PAN OS±£´æCVSSv3ÆÀ·Ö10µÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¬£¬£¬£¬£¬£¬¿ÉÈÆ¹ý·À»ðǽ£»£»£»£»ºÚ¿Íй¶°ÍÎ÷×Üͳ¼°20Íò¹«ÎñԱСÎÒ˽¼ÒÐÅÏ¢
Ðû²¼Ê±¼ä 2020-06-301.PAN OS±£´æCVSSv3ÆÀ·Ö10µÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¬£¬£¬£¬£¬£¬¿ÉÈÆ¹ý·À»ðǽ
Palo Alto NetworksÅû¶ÁËÒ»¸öÖØ´óÎó²î£¨CVE-2020-2021£©£¬£¬£¬£¬£¬£¬¸ÃÎó²î¿ÉʹºÚ¿ÍÈÆ¹ý·À»ðǽºÍÆä¹«Ë¾VPN²úÆ·µÄÉí·ÝÑéÖ¤¡£¡£¡£¡£¡£¸ÃÎó²îÊÇÔÚCVSSv3ÑÏÖØÆ·¼¶ÖлñµÃ10·ÖµÄÓÐÊýÎó²îÖ®Ò»£¬£¬£¬£¬£¬£¬¼È²»ÐèÒª¸ß¼¶ÊÖÒÕÊÖÒÕ£¬£¬£¬£¬£¬£¬ÓÖ¿ÉÒÔͨ¹ýInternet¾ÙÐÐÔ¶³ÌʹÓᣡ£¡£¡£¡£ºÚ¿Í¿ÉÒÔʹÓøÃÎó²î¸ü¸ÄPAN OSµÄÉèÖú͹¦Ð§£¬£¬£¬£¬£¬£¬À´ÊµÏÖ¹¥»÷¡£¡£¡£¡£¡£ÃÀ¹úÍøÂç˾ÁÔòÒªÇóËùÓÐÊÜCVE-2020-2021Ó°ÏìµÄ×°±¸Á¬Ã¦ÐÞ¸´¸ÃÎó²î£¬£¬£¬£¬£¬£¬²¢ÌåÏÖÍâ¹úµÄAPT×éÖ¯¿ÉÄܺܿì¾Í»áʵÑéʹÓøÃÎó²îÌᳫ¹¥»÷¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/us-cyber-command-says-foreign-hackers-will-most-likely-exploit-new-pan-os-security-bug/
2.ºÚ¿Íй¶°ÍÎ÷×Üͳ¼°20Íò¹«ÎñԱСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬¾¯·½ÈÔÔÚÊÓ²ìÖÐ
ºÚ¿Í×éÖ¯Anonymous BrazilÉù³Æ£¬£¬£¬£¬£¬£¬°ÍÎ÷×Üͳ²©¶ûË÷ÄÉÂÞºÍËûµÄ¶ù×Ó£¬£¬£¬£¬£¬£¬ÒÔ¼°¶àÃû²¿³¤µÄСÎÒ˽¼ÒÏêϸÐÅÏ¢ÒѾй¶£¬£¬£¬£¬£¬£¬Ëæºó°ÍÎ÷Áª°î¾¯Ô±¶Ô´ËÊÂÎñÕö¿ªÁËÊӲ졣¡£¡£¡£¡£ÊӲ췢Ã÷£¬£¬£¬£¬£¬£¬³ýÁËÔÚÍøÉÏ×ß©µÄÐÅÏ¢Í⣬£¬£¬£¬£¬£¬¸ÃºÚ¿Í×éÖ¯»¹ÍµÈ¡ÁËÁè¼Ý20ÍòÃûÎäÊ¿ºÍÕþ¸®¹ÙÔ±µÄÊý¾Ý¡£¡£¡£¡£¡£ÎªÍµÊØÐÅÏ¢£¬£¬£¬£¬£¬£¬ºÚ¿Í¹¥»÷Á˶à¸öÖݵĴóѧ¡¢ÊÐÕþÌüºÍÊÐÒé»áϵͳ£¬£¬£¬£¬£¬£¬½öÔÚÄÏÀï°Â¸ñÀ¼µÂÖÝ£¬£¬£¬£¬£¬£¬¾ÍÓÐ90¶à¸ö»ú¹¹Ôâµ½¹¥»÷¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬¾¯·½¶Ô´ËÊÂÈÔÔÚÊÓ²ìÖС£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/brazilian-federal-police-investigates-presidential-data-leak/
