Home
1
Hot News
2
Information Security
3
[Cybersecurity Vulnerability Notice] SonicOS4
https://www.kjintelligent.com/en/ KJ Intelligent Corp.
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【出處:台灣電腦緊急應變小組 TWCert】【CVE-2025-6543】Citrix NetScaler ADC and Gateway Buffer Overflow Vulnerability (CVSS v3.1: 9.8)【是否遭勒索軟體利用:未知】Citrix NetScaler ADC和Gateway存在緩衝區溢位漏洞,可能導致非預期的控制流程改變及阻斷服務。【CVE-2025-48928】TeleMessage TM SGNL Exposure of Core Dump File to an Unauthorized Control Sphere Vulnerability (CVSS v3.1:4.0)【是否遭勒索軟體利用:未知】TeleMessage TM SGNL存在核心轉儲檔案暴露於未經授權控制範圍的漏洞。可能透過包含身分驗證資料的記憶體轉儲檔案洩漏敏感資訊。【CVE-2025-48927】TeleMessage TM SGNL Initialization of a Resource with an Insecure Default Vulnerability (CVSS v3.1: 5.3)【是否遭勒索軟體利用:未知】TeleMessage TM SGNL存在以不安全預設值初始化資源的漏洞。此漏洞與Spring Boot Actuator的設定方式有關,當堆轉儲端點暴露於/heapdump URI時,可能導致安全風險。【CVE-2025-6554】Google Chromium V8 Type Confusion Vulnerability (CVSS v3.1: 8.1)【是否遭勒索軟體利用:未知】Google Chromium V8存在類型混淆漏洞,遠端攻擊者可透過特製的HTML網頁執行任意讀寫。此漏洞可能影響多種使用Chromium的網頁瀏覽器,包括但不限於Google Chrome、Microsoft Edge及Opera。◎建議措施:【CVE-2025-6543】官方已針對漏洞釋出修復更新,請更新至相關版本https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788【CVE-2025-48928】受影響的產品暫無有效緩解措施。建議使用者停止使用相關產品。【CVE-2025-48927】受影響的產品暫無有效緩解措施。建議使用者停止使用相關產品。【CVE-2025-6554】官方已針對漏洞釋出修復更新,請更新至相關版本https://chromereleases.googleblog.com/2025/06/stable-channelupdate-for-desktop_30.html◎相關IOC資訊:◎備註:◎參考資料:【CVE-2025-6543】1.https://nvd.nist.gov/vuln/detail/cve-2025-65432.https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788【CVE-2025-48928】1.https://nvd.nist.gov/vuln/detail/cve-2025-489282.https://www.wired.com/story/hoTLP: CLEAR TWCERT-TWISAC-202507-0019w-the-signal-knock-off-app-telemessage-got-hacked-in-20-minutes/【CVE-2025-48927】1.https://nvd.nist.gov/vuln/detail/cve-2025-489272.https://www.wired.com/story/how-the-signal-knock-off-app-telemessage-got-hacked-in-20-minutes/【CVE-2025-6554】1.https://nvd.nist.gov/vuln/detail/cve-2025-65542.https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_30.html https://www.kjintelligent.com/en/hot_519063.html [TWCERT 分享資安情資] CISA新增4個已知遭駭客利用之漏洞至KEV目錄(2025/06/30-2025/07/06) 2025-07-09 2026-07-09
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_519063.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_519063.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2025-07-09 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_519063.html


【雲智維資安預警通知】

  • 漏洞分享 - SonicOS 存在Integer-Based Buffer Overflow漏洞
SonicOS 存在Integer-Based Buffer Overflow漏洞,其將允許遠端攻擊者在特殊情況下透過IPsec利用該漏洞,並造成阻斷服務,以及透過精心製作的IKEv2 payload觸發任意執行代碼,其影響系統或版本如下:

  • 受影響之系統/漏洞描述:
  • Gen6 NSv - NSv10, NSv25, NSv50, NSv100, NSv200, NSv300, NSv400, NSv800, NSv1600
6.5.4.4-44v-21-2395 and older versions
  • Gen7 - TZ270, TZ270W, TZ370, TZ370W, TZ470, TZ470W, TZ570, TZ570W, TZ570P, TZ670, NSa 2700, NSa 3700, NSa 4700, NSa 5700, NSa 6700, NSsp 10700, NSsp 11700, NSsp 13700, NSsp 15700, NSv 270, NSv 470, NSv 870
7.0.1-5151 and older versions
7.1.1-7051 and older versions


  • 建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新:
  1. 請將 Gen6 NSv - NSv10, NSv25, NSv50, NSv100, NSv200, NSv300, NSv400, NSv800, NSv1600 更新至6.5.4.v-21s-RC2457或更高版本。
  2. 請將 Gen7 - TZ270, TZ270W, TZ370, TZ370W, TZ470, TZ470W, TZ570, TZ570W, TZ570P, TZ670, NSa 2700, NSa 3700,NSa 4700, NSa 5700, NSa 6700, NSsp 10700, NSsp 11700, NSsp 13700, NSsp 15700, NSv 270, NSv 470, NSv 870之7.0.1-5151(含)以前版本更新至7.0.1-5165或更高版本。
  3. 請將 Gen7 - TZ270, TZ270W, TZ370, TZ370W, TZ470, TZ470W, TZ570, TZ570W, TZ570P, TZ670, NSa 2700, NSa 3700,NSa 4700, NSa 5700, NSa 6700, NSsp 10700, NSsp 11700, NSsp 13700, NSsp 15700, NSv 270, NSv 470, NSv 870之7.1.1-7051(含)以前版本更新至7.1.3-7015或更高版本。

情資報告連結:
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0013

Previous Back to List Next