【資安漏洞預警】CISA新增11個已知遭駭客利用之漏洞至KEV目錄(2026/02/09-2026/02/15)
[Security Vulnerability Alert] CISA adds 11 known vulnerabilities exploited by hackers to the KEV directory (2026/02/09-2026/02/15)

發布單位:圖資處數位服務組
日期範圍:2026/2/25 ~ 2026/9/25
 
發布單位:圖資處數位服務組
日期範圍:2026/2/25 ~ 2026/9/25
行政 行政公告
全體

轉發 台灣電腦網路危機處理暨協調中心 資安訊息警訊 TWCERTCC-200-202602-00000009

[內容說明]
【CVE-2026-21513】Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability (CVSS v3.1: 8.8)
【是否遭勒索軟體利用:未知】 Microsoft MSHTML Framework 存在保護機制失效漏洞,可能允許未經授權的攻擊者透過網路繞過安全功能。
【CVE-2026-21525】Microsoft Windows NULL Pointer Dereference Vulnerability (CVSS v3.1: 6.2)
【是否遭勒索軟體利用:未知】 Microsoft Windows Remote Access Connection Manager 存在空指標解引用漏洞,可能允許未經授權的攻擊者在本機造成服務阻斷。

【CVE-2026-21510】Microsoft Windows Shell Protection Mechanism Failure Vulnerability (CVSS v3.1: 8.8)
【是否遭勒索軟體利用:未知】 Microsoft Windows Shell 存在保護機制失效漏洞,可能允許未經授權的攻擊者透過網路繞過安全功能。

【CVE-2026-21533】Microsoft Windows Improper Privilege Management Vulnerability (CVSS v3.1: 7.8)
【是否遭勒索軟體利用:未知】 Microsoft Windows Remote Desktop Services 存在不當權限管理漏洞,可能允許已授權的攻擊者在本機提升權限。

【CVE-2026-21519】Microsoft Windows Type Confusion Vulnerability (CVSS v3.1: 7.8)
【是否遭勒索軟體利用:未知】 Microsoft Desktop Windows Manager 存在類型混淆漏洞,可能允許已授權的攻擊者在本機提升權限。

【CVE-2026-21514】Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability (CVSS v3.1: 7.8)
【是否遭勒索軟體利用:未知】 Microsoft Office Word 在安全決策中依賴不受信任的輸入,可能允許已授權的攻擊者在本機提升權限。

【CVE-2026-20700】Apple Multiple Buffer Overflow Vulnerability (CVSS v3.1: 7.8)
【是否遭勒索軟體利用:未知】 Apple iOS、macOS、tvOS、watchOS 及 visionOS 存在緩衝區溢位漏洞,可能允許具備記憶體寫入權限的攻擊者執行任意程式碼。

【CVE-2024-43468】Microsoft Configuration Manager SQL Injection Vulnerability (CVSS v3.1: 9.8)
【是否遭勒索軟體利用:未知】 Microsoft Configuration Manager 存在SQL 注入漏洞。未經驗證的攻擊者可透過向目標環境發送特製請求,於伺服器及/或底層資料庫上執行指令。

【CVE-2025-15556】Notepad++ Download of Code Without Integrity Check Vulnerability (CVSS v3.1: 7.5)
【是否遭勒索軟體利用:未知】 Notepad++ 在使用 WinGUp 更新程式時,存在未經完整性檢查的程式碼下載漏洞,可能允許攻擊者攔截或重新導向更新流量,進而下載並執行攻擊者控制的安裝程式。
此漏洞可能導致攻擊者以使用者權限執行任意程式碼。

【CVE-2025-40536】SolarWinds Web Help Desk Security Control Bypass Vulnerability (CVSS v3.1: 8.1)
【是否遭勒索軟體利用:未知】 SolarWinds Web Help Desk 存在安全控制繞過漏洞,可能允許未經驗證的攻擊者存取部分受限功能。

【CVE-2026-1731】BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) OS Command Injection Vulnerability (CVSS v3.1: 9.8)
【是否遭勒索軟體利用:是】 BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) 存在作業系統指令注入漏洞。
該漏洞可能允許未經驗證的遠端攻擊者以網站使用者的身份執行作業系統指令。
此漏洞無需驗證或使用者互動即可利用,可能導致系統遭入侵,包括未經授權存取、資料外洩及服務中斷。

[影響平台]
【CVE-2026-21513】請參考官方所列的影響版本 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21513