3.SnykÐû²¼±¨¸æ£¬£¬£¬£¬£¬£¬¿ªÔ´Èí¼þ°üÖеÄÐÂÎó²î±ÈÈ¥ÄêϽµÁË20£¥
SnykÐû²¼±¨¸æÌåÏÖ£¬£¬£¬£¬£¬£¬½ñÄ꿪ԴÈí¼þ°üÖеÄÐÂÎó²îÊýÄ¿±ÈÈ¥ÄêϽµÁË20£¥¡£¡£¡£¡£¡£¸Ã±¨¸æ¶ÔÄÇЩӰÏìÁËʹÓÿªÔ´¿â×éÖ¯µÄÕûÌåÇå¾²ÐÔµÄÎó²îºÍ6¸öÖ÷Á÷µÄÉú̬ϵͳ¾ÙÐÐÁËÑо¿¡£¡£¡£¡£¡£Ñо¿·¢Ã÷£¬£¬£¬£¬£¬£¬ÔÚ2019Ä꣬£¬£¬£¬£¬£¬ÐÂÎó²îïÔÌÁ˽ü20£¥£»£»£»£»¿çÕ¾¾ç±¾Îó²îÒÀÈ»ÊÇÊÇ×î³£¼ûµÄÎó²î£»£»£»£»³£¼ûLinux¿¯ÐаæÖб¨¸æµÄÐÂÎó²îÅú×¢£¬£¬£¬£¬£¬£¬ÐèÒªÖÜÈ«¼àÊÓÈÝÆ÷Ó³ÏñÖеÄÐÂÎó²î£»£»£»£»ÔÚ´ó´ó¶¼Éú̬ϵͳÖУ¬£¬£¬£¬£¬£¬SQL×¢ÈëÎó²îÊýÄ¿ÓÐËù½µµÍ£¬£¬£¬£¬£¬£¬Ê¹ÓÃPHPµÄÎó²îÈ´ÓÐËùÔöÌí¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.helpnetsecurity.com/2020/06/29/vulnerabilities-open-source-packages/
4.¹¥»÷µÂÖÝTxDOTµÄÀÕË÷Èí¼þΪRansom X£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÕþ¸®ºÍÆóÒµ
¾ÊӲ죬£¬£¬£¬£¬£¬¹¥»÷Á˵ÿËÈøË¹ÖÝ·¨ÔººÍµÃ¿ËÈøË¹Öݽ»Í¨ÔËÊ䲿 £¨TxDOT£©µÄÀÕË÷Èí¼þΪRansom X£¬£¬£¬£¬£¬£¬ÆäÖ÷ÒªÕë¶ÔÕþ¸®ºÍÆóÒµ¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Í¨¹ý¶ÔRansom XÑù±¾µÄÑо¿£¬£¬£¬£¬£¬£¬·¢Ã÷Æä¿ÉÒÔ½«ÖÕÖ¹ÓëÇå¾²Èí¼þ¡¢Êý¾Ý¿âЧÀÍÆ÷¡¢MSPÈí¼þ¡¢Ô¶³Ì»á¼û¹¤¾ßºÍÓʼþЧÀÍÆ÷ÓйصÄ289¸öÀú³Ì£¬£¬£¬£¬£¬£¬Ëü»¹¿ÉÒÔÈÆ¹ýÖÖÖÖWindowsϵͳÎļþ¼ÐÒÔ¼°Ê¹ÓÃÁ˰üÀ¨.ani¡¢.cabºÍ.cplÔÚÄÚµÄÊýÊ®¸öÀ©Õ¹ÃûµÄËùÓÐÎļþ¡£¡£¡£¡£¡£Í¨¹ýÈÆ¹ýÕâЩÎļþ¼Ð£