ÐÅÏ¢°²È«Öܱ¨-2019ÄêµÚ30ÖÜ

°ä²¼¹¦·ò 2019-08-05

> ±¾Öܰ²È«Ì¬ÊÆ×ÛÊö



2019Äê7ÔÂ29ÈÕÖÁ8ÔÂ04ÈÕ¹²ÊÕ¼°²È«·ì϶50¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇAlcatel-Lucent Enterprise 8008 Cloud Edition Deskphone VoIPÃÜÂë¸ü¸ÄºÅÁî×¢Èë·ì϶£»Puppet Enterprise PE's express installĬÈÏÃÜÂë·ì϶£»Wind River Systems VxWorks IPÑ¡Ïî½âÎö»º³åÇøÒç¶Âí½Å£»Polycom UC SoftwareÉÏ´«Îļþ´úÂëÖ´Ðзì϶£»cPanel SQL×¢Èë·ì϶¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇŦԼͨ¹ýÐÂÊý¾Ýй¶֪ͨ·¨°¸£¬Êý¾Ý¼à¹ÜÔÙ´ÎÉý¼¶£»Capital Oneй¶1.06ÒÚÓû§ÐÅÏ¢£¬ÏÓÒÉÈËÒѱ»²¶£»VxWorks½¨¸´11¸ö°²È«·ì϶£¬Ó°Ï쳬¹ý20ÒŲ́É豸£»Amcrest¼ÒÓÃÉãÏñÍ·ÑϳÁ·ì϶£¬¿ÉÔÊÐí¹¥»÷ÕßÔ¶³Ì¼àÌýÓû§£»ÖÇÀû1430Íò¹«ÃñÐÅϢй¶£¬Õ¼È«¹ú×ÜÈ˶¡½ü80%¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£



> ³ÁÒª°²È«·ì϶Áбí



1. Alcatel-Lucent Enterprise 8008 Cloud Edition Deskphone VoIPÃÜÂë¸ü¸ÄºÅÁî×¢Èë·ì϶


Alcatel-Lucent Enterprise 8008 Cloud Edition Deskphone VoIP ÃÜÂë¸ü¸Ä½çÃæ¸ü¸ÄÃÜÂë´¦ÖôæÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉÖ´ÐÐËÁÒâOSºÅÁî¡£

https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_Alcatel_8008CloudEditionDeskPhone.pdf?_=1559026340

2. Puppet Enterprise PE's express installĬÈÏÃÜÂë·ì϶


Puppet Enterprise PE's express install´æÔÚĬÈÏÃÜÂë·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉδÊÚȨ½Ó¼û¡£
https://puppet.com/security/cve/CVE-2019-10694

3. Wind River Systems VxWorks IPÑ¡Ïî½âÎö»º³åÇøÒç¶Âí½Å


Wind River Systems VxWorks IPÑ¡Ïî´¦ÖôæÔÚ»º³åÇøÒç¶Âí½Å£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë¡£
https://www.us-cert.gov/ics/advisories/icsa-19-211-01

4. Polycom UC SoftwareÉÏ´«Îļþ´úÂëÖ´Ðзì϶


Polycom UC SoftwareÉÏ´«Îļþ´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉÖ´ÐÐËÁÒâ´úÂë¡£
https://support.polycom.com/content/dam/polycom-support/global/documentation/remote-code-execution-vulnerability-in-ucs-software-v1-0.pdf

5. cPanel SQL×¢Èë·ì϶


cPanel´æÔÚSQL×¢Èë·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄSQLÒªÇ󣬲Ù×÷Êý¾Ý¿â£¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»òÖ´ÐÐËÁÒâ´úÂë¡£
https://documentation.cpanel.net/display/CL/58+Change+Log


