CodeMeterÖб£´æÑÏÖØÎó²î£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂOT¹©Ó¦Á´¹¥»÷£»£»£»£»ACSCÐû²¼¡¶2019¨C2020Äê¶ÈÍøÂçÍþв±¨¸æ¡·
Ðû²¼Ê±¼ä 2020-09-11Claroty·¢Ã÷Î÷ÃÅ×ӵȶ¥¼¶ICS¹©Ó¦ÉÌʹÓõĵÚÈý·½¹¤Òµ×é¼þCodeMeterÖб£´æ6¸öÑÏÖØµÄÎó²î£¬£¬£¬£¬£¬£¬»ò½«µ¼ÖÂOT¹©Ó¦Á´¹¥»÷£¬£¬£¬£¬£¬£¬ÕâЩÎó²îµÄCVSSÆÀ·Ö¾ùΪ10.0¡£¡£¡£¡£CISAÌåÏÖ£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÀÖ³ÉʹÓÃÕâЩÎó²îºó¿É¸ü¸ÄºÍαÔìÔÊÐíÖ¤Îļþ£¬£¬£¬£¬£¬£¬µ¼Ö¾ܾøÐ§ÀÍÇéÐΣ¬£¬£¬£¬£¬£¬Ç±ÔÚµØÊµÏÖÔ¶³ÌÖ´ÐдúÂë¡¢¶ÁÈ¡¶ÑÊý¾Ý²¢×èÖ¹ÒÀÀµCodeMeterµÄµÚÈý·½Èí¼þµÄÕý³£ÔËÐС£¡£¡£¡£ÆäÖÐ×îÑÏÖØµÄÎó²î¿Éͨ¹ýÆÆËðCodeMeterÍ¨Ñ¶ÐæÅºÍÄÚ²¿APÒÔIÔ¶³ÌÖ´ÐдúÂ룬£¬£¬£¬£¬£¬ÊµÏÖICSϵͳµÄÍêÈ«½ÓÊÜ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/critical-bugs-enable-ot-supply/
2.ºÚ¿Í¹¥»÷˹Âå·¥¿Ë¼ÓÃÜÇ®±ÒÉúÒâËù£¬£¬£¬£¬£¬£¬ÍµÈ¡¼ÛÖµ540ÍòÃÀԪǮ±Ò
ºÚ¿Í¹¥»÷˹Âå·¥¿Ë¼ÓÃÜÇ®±ÒÉúÒâËùETERBASE£¬£¬£¬£¬£¬£¬ÍµÈ¡Á˼ÛÖµ540ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò¡£¡£¡£¡£¸Ã¹«Ë¾ÓÚ±¾ÖÜËÄÅû¶¸ÃÊÂÎñ£¬£¬£¬£¬£¬£¬ÌåÏÖÆä´æ´¢Á˱ÈÌØ±Ò¡¢ÒÔÌ«±Ò¡¢ALGO¡¢Ripple¡¢TezosºÍTRONµÄÁù¸ö¼ÓÃÜÇ®°üÎļþ±»µÁ£¬£¬£¬£¬£¬£¬ÆäÒѼì²âµ½¹¥»÷£¬£¬£¬£¬£¬£¬µ«ÎÞ·¨×èÖ¹ËüµÄ±¬·¢¡£¡£¡£¡£ETERBASEÌåÏÖ£¬£¬£¬£¬£¬£¬ËüÔÚÕâЩǮ±Ò±»µÁʱ¾Í¶ÔÆä¾ÙÐÐÁ˸ú×Ù£¬£¬£¬£¬£¬£¬ÏÖÔÚ±»µÁ×ʽðÔÚ¸÷×ÔÇø¿éÁ´ÉϵÄ×ªÒÆ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾Ò²ÁªÏµÁ˱»µÁ×ʽðËùÔÚµÄÉúÒâÒÔÊǶ³½á±»µÁ×ʽ𡣡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/slovak-cryptocurrency-exchange-eterbase-discloses-5-4-million-hack/
3.Ñо¿Ö°Ô±·¢Ã÷ÐÂÐ͹¥»÷Raccoon£¬£¬£¬£¬£¬£¬Õë¶ÔTLS¼ÓÃÜÐÒéÇÔÊØÐÅÏ¢
Ñо¿Ö°Ô±Åû¶ÁËÕë¶ÔTLS¼ÓÃÜÐÒéµÄÐÂÐ͹¥»÷·½·¨Raccoon£¬£¬£¬£¬£¬£¬¸Ã¹¥»÷¿ÉÓÃÓÚ½âÃÜÓû§ºÍЧÀÍÆ÷Ö®¼äµÄHTTPSÅþÁ¬²¢¶ÁÈ¡Ãô¸ÐͨѶ¡£¡£¡£¡£Raccoon¹¥»÷´Ó»ù´¡ÉÏ˵ÊÇ׼ʱ¹¥»÷£¬£¬£¬£¬£¬£¬¹¥»÷Õß»áÕÉÁ¿Ö´ÐÐÒÑÖªÃÜÂë²Ù×÷ËùÐèµÄʱ¼ä£¬£¬£¬£¬£¬£¬ÒÔÈ·¶¨²¿·ÖËã·¨¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬£¬ËùÓÐʹÓÃDiffie-HellmanÃÜÔ¿½»Á÷À´½¨ÉèTLSÅþÁ¬µÄЧÀÍÆ÷¶¼ÈÝÒ×Êܵ½´ËÀ๥»÷¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬Ò»Ð©¹©Ó¦ÉÌ£¬£¬£¬£¬£¬£¬ÈçMicrosoft¡¢Mozilla¡¢OpenSSLºÍF5 NetworksÒÑÐû²¼Çå¾²¸üÐÂÒÔ×èÖ¹Raccoon¹¥»÷¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions/
