{"id":11541,"date":"2026-04-20T15:13:02","date_gmt":"2026-04-20T07:13:02","guid":{"rendered":"https:\/\/aict.nkust.edu.tw\/digitrans\/?p=11541"},"modified":"2026-04-20T15:13:03","modified_gmt":"2026-04-20T07:13:03","slug":"cisa%e8%ad%a6%e5%91%8a%ef%bc%8c%e9%a7%ad%e5%ae%a2%e6%ad%a3%e5%9c%a8%e5%88%a9%e7%94%a817%e5%b9%b4%e5%89%8d%e7%9a%84excel%e6%bc%8f%e6%b4%9e%e5%b1%95%e9%96%8b%e6%94%bb%e6%93%8a","status":"publish","type":"post","link":"https:\/\/aict.nkust.edu.tw\/digitrans\/?p=11541","title":{"rendered":"CISA\u8b66\u544a\uff0c\u99ed\u5ba2\u6b63\u5728\u5229\u752817\u5e74\u524d\u7684Excel\u6f0f\u6d1e\u5c55\u958b\u653b\u64ca"},"content":{"rendered":"\n<p>\u9019\u7bc7\u6587\u7ae0\u4e3b\u8981\u805a\u7126\u5728\u7f8e\u570b\u7db2\u8def\u5b89\u5168\u8207\u57fa\u790e\u8a2d\u65bd\u5b89\u5168\u5c40\uff08CISA\uff09\u8fd1\u671f\u628a\u5169\u500b\u6f0f\u6d1e\u7d0d\u5165\u5df2\u77e5\u906d\u5229\u7528\u6f0f\u6d1e\u6e05\u55ae\uff08Known Exploited Vulnerability\uff0cKEV\uff09\u7684\u73fe\u8c61\uff0c\u900f\u904e\u4e00\u4efd\u300c\u5df2\u88ab\u99ed\u5ba2\u5be6\u969b\u62ff\u4f86\u7528\u300d\u7684\u540d\u55ae\uff0c\u63d0\u9192\u806f\u90a6\u6a5f\u69cb\u5fc5\u9808\u5728\u671f\u9650\u5167\u5b8c\u6210\u4fee\u88dc\uff0c\u4e26\u9023\u5e36\u5efa\u8b70\u4f01\u696d\u6bd4\u7167\u8655\u7406\u3002\u6587\u4e2d\u6307\u51fa\uff0cCISA\u672c\u9031\u4e8c\uff084\/14\uff09\u5ba3\u5e03KEV\u6536\u9304\u7684\u7bc4\u570d\u5305\u542b\u9ad8\u5ea6\u98a8\u96aa\u3001\u4e14\u78ba\u5b9a\u5b58\u5728\u88ab\u5229\u7528\u4e8b\u5be6\u7684\u6f0f\u6d1e\u3002\u7b2c\u4e00\u500b\u4f8b\u5b50\u662f\u5fae\u8edf\u624d\u5728\u540c\u4e00\u5929\u4fee\u88dc\u7684SharePoint Server\u6f0f\u6d1eCVE-2026-32201\uff1b\u7b2c\u4e8c\u500b\u4f8b\u5b50\u5247\u66f4\u5f15\u4eba\u95dc\u6ce8\uff0c\u56e0\u70ba\u5b83\u5c6c\u65bc\u65e9\u572817\u5e74\u524d\u5c31\u5df2\u7531\u5fae\u8edf\u4fee\u88dc\u7684Excel\u6f0f\u6d1eCVE-2009-0238\u3002\u6587\u7ae0\u85c9\u7531\u9019\u5169\u8005\u540c\u5217\u7684\u5b89\u6392\uff0c\u7a81\u986f\u5b89\u5168\u7dad\u904b\u7684\u6838\u5fc3\u77db\u76fe\uff1a\u65b0\u6f0f\u6d1e\u9700\u8981\u5373\u6642\u4fee\u88dc\uff0c\u800c\u8001\u6f0f\u6d1e\u4e4b\u6240\u4ee5\u4ecd\u80fd\u9020\u6210\u5a01\u8105\uff0c\u5f80\u5f80\u4e0d\u662f\u56e0\u70ba\u6280\u8853\u80fd\u529b\u9000\u6b65\uff0c\u800c\u662f\u56e0\u70ba\u74b0\u5883\u66f4\u65b0\u901f\u5ea6\u8ddf\u4e0d\u4e0a\u653b\u64ca\u8005\u7684\u7bc0\u594f\u3002<\/p>\n\n\n\n<p>\u5728\u6f0f\u6d1e\u5167\u5bb9\u7684\u63cf\u5beb\u4e0a\uff0c\u9019\u7bc7\u6587\u7ae0\u5148\u7528CISA\u7684KEV\u6a5f\u5236\u5efa\u7acb\u8b80\u8005\u7406\u89e3\u6846\u67b6\u