ÐÅÏ¢°²È«Öܱ¨-2020ÄêµÚ02ÖÜ
°ä²¼¹¦·ò 2020-01-13
±¾Öܰ²È«Ì¬ÊÆ×ÛÊö
2020Äê01ÔÂ06ÈÕÖÁ12ÈÕ¹²ÊÕ¼°²È«·ì϶57¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇCisco Webex Video Mesh Software WEBºÅÁî×¢Èë·ì϶; Mozilla Firefox Windows XPCVariant.cppÀàÐÍ»ìºÏ´úÂëÖ´Ðзì϶£»Android Realtek rtlwifi driverÔ¶³Ì´úÂëÖ´Ðзì϶£»Android Sound subsystemȨÏÞÌáÉý·ì϶£»Billion Smart Energy Router SG600R2ºÅÁîÖ´Ðзì϶¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇUpstream Security°ä²¼2020°æ¡¶Æû³µÍøÂ簲ȫ»ã±¨¡·£»Î¢Èí°ä²¼RDP±©Á¦¹¥»÷·ÖÎö»ã±¨£¬¾ùÔȳÖÐø¹¦·òΪ2-3Ì죻MITRE°ä²¼ºÏÓÃÓÚ¹¤Òµ½ÚÔìϵͳµÄATT£¦CK¿ò¼Ü£»Î¢Èí½¨¸´AccessÖеÄÐÅϢй¶·ì϶£¨CVE-2019-1463£©£»Mozilla°ä²¼¸üÐÂ,½¨¸´Firefox 0day·ì϶(CVE-2019-11707)¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£
³ÁÒª°²È«·ì϶Áбí
1. Cisco Webex Video Mesh Software WEBºÅÁî×¢Èë·ì϶
Cisco Webex Video Mesh Software releases WEB½Ó¿Ú´æÔÚ°²È«·ì϶£¬ÔÊÐíͨ¹ýÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬ÒÔROOTȨÏÞÖ´ÐÐËÁÒâºÅÁî¡£
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-webex-video
2. Mozilla Firefox Windows XPCVariant.cppÀàÐÍ»ìºÏ´úÂëÖ´Ðзì϶
Mozilla Firefox XPCVariant.cpp´æÔÚÀàÐÍ»ìºÏ·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄWEBÒªÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë¡£
https://www.mozilla.org/en-US/security/advisories/mfsa2020-02/
3. Android Realtek rtlwifi driverÔ¶³Ì´úÂëÖ´Ðзì϶
Android Realtek rtlwifi driver´æÔÚδÃ÷°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬ÒÔϵͳȨÏ޸ߵÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£
https://source.android.google.cn/security/bulletin/2020-01-01
4. Android Sound subsystemȨÏÞÌáÉý·ì϶
Android Sound subsystem´æÔÚδÃ÷°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉÌáÉýȨÏÞ¡£
https://source.android.google.cn/security/bulletin/2020-01-01
5. Billion Smart Energy Router SG600R2ºÅÁîÖ´Ðзì϶
Billion Smart Energy Router SG600R2Ô̺¬system_command.asp¾ç±¾ÒÔrootȨÏÞÖ´ÐУ¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Äܹ»rootȨÏÞÖ´ÐÐËÁÒâºÅÁî¡£
https://github.com/InnotecSystem/Device-Reversing/wiki/Firmware-Inspection
³ÁÒª°²È«ÊÂÎñ×ÛÊö
1¡¢Upstream Security°ä²¼2020°æ¡¶Æû³µÍøÂ簲ȫ»ã±¨¡·
Upstream Security2020°æ¡¶Æû³µÍøÂ簲ȫ»ã±¨¡·»ùÓÚ¶Ô´ÓǰʮÄêÖÐ367Æð¹«¿ª»ã±¨µÄÆû³µÍøÂ簲ȫÊÂÎñ½øÐзÖÎö£¬³ÁµãÇ¿µ÷ÁË2019ÄêÆÚ¼ä·¢Ïֵķì϶Óë¼û½â¡£¸Ã»ã±¨Ö¸³ö£¬»¥ÁªÍøÆû³µÒÑÔÚÊÕÊÜÆû³µÊг¡£¬Ä¿Ç°ÒÑÓÐ3.3ÒÚÁ¾»¥ÁªÍøÆû³µ£¬ÕâÒâζ×Åÿ´Î¹¥»÷µÄDZÔÚ·ÛËéÁ¦³É±¶Ôö³¤£¬´ó¹æÄ£µÄ¹¥»÷ÊÂÎñ¿ÉÄÜ»á·ÛËéÕû¸ö³ÇÊУ¬ÉõÖÁµ¼Ö¿àÄÑÐÔµÄÐÔÃüËðʧ¡£×Ô2016ÄêÒÔÀ´£¬Ã¿ÄêÆû³µÍøÂ簲ȫÊÂÎñµÄÊýÁ¿Ôö³¤ÁË605%£¬½ö2019ÄêÒ»Äê¾ÍÔö³¤ÁËÒ»±¶ÒÔÉÏ¡£ÔÚ2019Ä꣬ÓÐ57%µÄÊÂÎñÊÇÓÉÍøÂç×ï·¸½øÐе쬯äÖ÷ÕÅÊÇ·ÛËéÒµÎñ¡¢ÇÔÈ¡½ðÇ®»òË÷ÒªÊê½ð¡£½öÓÐ38%ÊÇ×êÑÐÈËÔ±µÄ»ã±¨£¬ÆäÖ÷ÕÅÏò¹«Ë¾ºÍÏû·ÑÕßÖÒÃܸæÏֵķì϶¡£
ÔÎÄÁ´½Ó£º
https://www.helpnetsecurity.com/2020/01/06/automotive-cybersecurity-incidents/
2¡¢Î¢Èí°ä²¼RDP±©Á¦¹¥»÷·ÖÎö»ã±¨£¬¾ùÔȳÖÐø¹¦·òΪ2-3Ìì
΢Èí°ä²¼ÁËÒ»·ÝÕë¶ÔRDP±©Á¦¹¥»÷µÄ·ÖÎö»ã±¨£¬¸ÃÏî×êÑÐÊÇ»ùÓÚ´Ó³¬¹ý4.5Íò¸ö×°ÖÃÁËÃâ·ÑMicrosoft Defender ATPµÄ¹¤×÷Õ¾ÉÏÍøÂçµÄÊý¾Ý¡£ÕâЩÊý¾ÝÓëʧ°ÜºÍ³É¹¦µÄRDPµÇ¼ÊÂÎñÓйأ¨±ðÀëÊÇIDΪ4265ºÍ4264µÄWindowsÊÂÎñ£©£¬²¢ÇÒÉæ¼°Óû§/¹¥»÷Õß¿ÉÄÜʹÓõÄÓû§Ãû¾ßÌåÐÅÏ¢£¬Êý¾ÝÍøÂçÁ˼¸¸öԵŦ·ò¡£Î¢ÈíÔڻ㱨ÖаµÊ¾£¬×î½ü¹Û²ìµ½µÄRDP±©Á¦¹¥»÷¾ùÔȳÖÐø2-3Ì죬Լ90£¥µÄ°¸Àý³ÖÐø¹¦·òÔÚÒ»ÖÜÄÚ£¬Ö»Óв»µ½5£¥µÄ°¸Àý³ÖÐø¹¦·òÔÚÁ½ÖÜ»òÒÔÉÏ¡£Ô¼ÓÐ0.08£¥µÄRDP±©Á¦¹¥»÷³É¹¦½øÐÐÁ˵Ǽ¡£
ÔÎÄÁ´½Ó£º
https://www.microsoft.com/security/blog/2019/12/18/data-science-for-cybersecurity-a-probabilistic-time-series-model-for-detecting-rdp-inbound-brute-force-attacks/
3¡¢MITRE°ä²¼ºÏÓÃÓÚ¹¤Òµ½ÚÔìϵͳµÄATT£¦CK¿ò¼Ü
