ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ43ÖÜ

Ðû²¼Ê±¼ä 2019-11-04

>±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö



2019Äê10ÔÂ28ÈÕÖÁ11ÔÂ03ÈÕ¹²ÊÕ¼Çå¾²Îó²î47¸ö£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇApple WebKit CVE-2019-8812ÄÚ´æÆÆËðí§Òâ´úÂëÖ´ÐÐÎó²î; MikroTik RouterOS NPKĿ¼±éÀúÎó²î£»£»£»£»rConfig ¡®rootUname¡¯²ÎÊýÏÂÁî×¢ÈëÎó²î£»£»£»£»ZTE 9000E CVE-2019-3425ÕË»§ÃÜÂë¸ü¸ÄÎó²î£»£»£»£»Apache ThriftÔ½½ç¶ÁÎó²î¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÎÒ¹úͨ¹ý¡¶ÃÜÂë·¨¡·£¬£¬£¬£¬½«ÓÚ2020Äê1ÔÂ1ÈÕÆðʵÑ飻£»£»£»Ó¢¹úNCSCÐû²¼2019ÄêÍøÂçÇå¾²Äê¶È±¨¸æ£»£»£»£»¸ñ³¼ªÑÇÔâÓö´ó¹æÄ£ÍøÂç¹¥»÷£¬£¬£¬£¬²¨¼°1.5Íò¸öÍøÕ¾£»£»£»£»Pwn2OwnºÚ¿Í´óÈüÊ×´ÎÉæ¼°¹¤Òµ¿ØÖÆÏµÍ³£»£»£»£»ÎÒ¹ú¶à¸öÖ÷Òªµ¥Î»±»¾³ÍâAPTºÚ¿Í×éÖ¯¹¥ÏÝ¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£


>Ö÷ÒªÇå¾²Îó²îÁбí



1. Rittal Chiller SK 3232-SeriesδÊÚȨ»á¼ûÎó²î
Rittal Chiller SK 3232-Series WEB½Ó¿Ú±£´æÇ徲©
1. Apple WebKit CVE-2019-8812ÄÚ´æÆÆËðí§Òâ´úÂëÖ´ÐÐÎó²î
Apple WebKit´¦Öóͷ£WEBÄÚÈݱ£´æÄÚ´æÆÆËðÎó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÒ³ÃæÇëÇ󣬣¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬¿É¾ÙÐоܾøÐ§À͹¥»÷»òÕßÖ´ÐÐí§Òâ´úÂë¡£¡£¡£
https://support.apple.com/zh-cn/HT210726

2. MikroTik RouterOS NPKĿ¼±éÀúÎó²î
MikroTik RouterOS´¦Öóͷ£Éý¼¶°üÃû×Ö×Ö¶ÎÎó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬¿É¾ÙÐÐĿ¼±éÀú¹¥»÷£¬£¬£¬£¬×°ÖöñÒâ°ü»ñȡȨÏÞ¡£¡£¡£
https://zh-cn.tenable.com/security/research/tra-2019-46?tns_redirect=true

3. rConfig ¡®rootUname¡¯²ÎÊýÏÂÁî×¢ÈëÎó²î
rConfig ¡®rootUname¡¯²ÎÊý´¦Öóͷ£Ã»Óо­ÓÉÊäÈëУÑ飬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬ÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§ÒâOSÏÂÁî¡£¡£¡£
https://drive.google.com/file/d/1bTpTn4-alJ8qGCEATLq-oVM6HbhE65iY/view?usp=sharing

4. ZTE 9000E CVE-2019-3425ÕË»§ÃÜÂë¸ü¸ÄÎó²î
ZTE 9000E±£´æÉè¼ÆÎó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬Ö±½ÓÉèÖøü¸ÄÆäËüÕË»§µÄÃÜÂë¡£¡£¡£
http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1011682

