ÐÅÏ¢°²È«Öܱ¨-2020ÄêµÚ34ÖÜ
°ä²¼¹¦·ò 2020-08-24> ±¾Öܰ²È«Ì¬ÊÆ×ÛÊö
2020Äê08ÔÂ17ÈÕÖÁ23ÈÕ¹²ÊÕ¼°²È«·ì϶53¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇMicro Air Vehicle LinkÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶£»Silicon Labs Bluetooth Low Energy SDK CVE-2020-15531»º³åÇøÒç¶Âí½Å£»Apache ShiroÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶£»Beijing Kuangshi Technology MEGVII KoalaδÊÚȨ½Ó¼û·ì϶; ZKTeco FaceDepotȨÏÞÌáÉý·ì϶¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇCactusPete APTÀûÓÃBisonal¹¥»÷Å·ÖÞ½ðÈں;üÊÂ×éÖ¯£»ºÚ¿Í×éÖ¯TeamTNTÀûÓüÓÃÜÈ䳿ÇÔÈ¡AWSƾ֤£»ÓÊÂÖ¹«Ë¾CarnivalϰȾÀÕË÷Èí¼þ£¬²¿ÃÅÊý¾Ý»òÒÑй¶£»Microsoft°ä²¼Windows´ø±í°²È«¸üУ¬½¨¸´ÌáȨ·ì϶£»ThalesµÄ²úÆ·´æÔÚ·ì϶£¬¿ÉÓ°ÏìÊý°ÙÍòIoTÉ豸¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£
> ³ÁÒª°²È«·ì϶Áбí
1.Micro Air Vehicle LinkÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶
Micro Air Vehicle Link (MAVLink)ʹÓÃÎÊ´ð»úÔì½øÐа汾ÐÉÌ£¬Ã»ÓÐѡȡÉí·ÝÑéÖ¤»úÔ죬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬ÈƹýÉí·ÝÑéÖ¤£¬Ö±½ÓÓë×Ô¶¯¼Ýʻϵͳ½øÐн»»¥¡£
https://github.com/aliasrobotics/RVD/issues/3316
2. Silicon Labs Bluetooth Low Energy SDK CVE-2020-15531»º³åÇøÒç¶Âí½Å
Silicon Labs Bluetooth Low Energy SDK´¦Öñ¨ÎÄÊý¾Ý´æÔÚ»º³åÇøÒç¶Âí½Å£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£
https://github.com/darkmentorllc/jackbnimble/blob/master/host/pocs/silabs_efr32_extadv_rce.py
3. Apache ShiroÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶
Apache Shiro´¦ÖÃHTTPÒªÇó´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉÈÆ¹ýÑé֤δÊÚȨ½Ó¼û¡£
https://lists.apache.org/thread.html/r539f87706094e79c5da0826030384373f0041068936912876856835f%40%3Cdev.shiro.apache.org%3E
4. Beijing Kuangshi Technology MEGVII KoalaδÊÚȨ½Ó¼û·ì϶
Beijing Kuangshi Technology MEGVII Koala 5000¶Ë¿Ú´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ɻñÈ¡ÎïÀí½Ó¼ûȨÏÞ¡£
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/vulnerability/8137/megvii-koala-291c3s-architectural-vulnerability-on-network-relays
5. ZKTeco FaceDepotȨÏÞÌáÉý·ì϶
ZKTeco FaceDepot´æÔÚÁîÅÆ³ÁÓð²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ɴ´½¨ËÁÒâÓû§£¬ÌáÉýȨÏÞ£¬²¢ÏÂÔØÊý¾Ý¿âµÈ¡£
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/vulnerability/8134/zkteco-facedepot-7b-10213-and-zkbiosecurity-server-10020190723-improper-privilege-vulnerability
> ³ÁÒª°²È«ÊÂÎñ×ÛÊö
1¡¢CactusPete APTÀûÓÃBisonal¹¥»÷Å·ÖÞ½ðÈں;üÊÂ×éÖ¯

¿¨°Í˹»ù·¢ÏÖCactusPete APTÕý½øÐÐÒ»³¡Õë¶ÔÕû¸ö¶«Å·¾üʺͽðÈÚ×éÖ¯µÄ»î¶¯£¬²¢Ê¹ÓÃÁ˺óÃÅBisonalµÄбäÌå¡£¸Ã×éÖ¯ÓÚ2013Äê³õ´Î±»·¢ÏÖ£¬ÓëÅ·ÖÞ¡¢¶íÂÞ˹¡¢ÈÕ±¾ºÍº«¹úµÄÍøÂç·¸×ï»î¶¯Óйأ¬×¨ÃÅ´Óʵý±¨ÍøÂçºÍ¼äµý»î¶¯¡£CactusPeteʹÓõÄBisonalÊÇÒ»ÖÖÍøÂç¼äµý¹¤¾ß£¬¿ÉÄÜά³Ö¶ÔÊÜϰȾ»úеµÄÓÆ¾ÃÐÔ£¬¿ÉɨÃèÇý¶¯Æ÷¡¢Áгö²¢Ð¹Â¼ûô¸ÐµÄÎļþ¡¢É¾³ýÄÚÈÝ¡¢É±ËÀϵͳ¹ý³ÌÒÔ¼°Ö´ÐдúÂë¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/cactuspete-threat-group-goes-on-the-rampage-with-a-new-bisonal-backdoor/
2¡¢ºÚ¿Í×éÖ¯TeamTNTÀûÓüÓÃÜÈ䳿ÇÔÈ¡AWSƾ֤

