ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ23ÖÜ

Ðû²¼Ê±¼ä 2019-06-17

±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö



2019Äê6ÔÂ10ÈÕÖÁ16ÈÕ¹²ÊÕ¼Çå¾²Îó²î63¸ö£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇSAP E-Commerce CVE-2019-0308Ô¶³Ì´úÂë×¢ÈëÎó²î£»£»£»£»Adobe Campaigní§Òâ´úÂëÖ´ÐÐÎó²î£»£»£»£» WAGO Industrial Managed Switches SSHÓ²±àÂëÎó²î£»£»£»£»Microsoft Word CVE-2019-1034ÄÚ´æÆÆËð´úÂëÖ´ÐÐÎó²î£»£»£»£»Dahua IPC-HFW1XXXÉãÏñ»ú»º³åÇøÒç³öÎó²î¡£¡£¡£ ¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇ


¹È¸è֤ʵºÚ¿ÍÔøÊ¹ÓõÚÈý·½ÔÚAndroidÊÖ»úÉÏ×°ÖúóÃÅ£»£»£»£»HSMÑÏÖØÎó²î£¬£¬£¬£¬£¬Ó°Ïì¶à¸öÒøÐС¢ÔÆÐ§ÀÍÉ̺ÍÕþ¸®»ú¹¹£»£»£»£»Ê©ÄÍµÂµçÆøModicon M580¶à¸öÎó²î£¬£¬£¬£¬£¬¿Éµ¼ÖÂDoS¼°ÐÅϢй¶£»£»£»£»·É»úÁ㲿¼þ³§ÉÌASCOÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬²¿·Ö¹¤³§ÒѹرÕ£»£»£»£»Evernote Chrome²å¼þXSSÎó²î£¬£¬£¬£¬£¬²¨¼°Ô¼460ÍòÓû§¡£¡£¡£ ¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£ ¡£



Ö÷ÒªÇå¾²Îó²îÁбí



1. SAP E-Commerce CVE-2019-0308Ô¶³Ì´úÂë×¢ÈëÎó²î
SAP E-Commerce±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬×¢Èëí§Òâ´úÂ룬£¬£¬£¬£¬²¢ÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐС£¡£¡£ ¡£

https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=521864242


2. Adobe Campaigní§Òâ´úÂëÖ´ÐÐÎó²î
Adobe Campaign±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬ÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£ ¡£

https://helpx.adobe.com/security/products/campaign/apsb19-28.html


3. WAGO Industrial Managed Switches SSHÓ²±àÂëÎó²î
WAGO Industrial Managed Switches¶à¸ö²úÆ·±£´æÓ²±àÂëSSHÃÜÔ¿Îó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¿ÉδÊÚȨ»á¼û×°±¸¡£¡£¡£ ¡£

https://ics-cert.us-cert.gov/advisories/ICSA-19-164-02


4. Microsoft Word CVE-2019-1034ÄÚ´æÆÆËð´úÂëÖ´ÐÐÎó²î
Microsoft Word´¦Öóͷ£WORDÎļþ±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇ󣬣¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬£¬¿ÉÖ´ÐÐí§Òâ´úÂë¡£¡£¡£ ¡£

https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2019-1034


5. Dahua IPC-HFW1XXXÉãÏñ»ú»º³åÇøÒç³öÎó²î
Dahua IPC-HFW1XXX±£´æ»º³åÇøÒç³öÎó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¿É¾ÙÐоܾøÐ§À͹¥»÷»òÕßÖ´ÐÐí§Òâ´úÂë¡£¡£¡£ ¡£

https://www.dahuasecurity.com/support/cybersecurity/details/617



 Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö



1¡¢¹È¸è֤ʵºÚ¿ÍÔøÊ¹ÓõÚÈý·½ÔÚAndroidÊÖ»úÉÏ×°ÖúóÃÅ

c7c7ÓéÀÖÆ½Ì¨(ÖйúÓÎ)µÇ¼¹ÙÍøÈë¿Ú

¹È¸è֤ʵ2017ÄêºÚ¿ÍÔøÊ¹ÓõÚÈý·½¹©Ó¦É̹¹½¨µÄ³ÌÐò´úÂëÔÚAndroidÊÖ»úÉÏ×°ÖÃTriadaºóÃÅ¡£¡£¡£ ¡£¹È¸èûÓÐÏêϸ˵Ã÷ÄÄЩװ±¸Êܵ½ÁËÓ°Ï죬£¬£¬£¬£¬µ«Çå¾²³§ÉÌDr.WebÔøÔÚ2017ÄêµÄÑо¿±¨¸æÖÐÖ¸³öÊÜÓ°ÏìµÄ×°±¸Æ·ÅưüÀ¨Leagoo M5 Plues¡¢Leagoo M8¡¢Nomu S10ºÍNomu S20µÈ¡£¡£¡£ ¡£¸ÃºóÃÅÖ¼ÔÚÏòÓû§µÄ×°±¸ÍÆËÍÀ¬»øÓʼþºÍδÊÚȨµÄ¹ã¸æµÈ¡£¡£¡£ ¡£

