˼¿ÆÐÞ¸´·¢Ã÷ÐÒ飨CDP£©ÖÐÎå¸ö¸ßΣÎó²î£¬£¬£¬£¬£¬£¬Ó°ÏìÊý°ÙÍò×°±¸£»£»£»£»£»£»Ñо¿Ö°Ô±Åû¶º£Ë¼Ð¾Æ¬ÖÐÉÐδÐÞ¸´µÄºóÃÅÎó²î¼°PoC
Ðû²¼Ê±¼ä 2020-02-071.˼¿ÆÐÞ¸´·¢Ã÷ÐÒ飨CDP£©ÖÐÎå¸ö¸ßΣÎó²î£¬£¬£¬£¬£¬£¬Ó°ÏìÊý°ÙÍò×°±¸
ÎïÁªÍøÇå¾²¹«Ë¾ArmisÔÚ˼¿Æ·¢Ã÷ÐÒ飨CDP£©Öз¢Ã÷Îå¸ö¸ßΣÎó²î£¬£¬£¬£¬£¬£¬Ó°ÏìÊý°ÙÍò×°±¸¡£¡£¡£¡£¡£CDPÊÇ˼¿Æ×°±¸Ê¹ÓõÄרÓеÚ2²ã£¨Êý¾ÝÁ´Â·²ã£©ÐÒ飬£¬£¬£¬£¬£¬ÓÃÓÚ·¢Ã÷ÍâµØÍøÂçÉÏµÄÆäËü˼¿Æ×°±¸¡£¡£¡£¡£¡£Ä¬ÈÏÇéÐÎÏ£¬£¬£¬£¬£¬£¬ÏÕЩËùÓÐ˼¿Æ²úÆ·£¨°üÀ¨Â·ÓÉÆ÷¡¢½»Á÷»úÒÔ¼°IPµç»°ºÍÉãÏñ»ú£©¾ùÆôÓôËÐÒé¡£¡£¡£¡£¡£ÕâÎå¸öÎó²î±»³ÆÎªCDPwn£¬£¬£¬£¬£¬£¬°üÀ¨ËĸöÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2020-3110¡¢CVE-2020-3111¡¢CVE-2020-3118¡¢CVE-2020-3119£©ºÍÒ»¸ö¾Ü¾øÐ§ÀÍÎó²î£¨CVE-2020-3120£©¡£¡£¡£¡£¡£ÒÑÍùÊ®ÄêÖÐÐû²¼µÄ˼¿Æ¹Ì¼þ°æ±¾¾ùÊܵ½ÕâЩÎó²îµÄÓ°Ï죬£¬£¬£¬£¬£¬ÕâЩÎó²î¿ÉÄÜÊ¹ÉøÍ¸µ½ÆóÒµÍøÂçÖеÄÍâµØ¹¥»÷ÕßÄܹ»Ö´ÐÐÖÐÐÄÈ˹¥»÷¡¢¼àÊÓÓïÒô»òÊÓÆµºô½Ð¡¢ÍøÂçºÍ×ß©Êý¾ÝÒÔ¼°ÆÆËðÍøÂç·Ö¶Î¡£¡£¡£¡£¡£ÏÖÔÚ˼¿ÆÒѾÐû²¼ÁËÏà¹Ø²úÆ·µÄ¹Ì¼þ¸üÐÂÀ´ÐÞ¸´ÕâЩÎó²î¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/cisco-patches-critical-cdp-flaws-affecting-millions-of-devices/
2.Ñо¿Ö°Ô±Åû¶º£Ë¼Ð¾Æ¬ÖÐÉÐδÐÞ¸´µÄºóÃÅÎó²î¼°PoC
¶íÂÞ˹Ç徲ר¼ÒVladislav YarmakÐû²¼ÁËËûÔÚº£Ë¼Ð¾Æ¬Öз¢Ã÷µÄºóÃÅ»úÖÆµÄÊÖÒÕϸ½Ú£¬£¬£¬£¬£¬£¬²¢ÌåÏÖÓÉÓÚ¶Ô¹©Ó¦ÉÌȱ·¦ÐÅÈΣ¬£¬£¬£¬£¬£¬ËûûÓÐÏòº£Ë¼Åû¶¸ÃÎó²î¡£¡£¡£¡£¡£¸ÃºóÃÅ»úÖÆ¿ÉÒÔʹ¹¥»÷Õß»ñµÃroot shell»á¼ûȨÏÞ²¢ÍêÈ«¿ØÖÆ×°±¸£¬£¬£¬£¬£¬£¬ÏêϸÀ´Ëµ£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜʹÓà ºóÃÅͨ¹ýÔÚTCP¶Ë¿Ú9530ÉÏÏò»ùÓÚº£Ë¼Ð¾Æ¬µÄ×°±¸·¢ËÍһϵÁÐÏÂÁ£¬£¬£¬£¬£¬ÕâЩÏÂÁîÔÊÐí¹¥»÷ÕßÔÚ×°±¸ÉÏÆôÓÃTelnetЧÀÍ£¬£¬£¬£¬£¬£¬È»ºó¹¥»÷Õß¿ÉÒÔʹÓÃÁù¸öTelnetƾ֤֮һµÇ¼£¬£¬£¬£¬£¬£¬²¢»ñµÃ¶ÔrootÕÊ»§µÄ»á¼ûȨÏÞ¡£¡£¡£¡£¡£Yarmak»¹ÔÚgithubÉÏÐû²¼Á˸ÃÎó²îµÄPoC´úÂë¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/97367/hacking/hisilicon-chips-backdoor.html
