ÐÅÏ¢Çå¾²Öܱ¨-2020ÄêµÚ50ÖÜ

Ðû²¼Ê±¼ä 2020-12-14

> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2020Äê11ÔÂ30ÈÕÖÁ12ÔÂ06ÈÕ¹²ÊÕ¼Çå¾²Îó²î50¸ö£¬£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇZeroshell cgi-bin kerbynet StartSessionSubmit×¢ÈëÎó²î £»£»£»£»£»£»Western Digital My Cloud OS devicesÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î £»£»£»£»£»£»SourceCodester Car Rental Management System SQL×¢ÈëÎó²î £»£»£»£»£»£»Crux Linux Docker images root¿ÕÃÜÂëÎó²î £»£»£»£»£»£»HPE Edgeline Infrastructure ManagerÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇоƬ³§ÉÌAdvantechѬȾConti£¬£¬£¬£¬£¬£¬±»ÀÕË÷1300ÍòÃÀÔª £»£»£»£»£»£»Carding Action 2020Ðж¯ÆÆ»ñÒ»Æð´ó¹æÄ£Õ©Æ­°¸¼þ £»£»£»£»£»£»Cisco TalosÅû¶WebKitÖжà¸öÑÏÖØµÄÎó²î £»£»£»£»£»£»Ñо¿ÍŶӷ¢Ã÷½©Ê¬ÍøÂçXantheʹÓÃDockerAPIѬȾLinux £»£»£»£»£»£»GitHubÐû²¼2020Äê¶ÈOctoverseÌ¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£


Ö÷ÒªÇå¾²Îó²îÁбí


1.Microsoft Exchange Server CVE-2020-17142Ô¶³Ì´úÂëÖ´ÐÐÎó²î


Microsoft Exchange Server±£´æÎ´Ã÷Çå¾²Îó²î£¬£¬£¬£¬£¬£¬Ô¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£

https://msrc.microsoft.com/update-guide/zh-CN/vulnerability/CVE-2020-17142


2.uIP-Contiki-OS DNS¼Í¼ÆÊÎö»º³åÇøÒç³öÎó²î


uIP-Contiki-OS DNS¼Í¼ÆÊÎö±£´æÔ½½ç¶ÁÎó²î£¬£¬£¬£¬£¬£¬Ô¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉÒÔÓ¦ÓÃÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£

https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01


3.Siemens LOGO! 8 BMδÊÚȨ»á¼ûÎó²î


Siemens LOGO! 8 BMijЩЧÀÍȱÉÙÊÚȨ£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉδÊÚȨ¿ØÖÆ×°±¸¡£¡£¡£

https://us-cert.cisa.gov/ics/advisories/icsa-20-343-10



4.Schneider Electric Easergy T300ÊÚȨȱʧÎó²î


Schneider Electric Easergy T300±£´æÊÚȨȱʧÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉδÊÚȨ»á¼û×°±¸¡£¡£¡£

https://www.se.com/ww/en/download/document/SEVD-2020-315-06/


5.Aruba Networks ArubaOS PAPIÏÂÁî×¢ÈëÎó²î


Aruba Networks ArubaOS PAPI±£´æí§ÒâÏÂÁî×¢ÈëÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£


> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢ºÚ¿ÍÇÔÈ¡Òâ´óÀûLeonardo SpAµÄ10GB¾üÊÂÉñÃØ


1.jpg


ºÚ¿ÍÇÔÈ¡¹ú·À¹«Ë¾Leonardo SpAµÄ10 GB¾üÊÂÉñÃØ£¬£¬£¬£¬£¬£¬ÏÖÒѱ»Òâ´óÀû¾¯·½¾Ð²¶¡£¡£¡£LeonardoÊÇÌìÏÂÉÏ×î´óµÄ¹ú·À³Ð°üÉÌÖ®Ò»£¬£¬£¬£¬£¬£¬Æä30£¥µÄ¹É·ÝÊôÓÚÒâ´óÀû¾­¼ÃºÍ²ÆÎñ²¿¡£¡£¡£´Ë´Îй¶µÄÐÅÏ¢Éæ¼°µ½ÐÐÕþ»á¼ÆÖÎÀí¡¢ÈËÁ¦×ÊÔ´¡¢×ÊÔ´»õÎïµÄ²É¹ººÍ·ÖÅÉ¡¢ÃñÓ÷ɻúÁ㲿¼þºÍ¾üÓ÷ɻúµÄÉè¼Æ¡¢Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬£¬ºÚ¿ÍʹÓÃUSBÃÜÔ¿Ïò94¸öÊÂÇéÕ¾·Ö·¢cftmon.exeľÂí£¬£¬£¬£¬£¬£¬²¢ÒÔÕý°æWindowsÎļþÃüÃû¸ÃľÂíÒÔÈÆ¹ý¼ì²â¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/police-arrest-two-in-data-theft-cyberattack-on-leonardo-defense-corp/