【CVE-2026-21525】請參考官方所列的影響版本 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21525

【CVE-2026-21510】請參考官方所列的影響版本 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21510

【CVE-2026-21533】請參考官方所列的影響版本 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21533

【CVE-2026-21519】請參考官方所列的影響版本 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21519

【CVE-2026-21514】請參考官方所列的影響版本 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21514

【CVE-2026-20700】請參考官方所列的影響版本 https://support.apple.com/en-us/100100

【CVE-2024-43468】請參考官方所列的影響版本 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43468

【CVE-2025-15556】請參考官方所列的影響版本 https://notepad-plus-plus.org//news//clarification-security-incident/

【CVE-2025-40536】請參考官方所列的影響版本 https://www.solarwinds.com/trust-center/security-advisories/cve-2025-40536

【CVE-2026-1731】請參考官方所列的影響版本 https://www.beyondtrust.com/trust-center/security-advisories/bt26-02

[建議措施]
【CVE-2026-21513】 官方已針對漏洞釋出修復更新,請更新至相關版本 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21513

【CVE-2026-21525】 官方已針對漏洞釋出修復更新,請更新至相關版本 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21525

【CVE-2026-21510】 官方已針對漏洞釋出修復更新,請更新至相關版本 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21510

【CVE-2026-21533】 官方已針對漏洞釋出修復更新,請更新至相關版本 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21533

【CVE-2026-21519】 官方已針對漏洞釋出修復更新,請更新至相關版本 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21519

【CVE-2026-21514】 官方已針對漏洞釋出修復更新,請更新至相關版本 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21514

【CVE-2026-20700】 官方已針對漏洞釋出修復更新,請更新至相關版本 https://support.apple.com/en-us/100100

【CVE-2024-43468】 官方已針對漏洞釋出修復更新,請更新至相關版本 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43468

【CVE-2025-15556】 官方已針對漏洞釋出修復更新,請更新至相關版本 https://notepad-plus-plus.org//news//clarification-security-incident/

【CVE-2025-40536】 官方已針對漏洞釋出修復更新,請更新至相關版本 https://www.solarwinds.com/trust-center/security-advisories/cve-2025-40536

【CVE-2026-1731】 官方已針對漏洞釋出修復更新,請更新至相關版本 https://www.beyondtrust.com/trust-center/security-advisories/bt26-02

Forwarded from Taiwan Computer Network Crisis Management and Coordination Center: Cybersecurity Alert TWCERTCC-200-202602-00000009

[Content Description]
【CVE-2026-21513】Microsoft MSHTML Framework Protection Mechanism Failure Vulnerability (CVSS v3.1: 8.8)
【Exploited by Ransomware: Unknown】 A vulnerability exists in the Microsoft MSHTML Framework that weakens its protection mechanism, potentially allowing unauthorized attackers to bypass security features over the network.

【CVE-2026-21525】Microsoft Windows NULL Pointer Dereference Vulnerability (CVSS v3.1: 6.2)
【Exploited by Ransomware: Unknown】 A vulnerability exists in Microsoft Windows Remote Access Connection Manager that dereferences a null pointer, potentially allowing unauthorized attackers to cause service disruption on the local machine.

【CVE-2026-21510】Microsoft Windows Shell Protection Mechanism Failure Vulnerability (CVSS v3.1: 8.8)
【Ransomware Exploitation Possibility: Unknown】 A vulnerability exists in the Microsoft Windows Shell that compromises its protection mechanism, potentially allowing unauthorized attackers to bypass security features over a network.

【CVE-2026-21533】Microsoft Windows Improper Privilege Management Vulnerability (CVSS v3.1: 7.8)
【Ransomware Exploitation Possibility: Unknown】 A vulnerability exists in Microsoft Windows Remote Desktop Services that compromises privileges, potentially allowing authorized attackers to escalate privileges on the local machine.

【CVE-2026-21519】Microsoft Windows Type Confusion Vulnerability (CVSS v3.1: 7.8)
【Ransomware Exploitation Possibility: Unknown】 A vulnerability exists in Microsoft Desktop Windows Manager that compromises privileges, potentially allowing authorized attackers to escalate privileges on the local machine.

【CVE-2026-21514】Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability (CVSS v3.1: 7.8)
【Ransomware Exploitation: Unknown】 Microsoft Office Word relies on untrusted input in a security decision, potentially allowing an authorized attacker to escalate privileges on the local machine.

