ÐÅÏ¢Çå¾²Öܱ¨-2020ÄêµÚ50ÖÜ
Ðû²¼Ê±¼ä 2020-12-14> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
2020Äê11ÔÂ30ÈÕÖÁ12ÔÂ06ÈÕ¹²ÊÕ¼Çå¾²Îó²î50¸ö£¬£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇZeroshell cgi-bin kerbynet StartSessionSubmit×¢ÈëÎó²î£»£»£»£»£»£»Western Digital My Cloud OS devicesÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£»£»£»£»£»£»SourceCodester Car Rental Management System SQL×¢ÈëÎó²î£»£»£»£»£»£»Crux Linux Docker images root¿ÕÃÜÂëÎó²î£»£»£»£»£»£»HPE Edgeline Infrastructure ManagerÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡£¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇоƬ³§ÉÌAdvantechѬȾConti£¬£¬£¬£¬£¬£¬±»ÀÕË÷1300ÍòÃÀÔª£»£»£»£»£»£»Carding Action 2020Ðж¯ÆÆ»ñÒ»Æð´ó¹æÄ£Õ©Æ°¸¼þ£»£»£»£»£»£»Cisco TalosÅû¶WebKitÖжà¸öÑÏÖØµÄÎó²î£»£»£»£»£»£»Ñо¿ÍŶӷ¢Ã÷½©Ê¬ÍøÂçXantheʹÓÃDockerAPIѬȾLinux£»£»£»£»£»£»GitHubÐû²¼2020Äê¶ÈOctoverseÌ¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£
> Ö÷ÒªÇå¾²Îó²îÁбí
1.Microsoft Exchange Server CVE-2020-17142Ô¶³Ì´úÂëÖ´ÐÐÎó²î
Microsoft Exchange Server±£´æÎ´Ã÷Çå¾²Îó²î£¬£¬£¬£¬£¬£¬Ô¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£
https://msrc.microsoft.com/update-guide/zh-CN/vulnerability/CVE-2020-17142
2.uIP-Contiki-OS DNS¼Í¼ÆÊÎö»º³åÇøÒç³öÎó²î
uIP-Contiki-OS DNS¼Í¼ÆÊÎö±£´æÔ½½ç¶ÁÎó²î£¬£¬£¬£¬£¬£¬Ô¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉÒÔÓ¦ÓÃÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£
https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01
3.Siemens LOGO! 8 BMδÊÚȨ»á¼ûÎó²î
Siemens LOGO! 8 BMijЩЧÀÍȱÉÙÊÚȨ£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉδÊÚȨ¿ØÖÆ×°±¸¡£¡£¡£
https://us-cert.cisa.gov/ics/advisories/icsa-20-343-10
4.Schneider Electric Easergy T300ÊÚȨȱʧÎó²î
