ÐÅÏ¢Äþ¾²Öܱ¨-2020ÄêµÚ34ÖÜ
Ðû²¼Ê±¼ä 2020-08-24> ±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö
2020Äê08ÔÂ17ÈÕÖÁ23ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´53¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇMicro Air Vehicle LinkÉí·ÝÑéÖ¤Èƹý©¶´£»Silicon Labs Bluetooth Low Energy SDK CVE-2020-15531»º³åÇøÒç³ö©¶´£»Apache ShiroÉí·ÝÑéÖ¤Èƹý©¶´£»Beijing Kuangshi Technology MEGVII KoalaδÊÚȨ·ÃÎÊ©¶´; ZKTeco FaceDepotȨÏÞÌáÉý©¶´¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇCactusPete APTÀûÓÃBisonal¹¥»÷Å·ÖÞ½ðÈں;üÊÂ×éÖ¯£»ºÚ¿Í×éÖ¯TeamTNTÀûÓüÓÃÜÈä³æÇÔÈ¡AWSƾ֤£»ÓÊÂÖ¹«Ë¾CarnivalѬȾÀÕË÷Èí¼þ£¬²¿ÃÅÊý¾Ý»òÒÑй¶£»MicrosoftÐû²¼Windows´øÍâÄþ¾²¸üУ¬ÐÞ¸´ÌáȨ©¶´£»ThalesµÄ²úÎï´æÔÚ©¶´£¬¿ÉÓ°ÏìÊý°ÙÍòIoTÉ豸¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖС£
> ÖØÒªÄþ¾²Â©¶´Áбí
1.Micro Air Vehicle LinkÉí·ÝÑéÖ¤Èƹý©¶´
Micro Air Vehicle Link (MAVLink)ʹÓÃÎÊ´ð»úÖƽøÐа汾ÐÉÌ£¬Ã»ÓнÓÄÉÉí·ÝÑéÖ¤»úÖÆ£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó£¬ÈƹýÉí·ÝÑéÖ¤£¬Ö±½ÓÓë×Ô¶¯¼Ýʻϵͳ½øÐн»»¥¡£
https://github.com/aliasrobotics/RVD/issues/3316
2. Silicon Labs Bluetooth Low Energy SDK CVE-2020-15531»º³åÇøÒç³ö©¶´
Silicon Labs Bluetooth Low Energy SDK´¦Öñ¨ÎÄÊý¾Ý´æÔÚ»º³åÇøÒç³ö©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£
https://github.com/darkmentorllc/jackbnimble/blob/master/host/pocs/silabs_efr32_extadv_rce.py
3. Apache ShiroÉí·ÝÑéÖ¤Èƹý©¶´
Apache Shiro´¦ÖÃHTTPÇëÇó´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÈƹýÑé֤δÊÚȨ·ÃÎÊ¡£
https://lists.apache.org/thread.html/r539f87706094e79c5da0826030384373f0041068936912876856835f%40%3Cdev.shiro.apache.org%3E
