2026年4月1日星期三

RedHat Linux 核心多個漏洞

RedHat Linux 核心多個漏洞

發佈日期: 2026年04月01日

風險: 中度風險

類型: 操作系統 - LINUX

於 RedHat Linux核心發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發資料篡改、阻斷服務狀況、權限提升及洩露敏感資料。


影響

  • 阻斷服務
  • 權限提升
  • 資料洩露
  • 篡改

受影響之系統或技術

  • Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.4 aarch64
  • Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.4 s390x
  • Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.4 ppc64le
  • Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.4 x86_64
  • Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64
  • Red Hat Enterprise Linux for ARM 64 - Extended Life Cycle 9.4 aarch64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64
  • Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Life Cycle 9.4 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Life Cycle 9.4 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Extended Life Cycle 9.4 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64
  • Red Hat Enterprise Linux Server - AUS 9.4 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le

解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

 

安裝供應商提供的修補程式:


漏洞識別碼


資料來源


相關連結

RedHat Linux Kernel Multiple Vulnerabilities

RedHat Linux Kernel Multiple Vulnerabilities

Release Date: 1 Apr 2026

RISK: Medium Risk

TYPE: Operating Systems - Linux

Multiple vulnerabilities were identified in RedHat Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger data manipulation, denial of service condition, elevation of privilege and sensitive information disclosure on the targeted system.


Impact

  • Denial of Service
  • Elevation of Privilege
  • Information Disclosure
  • Data Manipulation

System / Technologies affected

  • Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.4 aarch64
  • Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.4 s390x
  • Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.4 ppc64le
  • Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.4 x86_64
  • Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64
  • Red Hat Enterprise Linux for ARM 64 - Extended Life Cycle 9.4 aarch64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64
  • Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Life Cycle 9.4 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Life Cycle 9.4 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Extended Life Cycle 9.4 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64
  • Red Hat Enterprise Linux Server - AUS 9.4 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le

Solutions

Before installation of the software, please visit the vendor web-site for more details.

 

Apply fixes issued by the vendor:


Vulnerability Identifier


Source


Related Link

Citrix 產品多個漏洞

Citrix 產品多個漏洞

發佈日期: 2026年03月31日

風險: 中度風險

類型: 操作系統 - Network

於 Citrix 產品發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發阻斷服務狀況及洩露敏感資料。

 

注意:

CVE-2026-3055 正在被廣泛利用。該漏洞是由於輸入驗證不足引起,而導致記憶體被越界讀取。Citrix ADC 或 Citrix Gateway 必須配置為 SAML IDP 才會受到影響。因此,該漏洞的風險等級被評為中度風險。


影響

  • 資料洩露
  • 阻斷服務

受影響之系統或技術

  • NetScaler ADC 和 NetScaler Gateway  14.1-66.54 版本
  • NetScaler ADC 和 NetScaler Gateway 14.1 中 14.1-60.58 之前的版本
  • NetScaler ADC 和 NetScaler Gateway 13.1 中 13.1-62.23 之前的版本
  • NetScaler ADC FIPS 和 NDcPP 中 13.1-37.262 之前的版本

解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

 

安裝供應商提供的修補程式:


漏洞識別碼


資料來源


相關連結

Citrix Products Multiple Vulnerabilities

Citrix Products Multiple Vulnerabilities

Release Date: 31 Mar 2026

RISK: Medium Risk

TYPE: Operating Systems - Networks OS

Multiple vulnerabilities were identified in Citrix Products. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition and sensitive information disclosure on the targeted system.

 

Note:

CVE-2026-3055 is being exploited in the wild.  The vulnerability is caused by insufficient input validation leading to memory overread. Citrix ADC or Citrix Gateway must be configured as a SAML IDP to be vulnerable. Hence, the risk level is rated as Medium Risk.


Impact

  • Information Disclosure
  • Denial of Service

System / Technologies affected

  • NetScaler ADC and NetScaler Gateway  14.1-66.54
  • NetScaler ADC and NetScaler Gateway 14.1 BEFORE 14.1-60.58
  • NetScaler ADC and NetScaler Gateway 13.1 BEFORE 13.1-62.23
  • NetScaler ADC FIPS and NDcPP BEFORE 13.1-37.262

Solutions

Before installation of the software, please visit the vendor web-site for more details.

