ÐÅÏ¢°²È«Öܱ¨-2019ÄêµÚ23ÖÜ

°ä²¼¹¦·ò 2019-06-17

±¾Öܰ²È«Ì¬ÊÆ×ÛÊö



2019Äê6ÔÂ10ÈÕÖÁ16ÈÕ¹²ÊÕ¼°²È«·ì϶63¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇSAP E-Commerce CVE-2019-0308Ô¶³Ì´úÂë×¢Èë·ì϶£»Adobe CampaignËÁÒâ´úÂëÖ´Ðзì϶£» WAGO Industrial Managed Switches SSHÓ²±àÂë·ì϶£»Microsoft Word CVE-2019-1034ÄÚ´æ·ÛËé´úÂëÖ´Ðзì϶£»Dahua IPC-HFW1XXXÉãÏñ»ú»º³åÇøÒç¶Âí½Å¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇ


¹È¸è֤ʵºÚ¿ÍÔøÀûÓõÚÈý·½ÔÚAndroidÊÖ»úÉÏ×°ÖúóÃÅ£»HSMÑϳÁ·ì϶£¬Ó°Ïì¶à¸öÒøÐÓ×¢ÔÆ·þÎñÉ̺͵±¾Ö»ú¹¹£»Ê©ÄÍµÂµçÆøModicon M580¶à¸ö·ì϶£¬¿Éµ¼ÖÂDoS¼°ÐÅϢй¶£»·É»úÁ㲿¼þ³§ÉÌASCOÔâÀÕË÷Èí¼þ¹¥»÷£¬²¿Ãʤ³§ÒѹعØ£»Evernote Chrome²å¼þXSS·ì϶£¬²¨¼°Ô¼460ÍòÓû§¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£



³ÁÒª°²È«·ì϶Áбí



1. SAP E-Commerce CVE-2019-0308Ô¶³Ì´úÂë×¢Èë·ì϶
SAP E-Commerce´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬×¢ÈëËÁÒâ´úÂ룬²¢ÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐС£

https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=521864242


2. Adobe CampaignËÁÒâ´úÂëÖ´Ðзì϶
Adobe Campaign´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬ÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâºÅÁî¡£

https://helpx.adobe.com/security/products/campaign/apsb19-28.html


3. WAGO Industrial Managed Switches SSHÓ²±àÂë·ì϶
WAGO Industrial Managed Switches¶à¸ö²úÆ·´æÔÚÓ²±àÂëSSHÃÜÔ¿·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉδÊÚȨ½Ó¼ûÉ豸¡£

https://ics-cert.us-cert.gov/advisories/ICSA-19-164-02


4. Microsoft Word CVE-2019-1034ÄÚ´æ·ÛËé´úÂëÖ´Ðзì϶
Microsoft Word´¦ÖÃWORDÎļþ´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÎļþÒªÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉÖ´ÐÐËÁÒâ´úÂë¡£

https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2019-1034


5. Dahua IPC-HFW1XXXÉãÏñ»ú»º³åÇøÒç¶Âí½Å
Dahua IPC-HFW1XXX´æÔÚ»º³åÇøÒç¶Âí½Å£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ɽøÐлؾø·þÎñ¹¥»÷»òÕßÖ´ÐÐËÁÒâ´úÂë¡£

https://www.dahuasecurity.com/support/cybersecurity/details/617



 ³ÁÒª°²È«ÊÂÎñ×ÛÊö



1¡¢¹È¸è֤ʵºÚ¿ÍÔøÀûÓõÚÈý·½ÔÚAndroidÊÖ»úÉÏ×°ÖúóÃÅ

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

¹È¸è֤ʵ2017ÄêºÚ¿ÍÔøÀûÓõÚÈý·½¹©¸øÉ̹¹½¨µÄ·¨Ê½´úÂëÔÚAndroidÊÖ»úÉÏ×°ÖÃTriadaºóÃÅ¡£¹È¸èûÓоßÌå×¢Ã÷ÄÄЩÉ豸Êܵ½ÁËÓ°Ï죬µ«°²È«³§ÉÌDr.WebÔøÔÚ2017ÄêµÄ×êÑл㱨ÖÐÖ¸³öÊÜÓ°ÏìµÄÉè±¸Æ·ÅÆÔ̺¬Leagoo M5 Plues¡¢Leagoo M8¡¢Nomu S10ºÍNomu S20µÈ¡£¸ÃºóÃÅÖ¼ÔÚÏòÓû§µÄÉè±¸ÍÆËÍÀ¬»øÓʼþºÍδÊÚȨµÄ¸æ°×µÈ¡£

Ô­ÎÄÁ´½Ó£º
https://www.cyberscoop.com/android-backdoor-triada-mobile-supply-chain/

2¡¢HSMÑϳÁ·ì϶£¬Ó°Ïì¶à¸öÒøÐÓ×¢ÔÆ·þÎñÉ̺͵±¾Ö»ú¹¹


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ledger°²È«×êÑÐÈËÔ±Åû¶һ¼ÒÖØÒª³§É̵ÄHSM£¨Ó²¼þ°²È«Ä£¿é£©ÖеÄÑϳÁ·ì϶£¬¸Ã·ì϶¿ÉÔÊÐí¼ìË÷´æ´¢ÔÚHSMÖеÄÃô¸ÐÊý¾Ý¡£HSMÊÇÓ²¼þ¸ôÀëÉ豸£¬³£ÓÃÓÚ½ðÈÚ»ú¹¹¡¢µ±¾Ö»ú¹¹¡¢Êý¾ÝÖÐÐÄ¡¢ÔÆ·þÎñÉ̺͵çÐÅÔËÓªÉ̵È¡£Æ¾¾Ý×êÑÐÈËÔ±µÄ»ã±¨£¬¸Ã·ì϶ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õ߯ëÈ«½ÚÔìHSM£¬´Ó¶ø¼ìË÷¼ÓÃÜÃÜÔ¿ºÍÖÎÀíԱʹ´¦µÈÐÅÏ¢¡£×êÑÐÈËÔ±²¢Î´Åû¶ÊÜÓ°ÏìµÄ³§ÉÌÃû³Æ£¬µ«CryptosenseÖ¸³ö¸Ã³§ÉÌ¿ÉÄÜÊǽðÑÅÍØ¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/major-hsm-vulnerabilities-impact-banks-cloud-providers-governments/

