3208 及所有早於版本 12 的版本
Veeam Service Provider Console 8.0.0.19552 及所有早於版本 8 和版本 7 的版本
Veeam Backup for Nutanix AHV Plug-In 12.5.1.8 及所有早於版本 12 的版本
Veeam Backup for Oracle Linux Virtualization Manager 和 Red Hat Virtualization Plug-In 12.4.1.45 及所有早於版本 12 的版本
建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新:
請將Veeam Backup & Replication 12.1.2.172 及所有早於版本 12 的版本更新至Veeam Backup & Replication 12.2 (build 12.2.0.334)。
請將Veeam Agent for Linux 6.1.2.1781 及所有早於版本 6 的版本至Veeam Agent for Linux 6.2 (build 6.2.0.101) 。
請將Veeam ONE 12.1.0.3208 及所有早於版本 12 的版本至Veeam ONE v12.2 (build 12.2.0.4093)。
請將Veeam Service Provider Console 8.0.0.19552 及所有早於版本 8 和版本 7 的版本至Veeam Service Provider Console v8.1 (build 8.1.0.21377)。
請將Veeam Backup for Nutanix AHV Plug-In 12.5.1.8 及所有早於版本 12 的版本至Veeam Backup for Nutanix AHV Plug-In v12.6.0.632。
請將Veeam Backup for Oracle Linux Virtualization Manager 和 Red Hat Virtualization Plug-In 12.4.1.45 及所有早於版本 12 的版本至Veeam Backup for Oracle Linux Virtualization Manager and Red Hat Virtualization Plug-In v12.5.0.299 。
情資報告連結:https://www.veeam.com/kb4649https://www.kjintelligent.com/en/hot_503301.html[Cybersecurity Vulnerability Notice] Veeam2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_503301.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_503301.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - Synology 產品存在多個漏洞
Synology 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發洩露敏感資料、仿冒、篡改及遠端執行任意程式碼,其影響系統或版本如下:
受影響之系統/漏洞描述:
Synology DSM 7.2.2 的 7.2.2-72806-1 之前的版本
Synology DSM 7.2.1 的版本
Synology DSM 7.1 的版本
Synology DSMUC 3.1 的版本
Synology BeeStation OS 1.1 的 1.1-65374 之前的版本
Synology BeeStation OS 1.0 的版本
Synology Replication Service for DSM 7.2 的 1.3.0-0423 之前的版本
Synology Replication Service for DSM 7.1 的 1.2.2-0353 之前的版本
Synology Drive Server for DSM 7.2.2 的 3.5.1-26102 之前的版本
Synology Drive Server for DSM 7.2.1 的版本
Synology Drive Server for DSM 7.1 的版本
建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新:
請將DSM 7.2.2更新至 7.2.2-72806-1 或之後的版本。
請將Synology Drive Server for DSM 7.2.2更新至 3.5.1-26102 或之後的版本。
請將Synology Drive Server for DSM 7.2.1更新至 3.5.0-26085 或之後的版本。
請將Synology Drive Server for DSM 7.1更新至 3.2.1-23280 或之後的版本。
請將Replication Service for DSM 7.2更新至 1.3.0-0423 或之後的版本。
請將Replication Service for DSM 7.1更新至 1.2.2-0353 或之後的版本。
請將BeeStation OS 1.1更新至 1.1-65374 或之後的版本。
請將BeeStation OS 1.0更新至 1.1-65374 或之後的版本。
情資報告連結:https://www.synology.com/en-us/security/advisory/Synology_SA_24_20https://www.synology.com/en-us/security/advisory/Synology_SA_24_21https://www.synology.com/en-us/security/advisory/Synology_SA_24_22https://www.synology.com/en-us/security/advisory/Synology_SA_24_23https://www.kjintelligent.com/en/hot_503300.html[Cybersecurity Vulnerability Notice] Synology2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_503300.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_503300.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - Microsoft Edge 存在多個漏洞
Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況及遠端執行任意程式碼,其影響系統或版本如下:
受影響之系統/漏洞描述:
Microsoft Edge (Stable) 130.0.2849.80 之前的版本
建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新:
請更新至 Microsoft Edge (Stable) 130.0.2849.80 或之後的版本。
情資報告連結:https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#november-7-2024https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-10826https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-10827https://www.kjintelligent.com/en/hot_503299.html[Cybersecurity Vulnerability Notice] Microsoft Edge2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_503299.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_503299.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - Zoom 產品存在多個漏洞
Zoom 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升及敏感資料洩露,其影響系統或版本如下:
受影響之系統/漏洞描述:
Zoom Meeting SDK for Android 6.2.0 之前的版本
Zoom Meeting SDK for Linux 6.2.0 之前的版本
Zoom Meeting SDK for Windows 6.2.0 之前的版本
Zoom Meeting SDK for iOS 6.2.0 之前的版本
Zoom Meeting SDK for macOS 6.1.5 之前的版本
Zoom Rooms App for macOS 6.1.5 之前的版本
Zoom Rooms Client for Windows 6.2.0 之前的版本
Zoom Rooms Client for iPad 6.2.0 之前的版本
Zoom Rooms Client for macOS 6.2.0 之前的版本
Zoom Rooms Controller for Android 6.2.0 之前的版本
Zoom Rooms Controller for Linux 6.2.0 之前的版本
Zoom Rooms Controller for Windows 6.2.0 之前的版本
Zoom Rooms Controller for macOS 6.2.0 之前的版本
Zoom Video SDK for Android 6.2.0 之前的版本
Zoom Video SDK for Linux 6.2.0 之前的版本
Zoom Video SDK for Windows 6.2.0 之前的版本
Zoom Video SDK for iOS 6.2.0 之前的版本
Zoom Video SDK for macOS 6.1.5 之前的版本
Zoom Workplace App for Android 6.2.0 之前的版本
Zoom Workplace App for Linux 6.2.0 之前的版本
Zoom Workplace App for Windows 6.2.0 之前的版本
Zoom Workplace App for iOS 6.2.0 之前的版本
Zoom Workplace App for macOS 6.1.5 之前的版本
Zoom Workplace VDI Client for Windows 6.1.12 之前的版本 (6.0.14 版本除外)
建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新。
情資報告連結:https://www.zoom.com/en/trust/security-bulletin/zsb-24039/https://www.zoom.com/en/trust/security-bulletin/zsb-24040/https://www.zoom.com/en/trust/security-bulletin/zsb-24041/https://www.zoom.com/en/trust/security-bulletin/zsb-24042/https://www.zoom.com/en/trust/security-bulletin/zsb-24043/https://www.zoom.com/en/trust/security-bulletin/zsb-24044/https://www.kjintelligent.com/en/hot_503298.html[Cybersecurity Vulnerability Notice] Zoom2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_503298.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_503298.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_503297.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_503297.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502934.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502934.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - Google Chrome 存在多個漏洞
Google Chrome 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況及遠端執行任意程式碼,其影響系統或版本如下:
受影響之系統/漏洞描述:
Google Chrome 130.0.6723.116 (Linux) 之前的版本
Google Chrome 130.0.6723.116/.117 (Mac) 之前的版本
