ÐÅÏ¢°²È«Öܱ¨-2019ÄêµÚ17ÖÜ
°ä²¼¹¦·ò 2019-04-29±¾Öܰ²È«Ì¬ÊÆ×ÛÊö
2019Äê4ÔÂ22ÈÕÖÁ28ÈÕ¹²ÊÕ¼°²È«·ì϶51¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇPulse Secure Pulse Connect Secure CVE-2019-11542»º³åÇøÒç¶Âí½Å£»ISC BIND nxdomain-redirect»Ø¾ø·þÎñ·ì϶; Cerner Connectivity Engine hostname¡¢timezoneºÍNTP serverÅäÖúÅÁî×¢Èë·ì϶£»Tenda AC7¡¢AC9ºÍAC10 web server (httpd)»º³åÇøÒç¶Âí½Å£»Sierra Wireless AirLink ES450 ACEManager iplogging.cgi OSºÅÁî×¢Èë·ì϶¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊǸßͨæçÁúоƬ¸ßΣ·ì϶£¬¿Éµ¼ÖÂQSEE¼ÓÃÜ˽Կй¶;Google PlayϼÜ50¸ö¶ñÒâÀûÓã¬×°ÖÃÁ¿´ï3000Íò´Î;Õë¶Ô»ªË¶µÄ¹©¸øÁ´¹¥»÷ShadowHammer»¹¶Ô×¼Áí±íÁù¼ÒÑÇÖÞ¹«Ë¾;Wi-FiÈȵã²éÕÒÆ÷й¶200ÍòWi-FiÃÜÂë;Google PlayÖиæ°×Èí¼þPreAMo£¬ÏÂÔØÁ¿´ï9000Íò´Î¡£
³ÁÒª°²È«·ì϶Áбí
Pulse Secure Pulse Connect Secure´æÔÚ»º³åÇøÒç¶Âí½Å£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë¡£
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA441012. ISC BIND nxdomain-redirect»Ø¾ø·þÎñ·ì϶
ISC BIND nxdomain-redirectÖ°ÄÜ´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉÊ¹ÊØ»¤·¨Ê½±ÀÀ££¬½øÐлؾø·þÎñ¹¥»÷¡£
https://kb.isc.org/docs/cve-2019-6468
3. Cerner Connectivity Engine hostname¡¢timezoneºÍNTP serverÅäÖúÅÁî×¢Èë·ì϶
Cerner Connectivity Engine hostname¡¢timezoneºÍNTP serverÅäÖôæÔÚÊäÈë·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉÖ´ÐÐËÁÒâOSºÅÁî¡£
https://www.securifera.com/advisories/cve-2018-20052-20053/
4. Tenda AC7¡¢AC9ºÍAC10 web server (httpd)»º³åÇøÒç¶Âí½Å
Tenda AC7¡¢AC9ºÍAC10 web server (httpd)´æÔÚ»º³åÇøÒç¶Âí½Å£¬ÔÊÐí Ô¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ɽøÐлº³åÇøÒç³ö¹¥»÷£¬¿ÉÖ´ÐÐËÁÒâ´úÂë»ò½øÐлؾø·þÎñ¹¥»÷¡£
https://github.com/zsjevilhex/iot/blob/master/route/tenda/tenda-02/Tenda.md
5. Sierra Wireless AirLink ES450 ACEManager iplogging.cgi OSºÅÁî×¢Èë·ì϶
Sierra Wireless AirLink ES450 ACEManager iplogging.cgi´æÔÚÊäÈëÑéÖ¤·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâOSºÅÁî¡£