 

Apply fixes issued by the vendor:


Vulnerability Identifier


Source


Related Link

釣魚警報 – ClickFix 出現新變種,攻擊同時針對 Windows 和 macOS

釣魚警報 – ClickFix 出現新變種,攻擊同時針對 Windows 和 macOS

發佈日期: 2026年03月31日

類別: 網絡釣魚

網絡釣魚警告

現況及相關趨勢

最近的威脅情報顯示,名為 "ClickFix" 的攻擊手法原本主要針對 Microsoft Windows,但如今已演變出新的變種,並鎖定 macOS 的用戶。此演變顯示該技術正不在斷進化,被更多不同的攻擊者利用。  

 

傳統針對 Windows 的 ClickFix 攻擊

這類攻擊模仿網站常見的,用以區分合法使用者與機器人的「Verify You are a Human」測試。受害者被網站誘導按下特定鍵盤組合,最終導致在 Microsoft Windows 系統上下載並執行惡意軟體。

 

攻擊的過程通常如下:

  1. 要求用戶同時按下帶有 Windows 圖標的鍵盤鍵和字母 “R”,這將打開 Windows 的 “Run” 程序,並能夠透過此程序執行系統上已安裝的任何程序。
  2. 指導用戶同時按下 “CTRL” 鍵和字母 “V”,從而將網站虛擬剪貼板上的惡意代碼粘貼下來。
  3. 按下 “Enter” 鍵,促使 Windows 執行剪貼板上的惡意代碼。

 

針對 Windows 的最新變種 – 惡意利用 Windows 合法組件 rundll32.exe 與 WebDAV

最新的 ClickFix 變種惡意利用 Windows 合法組件 rundll32.exe 與 WebDAV 來傳送惡意載荷。它透過 ordinal calls 載入遠端 DLL,以規避偵測,減少對腳本引擎的依賴並繞過傳統監控。這種轉向透過利用 Windows 原生組件的方式,結合反分析技術,使攻擊更隱蔽且更難被發現。 

 

(針對 Windows 用戶的 ClickFix 攻擊)

 

 

針對 macOS 用戶的變種 – Infinity Stealer

針對 macOS 的 ClickFix 變種透過假的 Cloudflare CAPTCHA 誘騙使用者,傳送 Infinity Stealer。受害者被誘導將惡意 curl 指令貼入 macOS Terminal,安裝一個使用 Nuitka 編譯的 Python-based infostealer,以增強逃避偵測能力。  

 

Infinity Stealer 的功能包括:  

  • 竊取 Chromium-based browsers 與 Firefox 的憑證  
  • 提取 macOS Keychain 內容  
  • 存取加密貨幣錢包  
  • 讀取開發者檔案(如 `.env`)中的憑證或密鑰 

 

所有被竊取的資料會透過 HTTP POST 請求傳送至 C2 server,並在完成後向攻擊者發送 Telegram 通知。此攻擊活動突顯 ClickFix 從 Windows 擴展至 macOS,並採用更先進、更隱蔽的技術。  

 

The ClickFix step

(針對 macOS 用戶的 ClickFix 攻擊)

(來源: https://www.bleepingcomputer.com/news/security/new-infinity-stealer-malware-grabs-macos-data-via-clickfix-lures/)


 

建議

各機構及用戶應對不斷演變的 ClickFix 攻擊手法保持警覺,並採取主動措施以防止系統遭入侵,該手法現已同時針對 Windows 與 macOS 系統。為防範相關的 ClickFix 攻擊,請採取以下措施:

 

  • 切勿跟隨可疑的 CAPTCHA 驗證提示,或將未知指令貼入 Windows Run 視窗或 macOS Terminal。
  • 更新並維護安全軟體,以偵測及阻擋惡意的 rundll32 或 curl 活動。
  • 封鎖已知的惡意網域,並監控網路流量中與 C2 servers 之間的可疑連線。
  • 對網絡釣魚及社交工程手法保持警覺,避免與具欺騙性的 ClickFix 誘騙互動。

Phishing Alert – ClickFix Tactics Evolve, Now Attacking Both Windows and macOS

Phishing Alert – ClickFix Tactics Evolve, Now Attacking Both Windows and macOS

Release Date: 31 Mar 2026

Type: Phishing

Phishing Alert

Current Status and Related Trends

Recent threat intelligence indicates that ClickFix tactics, originally targeting Microsoft Windows, have now evolved with a new variant aimed at macOS. This expansion demonstrates that the technique is increasingly being deployed by multiple attackers. 

