ÐÅÏ¢Çå¾²Öܱ¨-2018ÄêµÚ30ÖÜ

Ðû²¼Ê±¼ä 2018-07-30

Ò»¡¢±¾ÖÜÇ徲̬ÊÆ×ÛÊö


2018Äê07ÔÂ23ÈÕÖÁ29ÈÕ¹²ÊÕ¼Çå¾²Îó²î51¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇASUS HG100ÏÂÁîÖ´ÐÐÇå¾²Îó²î£»Cisco SD-WAN Configuration and Management DatabaseÔ¶³Ì´úÂëÖ´ÐÐÎó²î£»Intel Converged Security Management Engineí§Òâ´úÂëÖ´ÐÐÎó²î£»McAfee Web GatewayÖÎÀí½çÃæí§Òâ´úÂëÖ´ÐÐÎó²î£»Dell EMC RSA Archer REST APIȨÏÞÌáÉýÎó²î ¡£

±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÑо¿»ú¹¹ÖÒÑÔ³ÆÔ¼5ÒÚIoT×°±¸Ò×ÊÜDNSÖØа󶨹¥»÷µÄÓ°Ï죻Áè¼Ý100¼ÒÆû³µ³§É̵ÄÉñÃØÊý¾Ýй¶£¬·áÌï¡¢ÌØ˹À­µÈ¾ùÊÜÓ°Ï죻Ñо¿Ö°Ô±·¢Ã÷Õë¶ÔOracle WebLogic·þÎñÆ÷µÄй¥»÷Ô˶¯£»¸¥¼ªÄáÑÇÒøÐÐ8¸öÔÂÄÚ2´ÎÔâºÚ¿ÍÈëÇÖ£¬¹²ËðʧԼ240ÍòÃÀÔª£»ÖÐÔ¶º£ÔËÃÀ¹ú·Ö¹«Ë¾ÔâÀÕË÷Èí¼þ¹¥»÷£¬¹«Ë¾¹ÙÍøÒṈ̃»¾ ¡£

ƾ֤ÒÔÉÏ×ÛÊö£¬±¾ÖÜÇå¾²ÍþвΪÖÐ ¡£

¶þ¡¢Ö÷ÒªÇå¾²Îó²îÁбí


1¡¢ASUS HG100ÏÂÁîÖ´ÐÐÇå¾²Îó²î


ASUS HG100±£´æÊäÈëÑéÖ¤Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâÌØÊâÇëÇó£¬ÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§ÒâÏÂÁî ¡£

Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£º

https://jenkins.io/security/advisory/2018-07-18/


2¡¢Cisco SD-WAN Configuration and Management DatabaseÔ¶³Ì´úÂëÖ´ÐÐÎó²î


Cisco SD-WAN Configuration and Management DatabaseÔ¶±£´æÊäÈëÑéÖ¤Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó£¬ÒÔvmanageÓû§ÉÏÏÂÎÄÖ´ÐÐí§ÒâÏÂÁî ¡£


Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£º

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cx


3¡¢Intel Converged Security Management Engineí§Òâ´úÂëÖ´ÐÐÎó²î


Intel Converged Security Management EngineÔ¶³ÌÖÎÀí¼Æ»®ÔÚʵÏÖÉϱ£´æÂß¼­Îó²î£¬ÔÊÐíÍâµØ¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó£¬Ö´ÐÐí§Òâ´úÂë ¡£

Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£º

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00118.html


4¡¢McAfee Web GatewayÖÎÀí½çÃæí§Òâ´úÂëÖ´ÐÐÎó²î


McAfee Web GatewayÖÎÀí½çÃæ±£´æÇå¾²Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó£¬ÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë ¡£

Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£º

https://kc.mcafee.com/corporate/index?page=content&id=SB10245


5¡¢Dell EMC RSA Archer REST APIȨÏÞÌáÉýÎó²î


Dell EMC RSA Archer REST API±£´æÊÚȨÈƹýÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó£¬ÌáÉýȨÏÞ ¡£

Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÇå¾²²¹¶¡ÒÔÐÞ¸´¸ÃÎó²î£º

http://seclists.org/fulldisclosure/2018/Jul/69


Èý¡¢Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢Ñо¿»ú¹¹ÖÒÑÔ³ÆÔ¼5ÒÚIoT×°±¸Ò×ÊÜDNSÖØа󶨹¥»÷µÄÓ°Ïì


ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


Armis¹«Ë¾ÖÒÑÔ³ÆÔ¼5ÒÚ¸öIoT×°±¸Ò×ÊÜDNSÖØа󶨹¥»÷µÄÓ°Ïì ¡£DNSÖØа󶨹¥»÷ÊÇÖ¸¹¥»÷ÕßÓÕÆ­Óû§µÄä¯ÀÀÆ÷»ò×°±¸°ó¶¨ÖÁ¶ñÒâµÄDNS·þÎñÆ÷µÄ¹¥»÷·½·¨ ¡£ArmisÆÊÎöÁËÕâÖÖ¹¥»÷¶ÔIoT×°±¸µÄÓ°Ï죬³ÆÏÕЩËùÓÐÀàÐ͵ÄÖÇÄÜ×°±¸¶¼Ò×ÊÜ´ËÀ๥»÷£¬°üÀ¨ÖÇÄܵçÊÓ¡¢Â·ÓÉÆ÷¡¢´òÓ¡»ú¡¢¼àÊÓÆ÷¡¢IPµç»°µÈ ¡£ÐÞ¸´ËùÓеÄ×°±¸¿ÉÄÜÊÇÒ»ÏîÎÞ·¨Íê³ÉµÄʹÃü£¬µ«½«IoT×°±¸¼¯³Éµ½Çå¾²¼à¿Ø²úÆ·ÖпÉÄÜÊÇ×î¼òÆÓÓÐÓõĽâ¾ö¼Æ»® ¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/half-a-billion-iot-devices-vulnerable-to-dns-rebinding-attacks/


2¡¢Áè¼Ý100¼ÒÆû³µ³§É̵ÄÉñÃØÊý¾Ýй¶£¬·áÌï¡¢ÌØ˹À­µÈ¾ùÊÜÓ°Ïì


ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


UpGuardÑо¿Ö°Ô±Chris Vickery·¢Ã÷¹©Ó¦ÉÌLevel OneµÄ²»Çå¾²Êý¾Ý¿â£¬ÆäÖаüÀ¨½ü47000·ÝÎļþ£¬º­¸Ç¶à¼ÒÆû³µ³§É̵ĽüÊ®ÄêµÄÏêϸÀ¶Í¼¡¢¹¤³§Ô­Àíͼ¡¢¿Í»§ÖÊÁÏ£¨ÈçÌõÔ¼¡¢·¢Æ±ºÍÊÂÇéÍýÏëµÈ£©£¬ÒÔ¼°ÖÖÖÖ±£ÃÜЭÒéÎļþµÈ ¡£Ð¹Â¶µÄÊý¾Ý×ÜÁ¿´ï157GB£¬¸£ÌØ¡¢·áÌͨÓúÍÌØ˹À­µÈ¾ùÊÜÓ°Ïì ¡£Ð¹Â¶µÄÔµ¹ÊÔ­ÓÉÊÇLevel One¹«Ë¾µÄÓÃÓÚ±¸·ÝÊý¾ÝµÄÎļþ´«ÊäЭÒérsync±»ÉèÖÃΪ¿É¹ûÕæ»á¼û£¬²¢ÇÒ²»ÐèÒªÈκÎÃÜÂë ¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.grahamcluley.com/robotics-suppliers-sloppy-security-leaks-ten-years-worth-of-data-from-major-car-manufacturers/