 > ³ÁÒª°²È«ÊÂÎñ×ÛÊö



1¡¢Å¦Ô¼Í¨¹ýÐÂÊý¾Ýй¶֪ͨ·¨°¸£¬Êý¾Ý¼à¹ÜÔÙ´ÎÉý¼¶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ŦԼÖÝÖݳ¤Andrew M. Cuomo½üÈÕÇ©ÊðÁËÒ»ÏîеÄÊý¾Ýй¶֪ͨ·¨°¸£¬¸Ã·¨°¸µÄÃû³ÆÎª¡°×èÖ¹ºÚ¿Í¼°¸Ä½øµç×ÓÊý¾Ý°²È«¡±£¬¼´SHIELD·¨°¸£¬Ö¼ÔÚ±£»¤Å¦Ô¼¹«ÃñµÄÒþÖÔÊý¾Ý²¢¼ÓÇ¿¸ÃÖݵÄÊý¾Ýй¶Õþ²ß¡£¸Ã·¨°¸À©´óÁËÓ×ÎÒÐÅÏ¢µÄÁìÓò£¬½«ÉúÎï¼ø±ðÐÅÏ¢¡¢µç×ÓÓʼþµØÖ·¼°ÃÜÂë¡¢°²È«ÎÊÌâ¼°´ð°¸ÁÐÈëÆäÖС£¸Ã·¨°¸»¹Ôö³¤ÁËÃñÊ´¦·££¬²¢½«Í¨ÖªÒªÇóÀûÓÃÓÚÈκÎÕ¼ÓÐŦԼ¹«ÃñÒþÖÔÐÅÏ¢µÄÓ×ÎÒ»òʵÌ壬¶ø²»½ö½öÊÇÔÚŦԼÖÝ·¢Õ¹ÒµÎñµÄʵÌå¡£¸Ã·¨°¸»¹½«ÌṩÉí·Ý͵ÇÔ±£»¤·þÎñдÈë˾·¨£¬ÒªÇóCRAÔÚ²úÉúÉæ¼°Éç»á°²È«ºÅÂëµÄÊý¾Ýй¶ºó±ØÐëÏòÏû·ÑÕßÌṩºÏÀíµÄ±£»¤·þÎñ¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/new-york-passes-law-to-update-data-breach-notification-requirements/

2¡¢Capital Oneй¶1.06ÒÚÓû§ÐÅÏ¢£¬ÏÓÒÉÈËÒѱ»²¶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

Capital OneÈ·ÈÏÆäϵͳÓÚ3ÔÂ22ÈÕÖÁ23ÈÕÆÚ¼äÔâδÊÚȨ½Ó¼û£¬µ¼ÖÂ1.06ÒÚÓû§µÄÐÅϢй¶£¬Ô̺¬ÂòÂôÊý¾Ý¡¢ÐÅÓþÆÀ·Ö¡¢Ö§¸¶º¹Çà¡¢Óà¶îÒÔ¼°¹ØÁªµÄÒøÐÐÕË»§ºÍÉç»á°²È«ºÅÂë¡£ÊÜÓ°ÏìµÄÓû§Ô̺¬1ÒÚÃÀ¹úÈ˺Í600Íò¼ÓÄôóÈË¡£Æ¾¾ÝÓйØÖ¤¾Ý£¬FBIÒѾ­¿ÛÁôÁËÏÓÒÉÈËPaige Thompson¡£Capital One°µÊ¾ÓÉÓÚ¿Í»§Í¨Öª¡¢Ãâ·ÑµÄÐÅÓþ¼à¿Ø·þÎñ¡¢°²È«¸Ä½ø³É±¾ÒÔ¼°Ë¾·¨ÓöÈ£¬ÕâÒ»ÊÂÎñ½«µ¼ÖÂÔ¼1ÒÚÖÁ1.5ÒÚÃÀÔªµÄ³É±¾¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/capital-one-data-breach-affects-106-million-people-suspect-arrested/

