ÐÅÏ¢Çå¾²Öܱ¨-2018ÄêµÚ49ÖÜ
Ðû²¼Ê±¼ä 2018-12-10
2018Äê12ÔÂ03ÈÕ09ÈÕ¹²ÊÕ¼Çå¾²Îó²î55¸ö£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇAdobe Flash PlayerÊͷźóʹÓôúÂëÖ´ÐÐÎó²î£»£»£»£»£»£»FreeBSD bhyveí§Òâ´úÂëÖ´ÐÐÎó²î£»£»£»£»£»£»NUUO NVRMini2 upgrade_handle.phpÏÂÁî×¢ÈëÎó²î£»£»£»£»£»£»HPE Intelligent Management Center PLAT dbman.exe»º³åÇøÒç³öÎó²î£»£»£»£»£»£»Rockwell Automation Allen-Bradley PowerMonitor 1000 »á¼û¿ØÖƹýʧÎó²î¡£¡£¡£¡£¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇQuoraÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬Ô¼1ÒÚÓû§Êý¾Ý±»ÇÔ£»£»£»£»£»£»M2MÐÒé±»ÆØ±£´æÎó²î£¬£¬£¬£¬£¬¿ÉÓÃÓÚ¹¥»÷¹¤ÒµÎïÁªÍøÏµÍ³£»£»£»£»£»£»ÍòºÀÂùÝÒòÊý¾Ý¿âй¶ÔâÕûÌåËßËÏ£¬£¬£¬£¬£¬±»Ë÷Åâ125ÒÚÃÀÔª£»£»£»£»£»£»APT×éÖ¯Tropic TrooperжñÒâ»î¶¯£¬£¬£¬£¬£¬Õë¶ÔÑÇÖÞÄÜÔ´¼°Ê³ÎïÐÐÒµ£»£»£»£»£»£»Êý¾Ý¿â²»ÉèÃÜÂ룬£¬£¬£¬£¬Urban¹«Ë¾Áè¼Ý30ÍòÓû§ÐÅϢй¶¡£¡£¡£¡£¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£¡£
Ö÷ÒªÇå¾²Îó²îÁбí
1. Adobe Flash PlayerÊͷźóʹÓôúÂëÖ´ÐÐÎó²î
Adobe Flash Player±£´æÊͷźóʹÓÃÎó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇ󣬣¬£¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£
https://helpx.adobe.com/security/products/flash-player/apsb18-42.html
2. FreeBSD bhyveí§Òâ´úÂëÖ´ÐÐÎó²î
FreeBSD¶ÔbhyveÌṩµÄ×°±¸Ä£¿£¿£¿£¿£¿éÖÐȱÉÙ׼ȷµÄ½çÏß¼ì²é£¬£¬£¬£¬£¬ÔÊÐíÍâµØ¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬bhyveÀú³Ì±ÀÀ£»£»£»£»£»£»òÒÔrootȨÏÞÔÚÖ÷»úÉÏÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£
https://www.freebsd.org/security/advisories/FreeBSD-SA-18:14.bhyve.asc3. NUUO NVRMini2 upgrade_handle.phpÏÂÁî×¢ÈëÎó²î
NUUO NVRMini2 upgrade_handle.php±£´æÊäÈëÑéÖ¤Îó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬ÒÔROOTÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£
https://github.com/tenable/poc/tree/master/nuuo/nvrmini2/cve_2018_157164. HPE Intelligent Management Center PLAT dbman.exe»º³åÇøÒç³öÎó²î
HPE Intelligent Management Center PLAT±£´æ»º³åÇøÒç³ö£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¾ÙÐоܾøÐ§À͹¥»÷»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£
