ÐÅÏ¢Äþ¾²Öܱ¨-2020ÄêµÚ02ÖÜ

Ðû²¼Ê±¼ä 2020-01-13


±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö


2020Äê01ÔÂ06ÈÕÖÁ12ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´57¸ö £¬ÖµµÃ¹Ø×¢µÄÊÇCisco Webex Video Mesh Software WEBÃüÁî×¢È멶´; Mozilla Firefox Windows XPCVariant.cppÀàÐÍ»ìÏý´úÂëÖ´ÐЩ¶´£»Android Realtek rtlwifi driverÔ¶³Ì´úÂëÖ´ÐЩ¶´£»Android Sound subsystemȨÏÞÌáÉý©¶´£»Billion Smart Energy Router SG600R2ÃüÁîÖ´ÐЩ¶´¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇUpstream SecurityÐû²¼2020°æ¡¶Æû³µÍøÂçÄþ¾²³ÂËß¡·£»Î¢ÈíÐû²¼RDP±©Á¦¹¥»÷·ÖÎö³ÂËß £¬Æ½¾ùÁ¬Ðøʱ¼äΪ2-3Ì죻MITREÐû²¼ÊÊÓÃÓÚ¹¤Òµ¿ØÖÆϵͳµÄATT£¦CK¿ò¼Ü£»Î¢ÈíÐÞ¸´AccessÖеÄÐÅϢ鶩¶´£¨CVE-2019-1463£©£»MozillaÐû²¼¸üÐÂ,ÐÞ¸´Firefox 0day©¶´(CVE-2019-11707)¡£


ƾ¾ÝÒÔÉÏ×ÛÊö £¬±¾ÖÜÄþ¾²ÍþвΪÖС£



ÖØÒªÄþ¾²Â©¶´Áбí


1. Cisco Webex Video Mesh Software WEBÃüÁî×¢È멶´


Cisco Webex Video Mesh Software releases WEB½Ó¿Ú´æÔÚÄþ¾²Â©¶´ £¬ÔÊÐíͨ¹ýÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬ÒÔROOTȨÏÞÖ´ÐÐÈÎÒâÃüÁî¡£

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-webex-video


2. Mozilla Firefox Windows XPCVariant.cppÀàÐÍ»ìÏý´úÂëÖ´ÐЩ¶´


Mozilla Firefox XPCVariant.cpp´æÔÚÀàÐÍ»ìÏý©¶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄWEBÇëÇó £¬ÓÕʹÓû§½âÎö £¬¿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐÈÎÒâ´úÂë¡£

https://www.mozilla.org/en-US/security/advisories/mfsa2020-02/


3. Android Realtek rtlwifi driverÔ¶³Ì´úÂëÖ´ÐЩ¶´


Android Realtek rtlwifi driver´æÔÚδÃ÷Äþ¾²Â©¶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬ÒÔϵͳȨÏÞÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£

https://source.android.google.cn/security/bulletin/2020-01-01


4. Android Sound subsystemȨÏÞÌáÉý©¶´


Android Sound subsystem´æÔÚδÃ÷Äþ¾²Â©¶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬¿ÉÌáÉýȨÏÞ¡£

https://source.android.google.cn/security/bulletin/2020-01-01


5. Billion Smart Energy Router SG600R2ÃüÁîÖ´ÐЩ¶´


Billion Smart Energy Router SG600R2°üÂÞsystem_command.asp½Å±¾ÒÔrootȨÏÞÖ´ÐÐ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬¿ÉÒÔrootȨÏÞÖ´ÐÐÈÎÒâÃüÁî¡£

