ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ17ÖÜ
Ðû²¼Ê±¼ä 2019-04-29±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
2019Äê4ÔÂ22ÈÕÖÁ28ÈÕ¹²ÊÕ¼Çå¾²Îó²î51¸ö£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇPulse Secure Pulse Connect Secure CVE-2019-11542»º³åÇøÒç³öÎó²î£»£»£»ISC BIND nxdomain-redirect¾Ü¾øÐ§ÀÍÎó²î; Cerner Connectivity Engine hostname¡¢timezoneºÍNTP serverÉèÖÃÏÂÁî×¢ÈëÎó²î£»£»£»Tenda AC7¡¢AC9ºÍAC10 web server (httpd)»º³åÇøÒç³öÎó²î£»£»£»Sierra Wireless AirLink ES450 ACEManager iplogging.cgi OSÏÂÁî×¢ÈëÎó²î¡£¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊǸßͨæçÁúоƬ¸ßΣÎó²î£¬£¬£¬£¬£¬¿Éµ¼ÖÂQSEE¼ÓÃÜ˽Կй¶;Google PlayϼÜ50¸ö¶ñÒâÓ¦Ó㬣¬£¬£¬£¬×°ÖÃÁ¿´ï3000Íò´Î;Õë¶Ô»ªË¶µÄ¹©Ó¦Á´¹¥»÷ShadowHammer»¹Ãé×¼ÁíÍâÁù¼ÒÑÇÖÞ¹«Ë¾;Wi-FiÈÈÃŲéÕÒÆ÷й¶200ÍòWi-FiÃÜÂë;Google PlayÖÐ¹ã¸æÈí¼þPreAMo£¬£¬£¬£¬£¬ÏÂÔØÁ¿´ï9000Íò´Î¡£¡£¡£
Ö÷ÒªÇå¾²Îó²îÁбí
Pulse Secure Pulse Connect Secure±£´æ»º³åÇøÒç³öÎó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA441012. ISC BIND nxdomain-redirect¾Ü¾øÐ§ÀÍÎó²î
ISC BIND nxdomain-redirect¹¦Ð§±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¿ÉÊ¹ÊØ»¤³ÌÐòÍ߽⣬£¬£¬£¬£¬¾ÙÐоܾøÐ§À͹¥»÷¡£¡£¡£
https://kb.isc.org/docs/cve-2019-6468
3. Cerner Connectivity Engine hostname¡¢timezoneºÍNTP serverÉèÖÃÏÂÁî×¢ÈëÎó²î
Cerner Connectivity Engine hostname¡¢timezoneºÍNTP serverÉèÖñ£´æÊäÈëÎó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¿ÉÖ´ÐÐí§ÒâOSÏÂÁî¡£¡£¡£
https://www.securifera.com/advisories/cve-2018-20052-20053/
4. Tenda AC7¡¢AC9ºÍAC10 web server (httpd)»º³åÇøÒç³öÎó²î
Tenda AC7¡¢AC9ºÍAC10 web server (httpd)±£´æ»º³åÇøÒç³öÎó²î£¬£¬£¬£¬£¬ÔÊÐí Ô¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¿É¾ÙÐлº³åÇøÒç³ö¹¥»÷£¬£¬£¬£¬£¬¿ÉÖ´ÐÐí§Òâ´úÂë»ò¾ÙÐоܾøÐ§À͹¥»÷¡£¡£¡£
https://github.com/zsjevilhex/iot/blob/master/route/tenda/tenda-02/Tenda.md
5. Sierra Wireless AirLink ES450 ACEManager iplogging.cgi OSÏÂÁî×¢ÈëÎó²î
Sierra Wireless AirLink ES450 ACEManager iplogging.cgi±£´æÊäÈëÑéÖ¤Îó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§ÒâOSÏÂÁî¡£¡£¡£
https://packetstormsecurity.com/files/152646/Sierra-Wireless-AirLink-ES450-ACEManager-iplogging.cgi-Command-Injection.html
Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
¸ßͨоƬ×é±£´æÒ»¸ö²àÐŵÀ¹¥»÷Îó²î£¬£¬£¬£¬£¬¸ÃÎó²î£¨CVE-2018-11976£©¿ÉÔÊÐí¹¥»÷Õß´Ó¸ßͨоƬµÄQSEEÇå¾²ÇøÓòÖмìË÷¼ÓÃÜ˽Կ¡£¡£¡£QSEEÊǸßͨоƬµÄ¿ÉÐÅÖ´ÐÐÇéÐΣ¨TEE£©£¬£¬£¬£¬£¬ÀàËÆÓÚÓ¢ÌØ¶ûµÄSGX¡£¡£¡£Æ¾Ö¤NCCÑо¿Ö°Ô±Keegan RyanµÄ±íÊö£¬£¬£¬£¬£¬¸ßͨоƬµÄ¼ÓÃÜÊðÃûËã·¨ECDSA£¨ÍÖÔ²ÇúÏßËã·¨£©±£´æÎó²î£¬£¬£¬£¬£¬¿Éͨ¹ýËæ»úÊýµÄһЩbitÍÆ²â³ö256λECDSAÃÜÔ¿¡£¡£¡£¸ÃÎó²îµÄʹÓÃÐèҪװ±¸µÄrootȨÏÞ¡£¡£¡£ÓÐ46¿î¸ßͨоƬ×éÊܵ½Ó°Ï죬£¬£¬£¬£¬°üÀ¨¶à¿îæçÁúоƬ¡£¡£¡£¸ÃÎó²îµÄÐÞ¸´²¹¶¡ÒѾ°üÀ¨ÔÚGoogleÐû²¼µÄ4ÔÂAndroidÇå¾²¸üÐÂÖС£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/security-flaw-lets-attackers-recover-private-keys-from-qualcomm-chips/
2¡¢Google PlayϼÜ50¸ö¶ñÒâÓ¦Ó㬣¬£¬£¬£¬×°ÖÃÁ¿´ï3000Íò´Î
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/30-million-android-users-have-installed-malicious-lifestyle-apps/
3¡¢Õë¶Ô»ªË¶µÄ¹©Ó¦Á´¹¥»÷ShadowHammer»¹Ãé×¼ÁíÍâÁù¼ÒÑÇÖÞ¹«Ë¾
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/shadowhammer-targets-multiple-companies-asus-just-one-of-them/
4¡¢Wi-FiÈÈÃŲéÕÒÆ÷й¶200ÍòWi-FiÃÜÂë
ƾ֤TechCrunchµÄ±¨¸æ£¬£¬£¬£¬£¬Ò»¸öÃûΪWiFi FinderµÄAndroid APPй¶ÁËÁè¼Ý200Íò¸öWi-FiÍøÂçµÄÃÜÂ룬£¬£¬£¬£¬ÆäÖÐÊýÍò¸öWi-FiÈÈÃÅλÓÚÃÀ¹ú¡£¡£¡£¸ÃAPPÓÃÓÚ×ÊÖúÓû§²éÕÒWi-FiÈÈÃÅ£¬£¬£¬£¬£¬ÆäÏÂÔØÁ¿´ïÊýǧ´Î¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷¸ÃAPPµÄÊý¾Ý¿â̻¶ÔÚÍøÉÏÇÒδÊܱ£»£»£»¤£¬£¬£¬£¬£¬Êý¾Ý¿âÖеļͼ°üÀ¨Wi-FiÍøÂçµÄÃû³Æ¡¢×¼È·µÄµØÀíλÖá¢BSSIDºÍÃ÷ÎÄÃÜÂ룬£¬£¬£¬£¬µ«²»°üÀ¨Wi-FiËùÓÐÕßµÄÁªÏµÐÅÏ¢¡£¡£¡£ÔÆÐ§À͹«Ë¾DigitalOceanÔÚ½Óµ½±¨¸æºóɾ³ýÁ˸ÃÊý¾Ý¿â¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/leaky_app_data/144029/
5¡¢Google PlayÖÐ¹ã¸æÈí¼þPreAMo£¬£¬£¬£¬£¬ÏÂÔØÁ¿´ï9000Íò´Î
CheckpointÑо¿Ö°Ô±ÔÚGoogle PlayÖз¢Ã÷¹ã¸æÈí¼þPreAMo£¬£¬£¬£¬£¬¸Ã¹ã¸æÈí¼þαװ³É6¸öAPP£¬£¬£¬£¬£¬×ÜÏÂÔØÁ¿Áè¼Ý9000Íò´Î¡£¡£¡£PreAMoÖ÷ÒªÕë¶ÔÈý¸ö¹ã¸æÊðÀíÉÌ - Presage¡¢AdmobºÍMopub¾ÙÐÐڲƣ¬£¬£¬£¬£¬¹¥»÷ÕßÕë¶Ôÿ¸ö¹ã¸æÊðÀíÉÌʹÓòî±ðµÄ´¦Öóͷ£ÒªÁ죬£¬£¬£¬£¬µ«Ê¹ÓÃÁËÏàͬµÄC£¦CЧÀÍÆ÷£¨res.mnexuscdn[.]com£©£¬£¬£¬£¬£¬ÓÃÓÚ·¢ËÍͳ¼ÆÐÅÏ¢ºÍÎüÊÕÉèÖÃÐÅÏ¢¡£¡£¡£Google PlayÔÚ½Óµ½±¨¸æºóÒѾϼÜÁËÕâЩÊÜѬȾµÄAPP¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://research.checkpoint.com/preamo-a-clicker-campaign-found-on-google-play/


¾©¹«Íø°²±¸11010802024551ºÅ