TeamTNTÊÇÒ»¸öÕë¶ÔDocker×°ÖõÄÍøÂç·¸×ï×éÖ¯£¬»òÐíΪµÚÒ»¸öʹÆ÷ÓµÓÐÇÔÈ¡AWSƾְ֤ÄܵļÓÃÜÍÚ¾ò¶ñÒâÈí¼þµÄ×éÖ¯¡£Trend Micro½ñÄêÔçЩʱ³½·¢ÏÖ£¬¸Ã×éÖ¯´Ó4ÔÂÆðÍ·»îÔ¾£¬Í¨¹ýÔÚ»¥ÁªÍøÉÏɨÃèÅäÖÃÃýÎóµÄDockerϵͳ½Ó¼û¶³öµÄAPI£¬²¢ÔÚDocker²¿Êð·þÎñÆ÷À´ÔËÐÐDDoSºÍ¼ÓÃܶñÒâÈí¼þ¡£×êÑÐÈËÔ±·¢ÏÖËû»¹Äܹ»É¨ÃèÔËÐÐÔÚAWS»ù´¡¼Ü¹¹ÉÏ·þÎñÆ÷ÖÐµÄ ~/.aws/credentials and ~/.aws/configÎļþ£¬À´»ñÈ¡Amazon Web Services£¨AWS£©Æ¾Ö¤¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/crypto-mining-worm-steal-aws-credentials/
3¡¢ÓÊÂÖ¹«Ë¾CarnivalϰȾÀÕË÷Èí¼þ£¬²¿ÃÅÊý¾Ý»òÒÑй¶

È«Çò×î´óµÄÓÊÂÖ¹«Ë¾Carnival CorpÔÚ8ÔÂ15ÈÕÔâµ½ÁËÀÕË÷Èí¼þ¹¥»÷£¬²¿ÃÅÊý¾Ý»òÒÑй¶¡£¸Ã¹«Ë¾°µÊ¾£¬ºÚ¿Í½Ó¼û²¢¼ÓÃÜÁËÆä·Ö¹«Ë¾µÄÐÅÏ¢¼¼Êõϵͳ£¬²¢ÇÒÇÔÈ¡ÁËÎļþ¡£Æ¾¾Ý¶Ô¸ÃÊÂÎñµÄ³õ²½ÆÀ¹À£¬¼ÎÄ껪ÒÔΪ£¬¹¥»÷Õß¿ÉÄÜÒѾ½Ó¼ûÁËijЩÀ´±öºÍÔ±¹¤µÄÓ×ÎÒÊý¾Ý¡£µ«ÊÇCarnivalûÓÐй©ÓйشËÊÂÎñµÄ¾ßÌåÐÅÏ¢£¬ÀýÈçÀÕË÷Èí¼þÃû³Æ£¬»òÆä¹¥»÷Ó°ÏìÁìÓòµÈ¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/worlds-largest-cruise-line-operator-discloses-ransomware-attack/
4¡¢Microsoft°ä²¼Windows´ø±í°²È«¸üУ¬½¨¸´ÌáȨ·ì϶

MicrosoftΪWindows 8.1ºÍWindows Server 2012 R2°ä²¼ÁË´ø±í°²È«¸üУ¬Ö¼ÔÚ½¨¸´ÌáȨ·ì϶£¬¸Ã·ì϶»áÓ°ÏìWindowsÔ¶³Ì½Ó¼û·þÎñ¡£Õâ´Î½¨¸´µÄÁ½¸ö·ì϶±»×·×ÙΪCVE-2020-1530ºÍCVE-2020-1537£¬¹¥»÷ÕßÔڳɹ¦ÀûÓúó¿É»ñµÃ¸ü¸ßµÄȨÏÞ¡£µ«ÊÇÔÚÀûÓÃÕâЩ·ì϶֮ǰ£¬¹¥»÷Õß±ØÒªÏÈÔÚÊܺ¦ÕßµÄÉ豸ÉϱàдִÐÐÌØÈ¨´úÂë¡£Õâ´Î¸üÐÂͨ¹ý¸üÕýWindows Remote Access´¦ÖÃÄÚ´æºÍÎļþ²Ù×÷µÄ·½Ê½À´½â¾ö·ì϶¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/microsoft-issues-out-of-band-kb4578013-windows-security-update/
5¡¢ThalesµÄ²úÆ·´æÔÚ·ì϶£¬¿ÉÓ°ÏìÊý°ÙÍòIoTÉ豸

IBMµÄ°²È«×êÑÐÈËÔ±·¢ÏÖThalesµÄ²úÆ·µÄͨѶģ¿éÖдæÔÚÑϳÁ·ì϶£¬¿ÉÓ°ÏìÊý°ÙÍòIoTÉ豸¡£¸Ã·ì϶±»×·×ÙΪCVE-2020-15858£¬ÓÚ2019Äê9Ô³õ´ÎÔÚThalesµÄCinterion EHS8 M2MÄ£¿éÖб»·¢ÏÖ£¬²¢ÓÚ2020Äê2Ô±»½¨¸´¡£ºóÀ´»¹·¢ÏÖËü»¹»áÓ°ÏìÆäËûÊ®¸öÄ£¿é¡£¸Ã·ì϶ÓëÔ̺¬ÓмÓÃÜÃÜÔ¿¡¢ÃÜÂëºÍÖ¤ÊéÖ®ÀàÐÅÏ¢µÄJava´úÂëÓйأ¬¹¥»÷ÕßÄܹ»ÀûÓô˷ìÏ¶ÈÆ¹ý°²È«»úÔì²¢½Ó¼ûÕâЩÐÅÏ¢£¬¶øºóÀûÓøÃÐÅÏ¢À´½ÚÔìÉ豸»ò½Ó¼ûÔ̺¬¸ÃÉ豸µÄÍøÂç¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/vulnerability-thales-product-could-expose-millions-iot-devices-attacks


¾©¹«Íø°²±¸11010802024551ºÅ