ÐÅÏ¢Çå¾²Öܱ¨-2019ÄêµÚ23ÖÜ

Ðû²¼Ê±¼ä 2019-06-17

±¾ÖÜÇ徲̬ÊÆ×ÛÊö



2019Äê6ÔÂ10ÈÕÖÁ16ÈÕ¹²ÊÕ¼Çå¾²Îó²î63¸ö £¬ÖµµÃ¹Ø×¢µÄÊÇSAP E-Commerce CVE-2019-0308Ô¶³Ì´úÂë×¢ÈëÎó²î£»Adobe Campaigní§Òâ´úÂëÖ´ÐÐÎó²î£» WAGO Industrial Managed Switches SSHÓ²±àÂëÎó²î£»Microsoft Word CVE-2019-1034ÄÚ´æÆÆËð´úÂëÖ´ÐÐÎó²î£»Dahua IPC-HFW1XXXÉãÏñ»ú»º³åÇøÒç³öÎó²î ¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇ


¹È¸è֤ʵºÚ¿ÍÔøʹÓõÚÈý·½ÔÚAndroidÊÖ»úÉÏ×°ÖúóÃÅ£»HSMÑÏÖØÎó²î £¬Ó°Ïì¶à¸öÒøÐС¢ÔÆ·þÎñÉ̺ÍÕþ¸®»ú¹¹£»Ê©Ä͵µçÆøModicon M580¶à¸öÎó²î £¬¿Éµ¼ÖÂDoS¼°ÐÅϢй¶£»·É»úÁ㲿¼þ³§ÉÌASCOÔâÀÕË÷Èí¼þ¹¥»÷ £¬²¿·Ö¹¤³§ÒѹرÕ£»Evernote Chrome²å¼þXSSÎó²î £¬²¨¼°Ô¼460ÍòÓû§ ¡£
ƾ֤ÒÔÉÏ×ÛÊö £¬±¾ÖÜÇå¾²ÍþвΪÖÐ ¡£



Ö÷ÒªÇå¾²Îó²îÁбí



1. SAP E-Commerce CVE-2019-0308Ô¶³Ì´úÂë×¢ÈëÎó²î
SAP E-Commerce±£´æÇå¾²Îó²î £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬×¢Èëí§Òâ´úÂë £¬²¢ÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐ ¡£

https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=521864242


2. Adobe Campaigní§Òâ´úÂëÖ´ÐÐÎó²î
Adobe Campaign±£´æÇå¾²Îó²î £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬ÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§ÒâÏÂÁî ¡£

https://helpx.adobe.com/security/products/campaign/apsb19-28.html


3. WAGO Industrial Managed Switches SSHÓ²±àÂëÎó²î
WAGO Industrial Managed Switches¶à¸ö²úÆ·±£´æÓ²±àÂëSSHÃÜÔ¿Îó²î £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬¿ÉδÊÚȨ»á¼û×°±¸ ¡£

https://ics-cert.us-cert.gov/advisories/ICSA-19-164-02


4. Microsoft Word CVE-2019-1034ÄÚ´æÆÆËð´úÂëÖ´ÐÐÎó²î
Microsoft Word´¦Öóͷ£WORDÎļþ±£´æÇå¾²Îó²î £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇó £¬ÓÕʹÓû§ÆÊÎö £¬¿ÉÖ´ÐÐí§Òâ´úÂë ¡£

https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2019-1034


5. Dahua IPC-HFW1XXXÉãÏñ»ú»º³åÇøÒç³öÎó²î
Dahua IPC-HFW1XXX±£´æ»º³åÇøÒç³öÎó²î £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬¿É¾ÙÐоܾø·þÎñ¹¥»÷»òÕßÖ´ÐÐí§Òâ´úÂë ¡£

