ÐÅÏ¢Çå¾²Öܱ¨-2018ÄêµÚ30ÖÜ
Ðû²¼Ê±¼ä 2018-07-30Ò»¡¢±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÑо¿»ú¹¹ÖÒÑÔ³ÆÔ¼5ÒÚIoT×°±¸Ò×ÊÜDNSÖØÐ°󶨹¥»÷µÄÓ°Ï죻£»£»£»£»Áè¼Ý100¼ÒÆû³µ³§É̵ÄÉñÃØÊý¾Ýй¶£¬£¬£¬£¬£¬£¬·áÌï¡¢ÌØË¹ÀµÈ¾ùÊÜÓ°Ï죻£»£»£»£»Ñо¿Ö°Ô±·¢Ã÷Õë¶ÔOracle WebLogicЧÀÍÆ÷µÄй¥»÷»î¶¯£»£»£»£»£»¸¥¼ªÄáÑÇÒøÐÐ8¸öÔÂÄÚ2´ÎÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬¹²ËðʧԼ240ÍòÃÀÔª£»£»£»£»£»ÖÐÔ¶º£ÔËÃÀ¹ú·Ö¹«Ë¾ÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬¹«Ë¾¹ÙÍøÒṈ̃»¾¡£¡£¡£¡£¡£¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£¡£¡£
¶þ¡¢Ö÷ÒªÇå¾²Îó²îÁбí
1¡¢ASUS HG100ÏÂÁîÖ´ÐÐÇå¾²Îó²î
ASUS HG100±£´æÊäÈëÑéÖ¤Îó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâÌØÊâÇëÇ󣬣¬£¬£¬£¬£¬ÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£¡£¡£
Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£º
https://jenkins.io/security/advisory/2018-07-18/
2¡¢Cisco SD-WAN Configuration and Management DatabaseÔ¶³Ì´úÂëÖ´ÐÐÎó²î
Cisco SD-WAN Configuration and Management DatabaseÔ¶±£´æÊäÈëÑéÖ¤Îó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬ÒÔvmanageÓû§ÉÏÏÂÎÄÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£¡£¡£
Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£º
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cx
3¡¢Intel Converged Security Management Engineí§Òâ´úÂëÖ´ÐÐÎó²î
Intel Converged Security Management EngineÔ¶³ÌÖÎÀí¼Æ»®ÔÚʵÏÖÉϱ£´æÂß¼Îó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÍâµØ¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬Ö´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£
Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£º
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00118.html
4¡¢McAfee Web GatewayÖÎÀí½çÃæí§Òâ´úÂëÖ´ÐÐÎó²î
