VMware½¨¸´Fusion¡¢HorizonÖеÄÌáȨ·ì϶£»ºÚ¿ÍÒÔйڲ¡¶¾Îªµö¶ü´´½¨Êýǧ¸ö¶ñÒâÍøÕ¾
°ä²¼¹¦·ò 2020-03-191.Adobe°ä²¼´ø±í°²È«¸üУ¬½¨¸´41¸ö·ì϶
Adobe°ä²¼´ø±í°²È«¸üУ¬½¨¸´6ÖÖ²úÆ·ÖеÄ41¸ö·ì϶£¬ÆäÖÐÔ̺¬29¸öCritical·ì϶ºÍ11¸öimportant·ì϶¡£Adobe AcrobatºÍReaderÖн¨¸´ÁË13¸ö·ì϶£¬ÆäÖÐ9¸öΪCritical¼¶±ð£»Adobe Photoshop½¨¸´ÁË22¸ö·ì϶£¬ÆäÖÐÔ̺¬16¸öCritical·ì϶¡£ËùÓÐCritical·ì϶¶¼ÊÇÄÚ´æ°Ü»µÎÊÌ⣬¿ÉÄܻᵼÖÂËÁÒâ´úÂëÖ´ÐУ¬ColdFusionÖеÄÒ»¸öÑϳÁ·ì϶£¨CVE-2020-3761£©»¹»áµ¼Ö¹¥»÷Õß´Ó×°ÖÃĿ¼ÖжÁÈ¡ËÁÒâÎļþ¡£Õâ´Î¸üÐÂÖн¨¸´µÄ·ì϶¾ùδ¹«¿ªÅû¶»ò±»¿í·ºÀûÓá£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2020/03/adobe-software-update.html
2.VMware½¨¸´Fusion¡¢HorizonÖеÄÌáȨ·ì϶
VMware°ä²¼°²È«¸üУ¬½¨¸´Á½¸ö·ì϶£¬µÚÒ»¸ö·ì϶£¨CVE-2020-3950£©ÊÇÓÉÓÚ²»µ±Ê¹ÓÃsetuid¶þ½øÔìÎļþ¶øµ¼ÖµÄÌØÈ¨ÌáÉýÎÊÌ⣬ÆäCVSSÆÀ·ÖΪ7.3¡£³É¹¦ÀûÓô˷ì϶¿ÉÄÜ»áʹӵÓÐͨ³£Óû§ÌØÈ¨µÄ¹¥»÷Õß½«ÆäÌØÈ¨Éý¼¶µ½rootÓû§£¬ÊÜÓ°ÏìµÄ²úÆ·Ô̺¬Fusion¡¢VMRCºÍHorizon Client¡£µÚ¶þ¸ö·ì϶£¨CVE-2020-3951£©ÊÇÓÉCortado Thinprint£¨VMware WorkstationºÍWindows Horizon ClientʹÓõÄÐé¹¹´òÓ¡ÒýÇæ£©ÖеĶÑÒç³öÃýÎóÒýÆðµÄ£¬ÓµÓÐÐé¹¹»ú·ÇÖÎÀíԱȨÏ޵Ĺ¥»÷Õß¿ÉÄܻᵼÖ»ؾø·þÎñ¡£Ä¬ÈÏÇé¿öÏÂÐé¹¹´òӡδÔÚWorkstationÉÏÆôÓ㬵«ÔÚHorizon ClientÉÏÆôÓ᣸÷ì϶µÄCVSSµÃ·ÖΪ3.2¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/vmware-patches-privilege-escalation-vulnerability-in-workstation-fusion-horizon/
3.˼¿Æ½¨¸´ÆäSD-WAN½â¾ö¹æ»®ÖеÄ5¸ö·ì϶
3ÔÂ18ºÅ˼¿Æ°ä²¼°²È«²¼¸æ£¬½¨¸´ÁËÆäSD-WAN½â¾ö¹æ»®ÖеÄÎå¸ö·ì϶£¬ÆäÖÐÔ̺¬Èý¸öÑϳÁ·ì϶¡£ÕâЩ·ì϶¶¼ÊÇÓÉÊäÈëÑéÖ¤²»¼°ÒýÆðµÄ£¬¿Éµ¼Ö¹¥»÷Õß¶Ôϵͳ½øÐÐδ¾ÊÚȨµÄ¸ü¸Ä¡¢Ê¹ÓÃrootȨÏÞÖ´ÐÐËÁÒâºÅÁî¡¢½«ÌØÈ¨ÌáÉýΪrootµÈ¡£Èý¸öÑϳÁ·ì϶ΪCVE-2020-3265¡¢CVE-2020-3266¡¢CVE-2020-3264£¬¾¹ý±¾µØÉí·ÝÑéÖ¤µÄ¹¥»÷Õß¿Éͨ¹ýÏòÖ¸±êϵͳ·¢ËͶñÒâÒªÇóÀ´ÀûÓÃÕâЩ·ì϶£¬ÊÜÓ°ÏìµÄSD-WAN°æ±¾Îª19.2.2֮ǰµÄ°æ±¾¡£Áí±íÁ½¸ö·ì϶Ϊ´æ´¢ÐÍXSS£¨CVE-2019-16010£©ºÍSQL×¢Èë·ì϶£¨CVE-2019-16012£©¡£¸Ã¹«Ë¾Ã»Óз¢ÏÖÕâЩ·ì϶ÔÚÒ°±í±»ÀûÓá£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/99954/security/cisco-sd-wan-product-flaws.html
