GRUB2Öзì϶BootHoleÓ°ÏìÊýÊ®ÒÚÉ豸£»×êÑÐÈËÔ±Åû¶TorÖÐÁ½¸ö0day²¢´òËã°ä²¼Áí±íÈý¸ö
°ä²¼¹¦·ò 2020-07-311.GRUB2Öзì϶BootHoleÓ°ÏìÊýÊ®ÒÚWindowsºÍLinuxÉ豸
Eclypsium×êÑÐÈËÔ±ÔÚÎÞÊýLinuxϵͳʹÓõÄGRUB2Êèµ¼·¨Ê½Öз¢ÏÖÁËÒ»¸ö·ì϶£¬²¢½«Æä¶¨ÃûΪ¡°BootHole¡±£¨CVE-2020-10713£©£¬¼´±ãÆôÓÃÁËSecure Boot£¬¹¥»÷ÕßÒ²¿ÉÔÚÆô¶¯¹ý³ÌÖÐÖ´ÐÐËÁÒâ´úÂ룬»¹Äܹ»ÀûÓø÷ì϶װÖÃÓÆ¾ÃÇÒÒñ±ÎµÄbootkit»ò¶ñÒâÊèµ¼·¨Ê½À´½ÚÔìÉ豸¡£´Ë±íGRUB2»¹Ö§³ÔìäËü²Ù×÷ϵͳ¡¢Äں˺ÍÖÎÀí·¨Ê½£¬ÀýÈ磬Xen¡£¸Ã·ì϶»¹Éæ¼°µ½ËùÓÐʹÓó߶ÈMicrosoft Third Party UEFI Certificate AuthorityµÄSecure BootµÄWindowsÉ豸£¬ÀýÈ繤ҵ¡¢Ò½ÁÆ¡¢½ðÈÚµÈÐÐÒµÖÐʹÓõÄÉ豸¾ùÊÜÓ°Ï졣Ŀǰ£¬¸Ã·ì϶ӰÏìÁËÊýÊ®ÒÚʹÓÃSecure BootµÄWindowsºÍLinuxÉ豸¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/billions-of-devices-impacted-secure-boot-bypass/157843/
2.×êÑÐÈËÔ±Åû¶TorÖеÄÁ½¸ö0day²¢´òËã°ä²¼Áí±íÈý¸ö·ì϶
°²È«×êÑÐÈËÔ±Neal KrawetzÔÚ´ÓǰһÖÜÄÚÅú¶ÁËÁ½¸öTorÖеÄ0day£¬²¢³ÐŵÖÁÉÙÔÙ°ä²¼Èý¸öTor 0day£¬ÆäÖÐÒ»¸öÄܹ»½ÒʾTor·þÎñÆ÷ÕæÊµIPµØÖ·¡£Õâ´ÎÅû¶µÄ·ì϶ÖУ¬µÚÒ»¸ö¿É±»ÀûÓÃͨ¹ýɨÃèÍøÂçÏνӣ¬Ñ°ÕÒTor¶ÀÓеÄÊý¾Ý°üÊðÃûÀ´×èÖ¹Óû§Ïνӵ½TorÍøÂ磬¸ÃÊý¾Ý°ü¿ÉÓÃÀ´×èÖ¹TorÏÎ½ÓµÄÆô¶¯²¢ÓÐЧµØÆëÈ«½ûÓÃTor¡£ÏñµÚÒ»¸ö0dayÒ»Ñù£¬µÚ¶þ¸öÒ²ÔÊÐíÍøÂçÔËÓªÉ̼ì²âTorÁ÷Á¿£¬µ«Ëü¿ÉÓÃÓÚ¼ì²â¼ä½ÓÏνӡ£Krawetz²©Ê¿°µÊ¾£¬Ê¹Óøú×ÙÌØ¶¨TCPÊý¾Ý°üµÄ¼¼Êõ£¬Ò²Äܹ»ÇáËɼì²âµ½TorÇŵÄÏνӡ£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/106567/hacking/tor-zero-day-flaws.html?utm_source=rss&utm_medium=rss&utm_campaign=tor-zero-day-flaws