Google Chrome 130.0.6723.116/.117 (Windows) 之前的版本
建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新:
請更新至 130.0.6723.116 (Linux) 或之後的版本。
請更新至 130.0.6723.116/.117 (Mac) 或之後的版本。
請更新至 130.0.6723.116/.117 (Windows) 或之後的版本。
情資報告連結:https://chromereleases.googleblog.com/2024/11/stable-channel-update-for-desktop.htmlhttps://www.kjintelligent.com/en/hot_502933.html[Cybersecurity Vulnerability Notice] Google Chrome2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502933.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502933.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - RedHat Linux 核心存在多個漏洞
RedHat Linux核心存在多個漏洞,允許遠端攻擊者可利用這些漏洞,於目標系統觸發遠端執行任意程式碼、洩露敏感資料、阻斷服務狀況及權限提升,其影響系統或版本如下:
受影響之系統/漏洞描述:
Red Hat Enterprise Linux for Real Time 8 x86_64
Red Hat Enterprise Linux for Real Time for NFV 8 x86_64
Red Hat Enterprise Linux for x86_64 8 x86_64
Red Hat Enterprise Linux for IBM z Systems 8 s390x
Red Hat Enterprise Linux for Power, little endian 8 ppc64le
Red Hat Enterprise Linux for ARM 64 8 aarch64
Red Hat CodeReady Linux Builder for x86_64 8 x86_64
Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le
Red Hat CodeReady Linux Builder for ARM 64 8 aarch64
Red Hat CodeReady Linux Builder for IBM z Systems 8 s390x
建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新。
情資報告連結:https://access.redhat.com/errata/RHSA-2024:8830https://access.redhat.com/errata/RHSA-2024:8831https://access.redhat.com/errata/RHSA-2024:8856https://access.redhat.com/errata/RHSA-2024:8870https://www.kjintelligent.com/en/hot_502932.html[Cybersecurity Vulnerability Notice] RedHat Linux2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502932.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502932.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502931.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502931.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502930.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502930.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502735.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502735.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502688.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502688.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502687.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502687.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - Synology 產品存在遠端執行程式碼漏洞
Synology 產品存在一個漏洞,允許遠端攻擊者利用這個漏洞,於目標系統觸發遠端執行任意程式碼,其影響系統或版本如下:
受影響之系統/漏洞描述:
BeePhotos for BeeStation OS 1.0
BeePhotos for BeeStation OS 1.1
Synology Photos 1.6 for DSM 7.2
Synology Photos 1.7 for DSM 7.2
建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新。
情資報告連結:https://www.synology.com/en-global/security/advisory/Synology_SA_24_18https://www.synology.com/en-global/security/advisory/Synology_SA_24_19https://www.kjintelligent.com/en/hot_502685.html[Cybersecurity Vulnerability Notice] Synology2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502685.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502685.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - Microsoft Edge 存在多個漏洞
Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發資料篡改、阻斷服務狀況及遠端執行任意程式碼,其影響系統或版本如下:
受影響之系統/漏洞描述:
Microsoft Edge (Stable) 130.0.2849.68 之前的版本
建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新:
請更新至 Microsoft Edge (Stable) 130.0.2849.68 或之後的版本。
情資報告連結:https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#october-31-2024https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-10487https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-10488https://www.kjintelligent.com/en/hot_502684.html[Cybersecurity Vulnerability Notice] Microsoft Edge2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502684.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502684.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - SUSE Linux 內核存在多個漏洞
SUSE Linux 內核存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、敏感資料洩露、遠端執行任意程式碼及繞過身份驗證,其影響系統或版本如下:
受影響之系統/漏洞描述:
openSUSE Leap 15.3
openSUSE Leap 15.4
openSUSE Leap 15.5
SUSE Linux Enterprise High Performance Computing 12 SP5
SUSE Linux Enterprise High Performance Computing 15 SP2
SUSE Linux Enterprise High Performance Computing 15 SP3
SUSE Linux Enterprise High Performance Computing 15 SP4
SUSE Linux Enterprise High Performance Computing 15 SP5
SUSE Linux Enterprise Live Patching 12-SP5
SUSE Linux Enterprise Live Patching 15-SP2
SUSE Linux Enterprise Live Patching 15-SP3
SUSE Linux Enterprise Live Patching 15-SP4
SUSE Linux Enterprise Live Patching 15-SP5
SUSE Linux Enterprise Live Patching 15-SP6
SUSE Linux Enterprise Micro 5.1
SUSE Linux Enterprise Micro 5.2
SUSE Linux Enterprise Micro 5.3
SUSE Linux Enterprise Micro 5.4
SUSE Linux Enterprise Micro 5.5
SUSE Linux Enterprise Real Time 15 SP4
SUSE Linux Enterprise Real Time 15 SP5
SUSE Linux Enterprise Real Time 15 SP6
SUSE Linux Enterprise Server 12 SP5
SUSE Linux Enterprise Server 15 SP2
SUSE Linux Enterprise Server 15 SP3
SUSE Linux Enterprise Server 15 SP4
SUSE Linux Enterprise Server 15 SP5
SUSE Linux Enterprise Server 15 SP6
SUSE Linux Enterprise Server for SAP Applications 12 SP5
SUSE Linux Enterprise Server for SAP Applications 15 SP2
SUSE Linux Enterprise Server for SAP Applications 15 SP3
SUSE Linux Enterprise Server for SAP Applications 15 SP4
SUSE Linux Enterprise Server for SAP Applications 15 SP5
SUSE Linux Enterprise Server for SAP Applications 15 SP6
建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新。