Schneider Electric Easergy T300±£´æÊÚȨȱʧÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉδÊÚȨ»á¼û×°±¸¡£¡£¡£
https://www.se.com/ww/en/download/document/SEVD-2020-315-06/
5.Aruba Networks ArubaOS PAPIÏÂÁî×¢ÈëÎó²î
Aruba Networks ArubaOS PAPI±£´æí§ÒâÏÂÁî×¢ÈëÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£
> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢ºÚ¿ÍÇÔÈ¡Òâ´óÀûLeonardo SpAµÄ10GB¾üÊÂÉñÃØ
ºÚ¿ÍÇÔÈ¡¹ú·À¹«Ë¾Leonardo SpAµÄ10 GB¾üÊÂÉñÃØ£¬£¬£¬£¬£¬£¬ÏÖÒѱ»Òâ´óÀû¾¯·½¾Ð²¶¡£¡£¡£LeonardoÊÇÌìÏÂÉÏ×î´óµÄ¹ú·À³Ð°üÉÌÖ®Ò»£¬£¬£¬£¬£¬£¬Æä30£¥µÄ¹É·ÝÊôÓÚÒâ´óÀû¾¼ÃºÍ²ÆÎñ²¿¡£¡£¡£´Ë´Îй¶µÄÐÅÏ¢Éæ¼°µ½ÐÐÕþ»á¼ÆÖÎÀí¡¢ÈËÁ¦×ÊÔ´¡¢×ÊÔ´»õÎïµÄ²É¹ººÍ·ÖÅÉ¡¢ÃñÓ÷ɻúÁ㲿¼þºÍ¾üÓ÷ɻúµÄÉè¼Æ¡¢Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬£¬ºÚ¿ÍʹÓÃUSBÃÜÔ¿Ïò94¸öÊÂÇéÕ¾·Ö·¢cftmon.exeľÂí£¬£¬£¬£¬£¬£¬²¢ÒÔÕý°æWindowsÎļþÃüÃû¸ÃľÂíÒÔÈÆ¹ý¼ì²â¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/police-arrest-two-in-data-theft-cyberattack-on-leonardo-defense-corp/
2¡¢¹þÈø¿Ë˹̹µÚÈý´ÎÇ¿ÖÆÔÚÆä¹«Ãñ×°±¸ÉÏ×°ÖøùÖ¤Êé
¹þÈø¿Ë˹̹Õþ¸®ÒÔÍøÂçÇå¾²ÑÝϰΪ»Ï×Ó£¬£¬£¬£¬£¬£¬Ç¿ÆÈÊ×¶¼Å¬¶ûËÕµ¤µÄ¹«ÃñÔÚÆä×°±¸ÉÏ×°ÖÃÊý×ÖÖ¤Êé¡£¡£¡£ÈôÊDz»×°ÖÃÕþ¸®µÄ¸ùÖ¤Ê飬£¬£¬£¬£¬£¬¹«Ãñ½«ÎÞ·¨»á¼ûGoogle¡¢Twitter¡¢YouTube¡¢Facebook¡¢InstagramºÍNetflixµÈÍøÕ¾¡£¡£¡£Ò»µ©×°Ö㬣¬£¬£¬£¬£¬¸ÃÖ¤Ê齫ÔÊÐíÕþ¸®Í¨¹ýÒ»ÖÖ³ÆÎªMitM£¨ÖÐÐÄÈË£©µÄÊÖÒÕÀ´×èµ²Óû§×°±¸·¢³öµÄËùÓÐHTTPSÁ÷Á¿¡£¡£¡£ÕâÊǹþÈø¿Ë˹̹Õþ¸®×Ô2015ÄêÒÔÀ´µÚÈý´ÎÇ¿ÖÆÔÚÆä¹«Ãñ×°±¸ÉÏ×°ÖøùÖ¤Êé¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/kazakhstan-government-is-intercepting-https-traffic-in-its-capital/
3¡¢FireEyeÈ·ÈÏÔâµ½APT¹¥»÷£¬£¬£¬£¬£¬£¬ÒÑÐû²¼ÉùÃ÷²¢¿ªÔ´Ïà¹Ø¹¤¾ß