±¾ÖܶþMITER°ä²¼ÁËÆäATT£¦CK¿ò¼ÜµÄ³õʼ°æ±¾£¬¸Ã°æ±¾³Áµã¹Ø×¢ÁËÕë¶Ô¹¤Òµ½ÚÔìϵͳ£¨ICS£©µÄ¶ñÒâ¹¥»÷ÕßʹÓõÄÕ½ÊõºÍ¼¼Êõ¡£Ö¼ÔÚÔ®Êֹؼü»ù´¡ÉèÊ©ºÍÆäËûʹÓÃICSµÄ×éÖ¯ÆÀ¹ÀÆäÍøÂç·çÏÕ¡£³ýÁËÌṩ¹¥»÷Õ½ÊõºÍ¼¼Êõ¾ØÕó±í£¬»¹½éÉÜÁ˹¥»÷¼¼ÊõµÄϸ½Ú¡¢¹¥»÷ÕßʹÓõĶñÒâÈí¼þÒÔ¼°ÒÑÖªµÄÕë¶ÔICSµÄ·¸×ïÍŻËü»¹Ô̺¬Ò»¸ö×ʲúÀà±ð£¬ÓÃÓÚÔ®ÊÖ×éÖ¯Ïàʶ¿ÉÀûÓÃÓÚÆä»·¾³µÄ¼¼Êõ¡£´Ë°æ±¾ÃèÊöÁË81ÖÖ¹¥»÷¼¼Êõ¡¢17ÖÖ¶ñÒâÈí¼þ¡¢10¸ö·¸×ïÍÅ»ïºÍ7ÖÖ×ʲú¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/mitre-releases-attck-knowledge-base-industrial-control-systems
4¡¢Î¢Èí½¨¸´AccessÖеÄÐÅϢй¶·ì϶£¨CVE-2019-1463£©
µç×ÓÓʼþ°²È«¹«Ë¾Mimecastй©£¬Microsoft AccessÖеÄÐÅϢй¶·ì϶¿ÉÄܵ¼ÖÂϵͳÄÚ´æÖеÄÃô¸ÐÊý¾Ý±»ÎÞÒâÖб£ÁôÔÚÊý¾Ý¿âÎļþÖС£¸Ã·ì϶£¨CVE-2019-1463£©±»³ÆÎªMDB Leaker£¬Óë¡°ÀûÓ÷¨Ê½¶ÔϵͳÄÚ´æµÄ²»µ±ÖÎÀí¡±Óйأ¬Ëü¿ÉÄܵ¼ÖÂδ³õʼ»¯µÄÄÚ´æÔªËصÄÄÚÈݱ£Áôµ½Microsoft Access MDBÎļþÖС£Ö»¹ÜÕâЩÊý¾Ý¿ÉÄܺÁÎÞÓô¦£¬µ«ËüÒ²¿ÉÄÜÔ̺¬¸ß¶ÈÃô¸ÐµÄÐÅÏ¢£¬ÀýÈçÃÜÂë¡¢WebÒªÇó¡¢Ö¤ÊéÒÔ¼°Óò»òÓû§Êý¾Ý¡£Mimecast°µÊ¾Ä¿Ç°²»»á°ä²¼ÓйØCVE-2019-1463µÄÈκμ¼ÊõÐÅÏ¢£¬Ò²Ã»ÓÐÖ¤¾ÝÅú×¢¸Ã·ì϶ÒÑÔÚÒ°±í±»ÀûÓá£Î¢ÈíÒÑÔÚ2019Äê12ÔµIJ¹¶¡¸üÐÂÖн¨¸´Á˸÷ì϶£¬Æ¾¾Ý΢ÈíµÄ˵·¨£¬¸Ã·ì϶»áÓ°ÏìOffice 2010¡¢2013¡¢2016¡¢2019ºÍ365 ProPlus¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/microsoft-access-files-could-include-unintentionally-saved-sensitive-data
5¡¢Mozilla°ä²¼¸üÐÂ,½¨¸´Firefox 0day·ì϶(CVE-2019-11707)
Mozilla°ä²¼ÁËFirefox 72.0.1ºÍFirefox ESR 68.4.1£¬½¨¸´ÒÑÔÚÒ°±í±»»ý¼«ÀûÓõÄ0day£¨CVE-2019-11707£©¡£¸Ã·ì϶±»¹éÀàΪÀàÐÍ»ìºÏ·ì϶£¬Ó°ÏìÁËIonMonkey JIT±àÒëÆ÷£¬Æ¾¾ÝMozillaµÄ°²È«²¼¸æ£¬IonMonkey JIT±àÒëÆ÷ÖÐÓÃÓÚÉèÖÃÊý×éÔªËØµÄ±ðºÅÐÅÏ¢²»ÕýÈ·£¬¿ÉÄܻᵼÖÂÀàÐÍ»ìºÏ¡£Ç±ÔÚ¹¥»÷Õß¿Éͨ¹ý½«Óû§³Á¶¨ÏòÖÁ¶ñÒâÍøÒ³À´´¥·¢¸Ã·ì϶£¬µ¼Ö´úÂëÖ´Ðлò´¥·¢±ÀÀ£¡£ÃÀ¹úCISAÒ²·¢³öÖÒ¸æ³Æ¹¥»÷Õß¿ÉÄÜÀûÓô˷ì϶À´½ÚÔìÊÜÓ°ÏìµÄϵͳ£¬²¢½¨ÒéÓû§²é¿´Mozilla°²È«´«µÝºÍÀûÓð²È«¸üС£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/mozilla-firefox-7201-patches-actively-exploited-zero-day/


¾©¹«Íø°²±¸11010802024551ºÅ