https://support.hpe.com/hpsc/doc/public/display?docId=hpesbhf03906en_us5. Rockwell Automation Allen-Bradley PowerMonitor 1000 »á¼û¿ØÖƹýʧÎó²î
Rockwell Automation Allen-Bradley PowerMonitor 1000 WEBÒ³Ãæ±£´æ»á¼û¿ØÖÆÎó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬Ìí¼Ó¾ßÓÐÖÎÀíԱȨÏÞµÄÐÂÕË»§¡£¡£¡£¡£¡£¡£
http://packetstormsecurity.com/files/150619/Rockwell-Automation-Allen-Bradley-PowerMonitor-1000-Authentication-Bypass.htmlÖ÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢QuoraÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬Ô¼1ÒÚÓû§Êý¾Ý±»ÇÔ
ÆÄÊܽӴýµÄÎÊ´ðÍøÕ¾QuoraÐû²¼ÔâºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬Ô¼1ÒÚÓû§µÄÊý¾Ý±»ÇÔ-ÏÕЩÊÇÆä¿Í»§ÈºÌåµÄÒ»°ë¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨Óû§µÄÕË»§ÐÅÏ¢£¬£¬£¬£¬£¬ÀýÈçÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢¹þÏ£ÃÜÂëÒÔ¼°´ÓFacebook¡¢TwitterµÈÉ罻ýÌåµ¼ÈëµÄÊý¾Ý£»£»£»£»£»£»Óû§µÄ¹ûÕæÄÚÈÝ£¬£¬£¬£¬£¬ÀýÈçÌáÎÊ¡¢»Ø¸²¡¢µãÔÞºÍ̸ÂÛ£»£»£»£»£»£»Óû§µÄ·Ç¹ûÕæÄÚÈÝ£¬£¬£¬£¬£¬ÀýÈç»Ø¸²Ô¼Ç롢˽ÈËÐÂÎŵȡ£¡£¡£¡£¡£¡£QuoraÓÚÖÜÒ»Íí¼äÅû¶ÁË´Ë´ÎÊÂÎñ£¬£¬£¬£¬£¬ÏÖÔÚ¸ÃÊÂÎñ»¹ÔÚ½øÒ»²½µÄÊÓ²ìÖ®ÖС£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2018/12/quora-hack.html
2¡¢M2MÐÒé±»ÆØ±£´æÎó²î£¬£¬£¬£¬£¬¿ÉÓÃÓÚ¹¥»÷¹¤ÒµÎïÁªÍøÏµÍ³
Ç÷ÊÆ¿Æ¼¼Ñо¿ÍŶӷ¢Ã÷Ö÷Á÷µÄÁ½¸öM2M£¨»úе¶Ô»úе£©ÐÒé±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬¿ÉÓÃÓÚ¹¥»÷IoTºÍIIoT×°±¸¡£¡£¡£¡£¡£¡£Æ¾Ö¤¸Ã¡¶¹¤ÒµÎïÁªÍøÊý¾ÝÖ÷¸ÉÖеÄųÈõÐÔ¡·±¨¸æ£¬£¬£¬£¬£¬ÕâÁ½¸öÐÒé»®·ÖÊÇÐÂÎÅÐÐÁÐÒ£²â´«ÊäÐÒ飨MQTT£©ºÍÔ¼ÊøÓ¦ÓÃÐÒ飨CoAP£©¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÆÊÎöÁËÕâÁ½¸öÐÒéµÄÉè¼ÆºÍʵÏÖÉϱ£´æµÄÎó²î£¬£¬£¬£¬£¬²¢·¢Ã÷ÁËÊýÊ®Íǫ̀ÉèÖò»µ±µÄЧÀÍÆ÷£¬£¬£¬£¬£¬ÕâЩЧÀÍÆ÷̻¶ÁËÏà¹ØÆ¾Ö¤¡¢Ãô¸ÐÐÅÏ¢ÒÔ¼°¹¤ÒµÁ÷³ÌÏà¹ØµÄÊý¾Ý¡£¡£¡£¡£¡£¡£ÕâЩÎó²î¿ÉÄܵ¼ÖÂDoS¡¢í§Òâ´úÂëÖ´ÐÐÒÔ¼°DDoS·Å´ó¹¥»÷µÈ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.trendmicro.com/trendlabs-security-intelligence/machine-to-machine-m2m-technology-design-issues-and-implementation-vulnerabilities/
3¡¢ÍòºÀÂùÝÒòÊý¾Ý¿âй¶ÔâÕûÌåËßËÏ£¬£¬£¬£¬£¬±»Ë÷Åâ125ÒÚÃÀÔª