3¡¢Ñо¿Ö°Ô±·¢Ã÷Õë¶ÔOracle WebLogic·þÎñÆ÷µÄй¥»÷Ô˶¯


ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


Ñо¿Ö°Ô±·¢Ã÷Ö÷ÒªÕë¶ÔOracle WebLogic·þÎñÆ÷µÄ¹¥»÷Ô˶¯£¬ÕâЩ¹¥»÷Ô˶¯Ö÷ҪʹÓÃÎó²î£¨CVE-2018-2893£©¾ÙÐй¥»÷ ¡£OracleÔÚ7ÔÂ18ÈÕÐû²¼Á˸ÃÎó²îµÄÏà¹Ø²¹¶¡£¬7ÔÂ21ÈÕÆäÏà¹ØPoC±»Åû¶ ¡£Ñо¿Ö°Ô±·¢Ã÷ÖÁÉÙ2¸ö×éÖ¯ÕýÔÚʹÓøÃÎó²î¾ÙÐй¥»÷£¬½¨Ò黹δ¸üеÄÓû§¾¡¿ì¾ÙÐÐÉý¼¶ ¡£Ò×Êܹ¥»÷µÄ°æ±¾°üÀ¨10.3.6.0¡¢12.1.3.0¡¢12.2.1.2ºÍ12.2.1.3 ¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/attacks-on-oracle-weblogic-servers-detected-after-publication-of-poc-code/

4¡¢¸¥¼ªÄáÑÇÒøÐÐ8¸öÔÂÄÚ2´ÎÔâºÚ¿ÍÈëÇÖ£¬¹²ËðʧԼ240ÍòÃÀÔª


ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


¾Ý¼ÇÕßBrian Krebs±¨µÀ£¬ÃÀ¸¥¼ªÄáÑǹú¼ÒÒøÐÐÓÚ2016Äê5ÔÂÏÂÑ®ºÍ2017Äê1ÔÂÁ½´ÎÔâµ½´¹ÂÚÓʼþµÄ¹¥»÷£¬¹²ËðʧԼ240ÍòÃÀÔª ¡£µÚÒ»´Î¹¥»÷Öй¥»÷Õßͨ¹ý¶ñÒâÈí¼þѬȾÁËһ̨ÅÌËã»ú£¬²¢Äܹ»»á¼ûÒøÐÐÄÚÍøºÍÈƹýPINÂë¡¢ÖðÈÕÈ¡¿îÏÞÖÆÒÔ¼°·´Ú²Æ­²½·¥µÈ ¡£µÚ¶þ´Î¹¥»÷µÄģʽÓëµÚÒ»´Î¹¥»÷ÏàËÆ ¡£SynopsysÊ×ϯÕÕÁÏChandu KetkarÒÔΪ£¬ÕâЩÊÂÎñÊÇÆäÇå¾²ÒâʶÅàѵ¡¢¼à¿ØºÍÓ¦¼±ÏìÓ¦µÈÕ½ÂÔµÄʧ°Ü ¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.infosecurity-magazine.com/news/virginian-bank-robbed-twice-in/

5¡¢ÖÐÔ¶º£ÔËÃÀ¹ú·Ö¹«Ë¾ÔâÀÕË÷Èí¼þ¹¥»÷£¬¹«Ë¾¹ÙÍøÒṈ̃»¾


ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


ÖÐÔ¶º£Ô˵ÄÃÀ¹ú·Ö¹«Ë¾Ôâµ½ÀÕË÷Èí¼þµÄ¹¥»÷£¬Æ乫˾ÍøÂçÒÑÏÝÈë̱»¾ ¡£¸ÃÊÂÎñ±¬·¢ÔÚ7ÔÂ24ÈÕÐÇÆÚ¶þ£¬µ«ÏÖÔڸù«Ë¾ÃÀ¹úµØÇøµÄIT»ù´¡ÉèÊ©ÈÔ´¦ÓڹرÕÖ®ÖУ¬°üÀ¨µç×ÓÓʼþ·þÎñÆ÷ºÍµç»°ÍøÂçµÈ£¬Æä¹ÙÍøÒ²´¦ÓڹرÕ״̬ ¡£Ñ¬È¾¸Ã¹«Ë¾ÍøÂçµÄÀÕË÷Èí¼þÀàÐÍÈÔȻδ֪£¬ÏÖÔڸù«Ë¾Ò²Î´×÷³ö¸ü¶à»ØÓ¦ ¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/ransomware-infection-cripples-shipping-giant-coscos-american-network/