 

 

Traditional Windows-focused ClickFix attacks

These campaigns mimic the familiar “Verify You are a Human” tests commonly used by websites to distinguish legitimate users from bots. Victims are prompted to press specific keyboard combinations, which ultimately result in the download and execution of malicious software on Microsoft Windows systems.  

 

The deceptive process typically unfolds as follows:  

  1. The user is instructed to press the Windows key and the letter “R” simultaneously, opening the Windows “Run” prompt capable of executing any program already installed on the system.  
  2. The user is told to press CTRL + V, pasting malicious code from the site’s virtual clipboard into the Run prompt.  
  3. Pressing Enter executes the pasted code, initiating the download and installation of malware.  

 

Latest Windows Variant – Abusing Windows components Rundll32 & WebDAV  
The most recent ClickFix variant maliciously abuses legitimate Windows components, rundll32.exe and WebDAV to deliver payloads. It loads remote DLLs via ordinal calls to evade detection, reducing reliance on script engines and bypassing traditional monitoring. This shift to native Windows components, combined with anti-analysis techniques, makes the attack stealthier and harder to detect.

 

(ClickFix attack targetting Windows users)

 

 

macOS Variant – Infinity Stealer  
A new macOS-targeted ClickFix variant delivers Infinity Stealer via fake Cloudflare CAPTCHA lures. Victims are tricked into pasting a malicious curl command into the macOS Terminal, installing a Python-based infostealer compiled with Nuitka for enhanced evasion.  

 

Infinity Stealer can:  

  • Steal credentials from Chromium-based browsers and Firefox  
  • Extract macOS Keychain entries  
  • Access cryptocurrency wallets  
  • Read plaintext secrets from developer files (e.g., `.env`)  

 

All stolen data is exfiltrated via HTTP POST requests to the C2 server, with a Telegram alert sent to attackers upon completion. This campaign highlights ClickFix’s expansion from Windows to macOS, employing more advanced and stealthy techniques.  

 

The ClickFix step

(ClickFix attack targetting macOS users)
(Ref: https://www.bleepingcomputer.com/news/security/new-infinity-stealer-malware-grabs-macos-data-via-clickfix-lures/)

 

Recommendations

Organisations and individuals are urged to stay alert to evolving ClickFix phishing tactics, which now target both Windows and macOS systems, and take proactive measures to prevent compromise. To guard against related ClickFix attacks, please take the following measures:
 

  • Do not follow suspicious CAPTCHA prompts or paste unknown commands into Windows Run prompts or macOS Terminal.
  • Update and maintain security software to detect and block malicious rundll32 or curl activity.
  • Block known malicious domains and monitor network traffic for unusual connections to C2 servers.
  • Stay aware on phishing and social engineering tactics to prevent interaction with deceptive ClickFix lures.

Microsoft Edge 多個漏洞

Microsoft Edge 多個漏洞

發佈日期: 2026年03月30日

風險: 中度風險

類型: 用戶端 - 瀏覽器

於 Microsoft Edge 發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發遠端執行任意程式碼、阻斷服務狀況及洩露敏感資料。


Microsoft Edge Multiple Vulnerabilities

Microsoft Edge Multiple Vulnerabilities

Release Date: 30 Mar 2026

RISK: Medium Risk

TYPE: Clients - Browsers

Multiple vulnerabilities were identified in Microsoft Edge. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, denial of service condition and sensitive information disclosure on the targeted system.


