ÐÅÏ¢Çå¾²Öܱ¨-2020ÄêµÚ34ÖÜ
Ðû²¼Ê±¼ä 2020-08-24> ±¾ÖÜÇ徲̬ÊÆ×ÛÊö
2020Äê08ÔÂ17ÈÕÖÁ23ÈÕ¹²ÊÕ¼Çå¾²Îó²î53¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇMicro Air Vehicle LinkÉí·ÝÑéÖ¤ÈƹýÎó²î£»Silicon Labs Bluetooth Low Energy SDK CVE-2020-15531»º³åÇøÒç³öÎó²î£»Apache ShiroÉí·ÝÑéÖ¤ÈƹýÎó²î£»Beijing Kuangshi Technology MEGVII KoalaδÊÚȨ»á¼ûÎó²î; ZKTeco FaceDepotȨÏÞÌáÉýÎó²î¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇCactusPete APTʹÓÃBisonal¹¥»÷Å·ÖÞ½ðÈں;üÊÂ×éÖ¯£»ºÚ¿Í×éÖ¯TeamTNTʹÓüÓÃÜÈä³æÇÔÈ¡AWSƾ֤£»ÓÊÂÖ¹«Ë¾CarnivalѬȾÀÕË÷Èí¼þ£¬²¿·ÖÊý¾Ý»òÒÑй¶£»MicrosoftÐû²¼Windows´øÍâÇå¾²¸üУ¬ÐÞ¸´ÌáȨÎó²î£»ThalesµÄ²úÆ·±£´æÎó²î£¬¿ÉÓ°ÏìÊý°ÙÍòIoT×°±¸¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬±¾ÖÜÇå¾²ÍþвΪÖС£
> Ö÷ÒªÇå¾²Îó²îÁбí
1.Micro Air Vehicle LinkÉí·ÝÑéÖ¤ÈƹýÎó²î
Micro Air Vehicle Link (MAVLink)ʹÓÃÎÊ´ð»úÖƾÙÐа汾ÐÉÌ£¬Ã»ÓнÓÄÉÉí·ÝÑéÖ¤»úÖÆ£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó£¬ÈƹýÉí·ÝÑéÖ¤£¬Ö±½ÓÓë×Ô¶¯¼Ýʻϵͳ¾ÙÐн»»¥¡£
https://github.com/aliasrobotics/RVD/issues/3316
2. Silicon Labs Bluetooth Low Energy SDK CVE-2020-15531»º³åÇøÒç³öÎó²î
Silicon Labs Bluetooth Low Energy SDK´¦Öóͷ£±¨ÎÄÊý¾Ý±£´æ»º³åÇøÒç³öÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉʹӦÓóÌÐò±ÀÀ£»òÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£
https://github.com/darkmentorllc/jackbnimble/blob/master/host/pocs/silabs_efr32_extadv_rce.py
3. Apache ShiroÉí·ÝÑéÖ¤ÈƹýÎó²î
Apache Shiro´¦Öóͷ£HTTPÇëÇó±£´æÇå¾²Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉÈƹýÑé֤δÊÚȨ»á¼û¡£
https://lists.apache.org/thread.html/r539f87706094e79c5da0826030384373f0041068936912876856835f%40%3Cdev.shiro.apache.org%3E
