Ñо¿ÍŶÓÅû¶Ëĸö¿ªÔ´TCP/IP¿âÖеÄ33¸öÎó²îAmnesia:33£»£»£»Å·ÃËEMAÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬COVID-19ÒßÃçÏà¹ØµÄÎļþ±»µÁ
Ðû²¼Ê±¼ä 2020-12-10ForescoutµÄÑо¿ÍŶÓÅû¶ÁËËĸö¿ªÔ´TCP/IP¿âÖеÄ33¸öÎó²î£¬£¬£¬£¬£¬£¬£¬²¢½«ËüÃÇÃüÃûΪAmnesia:33¡£¡£¡£¡£¡£¡£¡£ÕâËĸö¿ªÔ´¿â»®·ÖΪuIP¡¢FNET¡¢picoTCPºÍNut/Net£¬£¬£¬£¬£¬£¬£¬Ó°ÏìÁË150¶à¼Ò¹©Ó¦É̵IJúÆ·¡£¡£¡£¡£¡£¡£¡£ForescoutÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ºÚ¿Í¿ÉʹÓÃÕâ33¸öÎó²îÌᳫԶ³Ì´úÂëÖ´ÐУ¨RCE£©¹¥»÷ÒÔ¿ØÖÆÄ¿µÄ×°±¸£¬£¬£¬£¬£¬£¬£¬¾Ü¾øÐ§ÀÍ£¨DoS£©¹¥»÷ÒÔÓ°Ï칫˾ӪҵÔËÓª£¬£¬£¬£¬£¬£¬£¬ÐÅÏ¢×ß©£¨infoleak£©¹¥»÷ÒÔ»ñȡDZÔÚµÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬DNS»º´æÖж¾¹¥»÷ÒÔ½«×°±¸Ö¸Ïò¶ñÒâÍøÕ¾¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/amnesia33-vulnerabilities-impact-millions-of-smart-and-industrial-devices/
2.GoogleÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´Android OSÖеÄ10¸öÎó²î
GoogleÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´Android OSÖеÄ10¸öÑÏÖØµÄÎó²î¡£¡£¡£¡£¡£¡£¡£ÆäÖÐ×îÑÏÖØµÄÎó²îΪ´úÂëÖ´ÐÐÎó²î£¬£¬£¬£¬£¬£¬£¬±»×·×ÙΪCVE-2020-0458£¬£¬£¬£¬£¬£¬£¬ÓëAndroidýÌå¿ò¼Ü×é¼þÏà¹Ø£¬£¬£¬£¬£¬£¬£¬¿ÉÈù¥»÷ÕßÔ¶³Ì¿ØÖÆÒ×Êܹ¥»÷µÄÊÖ»ú¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬ÆäËûµÄ¾Å¸öÎó²î¾ùÓë¸ßͨ£¨Qualcomm)µÄµ×²ãоƬ×éºÍÅäÌ׹̼þÓйأ¬£¬£¬£¬£¬£¬£¬ÔÚ´ó´ó¶¼AndroidÊÖ»úÉ϶¼ºÜ³£¼û¡£¡£¡£¡£¡£¡£¡£ÀýÈç±»×·×ÙΪCVE-2020-11225µÄÎó²î£¬£¬£¬£¬£¬£¬£¬Óë¸ßͨÎÞÏßµç̨µÄWLANÖ÷»úͨѶ×é¼þÓйء£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/google-patches-critical-wi-fi-and-audio-bugs-in-android-handsets/162060/
3.GE HealthcareÉϰٿîÐͺŵÄ×°±¸±£´æMDHexRayÎó²î
Çå¾²¹«Ë¾CyberMDX·¢Ã÷£¬£¬£¬£¬£¬£¬£¬GE HealthcareÉϰٿîÐͺŵÄ×°±¸±£´æMDHexRayÎó²î¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î±»×·×ÙΪCVE-2020-25179£¬£¬£¬£¬£¬£¬£¬ÑÏÖØË®Æ½Îª9.8·Ö£¬£¬£¬£¬£¬£¬£¬Ó°ÏìÁ˸ù«Ë¾Ê®¼¸Ìõ²úÆ·ÏßµÄ100¶à¸öCT¡¢x¹â¡¢MRI×°±¸ÐͺŵÄ×°±¸¡£¡£¡£¡£¡£¡£¡£MDHexRayÎó²î±£´æµÄÔµ¹ÊÔÓÉÊÇÈí¼þÔÚÿ´Î×°ÖÃÖж¼Ê¹ÓÃĬÈÏÆ¾Ö¤£¬£¬£¬£¬£¬£¬£¬ÒÔÏòGEµÄЧÀÍÆ÷¾ÙÐÐÉí·ÝÑéÖ¤£¬£¬£¬£¬£¬£¬£¬µ«Æ¾Ö¤ÊǹûÕæ¿ÉÓõ쬣¬£¬£¬£¬£¬£¬ºÚ¿Í¿ÉÄÜ»áÀÄÓÃÕâЩÕÊ»§À´»ñȡҽԺºÍÕïËùÄÚ²¿µÄÒ½ÁÆ×°±¸¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/account-with-default-creds-found-in-100-ge-medical-device-models/
