ÐÅÏ¢Äþ¾²Öܱ¨-2018ÄêµÚ48ÖÜ
Ðû²¼Ê±¼ä 2018-12-03
2018Äê11ÔÂ26ÈÕÖÁ12ÔÂ02ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´57¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇVMWare WorkstationºÍFusion CVE-2018-6983ÕûÊýÒç³ö©¶´£»Apache Hadoop CVE-2018-11766ȨÏÞÌáÉý©¶´£»TP-Link Archer C5 ¡®wan_dyn_hostname¡¯Ô¶³ÌÃüÁîÖ´ÐЩ¶´£»Schneider Electric Modicon M340ÃÜÂë¸ü¸Ä©¶´£»FreeBSD CVE-2018-17156»º³åÇøÒç³ö©¶´¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇÍòºÀ¾Æµê¼¯Íų¬´ó¹æÄ£Êý¾Ýй¶£¬²¨¼°5ÒÚÓû§£»UberÒò2016ÄêÊý¾Ý鶱»ºÉÀ¼ºÍÓ¢¹ú·£¿î120ÍòÃÀÔª£»Atrium HealthÔâºÚ¿Í¹¥»÷£¬Ô¼265Íò»¼ÕßÐÅϢй¶£»ElasticSearch·þÎñÆ÷̻¶Áè¼Ý5700ÍòÃÀ¹ú¹«ÃñµÄ¸öÈËÊý¾Ý£»»ùÓÚAutoCADµÄ¼äµý»î¶¯±»·¢ÏÖ£¬Ö÷ÒªÕë¶ÔÄÜÔ´ÐÐÒµ¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖС£
ÖØÒªÄþ¾²Â©¶´Áбí
1. VMWare WorkstationºÍFusion CVE-2018-6983ÕûÊýÒç³ö©¶´
VMWare WorkstationºÍFusion´æÔÚÕûÊýÒç³ö©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÖ´ÐÐÈÎÒâ´úÂë¡£http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6983
2. Apache Hadoop CVE-2018-11766ȨÏÞÌáÉý©¶´
Apache Hadoop´æÔÚÄþ¾²Â©¶´£¬ÔÊÐí¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó£¬ÒÔrootȨÏÞÖ´ÐÐÈÎÒâÃüÁî¡£
https://lists.apache.org/thread.html/ff37bbbe09d5f03090e2dd2c3dea95de16ef4249e731f19b8959ce4c@%3Cgeneral.hadoop.apache.org%3E
3. TP-Link Archer C5 ¡®wan_dyn_hostname¡¯Ô¶³ÌÃüÁîÖ´ÐЩ¶´
TP-Link Archer C5 ¡®wan_dyn_hostname¡¯²»ÕýÈ·´¦ÖÃÓû§ÊäÈ멶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÖ´ÐÐÈÎÒâSHELLÃüÁî¡£
https://github.com/JackDoan/TP-Link-ArcherC5-RCE
4. Schneider Electric Modicon M340ÃÜÂë¸ü¸Ä©¶´
Schneider Electric Modicon M340 WEB·þÎñÆ÷´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ɷÃÎÊ¡®password delete¡¯º¯Êý¸ü¸ÄÓû§ÃÜÂë¡£
https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/
5. FreeBSD CVE-2018-17156»º³åÇøÒç³ö©¶´
FreeBSDÔÚICMPʵÏÖÖдæÔÚ»º³åÇøÒç³ö©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ɽøÐоܾø·þÎñ¹¥»÷
https://www.freebsd.org/security/advisories/FreeBSD-EN-18:13.icmp.asc
ÖØÒªÄþ¾²Ê¼þ×ÛÊö
1¡¢ÍòºÀ¾Æµê¼¯Íų¬´ó¹æÄ£Êý¾Ýй¶£¬²¨¼°5ÒÚÓû§

