˼¿ÆÐÞ¸´·¢Ã÷ÐÒ飨CDP£©ÖÐÎå¸ö¸ßΣÎó²î£¬£¬£¬£¬Ó°ÏìÊý°ÙÍò×°±¸£»£»£»Ñо¿Ö°Ô±Åû¶º£Ë¼Ð¾Æ¬ÖÐÉÐδÐÞ¸´µÄºóÃÅÎó²î¼°PoC
Ðû²¼Ê±¼ä 2020-02-071.˼¿ÆÐÞ¸´·¢Ã÷ÐÒ飨CDP£©ÖÐÎå¸ö¸ßΣÎó²î£¬£¬£¬£¬Ó°ÏìÊý°ÙÍò×°±¸
ÎïÁªÍøÇå¾²¹«Ë¾ArmisÔÚ˼¿Æ·¢Ã÷ÐÒ飨CDP£©Öз¢Ã÷Îå¸ö¸ßΣÎó²î£¬£¬£¬£¬Ó°ÏìÊý°ÙÍò×°±¸¡£¡£¡£¡£CDPÊÇ˼¿Æ×°±¸Ê¹ÓõÄרÓеÚ2²ã£¨Êý¾ÝÁ´Â·²ã£©ÐÒ飬£¬£¬£¬ÓÃÓÚ·¢Ã÷ÍâµØÍøÂçÉÏµÄÆäËü˼¿Æ×°±¸¡£¡£¡£¡£Ä¬ÈÏÇéÐÎÏ£¬£¬£¬£¬ÏÕЩËùÓÐ˼¿Æ²úÆ·£¨°üÀ¨Â·ÓÉÆ÷¡¢½»Á÷»úÒÔ¼°IPµç»°ºÍÉãÏñ»ú£©¾ùÆôÓôËÐÒé¡£¡£¡£¡£ÕâÎå¸öÎó²î±»³ÆÎªCDPwn£¬£¬£¬£¬°üÀ¨ËĸöÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2020-3110¡¢CVE-2020-3111¡¢CVE-2020-3118¡¢CVE-2020-3119£©ºÍÒ»¸ö¾Ü¾øÐ§ÀÍÎó²î£¨CVE-2020-3120£©¡£¡£¡£¡£ÒÑÍùÊ®ÄêÖÐÐû²¼µÄ˼¿Æ¹Ì¼þ°æ±¾¾ùÊܵ½ÕâЩÎó²îµÄÓ°Ï죬£¬£¬£¬ÕâЩÎó²î¿ÉÄÜÊ¹ÉøÍ¸µ½ÆóÒµÍøÂçÖеÄÍâµØ¹¥»÷ÕßÄܹ»Ö´ÐÐÖÐÐÄÈ˹¥»÷¡¢¼àÊÓÓïÒô»òÊÓÆµºô½Ð¡¢ÍøÂçºÍ×ß©Êý¾ÝÒÔ¼°ÆÆËðÍøÂç·Ö¶Î¡£¡£¡£¡£ÏÖÔÚ˼¿ÆÒѾÐû²¼ÁËÏà¹Ø²úÆ·µÄ¹Ì¼þ¸üÐÂÀ´ÐÞ¸´ÕâЩÎó²î¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/cisco-patches-critical-cdp-flaws-affecting-millions-of-devices/
2.Ñо¿Ö°Ô±Åû¶º£Ë¼Ð¾Æ¬ÖÐÉÐδÐÞ¸´µÄºóÃÅÎó²î¼°PoC
¶íÂÞ˹Ç徲ר¼ÒVladislav YarmakÐû²¼ÁËËûÔÚº£Ë¼Ð¾Æ¬Öз¢Ã÷µÄºóÃÅ»úÖÆµÄÊÖÒÕϸ½Ú£¬£¬£¬£¬²¢ÌåÏÖÓÉÓÚ¶Ô¹©Ó¦ÉÌȱ·¦ÐÅÈΣ¬£¬£¬£¬ËûûÓÐÏòº£Ë¼Åû¶¸ÃÎó²î¡£¡£¡£¡£¸ÃºóÃÅ»úÖÆ¿ÉÒÔʹ¹¥»÷Õß»ñµÃroot shell»á¼ûȨÏÞ²¢ÍêÈ«¿ØÖÆ×°±¸£¬£¬£¬£¬ÏêϸÀ´Ëµ£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜʹÓà ºóÃÅͨ¹ýÔÚTCP¶Ë¿Ú9530ÉÏÏò»ùÓÚº£Ë¼Ð¾Æ¬µÄ×°±¸·¢ËÍһϵÁÐÏÂÁ£¬£¬£¬ÕâЩÏÂÁîÔÊÐí¹¥»÷ÕßÔÚ×°±¸ÉÏÆôÓÃTelnetЧÀÍ£¬£¬£¬£¬È»ºó¹¥»÷Õß¿ÉÒÔʹÓÃÁù¸öTelnetƾ֤֮һµÇ¼£¬£¬£¬£¬²¢»ñµÃ¶ÔrootÕÊ»§µÄ»á¼ûȨÏÞ¡£¡£¡£¡£Yarmak»¹ÔÚgithubÉÏÐû²¼Á˸ÃÎó²îµÄPoC´úÂë¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/97367/hacking/hisilicon-chips-backdoor.html
