¿ªÔ´Â·ÓÉÆ÷OPENWRT/LEDE RCE·ì϶£¨CVE-2020-7982£©£»libmicrodns¿â¶à¸öRCEºÍDoS·ì϶
°ä²¼¹¦·ò 2020-03-261.¿ªÔ´Â·ÓÉÆ÷¿¯ÐаæOPENWRT/LEDE RCE·ì϶£¨CVE-2020-7982£©
×êÑÐÈËÔ±Åû¶¿ªÔ´Â·ÓÉÆ÷¿¯ÐаæOPENWRT/LEDEÖеĹؼüRCE·ì϶£¨CVE-2020-7982£©µÄ¼¼Êõϸ½ÚºÍPoC¡£¸Ã·ì϶´æÔÚÓÚOpenWrtµÄOPKGÈí¼þ°üÖÎÀíÆ÷ÖУ¬OPKG¶ÔÏÂÔØµÄÈí¼þ°üÖ´ÐÐÆëÈ«ÐÔ²é³Ê±£¬ÈôÊÇSHA-256УÑéºÍÔ̺¬ÈκÎǰµ¼¿Õ¸ñ£¬OPKG»áÌø¹ýÆëÈ«ÐԲ鳳ÖÐøÖ´ÐÐ×°Öù¤×÷¡£¸Ã·ì϶¿ÉÄÜʹԶ³ÌMitM¹¥»÷Õß¿ÉÄÜÓÕÆÏµÍ³×°ÖÃδ¾ÑéÖ¤µÄ¶ñÒâÈí¼þ°ü»òÈí¼þ¸üУ¬´Ó¶øÀ¹½ØÖ¸±êÉ豸µÄͨѶºÍÖ´ÐÐËÁÒâ´úÂë¡£OpenWrt°æ±¾18.06.0ÖÁ18.06.6ºÍ19.07.0ÒÔ¼°LEDE 17.01.0ÖÁ17.01.7¾ùÊܵ½Ó°Ïì¡£½¨ÒéÊÜÓ°ÏìµÄÓû§½«ÆäÉ豸¹Ì¼þÉý¼¶µ½×îÐÂOpenWrt°æ±¾18.06.7ºÍ19.07.1¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2020/03/openwrt-rce-vulnerability.html
2.Adobe´ø±í°²È«¸üУ¬½¨¸´Creative CloudÖеÄËÁÒâÎļþɾ³ý·ì϶
Adobe°ä²¼´ø±í°²È«¸üУ¬½¨¸´Windows°æCreative Cloud×ÀÃæÀûÓ÷¨Ê½ÖеÄÒ»¸öÑϳÁ·ì϶¡£¸Ã·ì϶£¨CVE-2020-3808£©Ô´×ÔTOCTOU¾ºÕùǰÌᣬ¿ÉÔÊÐí¹¥»÷Õßɾ³ýÖ¸±êϵͳÉϵÄËÁÒâÎļþ¡£µ«Adobe²¢Î´ÌṩÓйع¥»÷µÄ¸ü¶à¾ßÌåÐÅÏ¢£¬ÀýÈç¹¥»÷ÕßÊÇ·ñ±ØÒªÔÚ±¾µØ»¹ÊÇ¿ÉÔ¶³ÌÀûÓ㬻òÕßÊÇ·ñ±ØÒªÉí·ÝÑéÖ¤¡£Adobe½¨ÒéÓû§ÒÀÕÕ°²È«²¼¸æÖеÄ×¢Ã÷½«Æä²úÆ·¸üе½×îа汾¡£ÕâÊÇÈýÔ·ÝAdobe°ä²¼µÄµÚ¶þ¸ö´ø±í¸üС£
ÔÎÄÁ´½Ó£º
https://threatpost.com/critical-adobe-flaw-out-of-band-security-update/154075/
3.˼¿ÆTalosÅû¶libmicrodns¿âÖеĶà¸öRCEºÍDoS·ì϶
