Pilot Credentials±»ºÚй¼ûÀ¹úº½¿ÕºÍÎ÷ÄϺ½¿Õ²¿ÃÅÐÅÏ¢

°ä²¼¹¦·ò 2023-06-25

1¡¢Pilot Credentials±»ºÚй¼ûÀ¹úº½¿ÕºÍÎ÷ÄϺ½¿Õ²¿ÃÅÐÅÏ¢


¾ÝýÌå6ÔÂ24ÈÕ±¨Â·£¬È«Çò×î´óµÄÁ½¼Òº½¿Õ¹«Ë¾ÃÀ¹úº½¿ÕºÍÎ÷ÄϺ½¿ÕÅû¶ÁËÒòPilot CredentialsÔâµ½ºÚ¿Í¹¥»÷¶øµ¼ÖµÄÊý¾Ýй¶ÊÂÎñ ¡£Pilot CredentialsÊÇÖÎÀí¶à¼Òº½¿Õ¹«Ë¾·ÉÐÐÔ±ÉêÇëºÍÕÐÆ¸ÍøÕ¾µÄµÚÈý·½¹©¸øÉÌ ¡£¹¥»÷ÕßÓÚ4ÔÂ30ÈÕ½Ó¼ûÁË·ÉÐÐÔ±Ö¤Êéϵͳ£¬²¢ÇÔÈ¡Á˲¿ÃÅÉêÇëÈËÔÚ·ÉÐÐÔ±ºÍѧԹØÐƸ¹ý³ÌÖÐÌṩµÄÐÅÏ¢ ¡£ÃÀ¹úº½¿ÕµÄ5745Ãû·ÉÐÐÔ±Êܵ½Ó°Ï죬¶øÎ÷ÄϺ½¿Õ×ܹ²ÓÐ3009Ãû·ÉÐÐÔ±Êܵ½Ó°Ïì ¡£Á½¼Ò¹«Ë¾¾ùÓÚ5ÔÂ3ÈÕ»ñϤ´ËÊÂÎñ£¬²¢°µÊ¾½öÉæ¼°µÚÈý·½¹©¸øÉ̵Äϵͳ£¬²¢Î´Ó°Ï캽¿Õ¹«Ë¾×Ô¼ºµÄϵͳ ¡£


https://www.bleepingcomputer.com/news/security/american-airlines-southwest-airlines-disclose-data-breaches-affecting-pilots/


2¡¢PBIÊý¾ÝÐ¹Â¶Éæ¼°GenworthºÍCalPERSÊý°ÙÍò¿Í»§µÄÐÅÏ¢


¾Ý6ÔÂ23ÈÕ±¨Â·£¬PBI×êÑзþÎñ(PBI)Êý¾Ýй¶£¬Ó°ÏìÁËÆäÈý¸öºÏ×÷¹«Ë¾µÄÔ¼475Íò¿Í»§ ¡£ÕâЩ¹¥»÷ʼÓÚ5ÔÂ27ÈÕ£¬ÆäʱClopÍÅ»ïÆðÍ·ÀûÓÃMOVEit Transfer·ì϶ÇÔÈ¡×éÖ¯µÄÊý¾Ý ¡£µÚÒ»¼ÒÊÜÓ°Ïì×éÖ¯ÊÇλÓÚ¸¥¼ªÄáÑÇÖݵÄÈËÊÙ±£ÏÕ·þÎñÌṩÉÌGenworth Financial£¬¾Ý¹À¼ÆÓ°ÏìÁË250ÖÁ270ÍòÈË ¡£µÚ¶þ¼ÒÊܵ½PBIй¶ӰÏìµÄÊÇλÓÚŦԼµÄ±£ÏÕÌṩÉÌWilton Reassurance£¬Éæ¼°1482490Ãû¿Í»§ ¡£Êܵ½Ó°ÏìµÄµÚÈý¼Ò¹«Ë¾ÊÇÃÀ¹ú×î´óµÄ¹«¹²ÑøÀÏ»ù½ðCalPERS£¨¼ÓÖݹ«¹²¹ÍÔ±ÍËÐÝϵͳ£©£¬Ó°ÏìÁËÔ¼769000Ãû»áÔ± ¡£


https://www.bleepingcomputer.com/news/security/moveit-breach-impacts-genworth-calpers-as-data-for-32-million-exposed/


3¡¢Î¢Èí¼ì²âµ½Ä¾Âí»¯OpenSSHÕë¶ÔLinuxºÍIoTÉ豸µÄ»î¶¯


6ÔÂ22ÈÕ£¬Î¢Èí°ä²¼»ã±¨³ÆÆä×î½ü·¢ÏÖÁËÒ»ÖÖÀûÓÃ×Ô½ç˵ºÍ¿ªÔ´¹¤¾ßÀ´Õë¶Ô¶³öÓÚ»¥ÁªÍøµÄLinuxϵͳºÍIoTÉ豸µÄ¹¥»÷ ¡£¸Ã¹¥»÷ʹÓÃÁËľÂí»¯OpenSSHÀ´½ÚÔ챻ϰȾµÄÉ豸£¬²¢×°ÖÃÁËÍÚ¿ó¶ñÒâÈí¼þ ¡£¹¥»÷ÕßÔÚ»ñµÃ½Ó¼ûȨÏ޺󣬻á×°ÖÃľÂíOpenSSHÈí¼þ°ü£¬Ö¼ÔÚÔÚÖ¸±êÉ豸ÖÐ×°ÖúóÃŲ¢ÇÔÈ¡SSHÍ´´¦ÒÔά³ÖÓÆ¾ÃÐÔ ¡£¸ÃºóÃÅÓÖ×°ÖÃÁ˸÷À๤¾ßºÍ×é¼þ£¬ÀýÈçRootkitºÍIRC botÀ´½Ù³ÖÉ豸×ÊÔ´ÒÔ½øÐÐÍÚ¿ó»î¶¯ ¡£


https://www.microsoft.com/en-us/security/blog/2023/06/22/iot-devices-and-linux-based-systems-targeted-by-openssh-trojan-campaign/