https://github.com/InnotecSystem/Device-Reversing/wiki/Firmware-Inspection


ÖØÒªÄþ¾²Ê¼þ×ÛÊö


1¡¢Upstream SecurityÐû²¼2020°æ¡¶Æû³µÍøÂçÄþ¾²³ÂËß¡·


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Upstream Security2020°æ¡¶Æû³µÍøÂçÄþ¾²³ÂËß¡·»ùÓÚ¶Ô¹ýȥʮÄêÖÐ367Æð¹ûÈ»³ÂËßµÄÆû³µÍøÂçÄþ¾²Ê¼þ½øÐзÖÎö £¬ÖصãÇ¿µ÷ÁË2019ÄêÆڼ䷢Ïֵĩ¶´Óë¼û½â¡£¸Ã³ÂËßÖ¸³ö £¬»¥ÁªÍøÆû³µÒÑÔÚ½Ó¹ÜÆû³µÊг¡ £¬Ä¿Ç°ÒÑÓÐ3.3ÒÚÁ¾»¥ÁªÍøÆû³µ £¬ÕâÒâζ×Åÿ´Î¹¥»÷µÄDZÔÚÆÆ»µÁ¦³É±¶Ôö³¤ £¬´ó¹æÄ£µÄ¹¥»÷ʼþ¿ÉÄÜ»áÆÆ»µÕû¸ö¶¼ÊÐ £¬ÉõÖÁµ¼ÖÂÔÖÄÑÐÔµÄÉúÃüËðʧ¡£×Ô2016ÄêÒÔÀ´ £¬Ã¿ÄêÆû³µÍøÂçÄþ¾²Ê¼þµÄÊýÁ¿Ôö³¤ÁË605% £¬½ö2019ÄêÒ»Äê¾ÍÔö³¤ÁËÒ»±¶ÒÔÉÏ¡£ÔÚ2019Äê £¬ÓÐ57%µÄʼþÊÇÓÉÍøÂç×ï·¸½øÐеÄ £¬ÆäÄ¿µÄÊÇÆÆ»µÒµÎñ¡¢ÇÔÈ¡½ðÇ®»òË÷ÒªÊê½ð¡£½öÓÐ38%ÊÇÑо¿ÈËÔ±µÄ³ÂËß £¬ÆäÄ¿µÄÏò¹«Ë¾ºÍÏû·ÑÕß¾¯ÃܸæÏֵĩ¶´¡£


Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2020/01/06/automotive-cybersecurity-incidents/


2¡¢Î¢ÈíÐû²¼RDP±©Á¦¹¥»÷·ÖÎö³ÂËß £¬Æ½¾ùÁ¬Ðøʱ¼äΪ2-3Ìì


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


΢ÈíÐû²¼ÁËÒ»·ÝÕë¶ÔRDP±©Á¦¹¥»÷µÄ·ÖÎö³ÂËß £¬¸ÃÏîÑо¿ÊÇ»ùÓÚ´ÓÁè¼Ý4.5Íò¸ö°²×°ÁËÃâ·ÑMicrosoft Defender ATPµÄÊÂÇéÕ¾ÉÏÊÕ¼¯µÄÊý¾Ý¡£ÕâЩÊý¾ÝÓëʧ°ÜºÍÀֳɵÄRDPµÇ¼Ê¼þÓйأ¨·Ö±ðÊÇIDΪ4265ºÍ4264µÄWindowsʼþ£© £¬¶øÇÒÉæ¼°Óû§/¹¥»÷Õß¿ÉÄÜʹÓõÄÓû§ÃûÏêϸÐÅÏ¢ £¬Êý¾ÝÊÕ¼¯Á˼¸¸öÔµÄʱ¼ä¡£Î¢ÈíÔÚ³ÂËßÖÐÌåÏÖ £¬×î½üÊӲ쵽µÄRDP±©Á¦¹¥»÷ƽ¾ùÁ¬Ðø2-3Ìì £¬Ô¼90£¥µÄ°¸ÀýÁ¬Ðøʱ¼äÔÚÒ»ÖÜÄÚ £¬Ö»Óв»µ½5£¥µÄ°¸ÀýÁ¬Ðøʱ¼äÔÚÁ½ÖÜ»òÒÔÉÏ¡£Ô¼ÓÐ0.08£¥µÄRDP±©Á¦¹¥»÷ÀֳɽøÐÐÁ˵Ǽ¡£


Ô­ÎÄÁ´½Ó£º

https://www.microsoft.com/security/blog/2019/12/18/data-science-for-cybersecurity-a-probabilistic-time-series-model-for-detecting-rdp-inbound-brute-force-attacks/


3¡¢MITREÐû²¼ÊÊÓÃÓÚ¹¤Òµ¿ØÖÆϵͳµÄATT£¦CK¿ò¼Ü


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


±¾ÖܶþMITERÐû²¼ÁËÆäATT£¦CK¿ò¼ÜµÄ³õʼ°æ±¾ £¬¸Ã°æ±¾Öصã¹Ø×¢ÁËÕë¶Ô¹¤Òµ¿ØÖÆϵͳ£¨ICS£©µÄ¶ñÒâ¹¥»÷ÕßʹÓõļÆıºÍ¼¼Êõ¡£Ö¼ÔÚ×ÊÖúÒªº¦»ù´¡ÉèÊ©ºÍÆäËûʹÓÃICSµÄ×éÖ¯ÆÀ¹ÀÆäÍøÂç·çÏÕ¡£³ýÁËÌṩ¹¥»÷¼ÆıºÍ¼¼Êõ¾ØÕóÍâ £¬»¹½éÉÜÁ˹¥»÷¼¼ÊõµÄϸ½Ú¡¢¹¥»÷ÕßʹÓõĶñÒâÈí¼þÒÔ¼°ÒÑÖªµÄÕë¶ÔICSµÄ·¸×ïÍŻËü»¹°üÂÞÒ»¸ö×ʲúÀà±ð £¬ÓÃÓÚ×ÊÖú×éÖ¯Á˽â¿ÉÓ¦ÓÃÓÚÆä»·¾³µÄ¼¼Êõ¡£´Ë°æ±¾ÃèÊöÁË81ÖÖ¹¥»÷¼¼Êõ¡¢17ÖÖ¶ñÒâÈí¼þ¡¢10¸ö·¸×ïÍÅ»ïºÍ7ÖÖ×ʲú¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/mitre-releases-attck-knowledge-base-industrial-control-systems


