:::

系統網路組
系統網路組Section of System Network

:::

最新消息

2021/09/16
系統網路組

【漏洞預警】【更新建議措施】微軟Windows之MSHTML引擎存在安全漏洞(CVE-2021-40444),允許攻擊者遠端執行任意程式碼,請儘速確認並進行更新

教育機構ANA通報平台 TACERT-ANA-2021091503093939 發佈時間 2021-09-15 15:23:40 事故類型 ANA-漏洞預警 發現時間 2021-09-15 13:44:40 影響等級 中 [主旨說明:]【漏洞預警】【更新建議措施】微軟Windows之MSHTML引擎存在安全漏洞(CVE-2021-40444),允許攻擊者遠端執行任意程式碼,請儘速確認並進行更新 [內容說明:] 轉發 國家資安資訊分享與分析中心 資安訊息警訊 NISAC-ANA-202109-0767 研究人員發現微軟Windows內之瀏覽器排版引擎MSHTML存在安全漏洞(CVE-2021-40444),MSHTML用於微軟瀏覽器與Office應用程式中,攻擊者可誘騙使用者開啟含有惡意ActiveX之Office文件,進而載入瀏覽器引擎並瀏覽惡意網頁,利用此漏洞遠端執行任意程式碼。 情資分享等級: WHITE(情資內容為可公開揭露之資訊) [影響平台:] Windows 7 for 32-bit Systems Service Pack 1 ● Windows 7 for x64-based Systems Service Pack 1 ● Windows 8.1 for 32-bit systems Windows 8.1 for x64-based systems ● Windows RT 8.1 Windows 10 for 32-bit Systems ● Windows 10 for x64-based Systems ● Windows 10 Version 1607 for 32-bit Systems ● Windows 10 Version 1607 for x64-based Systems ● Windows 10 Version 1809 for 32-bit Systems ● Windows 10 Version 1809 for ARM64-based Systems ● Windows 10 Version 1809 for x64-based Systems ● Windows 10 Version 1909 for 32-bit Systems ● Windows 10 Version 1909 for ARM64-based Systems ● Windows 10 Version 1909 for x64-based Systems ● Windows 10 Version 2004 for 32-bit Systems ● Windows 10 Version 2004 for ARM64-based Systems ● Windows 10 Version 2004 for x64-based Systems ● Windows 10 Version 20H2 for 32-bit Systems ● Windows 10 Version 20H2 for ARM64-based Systems ● Windows 10 Version 20H2 for x64-based Systems ● Windows 10 Version 21H1 for 32-bit Systems ● Windows 10 Version 21H1 for ARM64-based Systems ● Windows 10 Version 21H1 for x64-based Systems ● Windows Server 2008 for 32-bit Systems Service Pack 2 ● Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) ● Windows Server 2008 for x64-based Systems Service Pack 2 ● Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) ● Windows Server 2008 R2 for x64-based Systems Service Pack 1 ● Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) ● Windows Server 2012 ● Windows Server 2012 (Server Core installation) ● Windows Server 2012 R2 ● Windows Server 2012 R2 (Server Core installation) ● Windows Server 2016 ● Windows Server 2016 (Server Core installation) ● Windows Server 2019 ● Windows Server 2019 (Server Core installation) ● Windows Server 2022 ● Windows Server 2022 (Server Core installation) ● Windows Server, version 2004 (Server Core installation) ● Windows Server, version 20H2 (Server Core Installation) [建議措施:] 目前微軟官方已針對此漏洞釋出更新程式,請各機關聯絡維護廠商或參考以下網址進行更新: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-40444   [參考資料:] 1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-40444 2. https://www.ithome.com.tw/news/146584 3. https://docs.microsoft.com/zh-tw/microsoft-365/security/office-365-security/install-app-guard?view=o365-worldwide   更多資訊安全訊息可參閱本校資訊安全專區https://tnc.hust.edu.tw/isms/

