ÐÅÏ¢Äþ¾²Öܱ¨-2018ÄêµÚ30ÖÜ

Ðû²¼Ê±¼ä 2018-07-30

Ò»¡¢±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö


2018Äê07ÔÂ23ÈÕÖÁ29ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´51¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇASUS HG100ÃüÁîÖ´ÐÐÄþ¾²Â©¶´£»Cisco SD-WAN Configuration and Management DatabaseÔ¶³Ì´úÂëÖ´ÐЩ¶´£»Intel Converged Security Management EngineÈÎÒâ´úÂëÖ´ÐЩ¶´£»McAfee Web Gateway¹ÜÀí½çÃæÈÎÒâ´úÂëÖ´ÐЩ¶´£»Dell EMC RSA Archer REST APIȨÏÞÌáÉý©¶´¡£

±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇÑо¿»ú¹¹¾¯¸æ³ÆÔ¼5ÒÚIoTÉ豸Ò×ÊÜDNSÖØа󶨹¥»÷µÄÓ°Ï죻Áè¼Ý100¼ÒÆû³µ³§É̵ĻúÃÜÊý¾Ýй¶£¬·áÌï¡¢ÌØ˹À­µÈ¾ùÊÜÓ°Ï죻Ñо¿ÈËÔ±·¢ÏÖÕë¶ÔOracle WebLogic·þÎñÆ÷µÄй¥»÷»î¶¯£»¸¥¼ªÄáÑÇÒøÐÐ8¸öÔÂÄÚ2´ÎÔâºÚ¿ÍÈëÇÖ£¬¹²ËðʧԼ240ÍòÃÀÔª£»ÖÐÔ¶º£ÔËÃÀ¹ú·Ö¹«Ë¾ÔâÀÕË÷Èí¼þ¹¥»÷£¬¹«Ë¾¹ÙÍøÒṈ̃»¾¡£

ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖС£

¶þ¡¢ÖØÒªÄþ¾²Â©¶´Áбí


1¡¢ASUS HG100ÃüÁîÖ´ÐÐÄþ¾²Â©¶´


ASUS HG100´æÔÚÊäÈëÑé֤©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâÌØÊâÇëÇó£¬ÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâÃüÁî¡£

Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÄþ¾²²¹¶¡ÒÔÐÞ¸´¸Ã©¶´£º

https://jenkins.io/security/advisory/2018-07-18/


2¡¢Cisco SD-WAN Configuration and Management DatabaseÔ¶³Ì´úÂëÖ´ÐЩ¶´


Cisco SD-WAN Configuration and Management DatabaseÔ¶´æÔÚÊäÈëÑé֤©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó£¬ÒÔvmanageÓû§ÉÏÏÂÎÄÖ´ÐÐÈÎÒâÃüÁî¡£


Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÄþ¾²²¹¶¡ÒÔÐÞ¸´¸Ã©¶´£º

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cx


3¡¢Intel Converged Security Management EngineÈÎÒâ´úÂëÖ´ÐЩ¶´


Intel Converged Security Management EngineÔ¶³Ì¹ÜÀí·½°¸ÔÚʵÏÖÉÏ´æÔÚÂß¼­Â©¶´£¬ÔÊÐíµ±µØ¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó£¬Ö´ÐÐÈÎÒâ´úÂë¡£

Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÄþ¾²²¹¶¡ÒÔÐÞ¸´¸Ã©¶´£º

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00118.html


4¡¢McAfee Web Gateway¹ÜÀí½çÃæÈÎÒâ´úÂëÖ´ÐЩ¶´


McAfee Web Gateway¹ÜÀí½çÃæ´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó£¬ÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£

Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÄþ¾²²¹¶¡ÒÔÐÞ¸´¸Ã©¶´£º

https://kc.mcafee.com/corporate/index?page=content&id=SB10245


5¡¢Dell EMC RSA Archer REST APIȨÏÞÌáÉý©¶´


Dell EMC RSA Archer REST API´æÔÚÊÚȨÈƹý©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó£¬ÌáÉýȨÏÞ¡£

