ÐÅÏ¢°²È«Öܱ¨-2020ÄêµÚ31ÖÜ

°ä²¼¹¦·ò 2020-08-04

> ±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


2020Äê07ÔÂ27ÈÕÖÁ08ÔÂ02ÈÕ¹²ÊÕ¼°²È«·ì϶72¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇCisco SD-WAN Solution Software»º³åÇøÒç¶Âí½Å £»Grandstream HT800 series OSºÅÁî×¢Èë·ì϶ £»Ruckus Networks Unleashed C110 emfd/libemfºÅÁî×¢Èë·ì϶ £»NETGEAR R6700 httpd strtblupgrade¶Ñ»º³åÇøÒç¶Âí½Å; Softing Industrial Automation OPC »º³åÇøÒç¶Âí½Å¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊǺڿÍÀûÓõç×ÓÒøÐÐDaveÖзì϶£¬ÇÔÈ¡750ÍòÓû§Êý¾Ý £»Òò»ù´¡¼Ü¹¹ÅäÖÃÃýÎó£¬Î¢ÈíºÍAdobeµÈ¹«Ë¾Ô­´úÂëй¶ £»ºÚ¿ÍÔÚ°µÍø¹«¿ªÒÔÉ«ÁÐÊÓÆµ¹«Ë¾Promo 2200ÍòÓû§¼Í¼ £»Adobe°ä²¼°²È«¸üУ¬½¨¸´MagentoÖÐÁ½¸ö´úÂëÖ´Ðзì϶ £»GRUB2Öзì϶BootHoleÓ°ÏìÊýÊ®ÒÚWindowsºÍLinuxÉ豸¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£



>³ÁÒª°²È«·ì϶Áбí


1.Cisco SD-WAN Solution Software»º³åÇøÒç¶Âí½Å


Cisco SD-WAN Solution Software´æÔÚ»º³åÇøÒç¶Âí½Å£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉʹÀûÓ÷¨Ê½±ÀÀ £»òÒÔROOT¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdbufof-h5f5VSeL


2. Grandstream HT800 series OSºÅÁî×¢Èë·ì϶


Grandstream HT800 series´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ɴ´½¨ÅäÖÃÎļþ²¢·¢ËÍÌØÊâµÄSIPÐÂÎÅÒÔROOTȨÏÞÖ´ÐÐËÁÒâºÅÁî¡£

https://www.tenable.com/security/research/tra-2020-47


3. Ruckus Networks Unleashed C110 emfd/libemfºÅÁî×¢Èë·ì϶


Ruckus Networks Unleashed C110 emfd/libemf´æÔÚÊäÈëÑéÖ¤·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿É×¢ÈëËÁÒâºÅÁî²¢Ö´ÐС£

https://support.ruckuswireless.com/security_bulletins/304


4. NETGEAR R6700 httpd strtblupgrade¶Ñ»º³åÇøÒç¶Âí½Å


NETGEAR R6700 httpd strtblupgrade´¦ÖôæÔÚ¶ÑÒç¶Âí½Å£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉʹÀûÓ÷¨Ê½±ÀÀ £»òÄܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£

https://www.zerodayinitiative.com/advisories/ZDI-20-708/


5. Softing Industrial Automation OPC »º³åÇøÒç¶Âí½Å


Softing Industrial Automation OPC´æÔÚ»ùÓڶѵĻº³åÇøÒç¶Âí½Å£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉʹÀûÓ÷¨Ê½±ÀÀ £»òÄܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£

https://us-cert.cisa.gov/ics/advisories/icsa-20-210-02



> ³ÁÒª°²È«ÊÂÎñ×ÛÊö


1¡¢ºÚ¿ÍÀûÓõç×ÓÒøÐÐDaveÖзì϶£¬ÇÔÈ¡750ÍòÓû§Êý¾Ý


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/tech-unicorn-dave-admits-to-security-breach-impacting-7-5-million-users/#ftag=RSSbaffb68


2¡¢Òò»ù´¡¼Ü¹¹ÅäÖÃÃýÎó£¬Î¢ÈíºÍAdobeµÈ¹«Ë¾Ô­´úÂëй¶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/source-code-from-dozens-of-companies-leaked-online/


3¡¢ºÚ¿ÍÔÚ°µÍø¹«¿ªÒÔÉ«ÁÐÊÓÆµ¹«Ë¾Promo 2200ÍòÓû§¼Í¼


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/promocom-discloses-data-breach-after-22m-user-records-leaked-online/


4¡¢Adobe°ä²¼°²È«¸üУ¬½¨¸´MagentoÖÐÁ½¸ö´úÂëÖ´Ðзì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/magento-gets-security-updates-for-severe-code-execution-bugs/    


5¡¢GRUB2Öзì϶BootHoleÓ°ÏìÊýÊ®ÒÚWindowsºÍLinuxÉ豸


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/billions-of-devices-impacted-secure-boot-bypass/157843/