3.Ñо¿Ö°Ô±·¢Ã÷ÃÀ¹ú¹ú·À²¿£¨DOD£©ÍøÕ¾ÔËÐÐÃÅÂÞ±ÒÍÚ¿óЧÀÍ
Çå¾²Ñо¿Ö°Ô±ÉϸöÔ·¢Ã÷ÃÀ¹ú¹ú·À²¿£¨DOD£©ÔËÓªµÄWebЧÀÍÆ÷ÖÐѬȾÁ˼ÓÃÜÇ®±ÒÍÚ¿ó½©Ê¬ÍøÂç¡£¡£¡£¡£Ó¡¶ÈÇå¾²Ñо¿Ô±Nitesh Suranaͨ¹ý¹ú·À²¿µÄ¹Ù·½Îó²îÉͽðÍýÏë·¢Ã÷²¢±¨¸æÁË´ËÎÊÌâ¡£¡£¡£¡£×î³õ£¬£¬£¬£¬Îó²î±¨¸æÊÇÕë¶ÔÓëDODÓò¹ØÁªµÄAWSЧÀÍÆ÷ÉÏÔËÐеÄÉèÖùýʧµÄJenkins×Ô¶¯»¯Ð§ÀÍÆ÷Ìá½»µÄ£¬£¬£¬£¬Surana·¢Ã÷ÈκÎÈ˶¼¿ÉÒÔÔÚûÓеǼƾ֤µÄÇéÐÎÏ»á¼ûJenkinsЧÀÍÆ÷¡£¡£¡£¡£ØÊºóSuranaÒâʶµ½¸ÃJenkinsЧÀÍÆ÷ÔÚËû·¢Ã÷֮ǰÒѾѬȾÁËÃÅÂÞ±ÒÍÚ¿ó½©Ê¬ÍøÂç¡£¡£¡£¡£Ê¹ÓÃXMRHunterЧÀÍ£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷½©Ê¬ÍøÂçµÄÃÅÂޱҵصãÄ¿½ñ³ÖÓÐ35.4¸öÃÅÂÞ±Ò£¬£¬£¬£¬¼ÛÖµÂÔ¸ßÓÚ2700ÃÀÔª£¬£¬£¬£¬µ«Õâ²¢²»¿É׼ȷԤ¼Æ¸Ã½©Ê¬ÍøÂçµÄÔËÐÐÇéÐΡ£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/bug-hunter-finds-cryptocurrency-mining-botnet-on-dod-network/
4.ÂíË¹ÌØÀïºÕÌØ´óѧÏòÀÕË÷Èí¼þ¹¥»÷ÕßÖ§¸¶30±ÈÌØ±ÒÊê½ð
ÂíË¹ÌØÀïºÕÌØ´óѧÌåÏÖÔÚÔâµ½ÀÕË÷Èí¼þ¹¥»÷ºó£¬£¬£¬£¬ËüÖ§¸¶ÁË30±ÈÌØ±ÒµÄÊê½ðÒÔ»Ö¸´ÆäÅÌËã»úϵͳ¡£¡£¡£¡£¸Ã´óѧ¸±Ð£³¤Äá¿Ë¡¤²©Ë¹£¨Nick Bos£©ÔÚÐÂÎÅÐû²¼»áÉÏ·ÖÏíÁËÕâÒ»Êý×Ö¡£¡£¡£¡£BosÖ¸³ö£¬£¬£¬£¬¸ÃÊÂÎñʼÓÚ2019Äê11Ô£¬£¬£¬£¬´¹ÂÚ¹¥»÷ÕßÈëÇÖÁËÒ»Ãû´óѧԱ¹¤µÄµç×ÓÓʼþÕÊ»§£¬£¬£¬£¬È»ºóÔÚ12ÔÂ24ÈÕͨ¹ýÀÕË÷Èí¼þÑ¬È¾Ëø¶¨ÁË´óѧµÄÅÌËã»úϵͳ£¬£¬£¬£¬µ¼ÖÂÔ±¹¤ÎÞ·¨»á¼ûÆäµç×ÓÓʼþ»òÊÂÇéÕ¾¡£¡£¡£¡£Æ¾Ö¤Êý×ÖÇå¾²¹«Ë¾Fox-ITµÄÊӲ죬£¬£¬£¬¸Ã¹¥»÷ÊÂÎñÓë·¸·¨ÍÅ»ïTA505Óйء£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.tripwire.com/state-of-security/security-data-protection/university-of-maastricht-paid-30-bitcoins-to-ransomware-attackers/