情資報告連結:https://www.suse.com/support/update/announcement/2024/suse-su-20243780-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243782-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243783-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243793-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243794-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243796-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243797-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243798-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243799-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243800-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243803-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243804-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243805-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243806-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243814-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243815-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243816-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243820-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243821-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243822-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243824-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243829-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243830-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243831-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243833-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243834-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243835-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243836-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243837-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243881-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243840-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243842-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243848-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243849-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243850-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243851-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243852-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243854-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243855-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243856-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243857-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243859-1/https://www.suse.com/support/update/announcement/2024/suse-su-20243860-1/https://www.kjintelligent.com/en/hot_502452.html[Cybersecurity Vulnerability Notice] SUSE Linux2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502452.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502452.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502451.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502451.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502450.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502450.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502449.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502449.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - QNAP NAS 存在遠端執行程式碼漏洞
QNAP NAS 存在一個漏洞,允許遠端攻擊者利用這個漏洞,於目標系統觸發遠端執行程式碼,其影響系統或版本如下:
受影響之系統/漏洞描述:
SMB Service 4.15.002 之前版本
SMB Service h4.15.002 之前版本
建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新:
請更新至 SMB Service 4.15.002 或之後的版本。
請更新至 SMB Service h4.15.002 或之後的版本。
情資報告連結:https://www.qnap.com/en/security-advisory/qsa-24-42https://www.kjintelligent.com/en/hot_502447.html[Cybersecurity Vulnerability Notice] QNAP NAS2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502447.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502447.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - Google Chrome 存在多個漏洞
Google Chrome 發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發繞過身份驗證、遠端執行任意程式碼及資料篡改,其影響系統或版本如下:
受影響之系統/漏洞描述:
Google Chrome 130.0.6723.91 (Linux) 之前的版本
Google Chrome 130.0.6723.91/.92 (Mac) 之前的版本
Google Chrome 130.0.6723.91/.92 (Windows) 之前的版本
建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新:
請更新至 130.0.6723.91 (Linux) 或之後的版本。
請更新至 130.0.6723.91/.92 (Mac) 或之後的版本。
請更新至 130.0.6723.91/.92 (Windows) 或之後的版本。
情資報告連結:https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_29.htmlhttps://www.kjintelligent.com/en/hot_502431.html[Cybersecurity Vulnerability Notice] Google Chrome2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502431.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502431.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502430.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502430.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502095.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502095.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - Microsoft Edge 存在多個漏洞
Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發繞過身份驗證、阻斷服務狀況及遠端執行任意程式碼,其影響系統或版本如下:
受影響之系統/漏洞描述:
Microsoft Edge (Stable) 130.0.2849.56 之前的版本
建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新:
請更新至 Microsoft Edge (Stable) 130.0.2849.56 或之後的版本。
情資報告連結:https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#october-24-2024https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-10229https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-10230https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-10231https://www.kjintelligent.com/en/hot_502094.html[Cybersecurity Vulnerability Notice] Microsoft Edge2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502094.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502094.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502092.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502092.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502091.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502091.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502083.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502083.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502067.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502067.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502071.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502071.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502070.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502070.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502069.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502069.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502012.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502012.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - 新人類科技資訊之 FlowMaster BPM Plus 存在 Privilege Escalation 和 SQL Injection 漏洞