ÍòºÀ¹ú¼Ê¾Æµê¼¯ÍÅ(Marriott International)½ñÈÕÐû²¼£¬ÆìÏÂϲ´ïÎݾƵê(Starwood Hotel)µÄÒ»¸öÖ÷¹ËÔ¤¶©Êý¾Ý¿â±»ºÚ¿ÍÈëÇÖ£¬¿ÉÄÜÓÐÔ¼5ÒÚÖ÷¹ËµÄÐÅϢй¶¡£¸ÃÏûÏ¢Ðû²¼ºó£¬ÍòºÀ¹ú¼Ê¾Æµê¹É¼ÛÔÚ½ñÈÕÅÌÇ°½»Ò×ÖÐÒ»¶ÈϵøÓâ5%¡£ÍòºÀ¹ú¼Ê¾Æµê³Æ£¬ÊÓ²ì½á¹ûÏÔʾ£¬ÓÐһδÊÚȨ·½¸´ÖƲ¢¼ÓÃÜÁËÕâЩÊý¾Ý¡£¶øÇÒ£¬×Ô2014Äê¾Í¿ªÊ¼Á˶Ôϲ´ïÎݾƵêÍøÂç½øÐÐδÊÚȨ·ÃÎÊ¡£Ä¿Ç°£¬ÍòºÀ¹ú¼Ê¾ÆµêÒѽÓÄÉÁ˵÷Í£´ëÊ©£¬µ«²¢Î´Ðû²¼½øÒ»²½µÄÐÅÏ¢¡£ÍòºÀ¹ú¼Ê¾Æµê³Æ£¬ÕâЩ¿ÉÄܱ»Ð¹Â¶µÄÐÅÏ¢°üÂÞÖ÷¹ËµÄÐÕÃû¡¢Í¨ÐŵØÖ·¡¢µç»°ºÅÂë¡¢µç×ÓÓÊÏä¡¢»¤ÕÕºÅÂ롢ϲ´ïÎÝVIP¿Í»§ÐÅÏ¢¡¢³öÉúÈÕÆÚ¡¢ÐÔ±ðºÍÆäËûһЩ¸öÈËÐÅÏ¢¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2018/11/marriott-starwood-data-breach.html
2¡¢UberÒò2016ÄêÊý¾Ý鶱»ºÉÀ¼ºÍÓ¢¹ú·£¿î120ÍòÃÀÔª

Ó¢¹úµÄÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©ÒÔ¼°ºÉÀ¼µÄÊý¾Ý±£»¤»ú¹¹Autoriteit Persoonsgegevens·Ö±ðÒò2016Äê10ÔµÄÊý¾Ýй¶Ê¼þ¶ÔUber´¦ÒÔ38.5ÍòÓ¢°÷ºÍ60ÍòÅ·ÔªµÄ·£¿î¡£ICOÌåÏÖ¸ÃʼþÓ°ÏìÁËÓ¢¹úµÄ270ÍòUberÓû§ÒÔ¼°8.2Íò˾»ú¡£ºÉÀ¼DPA³ÆÓÐ17.4ÍòºÉÀ¼¹«ÃñÊܵ½Ó°Ïì¡£·£¿îµÄÖ÷ÒªÔÒòÊÇUberÑÓ³ÙÁ˽üÒ»Äê²Å³ÂËß´Ë´Îй¶Ê¼þ£¬ÕâÑÏÖØÎ¥·´ÁËÏà¹ØÖ´·¨ÌõÀý£¬¶øÇÒʹÊÜÓ°ÏìµÄÓû§ºÍ˾»úÃæÁÙ¸ü¸ßµÄÆÛÕ©·çÏÕ¡£
https://www.bleepingcomputer.com/news/security/uber-fined-for-covering-up-2016-data-breach/
3¡¢Atrium HealthÔâºÚ¿Í¹¥»÷£¬Ô¼265Íò»¼ÕßÐÅϢй¶