FireEye³ÆÆäÔâµ½ÁËÓɹú¼ÒÔÞÖúµÄ¸ß¶ÈÖØ´óµÄºÚ¿ÍµÄ¹¥»÷£¬£¬£¬£¬£¬£¬¹¥»÷Õßδ¾ÊÚȨ»á¼ûÆäRed Team¹¤¾ß¡£¡£¡£FireEyeÌåÏÖÕâÊÇÒ»´ÎÓµÓÐÒ»Á÷½ø¹¥ÄÜÁ¦µÄ¹ú¼ÒµÄ¹¥»÷£¬£¬£¬£¬£¬£¬ÓëÒÔÍùÊÂÎñ²î±ð£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷רÃÅÕë¶ÔºÍ¹¥»÷FireEye¡£¡£¡£¾ÊӲ죬£¬£¬£¬£¬£¬¹¥»÷Õß»á¼ûÁËÓÃÓÚ²âÊÔ¿Í»§Çå¾²ÐÔµÄRed TeamÆÀ¹À¹¤¾ß£¬£¬£¬£¬£¬£¬µ«ÆäÖв¢Ã»ÓаüÀ¨0dayÎó²î¡£¡£¡£ÏÖÔÚCISAÉÐδÊÕµ½ÓйØÕâЩ¹¤¾ß±»¶ñÒâʹÓõı¨¸æ£¬£¬£¬£¬£¬£¬FireEye¿ª·¢ÁË300¶àÖֶԲߣ¬£¬£¬£¬£¬£¬ÒÔïÔÌ´ËÊÂÎñµÄDZÔÚÓ°Ïì¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.fireeye.com/blog/products-and-services/2020/12/fireeye-shares-details-of-recent-cyber-attack-actions-to-protect-community.html
4¡¢Ñо¿ÍŶÓÅû¶Ëĸö¿ªÔ´TCP/IP¿âÖеÄ33¸öÎó²îAmnesia:33
ForescoutµÄÑо¿ÍŶÓÅû¶ÁËËĸö¿ªÔ´TCP/IP¿âÖеÄ33¸öÎó²î£¬£¬£¬£¬£¬£¬²¢½«ËüÃÇÃüÃûΪAmnesia:33¡£¡£¡£ÕâËĸö¿ªÔ´¿â»®·ÖΪuIP¡¢FNET¡¢picoTCPºÍNut/Net£¬£¬£¬£¬£¬£¬Ó°ÏìÁË150¶à¼Ò¹©Ó¦É̵IJúÆ·¡£¡£¡£ForescoutÌåÏÖ£¬£¬£¬£¬£¬£¬ºÚ¿Í¿ÉʹÓÃÕâ33¸öÎó²îÌᳫԶ³Ì´úÂëÖ´ÐУ¨RCE£©¹¥»÷ÒÔ¿ØÖÆÄ¿µÄ×°±¸£¬£¬£¬£¬£¬£¬¾Ü¾øÐ§ÀÍ£¨DoS£©¹¥»÷ÒÔÓ°Ï칫˾ӪҵÔËÓª£¬£¬£¬£¬£¬£¬ÐÅÏ¢×ß©£¨infoleak£©¹¥»÷ÒÔ»ñȡDZÔÚµÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬£¬DNS»º´æÖж¾¹¥»÷ÒÔ½«×°±¸Ö¸Ïò¶ñÒâÍøÕ¾¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/amnesia33-vulnerabilities-impact-millions-of-smart-and-industrial-devices/
5¡¢ºÚ¿ÍÔÚ°µÍø³öÊÛÁè¼Ý8Íò¸öSQLÊý¾Ý¿â£¬£¬£¬£¬£¬£¬Ã¿¸ö550ÃÀÔª
ºÚ¿ÍÔÚ°µÍøÒÔÿ¸ö550ÃÀÔªµÄ¼ÛÇ®³öÊÛÁè¼Ý85000¸öSQLÊý¾Ý¿â¡£¡£¡£ºÚ¿Í×éÖ¯ÔÚÒ»Ö±µØÈëÇÖMySQLÊý¾Ý¿â£¬£¬£¬£¬£¬£¬ÏÂÔØ±í¸ñ£¬£¬£¬£¬£¬£¬É¾³ýÔʼÎĵµ£¬£¬£¬£¬£¬£¬²¢ÁôÏÂÊê½ð¼Í¼£¬£¬£¬£¬£¬£¬Í¨ÖªÊܺ¦ÕßÓëÆäÁªÏµÒÔÈ¡»ØÆäÊý¾Ý¡£¡£¡£ÈôÊÇÊܺ¦ÕßÔÚ¾ÅÌìÄÚûÓи¶¿î£¬£¬£¬£¬£¬£¬ËûÃǵÄÊý¾Ý½«ÔÚÊý¾ÝÐ¹Â¶ÍøÕ¾±»ÅÄÂô¡£¡£¡£Ëæ×ÅÊܺ¦ÕßÊýÄ¿µÄÔö¶à£¬£¬£¬£¬£¬£¬¹¥»÷Õß×îÏÈʹÓÃ×Ô¶¯»¯µÄÈëÇÖÁ÷³ÌºÍÅÄÂôÍøÒ³£¬£¬£¬£¬£¬£¬²¢²»»áÆÊÎö±»ÈëÇÖµÄÊý¾Ý¿âÖеÄÊý¾Ý¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ÕâЩÊý¾Ý¿âµÄÊÛ¼Û»áËæ×ÅBTC/ USD»ãÂʵIJ¨¶¯ÓÐËùת±ä£¬£¬£¬£¬£¬£¬µ«Í¨³£Ê¼ÖÕ¼á³ÖÔÚ500ÃÀÔª×óÓÒ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/hackers-are-selling-more-than-85000-sql-databases-on-a-dark-web-portal/