3¡¢Ê©ÄÍµÂµçÆøModicon M580¶à¸ö·ì϶£¬¿Éµ¼ÖÂDoS¼°ÐÅϢй¶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


˼¿ÆTalosÅû¶ʩÄÍµÂµçÆøModicon M580ÖеĶà¸ö·ì϶¡£Modicon M580ÊÇÊ©ÄÍµÂµçÆøModiconϵÁпɱà³Ì×Ô¶¯»¯½ÚÔìÆ÷µÄ×îвúÆ·£¬×êÑÐÈËÔ±ÔÚÆä¹Ì¼þ°æ±¾SV2.70Öз¢ÏÖ¶à¸ö·ì϶£¬Ô̺¬¿Éµ¼ÖÂDoSµÄ·ì϶£¨CVE-2018-7846¡¢CVE-2018-7849¡¢CVE-2018-7843£©£¬¿Éµ¼ÖÂÐÅϢй¶µÄ·ì϶£¨CVE-2018-7844¡¢CVE-2018-7848£©¼°Éí·ÝÑéÖ¤ÈÆ¹ý·ì϶£¨CVE-2018-7842£©µÈ¡£

Ô­ÎÄÁ´½Ó£º
https://blog.talosintelligence.com/2019/06/vulnerability-spotlight-multiple.html

4¡¢·É»úÁ㲿¼þ³§ÉÌASCOÔâÀÕË÷Èí¼þ¹¥»÷£¬²¿Ãʤ³§ÒѹعØ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¾Ý±ÈÀûʱýÌ屨·£¬·É»úÁ㲿¼þ³§ÉÌASCOλÓÚ±ÈÀûʱÔú·ÒÌØÄ·µÄ¹¤³§ÔâÀÕË÷Èí¼þϰȾ£¬¸Ã¹«Ë¾ÒÑÖÕ³¡ÁËËĸö¹ú¶ÈµÄ¹¤³§³ö²ú¡£¸ÃϰȾÊÂÎñ²úÉúÔÚ6ÔÂ7ÈÕÐÇÆÚÎ壬×î³õÓ°ÏìÁ˸ù«Ë¾Î»ÓÚ±ÈÀûʱµÄ¹¤³§£¬µ«ASCOÒ²¹Ø¹ØÁËλÓڵ¹ú¡¢¼ÓÄôóºÍÃÀ¹úµÄ¹¤³§¡£¾Ý±¨Â·Í£»ú¹¦·òÔ¤¼ÆÎªÒ»ÖÜ£¬Ô̺¬¼´½«µ½À´µÄÖÜÄ©¡£¸Ã¹«Ë¾²¢Î´Ð¹Â©¸ü¶àÐÅÏ¢£¬Ä¿Ç°Ò²²»ÖªÂ·ÀÕË÷Èí¼þµÄÃû³Æ¡£ASCOÊÇÊÀ½çÉÏ×î´óµÄ·É»úÁ㲿¼þ³§ÉÌÖ®Ò»£¬Æä¿Í»§Ô̺¬¿Õ¿Í¡¢²¨ÒôÉõÖÁ¾üÓᢺ½¿ÕÁìÓòµÄ¹«Ë¾µÈ¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/ransomware-halts-production-for-days-at-major-airplane-parts-manufacturer/

5¡¢Evernote Chrome²å¼þXSS·ì϶£¬²¨¼°Ô¼460ÍòÓû§


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


°²È«³§ÉÌGuardio·¢ÏÖEvernoteµÄChrome²å¼þ£¨Evernote Web Clipper£©ÖдæÔÚÒ»¸öÑϳÁµÄXSS·ì϶£¬¿ÉÔÊÐí¹¥»÷Õß½Ó¼ûÓû§ÔÚµÚÈý·½·þÎñÖеÄÃô¸ÐÐÅÏ¢¡£ÓÉÓÚEvernote¹ãÊÜÓ­½Ó£¬¸Ã·ì϶¿ÉÄܲ¨¼°Ô¼460ÍòÓû§¡£¸Ã·ì϶£¨CVE-2019-12592£©ÊôÓÚ²å¼þÖеıàÂëÂß¼­ÃýÎ󣬿ÉÈÆ¹ýä¯ÀÀÆ÷µÄͬԴսÊõ£¬Ê¹µÃ¹¥»÷Õß½Ó¼ûµÚÈý·½·þÎñµÄÃô¸ÐÓû§ÐÅÏ¢£¬Ô̺¬Éí·ÝÑéÖ¤ÐÅÏ¢¡¢²ÆÕþÐÅÏ¢¡¢É罻ýÌå̸ÌìÐÅÏ¢¡¢µç×ÓÓʼþÐÅÏ¢µÈ¡£½¨ÒéÓû§¸üÐÂÖÁ7.11.1¼°¸ü¸ß°æ±¾¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/critical-flaw-in-evernote-add-on-exposed-sensitive-data-of-millions/