2021/08/30
系統網路組

【資安訊息】請各單位加強宣導,若需使用Google表單時,應注意權限設定,以防止個人資料或機敏資料外洩。

由學術網路區網中心轉知 資安訊息,編號 2021082703083838 ,【資安訊息】請各單位加強宣導,若需使用Google表單時,應注意權限設定,以防止個人資料或機敏資料外洩,其內容如下。 教育機構ANA通報平台 TACERT-ANA-2021082703083838 發佈時間 2021-08-27 15:47:39 事故類型 ANA-資安訊息 發現時間 2021-08-27 15:47:39 影響等級 低 [主旨說明:]【資安訊息】請各單位加強宣導,若需使用Google表單時,應注意權限設定,以防止個人資料或機敏資料外洩。 [內容說明:] 近期教育部接獲通報,發現某單位使用Google表單進行資料調查時,因不熟悉操作設定,發生權限設定錯誤或開啟不當設定選項功能,導致個人資料外洩的情形。 請各單位加強宣導,若需使用Google表單時,應加強並留意表單設計所開啟的功能是否會造成機敏資料或個人資料外洩情事發生,並請於上線使用前,預先進行完整的測試,以確認沒有任何個資外洩疑慮。 情資分享等級: WHITE(情資內容為可公開揭露之資訊) [影響平台:] Google表單 [建議措施:] 1.詳閱Google表單設定內容 2.了解Google表單設定選項的確實用法 例如:某單位於Google表單設計時,誤勾選功能選項,於設定中一般選項內的[顯示摘要圖表及其他作答內容],致使填答者將資料提交後,可經[查看先前的回應]選項,看到先前其他填寫者的填寫內容,因而造成個資外洩。 3.Google表單製作完成發送前,請確實做好相關設定檢查,並實際操作檢驗,確認無風險疑慮再行送出。   [參考資料:]   更多資訊安全訊息可參閱本校資訊安全專區https://tnc.hust.edu.tw/isms/

