GRUB2ÖÐÎó²îBootHoleÓ°ÏìÊýÊ®ÒÚ×°±¸£»£»£»£»£»£»£»Ñо¿Ö°Ô±Åû¶TorÖÐÁ½¸ö0day²¢ÍýÏëÐû²¼ÁíÍâÈý¸ö
Ðû²¼Ê±¼ä 2020-07-311.GRUB2ÖÐÎó²îBootHoleÓ°ÏìÊýÊ®ÒÚWindowsºÍLinux×°±¸
EclypsiumÑо¿Ö°Ô±ÔÚ´ó¶¼LinuxϵͳʹÓõÄGRUB2Ö¸µ¼³ÌÐòÖз¢Ã÷ÁËÒ»¸öÎó²î£¬£¬£¬£¬£¬²¢½«ÆäÃüÃûΪ¡°BootHole¡±£¨CVE-2020-10713£©£¬£¬£¬£¬£¬×ÝÈ»ÆôÓÃÁËSecure Boot£¬£¬£¬£¬£¬¹¥»÷ÕßÒ²¿ÉÔÚÆô¶¯Àú³ÌÖÐÖ´ÐÐí§Òâ´úÂ룬£¬£¬£¬£¬»¹¿ÉÒÔʹÓøÃÎó²î×°Öó¤ÆÚÇÒÒþ²ØµÄbootkit»ò¶ñÒâÖ¸µ¼³ÌÐòÀ´¿ØÖÆ×°±¸¡£¡£¡£±ðµÄGRUB2»¹Ö§³ÖÆäËü²Ù×÷ϵͳ¡¢Äں˺ÍÖÎÀí³ÌÐò£¬£¬£¬£¬£¬ÀýÈ磬£¬£¬£¬£¬Xen¡£¡£¡£¸ÃÎó²î»¹Éæ¼°µ½ËùÓÐʹÓñê×¼Microsoft Third Party UEFI Certificate AuthorityµÄSecure BootµÄWindows×°±¸£¬£¬£¬£¬£¬ÀýÈ繤ҵ¡¢Ò½ÁÆ¡¢½ðÈÚµÈÐÐÒµÖÐʹÓõÄ×°±¸¾ùÊÜÓ°Ïì¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬¸ÃÎó²îÓ°ÏìÁËÊýÊ®ÒÚʹÓÃSecure BootµÄWindowsºÍLinux×°±¸¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/billions-of-devices-impacted-secure-boot-bypass/157843/
2.Ñо¿Ö°Ô±Åû¶TorÖеÄÁ½¸ö0day²¢ÍýÏëÐû²¼ÁíÍâÈý¸öÎó²î
Çå¾²Ñо¿Ö°Ô±Neal KrawetzÔÚÒÑÍùÒ»ÖÜÄÚÅú¶ÁËÁ½¸öTorÖеÄ0day£¬£¬£¬£¬£¬²¢ÔÊÐíÖÁÉÙÔÙÐû²¼Èý¸öTor 0day£¬£¬£¬£¬£¬ÆäÖÐÒ»¸ö¿ÉÒÔÕ¹ÏÖTorЧÀÍÆ÷ÕæÊµIPµØµã¡£¡£¡£´Ë´ÎÅû¶µÄÎó²îÖУ¬£¬£¬£¬£¬µÚÒ»¸ö¿É±»Ê¹ÓÃͨ¹ýɨÃèÍøÂçÅþÁ¬£¬£¬£¬£¬£¬Ñ°ÕÒTor¶ÀÍ̵ÄÊý¾Ý°üÊðÃûÀ´×èÖ¹Óû§ÅþÁ¬µ½TorÍøÂ磬£¬£¬£¬£¬¸ÃÊý¾Ý°ü¿ÉÓÃÀ´×èÖ¹TorÅþÁ¬µÄÆô¶¯²¢ÓÐÓõØÍêÈ«½ûÓÃTor¡£¡£¡£ÏñµÚÒ»¸ö0dayÒ»Ñù£¬£¬£¬£¬£¬µÚ¶þ¸öÒ²ÔÊÐíÍøÂçÔËÓªÉ̼ì²âTorÁ÷Á¿£¬£¬£¬£¬£¬µ«Ëü¿ÉÓÃÓÚ¼ì²â¼ä½ÓÅþÁ¬¡£¡£¡£Krawetz²©Ê¿ÌåÏÖ£¬£¬£¬£¬£¬Ê¹Óøú×ÙÌØ¶¨TCPÊý¾Ý°üµÄÊÖÒÕ£¬£¬£¬£¬£¬Ò²¿ÉÒÔÇáËɼì²âµ½TorÇŵÄÅþÁ¬¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/106567/hacking/tor-zero-day-flaws.html?utm_source=rss&utm_medium=rss&utm_campaign=tor-zero-day-flaws