4. Beijing Kuangshi Technology MEGVII KoalaδÊÚȨ·ÃÎÊ©¶´
Beijing Kuangshi Technology MEGVII Koala 5000¶Ë¿Ú´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ɻñÈ¡ÎïÀí·ÃÎÊȨÏÞ¡£
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/vulnerability/8137/megvii-koala-291c3s-architectural-vulnerability-on-network-relays
5. ZKTeco FaceDepotȨÏÞÌáÉý©¶´
ZKTeco FaceDepot´æÔÚÁîÅÆÖØÓÃÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ɴ´½¨ÈÎÒâÓû§£¬ÌáÉýȨÏÞ£¬²¢ÏÂÔØÊý¾Ý¿âµÈ¡£
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/vulnerability/8134/zkteco-facedepot-7b-10213-and-zkbiosecurity-server-10020190723-improper-privilege-vulnerability
> ÖØÒªÄþ¾²Ê¼þ×ÛÊö
1¡¢CactusPete APTÀûÓÃBisonal¹¥»÷Å·ÖÞ½ðÈں;üÊÂ×éÖ¯
¿¨°Í˹»ù·¢ÏÖCactusPete APTÕý½øÐÐÒ»³¡Õë¶ÔÕû¸ö¶«Å·¾üʺͽðÈÚ×éÖ¯µÄ»î¶¯£¬²¢Ê¹ÓÃÁ˺óÃÅBisonalµÄбäÌå¡£¸Ã×éÖ¯ÓÚ2013ÄêÊ״α»·¢ÏÖ£¬ÓëÅ·ÖÞ¡¢¶íÂÞ˹¡¢ÈÕ±¾ºÍº«¹úµÄÍøÂç·¸×ï»î¶¯Óйأ¬×¨ÃÅ´ÓÊÂÇ鱨ÊÕ¼¯ºÍ¼äµý»î¶¯¡£CactusPeteʹÓõÄBisonalÊÇÒ»ÖÖÍøÂç¼äµý¹¤¾ß£¬Äܹ»±£³Ö¶ÔÊÜѬȾ»úÆ÷µÄ³Ö¾ÃÐÔ£¬¿ÉɨÃèÇý¶¯Æ÷¡¢Áгö²¢Ð¹Â¶Ãô¸ÐµÄÎļþ¡¢É¾³ýÄÚÈÝ¡¢É±ËÀϵͳ½ø³ÌÒÔ¼°Ö´ÐдúÂë¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/cactuspete-threat-group-goes-on-the-rampage-with-a-new-bisonal-backdoor/
2¡¢ºÚ¿Í×éÖ¯TeamTNTÀûÓüÓÃÜÈä³æÇÔÈ¡AWSƾ֤
TeamTNTÊÇÒ»¸öÕë¶ÔDocker°²×°µÄÍøÂç·¸×ï×éÖ¯£¬»òÐíΪµÚÒ»¸öʹÓþßÓÐÇÔÈ¡AWSƾ֤¹¦Ð§µÄ¼ÓÃÜÍÚ¾ò¶ñÒâÈí¼þµÄ×éÖ¯¡£Trend Micro½ñÄêÔçЩʱºò·¢ÏÖ£¬¸Ã×éÖ¯´Ó4Ô¿ªÊ¼»îÔ¾£¬Í¨¹ýÔÚ»¥ÁªÍøÉÏɨÃèÅäÖôíÎóµÄDockerϵͳ·ÃÎÊ̻¶µÄAPI£¬²¢ÔÚDocker²¿Êð·þÎñÆ÷À´ÔËÐÐDDoSºÍ¼ÓÃܶñÒâÈí¼þ¡£Ñо¿ÈËÔ±·¢ÏÖËû»¹¿ÉÒÔɨÃèÔËÐÐÔÚAWS»ù´¡¼Ü¹¹ÉÏ·þÎñÆ÷ÖÐµÄ ~/.aws/credentials and ~/.aws/configÎļþ£¬À´»ñÈ¡Amazon Web Services£¨AWS£©Æ¾Ö¤¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/crypto-mining-worm-steal-aws-credentials/
