ÐÅÏ¢Çå¾²Öܱ¨-2020ÄêµÚ02ÖÜ

Ðû²¼Ê±¼ä 2020-01-13


±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2020Äê01ÔÂ06ÈÕÖÁ12ÈÕ¹²ÊÕ¼Çå¾²Îó²î57¸ö £¬£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇCisco Webex Video Mesh Software WEBÏÂÁî×¢ÈëÎó²î; Mozilla Firefox Windows XPCVariant.cppÀàÐÍ»ìÏý´úÂëÖ´ÐÐÎó²î£»£»£»£»Android Realtek rtlwifi driverÔ¶³Ì´úÂëÖ´ÐÐÎó²î£»£»£»£»Android Sound subsystemȨÏÞÌáÉýÎó²î£»£»£»£»Billion Smart Energy Router SG600R2ÏÂÁîÖ´ÐÐÎó²î¡£¡£¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇUpstream SecurityÐû²¼2020°æ¡¶Æû³µÍøÂçÇå¾²±¨¸æ¡·£»£»£»£»Î¢ÈíÐû²¼RDP±©Á¦¹¥»÷ÆÊÎö±¨¸æ £¬£¬£¬£¬£¬£¬Æ½¾ùÒ»Á¬Ê±¼äΪ2-3Ì죻£»£»£»MITREÐû²¼ÊÊÓÃÓÚ¹¤Òµ¿ØÖÆÏµÍ³µÄATT£¦CK¿ò¼Ü£»£»£»£»Î¢ÈíÐÞ¸´AccessÖеÄÐÅϢй¶Îó²î£¨CVE-2019-1463£©£»£»£»£»MozillaÐû²¼¸üÐÂ,ÐÞ¸´Firefox 0dayÎó²î(CVE-2019-11707)¡£¡£¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö £¬£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£



Ö÷ÒªÇå¾²Îó²îÁбí


1. Cisco Webex Video Mesh Software WEBÏÂÁî×¢ÈëÎó²î


Cisco Webex Video Mesh Software releases WEB½Ó¿Ú±£´æÇå¾²Îó²î £¬£¬£¬£¬£¬£¬ÔÊÐíͨ¹ýÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬£¬£¬£¬£¬£¬ÒÔROOTȨÏÞÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-webex-video


2. Mozilla Firefox Windows XPCVariant.cppÀàÐÍ»ìÏý´úÂëÖ´ÐÐÎó²î


Mozilla Firefox XPCVariant.cpp±£´æÀàÐÍ»ìÏýÎó²î £¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄWEBÇëÇó £¬£¬£¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö £¬£¬£¬£¬£¬£¬¿ÉʹӦÓóÌÐòÍ߽⻣»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£

https://www.mozilla.org/en-US/security/advisories/mfsa2020-02/


3. Android Realtek rtlwifi driverÔ¶³Ì´úÂëÖ´ÐÐÎó²î


Android Realtek rtlwifi driver±£´æÎ´Ã÷Çå¾²Îó²î £¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬£¬£¬£¬£¬£¬ÒÔϵͳȨÏÞÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£

https://source.android.google.cn/security/bulletin/2020-01-01


4. Android Sound subsystemȨÏÞÌáÉýÎó²î


Android Sound subsystem±£´æÎ´Ã÷Çå¾²Îó²î £¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬£¬£¬£¬£¬£¬¿ÉÌáÉýȨÏÞ¡£¡£¡£¡£¡£

https://source.android.google.cn/security/bulletin/2020-01-01


5. Billion Smart Energy Router SG600R2ÏÂÁîÖ´ÐÐÎó²î


Billion Smart Energy Router SG600R2°üÀ¨system_command.asp¾ç±¾ÒÔrootȨÏÞÖ´ÐÐ £¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬£¬£¬£¬£¬£¬¿ÉÒÔrootȨÏÞÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£

https://github.com/InnotecSystem/Device-Reversing/wiki/Firmware-Inspection


Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢Upstream SecurityÐû²¼2020°æ¡¶Æû³µÍøÂçÇå¾²±¨¸æ¡·