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔ¼ÓÃÜÅÌËã»ú£¬£¬£¬£¬£¬£¬Í¬Ê±Ò²¿ÉÒÔ¹¥»÷ÍøÂçÉÏµÄÆäËûÅÌËã»ú£¬£¬£¬£¬£¬£¬¶ø²»±Øµ£Ðį乤¾ß±»¼ÓÃÜ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/new-ransom-x-ransomware-used-in-texas-txdot-cyberattack/
5.Ó¥Ñۻع飬£¬£¬£¬£¬£¬APT30ͨ¹ýÂíÀ´Î÷ÑÇÕþ¸®¾Û»áÓʼþ·Ö·¢ÐºóÃÅ
Ñо¿Ö°Ô±·¢Ã÷APT30µÄºóÃÅÐÂÑù±¾£¬£¬£¬£¬£¬£¬°üÀ¨BACKSPACEºÍNETEAGLEºóÃÅ£¬£¬£¬£¬£¬£¬²¢Í¨¹ýÂíÀ´Î÷ÑÇÕþ¸®¾Û»áÓʼþ¾ÙÐзַ¢¡£¡£¡£¡£¡£µÚÒ»¸öºóÃŵĶñÒâÑù±¾±»Ð´ÈëÁËMicrosoft OfficeÄ£°åÎļþ¼Ð£¬£¬£¬£¬£¬£¬²¢ÒÔÂíÀ´Î÷ÑÇÕþ¸®¾Û»áÒé³ÌΪÖ÷Ì⣬£¬£¬£¬£¬£¬Í¨¹ýÓʼþ¾ÙÐзַ¢¡£¡£¡£¡£¡£µÚ¶þ¸öºóÃŵÄÑù±¾±»·ÅÔÚÆô¶¯Îļþ¼ÐÏ£¬£¬£¬£¬£¬£¬ÎļþÔÚÏµÍ³ÖØÐÂÆô¶¯ºóÔËÐС£¡£¡£¡£¡£³ý´ËÖ®Í⣬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±»¹·¢Ã÷ÁËRHttpCtrlºóÃźÍRCtrlºóÃÅ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/eagle-eye-is-back-apt30/
6.Õë¶ÔÖ½ÖÊͶƱµÄ¿ÉÀ©Õ¹²àÐŵÀ¹¥»÷¿ÉÇÔȡѡÃñÒþ˽
Ñо¿Ö°Ô±·¢Ã÷Õë¶ÔÖ½ÖÊͶƱµÄ¿ÉÀ©Õ¹²àÐŵÀ¹¥»÷£¬£¬£¬£¬£¬£¬¿ÉʹÓÃÆäÇÔȡѡÃñÒþ˽¡£¡£¡£¡£¡£Ñо¿Ö°Ô±»ùÓÚArduino¿ª·¢°åºÍÂó¿Ë·ç¹¹½¨ÁËÒ»ÖÖ×°±¸£¬£¬£¬£¬£¬£¬¸Ã×°±¸Äܹ»¸ß¾«¶ÈµØ¶Ôľ×ÀÉϱê¼ÇµÄλÖþÙÐÐÈý½ÇÕÉÁ¿£¬£¬£¬£¬£¬£¬Í¨¹ýÕâÖÖ·½·¨¿ÉÒÔ»ñµÃÑ¡ÃñÔÚѡƱÉÏ×ö³öÑ¡ÔñµÄ±ê¼Ç¡£¡£¡£¡£¡£Ö®ºóͨ¹ýÃæ²¿Ê¶±ðÀ´¾ÙÐÐÔö²¹¹¥»÷£¬£¬£¬£¬£¬£¬¼´ÔÚͶƱվÖÐ×°ÖÃÉãÏñ»ú£¬£¬£¬£¬£¬£¬ÒÔ×Ô¶¯¼ì²âÍÑÀëͶƱվµÄÖ°Ô±¡£¡£¡£¡£¡£Á¬ÏµÕâÁ½ÖÖÒªÁ죬£¬£¬£¬£¬£¬½«Õë¶ÔÖ½ÖÊͶƱ¾ÙÐÐÍêÈ«×Ô¶¯»¯µÄ¹¥»÷¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://ieeexplore.ieee.org/abstract/document/8806759/