3.˼¿ÆÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´¶à¿î²úÆ·ÖеÄ11¸öÇå¾²Îó²î
˼¿ÆÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬×ܼÆÐÞ¸´¶à¿î²úÆ·ÖеÄ11¸öÇå¾²Îó²î¡£¡£¡£ÆäÖÐÓÐÈý¸ö½ÏΪÑÏÖØµÄÎó²î£¬£¬£¬£¬£¬µÚÒ»¸öΪDCNM REST APIÖеÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2020-3382£©£¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.8£¬£¬£¬£¬£¬¾ßÓÐÖÎÀíȨÏ޵Ĺ¥»÷Õß¿ÉÔ¶³ÌÖ´ÐÐí§Òâ²Ù×÷£»£»£»£»£»£»£»µÚ¶þ¸öΪSD-WAN vManageÈí¼þÖеÄÊÚÈ¨ÈÆ¹ýÎó²î£¨CVE-2020-3374£©£¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ9.9£¬£¬£¬£¬£¬ÆäÔÊÐí¾ÓÉÉí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÈÆ¹ýÊÚȨ£¬£¬£¬£¬£¬»á¼ûÃô¸ÐÐÅÏ¢²¢ÐÞ¸ÄϵͳÉèÖ㻣»£»£»£»£»£»µÚÈý¸öΪSD-WAN½â¾ö¼Æ»®Èí¼þÖеĻº³åÇøÒç³öÎó²î(CVE-2020-3375),ÓÉÓÚÊäÈëÑé֤ȱ·¦µ¼Ö£¬£¬£¬£¬£¬ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß»á¼ûÐÅÏ¢£¬£¬£¬£¬£¬²¢¶ÔËûÃÇûÓÐȨÏÞµÄϵͳ¾ÙÐиü¸Ä¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/cisco-fixes-severe-flaws-in-data-center-management-solution/
4.Ô¼»áÈí¼þOkCupid±£´æ¶à¸öÎó²î£¬£¬£¬£¬£¬¿Éµ¼ÖÂÃô¸ÐÊý¾Ýй¶
Check Point ResearchÅû¶ÁËOkCupidÖеÄһϵÁÐÎó²î£¬£¬£¬£¬£¬¿Éµ¼ÖÂÃô¸ÐÊý¾Ýй¶¡£¡£¡£ÍøÂçÇå¾²Ñо¿Ö°Ô±¶Ô¸ÃAndroidÓ¦ÓþÙÐÐÁËÄæÏò¹¤³Ì£¬£¬£¬£¬£¬²¢·¢Ã÷ÁËÆäÉî²ãÁ´½Ó¹¦Ð§£¬£¬£¬£¬£¬ÕâÒâζ׏¥»÷Õ߿ɷ¢ËÍ×Ô½ç˵µÄ¶ñÒâÁ´½ÓÀ´·¿ª¸ÃÓ¦ÓóÌÐò¡£¡£¡£ÓÉÓÚÓ¦ÓõÄÓû§ÉèÖù¦Ð§ÖеıàÂëÎÊÌ⣬£¬£¬£¬£¬Ñо¿Ö°Ô±»¹·¢Ã÷ÁË·´Éä¿çÕ¾µã¾ç±¾£¨XSS£©¹¥»÷ǰÑÔ¡£¡£¡£½«¶þÕßÁ¬ÏµÆðÀ´£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔ´Ó×Ô¼ºµÄЧÀÍÆ÷·¢ËÍHTTP GETÇëÇóºÍXSSÓÐÓøºÔØ£¬£¬£¬£¬£¬È»ºó¿ÉÒÔͨ¹ýWebViewÖ´ÐÐJavaScript¡£¡£¡£Õâ¿ÉÄܵ¼Ö¸ÃÓ¦ÓÃÉϵÄÃô¸ÐÉèÖÃÎļþÊý¾Ý̻¶£¬£¬£¬£¬£¬Óû§ÕÊ»§Ð®ÖÆÒÔ¼°Óû§Éí·ÝÑéÖ¤ÁîÅÆ¡¢IDÒÔ¼°µç×ÓÓʼþµØµãй¶¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/okcupid-hackers-want-your-data-not-a-relationship/#ftag=RSSbaffb68
