ÐÅÏ¢Äþ¾²Öܱ¨-2019ÄêµÚ17ÖÜ
Ðû²¼Ê±¼ä 2019-04-29±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö
2019Äê4ÔÂ22ÈÕÖÁ28ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´51¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇPulse Secure Pulse Connect Secure CVE-2019-11542»º³åÇøÒç³ö©¶´£»ISC BIND nxdomain-redirect¾Ü¾ø·þÎñ©¶´; Cerner Connectivity Engine hostname¡¢timezoneºÍNTP serverÅäÖÃÃüÁî×¢È멶´£»Tenda AC7¡¢AC9ºÍAC10 web server (httpd)»º³åÇøÒç³ö©¶´£»Sierra Wireless AirLink ES450 ACEManager iplogging.cgi OSÃüÁî×¢È멶´¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊǸßͨæçÁúоƬ¸ßΣ©¶´£¬¿Éµ¼ÖÂQSEE¼ÓÃÜ˽Կй¶;Google PlayϼÜ50¸ö¶ñÒâÓ¦Ó㬰²×°Á¿´ï3000Íò´Î;Õë¶Ô»ªË¶µÄ¹©Ó¦Á´¹¥»÷ShadowHammer»¹Ãé×¼ÁíÍâÁù¼ÒÑÇÖÞ¹«Ë¾;Wi-FiÈȵã²éÕÒÆ÷й¶200ÍòWi-FiÃÜÂë;Google PlayÖйã¸æÈí¼þPreAMo£¬ÏÂÔØÁ¿´ï9000Íò´Î¡£
ÖØÒªÄþ¾²Â©¶´Áбí
Pulse Secure Pulse Connect Secure´æÔÚ»º³åÇøÒç³ö©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐÈÎÒâ´úÂë¡£
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA441012. ISC BIND nxdomain-redirect¾Ü¾ø·þÎñ©¶´
ISC BIND nxdomain-redirect¹¦Ð§´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉʹÊØ»¤·¨Ê½Í߽⣬½øÐоܾø·þÎñ¹¥»÷¡£
https://kb.isc.org/docs/cve-2019-6468
3. Cerner Connectivity Engine hostname¡¢timezoneºÍNTP serverÅäÖÃÃüÁî×¢È멶´
Cerner Connectivity Engine hostname¡¢timezoneºÍNTP serverÅäÖôæÔÚÊäÈ멶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÖ´ÐÐÈÎÒâOSÃüÁî¡£
https://www.securifera.com/advisories/cve-2018-20052-20053/
4. Tenda AC7¡¢AC9ºÍAC10 web server (httpd)»º³åÇøÒç³ö©¶´
Tenda AC7¡¢AC9ºÍAC10 web server (httpd)´æÔÚ»º³åÇøÒç³ö©¶´£¬ÔÊÐí Ô¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ɽøÐлº³åÇøÒç³ö¹¥»÷£¬¿ÉÖ´ÐÐÈÎÒâ´úÂë»ò½øÐоܾø·þÎñ¹¥»÷¡£
https://github.com/zsjevilhex/iot/blob/master/route/tenda/tenda-02/Tenda.md
5. Sierra Wireless AirLink ES450 ACEManager iplogging.cgi OSÃüÁî×¢È멶´
Sierra Wireless AirLink ES450 ACEManager iplogging.cgi´æÔÚÊäÈëÑé֤©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâOSÃüÁî¡£