5. Apache ThriftÔ½½ç¶ÁÎó²î
Apache ThriftʹÓÃTJSONProtocol»ò TSimpleJSONProtocol±£´æ»º³åÇøÒç³öÎó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»£»òÖ´ÐÐí§Òâ´úÂë¡£¡£¡£
http://mail-archives.apache.org/mod_mbox/thrift-dev/201910.mbox/%3C277A46CA87494176B1BBCF5D72624A2A%40HAGGIS%3E


>Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö



1¡¢ÎÒ¹úͨ¹ý¡¶ÃÜÂë·¨¡·£¬£¬£¬£¬½«ÓÚ2020Äê1ÔÂ1ÈÕÆðʵÑé

c7c7ÓéÀÖÆ½Ì¨(ÖйúÓÎ)µÇ¼¹ÙÍøÈë¿Ú


Ê®Èý½ìÌìÏÂÈË´ó³£Î¯»áµÚÊ®ËĴξۻá26ÈÕ±í¾öͨ¹ý¡¶ÖлªÈËÃñ¹²ºÍ¹úÃÜÂë·¨¡·£¬£¬£¬£¬½«×Ô2020Äê1ÔÂ1ÈÕÆðÊ©ÐС£¡£¡£ÃÜÂë·¨Ö¼Ôڹ淶ÃÜÂëÓ¦ÓúÍÖÎÀí£¬£¬£¬£¬Ôö½øÃÜÂëÊÂÒµÉú³¤£¬£¬£¬£¬°ü¹ÜÍøÂçÓëÐÅÏ¢Çå¾²£¬£¬£¬£¬ÌáÉýÃÜÂëÖÎÀí¿ÆÑ§»¯¡¢¹æ·¶»¯¡¢·¨Öλ¯Ë®Æ½£¬£¬£¬£¬ÊÇÎÒ¹úÃÜÂëÁìÓòµÄ×ÛºÏÐÔ¡¢»ù´¡ÐÔÖ´·¨¡£¡£¡£ÃÜÂë·¨¹²ÎåÕÂËÄÊ®ËÄÌõ£¬£¬£¬£¬½«ÃÜÂë·ÖΪ½¹µãÃÜÂ롢ͨË×ÃÜÂëºÍÉÌÓÃÃÜÂ룬£¬£¬£¬²¢¶ÔÏà¹ØÖÆ¶È¡¢Ö´·¨ÔðÈμ°Ö°È¨²¿·Ö¾ÙÐÐÁË»®¶¨¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
http://www.xinhuanet.com/politics/2019-10/26/c_1125156896.htm


2¡¢Ó¢¹úNCSCÐû²¼2019ÄêÍøÂçÇå¾²Äê¶È±¨¸æ


c7c7ÓéÀÖÆ½Ì¨(ÖйúÓÎ)µÇ¼¹ÙÍøÈë¿Ú


ƾ֤Ӣ¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¨NCSC£©Ðû²¼µÄ2019ÍøÂçÇå¾²Äê¶È±¨¸æ£¬£¬£¬£¬2018Äê9ÔÂ1ÈÕÖÁ2019Äê8ÔÂ31ÈÕʱ´úNCSC¹²×èÖ¹ÁË600¶àÆðÍøÂç¹¥»÷ÊÂÎñ£¬£¬£¬£¬ÆäÖдó´ó¶¼¹¥»÷ÊÇÓÉÍâÑó¹¥»÷ÕßÌᳫµÄ¡£¡£¡£¸Ã±¨¸æÖ¸³ö£¬£¬£¬£¬´ó´ó¶¼¹¥»÷Õë¶ÔÕþ¸®»ú¹¹¡¢´óѧ¡¢ÐÅÏ¢ÊÖÒÕ¡¢Ò½ÁƱ£½¡ºÍÔËÊäµÈÐÐÒµ¡£¡£¡£NCSC»¹ÖÒÑÔÁË56¼ÒÒøÐÐÓйØATM͵ÇÔÍþв¡£¡£¡£¸Ã±¨¸æÖгƶíÂÞ˹¡¢Öйú¡¢ÒÁÀʺͳ¯ÏʼÌÐø¶ÔÓ¢¹ú×é³ÉÕ½ÂÔÐÔ¹ú¼ÒÇå¾²Íþв¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/93015/intelligence/ncsc-report-cyber-attacks.html

