【資安漏洞預警】CISA新增5個已知遭駭客利用之漏洞至KEV目錄(2025/08/25-2025/08/31)
[Security Vulnerability Alert] CISA adds 5 known vulnerabilities to the KEV catalog (August 25-31, 2025)

發布單位:圖資處數位服務組
日期範圍:2025/9/4 ~ 2026/3/4
 
發布單位:圖資處數位服務組
日期範圍:2025/9/4 ~ 2026/3/4
行政 行政公告
全體

轉發 台灣電腦網路危機處理暨協調中心 TWCERTCC-200-202509-00000001

[內容說明]
1.【CVE-2025-48384】Git Link Following Vulnerability (CVSS v31: 8.0)
【是否遭勒索軟體利用:未知】 Git存在連結追蹤漏洞,該漏洞源於Git對設定檔中carriage return characters的處理不一致。
【影響平台】請參考官方所列的影響版本
https://github.com/git/git/security/advisories/GHSA-vwqx-4fm8-6qc9

2.【CVE-2024-8068】Citrix Session Recording Improper Privilege Management Vulnerability (CVSS v3.1: 8.0)
【是否遭勒索軟體利用:未知】 Citrix Session Recording存在權限管理不當漏洞,可能導致權限提升至NetworkService帳戶存取層級。
【影響平台】請參考官方所列的影響版本
https://support.citrix.com/support-home/home

3.【CVE-2024-8069】Citrix Session Recording Deserialization of Untrusted Data Vulnerability (CVSS v3.1: 8.0)
【是否遭勒索軟體利用:未知】 Citrix Session Recording存在未經信任資料反序列化漏洞,可能允許在NetworkService帳戶權限下執行有限的遠端程式碼。
【影響平台】請參考官方所列的影響版本
https://support.citrix.com/support-home/home

4.【CVE-2025-7775】Citrix NetScaler Memory Overflow Vulnerability (CVSS v3.1: 9.8)
【是否遭勒索軟體利用:未知】 Citrix NetScaler ADC和NetScaler Gateway存在記憶體溢位漏洞,可能導致遠端程式碼執行及/或阻斷服務攻擊。
【影響平台】請參考官方所列的影響版本
https://support.citrix.com/support-home/home

5.【CVE-2025-57819】Sangoma FreePBX Authentication Bypass Vulnerability (CVSS v4.0: 10.0)
【是否遭勒索軟體利用:未知】 Sangoma FreePBX存在身分驗證繞過漏洞,由於在處理使用者提供的輸入資料時未進行充分的驗證與清理,攻擊者可在未經驗證的情況下存取 FreePBX 管理介面,進而引發任意資料庫操作及遠端程式碼執行。
【影響平台】請參考官方所列的影響版本
https://github.com/FreePBX/security-reporting/security/advisories/GHSA-m42g-xg4c-5f3h

[影響平台]
詳細內容於內容說明欄之影響平台

[建議措施]
1.【CVE-2025-48384】 官方已針對漏洞釋出修復更新,請更新至相關版本
https://github.com/git/git/security/advisories/GHSA-vwqx-4fm8-6qc9

2.【CVE-2024-8068】 官方已針對漏洞釋出修復更新,請更新至相關版本
https://support.citrix.com/support-home/home

3.【CVE-2024-8069】 官方已針對漏洞釋出修復更新,請更新至相關版本
https://support.citrix.com/support-home/home

4.【CVE-2025-7775】 官方已針對漏洞釋出修復更新,請更新至相關版本
https://support.citrix.com/support-home/home

5.【CVE-2025-57819】 官方已針對漏洞釋出修復更新,請更新至相關版本
https://github.com/FreePBX/security-reporting/security/advisories/GHSA-m42g-xg4c-5f3h

Forwarded by Taiwan Computer Network Crisis Response and Coordination Center (TWCERTCC-200-202509-00000001)

[Description]
1. [CVE-2025-48384] Git Link Following Vulnerability (CVSS v31: 8.0)
[Exploited by ransomware: Unknown] Git has a link following vulnerability due to inconsistent handling of carriage return characters in configuration files.
[Affected Platforms] Please refer to the official list of affected versions.
https://github.com/git/git/security/advisories/GHSA-vwqx-4fm8-6qc9

2. [CVE-2024-8068] Citrix Session Recording Improper Privilege Management Vulnerability (CVSS v3.1: 8.0)
[Exploited by Ransomware: Unknown] Citrix Session Recording contains an improper privilege management vulnerability that could result in privilege escalation to the NetworkService account's access level.
[Affected Platforms] Please refer to the official list of affected versions.

https://support.citrix.com/support-home/home

3. [CVE-2024-8069] Citrix Session Recording Deserialization of Untrusted Data Vulnerability (CVSS v3.1: 8.0)

[Exploited by Ransomware: Unknown] An untrusted data deserialization vulnerability in Citrix Session Recording could allow limited remote code execution with the NetworkService account's privileges.
[Affected Platforms] Please refer to the official list of affected versions.

https://support.citrix.com/support-home/home

4. [CVE-2025-7775] Citrix NetScaler Memory Overflow Vulnerability (CVSS v3.1: 9.8)

[Exploited by Ransomware: Unknown] A memory overflow vulnerability exists in Citrix NetScaler ADC and NetScaler Gateway, potentially leading to remote code execution and/or denial of service.
[Affected Platforms] Please refer to the official list of affected versions.

https://support.citrix.com/support-home/home

5. [CVE-2025-57819] Sangoma FreePBX Authentication Bypass Vulnerability (CVSS v4.0: 10.0)

[Exploited by Ransomware: Unknown] Sangoma FreePBX has an authentication bypass vulnerability. Due to insufficient validation and sanitization of user-supplied input, an attacker can access the FreePBX management interface without authentication, potentially causing arbitrary database operations and remote code execution.
[Affected Platforms] Please refer to the official affected versions listed.

https://github.com/FreePBX/security-reporting/security/advisories/GHSA-m42g-xg4c-5f3h

[Affected Platforms]
For details, please refer to the affected platforms in the description section.

[Recommended Actions]
1. [CVE-2025-48384] A fix has been released for this vulnerability. Please update to the relevant version.

https://github.com/git/git/security/advisories/GHSA-vwqx-4fm8-6qc9

2. [CVE-2024-8068] A fix has been released for this vulnerability. Please update to the relevant version.

https://support.citrix.com/support-home/home

3. [CVE-2024-8069] A fix has been released for this vulnerability. Please update to the relevant version.
https://support.citrix.com/support-home/home

4. [CVE-2025-7775] A fix has been released for this vulnerability. Please update to the relevant version.

https://support.citrix.com/support-home/home

5. [CVE-2025-57819] A fix has been released for this vulnerability. Please update to the relevant version.

https://github.com/FreePBX/security-reporting/security/advisories/GHSA-m42g-xg4c-5f3h


相關附件
Top↑