2¡¢¹þÈø¿Ë˹̹µÚÈý´ÎÇ¿ÖÆÔÚÆä¹«Ãñ×°±¸ÉÏ×°ÖøùÖ¤Êé


2.jpg


¹þÈø¿Ë˹̹Õþ¸®ÒÔÍøÂçÇå¾²ÑÝϰΪ»Ï×Ó£¬£¬£¬£¬£¬£¬Ç¿ÆÈÊ×¶¼Å¬¶ûËÕµ¤µÄ¹«ÃñÔÚÆä×°±¸ÉÏ×°ÖÃÊý×ÖÖ¤Êé¡£¡£¡£ÈôÊDz»×°ÖÃÕþ¸®µÄ¸ùÖ¤Ê飬£¬£¬£¬£¬£¬¹«Ãñ½«ÎÞ·¨»á¼ûGoogle¡¢Twitter¡¢YouTube¡¢Facebook¡¢InstagramºÍNetflixµÈÍøÕ¾¡£¡£¡£Ò»µ©×°Ö㬣¬£¬£¬£¬£¬¸ÃÖ¤Ê齫ÔÊÐíÕþ¸®Í¨¹ýÒ»ÖÖ³ÆÎªMitM£¨ÖÐÐÄÈË£©µÄÊÖÒÕÀ´×èµ²Óû§×°±¸·¢³öµÄËùÓÐHTTPSÁ÷Á¿¡£¡£¡£ÕâÊǹþÈø¿Ë˹̹Õþ¸®×Ô2015ÄêÒÔÀ´µÚÈý´ÎÇ¿ÖÆÔÚÆä¹«Ãñ×°±¸ÉÏ×°ÖøùÖ¤Êé¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/kazakhstan-government-is-intercepting-https-traffic-in-its-capital/


3¡¢FireEyeÈ·ÈÏÔâµ½APT¹¥»÷£¬£¬£¬£¬£¬£¬ÒÑÐû²¼ÉùÃ÷²¢¿ªÔ´Ïà¹Ø¹¤¾ß


3.jpg


FireEye³ÆÆäÔâµ½ÁËÓɹú¼ÒÔÞÖúµÄ¸ß¶ÈÖØ´óµÄºÚ¿ÍµÄ¹¥»÷£¬£¬£¬£¬£¬£¬¹¥»÷Õßδ¾­ÊÚȨ»á¼ûÆäRed Team¹¤¾ß¡£¡£¡£FireEyeÌåÏÖÕâÊÇÒ»´ÎÓµÓÐÒ»Á÷½ø¹¥ÄÜÁ¦µÄ¹ú¼ÒµÄ¹¥»÷£¬£¬£¬£¬£¬£¬ÓëÒÔÍùÊÂÎñ²î±ð£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷רÃÅÕë¶ÔºÍ¹¥»÷FireEye¡£¡£¡£¾­ÊӲ죬£¬£¬£¬£¬£¬¹¥»÷Õß»á¼ûÁËÓÃÓÚ²âÊÔ¿Í»§Çå¾²ÐÔµÄRed TeamÆÀ¹À¹¤¾ß£¬£¬£¬£¬£¬£¬µ«ÆäÖв¢Ã»ÓаüÀ¨0dayÎó²î¡£¡£¡£ÏÖÔÚCISAÉÐδÊÕµ½ÓйØÕâЩ¹¤¾ß±»¶ñÒâʹÓõı¨¸æ£¬£¬£¬£¬£¬£¬FireEye¿ª·¢ÁË300¶àÖֶԲߣ¬£¬£¬£¬£¬£¬ÒÔïÔÌ­´ËÊÂÎñµÄDZÔÚÓ°Ïì¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.fireeye.com/blog/products-and-services/2020/12/fireeye-shares-details-of-recent-cyber-attack-actions-to-protect-community.html


