ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ23ÖÜ

Ðû²¼Ê±¼ä 2019-06-17

±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö



2019Äê6ÔÂ10ÈÕÖÁ16ÈÕ¹²ÊÕ¼Çå¾²Îó²î63¸ö£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇSAP E-Commerce CVE-2019-0308Ô¶³Ì´úÂë×¢ÈëÎó²î£»£»£»£»£»£»Adobe Campaigní§Òâ´úÂëÖ´ÐÐÎó²î£»£»£»£»£»£» WAGO Industrial Managed Switches SSHÓ²±àÂëÎó²î£»£»£»£»£»£»Microsoft Word CVE-2019-1034ÄÚ´æÆÆËð´úÂëÖ´ÐÐÎó²î£»£»£»£»£»£»Dahua IPC-HFW1XXXÉãÏñ»ú»º³åÇøÒç³öÎó²î¡£¡£¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇ


¹È¸è֤ʵºÚ¿ÍÔøÊ¹ÓõÚÈý·½ÔÚAndroidÊÖ»úÉÏ×°ÖúóÃÅ£»£»£»£»£»£»HSMÑÏÖØÎó²î£¬£¬£¬£¬£¬Ó°Ïì¶à¸öÒøÐС¢ÔÆÐ§ÀÍÉ̺ÍÕþ¸®»ú¹¹£»£»£»£»£»£»Ê©ÄÍµÂµçÆøModicon M580¶à¸öÎó²î£¬£¬£¬£¬£¬¿Éµ¼ÖÂDoS¼°ÐÅϢй¶£»£»£»£»£»£»·É»úÁ㲿¼þ³§ÉÌASCOÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬²¿·Ö¹¤³§ÒѹرÕ£»£»£»£»£»£»Evernote Chrome²å¼þXSSÎó²î£¬£¬£¬£¬£¬²¨¼°Ô¼460ÍòÓû§¡£¡£¡£¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£



Ö÷ÒªÇå¾²Îó²îÁбí



1. SAP E-Commerce CVE-2019-0308Ô¶³Ì´úÂë×¢ÈëÎó²î
SAP E-Commerce±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬×¢Èëí§Òâ´úÂ룬£¬£¬£¬£¬²¢ÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐС£¡£¡£¡£¡£

https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=521864242


2. Adobe Campaigní§Òâ´úÂëÖ´ÐÐÎó²î
Adobe Campaign±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬ÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£

https://helpx.adobe.com/security/products/campaign/apsb19-28.html


3. WAGO Industrial Managed Switches SSHÓ²±àÂëÎó²î
WAGO Industrial Managed Switches¶à¸ö²úÆ·±£´æÓ²±àÂëSSHÃÜÔ¿Îó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¿ÉδÊÚȨ»á¼û×°±¸¡£¡£¡£¡£¡£

https://ics-cert.us-cert.gov/advisories/ICSA-19-164-02


4. Microsoft Word CVE-2019-1034ÄÚ´æÆÆËð´úÂëÖ´ÐÐÎó²î
Microsoft Word´¦Öóͷ£WORDÎļþ±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇ󣬣¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬£¬¿ÉÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£

https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2019-1034


5. Dahua IPC-HFW1XXXÉãÏñ»ú»º³åÇøÒç³öÎó²î
Dahua IPC-HFW1XXX±£´æ»º³åÇøÒç³öÎó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¿É¾ÙÐоܾøÐ§À͹¥»÷»òÕßÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£