4.ºÚ¿ÍÒÔйڲ¡¶¾Îªµö¶ü´´½¨Êýǧ¸ö¶ñÒâÍøÕ¾
ƾ¾ÝCheck PointµÄ×êÑУ¬ºÚ¿ÍÔÚ»ý¼«ÀûÓÃCOVID-19ÒßÇé½øÐжñÒâ»î¶¯£¬Ô̺¬×¢²áÓëCOVID-19ÓйصĶñÒâÓòÃû¡¢´òÕÛÏúÊÛ¶ñÒâÈí¼þµÈ¡£×Ô1Ô³õÒÔÀ´£¬ÒÑ×¢²áµÄÓëйڲ¡¶¾ÓйصĶñÒâÓòÃûÊýÁ¿³ÊÉÏÉýÇ÷Ïò¡£×êÑÐÈËÔ±³Æ2Ôµ×ÒÔÀ´ÐÂ×¢²áÓòÃûµÄ¾ùÔÈÊýÁ¿ÏÕЩÊÇǰ¼¸ÖܵÄ10±¶£¬ÆäÖÐ0.8%ÊǶñÒâµÄ£¨93¸öÍøÕ¾£©£¬»¹ÓÐ19£¥ÊÇ¿ÉÒɵ썳¬¹ý2200¸öÍøÕ¾£©¡£ºÚ¿Í×éÖ¯SSHacker»¹ÀûÓÃCOVID-19×÷Ϊ´ÙÏú´úÂ룬ΪÈëÇÖFacebookÕË»§Ìṩ15£¥µÄÕÛ¿Û¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2020/03/covid-19-coronavirus-hacker-malware.html
5.RiskSense°ä²¼Ö÷Á÷webºÍÀûÓÿò¼Ü·ì϶µÄ·ÖÎö»ã±¨
ƾ¾ÝRiskSense±¾Öܰ䲼µÄÒ»·Ý»ã±¨£¬WordPressºÍApache StrutsÊǽüÊ®ÄêÀ´Ôâ·ê¹¥»÷×î¶àµÄWeb¼¼Êõ¡£¸Ã»ã±¨×êÑÐÁË2010ÄêÖÁ2019ÄêÖ®¼äËùÓÐÅû¶µÄ·ì϶£¬ÔÚÒ°±í±»±øÆ÷»¯ºÍÀûÓõÄËùÓа²È«·ì϶ÖÐÔ¼ÓÐ55£¥ÊÇÕë¶ÔWordPressºÍApache StrutsµÄ¡£DrupalÄÚÈÝÖÎÀíϵͳÅÅÃûµÚÈý£¬Æä´ÎÊÇRuby on RailsºÍLaravel¡£¾Í±à³Ì˵»°¶øÑÔ£¬PHPºÍJavaÀûÓ÷¨Ê½Öеķì϶ÔÚ´ÓǰʮÄêÖб»ÀûÓÃ×î¶à£¬ÖÁÉÙµÄÊÇJavaScriptºÍPython£¬µ«RiskSenseÔ¤¼ÆÕâÖÖÇé¿ö½«ÔÚ½«À´¼¸ÄêÄÚŤת¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/wordpress-and-apache-struts-account-for-55-of-all-weaponized-vulnerabilities/
6.TrickBotÐÂÄ£¿éÀûÓÃPC±©Á¦ÆÆ½âRDP·þÎñÆ÷
BitdefenderÔÚÒ°±í·¢ÏÖTrickBotÒøÐÐľÂíµÄÐÂÄ£¿é£¬¸ÃÄ£¿éʹ¹¥»÷Õß¿ÉÄÜÀûÓÃÊÜϰȾµÄϵͳÕë¶Ô¶³öÔÚInternetµÄRDP·þÎñÆ÷ÌáÒ鱩Á¦ÆÆ½â¹¥»÷¡£¸ÃÄ£¿éÓÚ1ÔÂ30ÈÕ±»·¢ÏÖ£¬ÃûΪ¡°rdpScanDll¡±£¬¾Ý³ÆÈÔÔÚ¿ª·¢ÖС£¾Ý×êÑÐÈËÔ±³Æ¸ÃÄ£¿éµ½Ä¿Ç°ÎªÖ¹Òѳ¢ÊÔ¹¥»÷ÃÀ¹úºÍÏã¸ÛµçÐÅ¡¢½ÌÓýºÍ½ðÈÚÁìÓòÆóÒµÖеÄ6013¸öRDP·þÎñÆ÷¡£´Ë±í£¬×êÑÐÈËÔ±¿ÉÄܼø±ð³öÖÁÉÙ3460¸ö³äÈÎC2·þÎñÆ÷µÄIPµØÖ·£¬ÆäÖÐÔ̺¬556¸öרÃÅÓÃÓÚÏÂÔØÐ²å¼þµÄ·þÎñÆ÷ºÍ22¸öͬʱ³äµ¹ØâÁ½¸ö½ÇÉ«µÄIP¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2020/03/trickbot-malware-rdp-bruteforce.html


¾©¹«Íø°²±¸11010802024551ºÅ