ÐÅÏ¢°²È«Öܱ¨-2020ÄêµÚ50ÖÜ

°ä²¼¹¦·ò 2020-12-14

> ±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


2020Äê11ÔÂ30ÈÕÖÁ12ÔÂ06ÈÕ¹²ÊÕ¼°²È«·ì϶50¸ö£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇZeroshell cgi-bin kerbynet StartSessionSubmit×¢Èë·ì϶ £»Western Digital My Cloud OS devicesÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶ £»SourceCodester Car Rental Management System SQL×¢Èë·ì϶ £»Crux Linux Docker images root¿ÕÃÜÂë·ì϶ £»HPE Edgeline Infrastructure ManagerÔ¶³Ì´úÂëÖ´Ðзì϶¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇоƬ³§ÉÌAdvantechϰȾConti£¬£¬£¬±»ÀÕË÷1300ÍòÃÀÔª £»Carding Action 2020Ðж¯ÆÆ»ñһ·´ó¹æÄ£Ú¿Æ­°¸¼þ £»Cisco TalosÅû¶WebKitÖжà¸öÑÏÖØµÄ·ì϶ £»×êÑÐÍŶӷ¢ÏÖ½©Ê¬ÍøÂçXantheÀûÓÃDockerAPIϰȾLinux £»GitHub°ä²¼2020Äê¶ÈOctoverseÌ¬ÊÆµÄ·ÖÎö»ã±¨¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬£¬£¬±¾Öܰ²È«ÍþвΪÖС£


ÖØÒª°²È«·ì϶Áбí


1.Microsoft Exchange Server CVE-2020-17142Ô¶³Ì´úÂëÖ´Ðзì϶


Microsoft Exchange Server´æÔÚδÃ÷°²È«·ì϶£¬£¬£¬Ô¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬£¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£

https://msrc.microsoft.com/update-guide/zh-CN/vulnerability/CVE-2020-17142


2.uIP-Contiki-OS DNS¼Í¼½âÎö»º³åÇøÒç³ö·ì϶


uIP-Contiki-OS DNS¼Í¼½âÎö´æÔÚÔ½½ç¶Á·ì϶£¬£¬£¬Ô¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬£¬Äܹ»ÀûÓøߵÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£

https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01


3.Siemens LOGO! 8 BMδÊÚȨ½Ó¼û·ì϶


Siemens LOGO! 8 BMijЩ·þÎñ¶ÌȱÊÚȨ£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬£¬¿ÉδÊÚȨ½ÚÖÆÉ豸¡£

https://us-cert.cisa.gov/ics/advisories/icsa-20-343-10



4.Schneider Electric Easergy T300ÊÚȨȱʧ·ì϶


Schneider Electric Easergy T300´æÔÚÊÚȨȱʧ·ì϶£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬£¬¿ÉδÊÚȨ½Ó¼ûÉ豸¡£

https://www.se.com/ww/en/download/document/SEVD-2020-315-06/


5.Aruba Networks ArubaOS PAPIºÅÁî×¢Èë·ì϶


Aruba Networks ArubaOS PAPI´æÔÚËÁÒâºÅÁî×¢Èë·ì϶£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬£¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâºÅÁî¡£


> ÖØÒª°²È«ÊÂÎñ×ÛÊö


1¡¢¡¢ºÚ¿ÍÇÔÈ¡Òâ´óÀûLeonardo SpAµÄ10GB¾üÊ»úÃÜ


1.jpg


ºÚ¿ÍÇÔÈ¡¹ú·À¹«Ë¾Leonardo SpAµÄ10 GB¾üÊ»úÃÜ£¬£¬£¬ÏÖÒѱ»Òâ´óÀû¾¯·½¿ÛÁô¡£LeonardoÊÇÊÀ½çÉÏ×î´óµÄ¹ú·À³Ð°üÉÌÖ®Ò»£¬£¬£¬Æä30£¥µÄ¹É·ÝÊôÓÚÒâ´óÀû¾­¼ÃºÍ²ÆÕþ²¿¡£Õâ´Îй¶µÄÐÅÏ¢Éæ¼°µ½ÐÐÕþ¹ÜÕÊÖÎÀí¡¢¡¢ÈËÁ¦×ÊÔ´¡¢¡¢±¾Ç®»õÎïµÄ²É¹ººÍ·ÖÅä¡¢¡¢ÃñÓ÷ɻúÁ㲿¼þºÍ¾üÓ÷ɻúµÄÉè¼Æ¡¢¡¢Ô±¹¤Ð¡ÎÒÐÅÏ¢¡£¾ÝϤ£¬£¬£¬ºÚ¿ÍʹÓÃUSBÃÜÔ¿Ïò94¸ö¹¤×÷Õ¾·Ö·¢cftmon.exeľÂí£¬£¬£¬²¢ÒÔÕý°æWindowsÎļþ¶¨Ãû¸ÃľÂíÒÔÈÆ¹ý¼ì²â¡£


