ÐÅÏ¢Äþ¾²Öܱ¨-2019ÄêµÚ23ÖÜ
Ðû²¼Ê±¼ä 2019-06-17±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö
2019Äê6ÔÂ10ÈÕÖÁ16ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´63¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇSAP E-Commerce CVE-2019-0308Ô¶³Ì´úÂë×¢È멶´£»Adobe CampaignÈÎÒâ´úÂëÖ´ÐЩ¶´£» WAGO Industrial Managed Switches SSHÓ²±àÂ멶´£»Microsoft Word CVE-2019-1034ÄÚ´æÆÆ»µ´úÂëÖ´ÐЩ¶´£»Dahua IPC-HFW1XXXÉãÏñ»ú»º³åÇøÒç³ö©¶´¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇ
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖС£
ÖØÒªÄþ¾²Â©¶´Áбí
SAP E-Commerce´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó£¬×¢ÈëÈÎÒâ´úÂ룬²¢ÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐС£
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=521864242
Adobe Campaign´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó£¬ÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâÃüÁî¡£
https://helpx.adobe.com/security/products/campaign/apsb19-28.html
WAGO Industrial Managed Switches¶à¸ö²úÎï´æÔÚÓ²±àÂëSSHÃÜԿ©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉδÊÚȨ·ÃÎÊÉ豸¡£
https://ics-cert.us-cert.gov/advisories/ICSA-19-164-02
Microsoft Word´¦ÖÃWORDÎļþ´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÎļþÇëÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉÖ´ÐÐÈÎÒâ´úÂë¡£
https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2019-1034
Dahua IPC-HFW1XXX´æÔÚ»º³åÇøÒç³ö©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ɽøÐоܾø·þÎñ¹¥»÷»òÕßÖ´ÐÐÈÎÒâ´úÂë¡£
https://www.dahuasecurity.com/support/cybersecurity/details/617
ÖØÒªÄþ¾²Ê¼þ×ÛÊö

¹È¸è֤ʵ2017ÄêºÚ¿ÍÔøÀûÓõÚÈý·½¹©Ó¦É̹¹½¨µÄ·¨Ê½´úÂëÔÚAndroidÊÖ»úÉÏ°²×°TriadaºóÃÅ¡£¹È¸èûÓоßÌå˵Ã÷ÄÄЩÉ豸Êܵ½ÁËÓ°Ï죬µ«Äþ¾²³§ÉÌDr.WebÔøÔÚ2017ÄêµÄÑо¿³ÂËßÖÐÖ¸³öÊÜÓ°ÏìµÄÉ豸ƷÅÆ°üÂÞLeagoo M5 Plues¡¢Leagoo M8¡¢Nomu S10ºÍNomu S20µÈ¡£¸ÃºóÃÅÖ¼ÔÚÏòÓû§µÄÉ豸ÍÆËÍÀ¬»øÓʼþºÍδÊÚȨµÄ¹ã¸æµÈ¡£
ÔÎÄÁ´½Ó£º
https://www.cyberscoop.com/android-backdoor-triada-mobile-supply-chain/
2¡¢HSMÑÏÖØ©¶´£¬Ó°Ïì¶à¸öÒøÐС¢ÔÆ·þÎñÉ̺ÍÕþ¸®»ú¹¹