https://www.dahuasecurity.com/support/cybersecurity/details/617



 Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö



1¡¢¹È¸è֤ʵºÚ¿ÍÔøʹÓõÚÈý·½ÔÚAndroidÊÖ»úÉÏ×°ÖúóÃÅ

ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢

¹È¸è֤ʵ2017ÄêºÚ¿ÍÔøʹÓõÚÈý·½¹©Ó¦É̹¹½¨µÄ³ÌÐò´úÂëÔÚAndroidÊÖ»úÉÏ×°ÖÃTriadaºóÃÅ ¡£¹È¸èûÓÐÏêϸ˵Ã÷ÄÄЩװ±¸Êܵ½ÁËÓ°Ïì £¬µ«Çå¾²³§ÉÌDr.WebÔøÔÚ2017ÄêµÄÑо¿±¨¸æÖÐÖ¸³öÊÜÓ°ÏìµÄ×°±¸Æ·ÅÆ°üÀ¨Leagoo M5 Plues¡¢Leagoo M8¡¢Nomu S10ºÍNomu S20µÈ ¡£¸ÃºóÃÅÖ¼ÔÚÏòÓû§µÄ×°±¸ÍÆËÍÀ¬»øÓʼþºÍδÊÚȨµÄ¹ã¸æµÈ ¡£

Ô­ÎÄÁ´½Ó£º
https://www.cyberscoop.com/android-backdoor-triada-mobile-supply-chain/

2¡¢HSMÑÏÖØÎó²î £¬Ó°Ïì¶à¸öÒøÐС¢ÔÆ·þÎñÉ̺ÍÕþ¸®»ú¹¹


ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


LedgerÇå¾²Ñо¿Ö°Ô±Åû¶һ¼ÒÖ÷Òª³§É̵ÄHSM£¨Ó²¼þÇ徲ģ¿é£©ÖеÄÑÏÖØÎó²î £¬¸ÃÎó²î¿ÉÔÊÐí¼ìË÷´æ´¢ÔÚHSMÖеÄÃô¸ÐÊý¾Ý ¡£HSMÊÇÓ²¼þ¸ôÀë×°±¸ £¬³£ÓÃÓÚ½ðÈÚ»ú¹¹¡¢Õþ¸®»ú¹¹¡¢Êý¾ÝÖÐÐÄ¡¢ÔÆ·þÎñÉ̺͵çÐÅÔËÓªÉÌµÈ ¡£Æ¾Ö¤Ñо¿Ö°Ô±µÄ±¨¸æ £¬¸ÃÎó²îÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÍêÈ«¿ØÖÆHSM £¬´Ó¶ø¼ìË÷¼ÓÃÜÃÜÔ¿ºÍÖÎÀíԱƾ֤µÈÐÅÏ¢ ¡£Ñо¿Ö°Ô±²¢Î´Åû¶ÊÜÓ°ÏìµÄ³§ÉÌÃû³Æ £¬µ«CryptosenseÖ¸³ö¸Ã³§ÉÌ¿ÉÄÜÊǽðÑÅÍØ ¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/major-hsm-vulnerabilities-impact-banks-cloud-providers-governments/

3¡¢Ê©Ä͵µçÆøModicon M580¶à¸öÎó²î £¬¿Éµ¼ÖÂDoS¼°ÐÅϢй¶


ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


˼¿ÆTalosÅû¶ʩÄ͵µçÆøModicon M580ÖеĶà¸öÎó²î ¡£Modicon M580ÊÇÊ©Ä͵µçÆøModiconϵÁпɱà³Ì×Ô¶¯»¯¿ØÖÆÆ÷µÄ×îвúÆ· £¬Ñо¿Ö°Ô±ÔÚÆä¹Ì¼þ°æ±¾SV2.70Öз¢Ã÷¶à¸öÎó²î £¬°üÀ¨¿Éµ¼ÖÂDoSµÄÎó²î£¨CVE-2018-7846¡¢CVE-2018-7849¡¢CVE-2018-7843£© £¬¿Éµ¼ÖÂÐÅϢ鶵ÄÎó²î£¨CVE-2018-7844¡¢CVE-2018-7848£©¼°Éí·ÝÑéÖ¤ÈƹýÎó²î£¨CVE-2018-7842£©µÈ ¡£