https://www.dahuasecurity.com/support/cybersecurity/details/617



 Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö



1¡¢¹È¸è֤ʵºÚ¿ÍÔøÊ¹ÓõÚÈý·½ÔÚAndroidÊÖ»úÉÏ×°ÖúóÃÅ

¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨

¹È¸è֤ʵ2017ÄêºÚ¿ÍÔøÊ¹ÓõÚÈý·½¹©Ó¦É̹¹½¨µÄ³ÌÐò´úÂëÔÚAndroidÊÖ»úÉÏ×°ÖÃTriadaºóÃÅ¡£¡£¡£¡£¡£¹È¸èûÓÐÏêϸ˵Ã÷ÄÄЩװ±¸Êܵ½ÁËÓ°Ï죬£¬£¬£¬£¬µ«Çå¾²³§ÉÌDr.WebÔøÔÚ2017ÄêµÄÑо¿±¨¸æÖÐÖ¸³öÊÜÓ°ÏìµÄ×°±¸Æ·ÅưüÀ¨Leagoo M5 Plues¡¢Leagoo M8¡¢Nomu S10ºÍNomu S20µÈ¡£¡£¡£¡£¡£¸ÃºóÃÅÖ¼ÔÚÏòÓû§µÄ×°±¸ÍÆËÍÀ¬»øÓʼþºÍδÊÚȨµÄ¹ã¸æµÈ¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.cyberscoop.com/android-backdoor-triada-mobile-supply-chain/

2¡¢HSMÑÏÖØÎó²î£¬£¬£¬£¬£¬Ó°Ïì¶à¸öÒøÐС¢ÔÆÐ§ÀÍÉ̺ÍÕþ¸®»ú¹¹


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


LedgerÇå¾²Ñо¿Ö°Ô±Åû¶һ¼ÒÖ÷Òª³§É̵ÄHSM£¨Ó²¼þÇ徲ģ¿£¿£¿£¿é£©ÖеÄÑÏÖØÎó²î£¬£¬£¬£¬£¬¸ÃÎó²î¿ÉÔÊÐí¼ìË÷´æ´¢ÔÚHSMÖеÄÃô¸ÐÊý¾Ý¡£¡£¡£¡£¡£HSMÊÇÓ²¼þ¸ôÀë×°±¸£¬£¬£¬£¬£¬³£ÓÃÓÚ½ðÈÚ»ú¹¹¡¢Õþ¸®»ú¹¹¡¢Êý¾ÝÖÐÐÄ¡¢ÔÆÐ§ÀÍÉ̺͵çÐÅÔËÓªÉ̵È¡£¡£¡£¡£¡£Æ¾Ö¤Ñо¿Ö°Ô±µÄ±¨¸æ£¬£¬£¬£¬£¬¸ÃÎó²îÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÍêÈ«¿ØÖÆHSM£¬£¬£¬£¬£¬´Ó¶ø¼ìË÷¼ÓÃÜÃÜÔ¿ºÍÖÎÀíԱƾ֤µÈÐÅÏ¢¡£¡£¡£¡£¡£Ñо¿Ö°Ô±²¢Î´Åû¶ÊÜÓ°ÏìµÄ³§ÉÌÃû³Æ£¬£¬£¬£¬£¬µ«CryptosenseÖ¸³ö¸Ã³§ÉÌ¿ÉÄÜÊǽðÑÅÍØ¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/major-hsm-vulnerabilities-impact-banks-cloud-providers-governments/

3¡¢Ê©ÄÍµÂµçÆøModicon M580¶à¸öÎó²î£¬£¬£¬£¬£¬¿Éµ¼ÖÂDoS¼°ÐÅϢй¶


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


˼¿ÆTalosÅû¶ʩÄÍµÂµçÆøModicon M580ÖеĶà¸öÎó²î¡£¡£¡£¡£¡£Modicon M580ÊÇÊ©ÄÍµÂµçÆøModiconϵÁпɱà³Ì×Ô¶¯»¯¿ØÖÆÆ÷µÄ×îвúÆ·£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚÆä¹Ì¼þ°æ±¾SV2.70Öз¢Ã÷¶à¸öÎó²î£¬£¬£¬£¬£¬°üÀ¨¿Éµ¼ÖÂDoSµÄÎó²î£¨CVE-2018-7846¡¢CVE-2018-7849¡¢CVE-2018-7843£©£¬£¬£¬£¬£¬¿Éµ¼ÖÂÐÅϢй¶µÄÎó²î£¨CVE-2018-7844¡¢CVE-2018-7848£©¼°Éí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2018-7842£©µÈ¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://blog.talosintelligence.com/2019/06/vulnerability-spotlight-multiple.html

4¡¢·É»úÁ㲿¼þ³§ÉÌASCOÔâÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬²¿·Ö¹¤³§ÒѹرÕ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


