ÃÀ¹ú¶àÒéԺͨ¹ý¡¶±£ÏÕÄÜÔ´»ù´¡ÉèÊ©·¨°¸¡·£»TP-Link½¨¸´²¿ÃÅArcher·ÓÉÆ÷ÖеÄÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶
°ä²¼¹¦·ò 2019-12-17
1.ÃÀ¹ú¶àÒéԺͨ¹ý¡¶±£ÏÕÄÜÔ´»ù´¡ÉèÊ©·¨°¸¡·
Ëæ×Å2020Äê¡¶¹ú·ÀÊÚȨ·¨¡·£¨NDAA£©µÄͨ¹ý£¬ÃÀ¹ú¶àÒéԺҲͨ¹ýÁË¡¶±£ÏÕÄÜÔ´»ù´¡ÉèÊ©·¨°¸¡·¡£¸Ã·¨°¸½«ÔÚÃÀ¹úÄÜÔ´²¿¹ú¶È³¢ÊÔÊÒÄÚ³ÉÁ¢Ò»¸öΪÆÚÁ½ÄêµÄÊÔµã´òË㣬ÆäÖ¸±êÊÇ·¢ÏÖÄÜÔ´²¿ÃÅʵÌå»ú¹¹Öеݲȫ·ì϶ºÍ¸ôÀë¹Ø¼üµÄµçÍøÏµÍ³¡£ÆÀ¹ÀµÄ¼¼ÊõºÍ³ß¶ÈÔ̺¬·ÂÕպͷÇÊý×Ö½ÚÔìϵͳ¡¢×¨ÓýÚÔìϵͳºÍÎïÀí½ÚÔì¹æ»®¡£¸Ã·¨°¸»¹ÒªÇó³ÉÁ¢Ò»¸ö¹¤×÷×飬Æä¹¤×÷ÊÇ·ÖÎö¹ú¶È³¢ÊÔÊÒÌá³öµÄ½â¾ö¹æ»®£¬²¢Ôì¶©Ò»Ïî±£»¤ÄÜÔ´ÍøµÄ¹ú¶ÈÕ½Êõ¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/bill-protect-us-energy-grid-cyberattacks-passes-ndaa
2.FacebookÔ¼2.9ÍòÔ±¹¤µÄ¹¤×ÊÊý¾Ý±»µÁ
ƾ¾ÝÅí²©ÉçµÄ±¨Â·£¬ÉϸöÔ·¸×ï·Ö×Ó´ÓFacebookÒ»ÃûÔ±¹¤µÄÆû³µÖÐ͵ÇÔÁ˶à¸öÓ²ÅÌ£¬ÆäÖд洢ÁËÔ¼2.9ÍòÏÖÈκÍǰÈÎFacebook¹ÍÔ±µÄ¹¤×ÊÊý¾Ý¡£¸ÃÊÂÎñ²úÉúÔÚ11ÔÂ17ÈÕ£¬FacebookÔÚÈýÌìºóÒâʶµ½Êý¾Ýй¶£¬µ«Ö±µ½ÉÏÖÜÎå²ÅÆðͷ֪ͨÊÜÓ°ÏìµÄÔ±¹¤¡£±»µÁµÄÓ²ÅÌûÓмÓÃÜ£¬ÆäÖÐÔ̺¬µÄÔ±¹¤ÐÅÏ¢Ô̺¬ÒøÐÐÕ˺źÍÉç»á°²È«ÂëºóËÄλµÈ¡£¸ÃÊÂÎñûÓÐÓ°ÏìFacebookÓû§µÄÐÅÏ¢¡£³öÓÚÉóÉ÷˼¿¼£¬Facebook½²»°È˰µÊ¾½«ÎªÊÜÓ°ÏìµÄÔ±¹¤ÌṩÃâ·ÑµÄÉí·Ý͵ÇÔºÍÐÅÓþ¼à¿Ø·þÎñ¡£
ÔÎÄÁ´½Ó£º
https://thehill.com/policy/cybersecurity/474503-payroll-data-of-thousands-of-current-former-facebook-employees-stolen
3.ÄÏ·ÇConor¹«Ë¾Ð¹Â¶100¶àÍòÒÆ¶¯Óû§µÄä¯ÀÀ¼Í¼
vpnMentor·¢ÏÖÄÏ·ÇICT¹«Ë¾Conor SolutionsµÄÊý¾Ý¿â¿É¹«¿ª½Ó¼ûÇÒûÓмÓÃÜ£¬µ¼Ö³¬¹ý100ÍòÒÆ¶¯Óû§µÄ¸öÈËä¯ÀÀÊý¾ÝºÍÓ×ÎÒ¼ø±ðÐÅϢй¶¡£Êý¾Ý¿âÖÐÔ̺¬µÄÐÅÏ¢Ô̺¬Ë÷ÒýÃû³Æ¡¢MSISDN£¨ÊÖ»úºÅÂ룩¡¢IPµØÖ·¡¢Ïνӻò½Ó¼ûÍøÕ¾µÄ³ÖÐø¹¦·ò¡¢Ã¿¸ö»á»°´«ÊäµÄÊý¾ÝÁ¿¡¢½Ó¼û¹ýµÄÍøÕ¾µÄÆëÈ«URLµÈ¡£ÕâЩÊý¾Ýº¸ÇÁË·ÇÖÞºÍÄÏÃÀ¹ú¶È£¨Ô̺¬ÄÏ·Ç£©µÄ¶à¶àÒÆ¶¯ISP¿Í»§Êý¾Ý£¬Êý¾Ý×Ü´óÓ׳¬¹ý890GB£¬¼Í¼ÌõÊý³¬¹ý³¬¹ý100ÍòÌõ¡£vpnMentorÓÚ11ÔÂ12ÈÕ³õ´Î·¢ÏÖ¸ÃÊý¾Ý¿â£¬²¢ÏòConor»ã±¨Á˸ÃÎÊÌâ¡£ConorËæºó¹Ø¹ØÁ˽ӼûȨÏÞ£¬µ«Î´ÏòvpnMentorÌṩÉêÃ÷¡£
ÔÎÄÁ´½Ó£º
https://mybroadband.co.za/news/security/332188-private-browsing-history-of-south-african-mobile-users-exposed.html