思科 IOS XE 多個漏洞

思科 IOS XE 多個漏洞

發佈日期: 2026年03月26日

風險: 中度風險

類型: 保安軟件及應用設備 - 保安軟件及應用設備

於思科 IOS XE 發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發洩露敏感資料、阻斷服務狀況、遠端執行任意程式碼、繞過保安限制及權限提升。


影響

  • 阻斷服務
  • 遠端執行程式碼
  • 資料洩露
  • 繞過保安限制
  • 權限提升

受影響之系統或技術

  • 思科 IOS XE

請參考供應商發佈的連結以了解受影響的設備:

 


解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

 

安裝供應商提供的修補程式:


漏洞識別碼


資料來源


相關連結

Cisco IOS XE Multiple Vulnerabilities

Cisco IOS XE Multiple Vulnerabilities

Release Date: 26 Mar 2026

RISK: Medium Risk

TYPE: Security software and application - Security Software & Appliance

Multiple vulnerabilities were identified in Cisco IOS XE. A remote attacker could exploit some of these vulnerabilities to trigger sensitive information disclosure, denial of service condition, remote code execution, security restriction bypass and elevation of privilege on the targeted system. 


Impact

  • Denial of Service
  • Remote Code Execution
  • Information Disclosure
  • Security Restriction Bypass
  • Elevation of Privilege

System / Technologies affected

  • Cisco IOS XE

For affected devices, please refer to the link issued by the vendor:


Solutions

Before installation of the software, please visit the vendor web-site for more details.

 

Apply fixes issued by the vendor:


Vulnerability Identifier


Source


Related Link

GitLab 多個漏洞

GitLab 多個漏洞

發佈日期: 2026年03月26日

風險: 中度風險

類型: 伺服器 - 其他伺服器

於 GitLab 發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升、彷冒、洩露敏感資料、跨網站指令碼、資料篡改及繞過保安限制。


影響

  • 阻斷服務
  • 繞過保安限制
  • 跨網站指令碼
  • 篡改
  • 資料洩露
  • 權限提升
  • 仿冒

受影響之系統或技術

  • GitLab Community Edition (CE) 18.10.1, 18.9.3, 18.8.7 以前的版本
  • GitLab Enterprise Edition (EE) 18.10.1, 18.9.3, 18.8.7 以前的版本

解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

 

安裝供應商提供的修補程式:


漏洞識別碼


資料來源


相關連結

GitLab Multiple Vulnerabilities

GitLab Multiple Vulnerabilities

Release Date: 26 Mar 2026

RISK: Medium Risk

TYPE: Servers - Other Servers

Multiple vulnerabilities were identified in GitLab. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege, spoofing, sensitive information disclosure, cross-site scripting, data manipulation and security restriction bypass on the targeted system.


Impact

  • Denial of Service
  • Security Restriction Bypass
  • Cross-Site Scripting
  • Data Manipulation
  • Information Disclosure
  • Elevation of Privilege
  • Spoofing

System / Technologies affected

  • GitLab Community Edition (CE) versions prior to 18.10.1, 18.9.3, 18.8.7
  • GitLab Enterprise Edition (EE) versions prior to 18.10.1, 18.9.3, 18.8.7

Solutions

Before installation of the software, please visit the vendor web-site for more details.

 

Apply fixes issued by the vendor:


Vulnerability Identifier


Source


Related Link

IBM WebSphere 產品多個漏洞

IBM WebSphere 產品多個漏洞

發佈日期: 2026年03月26日

風險: 中度風險

類型: 伺服器 - 互聯網應用伺服器

於 IBM WebSphere 產品發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發權限提升、彷冒、洩露敏感資料、資料篡改及繞過保安限制。


影響

  • 資料洩露
  • 繞過保安限制
  • 篡改
  • 權限提升
  • 仿冒

受影響之系統或技術

  • WebSphere Application Server - Liberty 17.0.0.3 - 26.0.0.3

解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

 

安裝供應商提供的修補程式:


漏洞識別碼


資料來源


相關連結

IBM WebSphere Products Multiple Vulnerabilities

IBM WebSphere Products Multiple Vulnerabilities

Release Date: 26 Mar 2026

RISK: Medium Risk

TYPE: Servers - Internet App Servers

Multiple vulnerabilities were identified in IBM WebSphere Products. A remote attacker could exploit some of these vulnerabilities to trigger elevation of privilege, spoofing, sensitive information disclosure, data manipulation and security restriction bypass on the targeted system.