McAfee Web GatewayÖÎÀí½çÃæ±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬ÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£
Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£º
https://kc.mcafee.com/corporate/index?page=content&id=SB10245
5¡¢Dell EMC RSA Archer REST APIȨÏÞÌáÉýÎó²î
Dell EMC RSA Archer REST API±£´æÊÚÈ¨ÈÆ¹ýÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬ÌáÉýȨÏÞ¡£¡£¡£¡£¡£¡£¡£
Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£º
http://seclists.org/fulldisclosure/2018/Jul/69
Èý¡¢Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢Ñо¿»ú¹¹ÖÒÑÔ³ÆÔ¼5ÒÚIoT×°±¸Ò×ÊÜDNSÖØÐ°󶨹¥»÷µÄÓ°Ïì
Armis¹«Ë¾ÖÒÑÔ³ÆÔ¼5ÒÚ¸öIoT×°±¸Ò×ÊÜDNSÖØÐ°󶨹¥»÷µÄÓ°Ïì¡£¡£¡£¡£¡£¡£¡£DNSÖØÐ°󶨹¥»÷ÊÇÖ¸¹¥»÷ÕßÓÕÆÓû§µÄä¯ÀÀÆ÷»ò×°±¸°ó¶¨ÖÁ¶ñÒâµÄDNSЧÀÍÆ÷µÄ¹¥»÷·½·¨¡£¡£¡£¡£¡£¡£¡£ArmisÆÊÎöÁËÕâÖÖ¹¥»÷¶ÔIoT×°±¸µÄÓ°Ï죬£¬£¬£¬£¬£¬³ÆÏÕЩËùÓÐÀàÐ͵ÄÖÇÄÜ×°±¸¶¼Ò×ÊÜ´ËÀ๥»÷£¬£¬£¬£¬£¬£¬°üÀ¨ÖÇÄܵçÊÓ¡¢Â·ÓÉÆ÷¡¢´òÓ¡»ú¡¢¼àÊÓÆ÷¡¢IPµç»°µÈ¡£¡£¡£¡£¡£¡£¡£ÐÞ¸´ËùÓеÄ×°±¸¿ÉÄÜÊÇÒ»ÏîÎÞ·¨Íê³ÉµÄʹÃü£¬£¬£¬£¬£¬£¬µ«½«IoT×°±¸¼¯³Éµ½Çå¾²¼à¿Ø²úÆ·ÖпÉÄÜÊÇ×î¼òÆÓÓÐÓõĽâ¾ö¼Æ»®¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/half-a-billion-iot-devices-vulnerable-to-dns-rebinding-attacks/
2¡¢Áè¼Ý100¼ÒÆû³µ³§É̵ÄÉñÃØÊý¾Ýй¶£¬£¬£¬£¬£¬£¬·áÌï¡¢ÌØË¹ÀµÈ¾ùÊÜÓ°Ïì
UpGuardÑо¿Ö°Ô±Chris Vickery·¢Ã÷¹©Ó¦ÉÌLevel OneµÄ²»Çå¾²Êý¾Ý¿â£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨½ü47000·ÝÎļþ£¬£¬£¬£¬£¬£¬º¸Ç¶à¼ÒÆû³µ³§É̵ĽüÊ®ÄêµÄÏêϸÀ¶Í¼¡¢¹¤³§ÔÀíͼ¡¢¿Í»§ÖÊÁÏ£¨ÈçÌõÔ¼¡¢·¢Æ±ºÍÊÂÇéÍýÏëµÈ£©£¬£¬£¬£¬£¬£¬ÒÔ¼°ÖÖÖÖ±£ÃÜÐÒéÎļþµÈ¡£¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄÊý¾Ý×ÜÁ¿´ï157GB£¬£¬£¬£¬£¬£¬¸£ÌØ¡¢·áÌͨÓúÍÌØË¹ÀµÈ¾ùÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄÔµ¹ÊÔÓÉÊÇLevel One¹«Ë¾µÄÓÃÓÚ±¸·ÝÊý¾ÝµÄÎļþ´«ÊäÐÒérsync±»ÉèÖÃΪ¿É¹ûÕæ»á¼û£¬£¬£¬£¬£¬£¬²¢ÇÒ²»ÐèÒªÈκÎÃÜÂë¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.grahamcluley.com/robotics-suppliers-sloppy-security-leaks-ten-years-worth-of-data-from-major-car-manufacturers/
