²©Í¨Wi-FiоƬKr??k¼ÓÃÜ·ì϶£¬Ó°Ï쳬¹ýÊ®ÒŲ́É豸£»Ó¢¹ú½ðÈÚ¼à¹Ü»ú¹¹ÈÏ¿Éй¶Ïû·ÑÕßÒþÖÔÐÅÏ¢

°ä²¼¹¦·ò 2020-02-27

1.²©Í¨Wi-FiоƬKr??k¼ÓÃÜ·ì϶£¬Ó°Ï쳬¹ýÊ®ÒŲ́É豸


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ESET×êÑÐÈËÔ±ÔÚBroadcom£¨²©Í¨£©ºÍCypressµÄWi-FiоƬÖз¢ÏÖзì϶Kr??k£¬¸Ã·ì϶£¨CVE-2019-15126£©¿Éµ¼ÖÂÒ×Êܹ¥»÷µÄÉ豸ʹÓÃÈ«Áã¼ÓÃÜÃÜÔ¿À´¼ÓÃÜÓû§µÄ²¿ÃÅͨѶÐÅÏ¢¡£Ôڳɹ¦µÄ¹¥»÷ÖУ¬¹¥»÷ÕßÄܹ»½âÃÜÓÉÒ×Êܹ¥»÷µÄÉ豸´«ÊäµÄijЩÎÞÏßÍøÂçÊý¾Ý°ü¡£¸Ã·ì϶ӰÏìµÄÉ豸Ô̺¬ÑÇÂíÑ·£¨Echo¡¢Kindle£©¡¢Æ»¹û£¨iPhone¡¢iPad¡¢MacBook£©¡¢¹È¸è£¨Nexus£©¡¢ÈýÐÇ£¨Galaxy£©¡¢Ê÷Ý®ÅÉ£¨Pi 3£©¡¢Ó×Ã×£¨RedMi£©µÄijЩ¿Í»§¶ËÉ豸ÒÔ¼°»ªË¶ºÍ»ªÎªµÄijЩAPºÍ·ÓÉÆ÷É豸£¬ÊؾɹÀ¼ÆÓг¬¹ýÊ®ÒÚÉ豸ÊÜÓ°Ïì¡£CypressÒѾ­Ïò¹©¸øḚ́䲼Á˹̼þ½¨¸´·¨Ê½£¬Óû§¿Éͨ¹ýÆäÉ豸Ôì×÷ÉÌ»ñÈ¡ÏàÓ¦¸üС£×êÑÐÈËԱûÓÐÔÚ¸ßͨ¡¢Realtek¡¢RalinkºÍMediatekµÄWiFiоƬÖз¢Ïָ÷ì϶¡£


Ô­ÎÄÁ´½Ó£º

https://www.welivesecurity.com/2020/02/26/krook-serious-vulnerability-affected-encryption-billion-wifi-devices/


2.Exchange ServerÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2020-0688£©


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ZDIÅû¶΢ÈíExchange ServerÖÐÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2020-0688£©µÄ¼¼Êõϸ½Ú¡£Î¢Èí×î³õ³Æ¸Ã·ì϶ÊÇÓÉÄÚ´æ°Ü»µµ¼ÖµÄ£¬µ«ºóÀ´½«ÃèÊö½¨¸ÄΪ¸Ã·ì϶ÊÇÓÉExchange ServerÔÚ×°ÖÃʱδÄÜÕýÈ·´´½¨Î¨Ò»µÄ¼ÓÃÜÃÜÔ¿µ¼ÖµÄ¡£¸Ã·ì϶´æÔÚÓÚExchange½ÚÔìÃæ°å£¨ECP£©×é¼þÖУ¬ÓÉÓÚʹÓÃÁ˾²Ì¬ÃÜÔ¿£¬¾­¹ýÉí·ÝÑéÖ¤µÄ¹¥»÷ÕßÄܹ»ÓÕʹ·þÎñÆ÷·´ÐòÁл¯¶ñÒâÔì×÷µÄViewStateÊý¾Ý£¬´Ó¶øÔÚ·þÎñÆ÷ÉÏECPÀûÓã¨SYSTEMȨÏÞ£©µÄ¸ßµÍÎÄÖÐÖ´ÐÐËÁÒâ.NET´úÂë¡£


Ô­ÎÄÁ´½Ó£º

https://www.zerodayinitiative.com/blog/2020/2/24/cve-2020-0688-remote-code-execution-on-microsoft-exchange-server-through-fixed-cryptographic-keys


3.Verizon°ä²¼2020ÄêÒÆ¶¯°²È«Ö¸Êý»ã±¨


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾ÝVerizonµÄ2020ÄêÒÆ¶¯°²È«Ö¸Êý»ã±¨£¬2019ÄêÈ«ÇòÓÐÎå·ÖÖ®¶þ£¨39£¥£©µÄÆóÒµÔÚÒÆ¶¯°²È«·½ÃæÔâ·ê³Á´óÇÖº¦£¬ÆäÖкܶàÊÇͨ¹ýIoTÉ豸½øÐеÄ¡£¸Ã»ã±¨Ö¸³öÔâ·êÇÖº¦£¨³É¹¦µÄ¹¥»÷µ¼Ö¡°ÏµÍ³·ÀÓùʧЧ¡±£©µÄÆóÒµËùÕ¼°Ù·Ö±È´Ó2018ÄêµÄ27£¥ÉÏÉý£¬¹¥»÷µÄÖØÒªÁ˾ÖÔ̺¬Í£»ú£¨59£¥£©¡¢Êý¾ÝÃÔʧ£¨56£¥£©ºÍÆäËûÉ豸Êܵ½ÇÖº¦£¨46£¥£©¡£ÔÚÆäËü·½Ã棬²»°²È«µÄWi-FiÈȵãÒÀÈ»ÊÇÍøÂ簲ȫ·çÏÕµÄÖØÒªÆðÔ´£¨20£¥£©¡£ÍøÂç´¹µöÒ²ÊÇÒ»¸öÖØÒªÍþв£¬µ«ÔÚÒÆ¶¯É豸ÉÏÖ»ÓÐÒ»Óײ¿ÃÅ£¨15£¥£©µÄ¹¥»÷ÊÇͨ¹ýµç×ÓÓʼþ·¢Ë͵Ä£¬¸ü¶à£¨85£¥£©µÄ´¹µö¹¥»÷ÔòÊÇͨ¹ý̸Ìì¡¢³ö²úÁ¦¹¤¾ß¡¢ÓÎÏ·µÅצÓòúÉúµÄ¡£