3¡¢VxWorks½¨¸´11¸ö°²È«·ì϶£¬Ó°Ï쳬¹ý20ÒŲ́É豸


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Armis×êÑÐÈËÔ±ÔÚVxWorks RTOSÖз¢ÏÖ11¸ö°²È«·ì϶£¬ÕâЩ·ì϶ӰÏìÁ˺½¿Õº½Ìì¡¢¹ú·À¡¢¹¤Òµ¡¢Ò½ÁÆ¡¢Æû³µ¡¢Ïû·Ñµç×ÓµÈÁìÓòµÄ20¶àÒŲ́É豸¡£ÕâЩ·ì϶±»Í³³ÆÎªURGENT/11£¬¿ÉÔÊÐíÔ¶³Ì¹¥»÷ÕßÈÆ¹ý´«Í³µÄ°²È«½â¾ö¹æ»®²¢ÆëÈ«½ÚÔìÊÜÓ°ÏìµÄÉ豸»òÀàËÆÓÀºãÖ®À¶Ò»Ñùµ¼Ö´ó¹æÄ£µÄÉ豸ÖжÏ£¬²¢ÇÒÎÞÐèÓû§½»»¥¡£ÕâЩ·ì϶´æÔÚÓÚVxWorks 6.5Ö®ºóµÄTCP/IPºÍ̸ջÖУ¬Ó°ÏìÁË´Óǰ13ÄêÀ´°ä²¼µÄËùÓÐVxWorks°æ±¾¡£¸Ã¹«Ë¾ÒѾ­ÔÚÉϸöÔ°䲼Á˽¨¸´²¹¶¡£¬µ«ÕâЩ²¹¶¡Í¨¹ýÉ豸³§ÉÌ´ïµ½Ïû·ÑÕß¿ÉÄÜ»¹±ØÒª¿Ï¶¨µÄ¹¦·ò¡£

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/07/vxworks-rtos-vulnerability.html

4¡¢Amcrest¼ÒÓÃÉãÏñÍ·ÑϳÁ·ì϶£¬¿ÉÔÊÐí¹¥»÷ÕßÔ¶³Ì¼àÌýÓû§



GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


°²È«³§ÉÌTenable·¢ÏÖAmcrest IP2M-841B¼ÒÓÃÉãÏñÍ·´æÔÚÒ»¸öÑϳÁ·ì϶£¬¿ÉÔÊÐí¹¥»÷Õßͨ¹ýHTTPÔ¶³Ì¼àÌýÉãÏñÍ·µÄÒôƵÊäÈë¡£¸Ã·ì϶±»ÏóÕ÷ΪCVE-2019-3948£¬Ó°ÏìÁËÉãÏñÍ·¹Ì¼þ°æ±¾V2.520.AC00.18.R£¬²¢ÇÒÎÞÐèÉí·ÝÑéÖ¤¼´¿ÉÀûÓá£´Ë±í£¬¸Ã²úÆ·Ò²Ò×ÊÜÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶£¨CVE-2017-7927£©¹¥»÷¡£AmcrestÒѾ­°ä²¼Óйؽ¨¸´²¹¶¡¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/iot-home-security-camera-allows-hackers-to-listen-in-over-http/

5¡¢ÖÇÀû1430Íò¹«ÃñÐÅϢй¶£¬Õ¼È«¹ú×ÜÈ˶¡½ü80%


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Wizcase×êÑÐÍŶӷ¢ÏÖÒ»¸öElasticsearchÊý¾Ý¿â¶³öÁ˳¬¹ý1430ÍòÖÇÀû¹«ÃñµÄÑ¡¾ÙÐÅÏ¢£¬Õ¼¸Ã¹ú×ÜÈ˶¡µÄ½ü80%¡£ÕâЩÐÅÏ¢Ô̺¬ÐÕÃû¡¢¼Òͥסַ¡¢ÐԱ𡢴ºÇïºÍÄÉ˰ºÅÂë¡£ÖÇÀûÑ¡¾Ù·þÎñServelµÄ½²»°ÈËÈ·ÈÏÁËÕâЩÊý¾ÝµÄÕæÊµÐÔ£¬µ«·ñ¶¨¸Ã·þÎñÆ÷ÊôÓÚËûÃÇ¡£¸Ã½²»°È˰µÊ¾ÕâЩÐÅÏ¢¶ÔÓ¦ÓÚ2017ÄêµÄÊý¾Ý£¬¿ÉÄÜÊǵÚÈý·½´ÓÆäÍøÕ¾ÉÏÍøÂç»ã×ܵÃÀ´¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/voter-records-for-80-of-chiles-population-left-exposed-online/