2021/08/23
系統網路組

【漏洞預警】Fortinet FortiWeb產品存在安全漏洞(CVE-2021-22123),允許攻擊者遠端執行任意程式碼,請儘速確認並進行更新

2021/08/16
系統網路組

【漏洞預警】微軟Windows作業系統存在多個安全漏洞,允許攻擊者取得權限或遠端執行任意程式碼,請儘速確認並進行更新

由學術網路區網中心轉知 資安訊息警訊,編號 2021081201081717,【漏洞預警】微軟Windows作業系統存在多個安全漏洞,允許攻擊者取得權限或遠端執行任意程式碼,請儘速確認並進行更新,其內容如下。   [主旨說明:]【漏洞預警】微軟Windows作業系統存在多個安全漏洞,允許攻擊者取得權限或遠端執行任意程式碼,請儘速確認並進行更新 [內容說明:] 轉發 國家資安資訊分享與分析中心 資安訊息警訊 NISAC-ANA-202108-0772 研究人員發現Windows作業系統存在下列安全漏洞,遠端攻擊者可藉由漏洞取得權限或進而執行任意程式碼。 1.遠端執行任意程式碼漏洞:CVE-2021-26424、CVE-2021-34481、CVE-2021-36936及CVE-2021-36947。 2.權限提升漏洞:CVE-2021-34483與CVE-2021-36948。 3.欺騙漏洞:CVE-2021-36942。 情資分享等級: WHITE(情資內容為可公開揭露之資訊) [影響平台:] 1、CVE-2021-26424、CVE-2021-34481、CVE-2021-34483、CVE-2021-36936及CVE-2021-36947: ● Windows 7 for 32-bit Systems Service Pack 1 ● Windows 7 for x64-based Systems Service Pack 1 ● Windows 8.1 for 32-bit systems ● Windows 8.1 for x64-based systems ● Windows RT 8.1 ● Windows 10 Version 1607 for 32-bit Systems ● Windows 10 Version 1607 for x64-based Systems ● Windows 10 Version 1809 for 32-bit Systems ● Windows 10 Version 1809 for ARM64-based Systems ● Windows 10 Version 1809 for x64-based Systems ● Windows 10 Version 1909 for 32-bit Systems ● Windows 10 Version 1909 for ARM64-based Systems ● Windows 10 Version 1909 for x64-based Systems ● Windows 10 Version 2004 for 32-bit Systems ● Windows 10 Version 2004 for ARM64-based Systems ● Windows 10 Version 2004 for x64-based Systems ● Windows 10 Version 20H2 for 32-bit Systems ● Windows 10 Version 20H2 for ARM64-based Systems ● Windows 10 Version 20H2 for x64-based Systems ● Windows 10 Version 21H1 for 32-bit Systems ● Windows 10 Version 21H1 for ARM64-based Systems ● Windows 10 Version 21H1 for x64-based Systems ● Windows 10 for 32-bit Systems ● Windows 10 for x64-based Systems ● Windows Server 2008 R2 for x64-based Systems Service Pack 1 ● Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) ● Windows Server 2008 for 32-bit Systems Service Pack 2 ● Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) ● Windows Server 2008 for x64-based Systems Service Pack 2 ● Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) ● Windows Server 2012 Windows Server 2012 (Server Core installation) ● Windows Server 2012 R2 ● Windows Server 2012 R2 (Server Core installation) ● Windows Server 2016 ● Windows Server 2016 (Server Core installation) ● Windows Server 2019 ● Windows Server 2019 (Server Core installation) ● Windows Server, version 2004 (Server Core installation) ● Windows Server, version 20H2 (Server Core Installation) 2、CVE-2021-36942: ● Windows Server 2008 R2 for x64-based Systems Service Pack 1 ● Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) ● Windows Server 2008 for 32-bit Systems Service Pack 2 ● Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) ● Windows Server 2008 for x64-based Systems Service Pack 2 ● Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) ● Windows Server 2012 Windows Server 2012 (Server Core installation) ● Windows Server 2012 R2 ● Windows Server 2012 R2 (Server Core installation) ● Windows Server 2016 ● Windows Server 2016 (Server Core installation) ● Windows Server 2019 ● Windows Server 2019 (Server Core installation) ● Windows Server, version 2004 (Server Core installation) ● Windows Server, version 20H2 (Server Core Installation) 3、CVE-2021-36948: ● Windows 10 Version 1809 for 32-bit Systems ● Windows 10 Version 1809 for ARM64-based Systems ● Windows 10 Version 1809 for x64-based Systems ● Windows 10 Version 1909 for 32-bit Systems ● Windows 10 Version 1909 for ARM64-based Systems ● Windows 10 Version 1909 for x64-based Systems ● Windows 10 Version 2004 for 32-bit Systems ● Windows 10 Version 2004 for ARM64-based Systems ● Windows 10 Version 2004 for x64-based Systems ● Windows 10 Version 20H2 for 32-bit Systems ● Windows 10 Version 20H2 for ARM64-based Systems ● Windows 10 Version 20H2 for x64-based Systems ● Windows 10 Version 21H1 for 32-bit Systems ● Windows 10 Version 21H1 for ARM64-based Systems ● Windows 10 Version 21H1 for x64-based Systems ● Windows Server 2019 ● Windows Server 2019 (Server Core installation) ● Windows Server, version 2004 (Server Core installation) ● Windows Server, version 20H2 (Server Core Installation) [建議措施:] 目前微軟官方已針對這些漏洞釋出更新程式,請各機關聯絡維護廠商或參考以下網址進行更新: 1.https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26424 2.https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34481 3.https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34483 4.https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36936 5.https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36942 6.https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36947 7.https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36948   [參考資料:] 1. https://thehackernews.com/2021/08/microsoft-releases-windows-updates-to.html 2. https://www.ithome.com.tw/news/146135 3. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26424 4. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34481 5. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34483 6. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36936 7. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36942 8. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36947 9. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36948   更多資訊安全訊息可參閱本校資訊安全專區https://tnc.hust.edu.tw/isms/

2021/08/16
系統網路組

【漏洞預警】【更新建議措施】微軟Windows伺服器存在PetitPotam漏洞(CVE-2021-36942),允許攻擊者控制整個AD網域,請儘速確認並進行更...

2021/08/02
系統網路組

【漏洞預警】微軟Windows伺服器存在PetitPotam漏洞,允許攻擊者控制整個AD網域,請儘速確認並進行防護補強!