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Upstream Security2020°æ¡¶Æû³µÍøÂçÇå¾²±¨¸æ¡·»ùÓÚ¶ÔÒÑÍùÊ®ÄêÖÐ367Æð¹ûÕæ±¨¸æµÄÆû³µÍøÂçÇå¾²ÊÂÎñ¾ÙÐÐÆÊÎö £¬£¬£¬£¬£¬£¬ÖصãÇ¿µ÷ÁË2019Äêʱ´ú·¢Ã÷µÄÎó²îÓë¿´·¨¡£¡£¡£¡£¡£¸Ã±¨¸æÖ¸³ö £¬£¬£¬£¬£¬£¬»¥ÁªÍøÆû³µÒÑÔÚ½ÓÊÜÆû³µÊг¡ £¬£¬£¬£¬£¬£¬ÏÖÔÚÒÑÓÐ3.3ÒÚÁ¾»¥ÁªÍøÆû³µ £¬£¬£¬£¬£¬£¬ÕâÒâζ×Åÿ´Î¹¥»÷µÄDZÔÚÆÆËðÁ¦³É±¶ÔöÌí £¬£¬£¬£¬£¬£¬´ó¹æÄ£µÄ¹¥»÷ÊÂÎñ¿ÉÄÜ»áÆÆËðÕû¸ö¶¼»á £¬£¬£¬£¬£¬£¬ÉõÖÁµ¼ÖÂÔÖÄÑÐÔµÄÉúÃüËðʧ¡£¡£¡£¡£¡£×Ô2016ÄêÒÔÀ´ £¬£¬£¬£¬£¬£¬Ã¿ÄêÆû³µÍøÂçÇå¾²ÊÂÎñµÄÊýÄ¿ÔöÌíÁË605% £¬£¬£¬£¬£¬£¬½ö2019ÄêÒ»Äê¾ÍÔöÌíÁËÒ»±¶ÒÔÉÏ¡£¡£¡£¡£¡£ÔÚ2019Äê £¬£¬£¬£¬£¬£¬ÓÐ57%µÄÊÂÎñÊÇÓÉÍøÂç×ï·¸¾ÙÐÐµÄ £¬£¬£¬£¬£¬£¬ÆäÄ¿µÄÊÇÆÆËðÓªÒµ¡¢ÇÔÈ¡¿î×Ó»òË÷ÒªÊê½ð¡£¡£¡£¡£¡£½öÓÐ38%ÊÇÑо¿Ö°Ô±µÄ±¨¸æ £¬£¬£¬£¬£¬£¬ÆäÄ¿µÄÏò¹«Ë¾ºÍÏûºÄÕß¾¯ÃܸæÏÖµÄÎó²î¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2020/01/06/automotive-cybersecurity-incidents/


