ÐÅÏ¢Çå¾²Öܱ¨-2020ÄêµÚ34ÖÜ

Ðû²¼Ê±¼ä 2020-08-24

> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2020Äê08ÔÂ17ÈÕÖÁ23ÈÕ¹²ÊÕ¼Çå¾²Îó²î53¸ö£¬£¬£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇMicro Air Vehicle LinkÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£» £»£»£»£»Silicon Labs Bluetooth Low Energy SDK CVE-2020-15531»º³åÇøÒç³öÎó²î£» £»£»£»£»Apache ShiroÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£» £»£»£»£»Beijing Kuangshi Technology MEGVII KoalaδÊÚȨ»á¼ûÎó²î; ZKTeco FaceDepotȨÏÞÌáÉýÎó²î¡£¡£¡£¡£¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇCactusPete APTʹÓÃBisonal¹¥»÷Å·ÖÞ½ðÈں;üÊÂ×éÖ¯£» £»£»£»£»ºÚ¿Í×éÖ¯TeamTNTʹÓüÓÃÜÈ䳿ÇÔÈ¡AWSƾ֤£» £»£»£»£»ÓÊÂÖ¹«Ë¾CarnivalѬȾÀÕË÷Èí¼þ£¬£¬£¬£¬£¬£¬£¬²¿·ÖÊý¾Ý»òÒÑй¶£» £»£»£»£»MicrosoftÐû²¼Windows´øÍâÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´ÌáȨÎó²î£» £»£»£»£»ThalesµÄ²úÆ·±£´æÎó²î£¬£¬£¬£¬£¬£¬£¬¿ÉÓ°ÏìÊý°ÙÍòIoT×°±¸¡£¡£¡£¡£¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£¡£¡£


Ö÷ÒªÇå¾²Îó²îÁбí


1.Micro Air Vehicle LinkÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î


Micro Air Vehicle Link (MAVLink)ʹÓÃÎÊ´ð»úÖÆ¾ÙÐа汾ЭÉÌ£¬£¬£¬£¬£¬£¬£¬Ã»ÓнÓÄÉÉí·ÝÑéÖ¤»úÖÆ£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬ÈƹýÉí·ÝÑéÖ¤£¬£¬£¬£¬£¬£¬£¬Ö±½ÓÓë×Ô¶¯¼Ýʻϵͳ¾ÙÐн»»¥¡£¡£¡£¡£¡£¡£¡£

https://github.com/aliasrobotics/RVD/issues/3316


2. Silicon Labs Bluetooth Low Energy SDK CVE-2020-15531»º³åÇøÒç³öÎó²î


Silicon Labs Bluetooth Low Energy SDK´¦Öóͷ£±¨ÎÄÊý¾Ý±£´æ»º³åÇøÒç³öÎó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£» £»£»£»£»òÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£¡£

https://github.com/darkmentorllc/jackbnimble/blob/master/host/pocs/silabs_efr32_extadv_rce.py


3. Apache ShiroÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î


Apache Shiro´¦Öóͷ£HTTPÇëÇó±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬¿ÉÈÆ¹ýÑé֤δÊÚȨ»á¼û¡£¡£¡£¡£¡£¡£¡£

https://lists.apache.org/thread.html/r539f87706094e79c5da0826030384373f0041068936912876856835f%40%3Cdev.shiro.apache.org%3E


4. Beijing Kuangshi Technology MEGVII KoalaδÊÚȨ»á¼ûÎó²î


Beijing Kuangshi Technology MEGVII Koala 5000¶Ë¿Ú±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬¿É»ñÈ¡ÎïÆÊÎö¼ûȨÏÞ¡£¡£¡£¡£¡£¡£¡£

https://www.trendmicro.com/vinfo/us/threat-encyclopedia/vulnerability/8137/megvii-koala-291c3s-architectural-vulnerability-on-network-relays


5. ZKTeco FaceDepotȨÏÞÌáÉýÎó²î


ZKTeco FaceDepot±£´æÁîÅÆÖØÓÃÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬¿É½¨Éèí§ÒâÓû§£¬£¬£¬£¬£¬£¬£¬ÌáÉýȨÏÞ£¬£¬£¬£¬£¬£¬£¬²¢ÏÂÔØÊý¾Ý¿âµÈ¡£¡£¡£¡£¡£¡£¡£

https://www.trendmicro.com/vinfo/us/threat-encyclopedia/vulnerability/8134/zkteco-facedepot-7b-10213-and-zkbiosecurity-server-10020190723-improper-privilege-vulnerability


> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢CactusPete APTʹÓÃBisonal¹¥»÷Å·ÖÞ½ðÈں;üÊÂ×éÖ¯


1.jpg


¿¨°Í˹»ù·¢Ã÷CactusPete APTÕý¾ÙÐÐÒ»³¡Õë¶ÔÕû¸ö¶«Å·¾üʺͽðÈÚ×éÖ¯µÄ»î¶¯£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃÁ˺óÃÅBisonalµÄбäÌå¡£¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯ÓÚ2013ÄêÊ״α»·¢Ã÷£¬£¬£¬£¬£¬£¬£¬ÓëÅ·ÖÞ¡¢¶íÂÞ˹¡¢ÈÕ±¾ºÍº«¹úµÄÍøÂç·¸·¨»î¶¯Óйأ¬£¬£¬£¬£¬£¬£¬×¨ÃÅ´ÓÊÂÇé±¨ÍøÂçºÍÌØ¹¤»î¶¯¡£¡£¡£¡£¡£¡£¡£CactusPeteʹÓõÄBisonalÊÇÒ»ÖÖÍøÂçÌØ¹¤¹¤¾ß£¬£¬£¬£¬£¬£¬£¬Äܹ»¼á³Ö¶ÔÊÜѬȾ»úеµÄ³¤ÆÚÐÔ£¬£¬£¬£¬£¬£¬£¬¿ÉɨÃèÇý¶¯Æ÷¡¢Áгö²¢Ð¹Â¶Ãô¸ÐµÄÎļþ¡¢É¾³ýÄÚÈÝ¡¢É±ËÀϵͳÀú³ÌÒÔ¼°Ö´ÐдúÂë¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/cactuspete-threat-group-goes-on-the-rampage-with-a-new-bisonal-backdoor/


2¡¢ºÚ¿Í×éÖ¯TeamTNTʹÓüÓÃÜÈ䳿ÇÔÈ¡AWSƾ֤


2.jpg


TeamTNTÊÇÒ»¸öÕë¶ÔDocker×°ÖõÄÍøÂç·¸·¨×éÖ¯£¬£¬£¬£¬£¬£¬£¬»òÐíΪµÚÒ»¸öʹÓþßÓÐÇÔÈ¡AWSƾ֤¹¦Ð§µÄ¼ÓÃÜÍÚ¾ò¶ñÒâÈí¼þµÄ×éÖ¯¡£¡£¡£¡£¡£¡£¡£Trend Micro½ñÄêÔçЩʱ¼ä·¢Ã÷£¬£¬£¬£¬£¬£¬£¬¸Ã×éÖ¯´Ó4ÔÂ×îÏÈ»îÔ¾£¬£¬£¬£¬£¬£¬£¬Í¨¹ýÔÚ»¥ÁªÍøÉÏɨÃèÉèÖùýʧµÄDockerϵͳ»á¼û̻¶µÄAPI£¬£¬£¬£¬£¬£¬£¬²¢ÔÚDocker°²ÅÅЧÀÍÆ÷À´ÔËÐÐDDoSºÍ¼ÓÃܶñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±·¢Ã÷Ëû»¹¿ÉÒÔɨÃèÔËÐÐÔÚAWS»ù´¡¼Ü¹¹ÉÏЧÀÍÆ÷ÖÐµÄ ~/.aws/credentials and ~/.aws/configÎļþ£¬£¬£¬£¬£¬£¬£¬À´»ñÈ¡Amazon Web Services£¨AWS£©Æ¾Ö¤¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/crypto-mining-worm-steal-aws-credentials/