Óû§¿É²Î¿¼Èçϳ§ÉÌÌṩµÄÄþ¾²²¹¶¡ÒÔÐÞ¸´¸Ã©¶´£º

http://seclists.org/fulldisclosure/2018/Jul/69


Èý¡¢ÖØÒªÄþ¾²Ê¼þ×ÛÊö


1¡¢Ñо¿»ú¹¹¾¯¸æ³ÆÔ¼5ÒÚIoTÉ豸Ò×ÊÜDNSÖØа󶨹¥»÷µÄÓ°Ïì


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Armis¹«Ë¾¾¯¸æ³ÆÔ¼5ÒÚ¸öIoTÉ豸Ò×ÊÜDNSÖØа󶨹¥»÷µÄÓ°Ïì¡£DNSÖØа󶨹¥»÷ÊÇÖ¸¹¥»÷ÕßÆÛÆ­Óû§µÄä¯ÀÀÆ÷»òÉ豸°ó¶¨ÖÁ¶ñÒâµÄDNS·þÎñÆ÷µÄ¹¥»÷·½Ê½¡£Armis·ÖÎöÁËÕâÖÖ¹¥»÷¶ÔIoTÉ豸µÄÓ°Ï죬³Æ¼¸ºõËùÓÐÀàÐ͵ÄÖÇÄÜÉ豸¶¼Ò×ÊÜ´ËÀ๥»÷£¬°üÂÞÖÇÄܵçÊÓ¡¢Â·ÓÉÆ÷¡¢´òÓ¡»ú¡¢¼àÊÓÆ÷¡¢IPµç»°µÈ¡£ÐÞ¸´ËùÓеÄÉ豸¿ÉÄÜÊÇÒ»ÏîÎÞ·¨Íê³ÉµÄÈÎÎñ£¬µ«½«IoTÉ豸¼¯³Éµ½Äþ¾²¼à¿Ø²úÎïÖпÉÄÜÊÇ×î¼òµ¥ÓÐЧµÄ½â¾ö·½°¸¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/half-a-billion-iot-devices-vulnerable-to-dns-rebinding-attacks/


2¡¢Áè¼Ý100¼ÒÆû³µ³§É̵ĻúÃÜÊý¾Ýй¶£¬·áÌï¡¢ÌØ˹À­µÈ¾ùÊÜÓ°Ïì


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


UpGuardÑо¿ÈËÔ±Chris Vickery·¢ÏÖ¹©Ó¦ÉÌLevel OneµÄ²»Äþ¾²Êý¾Ý¿â£¬ÆäÖаüÂÞ½ü47000·ÝÎļþ£¬º­¸Ç¶à¼ÒÆû³µ³§É̵ĽüÊ®ÄêµÄÏêϸÀ¶Í¼¡¢¹¤³§Ô­Àíͼ¡¢¿Í»§ÖÊÁÏ£¨ÈçºÏͬ¡¢·¢Æ±ºÍÊÂÇé¼Æ»®µÈ£©£¬ÒÔ¼°ÖÖÖÖ±£ÃÜЭÒéÎļþµÈ¡£Ð¹Â¶µÄÊý¾Ý×ÜÁ¿´ï157GB£¬¸£ÌØ¡¢·áÌͨÓúÍÌØ˹À­µÈ¾ùÊÜÓ°Ï졣鶵ÄÔ­ÒòÊÇLevel One¹«Ë¾µÄÓÃÓÚ±¸·ÝÊý¾ÝµÄÎļþ´«ÊäЭÒérsync±»ÅäÖÃΪ¿É¹ûÈ»·ÃÎÊ£¬¶øÇÒ²»ÐèÒªÈκÎÃÜÂë¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.grahamcluley.com/robotics-suppliers-sloppy-security-leaks-ten-years-worth-of-data-from-major-car-manufacturers/