ÃÀ¹ú±±¿¨ÂÞÀ³ÄÉÖÝ·ÇÓªÀûÒ½ÁÆ»ú¹¹Atrium HealthÔâºÚ¿Í¹¥»÷£¬Ô¼265Íò»¼ÕßµÄÐÅϢй¶¡£¸Ã¹¥»÷ʼþ·¢ÉúÔÚ9ÔÂ22ÈÕÖÁ9ÔÂ29ÈÕÆڼ䣬鶵ÄÐÅÏ¢°üÂÞÐÕÃû¡¢¼Òͥסַ¡¢³öÉúÈÕÆÚ¡¢±£ÏÕÐÅÏ¢¡¢·þÎñÈÕÆÚ¡¢Ò½ÁƼǼ±àºÅºÍÕË»§Óà¶îµÈ¡£´ËÍ⣬»¹Óн«½ü70Íò¸öÉç±£ºÅÂëй¶£¬µ«Ã»ÓвÆÕþÐÅϢй¶¡£¸Ã×éÖ¯Òѽ«Ïà¹Øʼþ֪ͨFBI£¬²¢ÏòÊÜÓ°ÏìµÄ»¼ÕßÌṩÃâ·ÑµÄÐÅÓüà¿Ø·þÎñ¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/atrium-health-data-breach-exposed-2-65-million-patient-records/
4¡¢ElasticSearch·þÎñÆ÷̻¶Áè¼Ý5700ÍòÃÀ¹ú¹«ÃñµÄ¸öÈËÊý¾Ý

Äþ¾²³§ÉÌHackenµÄÑо¿ÈËÔ±Bob Diachenkoͨ¹ýShodan·¢ÏÖÁËÒ»¸ö¿É¹ûÈ»·ÃÎʵÄElasticSearch·þÎñÆ÷£¬ÆäÊý¾Ý¿â̻¶ÁËÁè¼Ý5700ÍòÃÀ¹ú¹«ÃñµÄ¸öÈËÊý¾Ý¡£ÕâЩÊý¾Ý°üÂÞÐÕÃû¡¢µç×ÓÓʼþµØÖ·¡¢¼Òͥסַ¡¢ÖÝ¡¢ÓÊÕþ±àÂë¡¢µç»°ºÅÂëºÍIPµØÖ·µÈÐÅÏ¢¡£Ñо¿ÈËÔ±ÎÞ·¨È·Èϸ÷þÎñÆ÷µÄËùÓÐÕߣ¬µ«ËûÈÏΪ¼ÓÄôóÊý¾Ý¹«Ë¾Data£¦Leads»òÐíÓëÖ®Óйء£Ä¿Ç°¸Ã·þÎñÆ÷Òѱ»½øÐÐÄþ¾²¼Ó¹Ì¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/elasticsearch-server-exposed-the-personal-data-of-over-57-million-us-citizens/
5¡¢»ùÓÚAutoCADµÄ¼äµý»î¶¯±»·¢ÏÖ£¬Ö÷ÒªÕë¶ÔÄÜÔ´ÐÐÒµ

Äþ¾²³§ÉÌForcepoint·¢ÏÖÒ»¸öÀûÓûùÓÚAutoCADµÄ¶ñÒâÈí¼þµÄй¤Òµ¼äµý»î¶¯£¬¸Ã»î¶¯×Ô2014ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬Æä2018Äê»î¶¯µÄнüÊܺ¦ÕßÖ÷ҪλÓÚÖйú¡¢Ó¡¶È¡¢ÍÁ¶úÆäºÍ°¢ÁªÇõ¡£ForcepointÌåÏָû±³ºóµÄÍŶӿÉÄÜÊ®·ÖÅӴ󣬹¥»÷ÕßÀֳɵع¥»÷ÁËλÓÚ²îÒì¹ú¼Ò/µØÓòµÄ¶à¸ö¹«Ë¾£¬ÆäÖÐÖÁÉÙÒ»¸ö¹¥»÷»î¶¯Ö÷ÒªÕë¶ÔÄÜÔ´Òµ£¬ÁíÒ»¸ö¹¥»÷»î¶¯×¨×¢ÓÚÆû³µÖÆÔìÒµ¡£¹¥»÷ÕßÖ÷ҪʹÓðüÂÞ¶ñÒâAutoCADÎļþ»òÏÂÔØÁ´½ÓµÄÓã²æʽµöÓãÓʼþʵʩ¹¥»÷£¬ÕâЩAutoCADÎļþÖаüÂÞÒþ²ØµÄ.fasÄ£¿é£¨ÀàËÆÓÚwordÖеĺ꣩£¬ÓÃÓÚÁ¬½ÓÔ¶³ÌC&C²¢ÏÂÔØÆäËü¶ñÒâÈí¼þ¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/new-industrial-espionage-campaign-leverages-autocad-based-malware/
ÉùÃ÷£º±¾×ÊѶÓɶ«Éƽ̨άËûÃüÄþ¾²Ð¡×é·ÒëºÍÕûÀí