4¡¢Ñо¿ÍŶÓÅû¶Ëĸö¿ªÔ´TCP/IP¿âÖеÄ33¸öÎó²îAmnesia:33


4.jpg


ForescoutµÄÑо¿ÍŶÓÅû¶ÁËËĸö¿ªÔ´TCP/IP¿âÖеÄ33¸öÎó²î£¬£¬£¬£¬£¬£¬²¢½«ËüÃÇÃüÃûΪAmnesia:33¡£¡£¡£ÕâËĸö¿ªÔ´¿â»®·ÖΪuIP¡¢FNET¡¢picoTCPºÍNut/Net£¬£¬£¬£¬£¬£¬Ó°ÏìÁË150¶à¼Ò¹©Ó¦É̵IJúÆ·¡£¡£¡£ForescoutÌåÏÖ£¬£¬£¬£¬£¬£¬ºÚ¿Í¿ÉʹÓÃÕâ33¸öÎó²îÌᳫԶ³Ì´úÂëÖ´ÐУ¨RCE£©¹¥»÷ÒÔ¿ØÖÆÄ¿µÄ×°±¸£¬£¬£¬£¬£¬£¬¾Ü¾øÐ§ÀÍ£¨DoS£©¹¥»÷ÒÔÓ°Ï칫˾ӪҵÔËÓª£¬£¬£¬£¬£¬£¬ÐÅÏ¢×ß©£¨infoleak£©¹¥»÷ÒÔ»ñȡDZÔÚµÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬DNS»º´æÖж¾¹¥»÷ÒÔ½«×°±¸Ö¸Ïò¶ñÒâÍøÕ¾¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/amnesia33-vulnerabilities-impact-millions-of-smart-and-industrial-devices/


5¡¢ºÚ¿ÍÔÚ°µÍø³öÊÛÁè¼Ý8Íò¸öSQLÊý¾Ý¿â£¬£¬£¬£¬£¬£¬Ã¿¸ö550ÃÀÔª


5.jpg


ºÚ¿ÍÔÚ°µÍøÒÔÿ¸ö550ÃÀÔªµÄ¼ÛÇ®³öÊÛÁè¼Ý85000¸öSQLÊý¾Ý¿â¡£¡£¡£ºÚ¿Í×éÖ¯ÔÚÒ»Ö±µØÈëÇÖMySQLÊý¾Ý¿â£¬£¬£¬£¬£¬£¬ÏÂÔØ±í¸ñ£¬£¬£¬£¬£¬£¬É¾³ýԭʼÎĵµ£¬£¬£¬£¬£¬£¬²¢ÁôÏÂÊê½ð¼Í¼£¬£¬£¬£¬£¬£¬Í¨ÖªÊܺ¦ÕßÓëÆäÁªÏµÒÔÈ¡»ØÆäÊý¾Ý¡£¡£¡£ÈôÊÇÊܺ¦ÕßÔÚ¾ÅÌìÄÚûÓи¶¿î£¬£¬£¬£¬£¬£¬ËûÃǵÄÊý¾Ý½«ÔÚÊý¾ÝÐ¹Â¶ÍøÕ¾±»ÅÄÂô¡£¡£¡£Ëæ×ÅÊܺ¦ÕßÊýÄ¿µÄÔö¶à£¬£¬£¬£¬£¬£¬¹¥»÷Õß×îÏÈʹÓÃ×Ô¶¯»¯µÄÈëÇÖÁ÷³ÌºÍÅÄÂôÍøÒ³£¬£¬£¬£¬£¬£¬²¢²»»áÆÊÎö±»ÈëÇÖµÄÊý¾Ý¿âÖеÄÊý¾Ý¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ÕâЩÊý¾Ý¿âµÄÊÛ¼Û»áËæ×ÅBTC/ USD»ãÂʵIJ¨¶¯ÓÐËùת±ä£¬£¬£¬£¬£¬£¬µ«Í¨³£Ê¼ÖÕ¼á³ÖÔÚ500ÃÀÔª×óÓÒ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/hackers-are-selling-more-than-85000-sql-databases-on-a-dark-web-portal/