LedgerÄþ¾²Ñо¿ÈËÔ±Åû¶һ¼ÒÖ÷Òª³§É̵ÄHSM£¨Ó²¼þÄþ¾²Ä£¿é£©ÖеÄÑÏÖØ©¶´£¬¸Ã©¶´¿ÉÔÊÐí¼ìË÷´æ´¢ÔÚHSMÖеÄÃô¸ÐÊý¾Ý¡£HSMÊÇÓ²¼þ¸ôÀëÉ豸£¬³£ÓÃÓÚ½ðÈÚ»ú¹¹¡¢Õþ¸®»ú¹¹¡¢Êý¾ÝÖÐÐÄ¡¢ÔÆ·þÎñÉ̺͵çÐÅÔËÓªÉ̵ȡ£Æ¾¾ÝÑо¿ÈËÔ±µÄ³ÂËߣ¬¸Ã©¶´ÔÊÐíδ¾Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÍêÈ«¿ØÖÆHSM£¬´Ó¶ø¼ìË÷¼ÓÃÜÃÜÔ¿ºÍ¹ÜÀíԱƾ¾ÝµÈÐÅÏ¢¡£Ñо¿ÈËÔ±²¢Î´Åû¶ÊÜÓ°ÏìµÄ³§ÉÌÃû³Æ£¬µ«CryptosenseÖ¸³ö¸Ã³§ÉÌ¿ÉÄÜÊǽðÑÅÍØ¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/major-hsm-vulnerabilities-impact-banks-cloud-providers-governments/
3¡¢Ê©Ä͵µçÆøModicon M580¶à¸ö©¶´£¬¿Éµ¼ÖÂDoS¼°ÐÅϢй¶
˼¿ÆTalosÅû¶ʩÄ͵µçÆøModicon M580ÖеĶà¸ö©¶´¡£Modicon M580ÊÇÊ©Ä͵µçÆøModiconϵÁпɱà³Ì×Ô¶¯»¯¿ØÖÆÆ÷µÄ×îвúÎÑо¿ÈËÔ±ÔÚÆä¹Ì¼þ°æ±¾SV2.70Öз¢ÏÖ¶à¸ö©¶´£¬°üÂ޿ɵ¼ÖÂDoSµÄ©¶´£¨CVE-2018-7846¡¢CVE-2018-7849¡¢CVE-2018-7843£©£¬¿Éµ¼ÖÂÐÅϢй¶µÄ©¶´£¨CVE-2018-7844¡¢CVE-2018-7848£©¼°Éí·ÝÑéÖ¤Èƹý©¶´£¨CVE-2018-7842£©µÈ¡£
ÔÎÄÁ´½Ó£º
https://blog.talosintelligence.com/2019/06/vulnerability-spotlight-multiple.html
4¡¢·É»úÁ㲿¼þ³§ÉÌASCOÔâÀÕË÷Èí¼þ¹¥»÷£¬²¿ÃŹ¤³§ÒѹرÕ
¾Ý±ÈÀûʱýÌ屨µÀ£¬·É»úÁ㲿¼þ³§ÉÌASCOλÓÚ±ÈÀûʱÔú·ÒÌØÄ·µÄ¹¤³§ÔâÀÕË÷Èí¼þѬȾ£¬¸Ã¹«Ë¾ÒÑÍ£Ö¹ÁËËĸö¹ú¼ÒµÄ¹¤³§Éú²ú¡£¸ÃѬȾʼþ·¢ÉúÔÚ6ÔÂ7ÈÕÐÇÆÚÎ壬×î³õÓ°ÏìÁ˸ù«Ë¾Î»ÓÚ±ÈÀûʱµÄ¹¤³§£¬µ«ASCOÒ²¹Ø±ÕÁËλÓڵ¹ú¡¢¼ÓÄôóºÍÃÀ¹úµÄ¹¤³§¡£¾Ý±¨µÀÍ£»úʱ¼äÔ¤¼ÆΪһÖÜ£¬°üÂÞ¼´½«µ½À´µÄÖÜÄ©¡£¸Ã¹«Ë¾²¢Î´Í¸Â¶¸ü¶àÐÅÏ¢£¬Ä¿Ç°Ò²²»ÖªµÀÀÕË÷Èí¼þµÄÃû³Æ¡£ASCOÊÇÊÀ½çÉÏ×î´óµÄ·É»úÁ㲿¼þ³§ÉÌÖ®Ò»£¬Æä¿Í»§°üÂÞ¿Õ¿Í¡¢²¨ÒôÉõÖÁ¾üÓᢺ½¿ÕÁìÓòµÄ¹«Ë¾µÈ¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/ransomware-halts-production-for-days-at-major-airplane-parts-manufacturer/
5¡¢Evernote Chrome²å¼þXSS©¶´£¬²¨¼°Ô¼460ÍòÓû§
Äþ¾²³§ÉÌGuardio·¢ÏÖEvernoteµÄChrome²å¼þ£¨Evernote Web Clipper£©ÖдæÔÚÒ»¸öÑÏÖصÄXSS©¶´£¬¿ÉÔÊÐí¹¥»÷Õß·ÃÎÊÓû§ÔÚµÚÈý·½·þÎñÖеÄÃô¸ÐÐÅÏ¢¡£ÓÉÓÚEvernote¹ãÊÜ»¶Ó£¬¸Ã©¶´¿ÉÄܲ¨¼°Ô¼460ÍòÓû§¡£¸Ã©¶´£¨CVE-2019-12592£©ÊôÓÚ²å¼þÖеıàÂëÂß¼´íÎ󣬿ÉÈƹýä¯ÀÀÆ÷µÄͬԴ¼Æı£¬Ê¹µÃ¹¥»÷Õß·ÃÎʵÚÈý·½·þÎñµÄÃô¸ÐÓû§ÐÅÏ¢£¬°üÂÞÉí·ÝÑéÖ¤ÐÅÏ¢¡¢²ÆÕþÐÅÏ¢¡¢É罻ýÌåÁÄÌìÐÅÏ¢¡¢µç×ÓÓʼþÐÅÏ¢µÈ¡£½¨ÒéÓû§¸üÐÂÖÁ7.11.1¼°¸ü¸ß°æ±¾¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/critical-flaw-in-evernote-add-on-exposed-sensitive-data-of-millions/