新人類科技資訊之 FlowMaster BPM Plus存在權限提升漏洞以及特定查詢功能未妥善限制使用者輸入,其將允許已取得一般權限的遠端攻擊者可透過竄改特定cookie將權限提升至管理者權限以及注入SQL指令讀取、修改、刪除資料庫內容,其影響系統或版本如下:
受影響之系統/漏洞描述:
FlowMaster BPM Plus Service Pack v5.3.1(不含)以前版本
建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新:
請更新 Service Pack 至 v5.3.1(含)以後版本。
情資報告連結:https://www.twcert.org.tw/tw/cp-132-8136-4d5b4-1.htmlhttps://www.twcert.org.tw/tw/cp-132-8138-d2bb7-1.htmlhttps://www.kjintelligent.com/en/hot_502011.html[Cybersecurity Vulnerability Notice] 新人類科技資訊2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502011.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502011.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502010.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502010.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502009.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_502009.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501826.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501826.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - Google Chrome 存在多個漏洞
Google Chrome 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發繞過身份驗證、阻斷服務狀況及遠端執行任意程式碼,其影響系統或版本如下:
受影響之系統/漏洞描述:
Google Chrome 130.0.6723.69 (Linux) 之前的版本
Google Chrome 130.0.6723.69/.70 (Mac) 之前的版本
Google Chrome 130.0.6723.69/.70 (Windows) 之前的版本
建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新:
請更新至 130.0.6723.69 (Linux) 或之後的版本。
請更新至 130.0.6723.69/.70 (Mac) 或之後的版本。
請更新至 130.0.6723.69/.70 (Windows) 或之後的版本。
情資報告連結:https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_22.htmlhttps://www.kjintelligent.com/en/hot_501825.html[Cybersecurity Vulnerability Notice] Google Chrome2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501825.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501825.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - Microsoft Edge 存在多個漏洞
Microsoft Edge 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況及遠端執行任意程式碼,其影響系統或版本如下:
受影響之系統/漏洞描述:
Microsoft Edge Stable Channel 129.0.2792.89 之前的版本
Microsoft Edge Extended Stable Channel 128.0.2739.113 之前的版本
建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新:
請更新至 Microsoft Edge Stable Channel 129.0.2792.89 或之後版本。
請更新至 Microsoft Edge Extended Stable Channel 128.0.2739.113 或之後版本。
情資報告連結:https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#october-10-2024https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-9602https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-9603https://www.kjintelligent.com/en/hot_501752.html[Cybersecurity Vulnerability Notice] Microsoft Edge2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501752.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501752.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501744.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501744.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - Juniper Junos OS 存在多個漏洞
Juniper Junos OS 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、洩露敏感資料、遠端執行程式碼、權限提升及繞過身份驗證,其影響系統或版本如下:
受影響之系統/漏洞描述:
Junos OS
Junos OS Evolved
建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新。
情資報告連結:https://supportportal.juniper.net/s/global-search/%40uri?language=en_US#sort=%40sfcec_community_publish_date_formula__c%20descending&f:ctype=[Security%20Advisories]https://www.kjintelligent.com/en/hot_501743.html[Cybersecurity Vulnerability Notice] Juniper Junos OS2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501743.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501743.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - Mozilla Firefox 存在阻斷服務漏洞
Mozilla Firefox 存在一個漏洞,允許遠端攻擊者利用這個漏洞,於目標系統觸發阻斷服務狀況,其影響系統或版本如下:
受影響之系統/漏洞描述:
Firefox 131.0.3以前版本
建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新。
請更新至 Firefox 131.0.3。
情資報告連結:https://www.mozilla.org/en-US/security/advisories/mfsa2024-53/https://www.kjintelligent.com/en/hot_501726.html[Cybersecurity Vulnerability Notice] Mozilla Firefox2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501726.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501726.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501725.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501725.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - Google Chrome 存在多個漏洞
Google Chrome 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發繞過身份驗證、阻斷服務狀況及遠端執行任意程式碼,其影響系統或版本如下:
受影響之系統/漏洞描述:
Google Chrome 130.0.6723.58 (Linux) 之前的版本
Google Chrome 130.0.6723.58/.59(Mac) 之前的版本
Google Chrome 130.0.6723.58/.59 (Windows) 之前的版本
建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新:
請更新 130.0.6723.58 (Linux) 或之後的版本。
請更新 130.0.6723.58/.59 (Mac) 或之後的版本。
請更新 130.0.6723.58/.59 (Windows) 或之後的版本。
情資報告連結:https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_15.htmlhttps://www.kjintelligent.com/en/hot_501722.html[Cybersecurity Vulnerability Notice] Google Chrome2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501722.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501722.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501721.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501721.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - IBM WebSphere 產品存在多個漏洞
IBM WebSphere 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況,其影響系統或版本如下:
受影響之系統/漏洞描述:
IBM WebSphere Application Server 版本 8.5
IBM WebSphere Application Server Liberty 20.0.0.12 - 24.0.0.10
建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新。
情資報告連結:https://www.ibm.com/support/pages/node/7173097https://www.ibm.com/support/pages/node/7173128https://www.kjintelligent.com/en/hot_501719.html[Cybersecurity Vulnerability Notice] IBM WebSphere2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501719.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501719.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - 甲骨文產品存在多個漏洞