3¡¢Ñо¿Ö°Ô±·¢Ã÷Õë¶ÔOracle WebLogicЧÀÍÆ÷µÄй¥»÷»î¶¯
Ñо¿Ö°Ô±·¢Ã÷Ö÷ÒªÕë¶ÔOracle WebLogicЧÀÍÆ÷µÄ¹¥»÷»î¶¯£¬£¬£¬£¬£¬£¬ÕâЩ¹¥»÷»î¶¯Ö÷ҪʹÓÃÎó²î£¨CVE-2018-2893£©¾ÙÐй¥»÷¡£¡£¡£¡£¡£¡£¡£OracleÔÚ7ÔÂ18ÈÕÐû²¼Á˸ÃÎó²îµÄÏà¹Ø²¹¶¡£¡£¡£¡£¡£¡£¡£¬£¬£¬£¬£¬£¬7ÔÂ21ÈÕÆäÏà¹ØPoC±»Åû¶¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷ÖÁÉÙ2¸ö×éÖ¯ÕýÔÚʹÓøÃÎó²î¾ÙÐй¥»÷£¬£¬£¬£¬£¬£¬½¨Ò黹δ¸üеÄÓû§¾¡¿ì¾ÙÐÐÉý¼¶¡£¡£¡£¡£¡£¡£¡£Ò×Êܹ¥»÷µÄ°æ±¾°üÀ¨10.3.6.0¡¢12.1.3.0¡¢12.2.1.2ºÍ12.2.1.3¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/attacks-on-oracle-weblogic-servers-detected-after-publication-of-poc-code/
4¡¢¸¥¼ªÄáÑÇÒøÐÐ8¸öÔÂÄÚ2´ÎÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬£¬¹²ËðʧԼ240ÍòÃÀÔª
¾Ý¼ÇÕßBrian Krebs±¨µÀ£¬£¬£¬£¬£¬£¬ÃÀ¸¥¼ªÄáÑǹú¼ÒÒøÐÐÓÚ2016Äê5ÔÂÏÂÑ®ºÍ2017Äê1ÔÂÁ½´ÎÔâµ½´¹ÂÚÓʼþµÄ¹¥»÷£¬£¬£¬£¬£¬£¬¹²ËðʧԼ240ÍòÃÀÔª¡£¡£¡£¡£¡£¡£¡£µÚÒ»´Î¹¥»÷Öй¥»÷Õßͨ¹ý¶ñÒâÈí¼þѬȾÁËһ̨ÅÌËã»ú£¬£¬£¬£¬£¬£¬²¢Äܹ»»á¼ûÒøÐÐÄÚÍøºÍÈÆ¹ýPINÂë¡¢ÖðÈÕÈ¡¿îÏÞÖÆÒÔ¼°·´Ú²Æ²½·¥µÈ¡£¡£¡£¡£¡£¡£¡£µÚ¶þ´Î¹¥»÷µÄģʽÓëµÚÒ»´Î¹¥»÷ÏàËÆ¡£¡£¡£¡£¡£¡£¡£SynopsysÊ×ϯÕÕÁÏChandu KetkarÒÔΪ£¬£¬£¬£¬£¬£¬ÕâЩÊÂÎñÊÇÆäÇå¾²ÒâʶÅàѵ¡¢¼à¿ØºÍÓ¦¼±ÏìÓ¦µÈÕ½ÂÔµÄʧ°Ü¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.infosecurity-magazine.com/news/virginian-bank-robbed-twice-in/
5¡¢ÖÐÔ¶º£ÔËÃÀ¹ú·Ö¹«Ë¾ÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬¹«Ë¾¹ÙÍøÒṈ̃»¾
ÖÐÔ¶º£Ô˵ÄÃÀ¹ú·Ö¹«Ë¾Ôâµ½ÀÕË÷Èí¼þµÄ¹¥»÷£¬£¬£¬£¬£¬£¬Æä¹«Ë¾ÍøÂçÒÑÏÝÈë̱»¾¡£¡£¡£¡£¡£¡£¡£¸ÃÊÂÎñ±¬·¢ÔÚ7ÔÂ24ÈÕÐÇÆÚ¶þ£¬£¬£¬£¬£¬£¬µ«ÏÖÔڸù«Ë¾ÃÀ¹úµØÇøµÄIT»ù´¡ÉèÊ©ÈÔ´¦ÓڹرÕÖ®ÖУ¬£¬£¬£¬£¬£¬°üÀ¨µç×ÓÓʼþЧÀÍÆ÷ºÍµç»°ÍøÂçµÈ£¬£¬£¬£¬£¬£¬Æä¹ÙÍøÒ²´¦ÓڹرÕ״̬¡£¡£¡£¡£¡£¡£¡£Ñ¬È¾¸Ã¹«Ë¾ÍøÂçµÄÀÕË÷Èí¼þÀàÐÍÈÔȻδ֪£¬£¬£¬£¬£¬£¬ÏÖÔڸù«Ë¾Ò²Î´×÷³ö¸ü¶à»ØÓ¦¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/ransomware-infection-cripples-shipping-giant-coscos-american-network/