3002\u6587\u4e2d\u660e\u78ba\u8aaa\u660e\uff0cKEV\u6e05\u55ae\u88ab\u8996\u70ba\u512a\u5148\u4fee\u88dc\u6307\u5f15\uff0c\u4fee\u88dc\u671f\u9650\u5f9e\u5e7e\u5929\u5230\u5e7e\u9031\u4e0d\u7b49\uff0c\u76ee\u7684\u5728\u65bc\u8981\u6c42\u53d7\u5f71\u97ff\u55ae\u4f4d\u5feb\u901f\u964d\u4f4e\u98a8\u96aa\u3002\u96a8\u5f8c\u6587\u7ae0\u8f49\u5411CVE-2009-0238\u672c\u8eab\u7684\u6280\u8853\u6558\u8ff0\uff0c\u4e26\u5f15\u7528\u5fae\u8edf17\u5e74\u524d\u516c\u544a\u7684\u91cd\u9ede\uff1aCVE-2009-0238\u662fMicrosoft Office Excel\u7684\u8a18\u61b6\u9ad4\u6bc0\u640d\u6f0f\u6d1e\uff0c\u53ea\u8981\u4f7f\u7528\u8005\u958b\u555f\u5305\u542b\u7570\u5e38\u7269\u4ef6\u7684\u7279\u88fdExcel\u6a94\u6848\uff0c\u99ed\u5ba2\u4fbf\u80fd\u6210\u529f\u5229\u7528\u8a72\u6f0f\u6d1e\uff0c\u9032\u4e00\u6b65\u9054\u6210\u9060\u7aef\u57f7\u884c\u4efb\u610f\u7a0b\u5f0f\u78bc\u3002\u6587\u7ae0\u4e5f\u88dc\u5145\uff0c\u653b\u64ca\u7d50\u679c\u4e0d\u9650\u65bc\u55ae\u7d14\u5165\u4fb5\uff0c\u9084\u53ef\u80fd\u8b93\u653b\u64ca\u8005\u80fd\u6aa2\u8996\u3001\u8b8a\u66f4\u6216\u522a\u9664\u8cc7\u6599\uff0c\u751a\u81f3\u5efa\u7acb\u5177\u5099\u5b8c\u6574\u6b0a\u9650\u7684\u65b0\u5e33\u865f\u3002\u9019\u6a23\u7684\u6558\u4e8b\u8b93\u8b80\u8005\u7406\u89e3\uff1aKEV\u4e26\u975e\u55ae\u7d14\u5217\u51faCVE\u4ee3\u78bc\uff0c\u800c\u662f\u628a\u300c\u98a8\u96aa\u6703\u843d\u5730\u5230\u5be6\u969b\u884c\u52d5\u300d\u7684\u53ef\u80fd\u6027\u8b1b\u5f97\u66f4\u5177\u9ad4\u3002<\/p>\n\n\n\n<p>\u6700\u5f8c\uff0c\u6587\u7ae0\u628a\u7126\u9ede\u843d\u5728\u70ba\u4ec0\u9ebc17\u5e74\u524d\u7684\u6f0f\u6d1e\u4eca\u5929\u9084\u6703\u88ab\u62ff\u51fa\u4f86\u7528\u3002\u5b83\u6307\u51fa\uff0c\u65b0\u7684KEV\u6e05\u55ae\u610f\u5473\u8457\u4ecd\u6709\u90e8\u5206\u7cfb\u7d71\u8fc4\u4eca\u4ecd\u5728\u4f7f\u7528\u53d7\u5230\u5f71\u97ff\u7684\u820a\u7248Office\uff0c\u56e0\u6b64\u624d\u6703\u88ab\u99ed\u5ba2\u4ee5CVE-2009-0238\u767c\u52d5\u653b\u64ca\uff1b\u540c\u6642\uff0cCISA\u4e26\u672a\u900f\u9732\u592a\u591a\u6709\u95dc\u8a72\u6f0f\u6d1e\u5982\u4f55\u906d\u5230\u5229\u7528\u7684\u7d30\u7bc0\uff0c\u5f62\u6210\u4e00\u7a2e\u8cc7\u8a0a\u843d\u5dee\u3002\u6587\u4e2d\u4e5f\u63f4\u5f15Security Affairs\u7684\u8aaa\u6cd5\uff0c\u6307\u51fa\u7576\u5e74CVE-2009-0238\u7684CVSS\u98a8\u96aa\u8a55\u5206\u9ad8\u90549.3\uff0c\u5f37\u8abf\u653b\u64ca\u53ef\u80fd\u53ea\u8981\u4f7f\u7528\u8005\u958b\u555f\u7279\u88fdExcel\u6a94\u6848\u5c31\u6703\u88ab\u89f8\u767c\uff0c\u9020\u6210\u61c9\u7528\u7a0b\u5f0f\u5b58\u53d6\u8a18\u61b6\u9ad4\u4e2d\u7684\u7121\u6548\u7269\u4ef6\uff0c\u5c0e\u81f4\u8a18\u61b6\