3¡¢Ñо¿ÈËÔ±·¢ÏÖÕë¶ÔOracle WebLogic·þÎñÆ÷µÄй¥»÷»î¶¯


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Ñо¿ÈËÔ±·¢ÏÖÖ÷ÒªÕë¶ÔOracle WebLogic·þÎñÆ÷µÄ¹¥»÷»î¶¯£¬ÕâЩ¹¥»÷»î¶¯Ö÷ÒªÀûÓ鶴£¨CVE-2018-2893£©½øÐй¥»÷¡£OracleÔÚ7ÔÂ18ÈÕÐû²¼Á˸鶴µÄÏà¹Ø²¹¶¡£¬7ÔÂ21ÈÕÆäÏà¹ØPoC±»Åû¶¡£Ñо¿ÈËÔ±·¢ÏÖÖÁÉÙ2¸ö×éÖ¯ÕýÔÚÀûÓø鶴½øÐй¥»÷£¬½¨Ò黹δ¸üеÄÓû§¾¡¿ì½øÐÐÉý¼¶¡£Ò×Êܹ¥»÷µÄ°æ±¾°üÂÞ10.3.6.0¡¢12.1.3.0¡¢12.2.1.2ºÍ12.2.1.3¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/attacks-on-oracle-weblogic-servers-detected-after-publication-of-poc-code/

4¡¢¸¥¼ªÄáÑÇÒøÐÐ8¸öÔÂÄÚ2´ÎÔâºÚ¿ÍÈëÇÖ£¬¹²ËðʧԼ240ÍòÃÀÔª


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¾Ý¼ÇÕßBrian Krebs±¨µÀ£¬ÃÀ¸¥¼ªÄáÑǹú¼ÒÒøÐÐÓÚ2016Äê5ÔÂÏÂÑ®ºÍ2017Äê1ÔÂÁ½´ÎÔâµ½µöÓãÓʼþµÄ¹¥»÷£¬¹²ËðʧԼ240ÍòÃÀÔª¡£µÚÒ»´Î¹¥»÷Öй¥»÷Õßͨ¹ý¶ñÒâÈí¼þѬȾÁËһ̨¼ÆËã»ú£¬²¢Äܹ»·ÃÎÊÒøÐÐÄÚÍøºÍÈƹýPINÂ롢ÿÈÕÈ¡¿îÏÞÖÆÒÔ¼°·´ÆÛÕ©´ëÊ©µÈ¡£µÚ¶þ´Î¹¥»÷µÄģʽÓëµÚÒ»´Î¹¥»÷ÏàËÆ¡£SynopsysÊ×ϯÕÕÁÏChandu KetkarÈÏΪ£¬ÕâЩʼþÊÇÆäÄþ¾²ÒâʶÅàѵ¡¢¼à¿ØºÍÓ¦¼±ÏìÓ¦µÈ¼ÆıµÄʧ°Ü¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.infosecurity-magazine.com/news/virginian-bank-robbed-twice-in/

5¡¢ÖÐÔ¶º£ÔËÃÀ¹ú·Ö¹«Ë¾ÔâÀÕË÷Èí¼þ¹¥»÷£¬¹«Ë¾¹ÙÍøÒṈ̃»¾


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÖÐÔ¶º£Ô˵ÄÃÀ¹ú·Ö¹«Ë¾Ôâµ½ÀÕË÷Èí¼þµÄ¹¥»÷£¬Æ乫˾ÍøÂçÒÑÏÝÈë̱»¾¡£¸Ãʼþ·¢ÉúÔÚ7ÔÂ24ÈÕÐÇÆÚ¶þ£¬µ«Ä¿Ç°¸Ã¹«Ë¾ÃÀ¹úµØÓòµÄIT»ù´¡ÉèÊ©ÈÔ´¦ÓڹرÕÖ®ÖУ¬°üÂÞµç×ÓÓʼþ·þÎñÆ÷ºÍµç»°ÍøÂçµÈ£¬Æä¹ÙÍøÒ²´¦ÓڹرÕ״̬¡£Ñ¬È¾¸Ã¹«Ë¾ÍøÂçµÄÀÕË÷Èí¼þÀàÐÍÈÔȻδ֪£¬Ä¿Ç°¸Ã¹«Ë¾Ò²Î´×÷³ö¸ü¶à»ØÓ¦¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/ransomware-infection-cripples-shipping-giant-coscos-american-network/