轉發 台灣電腦網路危機處理暨協調中心 資安訊息警訊 TWCERTCC-200-202604-00000028
[內容說明]
【CVE-2024-27199】JetBrains TeamCity Relative Path Traversal Vulnerability (CVSS v3.1: 7.3)
【是否遭勒索軟體利用:已知】 JetBrains TeamCity 存在相對路徑遍歷漏洞,可能導致能夠執行有限的管理員操作。
【CVE-2026-33825】Microsoft Defender Insufficient Granularity of Access Control Vulnerability (CVSS v3.1: 7.8)
【是否遭勒索軟體利用:未知】 Microsoft Defender 存在存取控制粒度不足漏洞,可能使已授權的攻擊者在本機進行權限提升。
【CVE-2026-39987】Marimo Remote Code Execution Vulnerability (CVSS v3.1: 9.8)
【是否遭勒索軟體利用:未知】 Marimo 存在預驗證遠端程式碼執行漏洞,允許未經驗證的攻擊者取得 shell 存取權限並執行任意系統指令。
【CVE-2025-29635】D-Link DIR-823X Command Injection Vulnerability (CVSS v3.1: 7.2)
【是否遭勒索軟體利用:未知】 D-Link DIR-823X 存在指令注入漏洞,允許經授權的攻擊者透過對 /goform/set_prohibiting 發送 POST 請求,在遠端裝置上執行任意指令。受影響產品可能已達生命週期終止(EoL)或服務終止(EoS)階段。建議使用者停止使用該產品。
【CVE-2024-7399】Samsung MagicINFO 9 Server Path Traversal Vulnerability (CVSS v3.1: 8.8)
【是否遭勒索軟體利用:未知】 Samsung MagicINFO 9 Server 存在路徑遍歷漏洞,可能使攻擊者以系統權限寫入任意檔案。
【CVE-2024-57728】SimpleHelp Path Traversal Vulnerability (CVSS v3.1: 7.2)
【是否遭勒索軟體利用:未知】 SimpleHelp 存在路徑遍歷漏洞,允許管理員使用者透過上傳特製的 ZIP 檔案將任意檔案上傳至檔案系統的任何位置。此漏洞可被利用,使攻擊者以 SimpleHelp 伺服器使用者的身分在主機上執行任意程式碼。
【CVE-2024-57726】SimpleHelp Missing Authorization Vulnerability (CVSS v3.1: 9.9)
【是否遭勒索軟體利用:未知】 SimpleHelp 存在授權缺失漏洞,可能使低權限技術人員建立具有過高權限的 API 金鑰。這些 API 金鑰可被用來將權限提升至伺服器管理員角色。
[影響平台]
【CVE-2024-27199】請參考官方所列的影響版本 https://www.jetbrains.com/privacy-security/issues-fixed/
【CVE-2026-33825】請參考官方所列的影響版本 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825
【CVE-2026-39987】請參考官方所列的影響版本 https://github.com/marimo-team/marimo/security/advisories/GHSA-2679-6mx9-h9xc
【CVE-2025-29635】 D-Link DIR-823X 240126、D-Link DIR-823X 240802
【CVE-2024-7399】請參考官方所列的影響版本 https://security.samsungtv.com/securityUpdates
【CVE-2024-57728】請參考官方所列的影響版本 https://guides.simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier
【CVE-2024-57726】請參考官方所列的影響版本 https://guides.simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier
[建議措施]
【CVE-2024-27199】 官方已針對漏洞釋出修復更新,請更新至相關版本 https://www.jetbrains.com/privacy-security/issues-fixed/
【CVE-2026-33825】 官方已針對漏洞釋出修復更新,請更新至相關版本 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825
【CVE-2026-39987】 官方已針對漏洞釋出修復更新,請更新至相關版本 https://github.com/marimo-team/marimo/security/advisories/GHSA-2679-6mx9-h9xc
【CVE-2025-29635】 受影響產品可能已達生命週期終止(EoL)或服務終止(EoS)階段,建議使用者停止使用該產品。
【CVE-2024-7399】 官方已針對漏洞釋出修復更新,請更新至相關版本 https://security.samsungtv.com/securityUpdates
【CVE-2024-57728】 官方已針對漏洞釋出修復更新,請更新至相關版本 https://guides.simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier
【CVE-2024-57726】 官方已針對漏洞釋出修復更新,請更新至相關版本 https://guides.simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier
Forwarded from Taiwan Computer Network Crisis Management and Coordination Center: Cybersecurity Alert TWCERTCC-200-202604-00000028
[Content Description]
【CVE-2024-27199】JetBrains TeamCity Relative Path Traversal Vulnerability (CVSS v3.1: 7.3)
【Exploited by Ransomware: Known】 A relative path traversal vulnerability exists in JetBrains TeamCity, potentially allowing limited administrator operations.