於甲骨文產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發權限提升、阻斷服務狀況、遠端執行程式碼、敏感資料洩露、篡改及繞過身份驗證,其影響系統或版本如下:
受影響之系統/漏洞描述:
Oracle MySQL
Java SE
Oracle Database Server
WebLogic Server
VirtualBox
建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新。
情資報告連結:https://www.oracle.com/security-alerts/cpuoct2024verbose.htmlhttps://www.kjintelligent.com/en/hot_501716.html[Cybersecurity Vulnerability Notice] Oracle2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501716.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501716.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501715.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501715.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501586.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501586.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】漏洞分享 - Moxa路由器存在未經授權存取和操作系統命令注入漏洞Moxa 旗下部分行動通訊路由器、安全路由器、網路設備存在高風險漏洞CVE-2024-9137、CVE-2024-9139,並指出這些漏洞有可能導致未經授權存取或是系統損壞的情況。
CVE-2024-9137影響之產品下:
EDR-8010 Series Firmware version 3.12.1 and earlier versions
EDR-G9004 Seires Firmware version 3.12.1 and earlier versions
EDR-G9010 Series Firmware version 3.12.1 and earlier versions
EDR-G1002-BP Series Firmware version 3.12.1 and earlier versions
NAT-102 Series Firmware version 1.0.5 and earlier versions
OnCell G4302-LTE4 Series Firmware version 3.9 and earlier versions
TN-4900 Series Firmware version 3.6 and earlier versions
CVE-2024-9139:影響之產品如下:
EDR-8010 Series Firmware version 3.12.1 and earlier versions
EDR-G9004 Seires Firmware version 3.12.1 and earlier versions
EDR-G9010 Series Firmware version 3.12.1 and earlier versions
EDF-G1002-BP Series Firmware version 3.12.1 and earlier versions
NAT-102 Series Firmware version 1.0.5 and earlier versions
OnCell G4302-LTE4 Series Firmware version 3.9 and earlier versions
TN-4900 Series Firmware version 3.6 and earlier versions
建議改善措施:
1. 企業及使用者如有上述漏洞版本應儘速更新至以下版本:
EDR-8010 Series Upgrade to the firmware version 3.13
EDR-G9004 Series Upgrade to the firmware version 3.13
EDR-G9010 Series Upgrade to the firmware version 3.13
EDF-G1002-BP Series Upgrade to the firmware version 3.13
NAT-102 Series Please contact Moxa Technical Support for the security patch
OnCell G4302-LTE4 Series Upgrade to the firmware version 3.13
TN-4900 Series Upgrade to the firmware version 3.13
2. 對於無法即時套用新版韌體的企業組織,緩解措施建議減少裝置曝露於網際網路、透過防火牆限制存取(白名單),以及採用入侵偵測系統(IDS)、入侵防禦系統(IPS)來偵測及防範漏洞利用的情況。
情資報告連結:https://www.moxa.com/en/support/product-support/security-advisory/mpsa-241154-missing-authentication-and-os-command-injection-vulnerabilities-in-routers-and-network-security-applianceshttps://www.kjintelligent.com/en/hot_501354.html[Cybersecurity Vulnerability Notice] Moxa2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501354.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501354.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - SonicWall SSL-VPN SMA1000 和 Connect Tunnel Windows Client 存在多種漏洞SonicWall產品存在多種漏洞,其將允許攻擊者利用該漏洞,並導致阻斷服務和提升權限。
受影響之系統/漏洞描述:
SonicWALL SMA1000 Connect Tunnel Windows Client Link Following Denial-of-Service Vulnerability
CVE編號:CVE-2024-45315
漏洞描述:SonicWall Connect Tunnel存在Link Fllowing漏洞,其將允許取得權限的攻擊者創建任意檔案夾和檔案,進而導致阻斷服務。
影響系統/版本: SonicWall Connect Tunnel (version 12.4.271 and earlier of Windows client)
SonicWALL SMA1000 Connect Tunnel Windows Client Link Following Local Privilege Escalation Vulnerability
CVE編號:CVE-2024-45316
漏洞描述:SonicWall Connect Tunnel存在Link Fllowing漏洞,其將允許取得權限的攻擊者創建任意檔案夾和檔案,進而導致提升權限。
影響系統/版本:SonicWall Connect Tunnel (version 12.4.271 and earlier of Windows client)
Unauthenticated SMA1000 12.4.x Server-Side Request Forgery (SSRF) Vulnerability
CVE編號:CVE-2024-45317
漏洞描述:SMA1000 12.4.x存在Server-Side Request Forgery (SSRF)漏洞,其將允許未經授權之遠端攻擊者利用伺服器端應用程序發起請求,訪問不應訪問的IP。影響系統/版本:SMA1000 12.4.x
建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新:
請將SMA1000 Connect Tunnel Windows (32 and 64-bit) Client 12.4.3.271(含)以前版本更新至12.4.3.281或更高版本。
請將SMA1000 Appliance firmware 12.4.3-02676(含)以前版本更新至12.4.3-02758。
情資報告連結:https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0017https://www.kjintelligent.com/en/hot_501480.html[Cybersecurity Vulnerability Notice] SonicWall2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501480.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501480.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501074.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501074.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501353.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501353.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501073.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501073.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - Mozilla Firefox存在遠端執行程式碼漏洞Mozilla Firefox 存在一個漏洞,允許遠端攻擊者利用此漏洞,於目標系統觸發遠端執行任意程式碼。受影響之系統/漏洞描述:Firefox 131.0.2以前版本Firefox ESR 115.16.1以前版本Firefox ESR 128.3.1以前版本https://www.kjintelligent.com/en/hot_501072.html[Cybersecurity Vulnerability Notice] Mozilla Firefox2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501072.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501072.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501071.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501071.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501070.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501070.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501069.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501069.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501068.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_501068.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - SUSE Linux 內核存在多個漏洞SUSE Linux 內核存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、遠端執行任意程式碼、洩露敏感資料、資料篡改及繞過身份驗證。受影響之系統/漏洞描述:SUSE Linux Enterprise High Availability Extension 15 SP2SUSE Linux Enterprise High Performance Computing 15 SP2SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2SUSE Linux Enterprise Live Patching 15-SP2SUSE Linux Enterprise Server 15 SP2SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2SUSE Linux Enterprise Server for SAP Applications 15 SP2SUSE Manager Proxy 4.1SUSE Manager Retail Branch Server 4.1SUSE Manager Server 4.1https://www.kjintelligent.com/en/hot_500346.html[Cybersecurity Vulnerability Notice] SUSE Linux2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_500346.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_500346.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_500345.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_500345.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - 思科產品存在多個漏洞於思科產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升、遠端執行任意程式碼、洩露敏感資料、資料篡改、跨網站指令碼及繞過身份驗證。