Ô­ÎÄÁ´½Ó£º£º

https://www.bleepingcomputer.com/news/security/police-arrest-two-in-data-theft-cyberattack-on-leonardo-defense-corp/


2¡¢¡¢¹þÈø¿Ë˹̹µÚÈý´ÎÇ¿ÖÆÔÚÆä¹«ÃñÉ豸ÉÏ×°ÖøùÖ¤Êé


2.jpg


¹þÈø¿Ë˹̹µ±¾ÖÒÔÍøÂ簲ȫÑÝϰΪ»Ï×Ó£¬£¬£¬Ð²ÆÈÊ×¶¼Å¬¶ûËÕµ¤µÄ¹«ÃñÔÚÆäÉ豸ÉÏ×°ÖÃÊý×ÖÖ¤Êé¡£ÈôÊDz»×°Öõ±¾ÖµÄ¸ùÖ¤Ê飬£¬£¬¹«Ãñ½«ÎÞ·¨½Ó¼ûGoogle¡¢¡¢Twitter¡¢¡¢YouTube¡¢¡¢Facebook¡¢¡¢InstagramºÍNetflixµÈÍøÕ¾¡£Ò»µ©×°Ö㬣¬£¬¸ÃÖ¤Ê齫ÔÊÐíµ±¾Öͨ¹ýÒ»ÖÖ³ÆÎªMitM£¨ÖÐÑëÈË£©µÄ¼¼ÊõÀ´À¹½ØÓû§É豸·¢³öµÄËùÓÐHTTPSÁ÷Á¿¡£ÕâÊǹþÈø¿Ë˹̹µ±¾Ö×Ô2015ÄêÒÔÀ´µÚÈý´ÎÇ¿ÖÆÔÚÆä¹«ÃñÉ豸ÉÏ×°ÖøùÖ¤Êé¡£


Ô­ÎÄÁ´½Ó£º£º

https://www.zdnet.com/article/kazakhstan-government-is-intercepting-https-traffic-in-its-capital/


3¡¢¡¢FireEyeÈ·ÈÏÔâµ½APT¹¥»÷£¬£¬£¬ÒѰ䲼ÉêÃ÷²¢¿ªÔ´Óйع¤¾ß


3.jpg


FireEye³ÆÆäÔâµ½ÁËÓɹú¶ÈÔÞÖúµÄ¸ß¶È¸´Ôӵĺڿ͵Ĺ¥»÷£¬£¬£¬¹¥»÷Õßδ¾­ÊÚȨ½Ó¼ûÆäRed Team¹¤¾ß¡£FireEye°µÊ¾ÕâÊÇÒ»´ÎÕ¼ÓÐÒ»Á÷½ø¹¥ÄÜÁ¦µÄ¹ú¶ÈµÄ¹¥»÷£¬£¬£¬ÓëÒÔÍùÊÂÎñ·ÖÆç£¬£¬£¬Õâ´Î¹¥»÷רÃÅÕë¶ÔºÍ¹¥»÷FireEye¡£¾­µ÷²é£¬£¬£¬¹¥»÷Õß½Ó¼ûÁËÓÃÓÚ²âÊÔ¿Í»§°²È«ÐÔµÄRed TeamÆÀ¹À¹¤¾ß£¬£¬£¬µ«ÆäÖв¢Ã»ÓÐÔ̺¬0day·ì϶¡£Ä¿Ç°CISAÉÐδÊÕµ½ÓйØÕâЩ¹¤¾ß±»¶ñÒâʹÓõĻ㱨£¬£¬£¬FireEye¿ª·¢ÁË300¶àÖֶԲߣ¬£¬£¬ÒÔÏ÷¼õ´ËÊÂÎñµÄDZÔÚÓ°Ïì¡£