3¡¢¸ñ³¼ªÑÇÔâÓö´ó¹æÄ£ÍøÂç¹¥»÷£¬£¬£¬£¬²¨¼°1.5Íò¸öÍøÕ¾


c7c7ÓéÀÖÆ½Ì¨(ÖйúÓÎ)µÇ¼¹ÙÍøÈë¿Ú


ÍâµØÊ±¼ä10ÔÂ28ÈÕ£¬£¬£¬£¬¸ñ³¼ªÑÇÔâÓöÊ·ÉÏ×î´ó¹æÄ£µÄÍøÂç¹¥»÷£¬£¬£¬£¬ÔÚ´Ëʱ´úÁè¼Ý1.5Íò¸öÍøÕ¾Êܵ½¹¥»÷²¢ÀëÏߣ¬£¬£¬£¬ÖÖÖÖÕþ¸®»ú¹¹¡¢ÒøÐС¢·¨Ôº¡¢ÍâµØ±¨Ö½ºÍµçÊǪ́µÄÍøÕ¾¶¼Êܵ½Ó°Ïì¡£¡£¡£¸ÃÊÂÎñÓëÍâµØÍøÂçÍйÜЧÀÍÌṩÉÌPro-Service±»ºÚ¿ÍÈëÇÖÓйØ£¬£¬£¬£¬¹¥»÷±¬·¢ÔÚÍâµØÔ糿£¬£¬£¬£¬µ½ÍíÉÏ8µãÊ±ÊÆÇéÖ°Ô±ÒѾ­»Ö¸´ÁËÊÜËðÕ¾µãµÄÒ»°ëÒÔÉÏ¡£¡£¡£ºÚ¿ÍÔÚ±»ÈëÇÖµÄÍøÕ¾ÉÏÐû²¼Á˱»Á÷·ÅµÄǰ×ÜͳMikheil SaakashviliµÄÕÕÆ¬£¬£¬£¬£¬²¢Ð´ÉÏ¡°ÎÒ»á»ØÀ´£¡¡±µÄÐÅÏ¢¡£¡£¡£ÍâµØÖ´·¨»ú¹¹ÕýÔÚ¶Ô´ËÊÂÎñ¾ÙÐÐÊӲ졣¡£¡£ 


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/largest-cyber-attack-in-georgias-history-linked-to-hacked-web-hosting-provider/