4¡¢VMware½¨¸´ÆävCenter ServerÖеĶà¸ö°²È«·ì϶


ýÌå6ÔÂ23Èճƣ¬VMware°ä²¼¸üУ¬½¨¸´ÁËvCenter ServerÖеÄ5¸ö°²È«·ì϶ ¡£ÕâЩ·ì϶´æÔÚÓÚDCE/RPCºÍ̸µÄʵÏÖÖÐ ¡£Õâ´Î½¨¸´µÄ·ì϶Ô̺¬¶ÑÒç¶Âí½Å(CVE-2023-20892)¡¢¿ªÊͺóʹÓ÷ì϶(CVE-2023-20893)¡¢Ô½½çдÈë·ì϶£¨CVE-2023-20894£©ÒÔ¼°Ô½½ç¶ÁÈ¡·ì϶(CVE-2023-20895ºÍCVE-2023-20896) ¡£ÆäÖУ¬Ç°Á½¸ö·ì϶£¨CVE-2023-20892ºÍCVE-2023-20893£©¿É±»Î´¾­Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßÀûÓã¬À´»ñÈ¡´úÂëÖ´ÐÐȨÏÞ ¡£


https://securityaffairs.com/147774/hacking/vmware-vcenter-server-memory-corruption-bugs.html


5¡¢Camaro DragonÀûÓÃUSBÇý¶¯Æ÷¹¥»÷Å·ÖÞµÄÒ½ÁÆ»ú¹¹


Check PointÔÚ6ÔÂ22ÈÕÅû¶ÁËCamaro DragonÀûÓÃUSBÇý¶¯Æ÷·Ö·¢¶ñÒâÈí¼þµÄ»î¶¯ ¡£¸Ã»î¶¯ÊÇÔÚ¶ÔÅ·ÖÞÒ»¼ÒÒ½ÁÆ»ú¹¹Ôâµ½µÄ¹¥»÷½øÐе÷²éµÄ¹ý³ÌÖз¢ÏÖµÄ ¡£¾ÝϤ£¬Ä³Ô±¹¤ÔÚÑÇÖÞµÄÒ»´Î»áÒéÖн«×Ô¼ºµÄUSB²åÈëͬʵÄÍÆËã»úʱ±»Ï°È¾ ¡£¸ÃÔ±¹¤·µ»ØÅ·ÖÞµÄÒ½ÁÆ»ú¹¹ºó£¬ÎÞÒâÖÐͨ¹ý´ËUSBϰȾÁËÒ½ÔºµÄϵͳ ¡£Ï°È¾Á´Ô̺¬Ò»¸öÃûΪHopperTickµÄDelphi launcher£¬Í¨¹ýUSB´«²¼£¬ÆäÖØÒªpayloadÃûΪWispRider£¬ÕƹÜÔÚÏνӵ½»úеʱϰȾÉ豸 ¡£WispRiderµÄ²¿ÃűäÌ廹Äܹ»³äÈκóÃŲ¢Èƹýɱ¶¾Èí¼þ£¬ÓëÆäһ·ÌṩµÄ»¹ÓÐÒ»¸öÇÔȡģ¿éHPCustPartUI.dll ¡£


https://research.checkpoint.com/2023/beyond-the-horizon-traveling-the-world-on-camaro-dragons-usb-flash-drives/


6¡¢Apple½¨¸´ÔÚTriangulation»î¶¯Öб»ÀûÓõĶà¸ö·ì϶


6ÔÂ22ÈÕ±¨Â·³Æ£¬Apple½¨¸´ÁËiOS¡¢iPadOS¡¢macOS¡¢watchOSºÍSafariÖеĶà¸ö·ì϶ ¡£ÆäÖÐÔ̺¬×Ô2019ÄêÒÔÀ´Ò»Ïò»îÔ¾µÄTriangulation»î¶¯Öб»ÀûÓõÄÁ½¸ö·ì϶£¬ÄÚºËÖеÄÕûÊýÒç¶Âí½Å£¨CVE-2023-32434 £©ºÍWebKitÖеÄÄÚ´æ°Ü»µ·ì϶£¨WebKit ÖеÄÄÚ´æ°Ü»µ·ì϶£© ¡£Apple°µÊ¾ÕâÁ½¸ö·ì϶¿ÉÄÜÒѱ»ÓÃÓÚ¹¥»÷iOS 15.7֮ǰµÄiOS°æ±¾ ¡£Õâ´Î»¹½¨¸´Á˵ÚÈý¸öÁãÈÕ·ì϶£¨CVE-2023-32439£©£¬¸Ã·ì϶ÔÚ´¦ÖöñÒâWebÄÚÈÝʱ¿ÉÄܵ¼ÖÂËÁÒâ´úÂëÖ´ÐÐ ¡£


https://thehackernews.com/2023/06/zero-day-alert-apple-releases-patches.html