2021/07/06
系統網路組

於7月6日(二)09:00~16:00進行虛擬桌面平台設備維護,屆時可能出現系統不穩之狀況,造成不便,敬請見諒。

2021/05/25
系統網路組

遠距辦公連線教學pdf下載

2020/09/10
系統網路組

教育體系資通安全暨個人資料管理規範 109年8月修正版

2020/09/03
系統網路組

因應iLMS教學平台於9月8日(二)10:00~10:30進行系統升級,屆時可能出現系統不穩或中斷之狀況,造成不便尚請見諒

2019/04/15
系統網路組

微軟Patch Tuesday修補兩個已被開採的Windows漏洞

2019/04/15
系統網路組

Windows 7終止支援,免費下載升級攻略

2021/09/16
系統網路組

【漏洞預警】【更新建議措施】微軟Windows之MSHTML引擎存在安全漏洞(CVE-2021-40444),允許攻擊者遠端執行任意程式碼,請儘速確認並進行更新

教育機構ANA通報平台 TACERT-ANA-2021091503093939 發佈時間 2021-09-15 15:23:40 事故類型 ANA-漏洞預警 發現時間 2021-09-15 13:44:40 影響等級 中 [主旨說明:]【漏洞預警】【更新建議措施】微軟Windows之MSHTML引擎存在安全漏洞(CVE-2021-40444),允許攻擊者遠端執行任意程式碼,請儘速確認並進行更新 [內容說明:] 轉發 國家資安資訊分享與分析中心 資安訊息警訊 NISAC-ANA-202109-0767 研究人員發現微軟Windows內之瀏覽器排版引擎MSHTML存在安全漏洞(CVE-2021-40444),MSHTML用於微軟瀏覽器與Office應用程式中,攻擊者可誘騙使用者開啟含有惡意ActiveX之Office文件,進而載入瀏覽器引擎並瀏覽惡意網頁,利用此漏洞遠端執行任意程式碼。 情資分享等級: WHITE(情資內容為可公開揭露之資訊) [影響平台:] Windows 7 for 32-bit Systems Service Pack 1 ● Windows 7 for x64-based Systems Service Pack 1 ● Windows 8.1 for 32-bit systems Windows 8.1 for x64-based systems ● Windows RT 8.1 Windows 10 for 32-bit Systems ● Windows 10 for x64-based Systems ● Windows 10 Version 1607 for 32-bit Systems ● Windows 10 Version 1607 for x64-based Systems ● Windows 10 Version 1809 for 32-bit Systems ● Windows 10 Version 1809 for ARM64-based Systems ● Windows 10 Version 1809 for x64-based Systems ● Windows 10 Version 1909 for 32-bit Systems ● Windows 10 Version 1909 for ARM64-based Systems ● Windows 10 Version 1909 for x64-based Systems ● Windows 10 Version 2004 for 32-bit Systems ● Windows 10 Version 2004 for ARM64-based Systems ● Windows 10 Version 2004 for x64-based Systems ● Windows 10 Version 20H2 for 32-bit Systems ● Windows 10 Version 20H2 for ARM64-based Systems ● Windows 10 Version 20H2 for x64-based Systems ● Windows 10 Version 21H1 for 32-bit Systems ● Windows 10 Version 21H1 for ARM64-based Systems ● Windows 10 Version 21H1 for x64-based Systems ● Windows Server 2008 for 32-bit Systems Service Pack 2 ● Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) ● Windows Server 2008 for x64-based Systems Service Pack 2 ● Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) ● Windows Server 2008 R2 for x64-based Systems Service Pack 1 ● Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) ● Windows Server 2012 ● Windows Server 2012 (Server Core installation) ● Windows Server 2012 R2 ● Windows Server 2012 R2 (Server Core installation) ● Windows Server 2016 ● Windows Server 2016 (Server Core installation) ● Windows Server 2019 ● Windows Server 2019 (Server Core installation) ● Windows Server 2022 ● Windows Server 2022 (Server Core installation) ● Windows Server, version 2004 (Server Core installation) ● Windows Server, version 20H2 (Server Core Installation) [建議措施:] 目前微軟官方已針對此漏洞釋出更新程式,請各機關聯絡維護廠商或參考以下網址進行更新: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-40444   [參考資料:] 1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-40444 2. https://www.ithome.com.tw/news/146584 3. https://docs.microsoft.com/zh-tw/microsoft-365/security/office-365-security/install-app-guard?view=o365-worldwide   更多資訊安全訊息可參閱本校資訊安全專區https://tnc.hust.edu.tw/isms/