受影響之系統/漏洞描述:
1000 Series Integrated Services Routers (ISRs) running a vulnerable release of Cisco IOS XE Software
1000 Series Integrated Services Routers (ISRs) running a vulnerable release of Cisco UTD Snort IPS Engine for Cisco IOS XE Software
4000 Series ISRs running a vulnerable release of Cisco UTD Snort IPS Engine for Cisco IOS XE Software
Catalyst 8000v Edge Software running a vulnerable release of Cisco IOS XE Software
Catalyst 8000V Edge Software running a vulnerable release of Cisco UTD Snort IPS Engine for Cisco IOS XE Software
Catalyst 8200 Series Edge Platforms running a vulnerable release of Cisco IOS XE Software
Catalyst 8200 Series Edge Platforms running a vulnerable release of Cisco UTD Snort IPS Engine for Cisco IOS XE Software
Catalyst 8300 Series Edge Platforms running a vulnerable release of Cisco IOS XE Software
Catalyst 8300 Series Edge Platforms running a vulnerable release of Cisco UTD Snort IPS Engine for Cisco IOS XE Software
Catalyst 8500L Edge Platforms running a vulnerable release of Cisco IOS XE Software
Catalyst 8500L Series Edge Platforms running a vulnerable release of Cisco UTD Snort IPS Engine for Cisco IOS XE Software
Catalyst 9300X Series Switches running a vulnerable release of Cisco IOS XE Software
Catalyst 9400X Supervisor Engines running a vulnerable release of Cisco IOS XE Software
Catalyst 9500X Series Switches running a vulnerable release of Cisco IOS XE Software
Catalyst 9600 Series Switches running a vulnerable release of Cisco IOS XE Software
Catalyst 9800 Embedded Wireless Controllers for Catalyst 9300, 9400, and 9500 Series Switches running a vulnerable release of Cisco IOS XE Software
Catalyst 9800 Series Wireless Controllers running a vulnerable release of Cisco IOS XE Software
Catalyst 9800-CL Wireless Controllers for Cloud running a vulnerable release of Cisco IOS XE Software
Catalyst IR8300 Rugged Series Routers running a vulnerable release of Cisco IOS XE Software
Catalyst IR8300 Rugged Series Routers running a vulnerable release of Cisco UTD Snort IPS Engine for Cisco IOS XE Software
Cisco ASR 1000 Series Aggregation Services Routers running Cisco IOS XE Software Release 17.12.1 or 17.12.1a.
Cisco Catalyst Center
Cisco Catalyst SD-WAN Manager
Cisco cBR-8 Converged Broadband Routers running Cisco IOS XE Software Release 17.12.1 or 17.12.1a.
Cisco IOS and IOS XE Software
Crosswork NSO
Embedded Wireless Controllers on Catalyst Access Points running a vulnerable release of Cisco IOS XE Software
Industrial Ethernet 4000 Series Switches running Cisco IOS Software Release 15.2(8)E2 or later
Industrial Ethernet 4010 Series Switches running Cisco IOS Software Release 15.2(8)E2 or later
Industrial Ethernet 5000 Series Switches running Cisco IOS Software Release 15.2(8)E2 or later
Optical Site Manager
RV340 Dual WAN Gigabit VPN Routers
SD-WAN vEdge Cloud Routers
SD-WAN vEdge Routershttps://www.kjintelligent.com/en/hot_500344.html[Cybersecurity Vulnerability Notice] Cisco2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_500344.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_500344.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_500343.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_500343.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_500342.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_500342.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - RedHat Linux 核心存在多個漏洞RedHat Linux核心存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、遠端執行任意程式碼、資料篡改及繞過身份驗證。受影響之系統/漏洞描述:Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.2 aarch64Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.2 s390xRed Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.2 ppc64leRed Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.2 x86_64Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.2 aarch64Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.8 aarch64Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.2 aarch64Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64Red Hat Enterprise Linux for ARM 64 8 aarch64Red Hat Enterprise Linux for ARM 64 9 aarch64Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.2 s390xRed Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390xRed Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.8 s390xRed Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.2 s390xRed Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390xRed Hat Enterprise Linux for IBM z Systems 8 s390xRed Hat Enterprise Linux for IBM z Systems 9 s390xRed Hat Enterprise Linux for Power, little endian - Extended Update Support 8.8 ppc64leRed Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2 ppc64leRed Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64leRed Hat Enterprise Linux for Power, little endian 8 ppc64leRed Hat Enterprise Linux for Power, little endian 9 ppc64leRed Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.2 x86_64Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.2 x86_64Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.8 x86_64Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2 