ÐÅÏ¢Äþ¾²Öܱ¨-2020ÄêµÚ33ÖÜ

Ðû²¼Ê±¼ä 2020-08-17

> ±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö


2020Äê08ÔÂ10ÈÕÖÁ08ÔÂ16ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´77¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇApache Struts CVE-2019-0230´úÂëÖ´ÐЩ¶´£»Citrix Systems XenMobile Server CVE-2020-8211δÃ÷ÈÎÒâ´úÂëÖ´ÐЩ¶´£»Schneider Electric APC Easy UPS On-Line `FileUploadServlet`·¾¶±éÀú©¶´£»SAP Business Objects Business Intelligence Platform XvfbÑéÖ¤Èƹý©¶´; Shenzhen Hichip Vision Technology Firmware P2P·þÎñ´úÂëÖ´ÐЩ¶´¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇFBI¾¯¸æÒÁÀʺڿÍÀûÓÃF5 BIG-IP©¶´¹¥»÷ADCÉ豸£»Check Point·¢ÏÖ¸ßͨµÄSnapdragonоƬ´æÔÚ400¶à¸ö©¶´£»Nusenu·¢ÏÖδ֪×éÖ¯½Ù³ÖTor½üËÄ·ÖÖ®Ò»µÄ³ö¿Ú½Úµã£»AdobeÐû²¼Äþ¾²¸üУ¬ÐÞ¸´¶à¿î²úÎïÖеÄ26¸ö©¶´£»FBIºÍNSAÁªºÏÅû¶¶íÂÞ˹Õë¶ÔLinuxµÄ¶ñÒâÈí¼þDrovorub¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖС£


ÖØÒªÄþ¾²Â©¶´Áбí


1. Apache Struts CVE-2019-0230´úÂëÖ´ÐЩ¶´


Apache Struts¿ò¼ÜÔÚ±»Ç¿ÖÆʹÓÃʱ£¬»á¶Ô±êÇ©µÄÊôÐÔ½øÐжþ´ÎÇóֵ©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÖ´ÐÐÈÎÒâ´úÂë¡£Ö»ÓÐÔÚStruts±êÇ©ÊôÐÔÖÐÇ¿ÖÆʹÓÃOGNL±í´ïʽʱ£¬²ÅÆø´¥·¢Â©¶´¡£

https://cwiki.apache.org/confluence/display/ww/s2-059


2. Citrix Systems XenMobile Server CVE-2020-8211δÃ÷ÈÎÒâ´úÂëÖ´ÐЩ¶´


Citrix Systems XenMobile Server´æÔÚδÃ÷Äþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£

https://www.auscert.org.au/bulletins/ESB-2020.2780/


3. Schneider Electric APC Easy UPS On-Line `FileUploadServlet`·¾¶±éÀú©¶´


Schneider Electric APC Easy UPS On-Line `FileUploadServlet`´æÔÚĿ¼±éÀú©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÉÏ´«ÈÎÒâÎļþµ½ÈÎÒâĿ¼¡£

https://us-cert.cisa.gov/ics/advisories/icsa-20-224-02


4. SAP Business Objects Business Intelligence Platform XvfbÑéÖ¤Èƹý©¶´


SAP Business Objects Business Intelligence Platform Xvfb´æÔÚÑéÖ¤Èƹý©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉδÊÚȨ·ÃÎÊÓ¦Óá£

https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552603345


5. Shenzhen Hichip Vision Technology Firmware P2P·þÎñ´úÂëÖ´ÐЩ¶´


Shenzhen Hichip Vision Technology Firmware P2P·þÎñ´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£

https://redprocyon.com



> ÖØÒªÄþ¾²Ê¼þ×ÛÊö


1¡¢FBI¾¯¸æÒÁÀʺڿÍÀûÓÃF5 BIG-IP©¶´¹¥»÷ADCÉ豸


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/fbi-iranian-hackers-trying-to-exploit-critical-f5-big-ip-flaw/


2¡¢Check Point·¢ÏÖ¸ßͨµÄSnapdragonоƬ´æÔÚ400¶à¸ö©¶´


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/chip-flaws-turn-android-phones-into-spying-tool/


3¡¢Nusenu·¢ÏÖδ֪×éÖ¯½Ù³ÖTor½üËÄ·ÖÖ®Ò»µÄ³ö¿Ú½Úµã


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/a-mysterious-group-has-hijacked-tor-exit-nodes-to-perform-ssl-stripping-attacks/


4¡¢AdobeÐû²¼Äþ¾²¸üУ¬ÐÞ¸´¶à¿î²úÎïÖеÄ26¸ö©¶´


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/adobe-fixes-critical-code-execution-bugs-in-acrobat-and-reader/    


5¡¢FBIºÍNSAÁªºÏÅû¶¶íÂÞ˹Õë¶ÔLinuxµÄ¶ñÒâÈí¼þDrovorub


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/fbi-and-nsa-expose-new-linux-malware-drovorub-used-by-russian-state-hackers/