2¡¢Î¢ÈíÐû²¼RDP±©Á¦¹¥»÷ÆÊÎö±¨¸æ £¬£¬£¬£¬£¬£¬Æ½¾ùÒ»Á¬Ê±¼äΪ2-3Ìì


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


΢ÈíÐû²¼ÁËÒ»·ÝÕë¶ÔRDP±©Á¦¹¥»÷µÄÆÊÎö±¨¸æ £¬£¬£¬£¬£¬£¬¸ÃÏîÑо¿ÊÇ»ùÓÚ´ÓÁè¼Ý4.5Íò¸ö×°ÖÃÁËÃâ·ÑMicrosoft Defender ATPµÄÊÂÇéÕ¾ÉÏÍøÂçµÄÊý¾Ý¡£¡£¡£¡£¡£ÕâЩÊý¾ÝÓëʧ°ÜºÍÀֳɵÄRDPµÇ¼ÊÂÎñÓйأ¨»®·ÖÊÇIDΪ4265ºÍ4264µÄWindowsÊÂÎñ£© £¬£¬£¬£¬£¬£¬²¢ÇÒÉæ¼°Óû§/¹¥»÷Õß¿ÉÄÜʹÓõÄÓû§ÃûÏêϸÐÅÏ¢ £¬£¬£¬£¬£¬£¬Êý¾ÝÍøÂçÁ˼¸¸öÔµÄʱ¼ä¡£¡£¡£¡£¡£Î¢ÈíÔÚ±¨¸æÖÐÌåÏÖ £¬£¬£¬£¬£¬£¬×î½üÊӲ쵽µÄRDP±©Á¦¹¥»÷ƽ¾ùÒ»Á¬2-3Ìì £¬£¬£¬£¬£¬£¬Ô¼90£¥µÄ°¸ÀýÒ»Á¬Ê±¼äÔÚÒ»ÖÜÄÚ £¬£¬£¬£¬£¬£¬Ö»Óв»µ½5£¥µÄ°¸ÀýÒ»Á¬Ê±¼äÔÚÁ½ÖÜ»òÒÔÉÏ¡£¡£¡£¡£¡£Ô¼ÓÐ0.08£¥µÄRDP±©Á¦¹¥»÷ÀֳɾÙÐÐÁ˵Ǽ¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.microsoft.com/security/blog/2019/12/18/data-science-for-cybersecurity-a-probabilistic-time-series-model-for-detecting-rdp-inbound-brute-force-attacks/


3¡¢MITREÐû²¼ÊÊÓÃÓÚ¹¤Òµ¿ØÖÆÏµÍ³µÄATT£¦CK¿ò¼Ü


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


±¾ÖܶþMITERÐû²¼ÁËÆäATT£¦CK¿ò¼ÜµÄ³õʼ°æ±¾ £¬£¬£¬£¬£¬£¬¸Ã°æ±¾ÖØµã¹Ø×¢ÁËÕë¶Ô¹¤Òµ¿ØÖÆÏµÍ³£¨ICS£©µÄ¶ñÒâ¹¥»÷ÕßʹÓõÄÕ½ÂÔºÍÊÖÒÕ¡£¡£¡£¡£¡£Ö¼ÔÚ×ÊÖúÒªº¦»ù´¡ÉèÊ©ºÍÆäËûʹÓÃICSµÄ×éÖ¯ÆÀ¹ÀÆäÍøÂçΣº¦¡£¡£¡£¡£¡£³ýÁËÌṩ¹¥»÷Õ½ÂÔºÍÊÖÒÕ¾ØÕóÍâ £¬£¬£¬£¬£¬£¬»¹ÏÈÈÝÁ˹¥»÷ÊÖÒÕµÄϸ½Ú¡¢¹¥»÷ÕßʹÓõĶñÒâÈí¼þÒÔ¼°ÒÑÖªµÄÕë¶ÔICSµÄ·¸·¨ÍŻ¡£¡£¡£¡£Ëü»¹°üÀ¨Ò»¸ö×ʲúÖֱ𠣬£¬£¬£¬£¬£¬ÓÃÓÚ×ÊÖú×éÖ¯Ïàʶ¿ÉÓ¦ÓÃÓÚÆäÇéÐεÄÊÖÒÕ¡£¡£¡£¡£¡£´Ë°æ±¾ÐÎòÁË81ÖÖ¹¥»÷ÊÖÒÕ¡¢17ÖÖ¶ñÒâÈí¼þ¡¢10¸ö·¸·¨ÍÅ»ïºÍ7ÖÖ×ʲú¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/mitre-releases-attck-knowledge-base-industrial-control-systems