4. Beijing Kuangshi Technology MEGVII KoalaδÊÚȨ»á¼ûÎó²î
Beijing Kuangshi Technology MEGVII Koala 5000¶Ë¿Ú±£´æÇå¾²Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ɻñÈ¡ÎïÆÊÎö¼ûȨÏÞ¡£
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/vulnerability/8137/megvii-koala-291c3s-architectural-vulnerability-on-network-relays
5. ZKTeco FaceDepotȨÏÞÌáÉýÎó²î
ZKTeco FaceDepot±£´æÁîÅÆÖØÓÃÇå¾²Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ɽ¨Éèí§ÒâÓû§£¬ÌáÉýȨÏÞ£¬²¢ÏÂÔØÊý¾Ý¿âµÈ¡£
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/vulnerability/8134/zkteco-facedepot-7b-10213-and-zkbiosecurity-server-10020190723-improper-privilege-vulnerability
> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢CactusPete APTʹÓÃBisonal¹¥»÷Å·ÖÞ½ðÈں;üÊÂ×éÖ¯
¿¨°Í˹»ù·¢Ã÷CactusPete APTÕý¾ÙÐÐÒ»³¡Õë¶ÔÕû¸ö¶«Å·¾üʺͽðÈÚ×éÖ¯µÄÔ˶¯£¬²¢Ê¹ÓÃÁ˺óÃÅBisonalµÄбäÌå¡£¸Ã×éÖ¯ÓÚ2013ÄêÊ״α»·¢Ã÷£¬ÓëÅ·ÖÞ¡¢¶íÂÞ˹¡¢ÈÕ±¾ºÍº«¹úµÄÍøÂç·¸·¨Ô˶¯Óйأ¬×¨ÃÅ´ÓÊÂÇ鱨ÍøÂçºÍÌع¤Ô˶¯¡£CactusPeteʹÓõÄBisonalÊÇÒ»ÖÖÍøÂçÌع¤¹¤¾ß£¬Äܹ»¼á³Ö¶ÔÊÜѬȾ»úеµÄ³¤ÆÚÐÔ£¬¿ÉɨÃèÇý¶¯Æ÷¡¢Áгö²¢Ð¹Â¶Ãô¸ÐµÄÎļþ¡¢É¾³ýÄÚÈÝ¡¢É±ËÀϵͳÀú³ÌÒÔ¼°Ö´ÐдúÂë¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/cactuspete-threat-group-goes-on-the-rampage-with-a-new-bisonal-backdoor/
2¡¢ºÚ¿Í×éÖ¯TeamTNTʹÓüÓÃÜÈä³æÇÔÈ¡AWSƾ֤
TeamTNTÊÇÒ»¸öÕë¶ÔDocker×°ÖõÄÍøÂç·¸·¨×éÖ¯£¬»òÐíΪµÚÒ»¸öʹÓþßÓÐÇÔÈ¡AWSƾ֤¹¦Ð§µÄ¼ÓÃÜÍÚ¾ò¶ñÒâÈí¼þµÄ×éÖ¯¡£Trend Micro½ñÄêÔçЩʱ¼ä·¢Ã÷£¬¸Ã×éÖ¯´Ó4ÔÂ×îÏÈ»îÔ¾£¬Í¨¹ýÔÚ»¥ÁªÍøÉÏɨÃèÉèÖùýʧµÄDockerϵͳ»á¼û̻¶µÄAPI£¬²¢ÔÚDocker°²ÅÅ·þÎñÆ÷À´ÔËÐÐDDoSºÍ¼ÓÃܶñÒâÈí¼þ¡£Ñо¿Ö°Ô±·¢Ã÷Ëû»¹¿ÉÒÔɨÃèÔËÐÐÔÚAWS»ù´¡¼Ü¹¹ÉÏ·þÎñÆ÷ÖÐµÄ ~/.aws/credentials and ~/.aws/configÎļþ£¬À´»ñÈ¡Amazon Web Services£¨AWS£©Æ¾Ö¤¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/crypto-mining-worm-steal-aws-credentials/