Ô­ÎÄÁ´½Ó£º
https://www.cyberscoop.com/android-backdoor-triada-mobile-supply-chain/

2¡¢HSMÑÏÖØÎó²î£¬£¬£¬£¬£¬Ó°Ïì¶à¸öÒøÐС¢ÔÆÐ§ÀÍÉ̺ÍÕþ¸®»ú¹¹


c7c7ÓéÀÖÆ½Ì¨(ÖйúÓÎ)µÇ¼¹ÙÍøÈë¿Ú


LedgerÇå¾²Ñо¿Ö°Ô±Åû¶һ¼ÒÖ÷Òª³§É̵ÄHSM£¨Ó²¼þÇ徲ģ¿£¿£¿£¿ £¿£¿é£©ÖеÄÑÏÖØÎó²î£¬£¬£¬£¬£¬¸ÃÎó²î¿ÉÔÊÐí¼ìË÷´æ´¢ÔÚHSMÖеÄÃô¸ÐÊý¾Ý¡£¡£¡£ ¡£HSMÊÇÓ²¼þ¸ôÀë×°±¸£¬£¬£¬£¬£¬³£ÓÃÓÚ½ðÈÚ»ú¹¹¡¢Õþ¸®»ú¹¹¡¢Êý¾ÝÖÐÐÄ¡¢ÔÆÐ§ÀÍÉ̺͵çÐÅÔËÓªÉ̵È¡£¡£¡£ ¡£Æ¾Ö¤Ñо¿Ö°Ô±µÄ±¨¸æ£¬£¬£¬£¬£¬¸ÃÎó²îÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÍêÈ«¿ØÖÆHSM£¬£¬£¬£¬£¬´Ó¶ø¼ìË÷¼ÓÃÜÃÜÔ¿ºÍÖÎÀíԱƾ֤µÈÐÅÏ¢¡£¡£¡£ ¡£Ñо¿Ö°Ô±²¢Î´Åû¶ÊÜÓ°ÏìµÄ³§ÉÌÃû³Æ£¬£¬£¬£¬£¬µ«CryptosenseÖ¸³ö¸Ã³§ÉÌ¿ÉÄÜÊǽðÑÅÍØ¡£¡£¡£ ¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/major-hsm-vulnerabilities-impact-banks-cloud-providers-governments/

3¡¢Ê©ÄÍµÂµçÆøModicon M580¶à¸öÎó²î£¬£¬£¬£¬£¬¿Éµ¼ÖÂDoS¼°ÐÅϢй¶


c7c7ÓéÀÖÆ½Ì¨(ÖйúÓÎ)µÇ¼¹ÙÍøÈë¿Ú


˼¿ÆTalosÅû¶ʩÄÍµÂµçÆøModicon M580ÖеĶà¸öÎó²î¡£¡£¡£ ¡£Modicon M580ÊÇÊ©ÄÍµÂµçÆøModiconϵÁпɱà³Ì×Ô¶¯»¯¿ØÖÆÆ÷µÄ×îвúÆ·£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚÆä¹Ì¼þ°æ±¾SV2.70Öз¢Ã÷¶à¸öÎó²î£¬£¬£¬£¬£¬°üÀ¨¿Éµ¼ÖÂDoSµÄÎó²î£¨CVE-2018-7846¡¢CVE-2018-7849¡¢CVE-2018-7843£©£¬£¬£¬£¬£¬¿Éµ¼ÖÂÐÅϢй¶µÄÎó²î£¨CVE-2018-7844¡¢CVE-2018-7848£©¼°Éí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2018-7842£©µÈ¡£¡£¡£ ¡£

Ô­ÎÄÁ´½Ó£º
https://blog.talosintelligence.com/2019/06/vulnerability-spotlight-multiple.html