x86_64Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.8 x86_64Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64Red Hat Enterprise Linux for x86_64 8 x86_64Red Hat Enterprise Linux for x86_64 9 x86_64Red Hat Enterprise Linux Server - AUS 8.6 x86_64Red Hat Enterprise Linux Server - AUS 9.2 x86_64Red Hat Enterprise Linux Server - AUS 9.4 x86_64Red Hat Enterprise Linux Server - TUS 8.6 x86_64Red Hat Enterprise Linux Server - TUS 8.8 x86_64Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64leRed Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64leRed Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.8 ppc64leRed Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64leRed Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64lehttps://www.kjintelligent.com/en/hot_500341.html[Cybersecurity Vulnerability Notice] RedHat Linux2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_500341.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_500341.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_500340.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_500340.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_500339.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_500339.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_499809.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_499809.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_499808.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_499808.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_499803.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_499803.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_499802.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_499802.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_499453.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_499453.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_499452.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_499452.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - Zoom 產品存在資料洩露漏洞Zoom 產品存在一個漏洞,允許遠端攻擊者利用此漏洞,於目標系統觸發洩露敏感資料。受影響之系統/漏洞描述:Zoom Workplace Desktop App for Windows 6.1.0之前的版本Zoom Workplace Desktop App for macOS 6.1.0之前的版本Zoom Workplace Desktop App for Linux 6.1.0之前的版本Zoom Workplace VDI Client for Windows 6.1.0之前的版本 (版本 5.17.15 和 6.0.12 除外)Zoom Workplace App for iOS 6.1.0之前的版本Zoom Workplace App for Android 6.1.0之前的版本Zoom Meeting SDK for Windows 6.1.0之前的版本Zoom Meeting SDK for iOS 6.1.0之前的版本Zoom Meeting SDK for Android 6.1.0之前的版本Zoom Meeting SDK for macOS 6.1.0之前的版本Zoom Meeting SDK for Linux 6.1.0之前的版本Zoom Rooms App for Windows 6.1.0之前的版本Zoom Rooms App for macOS 6.1.0之前的版本Zoom Rooms App for iPad 6.1.0之前的版本Zoom Rooms Controller for Windows 6.1.0之前的版本Zoom Rooms Controller for macOS 6.1.0之前的版本Zoom Rooms Controller for Linux 6.1.0之前的版本Zoom Rooms Controller for Android 6.1.0之前的版本
漏洞分享 - ChromeOS 存在多個漏洞ChromeOS 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、遠端執行任意程式碼、洩露敏感資料及繞過身份驗證受影響之系統/漏洞描述:128.0.6613.133 (平台版本: 15964.48.0) 之前的版本
漏洞分享 - Google Chrome 存在多個漏洞Google Chrome 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況及遠端執行任意程式碼。受影響之系統/漏洞描述:Google Chrome 128.0.6613.137 (Linux) 之前的版本Google Chrome 128.0.6613.137/.138 (Mac) 之前的版本Google Chrome 128.0.6613.137/.138 (Windows) 之前的版本https://www.kjintelligent.com/en/hot_499379.html[Cybersecurity Vulnerability Notice] Zoom、ChromeOS、Google Chrome2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_499379.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_499379.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_499377.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_499377.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_499218.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_499218.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_499216.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_499216.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_499087.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_499087.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_499086.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_499086.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】漏洞分享 - Veeam產品存在多個漏洞Veeam產品存在多個漏洞,將允許遠端攻擊者利用這些漏洞,於目標系統觸發繞過身份驗證、遠端執行程式碼及權限提升。受影響之系統/漏洞描述:Veeam Backup & ReplicationCVE編號:CVE-2024-40711、CVE-2024-40713、CVE-2024-40710、CVE-2024-39718、CVE-2024-40714、CVE-2024-40712漏洞描述:Veeam Backup & Replication存在多種漏洞,將允許攻擊者在易受影響之系統進行攻擊,並導致遠端執行代碼、繞過多因子驗證、存取敏感資訊(憑證、密碼)。影響系統/版本: Veeam Backup & Replication 12.1.2.172 and all earlier version 12 builds。Veeam Agent for LinuxCVE編號:CVE-2024-40709漏洞描述:Veeam Agent for Linux存在漏洞,將允許取得低權限的攻擊者在易受影響系統上進行提權。影響系統/版本:Veeam Agent for Linux 6.1.2.1781 and all earlier version 6 builds。Veeam ONECVE編號:CVE-2024-42024、CVE-2024-42019、CVE-2024-42023、CVE-2024-42021、CVE-2024-42022、CVE-2024-42020漏洞描述:Veeam ONE存在多種漏洞,將允許攻擊者於易受影響之系統利用該漏洞,並導致遠端執行程式碼、存取NTLM hash、存取機敏資料、更改檔案配置、執行HTML Injection。影響系統/版本:Veeam ONE 12.1.0.3208 and all earlier version 12 builds。Veeam Service Provider ConsoleCVE編號:CVE-2024-38650、CVE-2024-39714、CVE-2024-39715、CVE-2024-38651漏洞描述:Veeam Service Provider Console存在多種漏洞,將允許攻擊者於易受影響之系統利用該漏洞,並導致遠端執行程式碼、任意上傳檔案。影響系統/版本:Veeam Service Provider Console 8.0.0.19552 and all earlier version 8 builds。Veeam Backup for Nutanix AHV、Veeam Backup for Oracle Linux Virtualization Manager and Red Hat VirtualizationCVE編號:CVE-2024-40718漏洞描述:Veeam Backup for Nutanix AHV & Veeam Backup for Oracle Linux Virtualization Manager and Red Hat Virtualization存在漏洞,將允許取的低權限的攻擊者,透過利用SSRF漏洞,進而提升權限。影響系統/版本:Veeam Backup for Nutanix AHV Plug-In 12.5.1.8 and all earlier verion 12 builds。Veeam Backup for Oracle Linux Virtualization Manager and Red Hat Virtualization Plug-In 12.4.1.45 and all earlier version 12 builds。https://www.kjintelligent.com/en/hot_499035.html[Cybersecurity Vulnerability Notice] Veeam2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_499035.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_499035.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_499032.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_499032.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_498816.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_498816.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】漏洞分享 - 思科產品存在多個漏洞思科產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務、繞過身份驗證、遠端執行程式碼及權限提升,其影響系統或版本如下:
