【資安漏洞預警】CISA新增3個已知遭駭客利用之漏洞至KEV目錄(2025/08/04-2025/08/10)
[Security Vulnerability Alert] CISA has added three known vulnerabilities to the KEV catalog (August 4-10, 2025)

發布單位:圖資處數位服務組
日期範圍:2025/8/12 ~ 2026/2/12
 
發布單位:圖資處數位服務組
日期範圍:2025/8/12 ~ 2026/2/12
行政 行政公告
全體

轉發 台灣電腦網路危機處理暨協調中心 TWCERTCC-200-202508-00000006

[內容說明]
1.【CVE-2020-25078】D-Link DCS-2530L and DCS-2670L Devices Unspecified Vulnerability (CVSS v3.1: 7.5)
【是否遭勒索軟體利用:未知】 D-Link DCS-2530L和DCS-2670L裝置存在一個未具體說明的漏洞,可能導致遠端管理員密碼洩露。
【影響平台】請參考官方所列的影響版本
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10180

2.【CVE-2020-25079】D-Link DCS-2530L and DCS-2670L Command Injection Vulnerability (CVSS v3.1: 8.8)
【是否遭勒索軟體利用:未知】 D-Link DCS-2530L和DCS-2670L裝置在cgi-bin/ddns_enc.cgi存在指令注入漏洞。
【影響平台】請參考官方所列的影響版本
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10180

3.【CVE-2022-40799】D-Link DNR-322L Download of Code Without Integrity Check Vulnerability (CVSS v3.1: 8.8)
【是否遭勒索軟體利用:未知】 D-Link DNR-322L存在下載程式碼時未進行完整性檢查漏洞,可能允許已驗證的攻擊者在裝置上執行作業系統層級的指令。
【影響平台】 D-Link DNR-322L 2.60B15(含)之前的版本

[影響平台]
詳細內容於內容說明欄之影響平台

[建議措施]
1.【CVE-2020-25078】
受影響的產品可能已達到產品生命週期終點(EoL)和/或終止服務(EoS)。建議使用者停止使用這些產品。

2.【CVE-2020-25079】
受影響的產品可能已達到產品生命週期終點(EoL)和/或終止服務(EoS)。建議使用者停止使用這些產品。

3.【CVE-2022-40799】
受影響的產品可能已達到產品生命週期終點(EoL)和/或終止服務(EoS)。建議使用者停止使用這些產品。

Forwarded by Taiwan Computer Network Crisis Response and Coordination Center (TWCERTCC-200-202508-00000006)

[Description]
1. [CVE-2020-25078] D-Link DCS-2530L and DCS-2670L Devices Unspecified Vulnerability (CVSS v3.1: 7.5)
[Exploited by ransomware: Unknown] D-Link DCS-2530L and DCS-2670L devices have an unspecified vulnerability that may lead to remote administrator password disclosure.
[Affected Platforms] Please refer to the official list of affected versions.
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10180

2. [CVE-2020-25079] D-Link DCS-2530L and DCS-2670L Command Injection Vulnerability (CVSS v3.1: 8.8)
[Exploited by Ransomware: Unknown] The D-Link DCS-2530L and DCS-2670L devices have a command injection vulnerability in cgi-bin/ddns_enc.cgi.
[Affected Platforms] Please refer to the official list of affected versions.
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10180

3. [CVE-2022-40799] D-Link DNR-322L Download of Code Without Integrity Check Vulnerability (CVSS v3.1: 8.8)
[Exploited by Ransomware: Unknown] The D-Link DNR-322L has a vulnerability in code downloading without integrity checking, which could allow an authenticated attacker to execute operating system-level commands on the device.
[Affected Platforms] D-Link DNR-322L versions prior to 2.60B15

[Affected Platforms]
Details are in the Affected Platforms section of the Content Description column.

[Recommended Actions]
1. [CVE-2020-25078]
The affected products may have reached End of Life (EoL) and/or End of Service (EoS). Users are advised to discontinue use of these products.

2. [CVE-2020-25079]
The affected products may have reached End of Life (EoL) and/or End of Service (EoS). Users are advised to discontinue use of these products.

3. [CVE-2022-40799]
The affected products may have reached End of Life (EoL) and/or End of Service (EoS). Users are advised to discontinue use of these products.


相關附件
Top↑