u9ad4\u640d\u58de\uff0c\u9032\u800c\u8b93\u9060\u7aef\u99ed\u5ba2\u5f97\u4ee5\u900f\u904e\u4f7f\u7528\u8005\u6b0a\u9650\u57f7\u884c\u4efb\u610f\u7a0b\u5f0f\u78bc\u3002\u6587\u7ae0\u9032\u4e00\u6b65\u5217\u51fa\u5f71\u97ff\u7bc4\u570d\uff0c\u5305\u542b\u591a\u500b\u820a\u7248Office\u8207Excel\u5143\u4ef6\uff0c\u4e14\u8a31\u591a\u7248\u672c\u65e9\u5df2\u505c\u6b62\u652f\u63f4\uff1b\u56e0\u6b64\u5c0d\u8b80\u8005\u800c\u8a00\uff0c\u6700\u91cd\u8981\u7684\u8a0a\u606f\u662f\uff1a\u771f\u6b63\u7684\u9632\u7dda\u4e0d\u53ea\u5728\u65bc\u77e5\u9053\u6709\u6f0f\u6d1e\uff0c\u66f4\u5728\u65bc\u662f\u5426\u5b8c\u6210\u66f4\u65b0\u3001\u662f\u5426\u4ecd\u5728\u904b\u884c\u9ad8\u98a8\u96aa\u4e14\u5df2\u4e0d\u53d7\u652f\u63f4\u7684\u8edf\u9ad4\u5806\u758a\u3002<\/p>\n\n\n\n<p>\u95b1\u8b80\u5b8c\u6574\u6587\u7ae0:<a href=\"https:\/\/www.ithome.com.tw\/news\/175102\">https:\/\/www.ithome.com.tw\/news\/175102<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u9019\u7bc7\u6587\u7ae0\u4e3b\u8981\u805a\u7126\u5728\u7f8e\u570b\u7db2\u8def\u5b89\u5168\u8207\u57fa\u790e\u8a2d\u65bd\u5b89\u5168\u5c40\uff08CISA\uff09\u8fd1\u671f\u628a\u5169\u500b\u6f0f\u6d1e\u7d0d\u5165\u5df2\u77e5\u906d\u5229\u7528\u6f0f\u6d1e\u6e05\u55ae\uff08Known Exploited Vulnerability\uff0cKEV\uff09\u7684\u73fe\u8c61\uff0c\u900f\u904e\u4e00\u4efd&hellip;<\/p>\n","protected":false},"author":19,"featured_media":11542,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[352],"tags":[204],"class_list":["post-11541","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-information-security","tag-204"],"gutentor_comment":0,"jetpack_featured_media_url":"https:\/\/i0.wp.com\/aict.nkust.edu.tw\/digitrans\/wp-content\/uploads\/2026\/04\/digital-security-breach-alert-electronic-devices.jpg?fit=1122%2C768&ssl=1","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/posts\/11541","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=11541"}],"version-history":[{"count":1,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/posts\/11541\/revisions"}],"predecessor-version":[{"id":11543,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/posts\/11541\/revisions\/11543"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=\/wp\/v2\/media\/11542"}],"wp:attachment":[{"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=11541"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=11541"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aict.nkust.edu.tw\/digitrans\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=11541"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}