˼¿ÆTalosµÄ°²È«×êÑÐÈËÔ±Åû¶VideolabsµÄlibmicrodns¿âÖеĶà¸öDoSºÍ´úÂëÖ´Ðзì϶¡£VideolabsÓÉVideoLAN³ÉÔ±µÞÔ죬ÊÇVLCÒÆ¶¯ÀûÓ÷¨Ê½È·µ±Ç°±à×ëÕߣ¬Ò²ÊÇVLCýÌå²¥·ÅÆ÷µÄ³ÁÒª¹±Ï×Õß¡£libmicrodnsÊÇ¿çÆ½Ì¨µÄmDNS½âÎöÆ÷¿â£¬ÔÚVLCýÌå²¥·ÅÆ÷ÖÐÓÃÓÚmDNS·þÎñ·¢ÏÖ¡£×îÑϳÁµÄÒ»¸ö·ì϶ÊÇÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2020-6072£©£¬ÆäCVSS·ÖÊýΪ9.8¡£ÆäÓà·ì϶µÄCVSSÆÀ·Ö¾ùΪ7.5£¬µ«ËüÃÇÓ°ÏìÁË¿âÖÐµÄ·ÖÆç×é¼þ£¬Ô̺¬×ÊÔ´¼Í¼½âÎöÖ°ÄÜÖеÄDoS·ì϶£¨CVE-2020-6071£©¡¢TXT¼Í¼½âÎöÖ°ÄÜÖеÄDoS·ì϶£¨CVE-2020-6073£©¡¢ÐÂÎŽâÎöÖ°ÄÜÖеÄDoS·ì϶£¨CVE-2020-6077£©µÈ¡£ÕâЩ·ì϶ӰÏìÁËlibmicrodns¿â°æ±¾0.1.0£¬¹©¸øÉÌÓÚ3ÔÂ20ÈÕ°ä²¼Á˽¨¸´°æ±¾0.1.1¡£
ÔÎÄÁ´½Ó£º
https://blog.talosintelligence.com/2020/03/vuln-spotlight-videolabs-microdns.html
4.FireEye°ä²¼APT41¹¥»÷»î¶¯»ã±¨£¬ÀûÓöàÖÖ·ì϶ÈëÇÖÈ«ÇòÆóÒµ
ÔÚ1ÔÂ20ÈÕÖÁ3ÔÂ11ÈÕÖ®¼ä£¬FireEye¹Û²ìµ½APT41ÊÔIJÀûÓÃCitrix NetScaler/ADC¡¢Cisco·ÓÉÆ÷ºÍZoho ManageEngine Desktop CentralÖеķì϶¹¥»÷³¬¹ý75¸ö¿Í»§¡£ÆäÖ¸±êÐÐÒµÔ̺¬ÒøÐÐ/½ðÈÚ¡¢¹¹Öþ¡¢¹ú·À¹¤Òµ»ùµØ¡¢µ±¾Ö¡¢Ò½ÁÆ¡¢¸ß¿Æ¼¼¡¢¸ßµµ½ÌÓý¡¢Ë¾·¨¡¢Ôì×÷Òµ¡¢Ã½Ìå¡¢·ÇͶ»ú¡¢Ê¯ÓͺÍÌìÈ»Æø¡¢Ê¯»¯¡¢ÔìÒ©¡¢·¿µØ²ú¡¢µçÐÅ¡¢ÔËÊä¡¢ÓÎÀÀºÍ¹«ÓÃÊÂÒµ¡£Ö¸±ê¹ú¶ÈÔ̺¬°Ä´óÀûÑÇ¡¢¼ÓÄô󡢵¤Âó¡¢·ÒÀ¼¡¢·¨¹ú¡¢Ó¡¶È¡¢Òâ´óÀû¡¢ÈÕ±¾¡¢ÂíÀ´Î÷ÑÇ¡¢Ä«Î÷¸ç¡¢·ÆÂɱö¡¢²¨À¼¡¢¿¨Ëþ¶û¡¢É³Ìذ¢À²®¡¢ÐÂ¼ÓÆÂ¡¢Èðµä¡¢ÈðÊ¿¡¢°¢ÁªÇõ¡¢Ó¢¹úºÍÃÀ¹ú¡£Ä¿Ç°Éв»Ã÷ÏÔAPT41ÊÇɨÃ軥ÁªÍø²¢ÊÔͼÌáÒé´ó¹æÄ£¹¥»÷»î¶¯»¹ÊǽöÕë¶ÔÌØ¶¨×éÖ¯µÄ×Ó¼¯£¬µ«¿´ÆðÀ´¸üÏñÊÇÕë¶ÔÐÔ¹¥»÷¡£
ÔÎÄÁ´½Ó£º
https://www.fireeye.com/blog/threat-research/2020/03/apt41-initiates-global-intrusion-campaign-using-multiple-exploits.html
5.TrickBotÍÅ»ïÀûÓöñÒâAPP TrickMoÈÆ¹ýÒøÐÐË«³É·ÖÈÏÖ¤
