ÐÅÏ¢Çå¾²Öܱ¨-2020ÄêµÚ50ÖÜ

Ðû²¼Ê±¼ä 2020-12-14

> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2020Äê11ÔÂ30ÈÕÖÁ12ÔÂ06ÈÕ¹²ÊÕ¼Çå¾²Îó²î50¸ö£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇZeroshell cgi-bin kerbynet StartSessionSubmit×¢ÈëÎó²î£»£»£»£»Western Digital My Cloud OS devicesÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£»£»£»£»SourceCodester Car Rental Management System SQL×¢ÈëÎó²î£»£»£»£»Crux Linux Docker images root¿ÕÃÜÂëÎó²î£»£»£»£»HPE Edgeline Infrastructure ManagerÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£¡£¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇоƬ³§ÉÌAdvantechѬȾConti£¬£¬£¬£¬£¬±»ÀÕË÷1300ÍòÃÀÔª£»£»£»£»Carding Action 2020Ðж¯ÆÆ»ñÒ»Æð´ó¹æÄ£Õ©Æ­°¸¼þ£»£»£»£»Cisco TalosÅû¶WebKitÖжà¸öÑÏÖØµÄÎó²î£»£»£»£»Ñо¿ÍŶӷ¢Ã÷½©Ê¬ÍøÂçXantheʹÓÃDockerAPIѬȾLinux£»£»£»£»GitHubÐû²¼2020Äê¶ÈOctoverseÌ¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£¡£¡£¡£


Ö÷ÒªÇå¾²Îó²îÁбí


1.Microsoft Exchange Server CVE-2020-17142Ô¶³Ì´úÂëÖ´ÐÐÎó²î


Microsoft Exchange Server±£´æÎ´Ã÷Çå¾²Îó²î£¬£¬£¬£¬£¬Ô¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£¡£

https://msrc.microsoft.com/update-guide/zh-CN/vulnerability/CVE-2020-17142


2.uIP-Contiki-OS DNS¼Í¼ÆÊÎö»º³åÇøÒç³öÎó²î


uIP-Contiki-OS DNS¼Í¼ÆÊÎö±£´æÔ½½ç¶ÁÎó²î£¬£¬£¬£¬£¬Ô¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¿ÉÒÔÓ¦ÓÃÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£¡£

https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01


3.Siemens LOGO! 8 BMδÊÚȨ»á¼ûÎó²î


Siemens LOGO! 8 BMijЩЧÀÍȱÉÙÊÚȨ£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¿ÉδÊÚȨ¿ØÖÆ×°±¸¡£¡£¡£¡£¡£¡£¡£¡£

https://us-cert.cisa.gov/ics/advisories/icsa-20-343-10



4.Schneider Electric Easergy T300ÊÚȨȱʧÎó²î


Schneider Electric Easergy T300±£´æÊÚȨȱʧÎó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¿ÉδÊÚȨ»á¼û×°±¸¡£¡£¡£¡£¡£¡£¡£¡£

https://www.se.com/ww/en/download/document/SEVD-2020-315-06/


5.Aruba Networks ArubaOS PAPIÏÂÁî×¢ÈëÎó²î


Aruba Networks ArubaOS PAPI±£´æí§ÒâÏÂÁî×¢ÈëÎó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£¡£¡£¡£


> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢ºÚ¿ÍÇÔÈ¡Òâ´óÀûLeonardo SpAµÄ10GB¾üÊÂÉñÃØ


1.jpg


ºÚ¿ÍÇÔÈ¡¹ú·À¹«Ë¾Leonardo SpAµÄ10 GB¾üÊÂÉñÃØ£¬£¬£¬£¬£¬ÏÖÒѱ»Òâ´óÀû¾¯·½¾Ð²¶¡£¡£¡£¡£¡£¡£¡£¡£LeonardoÊÇÌìÏÂÉÏ×î´óµÄ¹ú·À³Ð°üÉÌÖ®Ò»£¬£¬£¬£¬£¬Æä30£¥µÄ¹É·ÝÊôÓÚÒâ´óÀû¾­¼ÃºÍ²ÆÎñ²¿¡£¡£¡£¡£¡£¡£¡£¡£´Ë´Îй¶µÄÐÅÏ¢Éæ¼°µ½ÐÐÕþ»á¼ÆÖÎÀí¡¢ÈËÁ¦×ÊÔ´¡¢×ÊÔ´»õÎïµÄ²É¹ººÍ·ÖÅÉ¡¢ÃñÓ÷ɻúÁ㲿¼þºÍ¾üÓ÷ɻúµÄÉè¼Æ¡¢Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬ºÚ¿ÍʹÓÃUSBÃÜÔ¿Ïò94¸öÊÂÇéÕ¾·Ö·¢cftmon.exeľÂí£¬£¬£¬£¬£¬²¢ÒÔÕý°æWindowsÎļþÃüÃû¸ÃľÂíÒÔÈÆ¹ý¼ì²â¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/police-arrest-two-in-data-theft-cyberattack-on-leonardo-defense-corp/


