ÐÅÏ¢Çå¾²Öܱ¨-2020ÄêµÚ50ÖÜ
Ðû²¼Ê±¼ä 2020-12-14> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
2020Äê11ÔÂ30ÈÕÖÁ12ÔÂ06ÈÕ¹²ÊÕ¼Çå¾²Îó²î50¸ö£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇZeroshell cgi-bin kerbynet StartSessionSubmit×¢ÈëÎó²î£»£»£»£»Western Digital My Cloud OS devicesÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£»£»£»£»SourceCodester Car Rental Management System SQL×¢ÈëÎó²î£»£»£»£»Crux Linux Docker images root¿ÕÃÜÂëÎó²î£»£»£»£»HPE Edgeline Infrastructure ManagerÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇоƬ³§ÉÌAdvantechѬȾConti£¬£¬£¬±»ÀÕË÷1300ÍòÃÀÔª£»£»£»£»Carding Action 2020Ðж¯ÆÆ»ñÒ»Æð´ó¹æÄ£Õ©Æ°¸¼þ£»£»£»£»Cisco TalosÅû¶WebKitÖжà¸öÑÏÖØµÄÎó²î£»£»£»£»Ñо¿ÍŶӷ¢Ã÷½©Ê¬ÍøÂçXantheʹÓÃDockerAPIѬȾLinux£»£»£»£»GitHubÐû²¼2020Äê¶ÈOctoverseÌ¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£
> Ö÷ÒªÇå¾²Îó²îÁбí
1.Microsoft Exchange Server CVE-2020-17142Ô¶³Ì´úÂëÖ´ÐÐÎó²î
Microsoft Exchange Server±£´æÎ´Ã÷Çå¾²Îó²î£¬£¬£¬Ô¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
https://msrc.microsoft.com/update-guide/zh-CN/vulnerability/CVE-2020-17142
2.uIP-Contiki-OS DNS¼Í¼ÆÊÎö»º³åÇøÒç³öÎó²î
uIP-Contiki-OS DNS¼Í¼ÆÊÎö±£´æÔ½½ç¶ÁÎó²î£¬£¬£¬Ô¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉÒÔÓ¦ÓÃÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01
3.Siemens LOGO! 8 BMδÊÚȨ»á¼ûÎó²î
Siemens LOGO! 8 BMijЩЧÀÍȱÉÙÊÚȨ£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉδÊÚȨ¿ØÖÆ×°±¸¡£¡£¡£¡£
https://us-cert.cisa.gov/ics/advisories/icsa-20-343-10
4.Schneider Electric Easergy T300ÊÚȨȱʧÎó²î
Schneider Electric Easergy T300±£´æÊÚȨȱʧÎó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉδÊÚȨ»á¼û×°±¸¡£¡£¡£¡£
https://www.se.com/ww/en/download/document/SEVD-2020-315-06/
5.Aruba Networks ArubaOS PAPIÏÂÁî×¢ÈëÎó²î
Aruba Networks ArubaOS PAPI±£´æí§ÒâÏÂÁî×¢ÈëÎó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£
> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢ºÚ¿ÍÇÔÈ¡Òâ´óÀûLeonardo SpAµÄ10GB¾üÊÂÉñÃØ

ºÚ¿ÍÇÔÈ¡¹ú·À¹«Ë¾Leonardo SpAµÄ10 GB¾üÊÂÉñÃØ£¬£¬£¬ÏÖÒѱ»Òâ´óÀû¾¯·½¾Ð²¶¡£¡£¡£¡£LeonardoÊÇÌìÏÂÉÏ×î´óµÄ¹ú·À³Ð°üÉÌÖ®Ò»£¬£¬£¬Æä30£¥µÄ¹É·ÝÊôÓÚÒâ´óÀû¾¼ÃºÍ²ÆÎñ²¿¡£¡£¡£¡£´Ë´Îй¶µÄÐÅÏ¢Éæ¼°µ½ÐÐÕþ»á¼ÆÖÎÀí¡¢ÈËÁ¦×ÊÔ´¡¢×ÊÔ´»õÎïµÄ²É¹ººÍ·ÖÅÉ¡¢ÃñÓ÷ɻúÁ㲿¼þºÍ¾üÓ÷ɻúµÄÉè¼Æ¡¢Ô±¹¤Ð¡ÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¾ÝϤ£¬£¬£¬ºÚ¿ÍʹÓÃUSBÃÜÔ¿Ïò94¸öÊÂÇéÕ¾·Ö·¢cftmon.exeľÂí£¬£¬£¬²¢ÒÔÕý°æWindowsÎļþÃüÃû¸ÃľÂíÒÔÈÆ¹ý¼ì²â¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/police-arrest-two-in-data-theft-cyberattack-on-leonardo-defense-corp/
2¡¢¹þÈø¿Ë˹̹µÚÈý´ÎÇ¿ÖÆÔÚÆä¹«Ãñ×°±¸ÉÏ×°ÖøùÖ¤Êé