2021/08/30
系統網路組

【資安訊息】請各單位加強宣導,若需使用Google表單時,應注意權限設定,以防止個人資料或機敏資料外洩。

由學術網路區網中心轉知 資安訊息,編號 2021082703083838 ,【資安訊息】請各單位加強宣導,若需使用Google表單時,應注意權限設定,以防止個人資料或機敏資料外洩,其內容如下。 教育機構ANA通報平台 TACERT-ANA-2021082703083838 發佈時間 2021-08-27 15:47:39 事故類型 ANA-資安訊息 發現時間 2021-08-27 15:47:39 影響等級 低 [主旨說明:]【資安訊息】請各單位加強宣導,若需使用Google表單時,應注意權限設定,以防止個人資料或機敏資料外洩。 [內容說明:] 近期教育部接獲通報,發現某單位使用Google表單進行資料調查時,因不熟悉操作設定,發生權限設定錯誤或開啟不當設定選項功能,導致個人資料外洩的情形。 請各單位加強宣導,若需使用Google表單時,應加強並留意表單設計所開啟的功能是否會造成機敏資料或個人資料外洩情事發生,並請於上線使用前,預先進行完整的測試,以確認沒有任何個資外洩疑慮。 情資分享等級: WHITE(情資內容為可公開揭露之資訊) [影響平台:] Google表單 [建議措施:] 1.詳閱Google表單設定內容 2.了解Google表單設定選項的確實用法 例如:某單位於Google表單設計時,誤勾選功能選項,於設定中一般選項內的[顯示摘要圖表及其他作答內容],致使填答者將資料提交後,可經[查看先前的回應]選項,看到先前其他填寫者的填寫內容,因而造成個資外洩。 3.Google表單製作完成發送前,請確實做好相關設定檢查,並實際操作檢驗,確認無風險疑慮再行送出。   [參考資料:]   更多資訊安全訊息可參閱本校資訊安全專區https://tnc.hust.edu.tw/isms/

