Home
1
Hot News
2
Information Security
3
[Cybersecurity Vulnerability Notice] Splunk4
https://www.kjintelligent.com/en/ KJ Intelligent Corp.
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.)
【出處:台灣電腦緊急應變小組 TWCert】微軟針對旗下產品Exchange Server發布重大資安漏洞公告(CVE-2025-59249,CVSS:8.8),此漏洞為弱身分驗證漏洞,允許經授權的攻擊透過網路提升權限。◎建議措施:根據官方網站釋出解決方式進行修補:https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59249◎相關IOC資訊:◎備註:◎參考資料:1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-592492. https://nvd.nist.gov/vuln/detail/CVE-2025-59249 https://www.kjintelligent.com/en/hot_524286.html [TWCERT 分享資安情資]_Microsoft Exchange Server 存在重大資安漏洞(CVE-2025-59249) 2025-10-21 2026-10-21
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_524286.html
KJ Intelligent Corp. 4F. 5A, No. 7, Sec. 3, New Taipei Blvd., Xinzhuang Dist., New Taipei City 242032 , Taiwan (R.O.C.) https://www.kjintelligent.com/en/hot_524286.html
https://schema.org/EventMovedOnline https://schema.org/OfflineEventAttendanceMode
2025-10-21 http://schema.org/InStock TWD 0 https://www.kjintelligent.com/en/hot_524286.html


【雲智維資安預警通知】

  • 漏洞分享 - Splunk 產品存在多個漏洞
Splunk 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發跨網站指令碼、遠端執行程式碼、繞過身份驗證、敏感資料洩露及資料篡改,其影響系統或版本如下:

  • 受影響之系統/漏洞描述:
  • Splunk Enterprise 9.4.1, 9.3.3, 9.2.5 和 9.1.8 及之前的版本
  • Splunk Cloud Platform 9.1.2308.214 及之前的版本, 9.1.2312.208 及之前的版本, 9.2.2403.115 及之前的版本, 9.2.2403.100 至 9.2.2403.112 版本, 9.2.2406.100 至 9.2.2406.112 版本, 9.3.2408.100 至 9.3.2408.106 版本
  • Splunk Secure Gateway app versions 3.8.38 及之前的版本 和 3.7.23 及之前的版本
  • Splunk App for Data Science and Deep Learning 5.1.2, 5.1.1 和 5.1.0 版本
  • Splunk App for Lookup File Editing 4.0.5 及之前的版本
  • Splunk DB Connect 4.0.0 及之前的版本
  • Splunk Add-on for Microsoft Cloud Services 5.4.4 及之前的版本
  • Splunk Infrastructure Monitoring Add-on 1.2.7 及之前的版本

  • 建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新。

情資報告連結:
https://advisory.splunk.com//advisories/SVD-2025-0301
https://advisory.splunk.com//advisories/SVD-2025-0302
https://advisory.splunk.com//advisories/SVD-2025-0303
https://advisory.splunk.com//advisories/SVD-2025-0304
https://advisory.splunk.com//advisories/SVD-2025-0305
https://advisory.splunk.com//advisories/SVD-2025-0306
https://advisory.splunk.com//advisories/SVD-2025-0307
https://advisory.splunk.com//advisories/SVD-2025-0308
https://advisory.splunk.com//advisories/SVD-2025-0309
https://advisory.splunk.com//advisories/SVD-2025-0310
https://advisory.splunk.com//advisories/SVD-2025-0311
https://advisory.splunk.com//advisories/SVD-2025-0312
https://advisory.splunk.com//advisories/SVD-2025-0313






Previous Back to List Next