¹þÈø¿Ë˹̹Õþ¸®ÒÔÍøÂçÇå¾²ÑÝϰΪ»Ï×Ó£¬£¬£¬Ç¿ÆÈÊ×¶¼Å¬¶ûËÕµ¤µÄ¹«ÃñÔÚÆä×°±¸ÉÏ×°ÖÃÊý×ÖÖ¤Êé¡£¡£¡£¡£ÈôÊDz»×°ÖÃÕþ¸®µÄ¸ùÖ¤Ê飬£¬£¬¹«Ãñ½«ÎÞ·¨»á¼ûGoogle¡¢Twitter¡¢YouTube¡¢Facebook¡¢InstagramºÍNetflixµÈÍøÕ¾¡£¡£¡£¡£Ò»µ©×°Ö㬣¬£¬¸ÃÖ¤Ê齫ÔÊÐíÕþ¸®Í¨¹ýÒ»ÖÖ³ÆÎªMitM£¨ÖÐÐÄÈË£©µÄÊÖÒÕÀ´×èµ²Óû§×°±¸·¢³öµÄËùÓÐHTTPSÁ÷Á¿¡£¡£¡£¡£ÕâÊǹþÈø¿Ë˹̹Õþ¸®×Ô2015ÄêÒÔÀ´µÚÈý´ÎÇ¿ÖÆÔÚÆä¹«Ãñ×°±¸ÉÏ×°ÖøùÖ¤Êé¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/kazakhstan-government-is-intercepting-https-traffic-in-its-capital/
3¡¢FireEyeÈ·ÈÏÔâµ½APT¹¥»÷£¬£¬£¬ÒÑÐû²¼ÉùÃ÷²¢¿ªÔ´Ïà¹Ø¹¤¾ß

FireEye³ÆÆäÔâµ½ÁËÓɹú¼ÒÔÞÖúµÄ¸ß¶ÈÖØ´óµÄºÚ¿ÍµÄ¹¥»÷£¬£¬£¬¹¥»÷Õßδ¾ÊÚȨ»á¼ûÆäRed Team¹¤¾ß¡£¡£¡£¡£FireEyeÌåÏÖÕâÊÇÒ»´ÎÓµÓÐÒ»Á÷½ø¹¥ÄÜÁ¦µÄ¹ú¼ÒµÄ¹¥»÷£¬£¬£¬ÓëÒÔÍùÊÂÎñ²î±ð£¬£¬£¬´Ë´Î¹¥»÷רÃÅÕë¶ÔºÍ¹¥»÷FireEye¡£¡£¡£¡£¾ÊӲ죬£¬£¬¹¥»÷Õß»á¼ûÁËÓÃÓÚ²âÊÔ¿Í»§Çå¾²ÐÔµÄRed TeamÆÀ¹À¹¤¾ß£¬£¬£¬µ«ÆäÖв¢Ã»ÓаüÀ¨0dayÎó²î¡£¡£¡£¡£ÏÖÔÚCISAÉÐδÊÕµ½ÓйØÕâЩ¹¤¾ß±»¶ñÒâʹÓõı¨¸æ£¬£¬£¬FireEye¿ª·¢ÁË300¶àÖֶԲߣ¬£¬£¬ÒÔïÔÌ´ËÊÂÎñµÄDZÔÚÓ°Ïì¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.fireeye.com/blog/products-and-services/2020/12/fireeye-shares-details-of-recent-cyber-attack-actions-to-protect-community.html
4¡¢Ñо¿ÍŶÓÅû¶Ëĸö¿ªÔ´TCP/IP¿âÖеÄ33¸öÎó²îAmnesia:33