IBM X-Force×êÑÐÈËÔ±·¢ÏÖTrickBotÍÅ»ïÔÚʹÓöñÒâAPP TrickMoÈÆ¹ýÒøÐеÄË«³É·ÖÉí·ÝÑéÖ¤£¨2FA£©±£»¤¡£ÔÚÊܺ¦Õß½«TrickMo×°Öõ½ËûÃǵÄAndroidÉ豸ÉÏÖ®ºó£¬¸ÃAPPÄܹ»À¹½Ø¸÷ÀàÂòÂôÑéÖ¤Â루TAN£©£¬Ô̺¬Ò»´ÎÐÔÑéÖ¤Â루OTP£©¡¢Òƶ¯TAN£¨mTAN£©ºÍpushTANÑéÖ¤Â룬²¢×ª·¢¸øTrickBot¹¥»÷Õߣ¬ºóÕßËæºóÄܹ»ÀûÓÃËüÃǽøÐÐÚ²ÆÐÔÂòÂô¡£×êÑÐÈËÔ±Ú¹ÊÍ£¬TrickMoÖ¼ÔÚÍ»ÆÆ×îеÄOTP²½Ö裬ÓÈÆäÊÇÍ»ÆÆµÂ¹úʱʱʹÓõÄTANÑéÖ¤Âë¡£³ý´ËÖ®±í£¬TrickMoµÄÖØÒªÖ°ÄÜ»¹Ô̺¬ÇÔÈ¡Ó×ÎÒÉ豸ÐÅÏ¢¡¢À¹½ØSMSÐÂÎÅ¡¢Ëø¶¨ÊÖ»ú¡¢ÇÔÈ¡É豸ÖеÄͼƬºÍ×Ô»Ù/ɾ³ý»úÔì¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/trickbot-bypasses-online-banking-2fa-protection-via-mobile-app/
6.ÃÀ¹úÌØ°Ù»Ý¹ÙÍøÔâºÚ¿ÍÈëÇÖ²¢Ï°È¾Magecart¾ç±¾
ºÚ¿Í¹¥»÷ÁËÃÀ¹úÌØ°Ù»Ý¹«Ë¾£¨Tupperware£©µÄ¹ÙÍø£¬²¢Ö²ÈëÁËÓÃÓÚÇÔÈ¡¿Í»§ÐÅÓþ¿¨ÐÅÏ¢µÄ¶ñÒâ¾ç±¾£¨±»³ÆÎªskimmer»òMagecart£©¡£Æ¾¾ÝMalwarebytesµÄÒ»·Ý»ã±¨£¬¸Ã¶ñÒâ´úÂëÒѾÔÚTupperwareÖ÷Ò³ÉÏÔËÐÐÁËÖÁÉÙÎåÌ졣ĿǰTupperwareÒѾ´ÓÆä·þÎñÆ÷ÉÑþ³ØýÁ˶ñÒâ¾ç±¾£¬µ«ÉÐδ°ä²¼ÕýʽµÄ»ØÓ¦»òÉêÃ÷¡£Malwarebytes°µÊ¾¸Ã¶ñÒâ´úÂëÔÚÿ´ÎÓû§¸¶¿îʱ´´½¨Ò»¸öƯ¸¡µÄiframe£¬²¢ÏÔʾһ¸ö·ÂÕÕVISA CyberSource¸¶¿î´ó¾ÖµÄ±íµ¥£¬¸Ã±íµ¥»áÍøÂçÓû§ÊäÈëµÄÊý¾Ý£¬ÀýÈçÐÕÃû¡¢Õ˵¥µØÖ·¡¢µç»°ºÅÂë¡¢ÐÅÓþ¿¨ºÅÂë¡¢µ½ÆÚÈÕÆÚºÍCVVÂ룬¶øºó½«Æä·¢Ë͵½Ô¶³Ì·þÎñÆ÷¡£TupperwareµÄ±¾µØ»¯Ò³ÃæÒ²Ï°È¾Á˸þ籾£¬µ«ºÜÈÝÒ×¼ø±ð³öÀ´£¬ÓÉÓÚ±¾µØÒ³ÃæÏÔʾµÄ¶¼ÊDZ¾µØËµ»°£¬¶ø¶ñÒâ±íµ¥ÊÇÓ¢Óï¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/tupperware-website-hacked-and-infected-with-payment-card-skimmer/


¾©¹«Íø°²±¸11010802024551ºÅ