4¡¢Pwn2OwnºÚ¿Í´óÈüÊ×´ÎÉæ¼°¹¤Òµ¿ØÖÆÏµÍ³


c7c7ÓéÀÖÆ½Ì¨(ÖйúÓÎ)µÇ¼¹ÙÍøÈë¿Ú


Pwn2OwnºÚ¿Í´óÈü½«ÌṩÁè¼Ý25ÍòÃÀÔªµÄ½±Àø£¬£¬£¬£¬ÒÔÃãÀøÍÚ¾òICSºÍÏà¹ØÐ­ÒéÎó²î¡£¡£¡£¸Ã»î¶¯½«ÓÚÃ÷Ä꣨1ÔÂ21ÈÕÖÁ1ÔÂ23ÈÕ£©ÔÚÂõ°¢ÃÜS4¾Û»áʱ´ú¾ÙÐС£¡£¡£¡°ºÍÆäËû¾ºÈüÒ»Ñù£¬£¬£¬£¬Pwn2OwnÊÔͼͨ¹ýÕ¹ÏÖÎó²î²¢½«Ñо¿Ð§¹ûÌṩӦ¹©Ó¦ÉÌÀ´Ç¿»¯ÕâЩƽ̨¡±£¬£¬£¬£¬Pwn2Own×éÖ¯Õß¡¢ZDIÌᳫÈËBrian GorencÔÚÖÜÒ»µÄÌû×ÓÖÐÌåÏÖ£¬£¬£¬£¬¡°Pwn2OwnµÄÄ¿µÄʼÖÕÊÇÔÚ¹¥»÷Õ߯ð¾¢Ê¹ÓÃ֮ǰÐÞ¸´ÕâЩÎó²î¡±¡£¡£¡£Pwn2Own MiamiΪÎå¸öICSÀà±ðµÄÎó²îÌṩÁËÖÖÖÖ½±Àø£¬£¬£¬£¬°üÀ¨¿ØÖÆÐ§ÀÍÆ÷½â¾ö¼Æ»®¡¢OPCЧÀÍÆ÷¡¢DNP3ͨѶЭÒé¡¢HMI/²Ù×÷Ô±Õ¾ºÍ¹¤³ÌÊÂÇéÕ¾Èí¼þ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/pwn2own-expands-industrial-control-systems/149594/

5¡¢ÎÒ¹ú¶à¸öÖ÷Òªµ¥Î»±»¾³ÍâAPTºÚ¿Í×éÖ¯¹¥ÏÝ

c7c7ÓéÀÖÆ½Ì¨(ÖйúÓÎ)µÇ¼¹ÙÍøÈë¿Ú


10ÔÂ30ÈÕÐÂÎÅ£¬£¬£¬£¬Ò»êdzÆÎª@MisterCh0cµÄÍÆÌØÓû§Ðû²¼ÐÂÎųÆ£¬£¬£¬£¬·¢Ã÷ÁËÒ»¿îľÂí¿ØÖÆÆ½Ì¨µÄµÇ¼µØµãhttp://lmhostsvc[.]net/healthne/login.php¡£¡£¡£ÒԺ󣬣¬£¬£¬ÆäËûÍÆÌØÓû§·¢ÌûÆØ¹â¸Ãºǫ́ÖÁÉټͼÁË12̨±»¿ØÖ÷»úµÄIPµØµã¡¢ÅÌËã»úÃû¡¢Óû§Ãû¡¢²Ù×÷ϵͳ¡¢±»¿ØÊ±¼ä¼°×îºóÒ»´ÎÉÏÏßʱ¼äµÈÐÅÏ¢£¬£¬£¬£¬ÔÚÆØ¹âµÄ±»¿ØÖ÷»úÖУ¬£¬£¬£¬ÓÐ9¸öÊôÓÚÖйú¡£¡£¡£¸Ãºǫ́ËùÓÐÕßÊÇÓ¡¶ÈÕþ¸®Åä¾°µÄAPT×éÖ¯Bitter£¨ÓÖÃû¡°ÂûÁ黨¡±£©£¬£¬£¬£¬ÕâÊÇÒ»¸öºã¾ÃÕë¶ÔÖйú¡¢°Í»ù˹̹µÈ¹ú¼ÒµÄÕþ¸®¡¢¾ü¹¤¡¢µçÁ¦¡¢ºËµÈ²¿·Ö·¢¶¯ÍøÂç¹¥»÷µÄAPTÍŻ¡£¡£Õâ9¸öÊôÓÚÖйúµÄIPµØµãÖ÷񻃾¼°±±¾©¡¢ÉϺ£¡¢Õã½­¡¢¹ãÎ÷µÈµØ£¬£¬£¬£¬¸Ãƽ̨»¹¾ß±¸Ï·¢Ä¾Âí²å¼þµÄ¹¦Ð§£¬£¬£¬£¬¿É¶ÔÊÜ¿ØÖ÷»úʵÑé½øÒ»²½²Ù×÷¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
http://tech.ifeng.com/c/7rCKq4uSCJl