3¡¢ÓÊÂÖ¹«Ë¾CarnivalѬȾÀÕË÷Èí¼þ£¬£¬£¬£¬£¬£¬£¬²¿·ÖÊý¾Ý»òÒÑй¶


3.jpg


È«Çò×î´óµÄÓÊÂÖ¹«Ë¾Carnival CorpÔÚ8ÔÂ15ÈÕÔâµ½ÁËÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬£¬²¿·ÖÊý¾Ý»òÒÑй¶¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ºÚ¿Í»á¼û²¢¼ÓÃÜÁËÆä·Ö¹«Ë¾µÄÐÅÏ¢ÊÖÒÕϵͳ£¬£¬£¬£¬£¬£¬£¬²¢ÇÒÇÔÈ¡ÁËÎļþ¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤¶Ô¸ÃÊÂÎñµÄÆðÔ´ÆÀ¹À£¬£¬£¬£¬£¬£¬£¬¼ÎÄ껪ÒÔΪ£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÄÜÒѾ­»á¼ûÁËijЩÀ´±öºÍÔ±¹¤µÄСÎÒ˽¼ÒÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¿ÉÊÇCarnivalûÓÐ͸¶ÓйشËÊÂÎñµÄÏêϸÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬ÀýÈçÀÕË÷Èí¼þÃû³Æ£¬£¬£¬£¬£¬£¬£¬»òÆä¹¥»÷Ó°Ïì¹æÄ£µÈ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/worlds-largest-cruise-line-operator-discloses-ransomware-attack/


4¡¢MicrosoftÐû²¼Windows´øÍâÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´ÌáȨÎó²î


4.jpg


MicrosoftΪWindows 8.1ºÍWindows Server 2012 R2Ðû²¼ÁË´øÍâÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÐÞ¸´ÌáȨÎó²î£¬£¬£¬£¬£¬£¬£¬¸ÃÎó²î»áÓ°ÏìWindowsÔ¶³Ì»á¼ûЧÀÍ¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄÁ½¸öÎó²î±»×·×ÙΪCVE-2020-1530ºÍCVE-2020-1537£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÔÚÀÖ³ÉʹÓúó¿É»ñµÃ¸ü¸ßµÄȨÏÞ¡£¡£¡£¡£¡£¡£¡£¿ÉÊÇÔÚʹÓÃÕâЩÎó²î֮ǰ£¬£¬£¬£¬£¬£¬£¬¹¥»÷ÕßÐèÒªÏÈÔÚÊܺ¦ÕßµÄ×°±¸ÉϱàдִÐÐÌØÈ¨´úÂë¡£¡£¡£¡£¡£¡£¡£´Ë´Î¸üÐÂͨ¹ý¸üÕýWindows Remote Access´¦Öóͷ£ÄÚ´æºÍÎļþ²Ù×÷µÄ·½·¨À´½â¾öÎó²î¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/microsoft-issues-out-of-band-kb4578013-windows-security-update/


5¡¢ThalesµÄ²úÆ·±£´æÎó²î£¬£¬£¬£¬£¬£¬£¬¿ÉÓ°ÏìÊý°ÙÍòIoT×°±¸


5.jpg


IBMµÄÇå¾²Ñо¿Ö°Ô±·¢Ã÷ThalesµÄ²úÆ·µÄͨѶÄ£¿£¿£¿£¿£¿éÖб£´æÑÏÖØÎó²î£¬£¬£¬£¬£¬£¬£¬¿ÉÓ°ÏìÊý°ÙÍòIoT×°±¸¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²î±»×·×ÙΪCVE-2020-15858£¬£¬£¬£¬£¬£¬£¬ÓÚ2019Äê9ÔÂÊ×´ÎÔÚThalesµÄCinterion EHS8 M2MÄ£¿£¿£¿£¿£¿éÖб»·¢Ã÷£¬£¬£¬£¬£¬£¬£¬²¢ÓÚ2020Äê2Ô±»ÐÞ¸´¡£¡£¡£¡£¡£¡£¡£ØÊºó»¹·¢Ã÷Ëü»¹»áÓ°ÏìÆäËûÊ®¸öÄ£¿£¿£¿£¿£¿é¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓë°üÀ¨ÓмÓÃÜÃÜÔ¿¡¢ÃÜÂëºÍÖ¤ÊéÖ®ÀàÐÅÏ¢µÄJava´úÂëÓйأ¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓôËÎó²îÈÆ¹ýÇå¾²»úÖÆ²¢»á¼ûÕâЩÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬È»ºóʹÓøÃÐÅÏ¢À´¿ØÖÆ×°±¸»ò»á¼û°üÀ¨¸Ã×°±¸µÄÍøÂç¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/vulnerability-thales-product-could-expose-millions-iot-devices-attacks