ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ31ÖÜ
Ðû²¼Ê±¼ä 2019-08-12> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
2019Äê8ÔÂ05ÈÕÖÁ11ÈÕ¹²ÊÕ¼Çå¾²Îó²î49¸ö£¬£¬£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇCisco Enterprise NFV Infrastructure Software OSÏÂÁî×¢ÈëÎó²î£»£»£»£»£»£»MicroDigital N-series cameras´úÂëÖ´ÐÐÎó²î£»£»£»£»£»£»Cisco Small Business 220 Series Smart Switches WEB½çÃæ»º³åÆ÷Òç³öÎó²î£»£»£»£»£»£»MongoDB ServerȨÏÞÌáÉýÎó²î£»£»£»£»£»£»Android Qualcomm HLOS×é¼þȨÏÞÌáÉýÎó²î¡£¡£¡£¡£¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊǸßͨоƬ±£´æQualPwnÎó²î£¬£¬£¬£¬£¬£¬£¬²¨¼°æçÁú855µÈ¶à¿îSoC;¿¨°Í˹»ùÐû²¼2019ÄêµÚ¶þ¼¾¶ÈDDoS¹¥»÷Ç÷ÊÆ±¨¸æ;Ñо¿Ö°Ô±Åû¶²¨Òô787ÄÚ²¿ÍøÂçÖеĶà¸öÇå¾²Îó²î;Ñо¿ÍŶÓÐû²¼2019Ä깤¿ØÍþв±¨¸æ£¬£¬£¬£¬£¬£¬£¬¾Å´ó·¸·¨ÍÅ»ïרעÓÚICS;GoogleºÍNASAÒòJiraЧÀÍÆ÷ÉèÖùýʧµ¼ÖÂÃô¸ÐÊý¾Ýй¶¡£¡£¡£¡£¡£¡£
> Ö÷ÒªÇå¾²Îó²îÁбí
1. Cisco Enterprise NFV Infrastructure Software OSÏÂÁî×¢ÈëÎó²î
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-nfv-commandinj
2. MicroDigital N-series cameras´úÂëÖ´ÐÐÎó²î
https://pastebin.com/PSyqqs1g
3. Cisco Small Business 220 Series Smart Switches WEB½çÃæ»º³åÆ÷Òç³öÎó²î
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190806-sb220-rce
4. MongoDB ServerȨÏÞÌáÉýÎó²î
https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0829
5. Android Qualcomm HLOS×é¼þȨÏÞÌáÉýÎó²î
https://source.android.com/security/bulletin/2019-08-01.html
> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö

¸ßͨ¶à¿îSoCÊܵ½Á½¸öÎó²îµÄÓ°Ï죬£¬£¬£¬£¬£¬£¬ÕâÁ½¸öÎó²î±»³ÆÎªQualPwn£¬£¬£¬£¬£¬£¬£¬»®·ÖÊÇÓ°Ïì¸ßͨWLAN×é¼þ¼°AndroidÄں˵Ļº³åÇøÒç³öÎó²î£¨CVE-2019-10538£©ÒÔ¼°¸ßͨWLAN¼°Modem¹Ì¼þÖеĻº³åÇøÒç³öÎó²î£¨CVE-2019-10540£©¡£¡£¡£¡£¡£¡£Æ¾Ö¤¸ßͨÐû²¼µÄÇ徲ͨ¸æ£¬£¬£¬£¬£¬£¬£¬ºóÕßÓ°ÏìµÄ²úÆ·°üÀ¨SD 820¡¢SD 835¡¢SD 845¡¢SD 850¡¢SD 855µÈ20¶à¿îоƬ¡£¡£¡£¡£¡£¡£¸ßͨºÍAndroidÍŶÓÒѾÐû²¼ÁËÏà¹ØÐÞ¸´²¹¶¡¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/qualpwn-vulnerabilities-in-qualcomm-chips-let-hackers-compromise-android-devices/
2¡¢¿¨°Í˹»ùÐû²¼2019ÄêµÚ¶þ¼¾¶ÈDDoS¹¥»÷Ç÷ÊÆ±¨¸æ
ÔÎÄÁ´½Ó£ºhttps://securelist.com/ddos-report-q2-2019/91934/
3¡¢Ñо¿Ö°Ô±Åû¶²¨Òô787ÄÚ²¿ÍøÂçÖеĶà¸öÇå¾²Îó²î
IOActiveÑо¿Ö°Ô±Ruben SantamartaÔÚBlack Hat´ó»áÉÏÅû¶Á˲¨Òô787ÃλÿͻúÖеĶà¸öÇå¾²Îó²î¡£¡£¡£¡£¡£¡£ÕâЩÎó²îÓë·É»úµÄ³ÉÔ±ÐÅϢЧÀÍ/ά»¤ÏµÍ³£¨CIS/MS£©Óйأ¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓÃÕâЩÎó²îÏò·É»úµÄÒªº¦Ç徲ϵͳ£¨ÀýÈçÒýÇæ¡¢Öƶ¯ÏµÍ³¡¢´«¸ÐÆ÷£©·¢ËͶñÒâÏÂÁî¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß»¹¿Éͨ¹ýÈëÇÖ·É»úµÄÎÀÐÇ×°±¸¼°ÎÞÏßͨѶÇþµÀÏòά»¤¹¤³ÌʦÌṩ¹ýʧµÄϵͳÐÅÏ¢¡£¡£¡£¡£¡£¡£²¨ÒôÉù³ÆÕâЩÎÊÌâ²»»á×é³ÉÍøÂçÍþв£¬£¬£¬£¬£¬£¬£¬ÓÉÓÚÆä·À»¤²½·¥¿ÉÒÔ×èÖ¹´ËÀ๥»÷¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.wired.com/story/boeing-787-code-leak-security-flaws/?verso=true
4¡¢Ñо¿ÍŶÓÐû²¼2019Ä깤¿ØÍþв±¨¸æ£¬£¬£¬£¬£¬£¬£¬¾Å´ó·¸·¨ÍÅ»ïרעÓÚICS
ÔÎÄÁ´½Ó£ºhttps://dragos.com/wp-content/uploads/Dragos-Oil-and-Gas-Threat-Perspective-2019.pdf
5¡¢GoogleºÍNASAÒòJiraЧÀÍÆ÷ÉèÖùýʧµ¼ÖÂÃô¸ÐÊý¾Ýй¶
JiraÊÇÒ»¸öÊ¢ÐеÄÏîÄ¿ÖÎÃ÷È·¾ö¼Æ»®£¬£¬£¬£¬£¬£¬£¬Çå¾²Ñо¿Ô±Avinash Jain·¢Ã÷µ±ÔÚJira CloudÖн¨ÉèеÄfilterºÍdashboardʱ£¬£¬£¬£¬£¬£¬£¬ÆäĬÈϿɼûÐÔÊÇ¡°ËùÓС±£¬£¬£¬£¬£¬£¬£¬ÕâºÜÈÝÒ×±»Ã÷ȷΪ¡°ÆóÒµÄÚ²¿ËùÓÐÈË¡±µ«ÏÖʵÉÏËüÖ¸µÄÊÇ¡°»¥ÁªÍøÉϵÄËùÓÐÈË¡±¡£¡£¡£¡£¡£¡£ÕâÖÖÉèÖùýʧʹµÃÐí¶à×éÖ¯µÄÃô¸ÐÏîÄ¿ÐÅÏ¢ÆØ¹â£¬£¬£¬£¬£¬£¬£¬°üÀ¨Google¡¢Yahoo¡¢NASA¡¢Lenovo¡¢1Password¡¢ZendeskÒÔ¼°Õþ¸®»ú¹¹µÈ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/misconfigured-jira-servers-leak-info-on-users-and-projects/