5.FBIÖÒÑÔNetwalkerÕë¶Ô¹ú¼ÒµÄ¹¥»÷»î¶¯²¢Ðû²¼Î£º¦Ö¸±ê
FBIÖÒÑÔÓйØNetwalkerÕë¶ÔÃÀ¹úºÍÍâ¹úÕþ¸®×éÖ¯µÄ¹¥»÷»î¶¯²¢Ðû²¼Î£º¦Ö¸±ê¡£¡£¡£FBIÌåÏÖ£¬£¬£¬£¬£¬¸ÃÀÕË÷Èí¼þÍÅ»ï´Ó2020Äê6ÔÂ×îÏÈÕë¶ÔÃÀ¹úºÍÍâ¹úÕþ¸®×éÖ¯£¬£¬£¬£¬£¬´ËǰNetwalker¼ÓÃÜÁ˼ÓÖÝ´óѧ¾É½ðɽ·ÖУҽѧԺµÄϵͳ£¬£¬£¬£¬£¬Ö®ºó£¬£¬£¬£¬£¬ÓÖÁ½´Î¹¥»÷Á˰ĴóÀûÑÇÔËÊäºÍÎïÁ÷¹«Ë¾Toll Group£¬£¬£¬£¬£¬ÔÚ±¾Ô¹¥»÷ÁËLorienÒ½Ôº¡£¡£¡£FBI»¹·¢Ã÷£¬£¬£¬£¬£¬NetwalkerÍÅ»ïÔÚ3Ô·Ýͨ¹ýʹÓÃVisual Basic¾ç±¾£¨VBS£©Ìá³«ÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬4Ô·ÝÓÖ×îÏÈʹÓÃÒ×Êܹ¥»÷µÄÐéÄâרÓÃÍø£¨VPN£©×°±¸Ìᳫ¹¥»÷¡£¡£¡£FBI±Þ²ßÊܺ¦Õß¾Ù±¨ÀÕË÷Èí¼þÊÂÎñ£¬£¬£¬£¬£¬ÒÔ×ÊÖú×·×Ù¹¥»÷Õß²¢Ìá·ÀδÀ´µÄ¹¥»÷¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/fbi-warns-of-netwalker-ransomware-targeting-us-government-and-orgs/
6.¿¨°Í˹»ù·¢Ã÷ºÚ¿Í×éÖ¯DeceptikonsÖ÷ÒªÕë¶ÔÅ·ÖÞÂÉËù
ÍøÂçÇå¾²¹«Ë¾¿¨°Í˹»ù·¢Ã÷ÁËÒ»¸öеĺڿÍ×éÖ¯Deceptikons£¬£¬£¬£¬£¬ÆäÖ÷ÒªÕë¶ÔÅ·ÖÞ״ʦÊÂÎñËùºÍ½ðÈڿƼ¼¹«Ë¾¡£¡£¡£¸Ã×é֯רעÓÚÇÔÈ¡ÉÌÒµºÍ½ðÈÚÉñÃØ£¬£¬£¬£¬£¬¶ø²»ÊÇÓëÕþ¸®ÓйصÄÐÅÏ¢£¬£¬£¬£¬£¬ÆäÖ÷ҪĿµÄ¶¼Î»ÓÚÅ·ÖÞ£¬£¬£¬£¬£¬ÎÞÒâÒ²ÓÐһЩÖж«¹ú¼Ò£¬£¬£¬£¬£¬ÀýÈçÒÔÉ«ÁУ¬£¬£¬£¬£¬Ô¼µ©ºÍ°£¼°¡£¡£¡£¸Ã×éÖ¯ÔÚ×î½üµÄ¹¥»÷ÖжԶà¸öÅ·ÖÞ״ʦÊÂÎñËùÌᳫÁËÓã²æÊ½ÍøÂç´¹ÂÚ¹¥»÷£¬£¬£¬£¬£¬²¢Í¨¹ý¶ñÒâPowerShell½ÅÔÀ´Ñ¬È¾Ö÷»ú¡£¡£¡£¿£¿£¿£¿¨°Í˹»ùÌåÏÖ£¬£¬£¬£¬£¬DeceptikonsÔÚÊÖÒÕÉϲ¢²»¿ÉÊ죬£¬£¬£¬£¬ÏÖÔÚ»¹Ã»ÓÐʹÓùýÁãÈÕÎó²î£¬£¬£¬£¬£¬´ó´ó¶¼¹¥»÷¶¼×ñÕÕÏàËÆµÄģʽ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/kaspersky-new-hacker-for-hire-mercenary-group-is-targeting-european-law-firms/#ftag=RSSbaffb68