4¡¢Î¢ÈíÐÞ¸´AccessÖеÄÐÅϢй¶Îó²î£¨CVE-2019-1463£©


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


µç×ÓÓʼþÇå¾²¹«Ë¾Mimecast͸¶ £¬£¬£¬£¬£¬£¬Microsoft AccessÖеÄÐÅϢй¶Îó²î¿ÉÄܵ¼ÖÂϵͳÄÚ´æÖеÄÃô¸ÐÊý¾Ý±»ÎÞÒâÖÐÉúÑÄÔÚÊý¾Ý¿âÎļþÖС£¡£¡£¡£¡£¸ÃÎó²î£¨CVE-2019-1463£©±»³ÆÎªMDB Leaker £¬£¬£¬£¬£¬£¬Óë¡°Ó¦ÓóÌÐò¶ÔϵͳÄÚ´æµÄ²»µ±ÖÎÀí¡±ÓÐ¹Ø £¬£¬£¬£¬£¬£¬Ëü¿ÉÄܵ¼ÖÂδ³õʼ»¯µÄÄÚ´æÔªËصÄÄÚÈÝÉúÑĵ½Microsoft Access MDBÎļþÖС£¡£¡£¡£¡£Ö»¹ÜÕâЩÊý¾Ý¿ÉÄܺÁÎÞÓô¦ £¬£¬£¬£¬£¬£¬µ«ËüÒ²¿ÉÄܰüÀ¨¸ß¶ÈÃô¸ÐµÄÐÅÏ¢ £¬£¬£¬£¬£¬£¬ÀýÈçÃÜÂë¡¢WebÇëÇó¡¢Ö¤ÊéÒÔ¼°Óò»òÓû§Êý¾Ý¡£¡£¡£¡£¡£MimecastÌåÏÖÏÖÔÚ²»»áÐû²¼ÓйØCVE-2019-1463µÄÈκÎÊÖÒÕÐÅÏ¢ £¬£¬£¬£¬£¬£¬Ò²Ã»ÓÐÖ¤¾ÝÅú×¢¸ÃÎó²îÒÑÔÚÒ°ÍⱻʹÓᣡ£¡£¡£¡£Î¢ÈíÒÑÔÚ2019Äê12ÔµIJ¹¶¡¸üÐÂÖÐÐÞ¸´Á˸ÃÎó²î £¬£¬£¬£¬£¬£¬Æ¾Ö¤Î¢ÈíµÄ˵·¨ £¬£¬£¬£¬£¬£¬¸ÃÎó²î»áÓ°ÏìOffice 2010¡¢2013¡¢2016¡¢2019ºÍ365 ProPlus¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/microsoft-access-files-could-include-unintentionally-saved-sensitive-data


5¡¢MozillaÐû²¼¸üÐÂ,ÐÞ¸´Firefox 0dayÎó²î(CVE-2019-11707)


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


MozillaÐû²¼ÁËFirefox 72.0.1ºÍFirefox ESR 68.4.1 £¬£¬£¬£¬£¬£¬ÐÞ¸´ÒÑÔÚÒ°Íâ±»Æð¾¢Ê¹ÓõÄ0day£¨CVE-2019-11707£©¡£¡£¡£¡£¡£¸ÃÎó²î±»¹éÀàΪÀàÐÍ»ìÏýÎó²î £¬£¬£¬£¬£¬£¬Ó°ÏìÁËIonMonkey JIT±àÒëÆ÷ £¬£¬£¬£¬£¬£¬Æ¾Ö¤MozillaµÄÇ徲ͨ¸æ £¬£¬£¬£¬£¬£¬IonMonkey JIT±àÒëÆ÷ÖÐÓÃÓÚÉèÖÃÊý×éÔªËØµÄÓÖÃûÐÅÏ¢²»×¼È· £¬£¬£¬£¬£¬£¬¿ÉÄܻᵼÖÂÀàÐÍ»ìÏý¡£¡£¡£¡£¡£Ç±ÔÚ¹¥»÷Õß¿Éͨ¹ý½«Óû§Öض¨ÏòÖÁ¶ñÒâÍøÒ³À´´¥·¢¸ÃÎó²î £¬£¬£¬£¬£¬£¬µ¼Ö´úÂëÖ´Ðлò´¥·¢Í߽⡣¡£¡£¡£¡£ÃÀ¹úCISAÒ²·¢³öÖÒÑԳƹ¥»÷Õß¿ÉÄÜʹÓôËÎó²îÀ´¿ØÖÆÊÜÓ°ÏìµÄϵͳ £¬£¬£¬£¬£¬£¬²¢½¨ÒéÓû§Éó²éMozillaÇ徲ת´ïºÍÓ¦ÓÃÇå¾²¸üС£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/mozilla-firefox-7201-patches-actively-exploited-zero-day/