¾Ý±ÈÀûʱýÌ屨µÀ£¬£¬£¬£¬£¬·É»úÁ㲿¼þ³§ÉÌASCOλÓÚ±ÈÀûʱÔú·ÒÌØÄ·µÄ¹¤³§ÔâÀÕË÷Èí¼þѬȾ£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÒÑ×èÖ¹ÁËËĸö¹ú¼ÒµÄ¹¤³§Éú²ú¡£¡£¡£¡£¡£¸ÃѬȾÊÂÎñ±¬·¢ÔÚ6ÔÂ7ÈÕÐÇÆÚÎ壬£¬£¬£¬£¬×î³õÓ°ÏìÁ˸ù«Ë¾Î»ÓÚ±ÈÀûʱµÄ¹¤³§£¬£¬£¬£¬£¬µ«ASCOÒ²¹Ø±ÕÁËλÓڵ¹ú¡¢¼ÓÄôóºÍÃÀ¹úµÄ¹¤³§¡£¡£¡£¡£¡£¾Ý±¨µÀÍ£»£»£»£»£»£»úʱ¼äÔ¤¼ÆÎªÒ»ÖÜ£¬£¬£¬£¬£¬°üÀ¨¼´½«µ½À´µÄÖÜÄ©¡£¡£¡£¡£¡£¸Ã¹«Ë¾²¢Î´Í¸Â¶¸ü¶àÐÅÏ¢£¬£¬£¬£¬£¬ÏÖÔÚÒ²²»ÖªµÀÀÕË÷Èí¼þµÄÃû³Æ¡£¡£¡£¡£¡£ASCOÊÇÌìÏÂÉÏ×î´óµÄ·É»úÁ㲿¼þ³§ÉÌÖ®Ò»£¬£¬£¬£¬£¬Æä¿Í»§°üÀ¨¿Õ¿Í¡¢²¨ÒôÉõÖÁ¾üÓᢺ½¿ÕÁìÓòµÄ¹«Ë¾µÈ¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/ransomware-halts-production-for-days-at-major-airplane-parts-manufacturer/

5¡¢Evernote Chrome²å¼þXSSÎó²î£¬£¬£¬£¬£¬²¨¼°Ô¼460ÍòÓû§


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Çå¾²³§ÉÌGuardio·¢Ã÷EvernoteµÄChrome²å¼þ£¨Evernote Web Clipper£©Öб£´æÒ»¸öÑÏÖØµÄXSSÎó²î£¬£¬£¬£¬£¬¿ÉÔÊÐí¹¥»÷Õß»á¼ûÓû§ÔÚµÚÈý·½Ð§ÀÍÖеÄÃô¸ÐÐÅÏ¢¡£¡£¡£¡£¡£ÓÉÓÚEvernote¹ãÊܽӴý£¬£¬£¬£¬£¬¸ÃÎó²î¿ÉÄܲ¨¼°Ô¼460ÍòÓû§¡£¡£¡£¡£¡£¸ÃÎó²î£¨CVE-2019-12592£©ÊôÓÚ²å¼þÖеıàÂëÂß¼­¹ýʧ£¬£¬£¬£¬£¬¿ÉÈÆ¹ýä¯ÀÀÆ÷µÄͬԴսÂÔ£¬£¬£¬£¬£¬Ê¹µÃ¹¥»÷Õß»á¼ûµÚÈý·½Ð§À͵ÄÃô¸ÐÓû§ÐÅÏ¢£¬£¬£¬£¬£¬°üÀ¨Éí·ÝÑéÖ¤ÐÅÏ¢¡¢²ÆÎñÐÅÏ¢¡¢É罻ýÌå̸ÌìÐÅÏ¢¡¢µç×ÓÓʼþÐÅÏ¢µÈ¡£¡£¡£¡£¡£½¨ÒéÓû§¸üÐÂÖÁ7.11.1¼°¸ü¸ß°æ±¾¡£¡£¡£¡£¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/critical-flaw-in-evernote-add-on-exposed-sensitive-data-of-millions/