4¡¢·É»úÁ㲿¼þ³§ÉÌASCOÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬²¿·Ö¹¤³§ÒѹرÕ


c7c7ÓéÀÖÆ½Ì¨(ÖйúÓÎ)µÇ¼¹ÙÍøÈë¿Ú


¾Ý±ÈÀûʱýÌ屨µÀ£¬£¬£¬£¬£¬·É»úÁ㲿¼þ³§ÉÌASCOλÓÚ±ÈÀûʱÔú·ÒÌØÄ·µÄ¹¤³§ÔâÀÕË÷Èí¼þѬȾ£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÒÑ×èÖ¹ÁËËĸö¹ú¼ÒµÄ¹¤³§Éú²ú¡£¡£¡£ ¡£¸ÃѬȾÊÂÎñ±¬·¢ÔÚ6ÔÂ7ÈÕÐÇÆÚÎ壬£¬£¬£¬£¬×î³õÓ°ÏìÁ˸ù«Ë¾Î»ÓÚ±ÈÀûʱµÄ¹¤³§£¬£¬£¬£¬£¬µ«ASCOÒ²¹Ø±ÕÁËλÓڵ¹ú¡¢¼ÓÄôóºÍÃÀ¹úµÄ¹¤³§¡£¡£¡£ ¡£¾Ý±¨µÀÍ£»£»£»£»úʱ¼äÔ¤¼ÆÎªÒ»ÖÜ£¬£¬£¬£¬£¬°üÀ¨¼´½«µ½À´µÄÖÜÄ©¡£¡£¡£ ¡£¸Ã¹«Ë¾²¢Î´Í¸Â¶¸ü¶àÐÅÏ¢£¬£¬£¬£¬£¬ÏÖÔÚÒ²²»ÖªµÀÀÕË÷Èí¼þµÄÃû³Æ¡£¡£¡£ ¡£ASCOÊÇÌìÏÂÉÏ×î´óµÄ·É»úÁ㲿¼þ³§ÉÌÖ®Ò»£¬£¬£¬£¬£¬Æä¿Í»§°üÀ¨¿Õ¿Í¡¢²¨ÒôÉõÖÁ¾üÓᢺ½¿ÕÁìÓòµÄ¹«Ë¾µÈ¡£¡£¡£ ¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/ransomware-halts-production-for-days-at-major-airplane-parts-manufacturer/

5¡¢Evernote Chrome²å¼þXSSÎó²î£¬£¬£¬£¬£¬²¨¼°Ô¼460ÍòÓû§


c7c7ÓéÀÖÆ½Ì¨(ÖйúÓÎ)µÇ¼¹ÙÍøÈë¿Ú


Çå¾²³§ÉÌGuardio·¢Ã÷EvernoteµÄChrome²å¼þ£¨Evernote Web Clipper£©Öб£´æÒ»¸öÑÏÖØµÄXSSÎó²î£¬£¬£¬£¬£¬¿ÉÔÊÐí¹¥»÷Õß»á¼ûÓû§ÔÚµÚÈý·½Ð§ÀÍÖеÄÃô¸ÐÐÅÏ¢¡£¡£¡£ ¡£ÓÉÓÚEvernote¹ãÊܽӴý£¬£¬£¬£¬£¬¸ÃÎó²î¿ÉÄܲ¨¼°Ô¼460ÍòÓû§¡£¡£¡£ ¡£¸ÃÎó²î£¨CVE-2019-12592£©ÊôÓÚ²å¼þÖеıàÂëÂß¼­¹ýʧ£¬£¬£¬£¬£¬¿ÉÈÆ¹ýä¯ÀÀÆ÷µÄͬԴսÂÔ£¬£¬£¬£¬£¬Ê¹µÃ¹¥»÷Õß»á¼ûµÚÈý·½Ð§À͵ÄÃô¸ÐÓû§ÐÅÏ¢£¬£¬£¬£¬£¬°üÀ¨Éí·ÝÑéÖ¤ÐÅÏ¢¡¢²ÆÎñÐÅÏ¢¡¢É罻ýÌå̸ÌìÐÅÏ¢¡¢µç×ÓÓʼþÐÅÏ¢µÈ¡£¡£¡£ ¡£½¨ÒéÓû§¸üÐÂÖÁ7.11.1¼°¸ü¸ß°æ±¾¡£¡£¡£ ¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/critical-flaw-in-evernote-add-on-exposed-sensitive-data-of-millions/