Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms
嗯,用户让我用中文帮他总结一篇文章,控制在一百个字以内,而且不需要特定的开头。首先,我需要仔细阅读这篇文章,了解主要内容。 文章主要讲的是Patch Tuesday,也就是每个月微软和其他软件厂商发布安全补丁的日子。微软修复了59个漏洞,其中有6个是零日漏洞,影响很大。Adobe也发布了多个产品的更新,但没有被利用的报告。SAP修复了两个严重漏洞,涉及到代码注入和权限问题。Intel和Google合作发现了TDX模块的五个漏洞。还有其他很多厂商也发布了安全更新。 接下来,我需要把这些信息浓缩到100字以内。要抓住关键点:Patch Tuesday、微软修复59个漏洞、Adobe、SAP的两个严重漏洞、Intel和Google的合作发现漏洞,以及众多厂商发布更新。 然后组织语言,确保简洁明了。比如:“Patch Tuesday期间,微软修复了59个漏洞,包括6个零日漏洞;Adobe更新了多个产品;SAP修复了两个严重漏洞;Intel与Google合作发现了TDX模块的五个漏洞;其他众多厂商也发布了安全更新。”这样大概控制在100字左右。 还要注意不要使用“文章内容总结”这样的开头词,直接描述内容即可。 </think> Patch Tuesday期间,微软修复了59个漏洞(含6个零日);Adobe更新了多个产品;SAP修复了两个严重漏洞(代码注入和权限问题);Intel与Google合作发现了TDX模块的五个漏洞;其他众多厂商也发布了安全更新。 2026-2-11 13:28:0 Author: thehackernews.com(查看原文) 阅读量:0 收藏

Patch Tuesday / Vulnerability

It's Patch Tuesday, which means a number of software vendors have released patches for various security vulnerabilities impacting their products and services.

Microsoft issued fixes for 59 flaws, including six actively exploited zero-days in various Windows components that could be abused to bypass security features, escalate privileges, and trigger a denial-of-service (DoS) condition.

Elsewhere, Adobe released updates for Audition, After Effects, InDesign Desktop, Substance 3D, Bridge, Lightroom Classic, and DNG SDK. The company said it's not aware of in-the-wild exploitation of any of the shortcomings.

SAP shipped fixes for two critical-severity vulnerabilities, including a code injection bug in SAP CRM and SAP S/4HANA (CVE-2026-0488, CVSS score: 9.9) that an authenticated attacker could use to run an arbitrary SQL statement and lead to a full database compromise.

The second critical vulnerability is a case of a missing authorization check in SAP NetWeaver Application Server ABAP and ABAP Platform (CVE-2026-0509, CVSS score: 9.6) that could permit an authenticated, low-privileged user to perform certain background Remote Function Calls without the required S_RFC authorization.

"To patch the vulnerability, customers must implement a kernel update and set a profile parameter," Onapsis said. "Adjustments in user roles and UCON settings might be required to not interrupt business processes."

Rounding off the list, Intel and Google said they teamed up to examine the security of Intel Trust Domain Extensions (TDX) 1.5, uncovering five vulnerabilities in the module (CVE-2025-32007, CVE-2025-27940, CVE-2025-30513, CVE-2025-27572, and CVE-2025-32467), and nearly three dozen weaknesses, bugs, and improvement suggestions.

"Intel TDX 1.5 introduces new features and functionality that bring confidential computing significantly closer to feature parity with traditional virtualization solutions," Google said. "At the same time, these features have increased the complexity of a highly privileged software component in the TCB [Trusted Computing Base]."

Software Patches from Other Vendors

Security updates have also been released by other vendors in recent weeks to rectify several vulnerabilities, including —

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/02/over-60-software-vendors-issue-security.html
如有侵权请联系:admin#unsafe.sh