GRUB2ÖÐÎó²îBootHoleÓ°ÏìÊýÊ®ÒÚ×°±¸£»£»£»£»£»Ñо¿Ö°Ô±Åû¶TorÖÐÁ½¸ö0day²¢ÍýÏëÐû²¼ÁíÍâÈý¸ö
Ðû²¼Ê±¼ä 2020-07-311.GRUB2ÖÐÎó²îBootHoleÓ°ÏìÊýÊ®ÒÚWindowsºÍLinux×°±¸
EclypsiumÑо¿Ö°Ô±ÔÚ´ó¶¼LinuxϵͳʹÓõÄGRUB2Ö¸µ¼³ÌÐòÖз¢Ã÷ÁËÒ»¸öÎó²î£¬£¬£¬£¬£¬£¬²¢½«ÆäÃüÃûΪ¡°BootHole¡±£¨CVE-2020-10713£©£¬£¬£¬£¬£¬£¬×ÝÈ»ÆôÓÃÁËSecure Boot£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÒ²¿ÉÔÚÆô¶¯Àú³ÌÖÐÖ´ÐÐí§Òâ´úÂ룬£¬£¬£¬£¬£¬»¹¿ÉÒÔʹÓøÃÎó²î×°Öó¤ÆÚÇÒÒþ²ØµÄbootkit»ò¶ñÒâÖ¸µ¼³ÌÐòÀ´¿ØÖÆ×°±¸¡£¡£¡£¡£¡£¡£±ðµÄGRUB2»¹Ö§³ÖÆäËü²Ù×÷ϵͳ¡¢Äں˺ÍÖÎÀí³ÌÐò£¬£¬£¬£¬£¬£¬ÀýÈ磬£¬£¬£¬£¬£¬Xen¡£¡£¡£¡£¡£¡£¸ÃÎó²î»¹Éæ¼°µ½ËùÓÐʹÓñê×¼Microsoft Third Party UEFI Certificate AuthorityµÄSecure BootµÄWindows×°±¸£¬£¬£¬£¬£¬£¬ÀýÈ繤ҵ¡¢Ò½ÁÆ¡¢½ðÈÚµÈÐÐÒµÖÐʹÓõÄ×°±¸¾ùÊÜÓ°Ïì¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËÊýÊ®ÒÚʹÓÃSecure BootµÄWindowsºÍLinux×°±¸¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/billions-of-devices-impacted-secure-boot-bypass/157843/
2.Ñо¿Ö°Ô±Åû¶TorÖеÄÁ½¸ö0day²¢ÍýÏëÐû²¼ÁíÍâÈý¸öÎó²î
Çå¾²Ñо¿Ö°Ô±Neal KrawetzÔÚÒÑÍùÒ»ÖÜÄÚÅú¶ÁËÁ½¸öTorÖеÄ0day£¬£¬£¬£¬£¬£¬²¢ÔÊÐíÖÁÉÙÔÙÐû²¼Èý¸öTor 0day£¬£¬£¬£¬£¬£¬ÆäÖÐÒ»¸ö¿ÉÒÔÕ¹ÏÖTorЧÀÍÆ÷ÕæÊµIPµØµã¡£¡£¡£¡£¡£¡£´Ë´ÎÅû¶µÄÎó²îÖУ¬£¬£¬£¬£¬£¬µÚÒ»¸ö¿É±»Ê¹ÓÃͨ¹ýɨÃèÍøÂçÅþÁ¬£¬£¬£¬£¬£¬£¬Ñ°ÕÒTor¶ÀÍ̵ÄÊý¾Ý°üÊðÃûÀ´×èÖ¹Óû§ÅþÁ¬µ½TorÍøÂ磬£¬£¬£¬£¬£¬¸ÃÊý¾Ý°ü¿ÉÓÃÀ´×èÖ¹TorÅþÁ¬µÄÆô¶¯²¢ÓÐÓõØÍêÈ«½ûÓÃTor¡£¡£¡£¡£¡£¡£ÏñµÚÒ»¸ö0dayÒ»Ñù£¬£¬£¬£¬£¬£¬µÚ¶þ¸öÒ²ÔÊÐíÍøÂçÔËÓªÉ̼ì²âTorÁ÷Á¿£¬£¬£¬£¬£¬£¬µ«Ëü¿ÉÓÃÓÚ¼ì²â¼ä½ÓÅþÁ¬¡£¡£¡£¡£¡£¡£Krawetz²©Ê¿ÌåÏÖ£¬£¬£¬£¬£¬£¬Ê¹Óøú×ÙÌØ¶¨TCPÊý¾Ý°üµÄÊÖÒÕ£¬£¬£¬£¬£¬£¬Ò²¿ÉÒÔÇáËɼì²âµ½TorÇŵÄÅþÁ¬¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/106567/hacking/tor-zero-day-flaws.html?utm_source=rss&utm_medium=rss&utm_campaign=tor-zero-day-flaws
3.˼¿ÆÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´¶à¿î²úÆ·ÖеÄ11¸öÇå¾²Îó²î