5.ÈÕ±¾¹ú·À³Ð°üÉÌPascoºÍKobelco»®·ÖÅû¶ºÚ¿ÍÈëÇÖÊÂÎñ
ÈÕ±¾¹ú·À³Ð°üÉÌPasco Corporation£¨Pasco£©ºÍKobe Steel£¨Kobelco£©»®·ÖÅû¶ÁË2018Äê5ÔºÍ2015Äê6ÔÂ/2016Äê8Ô±¬·¢µÄºÚ¿ÍÈëÇÖÊÂÎñ¡£¡£¡£¡£KobelcoÊÇÈÕ±¾×ÔÎÀ¶Ó£¨SDF£©Ç±Í§Áã¼þµÄ×ÅÃû¹©Ó¦ÉÌ£¬£¬£¬£¬¶øPascoÊÇÎÀÐÇÊý¾ÝµÄÌṩÉÌ£¬£¬£¬£¬¶þÕß»¹È·ÈÏÁËÁ½´ÎÊÂÎñʱ´úÆäÄÚ²¿ÍøÂç¾ùÔ⵽δÊÚȨ»á¼ûÒÔ¼°ÔÚ¹¥»÷ºóÆäÅÌËã»úϵͳÔâµ½¶ñÒâÈí¼þѬȾ¡£¡£¡£¡£Æ¾Ö¤Pasco½ÒÏþµÄ¹Ù·½ÉùÃ÷£¬£¬£¬£¬µ½ÏÖÔÚΪֹÊÓ²ìÖÐûÓз¢Ã÷ÖîÈçÐÅÏ¢×ß©֮ÀàµÄË𺦡£¡£¡£¡£µ«Ö»¹ÜKobelcoµÄ¹Ù·½ÉùÃ÷ûÓÐÌá¼°£¬£¬£¬£¬¡¶ÈÕ¾ÐÂÎÅ¡· ±¨µÀ¸Ã¹«Ë¾µÄ250¸ö°üÀ¨Óë¹ú·À²¿ºÍСÎÒ˽¼ÒÐÅÏ¢ÓйصÄÊý¾ÝÎļþÔâµ½Ë𺦡£¡£¡£¡£Á½¼Ò¹«Ë¾ÊÇ2016ÄêÖÁ2019Äêʱ´úÈÕ±¾±»ºÚ¿ÍÈëÇÖµÄËļÒÓë¹ú·ÀÓйصĹ«Ë¾ÖеÄ×îºóÁ½¼Ò£¬£¬£¬£¬ÁíÍâÁ½¼ÒÊÇÈýÁâµç»úºÍNEC£¬£¬£¬£¬ËüÃÇ»®·ÖÔÚ1ÔÂ20ÈÕºÍ1ÔÂ30ÈÕÐû²¼µÄÉùÃ÷ÖÐ֤ʵÆäϵͳÔâµ½ÈëÇÖ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/japanese-defense-contractors-kobe-steel-pasco-disclose-breaches/
6.¶íÀÕ¸ÔÖÝÒ½Áƹ©Ó¦ÉÌHealth Shareй¶65.4Íò»¼ÕßÐÅÏ¢
¶íÀÕ¸ÔÖÝÒ½ÁƽòÌùе÷×éÖ¯£¨CCO£©µÄHealth ShareÅû¶һÏîÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬ÔÚÔËÊ乩ӦÉÌGridWorks ICµÄÌõ¼Ç±¾µçÄÔ±»µÁºó¹²ÓÐ654362Ãû»¼ÕßµÄÐÅϢй¶¡£¡£¡£¡£¸ÃÊÂÎñ±¬·¢ÔÚ2019Äê11ÔÂ18ÈÕ£¬£¬£¬£¬±»µÁµÄÌõ¼Ç±¾µçÄÔ°üÀ¨¼¸ÖÖÀàÐ͵ϼÕßÐÅÏ¢£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢µç»°ºÅÂë¡¢³öÉúÈÕÆÚ¡¢Éç»á°ü¹ÜºÅºÍÒ½ÁƽòÌùIDºÅ¡£¡£¡£¡£Æ¾Ö¤Health ShareµÄÉùÃ÷£¬£¬£¬£¬¸ÃÊÂÎñ²¢Î´Ì»Â¶»¼ÕßµÄÒ½ÁÆÀúÊ·¼Í¼¡£¡£¡£¡£Health Share½«ÎªÊÜÓ°ÏìµÄ»¼ÕßÌṩ1ÄêµÄÃâ·ÑÉí·Ý¼à¿ØÐ§ÀÍ£¬£¬£¬£¬°üÀ¨ÐÅÓÃ¼à¿Ø¡¢Ú²Æ×ÉѯºÍÉí·Ý͵ÇÔ»Ö¸´¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/medicaid-cco-vendor-breach-exposes-health-personal-info-of-654k/