轉發 台灣電腦網路危機處理暨協調中心 資安訊息警訊 TWCERTCC-200-202605-00000010
[內容說明]
【CVE-2026-0300】Palo Alto Networks PAN-OS Out-of-bounds Write Vulnerability (CVSS v3.1: 9.8)
【是否遭勒索軟體利用:未知】 Palo Alto Networks 的 PAN-OS 在 User-ID Authentication Portal 服務中存在越界寫入漏洞。未經驗證的攻擊者可透過傳送特製封包,在 PA-Series 與 VM-Series 防火牆上以 root 權限執行任意程式碼。
【CVE-2026-6973】Ivanti Endpoint Manager Mobile (EPMM) Improper Input Validation Vulnerability (CVSS v3.1: 7.2)
【是否遭勒索軟體利用:未知】 Ivanti Endpoint Manager Mobile(EPMM)存在不當輸入驗證漏洞,具管理員權限的遠端已驗證使用者可利用此漏洞達成遠端程式碼執行。
【CVE-2026-42208】BerriAI LiteLLM SQL Injection Vulnerability (CVSS v3.1: 9.8)
【是否遭勒索軟體利用:未知】 BerriAI LiteLLM 存在 SQL 注入漏洞,攻擊者可利用此漏洞從代理伺服器的資料庫讀取資料,並可能進行竄改,導致未經授權存取該代理伺服器及其所管理的憑證。
[影響平台]
【CVE-2026-0300】請參考官方所列的影響版本 https://security.paloaltonetworks.com/CVE-2026-0300
【CVE-2026-6973】請參考官方所列的影響版本 https://hub.ivanti.com/s/article/May-2026-Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-Multiple-CVEs
【CVE-2026-42208】請參考官方所列的影響版本 https://github.com/BerriAI/litellm/security/advisories/GHSA-r75f-5x8p-qvmc
[建議措施]
【CVE-2026-0300】 官方已針對漏洞釋出修復更新,請更新至相關版本
https://security.paloaltonetworks.com/CVE-2026-0300
【CVE-2026-6973】 官方已針對漏洞釋出修復更新,請更新至相關版本
https://hub.ivanti.com/s/article/May-2026-Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-Multiple-CVEs
【CVE-2026-42208】 官方已針對漏洞釋出修復更新,請更新至相關版本
https://github.com/BerriAI/litellm/security/advisories/GHSA-r75f-5x8p-qvmc
Forwarded from Taiwan Computer Network Crisis Management and Coordination Center: Cybersecurity Alert TWCERTCC-200-202605-00000010
[Content Description]
【CVE-2026-0300】Palo Alto Networks PAN-OS Out-of-bounds Write Vulnerability (CVSS v3.1: 9.8)
【Exploited by Ransomware: Unknown】 Palo Alto Networks' PAN-OS has an out-of-bounds write vulnerability in its User-ID Authentication Portal service. An unauthenticated attacker could execute arbitrary code with root privileges on PA-Series and VM-Series firewalls by sending specially crafted packets.
【CVE-2026-6973】Ivanti Endpoint Manager Mobile (EPMM) Improper Input Validation Vulnerability (CVSS v3.1: 7.2)
【Ransomware Exploitation Status: Unknown】 Ivanti Endpoint Manager Mobile (EPMM) contains an improper input validation vulnerability. A remote, authenticated user with administrator privileges could exploit this vulnerability to achieve remote code execution.
【CVE-2026-42208】BerriAI LiteLLM SQL Injection Vulnerability (CVSS v3.1: 9.8)
【Ransomware Exploitation Status: Unknown】 BerriAI LiteLLM contains an SQL injection vulnerability. Attackers could exploit this vulnerability to read and potentially modify data from the proxy server's database, resulting in unauthorized access to the proxy server and its managed credentials.
[Affected Platforms]
【CVE-2026-0300】Please refer to the official list of affected versions: https://security.paloaltonetworks.com/CVE-2026-0300
【CVE-2026-6973】Please refer to the official list of affected versions:
https://hub.ivanti.com/s/article/May-2026-Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-Multiple-CVEs
【CVE-2026-42208】Please refer to the official list of affected versions:
https://github.com/BerriAI/litellm/security/advisories/GHSA-r75f-5x8p-qvmc
[Recommended Actions]
【CVE-2026-0300】An official patch update has been released for this vulnerability. Please update to the relevant version.
https://security.paloaltonetworks.com/CVE-2026-0300
【CVE-2026-6973】An official patch update has been released for this vulnerability. Please update to the relevant version.
https://hub.ivanti.com/s/article/May-2026-Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-Multiple-CVEs
【CVE-2026-42208】An official patch update has been released for this vulnerability. Please update to the relevant version.
https://github.com/BerriAI/litellm/security/advisories/GHSA-r75f-5x8p-qvmc