4.MicrosoftÐû²¼Óйػº½âDNSÓÕÆ¹¥»÷µÄÖ¸ÄÏ
MicrosoftÐû²¼Óйػº½âDNSÓÕÆ¹¥»÷µÄÖ¸ÄÏ¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îΪѰַÓÕÆÎó²î£¬£¬£¬£¬£¬£¬£¬±»¸ú×ÙΪCVE-2020-25705£¬£¬£¬£¬£¬£¬£¬Î»ÓÚÓëWindows´«Êä¿ØÖÆÐÒé/»¥ÁªÍøÐÒé(TCP/IP)Õ»À¦°óÔÚÒ»ÆðµÄWindows DNSÆÊÎöÆ÷Èí¼þ×é¼þÖС£¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÀÖ³ÉʹÓôËÎó²î¿ÉÒÔÓÕÆDNSÊý¾Ý°ü¡¢DNSת·¢Æ÷»òDNSÆÊÎöÆ÷¡£¡£¡£¡£¡£¡£¡£ÎªÁË»º½â´ËÎó²î£¬£¬£¬£¬£¬£¬£¬MicrosoftÐû²¼¸ÃÖ¸ÄÏ£¬£¬£¬£¬£¬£¬£¬½¨ÒéWindowsÖÎÀíÔ±¸ü¸Ä×¢²á±í£¬£¬£¬£¬£¬£¬£¬½«×î´óUDPÊý¾Ý°ü¾Þϸ¸ü¸ÄΪ1221×Ö½Ú£¬£¬£¬£¬£¬£¬£¬¼´¿É×èֹʹÓøÃÎó²îµÄDNSÓÕÆ¹¥»÷¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/microsoft-issues-guidance-for-dns-cache-poisoning-vulnerability/
5.NetgainÔâµ½ÀÕË÷Èí¼þµÄ¹¥»÷£¬£¬£¬£¬£¬£¬£¬Êý¾ÝÖÐÐı»ÆÈ¹Ø±Õ
ÔÆÍйܺÍITЧÀÍÌṩÉÌNetgainÔâµ½ÀÕË÷Èí¼þµÄ¹¥»÷£¬£¬£¬£¬£¬£¬£¬Êý¾ÝÖÐÐı»ÆÈ¹Ø±Õ¡£¡£¡£¡£¡£¡£¡£NetgainΪҽÁƱ£½¡ºÍ»á¼ÆÐÐÒµµÄ¹«Ë¾ÌṩÍйܺÍÔÆIT½â¾ö¼Æ»®£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÍйÜITЧÀͺÍ×ÀÃæÐ§ÀÍÇéÐΡ£¡£¡£¡£¡£¡£¡£12ÔÂ4ÈÕ£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÏòÆä¿Í»§Ðû²¼Óʼþ³ÆÔâµ½ÁËÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬²¢ÓÚµÚ¶þÌì±»ÆÈ¹Ø±ÕÊý¾ÝÖÐÐÄÒÔ¸ôÀë²¢×èÖ¹ÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬NetgainÊýǧ̨ЧÀÍÆ÷Êܵ½ÁËÓ°Ï죬£¬£¬£¬£¬£¬£¬ÉÐδȷ¶¨»Ö¸´Ê±¼ä£¬£¬£¬£¬£¬£¬£¬Ò²²»ÇåÎúÊǺÎÀÕË÷Èí¼þÍŻ﹥»÷ÁËNetgain¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/ransomware-forces-hosting-provider-netgain-to-take-down-data-centers/
6.Å·ÃËEMAÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬COVID-19ÒßÃçÏà¹ØµÄÎļþ±»µÁ
Å·ÃËî¿Ïµ»ú¹¹Å·ÖÞÒ©Æ·ÖÎÀí¾Ö£¨EMA£©³ÆÆäÔâµ½¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÓëCOVID-19ÒßÃçµÄÏà¹ØÎļþ±»µÁ¡£¡£¡£¡£¡£¡£¡£EMAÊÇÅ·Ã˵ÄȨÁ¦Ï·Żú¹¹£¬£¬£¬£¬£¬£¬£¬ÈÏÕæÆÀ¹À¡¢¼àÊӺͼàÊÓÒýÈëÅ·Ã˵ÄÐÂÒ©¡£¡£¡£¡£¡£¡£¡£EMAÏÖÔÚÕýÔÚÉó²éÁ½ÖÖCOVID-19ÒßÃçµÄÉêÇ룬£¬£¬£¬£¬£¬£¬ Ò»ÖÖÀ´×ÔÃÀ¹úÖÆÒ©¹«Ë¾Moderna£¬£¬£¬£¬£¬£¬£¬ÁíÒ»ÖÖÊÇBioNTechÓëPfizer¹«Ë¾ÏàÖú¿ª·¢µÄ¡£¡£¡£¡£¡£¡£¡£Ö®ºó£¬£¬£¬£¬£¬£¬£¬BioNTechÓëPfizerÐû²¼ÁªºÏÉùÃ÷£¬£¬£¬£¬£¬£¬£¬ÌåÏÖºÚ¿ÍÒÑÔÚEMAµÄÍøÂç¹¥»÷ʱ´ú»á¼ûÁËËûÃÇÌá½»µÄCOVID-19ÒßÃçÏà¹ØµÄÎļþ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/pfizer-covid-19-vaccine-documents-accessed-in-ema-cyberattack/