2021/08/23
系統網路組

【漏洞預警】Fortinet FortiWeb產品存在安全漏洞(CVE-2021-22123),允許攻擊者遠端執行任意程式碼,請儘速確認並進行更新

2021/08/16
系統網路組

【漏洞預警】微軟Windows作業系統存在多個安全漏洞,允許攻擊者取得權限或遠端執行任意程式碼,請儘速確認並進行更新

由學術網路區網中心轉知 資安訊息警訊,編號 2021081201081717,【漏洞預警】微軟Windows作業系統存在多個安全漏洞,允許攻擊者取得權限或遠端執行任意程式碼,請儘速確認並進行更新,其內容如下。   [主旨說明:]【漏洞預警】微軟Windows作業系統存在多個安全漏洞,允許攻擊者取得權限或遠端執行任意程式碼,請儘速確認並進行更新 [內容說明:] 轉發 國家資安資訊分享與分析中心 資安訊息警訊 NISAC-ANA-202108-0772 研究人員發現Windows作業系統存在下列安全漏洞,遠端攻擊者可藉由漏洞取得權限或進而執行任意程式碼。 1.遠端執行任意程式碼漏洞:CVE-2021-26424、CVE-2021-34481、CVE-2021-36936及CVE-2021-36947。 2.權限提升漏洞:CVE-2021-34483與CVE-2021-36948。 3.欺騙漏洞:CVE-2021-36942。 情資分享等級: WHITE(情資內容為可公開揭露之資訊) [影響平台:] 1、CVE-2021-26424、CVE-2021-34481、CVE-2021-34483、CVE-2021-36936及CVE-2021-36947: ● Windows 7 for 32-bit Systems Service Pack 1 ● Windows 7 for x64-based Systems Service Pack 1 ● Windows 8.1 for 32-bit systems ● Windows 8.1 for x64-based systems ● Windows RT 8.1 ● Windows 10 Version 1607 for 32-bit Systems ● Windows 10 Version 1607 for x64-based Systems ● Windows 10 Version 1809 for 32-bit Systems ● Windows 10 Version 1809 for ARM64-based Systems ● Windows 10 Version 1809 for x64-based Systems ● Windows 10 Version 1909 for 32-bit Systems ● Windows 10 Version 1909 for ARM64-based Systems ● Windows 10 Version 1909 for x64-based Systems ● Windows 10 Version 2004 for 32-bit Systems ● Windows 10 Version 2004 for ARM64-based Systems ● Windows 10 Version 2004 for x64-based Systems ● Windows 10 Version 20H2 for 32-bit Systems ● Windows 10 Version 20H2 for ARM64-based Systems ● Windows 10 Version 20H2 for x64-based Systems ● Windows 10 Version 21H1 for 32-bit Systems ● Windows 10 Version 21H1 for ARM64-based Systems ● Windows 10 Version 21H1 for x64-based Systems ● Windows 10 for 32-bit Systems ● Windows 10 for x64-based Systems ● Windows Server 2008 R2 for x64-based Systems Service Pack 1 ● Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) ● Windows Server 2008 for 32-bit Systems Service Pack 2 ● Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) ● Windows Server 2008 for x64-based Systems Service Pack 2 ● Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) ● Windows Server 2012 Windows Server 2012 (Server Core installation) ● Windows Server 2012 R2 ● Windows Server 2012 R2 (Server Core installation) ● Windows Server 2016 ● Windows Server 2016 (Server Core installation) ● Windows Server 2019 ● Windows Server 2019 (Server Core installation) ● Windows Server, version 2004 (Server Core installation) ● Windows Server, version 20H2 (Server Core Installation) 2、CVE-2021-36942: ● Windows Server 2008 R2 for x64-based Systems Service Pack 1 ● Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) ● Windows Server 2008 for 32-bit Systems Service Pack 2 ● Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) ● Windows Server 2008 for x64-based Systems Service Pack 2 ● Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) ● Windows Server 2012 Windows Server 2012 (Server Core installation) ● Windows Server 2012 R2 ● Windows Server 2012 R2 (Server Core installation) ● Windows Server 2016 ● Windows Server 2016 (Server Core installation) ● Windows Server 2019 ● Windows Server 2019 (Server Core installation) ● Windows Server, version 2004 (Server Core installation) ● Windows Server, version 20H2 (Server Core Installation) 3、CVE-2021-36948: ● Windows 10 Version 1809 for 32-bit Systems ● Windows 10 Version 1809 for ARM64-based Systems ● Windows 10 Version 1809 for x64-based Systems ● Windows 10 Version 1909 for 32-bit Systems ● Windows 10 Version 1909 for ARM64-based Systems ● Windows 10 Version 1909 for x64-based Systems ● Windows 10 Version 2004 for 32-bit Systems ● Windows 10 Version 2004 for ARM64-based Systems ● Windows 10 Version 2004 for x64-based Systems ● Windows 10 Version 20H2 for 32-bit Systems ● Windows 10 Version 20H2 for ARM64-based Systems ● Windows 10 Version 20H2 for x64-based Systems ● Windows 10 Version 21H1 for 32-bit Systems ● Windows 10 Version 21H1 for ARM64-based Systems ● Windows 10 Version 21H1 for x64-based Systems ● Windows Server 2019 ● Windows Server 2019 (Server Core installation) ● Windows Server, version 2004 (Server Core installation) ● Windows Server, version 20H2 (Server Core Installation) [建議措施:] 目前微軟官方已針對這些漏洞釋出更新程式,請各機關聯絡維護廠商或參考以下網址進行更新: 1.https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26424 2.https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34481 3.https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34483 4.https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36936 5.https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36942 6.https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36947 7.https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36948   [參考資料:] 1. https://thehackernews.com/2021/08/microsoft-releases-windows-updates-to.html 2. https://www.ithome.com.tw/news/146135 3. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26424 4. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34481 5. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34483 6. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36936 7. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36942 8. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36947 9. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36948   更多資訊安全訊息可參閱本校資訊安全專區https://tnc.hust.edu.tw/isms/

2021/08/16
系統網路組

【漏洞預警】【更新建議措施】微軟Windows伺服器存在PetitPotam漏洞(CVE-2021-36942),允許攻擊者控制整個AD網域,請儘速確認並進行更...

2021/08/02
系統網路組

【漏洞預警】微軟Windows伺服器存在PetitPotam漏洞,允許攻擊者控制整個AD網域,請儘速確認並進行防護補強!

2020/04/10
系統網路組

圖資處負責的A棟電腦教室座位表下載

2020/03/23
系統網路組

因應校園電力維護,所有資訊系統預計於4月3日7:00至20:00停止服務,不便之處尚請見諒

2019/03/20
系統網路組

因應校園電力維護,所有資訊系統預計於4月4日7:00至19:00停止服務,不便之處尚請見諒。

2018/12/24
系統網路組

因應校園電力維護,所有資訊系統預計於1月1日7:00至21:00停止服務,不便之處尚請見諒。

2018/11/29
系統網路組

Chrome及Firefox都不想再支援用了超過40年的FTP

2018/11/27
系統網路組

電子學習平台Moodle出現嚴重CSRF缺陷,TWCERT/CC籲儘速修補

more

活動成果

行政及教學單位網頁教育訓練

行政及教學單位網頁教育訓練

於106.9.30舉行上午場和下午場

view
more

超連結輪播