Ô­ÎÄÁ´½Ó£º£º

https://www.fireeye.com/blog/products-and-services/2020/12/fireeye-shares-details-of-recent-cyber-attack-actions-to-protect-community.html


4¡¢¡¢×êÑÐÍŶÓÅû¶Ëĸö¿ªÔ´TCP/IP¿âÖеÄ33¸ö·ì϶Amnesia:33


4.jpg


ForescoutµÄ×êÑÐÍŶÓÅû¶ÁËËĸö¿ªÔ´TCP/IP¿âÖеÄ33¸ö·ì϶£¬£¬£¬²¢½«ËüÃǶ¨ÃûΪAmnesia:33¡£ÕâËĸö¿ªÔ´¿â±ðÀëΪuIP¡¢¡¢FNET¡¢¡¢picoTCPºÍNut/Net£¬£¬£¬Ó°ÏìÁË150¶à¼Ò¹©¸øÉ̵IJúÆ·¡£Forescout°µÊ¾£¬£¬£¬ºÚ¿Í¿ÉÀûÓÃÕâ33¸ö·ì϶ÌáÒéÔ¶³Ì´úÂëÖ´ÐУ¨RCE£©¹¥»÷ÒÔ½ÚÖÆÖ¸±êÉ豸£¬£¬£¬»Ø¾ø·þÎñ£¨DoS£©¹¥»÷ÒÔÓ°Ï칫˾ҵÎñÔËÓª£¬£¬£¬ÐÅϢй©£¨infoleak£©¹¥»÷ÒÔ»ñȡDZÔÚµÄÃô¸ÐÐÅÏ¢£¬£¬£¬DNS»º´æÖж¾¹¥»÷ÒÔ½«É豸ָÏò¶ñÒâÍøÕ¾¡£


Ô­ÎÄÁ´½Ó£º£º

https://www.zdnet.com/article/amnesia33-vulnerabilities-impact-millions-of-smart-and-industrial-devices/


5¡¢¡¢ºÚ¿ÍÔÚ°µÍøÏúÊÛ³¬¹ý8Íò¸öSQLÊý¾Ý¿â£¬£¬£¬Ã¿¸ö550ÃÀÔª


5.jpg


ºÚ¿ÍÔÚ°µÍøÒÔÿ¸ö550ÃÀÔªµÄ¼ÛÖµÏúÊÛ³¬¹ý85000¸öSQLÊý¾Ý¿â¡£º£ºÚ¿Í×éÖ¯ÔÚ²»ÐݵØÈëÇÖMySQLÊý¾Ý¿â£¬£¬£¬ÏÂÔØ±í¸ñ£¬£¬£¬É¾³ýԭʼÎĵµ£¬£¬£¬²¢ÁôÏÂÊê½ð¼Í¼£¬£¬£¬Í¨ÖªÊܺ¦ÕßÓëÆäÁªÏµÒÔÈ¡»ØÆäÊý¾Ý¡£ÈôÊÇÊܺ¦ÕßÔÚ¾ÅÌìÄÚûÓи¶¿î£¬£¬£¬ËûÃǵÄÊý¾Ý½«ÔÚÊý¾ÝÐ¹Â¶ÍøÕ¾±»ÅÄÂô¡£Ëæ×ÅÊܺ¦ÕßÊýÁ¿µÄÔö¶à£¬£¬£¬¹¥»÷Õ߯ðͷʹÓÃ×Ô¶¯»¯µÄÈëÇÖÁ÷³ÌºÍÅÄÂôÍøÒ³£¬£¬£¬²¢²»»á·ÖÎö±»ÈëÇÖµÄÊý¾Ý¿âÖеÄÊý¾Ý¡£´ËÍ⣬£¬£¬ÕâЩÊý¾Ý¿âµÄÊÛ¼Û»áËæ×ÅBTC/ USD»ãÂʵĵßô¤ÓÐËù±ä¶¯£¬£¬£¬µ«Í¨³£Ê¼ÖÕά³ÖÔÚ500ÃÀÔª×óÓÒ¡£


Ô­ÎÄÁ´½Ó£º£º

https://www.zdnet.com/article/hackers-are-selling-more-than-85000-sql-databases-on-a-dark-web-portal/