https://packetstormsecurity.com/files/152646/Sierra-Wireless-AirLink-ES450-ACEManager-iplogging.cgi-Command-Injection.html
³ÁÒª°²È«ÊÂÎñ×ÛÊö
¸ßͨоƬ×é´æÔÚÒ»¸ö²àÐÅ·¹¥»÷·ì϶£¬¸Ã·ì϶£¨CVE-2018-11976£©¿ÉÔÊÐí¹¥»÷Õß´Ó¸ßͨоƬµÄQSEE°²È«ÇøÓòÖмìË÷¼ÓÃÜ˽Կ¡£QSEEÊǸßͨоƬµÄ¿ÉÐÅÖ´Ðл·¾³£¨TEE£©£¬ÀàËÆÓÚÓ¢ÌØ¶ûµÄSGX¡£Æ¾¾ÝNCC×êÑÐÈËÔ±Keegan RyanµÄ±íÊö£¬¸ßͨоƬµÄ¼ÓÃÜÊðÃûËã·¨ECDSA£¨ÍÖÔ²ÇúÏßËã·¨£©´æÔÚ·ì϶£¬¿Éͨ¹ýËæ»úÊýµÄһЩbit´§Ä¦³ö256λECDSAÃÜÔ¿¡£¸Ã·ì϶µÄÀûÓñØÒªÉ豸µÄrootȨÏÞ¡£ÓÐ46¿î¸ßͨоƬ×éÊܵ½Ó°Ï죬Ô̺¬¶à¿îæçÁúоƬ¡£¸Ã·ì϶µÄ½¨¸´²¹¶¡ÒѾÔ̺¬ÔÚGoogle°ä²¼µÄ4ÔÂAndroid°²È«¸üÐÂÖС£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/security-flaw-lets-attackers-recover-private-keys-from-qualcomm-chips/
2¡¢Google PlayϼÜ50¸ö¶ñÒâÀûÓã¬×°ÖÃÁ¿´ï3000Íò´Î
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/30-million-android-users-have-installed-malicious-lifestyle-apps/
3¡¢Õë¶Ô»ªË¶µÄ¹©¸øÁ´¹¥»÷ShadowHammer»¹¶Ô×¼Áí±íÁù¼ÒÑÇÖÞ¹«Ë¾
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/shadowhammer-targets-multiple-companies-asus-just-one-of-them/
4¡¢Wi-FiÈȵã²éÕÒÆ÷й¶200ÍòWi-FiÃÜÂë
ƾ¾ÝTechCrunchµÄ»ã±¨£¬Ò»¸öÃûΪWiFi FinderµÄAndroid APPй¶Á˳¬¹ý200Íò¸öWi-FiÍøÂçµÄÃÜÂ룬ÆäÖÐÊýÍò¸öWi-FiÈȵãλÓÚÃÀ¹ú¡£¸ÃAPPÓÃÓÚÔ®ÊÖÓû§²éÕÒWi-FiÈȵ㣬ÆäÏÂÔØÁ¿´ïÊýǧ´Î¡£×êÑÐÈËÔ±·¢ÏÖ¸ÃAPPµÄÊý¾Ý¿â¶³öÔÚÍøÉÏÇÒδÊܱ£»¤£¬Êý¾Ý¿âÖеļͼÔ̺¬Wi-FiÍøÂçµÄÃû³Æ¡¢¾«È·µÄµØÀíµØÎ»¡¢BSSIDºÍÃ÷ÎÄÃÜÂ룬µ«²»Ô̺¬Wi-FiËùÓÐÕßµÄÁªÏµÐÅÏ¢¡£ÔÆ·þÎñ¹«Ë¾DigitalOceanÔÚ½Óµ½»ã±¨ºóɾ³ýÁ˸ÃÊý¾Ý¿â¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/leaky_app_data/144029/
5¡¢Google PlayÖиæ°×Èí¼þPreAMo£¬ÏÂÔØÁ¿´ï9000Íò´Î
Checkpoint×êÑÐÈËÔ±ÔÚGoogle PlayÖз¢ÏÖ¸æ°×Èí¼þPreAMo£¬¸Ã¸æ°×Èí¼þ¼Ù×°³É6¸öAPP£¬×ÜÏÂÔØÁ¿³¬¹ý9000Íò´Î¡£PreAMoÖØÒªÕë¶ÔÈý¸ö¸æ°×´úÀíÉÌ - Presage¡¢AdmobºÍMopub½øÐÐڲƣ¬¹¥»÷ÕßÕë¶Ôÿ¸ö¸æ°×´úÀíÉÌʹÓÃ·ÖÆçµÄ´¦Öò½Ö裬µ«Ê¹ÓÃÁËÒ»ÑùµÄC£¦C·þÎñÆ÷£¨res.mnexuscdn[.]com£©£¬ÓÃÓÚ·¢ËÍͳ¼ÆÐÅÏ¢ºÍ½Ó¹ÜÅäÏàÐÅÏ¢¡£Google PlayÔÚ½Óµ½»ã±¨ºóÒѾϼÜÁËÕâЩÊÜϰȾµÄAPP¡£
ÔÎÄÁ´½Ó£º
https://research.checkpoint.com/preamo-a-clicker-campaign-found-on-google-play/


¾©¹«Íø°²±¸11010802024551ºÅ