https://packetstormsecurity.com/files/152646/Sierra-Wireless-AirLink-ES450-ACEManager-iplogging.cgi-Command-Injection.html
ÖØÒªÄþ¾²Ê¼þ×ÛÊö

¸ßͨоƬ×é´æÔÚÒ»¸ö²àÐŵÀ¹¥»÷©¶´£¬¸Ã©¶´£¨CVE-2018-11976£©¿ÉÔÊÐí¹¥»÷Õß´Ó¸ßͨоƬµÄQSEEÄþ¾²ÇøÓòÖмìË÷¼ÓÃÜ˽Կ¡£QSEEÊǸßͨоƬµÄ¿ÉÐÅÖ´Ðл·¾³£¨TEE£©£¬ÀàËÆÓÚÓ¢ÌضûµÄSGX¡£Æ¾¾ÝNCCÑо¿ÈËÔ±Keegan RyanµÄ±íÊö£¬¸ßͨоƬµÄ¼ÓÃÜÇ©ÃûËã·¨ECDSA£¨ÍÖÔ²ÇúÏßËã·¨£©´æÔÚ©¶´£¬¿Éͨ¹ýËæ»úÊýµÄһЩbitÍƲâ³ö256λECDSAÃÜÔ¿¡£¸Ã©¶´µÄÀûÓÃÐèÒªÉ豸µÄrootȨÏÞ¡£ÓÐ46¿î¸ßͨоƬ×éÊܵ½Ó°Ï죬°üÂÞ¶à¿îæçÁúоƬ¡£¸Ã©¶´µÄÐÞ¸´²¹¶¡ÒѾ°üÂÞÔÚGoogleÐû²¼µÄ4ÔÂAndroidÄþ¾²¸üÐÂÖС£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/security-flaw-lets-attackers-recover-private-keys-from-qualcomm-chips/
2¡¢Google PlayϼÜ50¸ö¶ñÒâÓ¦Ó㬰²×°Á¿´ï3000Íò´Î
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/30-million-android-users-have-installed-malicious-lifestyle-apps/
3¡¢Õë¶Ô»ªË¶µÄ¹©Ó¦Á´¹¥»÷ShadowHammer»¹Ãé×¼ÁíÍâÁù¼ÒÑÇÖÞ¹«Ë¾
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/shadowhammer-targets-multiple-companies-asus-just-one-of-them/
4¡¢Wi-FiÈȵã²éÕÒÆ÷й¶200ÍòWi-FiÃÜÂë
ƾ¾ÝTechCrunchµÄ³ÂËߣ¬Ò»¸öÃûΪWiFi FinderµÄAndroid APPй¶ÁËÁè¼Ý200Íò¸öWi-FiÍøÂçµÄÃÜÂ룬ÆäÖÐÊýÍò¸öWi-FiÈȵãλÓÚÃÀ¹ú¡£¸ÃAPPÓÃÓÚ×ÊÖúÓû§²éÕÒWi-FiÈȵ㣬ÆäÏÂÔØÁ¿´ïÊýǧ´Î¡£Ñо¿ÈËÔ±·¢ÏÖ¸ÃAPPµÄÊý¾Ý¿â̻¶ÔÚÍøÉÏÇÒδÊܱ£»¤£¬Êý¾Ý¿âÖеļǼ°üÂÞWi-FiÍøÂçµÄÃû³Æ¡¢¾«È·µÄµØÀíλÖá¢BSSIDºÍÃ÷ÎÄÃÜÂ룬µ«²»°üÂÞWi-FiËùÓÐÕßµÄÁªÏµÐÅÏ¢¡£ÔÆ·þÎñ¹«Ë¾DigitalOceanÔÚ½Óµ½³ÂËߺóɾ³ýÁ˸ÃÊý¾Ý¿â¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/leaky_app_data/144029/
5¡¢Google PlayÖйã¸æÈí¼þPreAMo£¬ÏÂÔØÁ¿´ï9000Íò´Î
CheckpointÑо¿ÈËÔ±ÔÚGoogle PlayÖз¢ÏÖ¹ã¸æÈí¼þPreAMo£¬¸Ã¹ã¸æÈí¼þαװ³É6¸öAPP£¬×ÜÏÂÔØÁ¿Áè¼Ý9000Íò´Î¡£PreAMoÖ÷ÒªÕë¶ÔÈý¸ö¹ã¸æÊðÀíÉÌ - Presage¡¢AdmobºÍMopub½øÐÐÆÛÕ©£¬¹¥»÷ÕßÕë¶Ôÿ¸ö¹ã¸æÊðÀíÉÌʹÓòîÒìµÄ´¦ÖÃÒªÁ죬µ«Ê¹ÓÃÁËÏàͬµÄC£¦C·þÎñÆ÷£¨res.mnexuscdn[.]com£©£¬ÓÃÓÚ·¢ËÍͳ¼ÆÐÅÏ¢ºÍ½ÓÊÕÅäÖÃÐÅÏ¢¡£Google PlayÔÚ½Óµ½³ÂËߺóÒѾϼÜÁËÕâЩÊÜѬȾµÄAPP¡£
ÔÎÄÁ´½Ó£º
https://research.checkpoint.com/preamo-a-clicker-campaign-found-on-google-play/