3.Ñо¿Ö°Ô±·¢Ã÷ÃÀ¹ú¹ú·À²¿£¨DOD£©ÍøÕ¾ÔËÐÐÃÅÂÞ±ÒÍÚ¿óЧÀÍ
Çå¾²Ñо¿Ö°Ô±ÉϸöÔ·¢Ã÷ÃÀ¹ú¹ú·À²¿£¨DOD£©ÔËÓªµÄWebЧÀÍÆ÷ÖÐѬȾÁ˼ÓÃÜÇ®±ÒÍÚ¿ó½©Ê¬ÍøÂç¡£¡£¡£¡£¡£Ó¡¶ÈÇå¾²Ñо¿Ô±Nitesh Suranaͨ¹ý¹ú·À²¿µÄ¹Ù·½Îó²îÉͽðÍýÏë·¢Ã÷²¢±¨¸æÁË´ËÎÊÌâ¡£¡£¡£¡£¡£×î³õ£¬£¬£¬£¬£¬£¬Îó²î±¨¸æÊÇÕë¶ÔÓëDODÓò¹ØÁªµÄAWSЧÀÍÆ÷ÉÏÔËÐеÄÉèÖùýʧµÄJenkins×Ô¶¯»¯Ð§ÀÍÆ÷Ìá½»µÄ£¬£¬£¬£¬£¬£¬Surana·¢Ã÷ÈκÎÈ˶¼¿ÉÒÔÔÚûÓеǼƾ֤µÄÇéÐÎÏ»á¼ûJenkinsЧÀÍÆ÷¡£¡£¡£¡£¡£ØÊºóSuranaÒâʶµ½¸ÃJenkinsЧÀÍÆ÷ÔÚËû·¢Ã÷֮ǰÒѾѬȾÁËÃÅÂÞ±ÒÍÚ¿ó½©Ê¬ÍøÂç¡£¡£¡£¡£¡£Ê¹ÓÃXMRHunterЧÀÍ£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷½©Ê¬ÍøÂçµÄÃÅÂޱҵصãÄ¿½ñ³ÖÓÐ35.4¸öÃÅÂÞ±Ò£¬£¬£¬£¬£¬£¬¼ÛÖµÂÔ¸ßÓÚ2700ÃÀÔª£¬£¬£¬£¬£¬£¬µ«Õâ²¢²»¿É׼ȷԤ¼Æ¸Ã½©Ê¬ÍøÂçµÄÔËÐÐÇéÐΡ£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/bug-hunter-finds-cryptocurrency-mining-botnet-on-dod-network/
4.ÂíË¹ÌØÀïºÕÌØ´óѧÏòÀÕË÷Èí¼þ¹¥»÷ÕßÖ§¸¶30±ÈÌØ±ÒÊê½ð
ÂíË¹ÌØÀïºÕÌØ´óѧÌåÏÖÔÚÔâµ½ÀÕË÷Èí¼þ¹¥»÷ºó£¬£¬£¬£¬£¬£¬ËüÖ§¸¶ÁË30±ÈÌØ±ÒµÄÊê½ðÒÔ»Ö¸´ÆäÅÌËã»úϵͳ¡£¡£¡£¡£¡£¸Ã´óѧ¸±Ð£³¤Äá¿Ë¡¤²©Ë¹£¨Nick Bos£©ÔÚÐÂÎÅÐû²¼»áÉÏ·ÖÏíÁËÕâÒ»Êý×Ö¡£¡£¡£¡£¡£BosÖ¸³ö£¬£¬£¬£¬£¬£¬¸ÃÊÂÎñʼÓÚ2019Äê11Ô£¬£¬£¬£¬£¬£¬´¹ÂÚ¹¥»÷ÕßÈëÇÖÁËÒ»Ãû´óѧԱ¹¤µÄµç×ÓÓʼþÕÊ»§£¬£¬£¬£¬£¬£¬È»ºóÔÚ12ÔÂ24ÈÕͨ¹ýÀÕË÷Èí¼þÑ¬È¾Ëø¶¨ÁË´óѧµÄÅÌËã»úϵͳ£¬£¬£¬£¬£¬£¬µ¼ÖÂÔ±¹¤ÎÞ·¨»á¼ûÆäµç×ÓÓʼþ»òÊÂÇéÕ¾¡£¡£¡£¡£¡£Æ¾Ö¤Êý×ÖÇå¾²¹«Ë¾Fox-ITµÄÊӲ죬£¬£¬£¬£¬£¬¸Ã¹¥»÷ÊÂÎñÓë·¸·¨ÍÅ»ïTA505Óйء£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.tripwire.com/state-of-security/security-data-protection/university-of-maastricht-paid-30-bitcoins-to-ransomware-attackers/
5.ÈÕ±¾¹ú·À³Ð°üÉÌPascoºÍKobelco»®·ÖÅû¶ºÚ¿ÍÈëÇÖÊÂÎñ