Cisco NX-OS Software DHCPv6 Relay Agent Denial of Service Vulnerability
CVE編號:CVE-2024-20446漏洞描述:Cisco NX-OS的DHCPv6 relay agent存在漏洞,其將允許未經授權之攻擊者透過傳送精心製作的DHCPv6封包到易受影響系統上,並導致阻斷服務。影響系統/版本:有啟用DHCP功能的系統皆會自動啟用DHCPv6,故可能會受到影響。檢查方式:show run all | include "^ipv6 dhcp relay"、show ipv6 interface brief
Cisco NX-OS Software Python Sandbox Escape Vulnerabilities
CVE編號:CVE-2024-20284、CVE-2024-20285、CVE-2024-20286漏洞描述:Cisco NX-OS的Python interpreter存在漏洞,將允許已取得最低權限的攻擊者跳脫python沙箱並進行未經授權之存取行為。影響系統/版本:MDS 9000 Series Multilayer Switches Nexus 3000 Series Switches Nexus 5500 Platform Switches Nexus 5600 Platform SwitchesNexus 6000 Series SwitchesNexus 7000 Series SwitchesNexus 9000 Series Switches in standalone NX-OS mode
Cisco NX-OS Software Command Injection Vulnerability
CVE編號:CVE-2024-20289漏洞描述:Cisco NX-OS的CLI存在漏洞,其可能允許已取得最低權限的攻擊者,在易受影響系統上任意執行命令。影響系統/版本:Nexus 3000 Series SwitchesNexus 9000 Series Fabric Switches in ACI modeNexus 9000 Series Switches in standalone NX-OS modeUCS 6400 Series Fabric InterconnectsUCS 6500 Series Fabric Interconnects
Cisco NX-OS Software Bash Arbitrary Code Execution and Privilege Escalation Vulnerabilities
CVE編號:CVE-2024-20411、CVE-2024-20413漏洞描述:Cisco NX-OS2存在多個漏洞,其將允許已取得權限的攻擊者存取Bash Shell並且任意執行代碼,以及進行提權。影響系統/版本:Nexus 3000 Series SwitchesNexus 9000 Series Switches in standalone NX-OS mode檢查方式:show feature | include bash(確定bash是否有啟用)show running-config | include shelltype(確定使用者是否配置為在登入時使用 Bash shell)https://www.kjintelligent.com/en/hot_498725.html[Cybersecurity Vulnerability Notice] Cisco2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_498725.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_498725.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_498347.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_498347.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【雲智維資安預警通知】
漏洞分享 - Google Chrome 存在多個漏洞
Google Chrome 存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、篡改及遠端執行任意程式碼。受影響之系統/漏洞描述:Google Chrome 128.0.6613.119 (Linux) 之前的版本Google Chrome 128.0.6613.119/.120 (Mac) 之前的版本Google Chrome 128.0.6613.119/.120 (Windows) 之前的版本
漏洞分享 - 三星產品存在多個漏洞
三星產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況及洩露敏感資料。受影響之系統/漏洞描述:Exynos 980, Exynos 850, Exynos 1080, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 1480, Exynos W920, Exynos W930
漏洞分享 - Ubuntu Linux 內核存在多個漏洞
Ubuntu Linux核心存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況。受影響之系統/漏洞描述:Ubuntu 18.04 ESM
漏洞分享 - RedHat Linux核心存在多個漏洞
RedHat Linux核心存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發阻斷服務狀況、遠端執行任意程式碼、洩露敏感資料、繞過身份驗證及仿冒。受影響之系統/漏洞描述:Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.2 aarch64Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.2 s390xRed Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.2 ppc64leRed Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.2 x86_64Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.2 aarch64Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.2 aarch64Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.2 s390xRed Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.2 s390xRed Hat Enterprise Linux for Power, little endian - Extended Update Support 9.2 ppc64leRed Hat Enterprise Linux for Real Time for NFV for x86_64 - 4 years of updates 9.2 x86_64Red Hat Enterprise Linux for Real Time for x86_64 - 4 years of updates 9.2 x86_64Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.2 x86_64Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.2 x86_64Red Hat Enterprise Linux Server - AUS 8.4 x86_64Red Hat Enterprise Linux Server - AUS 9.2 x86_64Red Hat Enterprise Linux Server - TUS 8.4 x86_64Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64leRed Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.2 ppc64le
漏洞分享 - SUSE Linux 內核存在多個漏洞
SUSE Linux 內核存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發繞過身份驗證。受影響之系統/漏洞描述:Basesystem Module 15-SP5openSUSE Leap 15.5openSUSE Leap Micro 5.5SUSE Linux Enterprise Desktop 15 SP5SUSE Linux Enterprise High Performance Computing 15 SP5SUSE Linux Enterprise Micro 5.5SUSE Linux Enterprise Real Time 15 SP5SUSE Linux Enterprise Server 15 SP5SUSE Linux Enterprise Server for SAP Applications 15 SP5
漏洞分享 - 兆勤揭露無線基地台和資安路由器設備存在命令注入漏洞
於9月3日兆勤科技(Zyxel Networks)發布資安公告,其說明旗下部分部分Wi-Fi路由器設備存在重大層級漏洞(CVE-2024-7261),導致原因是在於路由器CGI程式,host參數的特殊元素出現處理不當(improper neutralization),故讓攻擊者有機會藉由發送特定cookie並在未經授權下執行作業系統命令。https://www.kjintelligent.com/en/hot_498345.html[Cybersecurity Vulnerability Notice] Google Chrome、Samsung、Ubuntu Linux、RedHat Linux、SUSE Linux、兆勤2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_498345.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_498345.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_497907.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_497907.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
KJ Intelligent and Cloud Intelligent Operation jointly launch cybersecurity integration solution
Defend against cyberattacks and help businesses effectively enhance their cybersecurity capabilities during the digital transformation process.https://www.kjintelligent.com/en/hot_496856.htmlKJ Intelligent and Cloud Intelligent Operation jointly launch cybersecurity integration solution2024-12-202025-12-20
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_496856.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_496856.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_497551.html
KJ Intelligent Corp.4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)https://www.kjintelligent.com/en/hot_497551.html