4¡¢Î¢ÈíÐÞ¸´AccessÖеÄÐÅϢ鶩¶´£¨CVE-2019-1463£©


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


µç×ÓÓʼþÄþ¾²¹«Ë¾Mimecast͸¶ £¬Microsoft AccessÖеÄÐÅϢ鶩¶´¿ÉÄܵ¼ÖÂϵͳÄÚ´æÖеÄÃô¸ÐÊý¾Ý±»ÎÞÒâÖÐÉú´æÔÚÊý¾Ý¿âÎļþÖС£¸Ã©¶´£¨CVE-2019-1463£©±»³ÆΪMDB Leaker £¬Óë¡°Ó¦Ó÷¨Ê½¶ÔϵͳÄÚ´æµÄ²»Í×¹ÜÀí¡±ÓйØ £¬Ëü¿ÉÄܵ¼ÖÂδ³õʼ»¯µÄÄÚ´æÔªËصÄÄÚÈÝÉú´æµ½Microsoft Access MDBÎļþÖС£¾¡¹ÜÕâЩÊý¾Ý¿ÉÄܺÁÎÞÓô¦ £¬µ«ËüÒ²¿ÉÄÜ°üÂ޸߶ÈÃô¸ÐµÄÐÅÏ¢ £¬ÀýÈçÃÜÂë¡¢WebÇëÇó¡¢Ö¤ÊéÒÔ¼°Óò»òÓû§Êý¾Ý¡£MimecastÌåÏÖÄ¿Ç°²»»áÐû²¼ÓйØCVE-2019-1463µÄÈκμ¼ÊõÐÅÏ¢ £¬Ò²Ã»ÓÐÖ¤¾Ý±íÃ÷¸Ã©¶´ÒÑÔÚÒ°Íâ±»ÀûÓá£Î¢ÈíÒÑÔÚ2019Äê12ÔµIJ¹¶¡¸üÐÂÖÐÐÞ¸´Á˸鶴 £¬Æ¾¾Ý΢ÈíµÄ˵·¨ £¬¸Ã©¶´»áÓ°ÏìOffice 2010¡¢2013¡¢2016¡¢2019ºÍ365 ProPlus¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/microsoft-access-files-could-include-unintentionally-saved-sensitive-data


5¡¢MozillaÐû²¼¸üÐÂ,ÐÞ¸´Firefox 0day©¶´(CVE-2019-11707)


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


MozillaÐû²¼ÁËFirefox 72.0.1ºÍFirefox ESR 68.4.1 £¬ÐÞ¸´ÒÑÔÚÒ°Íâ±»»ý¼«ÀûÓõÄ0day£¨CVE-2019-11707£©¡£¸Ã©¶´±»¹éÀàΪÀàÐÍ»ìÏý©¶´ £¬Ó°ÏìÁËIonMonkey JIT±àÒëÆ÷ £¬Æ¾¾ÝMozillaµÄÄþ¾²Í¨¸æ £¬IonMonkey JIT±àÒëÆ÷ÖÐÓÃÓÚÉèÖÃÊý×éÔªËصıðÃûÐÅÏ¢²»ÕýÈ· £¬¿ÉÄܻᵼÖÂÀàÐÍ»ìÏý¡£Ç±ÔÚ¹¥»÷Õß¿Éͨ¹ý½«Óû§Öض¨ÏòÖÁ¶ñÒâÍøÒ³À´´¥·¢¸Ã©¶´ £¬µ¼Ö´úÂëÖ´Ðлò´¥·¢Í߽⡣ÃÀ¹úCISAÒ²·¢³ö¾¯¸æ³Æ¹¥»÷Õß¿ÉÄÜÀûÓôË©¶´À´¿ØÖÆÊÜÓ°ÏìµÄϵͳ £¬²¢½¨ÒéÓû§¼ì²ìMozillaÄþ¾²Í¨±¨ºÍÓ¦ÓÃÄþ¾²¸üС£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/mozilla-firefox-7201-patches-actively-exploited-zero-day/