˼¿ÆÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬×ܼÆÐÞ¸´¶à¿î²úÆ·ÖеÄ11¸öÇå¾²Îó²î¡£¡£¡£¡£¡£¡£ÆäÖÐÓÐÈý¸ö½ÏΪÑÏÖØµÄÎó²î£¬£¬£¬£¬£¬£¬µÚÒ»¸öΪDCNM REST APIÖеÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2020-3382£©£¬£¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.8£¬£¬£¬£¬£¬£¬¾ßÓÐÖÎÀíȨÏ޵Ĺ¥»÷Õß¿ÉÔ¶³ÌÖ´ÐÐí§Òâ²Ù×÷£»£»£»£»£»µÚ¶þ¸öΪSD-WAN vManageÈí¼þÖеÄÊÚÈ¨ÈÆ¹ýÎó²î£¨CVE-2020-3374£©£¬£¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.9£¬£¬£¬£¬£¬£¬ÆäÔÊÐí¾ÓÉÉí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÈÆ¹ýÊÚȨ£¬£¬£¬£¬£¬£¬»á¼ûÃô¸ÐÐÅÏ¢²¢ÐÞ¸ÄϵͳÉèÖ㻣»£»£»£»µÚÈý¸öΪSD-WAN½â¾ö¼Æ»®Èí¼þÖеĻº³åÇøÒç³öÎó²î(CVE-2020-3375),ÓÉÓÚÊäÈëÑé֤ȱ·¦µ¼Ö£¬£¬£¬£¬£¬£¬ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß»á¼ûÐÅÏ¢£¬£¬£¬£¬£¬£¬²¢¶ÔËûÃÇûÓÐȨÏÞµÄϵͳ¾ÙÐиü¸Ä¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/cisco-fixes-severe-flaws-in-data-center-management-solution/
4.Ô¼»áÈí¼þOkCupid±£´æ¶à¸öÎó²î£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂÃô¸ÐÊý¾Ýй¶
Check Point ResearchÅû¶ÁËOkCupidÖеÄһϵÁÐÎó²î£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂÃô¸ÐÊý¾Ýй¶¡£¡£¡£¡£¡£¡£ÍøÂçÇå¾²Ñо¿Ö°Ô±¶Ô¸ÃAndroidÓ¦ÓþÙÐÐÁËÄæÏò¹¤³Ì£¬£¬£¬£¬£¬£¬²¢·¢Ã÷ÁËÆäÉî²ãÁ´½Ó¹¦Ð§£¬£¬£¬£¬£¬£¬ÕâÒâζ׏¥»÷Õ߿ɷ¢ËÍ×Ô½ç˵µÄ¶ñÒâÁ´½ÓÀ´·¿ª¸ÃÓ¦ÓóÌÐò¡£¡£¡£¡£¡£¡£ÓÉÓÚÓ¦ÓõÄÓû§ÉèÖù¦Ð§ÖеıàÂëÎÊÌ⣬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±»¹·¢Ã÷ÁË·´Éä¿çÕ¾µã¾ç±¾£¨XSS£©¹¥»÷ǰÑÔ¡£¡£¡£¡£¡£¡£½«¶þÕßÁ¬ÏµÆðÀ´£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔ´Ó×Ô¼ºµÄЧÀÍÆ÷·¢ËÍHTTP GETÇëÇóºÍXSSÓÐÓøºÔØ£¬£¬£¬£¬£¬£¬È»ºó¿ÉÒÔͨ¹ýWebViewÖ´ÐÐJavaScript¡£¡£¡£¡£¡£¡£Õâ¿ÉÄܵ¼Ö¸ÃÓ¦ÓÃÉϵÄÃô¸ÐÉèÖÃÎļþÊý¾Ý̻¶£¬£¬£¬£¬£¬£¬Óû§ÕÊ»§Ð®ÖÆÒÔ¼°Óû§Éí·ÝÑéÖ¤ÁîÅÆ¡¢IDÒÔ¼°µç×ÓÓʼþµØµãй¶¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/okcupid-hackers-want-your-data-not-a-relationship/#ftag=RSSbaffb68