2¡¢¹þÈø¿Ë˹̹µÚÈý´ÎÇ¿ÖÆÔÚÆä¹«Ãñ×°±¸ÉÏ×°ÖøùÖ¤Êé


2.jpg


¹þÈø¿Ë˹̹Õþ¸®ÒÔÍøÂçÇå¾²ÑÝϰΪ»Ï×Ó£¬£¬£¬£¬£¬Ç¿ÆÈÊ×¶¼Å¬¶ûËÕµ¤µÄ¹«ÃñÔÚÆä×°±¸ÉÏ×°ÖÃÊý×ÖÖ¤Êé¡£¡£¡£¡£¡£¡£¡£¡£ÈôÊDz»×°ÖÃÕþ¸®µÄ¸ùÖ¤Ê飬£¬£¬£¬£¬¹«Ãñ½«ÎÞ·¨»á¼ûGoogle¡¢Twitter¡¢YouTube¡¢Facebook¡¢InstagramºÍNetflixµÈÍøÕ¾¡£¡£¡£¡£¡£¡£¡£¡£Ò»µ©×°Ö㬣¬£¬£¬£¬¸ÃÖ¤Ê齫ÔÊÐíÕþ¸®Í¨¹ýÒ»ÖÖ³ÆÎªMitM£¨ÖÐÐÄÈË£©µÄÊÖÒÕÀ´×èµ²Óû§×°±¸·¢³öµÄËùÓÐHTTPSÁ÷Á¿¡£¡£¡£¡£¡£¡£¡£¡£ÕâÊǹþÈø¿Ë˹̹Õþ¸®×Ô2015ÄêÒÔÀ´µÚÈý´ÎÇ¿ÖÆÔÚÆä¹«Ãñ×°±¸ÉÏ×°ÖøùÖ¤Êé¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/kazakhstan-government-is-intercepting-https-traffic-in-its-capital/


3¡¢FireEyeÈ·ÈÏÔâµ½APT¹¥»÷£¬£¬£¬£¬£¬ÒÑÐû²¼ÉùÃ÷²¢¿ªÔ´Ïà¹Ø¹¤¾ß


3.jpg


FireEye³ÆÆäÔâµ½ÁËÓɹú¼ÒÔÞÖúµÄ¸ß¶ÈÖØ´óµÄºÚ¿ÍµÄ¹¥»÷£¬£¬£¬£¬£¬¹¥»÷Õßδ¾­ÊÚȨ»á¼ûÆäRed Team¹¤¾ß¡£¡£¡£¡£¡£¡£¡£¡£FireEyeÌåÏÖÕâÊÇÒ»´ÎÓµÓÐÒ»Á÷½ø¹¥ÄÜÁ¦µÄ¹ú¼ÒµÄ¹¥»÷£¬£¬£¬£¬£¬ÓëÒÔÍùÊÂÎñ²î±ð£¬£¬£¬£¬£¬´Ë´Î¹¥»÷רÃÅÕë¶ÔºÍ¹¥»÷FireEye¡£¡£¡£¡£¡£¡£¡£¡£¾­ÊӲ죬£¬£¬£¬£¬¹¥»÷Õß»á¼ûÁËÓÃÓÚ²âÊÔ¿Í»§Çå¾²ÐÔµÄRed TeamÆÀ¹À¹¤¾ß£¬£¬£¬£¬£¬µ«ÆäÖв¢Ã»ÓаüÀ¨0dayÎó²î¡£¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚCISAÉÐδÊÕµ½ÓйØÕâЩ¹¤¾ß±»¶ñÒâʹÓõı¨¸æ£¬£¬£¬£¬£¬FireEye¿ª·¢ÁË300¶àÖֶԲߣ¬£¬£¬£¬£¬ÒÔïÔÌ­´ËÊÂÎñµÄDZÔÚÓ°Ïì¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.fireeye.com/blog/products-and-services/2020/12/fireeye-shares-details-of-recent-cyber-attack-actions-to-protect-community.html