4.ZeppelinÉý¼¶»Ø¹é£¬£¬£¬£¬£¬£¬ÒÔ·¢Æ±ÎªÖ÷ÌâÈö²¥ÐµÄľÂí
Ñо¿Ö°Ô±Juniper Threatlab·¢Ã÷ZeppelinÉý¼¶»Ø¹é£¬£¬£¬£¬£¬£¬ÒÔ·¢Æ±ÎªÖ÷ÌâÈö²¥ÐµÄľÂí¡£¡£¡£¡£ÔÚ×îÐµĹ¥»÷»î¶¯ÖУ¬£¬£¬£¬£¬£¬ºÚ¿ÍÒÀȻʹÓôøÓжñÒâºêµÄÖ÷ÌâΪ·¢Æ±´¹ÂÚµç×ÓÓʼþ¡£¡£¡£¡£ºÚ¿Í½«Visual Basic¾ç±¾µÄƬ¶ÏÒþ²ØÔÚÖÖÖÖͼÏñºóµÄÀ¬»øÎı¾ÖУ¬£¬£¬£¬£¬£¬¶ñÒâºê»áÆÊÎö²¢ÌáÈ¡ÕâЩ¾ç±¾£¬£¬£¬£¬£¬£¬È»ºó½«ÆäдÈëc£º\wordpress\about1.vbsÖеÄÎļþÖС£¡£¡£¡£Ö®ºó£¬£¬£¬£¬£¬£¬Ê¹Óõڶþ¸öºêÖ´ÐÐabout1.vbs£¬£¬£¬£¬£¬£¬ÒÔÏÂÔØÐµÄľÂí¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/zeppelin-ransomware-returns-trojan/159092/
5.ÈýÐÇÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´GalaxyÉϵĶà¸öÎó²î
ÔÚAndroidÐû²¼ÁË9ÔÂÇå¾²¸üк󣬣¬£¬£¬£¬£¬ÈýÐÇÒ²Ðû²¼ÁËÇå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´ÆäGalaxyÉϵĶà¸öÎó²î¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄ×îÑÏÖØµÄÎó²îÖ®Ò»±»×·×ÙΪCVE-2020-0245£¬£¬£¬£¬£¬£¬Ó°ÏìÁËMedia Framework×é¼þ£¬£¬£¬£¬£¬£¬¿Éµ¼ÖÂÔ¶³ÌÖ´ÐдúÂëºÍÐÅÏ¢Åû¶¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬»¹ÐÞ¸´ÁËÆäFramework¡¢Media FrameworkºÍϵͳÖеĶà¸öȨÏÞÌáÉýÎó²î£¨CVE-2020-0074¡¢CVE-2020-0388¡¢CVE-2020-0391¡¢CVE-2020-0401¡¢CVE-2020-0392¡¢CVE-2020-0386ºÍCVE-2020-0394£©¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/samsung-fixes-critical-android-flaws-with-september-updates/
6.ACSCÐû²¼¡¶2019¨C2020Äê¶ÈÍøÂçÍþв±¨¸æ¡·
°Ä´óÀûÑÇÍøÂçÇå¾²ÖÐÐÄ£¨ACSC£©ÒÑÐû²¼ÓйØ2019-2020ÄêÖ÷ÒªÍøÂçÍþвºÍͳ¼ÆÊý¾ÝµÄÄê¶È±¨¸æ¡£¡£¡£¡£¸Ã±¨¸æÇ¿µ÷Ö¸³ö£¬£¬£¬£¬£¬£¬ÍøÂç´¹ÂÚºÍÓã²æ´¹ÂÚÈÔÈ»ÊǺڿͻñȡСÎÒ˽¼ÒÐÅÏ¢»òÓû§Ö¤ÊéÒÔ½øÈëÍøÂç»òÈö²¥¶ñÒâÄÚÈݵÄ×î³£¼ûÒªÁ죬£¬£¬£¬£¬£¬ÀÕË÷Èí¼þÒѳÉΪ¶ÔÆóÒµºÍÕþ¸®µÄÖØ´óÍþв¡£¡£¡£¡£ºÚ¿Íͨ³£Í¨¹ýÓã²æÊ½´¹ÂÚ²»·¨»ñÈ¡Óû§µÇ¼ºÍÖ¤Ê飬£¬£¬£¬£¬£¬È»ºóʹÓÃÔ¶³Ì×ÀÃæÐÒé(RDP)ЧÀÍ×°ÖÃÀÕË÷Èí¼þ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://us-cert.cisa.gov/ncas/current-activity/2020/09/10/acsc-releases-annual-cyber-threat-report-2019-2020