3.˼¿Æ°ä²¼°²È«¸üУ¬½¨¸´¶à¿î²úÆ·ÖеÄ11¸ö°²È«·ì϶
˼¿Æ°ä²¼°²È«¸üУ¬×ܼƽ¨¸´¶à¿î²úÆ·ÖеÄ11¸ö°²È«·ì϶¡£ÆäÖÐÓÐÈý¸ö½ÏΪÑϳÁµÄ·ì϶£¬µÚÒ»¸öΪDCNM REST APIÖеÄÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶£¨CVE-2020-3382£©£¬CVSSÆÀ·ÖΪ9.8£¬ÓµÓÐÖÎÀíȨÏ޵Ĺ¥»÷Õß¿ÉÔ¶³ÌÖ´ÐÐËÁÒâ²Ù×÷£»µÚ¶þ¸öΪSD-WAN vManageÈí¼þÖеÄÊÚÈ¨ÈÆ¹ý·ì϶£¨CVE-2020-3374£©£¬CVSSÆÀ·ÖΪ9.9£¬ÆäÔÊÐí¾¹ýÉí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÈÆ¹ýÊÚȨ£¬½Ó¼ûÃô¸ÐÐÅÏ¢²¢Åú¸ÄϵͳÅäÖ㻵ÚÈý¸öΪSD-WAN½â¾ö¹æ»®Èí¼þÖеĻº³åÇøÒç¶Âí½Å(CVE-2020-3375),ÓÉÓÚÊäÈëÑéÖ¤²»¼°µ¼Ö£¬ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß½Ó¼ûÐÅÏ¢£¬²¢¶ÔËûÃÇûÓÐȨÏÞµÄϵͳ½øÐиü¸Ä¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/cisco-fixes-severe-flaws-in-data-center-management-solution/
4.Ô¼»áÈí¼þOkCupid´æÔÚ¶à¸ö·ì϶£¬¿Éµ¼ÖÂÃô¸ÐÊý¾Ýй¶
Check Point ResearchÅû¶ÁËOkCupidÖеÄһϵÁзì϶£¬¿Éµ¼ÖÂÃô¸ÐÊý¾Ýй¶¡£ÍøÂ簲ȫ×êÑÐÈËÔ±¶Ô¸ÃAndroidÀûÓýøÐÐÁËÄæÏò¹¤³Ì£¬²¢·¢ÏÖÁËÆäÉî²ãÁ´½ÓÖ°ÄÜ£¬ÕâÒâζ׏¥»÷Õ߿ɷ¢ËÍ×Ô½ç˵µÄ¶ñÒâÁ´½ÓÀ´´ò¿ª¸ÃÀûÓ÷¨Ê½¡£ÓÉÓÚÀûÓõÄÓû§ÉèÖÃÖ°ÄÜÖеıàÂëÎÊÌ⣬×êÑÐÈËÔ±»¹·¢ÏÖÁË·´Éä¿çÕ¾µã¾ç±¾£¨XSS£©¹¥»÷ý½é¡£½«¶þÕß½áºÏÆðÀ´£¬¹¥»÷ÕßÄܹ»´Ó×Ô¼ºµÄ·þÎñÆ÷·¢ËÍHTTP GETÒªÇóºÍXSSÓÐЧ¸ºÔØ£¬¶øºóÄܹ»Í¨¹ýWebViewÖ´ÐÐJavaScript¡£Õâ¿ÉÄܵ¼Ö¸ÃÀûÓÃÉϵÄÃô¸ÐÅäÖÃÎļþÊý¾Ý¶³ö£¬Óû§ÕÊ»§½Ù³ÖÒÔ¼°Óû§Éí·ÝÑéÖ¤ÁîÅÆ¡¢IDÒÔ¼°µç×ÓÓʼþµØÖ·Ð¹Â¶¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/okcupid-hackers-want-your-data-not-a-relationship/#ftag=RSSbaffb68