4.½©Ê¬ÍøÂçMomentum DDoS¹¥»÷»î¶¯µÄ·ÖÎö»ã±¨
Ç÷Ïò¿Æ¼¼°ä²¼¹ØÓÚ½©Ê¬ÍøÂçMomentumй¥»÷»î¶¯µÄ·ÖÎö»ã±¨¡£MomentumÖØÒªÕë¶ÔLinuxÉ豸£¬¿É¹¥»÷¶àÖÖCPU¼Ü¹¹£¬ÀýÈçARM¡¢MIPS¡¢Ó¢Ìضû¡¢Ä¦ÍÐÂÞÀ68020µÈ¡£¸Ã¶ñÒâÈí¼þµÄÖØÒªÖ÷ÕÅÊǸéÖúóÃŲ¢½ÓÊܺÅÁîÏò¸ø¶¨Ö¸±êÌáÒéDoS¹¥»÷¡£Momentum·Ö·¢µÄºóÃÅÔ̺¬Mirai¡¢KaitenºÍBashlite±äÖÖ¡£×êÑÐÈËÔ±·ÖÎöµÄÌØ¶¨Ñù±¾ÖØÒª·Ö·¢MiraiºóÃÅ¡£´Ë±í£¬Momentumͨ¹ýÀûÓø÷Àà·ÓÉÆ÷ºÍWeb·þÎñÉϵķì϶À´´«²¼¡£
ÔÎÄÁ´½Ó£º
https://blog.trendmicro.com/trendlabs-security-intelligence/ddos-attacks-and-iot-exploits-new-activity-from-momentum-botnet/
5.Ê©Ä͵½¨¸´Modicon¼°EcoStruxureÖеĶà¸ö·ì϶

Ê©ÄÍµÂµçÆøÍ¨Öª¿Í»§³ÆÒѾΪijЩModicon½ÚÔìÆ÷ºÍ¼¸ÖÖEcoStruxure²úÆ·Öеķì϶ÌṩÁ˲¹¶¡¡£Æ¾¾ÝÊ©Ä͵µÄ˵·¨£¬Modicon M580¡¢M340¡¢QuantumºÍPremium½ÚÔìÆ÷Êܵ½Èý¸ö»Ø¾ø·þÎñ£¨DoS£©·ì϶£¨CVE-2019-6857¡¢CVE-2019-6856ºÍCVE-2018-7794£©µÄÓ°Ïì¡£ÕâÈý¸ö·ì϶¾ùÊÇÓÉ¡°¶ÔÒì³£Çé¿öµÄ²»ÕýÈ·²é³¡±µ¼Öµģ¬ÓµÓÐÍøÂç½Ó¼ûȨÏ޵Ĺ¥»÷ÕßÄܹ»Í¨¹ýModbus TCPÀûÓÃÕâЩ·ì϶¡£´Ë±í£¬Ê©ÄÍµÂµçÆø»¹½¨¸´ÁËÈý¿îEcoStruxure²úÆ·Öеݲȫ·ì϶£¬Ô̺¬Power SCADA OperationµçÔ´¼à¶½ºÍ½ÚÔìÈí¼þÖеĻº³åÇøÒç¶Âí½Å£¨CVE-2019-13537£©¡¢ClearSCADAÖеÄÎļþȨÏÞ²»ÕýÈ··ì϶ºÍEcoStruxure Control Expert±à³ÌÈí¼þÖеÄÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/schneider-electric-patches-vulnerabilities-modicon-ecostruxure-products
6.TP-Link½¨¸´²¿ÃÅArcher·ÓÉÆ÷ÖеÄÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶
TP-Link½¨¸´²¿ÃÅArcher·ÓÉÆ÷Öеݲȫ·ì϶£¨CVE-2019-7405£©£¬¸Ã·ì϶ʹµÃ¹¥»÷ÕßÄܹ»ÎÞÐèÖÎÀíÔ±ÃÜÂë¼´¿ÉÊÕÊÜÉ豸¡£¹¥»÷Õß¿Éͨ¹ý·¢ËÍ×Ö·û´®³¤¶È³¬¹ýÔÊÐíµÄ×Ö½ÚÊýµÄHTTPÒªÇó£¬Ê¹µÃÓû§ÃÜÂë±»´úÌæÎª¿ÕÖµ£¬´Ó¶ø»ñµÃ·ÓÉÆ÷µÄadminȨÏÞ¡£¸Ã¹¥»÷»¹»áʹºÏ·¨Óû§±»Ëø¶¨£¬²¢ÇÒÎÞ·¨Í¨¹ýÓû§½çÃæµÇ¼Web·þÎñ£¨ÃÜÂë±»Çå¿Õ¶øÓû§²¢²»ÖªÇ飩¡£ÊÜÓ°ÏìµÄ²úÆ·ÐͺÅÔ̺¬Archer C5 V4¡¢Archer MR200v4¡¢Archer MR6400v4ºÍArcher MR400v3·ÓÉÆ÷£¬½¨ÒéÓû§¾¡¿ì×°Öò¹¶¡¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/tp-link-router-bug-lets-attackers-login-without-passwords/


¾©¹«Íø°²±¸11010802024551ºÅ