ÍòºÀ¹ú¼ÊÂùݼ¯ÍÅ(Marriott International)¿ËÈÕÒò¿Í»§Êý¾Ý¿âй¶¶øÔâÓöÕûÌåËßËÏ£¬£¬£¬£¬£¬Ë÷Åâ½ð¶î¸ß´ï125ÒÚÃÀÔª¡£¡£¡£¡£¡£¡£ÉÏÖÜÎåÍòºÀÐû²¼ÆìÏÂϲ´ïÎÝÂùÝ(Starwood Hotel)µÄÒ»¸ö¿Í»§Ô¤¶©Êý¾Ý¿â±»ºÚ¿ÍÈëÇÖ£¬£¬£¬£¬£¬Ô¼5ÒÚ¿Í»§µÄÐÅÏ¢¿ÉÄÜй¶¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬£¬ºÚ¿ÍÈëÇÖÔçÔÚ2014Äê¾ÍÒѾ×îÏÈ¡£¡£¡£¡£¡£¡£Ëæºó£¬£¬£¬£¬£¬ÃÀ¹úGeragos&Geragos״ʦÊÂÎñËùµÄ״ʦ±¾¡¤Ã·ÈûÀ˹(Ben Meiselas)ºÍUnderdog LawÖ´·¨ÕÕÁÏÂõ¿Ë¶û¡¤¸»ÀÕ(Michael Fuller)´ú±íÁ½ÃûÔ¸æ´óÎÀ¡¤Ô¼º²Ñ·(David Johnson)ºÍ¿ËÀï˹¡¤¹þÀï˹(Chris Harris)¶ÔÍòºÀ¹ú¼ÊÂùÝÌáÆðÕûÌåËßËÏ£¬£¬£¬£¬£¬Ë÷Åâ125ÒÚÃÀÔª¡£¡£¡£¡£¡£¡£ËäÈ»ÕâÒ»½ð¶î¿´ÆðÀ´Ê®·ÖÖØ´ó£¬£¬£¬£¬£¬µ«Ò²½öÏ൱ÓÚ5ÒÚDZÔÚÊܺ¦¿Í»§Ã¿ÈË»ñµÃ25ÃÀÔªµÄÅâ³¥¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
http://tech.sina.com.cn/i/2018-12-03/doc-ihprknvs8439051.shtml
4¡¢APT×éÖ¯Tropic TrooperжñÒâ»î¶¯£¬£¬£¬£¬£¬Õë¶ÔÑÇÖÞÄÜÔ´¼°Ê³ÎïÐÐÒµ
Windows Defender ATPÍŶӷ¢Ã÷Ò»¸öÕë¶ÔÑÇÖÞÄÜÔ´¡¢Ê³ÎïºÍÒûÁÏÐÐÒµµÄжñÒâ¹¥»÷»î¶¯£¬£¬£¬£¬£¬»ùÓڶԸûµÄÄ¿µÄÑ¡Ôñ¡¢¹¥»÷Á´ÒÔ¼°¹¤¾ß¼¯µÄÆÊÎö£¬£¬£¬£¬£¬Ñо¿ÍŶÓÒÔΪ¸Ã»î¶¯ÊÇÓÉAPT×éÖ¯Tropic TrooperÌᳫµÄ¡£¡£¡£¡£¡£¡£¹¥»÷µÄ³õʼÏòÁ¿ÊÇÒ»¸öʹÓÃÁËOffice¹«Ê½±à¼Æ÷Îó²îCVE-2018-0802µÄ¶ñÒâÎĵµ£¬£¬£¬£¬£¬¹¥»÷ÕßËæºóʹÓÃbitsadmin.exe´ÓÔ¶³ÌЧÀÍÆ÷ÏÂÔØ²¢Ö´ÐÐËæ»úÃüÃûµÄpayload¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±ÒÔΪÕâЩpayloadµÄÖ÷ҪĿµÄÊÇÇÔÈ¡Êý¾Ý¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://cloudblogs.microsoft.com/microsoftsecure/2018/11/28/windows-defender-atp-device-risk-score-exposes-new-cyberattack-drives-conditional-access-to-protect-networks/
5¡¢Êý¾Ý¿â²»ÉèÃÜÂ룬£¬£¬£¬£¬Urban¹«Ë¾Áè¼Ý30ÍòÓû§ÐÅϢй¶
UrbanÊÇÒ»¼ÒÓ¢¹úµÄÍÆÄô´Òµ¹«Ë¾£¬£¬£¬£¬£¬ÆäÊý¾Ý¿âÒòδÉèÃÜÂëµ¼ÖÂÁè¼Ý30Íò¿Í»§ÐÅϢй¶¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Oliver Houghͨ¹ýShodan·¢Ã÷Á˸ÃÊý¾Ý¿â£¬£¬£¬£¬£¬ÏÖÔÚ¸ÃÊý¾Ý¿âÒÑÏÂÏߣ¬£¬£¬£¬£¬µ«²»ÖªµÀ¸ÃÊý¾Ý¿â̻¶Á˶೤ʱ¼ä¡£¡£¡£¡£¡£¡£¸ÃÊý¾Ý¿âÖаüÀ¨Áè¼Ý30.9ÍòÓû§¼Í¼£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢µç»°ºÅÂëµÈ¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬Êý¾Ý¿âÖл¹´æ´¢ÁËÁè¼Ý35.1Íò¸öЧÀÍÔ¤¶¨¼Í¼£¬£¬£¬£¬£¬ÒÔ¼°Áè¼Ý2000¸öÍÆÄÃʦµÄÏà¹ØÐÅÏ¢¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://techcrunch.com/2018/11/27/urban-massage-data-exposed-customers-creepy-clients/
ÉùÃ÷£º±¾×ÊѶÓÉc7c7ÓéÀÖÆ½Ì¨Î¬ËûÃüÇ徲С×é·ÒëºÍÕûÀí


¾©¹«Íø°²±¸11010802024551ºÅ