Ô­ÎÄÁ´½Ó£º

https://enterprise.verizon.com/resources/reports/mobile-security-index/


4.Ç÷Ïò¿Æ¼¼°ä²¼2019Äê¶È°²È«×ÛÊö»ã±¨


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾ÝÇ÷Ïò¿Æ¼¼°ä²¼µÄ2019Äê¶È°²È«×ÛÊö»ã±¨£¬¸Ã¹«Ë¾ÔÚ2019Äê×èÖ¹Á˳¬¹ý520ÒÚ´Î·ÖÆçµÄÍøÂçÍþв£¬ÆäÖÐÓÐ6100Íò´ÎÓëÀÕË÷Èí¼þ¹¥»÷ÓйØ¡£µç×ÓÓʼþÒÀÈ»ÊÇ×îÊÜÓ­½ÓµÄÍþвý½é£¬Õ¼ËùÓÐÍþвµÄ91£¥¡£2019ÄêÇ÷Ïò¿Æ¼¼¼ì²âµ½µÄµç×ÓÓʼþÍþв±È2018ÄêÔö³¤ÁË15£¥£¬ÆäÖÐBEC¹¥»÷µÄ¼ì²âÊýÁ¿Ôö³¤ÁË5£¥¡£Ö»¹ÜÐÂÀÕË÷Èí¼þ¼Ò×åµÄÊýÁ¿Í¬±È½µÂäÁË55£¥£¬µ«¼ì²âµ½Ð±äÖÖµÄ×ÜÌåÊýÁ¿È´Ôö³¤ÁË10£¥¡£2019Äê¶ñÒâAndroidÀûÓ÷¨Ê½Ôö³¤ÁË6£¥£¬´ïµ½½ü3200Íò£¬ÆäÖк±¼û°ÙÍòµÄÏÂÔØÀ´×Ô¹Ù·½PlayÉ̵ê¡£


Ô­ÎÄÁ´½Ó£º

https://documents.trendmicro.com/assets/rpt/rpt-the-sprawling-reach-of-complex-threats.pdf


5.Ó¢¹ú½ðÈÚ¼à¹Ü»ú¹¹ÈÏ¿Éй¶Ïû·ÑÕßÒþÖÔÐÅÏ¢


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÖܶþÓ¢¹ú½ðÈÚÐÐΪ¼à¹Ü¾Ö£¨FCA£©ÈϿɲúÉúÊý¾Ýй¶ÊÂÎñ£¬Ëü°µÊ¾ÃýÎ󵨰䲼ÁËÔ¼1600ÃûÏò¼à¹Ü»ú¹¹ÌύͶËßµÄÏû·ÑÕßÒþÖÔÐÅÏ¢¡£FCA³Æ£¬ÆäÍøÕ¾ÃýÎóµØÔÊÐí½Ó¼ûÕ߲鿴ͶËßÕßµÄÐÕÃû¡¢µØÖ·ºÍµç»°ºÅÂ룬ÒÔ¼°ËûÃÇÔÚ½ØÖÁ2019Äê7ÔµÄ18¸öÔÂÖÐËùͶËߵľßÌåÐÅÏ¢¡£ÕâЩÊý¾ÝÓÚÈ¥Äê11ÔÂÖÁ±¾ÔÂÖ®¼ä¿É¹«¿ª½Ó¼û£¬µ«FCA²¹³ä³ÆÃ»ÓÐÏû·ÑÕߵIJÆÕþÐÅϢй¶¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/uk-financial-regulator-admits-data-breach


6.ÈýÐÇÓ¢¹ú¹ÙÍøÐ¹Â¶Ó×ÎÒÊý¾Ý£¬»òÒò¡°¼¼ÊõÃýÎó¡±


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÈýÐǰ䷢ÒòÓ¢¹ú¹ÙÍø£¨http://samsung.com/UK£©ÉϳöÏÖ¡°¼¼ÊõÃýÎó¡±£¬µ¼ÖÂÔ¼150ÃûÓû§µÄÓ×ÎÒÐÅϢй¶£¬µ«Ã»ÓÐй©ÐÅÏ¢±»±íйÓж೤¹¦·ò¡£¾ÝÃÀÁªÉ籨·£¬Ð¹Â¶µÄÐÅÏ¢Ô̺¬Óû§µÄÐÕÃû¡¢µç»°ºÅÂë¡¢µØÖ·¡¢µç×ÓÓʼþµØÖ·ºÍ¹ýÍùµÄ¶©µ¥×ÊÁÏ£¬µ«²»Éæ¼°ÐÅÓþ¿¨ÐÅÏ¢¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/98501/data-breach/samsung-data-leak.html