Ô­ÎÄÁ´½Ó£º
https://blog.talosintelligence.com/2019/06/vulnerability-spotlight-multiple.html

4¡¢·É»úÁ㲿¼þ³§ÉÌASCOÔâÀÕË÷Èí¼þ¹¥»÷ £¬²¿·Ö¹¤³§ÒѹرÕ


ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


¾Ý±ÈÀûʱýÌ屨µÀ £¬·É»úÁ㲿¼þ³§ÉÌASCOλÓÚ±ÈÀûʱÔú·ÒÌØÄ·µÄ¹¤³§ÔâÀÕË÷Èí¼þѬȾ £¬¸Ã¹«Ë¾ÒÑ×èÖ¹ÁËËĸö¹ú¼ÒµÄ¹¤³§Éú²ú ¡£¸ÃѬȾÊÂÎñ±¬·¢ÔÚ6ÔÂ7ÈÕÐÇÆÚÎå £¬×î³õÓ°ÏìÁ˸ù«Ë¾Î»ÓÚ±ÈÀûʱµÄ¹¤³§ £¬µ«ASCOÒ²¹Ø±ÕÁËλÓڵ¹ú¡¢¼ÓÄôóºÍÃÀ¹úµÄ¹¤³§ ¡£¾Ý±¨µÀÍ£»úʱ¼äÔ¤¼ÆΪһÖÜ £¬°üÀ¨¼´½«µ½À´µÄÖÜÄ© ¡£¸Ã¹«Ë¾²¢Î´Í¸Â¶¸ü¶àÐÅÏ¢ £¬ÏÖÔÚÒ²²»ÖªµÀÀÕË÷Èí¼þµÄÃû³Æ ¡£ASCOÊÇÌìÏÂÉÏ×î´óµÄ·É»úÁ㲿¼þ³§ÉÌÖ®Ò» £¬Æä¿Í»§°üÀ¨¿Õ¿Í¡¢²¨ÒôÉõÖÁ¾üÓᢺ½¿ÕÁìÓòµÄ¹«Ë¾µÈ ¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/ransomware-halts-production-for-days-at-major-airplane-parts-manufacturer/

5¡¢Evernote Chrome²å¼þXSSÎó²î £¬²¨¼°Ô¼460ÍòÓû§


ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


Çå¾²³§ÉÌGuardio·¢Ã÷EvernoteµÄChrome²å¼þ£¨Evernote Web Clipper£©Öб£´æÒ»¸öÑÏÖصÄXSSÎó²î £¬¿ÉÔÊÐí¹¥»÷Õß»á¼ûÓû§ÔÚµÚÈý·½·þÎñÖеÄÃô¸ÐÐÅÏ¢ ¡£ÓÉÓÚEvernote¹ãÊܽӴý £¬¸ÃÎó²î¿ÉÄܲ¨¼°Ô¼460ÍòÓû§ ¡£¸ÃÎó²î£¨CVE-2019-12592£©ÊôÓÚ²å¼þÖеıàÂëÂß¼­¹ýʧ £¬¿ÉÈƹýä¯ÀÀÆ÷µÄͬԴսÂÔ £¬Ê¹µÃ¹¥»÷Õß»á¼ûµÚÈý·½·þÎñµÄÃô¸ÐÓû§ÐÅÏ¢ £¬°üÀ¨Éí·ÝÑéÖ¤ÐÅÏ¢¡¢²ÆÎñÐÅÏ¢¡¢É罻ýÌå̸ÌìÐÅÏ¢¡¢µç×ÓÓʼþÐÅÏ¢µÈ ¡£½¨ÒéÓû§¸üÐÂÖÁ7.11.1¼°¸ü¸ß°æ±¾ ¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/critical-flaw-in-evernote-add-on-exposed-sensitive-data-of-millions/