ÈÕ±¾¹ú·À³Ð°üÉÌPasco Corporation£¨Pasco£©ºÍKobe Steel£¨Kobelco£©»®·ÖÅû¶ÁË2018Äê5ÔºÍ2015Äê6ÔÂ/2016Äê8Ô±¬·¢µÄºÚ¿ÍÈëÇÖÊÂÎñ¡£¡£¡£¡£¡£KobelcoÊÇÈÕ±¾×ÔÎÀ¶Ó£¨SDF£©Ç±Í§Áã¼þµÄ×ÅÃû¹©Ó¦ÉÌ£¬£¬£¬£¬£¬£¬¶øPascoÊÇÎÀÐÇÊý¾ÝµÄÌṩÉÌ£¬£¬£¬£¬£¬£¬¶þÕß»¹È·ÈÏÁËÁ½´ÎÊÂÎñʱ´úÆäÄÚ²¿ÍøÂç¾ùÔ⵽δÊÚȨ»á¼ûÒÔ¼°ÔÚ¹¥»÷ºóÆäÅÌËã»úϵͳÔâµ½¶ñÒâÈí¼þѬȾ¡£¡£¡£¡£¡£Æ¾Ö¤Pasco½ÒÏþµÄ¹Ù·½ÉùÃ÷£¬£¬£¬£¬£¬£¬µ½ÏÖÔÚΪֹÊÓ²ìÖÐûÓз¢Ã÷ÖîÈçÐÅÏ¢×ß©֮ÀàµÄË𺦡£¡£¡£¡£¡£µ«Ö»¹ÜKobelcoµÄ¹Ù·½ÉùÃ÷ûÓÐÌá¼°£¬£¬£¬£¬£¬£¬¡¶ÈÕ¾ÐÂÎÅ¡· ±¨µÀ¸Ã¹«Ë¾µÄ250¸ö°üÀ¨Óë¹ú·À²¿ºÍСÎÒ˽¼ÒÐÅÏ¢ÓйصÄÊý¾ÝÎļþÔâµ½Ë𺦡£¡£¡£¡£¡£Á½¼Ò¹«Ë¾ÊÇ2016ÄêÖÁ2019Äêʱ´úÈÕ±¾±»ºÚ¿ÍÈëÇÖµÄËļÒÓë¹ú·ÀÓйصĹ«Ë¾ÖеÄ×îºóÁ½¼Ò£¬£¬£¬£¬£¬£¬ÁíÍâÁ½¼ÒÊÇÈýÁâµç»úºÍNEC£¬£¬£¬£¬£¬£¬ËüÃÇ»®·ÖÔÚ1ÔÂ20ÈÕºÍ1ÔÂ30ÈÕÐû²¼µÄÉùÃ÷ÖÐ֤ʵÆäϵͳÔâµ½ÈëÇÖ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/japanese-defense-contractors-kobe-steel-pasco-disclose-breaches/
6.¶íÀÕ¸ÔÖÝÒ½Áƹ©Ó¦ÉÌHealth Shareй¶65.4Íò»¼ÕßÐÅÏ¢
¶íÀÕ¸ÔÖÝÒ½ÁƽòÌùе÷×éÖ¯£¨CCO£©µÄHealth ShareÅû¶һÏîÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬£¬£¬ÔÚÔËÊ乩ӦÉÌGridWorks ICµÄÌõ¼Ç±¾µçÄÔ±»µÁºó¹²ÓÐ654362Ãû»¼ÕßµÄÐÅϢй¶¡£¡£¡£¡£¡£¸ÃÊÂÎñ±¬·¢ÔÚ2019Äê11ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬±»µÁµÄÌõ¼Ç±¾µçÄÔ°üÀ¨¼¸ÖÖÀàÐ͵ϼÕßÐÅÏ¢£¬£¬£¬£¬£¬£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢µç»°ºÅÂë¡¢³öÉúÈÕÆÚ¡¢Éç»á°ü¹ÜºÅºÍÒ½ÁƽòÌùIDºÅ¡£¡£¡£¡£¡£Æ¾Ö¤Health ShareµÄÉùÃ÷£¬£¬£¬£¬£¬£¬¸ÃÊÂÎñ²¢Î´Ì»Â¶»¼ÕßµÄÒ½ÁÆÀúÊ·¼Í¼¡£¡£¡£¡£¡£Health Share½«ÎªÊÜÓ°ÏìµÄ»¼ÕßÌṩ1ÄêµÄÃâ·ÑÉí·Ý¼à¿ØÐ§ÀÍ£¬£¬£¬£¬£¬£¬°üÀ¨ÐÅÓÃ¼à¿Ø¡¢Ú²Æ×ÉѯºÍÉí·Ý͵ÇÔ»Ö¸´¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/medicaid-cco-vendor-breach-exposes-health-personal-info-of-654k/