ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ30ÖÜ
Ðû²¼Ê±¼ä 2019-08-05> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
2019Äê7ÔÂ29ÈÕÖÁ8ÔÂ04ÈÕ¹²ÊÕ¼Çå¾²Îó²î50¸ö£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇAlcatel-Lucent Enterprise 8008 Cloud Edition Deskphone VoIPÃÜÂë¸ü¸ÄÏÂÁî×¢ÈëÎó²î£»£»£»£»£»£»£»Puppet Enterprise PE's express installĬÈÏÃÜÂëÎó²î£»£»£»£»£»£»£»Wind River Systems VxWorks IPÑ¡ÏîÆÊÎö»º³åÇøÒç³öÎó²î£»£»£»£»£»£»£»Polycom UC SoftwareÉÏ´«Îļþ´úÂëÖ´ÐÐÎó²î£»£»£»£»£»£»£»cPanel SQL×¢ÈëÎó²î¡£¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇŦԼͨ¹ýÐÂÊý¾Ýй¶֪ͨ·¨°¸£¬£¬£¬Êý¾Ýî¿ÏµÔÙ´ÎÉý¼¶£»£»£»£»£»£»£»Capital Oneй¶1.06ÒÚÓû§ÐÅÏ¢£¬£¬£¬ÏÓÒÉÈËÒѱ»²¶£»£»£»£»£»£»£»VxWorksÐÞ¸´11¸öÇå¾²Îó²î£¬£¬£¬Ó°ÏìÁè¼Ý20ÒŲ́װ±¸£»£»£»£»£»£»£»Amcrest¼ÒÓÃÉãÏñÍ·ÑÏÖØÎó²î£¬£¬£¬¿ÉÔÊÐí¹¥»÷ÕßÔ¶³Ì¼àÌýÓû§£»£»£»£»£»£»£»ÖÇÀû1430Íò¹«ÃñÐÅϢй¶£¬£¬£¬Õ¼ÌìÏÂ×ÜÉú³Ý½ü80%¡£¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£
> Ö÷ÒªÇå¾²Îó²îÁбí
1. Alcatel-Lucent Enterprise 8008 Cloud Edition Deskphone VoIPÃÜÂë¸ü¸ÄÏÂÁî×¢ÈëÎó²î
Alcatel-Lucent Enterprise 8008 Cloud Edition Deskphone VoIP ÃÜÂë¸ü¸Ä½çÃæ¸ü¸ÄÃÜÂë´¦Öóͷ£±£´æÇå¾²Îó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉÖ´ÐÐí§ÒâOSÏÂÁî¡£¡£¡£
https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_Alcatel_8008CloudEditionDeskPhone.pdf?_=15590263402. Puppet Enterprise PE's express installĬÈÏÃÜÂëÎó²î
https://puppet.com/security/cve/CVE-2019-10694
3. Wind River Systems VxWorks IPÑ¡ÏîÆÊÎö»º³åÇøÒç³öÎó²î
https://www.us-cert.gov/ics/advisories/icsa-19-211-01
4. Polycom UC SoftwareÉÏ´«Îļþ´úÂëÖ´ÐÐÎó²î
https://support.polycom.com/content/dam/polycom-support/global/documentation/remote-code-execution-vulnerability-in-ucs-software-v1-0.pdf
5. cPanel SQL×¢ÈëÎó²î
https://documentation.cpanel.net/display/CL/58+Change+Log
> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢Å¦Ô¼Í¨¹ýÐÂÊý¾Ýй¶֪ͨ·¨°¸£¬£¬£¬Êý¾Ýî¿ÏµÔÙ´ÎÉý¼¶
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/new-york-passes-law-to-update-data-breach-notification-requirements/
2¡¢Capital Oneй¶1.06ÒÚÓû§ÐÅÏ¢£¬£¬£¬ÏÓÒÉÈËÒѱ»²¶
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/capital-one-data-breach-affects-106-million-people-suspect-arrested/
3¡¢VxWorksÐÞ¸´11¸öÇå¾²Îó²î£¬£¬£¬Ó°ÏìÁè¼Ý20ÒŲ́װ±¸
ÔÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/07/vxworks-rtos-vulnerability.html
4¡¢Amcrest¼ÒÓÃÉãÏñÍ·ÑÏÖØÎó²î£¬£¬£¬¿ÉÔÊÐí¹¥»÷ÕßÔ¶³Ì¼àÌýÓû§
Çå¾²³§ÉÌTenable·¢Ã÷Amcrest IP2M-841B¼ÒÓÃÉãÏñÍ·±£´æÒ»¸öÑÏÖØÎó²î£¬£¬£¬¿ÉÔÊÐí¹¥»÷Õßͨ¹ýHTTPÔ¶³Ì¼àÌýÉãÏñÍ·µÄÒôƵÊäÈë¡£¡£¡£¸ÃÎó²î±»±ê¼ÇΪCVE-2019-3948£¬£¬£¬Ó°ÏìÁËÉãÏñÍ·¹Ì¼þ°æ±¾V2.520.AC00.18.R£¬£¬£¬²¢ÇÒÎÞÐèÉí·ÝÑéÖ¤¼´¿ÉʹÓᣡ£¡£±ðµÄ£¬£¬£¬¸Ã²úÆ·Ò²Ò×ÊÜÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2017-7927£©¹¥»÷¡£¡£¡£AmcrestÒѾÐû²¼Ïà¹ØÐÞ¸´²¹¶¡¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/iot-home-security-camera-allows-hackers-to-listen-in-over-http/
5¡¢ÖÇÀû1430Íò¹«ÃñÐÅϢй¶£¬£¬£¬Õ¼ÌìÏÂ×ÜÉú³Ý½ü80%
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/voter-records-for-80-of-chiles-population-left-exposed-online/