3¡¢ÓÊÂÖ¹«Ë¾CarnivalѬȾÀÕË÷Èí¼þ£¬²¿·ÖÊý¾Ý»òÒÑй¶
È«Çò×î´óµÄÓÊÂÖ¹«Ë¾Carnival CorpÔÚ8ÔÂ15ÈÕÔâµ½ÁËÀÕË÷Èí¼þ¹¥»÷£¬²¿·ÖÊý¾Ý»òÒÑй¶¡£¸Ã¹«Ë¾ÌåÏÖ£¬ºÚ¿Í»á¼û²¢¼ÓÃÜÁËÆä·Ö¹«Ë¾µÄÐÅÏ¢ÊÖÒÕϵͳ£¬²¢ÇÒÇÔÈ¡ÁËÎļþ¡£Æ¾Ö¤¶Ô¸ÃÊÂÎñµÄÆðÔ´ÆÀ¹À£¬¼ÎÄ껪ÒÔΪ£¬¹¥»÷Õß¿ÉÄÜÒѾ»á¼ûÁËijЩÀ´±öºÍÔ±¹¤µÄСÎÒ˽¼ÒÊý¾Ý¡£¿ÉÊÇCarnivalûÓÐ͸¶ÓйشËÊÂÎñµÄÏêϸÐÅÏ¢£¬ÀýÈçÀÕË÷Èí¼þÃû³Æ£¬»òÆä¹¥»÷Ó°Ïì¹æÄ£µÈ¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/worlds-largest-cruise-line-operator-discloses-ransomware-attack/
4¡¢MicrosoftÐû²¼Windows´øÍâÇå¾²¸üУ¬ÐÞ¸´ÌáȨÎó²î
MicrosoftΪWindows 8.1ºÍWindows Server 2012 R2Ðû²¼ÁË´øÍâÇå¾²¸üУ¬Ö¼ÔÚÐÞ¸´ÌáȨÎó²î£¬¸ÃÎó²î»áÓ°ÏìWindowsÔ¶³Ì»á¼û·þÎñ¡£´Ë´ÎÐÞ¸´µÄÁ½¸öÎó²î±»×·×ÙΪCVE-2020-1530ºÍCVE-2020-1537£¬¹¥»÷ÕßÔÚÀÖ³ÉʹÓúó¿É»ñµÃ¸ü¸ßµÄȨÏÞ¡£¿ÉÊÇÔÚʹÓÃÕâЩÎó²î֮ǰ£¬¹¥»÷ÕßÐèÒªÏÈÔÚÊܺ¦ÕßµÄ×°±¸ÉϱàдִÐÐÌØȨ´úÂë¡£´Ë´Î¸üÐÂͨ¹ý¸üÕýWindows Remote Access´¦Öóͷ£ÄÚ´æºÍÎļþ²Ù×÷µÄ·½·¨À´½â¾öÎó²î¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/microsoft-issues-out-of-band-kb4578013-windows-security-update/
5¡¢ThalesµÄ²úÆ·±£´æÎó²î£¬¿ÉÓ°ÏìÊý°ÙÍòIoT×°±¸
IBMµÄÇå¾²Ñо¿Ö°Ô±·¢Ã÷ThalesµÄ²úÆ·µÄͨѶģ¿éÖб£´æÑÏÖØÎó²î£¬¿ÉÓ°ÏìÊý°ÙÍòIoT×°±¸¡£¸ÃÎó²î±»×·×ÙΪCVE-2020-15858£¬ÓÚ2019Äê9ÔÂÊ×´ÎÔÚThalesµÄCinterion EHS8 M2MÄ£¿éÖб»·¢Ã÷£¬²¢ÓÚ2020Äê2Ô±»ÐÞ¸´¡£Øʺ󻹷¢Ã÷Ëü»¹»áÓ°ÏìÆäËûÊ®¸öÄ£¿é¡£¸ÃÎó²îÓë°üÀ¨ÓмÓÃÜÃÜÔ¿¡¢ÃÜÂëºÍÖ¤ÊéÖ®ÀàÐÅÏ¢µÄJava´úÂëÓйأ¬¹¥»÷Õß¿ÉÒÔʹÓôËÎó²îÈƹýÇå¾²»úÖƲ¢»á¼ûÕâЩÐÅÏ¢£¬È»ºóʹÓøÃÐÅÏ¢À´¿ØÖÆ×°±¸»ò»á¼û°üÀ¨¸Ã×°±¸µÄÍøÂç¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/vulnerability-thales-product-could-expose-millions-iot-devices-attacks