5.FBIÖÒÑÔNetwalkerÕë¶Ô¹ú¼ÒµÄ¹¥»÷»î¶¯²¢Ðû²¼Î£º¦Ö¸±ê
FBIÖÒÑÔÓйØNetwalkerÕë¶ÔÃÀ¹úºÍÍâ¹úÕþ¸®×éÖ¯µÄ¹¥»÷»î¶¯²¢Ðû²¼Î£º¦Ö¸±ê¡£¡£¡£¡£¡£¡£FBIÌåÏÖ£¬£¬£¬£¬£¬£¬¸ÃÀÕË÷Èí¼þÍÅ»ï´Ó2020Äê6ÔÂ×îÏÈÕë¶ÔÃÀ¹úºÍÍâ¹úÕþ¸®×éÖ¯£¬£¬£¬£¬£¬£¬´ËǰNetwalker¼ÓÃÜÁ˼ÓÖÝ´óѧ¾É½ðɽ·ÖУҽѧԺµÄϵͳ£¬£¬£¬£¬£¬£¬Ö®ºó£¬£¬£¬£¬£¬£¬ÓÖÁ½´Î¹¥»÷Á˰ĴóÀûÑÇÔËÊäºÍÎïÁ÷¹«Ë¾Toll Group£¬£¬£¬£¬£¬£¬ÔÚ±¾Ô¹¥»÷ÁËLorienÒ½Ôº¡£¡£¡£¡£¡£¡£FBI»¹·¢Ã÷£¬£¬£¬£¬£¬£¬NetwalkerÍÅ»ïÔÚ3Ô·Ýͨ¹ýʹÓÃVisual Basic¾ç±¾£¨VBS£©Ìá³«ÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬4Ô·ÝÓÖ×îÏÈʹÓÃÒ×Êܹ¥»÷µÄÐéÄâרÓÃÍø£¨VPN£©×°±¸Ìᳫ¹¥»÷¡£¡£¡£¡£¡£¡£FBI±Þ²ßÊܺ¦Õß¾Ù±¨ÀÕË÷Èí¼þÊÂÎñ£¬£¬£¬£¬£¬£¬ÒÔ×ÊÖú×·×Ù¹¥»÷Õß²¢Ìá·ÀδÀ´µÄ¹¥»÷¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/fbi-warns-of-netwalker-ransomware-targeting-us-government-and-orgs/
6.¿¨°Í˹»ù·¢Ã÷ºÚ¿Í×éÖ¯DeceptikonsÖ÷ÒªÕë¶ÔÅ·ÖÞÂÉËù
ÍøÂçÇå¾²¹«Ë¾¿¨°Í˹»ù·¢Ã÷ÁËÒ»¸öеĺڿÍ×éÖ¯Deceptikons£¬£¬£¬£¬£¬£¬ÆäÖ÷ÒªÕë¶ÔÅ·ÖÞ״ʦÊÂÎñËùºÍ½ðÈڿƼ¼¹«Ë¾¡£¡£¡£¡£¡£¡£¸Ã×é֯רעÓÚÇÔÈ¡ÉÌÒµºÍ½ðÈÚÉñÃØ£¬£¬£¬£¬£¬£¬¶ø²»ÊÇÓëÕþ¸®ÓйصÄÐÅÏ¢£¬£¬£¬£¬£¬£¬ÆäÖ÷ҪĿµÄ¶¼Î»ÓÚÅ·ÖÞ£¬£¬£¬£¬£¬£¬ÎÞÒâÒ²ÓÐһЩÖж«¹ú¼Ò£¬£¬£¬£¬£¬£¬ÀýÈçÒÔÉ«ÁУ¬£¬£¬£¬£¬£¬Ô¼µ©ºÍ°£¼°¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯ÔÚ×î½üµÄ¹¥»÷ÖжԶà¸öÅ·ÖÞ״ʦÊÂÎñËùÌᳫÁËÓã²æÊ½ÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬£¬²¢Í¨¹ý¶ñÒâPowerShell½ÅÔÀ´Ñ¬È¾Ö÷»ú¡£¡£¡£¡£¡£¡£¿£¿£¿£¿£¿£¿¨°Í˹»ùÌåÏÖ£¬£¬£¬£¬£¬£¬DeceptikonsÔÚÊÖÒÕÉϲ¢²»¿ÉÊ죬£¬£¬£¬£¬£¬ÏÖÔÚ»¹Ã»ÓÐʹÓùýÁãÈÕÎó²î£¬£¬£¬£¬£¬£¬´ó´ó¶¼¹¥»÷¶¼×ñÕÕÏàËÆµÄģʽ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/kaspersky-new-hacker-for-hire-mercenary-group-is-targeting-european-law-firms/#ftag=RSSbaffb68


¾©¹«Íø°²±¸11010802024551ºÅ