5.FBIÖÒ¸æNetwalkerÕë¶Ô¹ú¶ÈµÄ¹¥»÷»î¶¯²¢°ä²¼·çÏÕÖ¸±ê
FBIÖÒ¸æÓйØNetwalkerÕë¶ÔÃÀ¹úºÍ±í¹úµ±¾Ö×éÖ¯µÄ¹¥»÷»î¶¯²¢°ä²¼·çÏÕÖ¸±ê¡£FBI°µÊ¾£¬¸ÃÀÕË÷Èí¼þÍÅ»ï´Ó2020Äê6ÔÂÆðÍ·Õë¶ÔÃÀ¹úºÍ±í¹úµ±¾Ö×éÖ¯£¬´ËǰNetwalker¼ÓÃÜÁ˼ÓÖÝ´óѧ¾É½ðɽ·ÖУҽѧԺµÄϵͳ£¬Ö®ºó£¬ÓÖÁ½´Î¹¥»÷Á˰ĴóÀûÑÇÔËÊäºÍÎïÁ÷¹«Ë¾Toll Group£¬ÔÚ±¾Ô¹¥»÷ÁËLorienÒ½Ôº¡£FBI»¹·¢ÏÖ£¬NetwalkerÍÅ»ïÔÚ3Ô·Ýͨ¹ýÀûÓÃVisual Basic¾ç±¾£¨VBS£©ÌáÒéÍøÂç´¹µö¹¥»÷£¬4Ô·ÝÓÔìðÍ·ÀûÓÃÒ×Êܹ¥»÷µÄÐ鹹רÓÃÍø£¨VPN£©É豸ÌáÒé¹¥»÷¡£FBI¶½´ÙÊܺ¦Õß¾Ù±¨ÀÕË÷Èí¼þÊÂÎñ£¬ÒÔÔ®ÊÖ×·×Ù¹¥»÷Õß²¢·À±¸½«À´µÄ¹¥»÷¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/fbi-warns-of-netwalker-ransomware-targeting-us-government-and-orgs/
6.¿¨°Í˹»ù·¢ÏÖºÚ¿Í×éÖ¯DeceptikonsÖØÒªÕë¶ÔÅ·ÖÞÂÉËù
ÍøÂ簲ȫ¹«Ë¾¿¨°Í˹»ù·¢ÏÖÁËÒ»¸öеĺڿÍ×éÖ¯Deceptikons£¬ÆäÖØÒªÕë¶ÔÅ·ÖÞÂÉʦÊÂÎñËùºÍ½ðÈڿƼ¼¹«Ë¾¡£¸Ã×é֯רһÓÚÇÔȡóÒ׺ͽðÈÚ»úÃÜ£¬¶ø²»ÊÇÓëµ±¾ÖÓйصÄÐÅÏ¢£¬ÆäÖØÒªÖ¸±ê¶¼Î»ÓÚÅ·ÖÞ£¬Å¼È»Ò²ÓÐһЩÖж«¹ú¶È£¬ÀýÈçÒÔÉ«ÁУ¬Ô¼µ©ºÍ°£¼°¡£¸Ã×éÖ¯ÔÚ×î½üµÄ¹¥»÷ÖжԶà¸öÅ·ÖÞÂÉʦÊÂÎñËùÌáÒéÁËÓã²æÊ½ÍøÂç´¹µö¹¥»÷£¬²¢Í¨¹ý¶ñÒâPowerShell½ÅÕý±¾Ï°È¾Ö÷»ú¡£¿¨°Í˹»ù°µÊ¾£¬DeceptikonsÔÚ¼¼ÊõÉϲ¢²»³ÉÊ죬Ŀǰ»¹Ã»ÓÐÀûÓùýÁãÈÕ·ì϶£¬´óÎÞÊý¹¥»÷¶¼×ñÑÀàËÆµÄģʽ¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/kaspersky-new-hacker-for-hire-mercenary-group-is-targeting-european-law-firms/#ftag=RSSbaffb68


¾©¹«Íø°²±¸11010802024551ºÅ