ForescoutµÄÑо¿ÍŶÓÅû¶ÁËËĸö¿ªÔ´TCP/IP¿âÖеÄ33¸öÎó²î£¬£¬£¬²¢½«ËüÃÇÃüÃûΪAmnesia:33¡£¡£¡£¡£ÕâËĸö¿ªÔ´¿â»®·ÖΪuIP¡¢FNET¡¢picoTCPºÍNut/Net£¬£¬£¬Ó°ÏìÁË150¶à¼Ò¹©Ó¦É̵IJúÆ·¡£¡£¡£¡£ForescoutÌåÏÖ£¬£¬£¬ºÚ¿Í¿ÉʹÓÃÕâ33¸öÎó²îÌᳫԶ³Ì´úÂëÖ´ÐУ¨RCE£©¹¥»÷ÒÔ¿ØÖÆÄ¿µÄ×°±¸£¬£¬£¬¾Ü¾øÐ§ÀÍ£¨DoS£©¹¥»÷ÒÔÓ°Ï칫˾ӪҵÔËÓª£¬£¬£¬ÐÅÏ¢×ß©£¨infoleak£©¹¥»÷ÒÔ»ñȡDZÔÚµÄÃô¸ÐÐÅÏ¢£¬£¬£¬DNS»º´æÖж¾¹¥»÷ÒÔ½«×°±¸Ö¸Ïò¶ñÒâÍøÕ¾¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/amnesia33-vulnerabilities-impact-millions-of-smart-and-industrial-devices/
5¡¢ºÚ¿ÍÔÚ°µÍø³öÊÛÁè¼Ý8Íò¸öSQLÊý¾Ý¿â£¬£¬£¬Ã¿¸ö550ÃÀÔª

ºÚ¿ÍÔÚ°µÍøÒÔÿ¸ö550ÃÀÔªµÄ¼ÛÇ®³öÊÛÁè¼Ý85000¸öSQLÊý¾Ý¿â¡£¡£¡£¡£ºÚ¿Í×éÖ¯ÔÚÒ»Ö±µØÈëÇÖMySQLÊý¾Ý¿â£¬£¬£¬ÏÂÔØ±í¸ñ£¬£¬£¬É¾³ýÔʼÎĵµ£¬£¬£¬²¢ÁôÏÂÊê½ð¼Í¼£¬£¬£¬Í¨ÖªÊܺ¦ÕßÓëÆäÁªÏµÒÔÈ¡»ØÆäÊý¾Ý¡£¡£¡£¡£ÈôÊÇÊܺ¦ÕßÔÚ¾ÅÌìÄÚûÓи¶¿î£¬£¬£¬ËûÃǵÄÊý¾Ý½«ÔÚÊý¾ÝÐ¹Â¶ÍøÕ¾±»ÅÄÂô¡£¡£¡£¡£Ëæ×ÅÊܺ¦ÕßÊýÄ¿µÄÔö¶à£¬£¬£¬¹¥»÷Õß×îÏÈʹÓÃ×Ô¶¯»¯µÄÈëÇÖÁ÷³ÌºÍÅÄÂôÍøÒ³£¬£¬£¬²¢²»»áÆÊÎö±»ÈëÇÖµÄÊý¾Ý¿âÖеÄÊý¾Ý¡£¡£¡£¡£±ðµÄ£¬£¬£¬ÕâЩÊý¾Ý¿âµÄÊÛ¼Û»áËæ×ÅBTC/ USD»ãÂʵIJ¨¶¯ÓÐËùת±ä£¬£¬£¬µ«Í¨³£Ê¼ÖÕ¼á³ÖÔÚ500ÃÀÔª×óÓÒ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/hackers-are-selling-more-than-85000-sql-databases-on-a-dark-web-portal/


¾©¹«Íø°²±¸11010802024551ºÅ