【CVE-2026-20700】Apple Multiple Buffer Overflow Vulnerability (CVSS v3.1: 7.8)
【Ransomware Exploitation: Unknown】 Apple iOS, macOS, tvOS, watchOS, and visionOS contain a buffer overflow vulnerability that could allow an attacker with write access to memory to execute arbitrary code.

【CVE-2024-43468】Microsoft Configuration Manager SQL Injection Vulnerability (CVSS v3.1: 9.8)
【Ransomware Exploitation: Unknown】 Microsoft Configuration Manager contains an SQL injection vulnerability. An unauthenticated attacker could execute commands on the server and/or underlying database by sending specially crafted requests to the target environment.

【CVE-2025-15556】Notepad++ Download of Code Without Integrity Check Vulnerability (CVSS v3.1: 7.5)
【Exploited by Ransomware: Unknown】 A vulnerability exists in Notepad++ that allows unauthenticated attackers to download code without integrity checks when using the WinGUp update program. This could allow attackers to intercept or redirect update traffic, thereby downloading and executing an attacker-controlled installer.

This vulnerability could allow attackers to execute arbitrary code with user privileges.

【CVE-2025-40536】SolarWinds Web Help Desk Security Control Bypass Vulnerability (CVSS v3.1: 8.1)
【Exploited by Ransomware: Unknown】 A security control bypass vulnerability exists in SolarWinds Web Help Desk, which could allow unauthenticated attackers to access some restricted functions.

【CVE-2026-1731】BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) OS Command Injection Vulnerability (CVSS v3.1: 9.8)
【Exploited by Ransomware: Yes】 An operating system command injection vulnerability exists in BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA).

This vulnerability could allow an unauthenticated remote attacker to execute operating system commands as a website user.

This vulnerability can be exploited without authentication or user interaction, potentially leading to system intrusion, including unauthorized access, data breaches, and service interruptions.

[Affected Platforms]
【CVE-2026-21513】Please refer to the official list of affected versions: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21513

【CVE-2026-21525】Please refer to the official list of affected versions: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21525

【CVE-2026-21510】Please refer to the official list of affected versions: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21510

【CVE-2026-21533】Please refer to the official list of affected versions: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21533 [CVE-2026-21519] Please refer to the official affected versions listed here: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21519

【CVE-2026-21514】Please refer to the official affected versions listed here: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21514

【CVE-2026-20700】Please refer to the official affected versions listed here: https://support.apple.com/en-us/100100

【CVE-2024-43468】Please refer to the official affected versions listed here: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43468

【CVE-2025-15556】Please refer to the official affected versions listed here. https://notepad-plus-plus.org//news//clarification-security-incident/

【CVE-2025-40536】Please refer to the affected versions listed by the official documentation: https://www.solarwinds.com/trust-center/security-advisories/cve-2025-40536

【CVE-2026-1731】Please refer to the affected versions listed by the official documentation: https://www.beyondtrust.com/trust-center/security-advisories/bt26-02

[Recommended Actions]
【CVE-2026-21513】An official patch update has been released for this vulnerability. Please update to the relevant version: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21513

【CVE-2026-21525】An official patch update has been released for this vulnerability. Please update to the relevant version. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21525

【CVE-2026-21510】 An official patch update has been released for this vulnerability. Please update to the relevant version. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21510

【CVE-2026-21533】An official patch update has been released for this vulnerability. Please update to the relevant version. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21533

【CVE-2026-21519】An official patch update has been released for this vulnerability. Please update to the relevant version. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21519 【CVE-2026-21514】 An official patch update has been released for this vulnerability. Please update to the relevant version: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21514

【CVE-2026-20700】An official patch update has been released for this vulnerability. Please update to the relevant version: https://support.apple.com/en-us/100100

【CVE-2024-43468】An official patch update has been released for this vulnerability. Please update to the relevant version: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43468

【CVE-2025-15556】An official patch update has been released for this vulnerability. Please update to the relevant version: https://notepad-plus-plus.org//news//clarification-security-incident/ [CVE-2025-40536] An official patch update has been released for this vulnerability. Please update to the relevant version: https://www.solarwinds.com/trust-center/security-advisories/cve-2025-40536

【CVE-2026-1731】An official patch update has been released for this vulnerability. Please update to the relevant version: https://www.beyondtrust.com/trust-center/security-advisories/bt26-02


相關附件
Top↑