3¡¢ÓÊÂÖ¹«Ë¾CarnivalѬȾÀÕË÷Èí¼þ£¬²¿ÃÅÊý¾Ý»òÒÑй¶
È«Çò×î´óµÄÓÊÂÖ¹«Ë¾Carnival CorpÔÚ8ÔÂ15ÈÕÔâµ½ÁËÀÕË÷Èí¼þ¹¥»÷£¬²¿ÃÅÊý¾Ý»òÒÑй¶¡£¸Ã¹«Ë¾ÌåÏÖ£¬ºÚ¿Í·ÃÎʲ¢¼ÓÃÜÁËÆä·Ö¹«Ë¾µÄÐÅÏ¢¼¼Êõϵͳ£¬¶øÇÒÇÔÈ¡ÁËÎļþ¡£Æ¾¾Ý¶Ô¸ÃʼþµÄ¿ª¶ËÆÀ¹À£¬¼ÎÄ껪ÈÏΪ£¬¹¥»÷Õß¿ÉÄÜÒѾ·ÃÎÊÁËijЩÀ´±öºÍÔ±¹¤µÄ¸öÈËÊý¾Ý¡£µ«ÊÇCarnivalûÓÐ͸¶ÓйشËʼþµÄÏêϸÐÅÏ¢£¬ÀýÈçÀÕË÷Èí¼þÃû³Æ£¬»òÆä¹¥»÷Ó°Ï췶ΧµÈ¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/worlds-largest-cruise-line-operator-discloses-ransomware-attack/
4¡¢MicrosoftÐû²¼Windows´øÍâÄþ¾²¸üУ¬ÐÞ¸´ÌáȨ©¶´
MicrosoftΪWindows 8.1ºÍWindows Server 2012 R2Ðû²¼ÁË´øÍâÄþ¾²¸üУ¬Ö¼ÔÚÐÞ¸´ÌáȨ©¶´£¬¸Ã©¶´»áÓ°ÏìWindowsÔ¶³Ì·ÃÎÊ·þÎñ¡£´Ë´ÎÐÞ¸´µÄÁ½¸ö©¶´±»×·×ÙΪCVE-2020-1530ºÍCVE-2020-1537£¬¹¥»÷ÕßÔÚÀÖ³ÉÀûÓúó¿É»ñµÃ¸ü¸ßµÄȨÏÞ¡£µ«ÊÇÔÚÀûÓÃÕâЩ©¶´Ö®Ç°£¬¹¥»÷ÕßÐèÒªÏÈÔÚÊܺ¦ÕßµÄÉ豸ÉϱàдִÐÐÌØȨ´úÂë¡£´Ë´Î¸üÐÂͨ¹ý¸üÕýWindows Remote Access´¦ÖÃÄÚ´æºÍÎļþ²Ù×÷µÄ·½Ê½À´½â¾ö©¶´¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/microsoft-issues-out-of-band-kb4578013-windows-security-update/
5¡¢ThalesµÄ²úÎï´æÔÚ©¶´£¬¿ÉÓ°ÏìÊý°ÙÍòIoTÉ豸
IBMµÄÄþ¾²Ñо¿ÈËÔ±·¢ÏÖThalesµÄ²úÎïµÄͨÐÅÄ£¿éÖдæÔÚÑÏÖØ©¶´£¬¿ÉÓ°ÏìÊý°ÙÍòIoTÉ豸¡£¸Ã©¶´±»×·×ÙΪCVE-2020-15858£¬ÓÚ2019Äê9ÔÂÊ×´ÎÔÚThalesµÄCinterion EHS8 M2MÄ£¿éÖб»·¢ÏÖ£¬²¢ÓÚ2020Äê2Ô±»ÐÞ¸´¡£ºóÀ´»¹·¢ÏÖËü»¹»áÓ°ÏìÆäËûÊ®¸öÄ£¿é¡£¸Ã©¶´Óë°üÂÞÓмÓÃÜÃÜÔ¿¡¢ÃÜÂëºÍÖ¤ÊéÖ®ÀàÐÅÏ¢µÄJava´úÂëÓйأ¬¹¥»÷Õß¿ÉÒÔÀûÓôË©¶´ÈƹýÄþ¾²»úÖƲ¢·ÃÎÊÕâЩÐÅÏ¢£¬È»ºóÀûÓøÃÐÅÏ¢À´¿ØÖÆÉ豸»ò·ÃÎÊ°üÂÞ¸ÃÉ豸µÄÍøÂç¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/vulnerability-thales-product-could-expose-millions-iot-devices-attacks