4¡¢Ñо¿ÍŶÓÅû¶Ëĸö¿ªÔ´TCP/IP¿âÖеÄ33¸öÎó²îAmnesia:33


4.jpg


ForescoutµÄÑо¿ÍŶÓÅû¶ÁËËĸö¿ªÔ´TCP/IP¿âÖеÄ33¸öÎó²î£¬£¬£¬£¬£¬²¢½«ËüÃÇÃüÃûΪAmnesia:33¡£¡£¡£¡£¡£¡£¡£¡£ÕâËĸö¿ªÔ´¿â»®·ÖΪuIP¡¢FNET¡¢picoTCPºÍNut/Net£¬£¬£¬£¬£¬Ó°ÏìÁË150¶à¼Ò¹©Ó¦É̵IJúÆ·¡£¡£¡£¡£¡£¡£¡£¡£ForescoutÌåÏÖ£¬£¬£¬£¬£¬ºÚ¿Í¿ÉʹÓÃÕâ33¸öÎó²îÌᳫԶ³Ì´úÂëÖ´ÐУ¨RCE£©¹¥»÷ÒÔ¿ØÖÆÄ¿µÄ×°±¸£¬£¬£¬£¬£¬¾Ü¾øÐ§ÀÍ£¨DoS£©¹¥»÷ÒÔÓ°Ï칫˾ӪҵÔËÓª£¬£¬£¬£¬£¬ÐÅÏ¢×ß©£¨infoleak£©¹¥»÷ÒÔ»ñȡDZÔÚµÄÃô¸ÐÐÅÏ¢£¬£¬£¬£¬£¬DNS»º´æÖж¾¹¥»÷ÒÔ½«×°±¸Ö¸Ïò¶ñÒâÍøÕ¾¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/amnesia33-vulnerabilities-impact-millions-of-smart-and-industrial-devices/


5¡¢ºÚ¿ÍÔÚ°µÍø³öÊÛÁè¼Ý8Íò¸öSQLÊý¾Ý¿â£¬£¬£¬£¬£¬Ã¿¸ö550ÃÀÔª


5.jpg


ºÚ¿ÍÔÚ°µÍøÒÔÿ¸ö550ÃÀÔªµÄ¼ÛÇ®³öÊÛÁè¼Ý85000¸öSQLÊý¾Ý¿â¡£¡£¡£¡£¡£¡£¡£¡£ºÚ¿Í×éÖ¯ÔÚÒ»Ö±µØÈëÇÖMySQLÊý¾Ý¿â£¬£¬£¬£¬£¬ÏÂÔØ±í¸ñ£¬£¬£¬£¬£¬É¾³ýԭʼÎĵµ£¬£¬£¬£¬£¬²¢ÁôÏÂÊê½ð¼Í¼£¬£¬£¬£¬£¬Í¨ÖªÊܺ¦ÕßÓëÆäÁªÏµÒÔÈ¡»ØÆäÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¡£ÈôÊÇÊܺ¦ÕßÔÚ¾ÅÌìÄÚûÓи¶¿î£¬£¬£¬£¬£¬ËûÃǵÄÊý¾Ý½«ÔÚÊý¾ÝÐ¹Â¶ÍøÕ¾±»ÅÄÂô¡£¡£¡£¡£¡£¡£¡£¡£Ëæ×ÅÊܺ¦ÕßÊýÄ¿µÄÔö¶à£¬£¬£¬£¬£¬¹¥»÷Õß×îÏÈʹÓÃ×Ô¶¯»¯µÄÈëÇÖÁ÷³ÌºÍÅÄÂôÍøÒ³£¬£¬£¬£¬£¬²¢²»»áÆÊÎö±»ÈëÇÖµÄÊý¾Ý¿âÖеÄÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬ÕâЩÊý¾Ý¿âµÄÊÛ¼Û»áËæ×ÅBTC/ USD»ãÂʵIJ¨¶¯ÓÐËùת±ä£¬£¬£¬£¬£¬µ«Í¨³£Ê¼ÖÕ¼á³ÖÔÚ500ÃÀÔª×óÓÒ¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/hackers-are-selling-more-than-85000-sql-databases-on-a-dark-web-portal/