Impact

  • Information Disclosure
  • Security Restriction Bypass
  • Data Manipulation
  • Elevation of Privilege
  • Spoofing

System / Technologies affected

  • WebSphere Application Server - Liberty 17.0.0.3 - 26.0.0.3

Solutions

Before installation of the software, please visit the vendor web-site for more details.

 

Apply fixes issued by the vendor:


Vulnerability Identifier


Source


Related Link

蘋果產品多個漏洞

蘋果產品多個漏洞

發佈日期: 2026年03月25日

風險: 中度風險

類型: 操作系統 - 流動裝置及操作系統

於蘋果產品發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升、洩露敏感資料、跨網站指令碼、資料篡改及繞過保安限制。


影響

  • 阻斷服務
  • 權限提升
  • 繞過保安限制
  • 資料洩露
  • 篡改
  • 跨網站指令碼

受影響之系統或技術

  • iOS 26.4 及 iPadOS 26.4 以前的版本
  • iOS 18.7.7 及 iPadOS 18.7.7 以前的版本
  • macOS Tahoe 26.4 以前的版本
  • macOS Sequoia 15.7.5 以前的版本
  • macOS Sonoma 14.8.5 以前的版本
  • Safari 26.4 以前的版本
  • tvOS 26.4 以前的版本
  • visionOS 26.4 以前的版本
  • watchOS 26.4 以前的版本
  • Xcode 26.4 以前的版本

解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

安裝供應商提供的修補程式:

 

  • iOS 26.4 及 iPadOS 26.4
  • iOS 18.7.7 及 iPadOS 18.7.7
  • macOS Tahoe 26.4
  • macOS Sequoia 15.7.5
  • macOS Sonoma 14.8.5
  • Safari 26.4
  • tvOS 26.4
  • visionOS 26.4
  • watchOS 26.4
  • Xcode 26.4

漏洞識別碼


資料來源


相關連結

Apple Products Multiple Vulnerabilities

Apple Products Multiple Vulnerabilities

Release Date: 25 Mar 2026

RISK: Medium Risk

TYPE: Operating Systems - Mobile & Apps

Multiple vulnerabilities were identified in Apple Products. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege, sensitive information disclosure, cross-site scripting, data manipulation and security restriction bypass on the targeted system.


Impact

  • Denial of Service
  • Elevation of Privilege
  • Security Restriction Bypass
  • Information Disclosure
  • Data Manipulation
  • Cross-Site Scripting

System / Technologies affected

  • Versions prior to iOS 26.4 and iPadOS 26.4
  • Versions prior to iOS 18.7.7 and iPadOS 18.7.7
  • Versions prior to macOS Tahoe 26.4
  • Versions prior to macOS Sequoia 15.7.5
  • Versions prior to macOS Sonoma 14.8.5
  • Versions prior to Safari 26.4
  • Versions prior to tvOS 26.4
  • Versions prior to visionOS 26.4
  • Versions prior to watchOS 26.4
  • Versions prior to Xcode 26.4

Solutions

Before installation of the software, please visit the vendor web-site for more details.

Apply fixes issued by the vendor:

 

  • iOS 26.4 and iPadOS 26.4
  • iOS 18.7.7 and iPadOS 18.7.7
  • macOS Tahoe 26.4
  • macOS Sequoia 15.7.5
  • macOS Sonoma 14.8.5
  • Safari 26.4
  • tvOS 26.4
  • visionOS 26.4
  • watchOS 26.4
  • Xcode 26.4

Vulnerability Identifier


Source


Related Link

Mozilla 產品多個漏洞

Mozilla 產品多個漏洞

發佈日期: 2026年03月25日

風險: 中度風險

類型: 用戶端 - 瀏覽器

於 Mozilla 產品發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升、遠端執行任意程式碼、繞過保安限制、仿冒及敏感資料洩露。


RedHat Linux 核心多個漏洞

RedHat Linux 核心多個漏洞 發佈日期: 2026年04月01日 風險: 中度風險 類型: 操作系統 - LINUX 於 RedHat...