【CVE-2026-33825】Microsoft Defender Insufficient Granularity of Access Control Vulnerability (CVSS v3.1: 7.8)
【Exploited by Ransomware: Unknown】 A vulnerability exists in Microsoft Defender that lacks sufficient granularity of access control, potentially allowing an authorized attacker to escalate privileges on the local machine.
【CVE-2026-39987】Marimo Remote Code Execution Vulnerability (CVSS v3.1: 9.8)
【Exploited by Ransomware: Unknown】 Marimo contains a pre-verified remote code execution vulnerability, allowing unverified attackers to gain shell access and execute arbitrary system commands.
【CVE-2025-29635】D-Link DIR-823X Command Injection Vulnerability (CVSS v3.1: 7.2)
【Exploited by Ransomware: Unknown】 D-Link DIR-823X contains a command injection vulnerability, allowing authorized attackers to execute arbitrary commands on a remote device by sending a POST request to /goform/set_prohibiting. Affected products may have reached End-of-Life (EoL) or End-of-Service (EoS) stages. Users are advised to stop using this product.
【CVE-2024-7399】Samsung MagicINFO 9 Server Path Traversal Vulnerability (CVSS v3.1: 8.8)
【Ransomware Exploitation Possibility: Unknown】 A path traversal vulnerability exists in Samsung MagicINFO 9 Server, potentially allowing attackers to write arbitrary files with system privileges.
【CVE-2024-57728】SimpleHelp Path Traversal Vulnerability (CVSS v3.1: 7.2)
【Ransomware Exploitation Possibility: Unknown】 A path traversal vulnerability exists in SimpleHelp, allowing administrators to upload arbitrary files to any location on the file system by uploading specially crafted ZIP files. This vulnerability can be exploited to allow attackers to execute arbitrary code on the host machine posing as a SimpleHelp server user.
【CVE-2024-57726】SimpleHelp Missing Authorization Vulnerability (CVSS v3.1: 9.9)
【Exploitation by Ransomware: Unknown】 SimpleHelp contains a missing authorization vulnerability that could allow low-privilege technical personnel to create API keys with excessively high privileges. These API keys could then be used to escalate privileges to server administrator roles.
[Affected Platforms]
【CVE-2024-27199】Please refer to the official list of affected versions: https://www.jetbrains.com/privacy-security/issues-fixed/
【CVE-2026-33825】Please refer to the official list of affected versions: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825
【CVE-2026-39987】Please refer to the official list of affected versions: https://github.com/marimo-team/marimo/security/advisories/GHSA-2679-6mx9-h9xc
【CVE-2025-29635】D-Link DIR-823X 240126, D-Link DIR-823X 240802
【CVE-2024-7399】Please refer to the official affected versions listed here: https://security.samsungtv.com/securityUpdates
【CVE-2024-57728】Please refer to the official affected versions listed here: https://guides.simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier
【CVE-2024-57726】Please refer to the official affected versions listed here: https://guides.simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier
[Recommended Actions]
【CVE-2024-27199】Official updates have been released to fix the vulnerability. Please update to the relevant version: https://www.jetbrains.com/privacy-security/issues-fixed/
【CVE-2026-33825】Official updates have been released to fix the vulnerability. Please update to the relevant version: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825
【CVE-2026-39987】Official updates have been released to fix the vulnerability. Please update to the relevant version: https://github.com/marimo-team/marimo/security/advisories/GHSA-2679-6mx9-h9xc
【CVE-2025-29635】Affected products may have reached End-of-Life (EoL) or End-of-Service (EoS) stages. Users are advised to stop using the product.
【CVE-2024-7399】An official patch update has been released for this vulnerability. Please update to the relevant version: https://security.samsungtv.com/securityUpdates
【CVE-2024-57728】An official patch update has been released for this vulnerability. Please update to the relevant version: https://guides.simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier
【CVE-2024-57726】An official patch update has been released for this vulnerability. Please update to the relevant version: https://guides.simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier