ÐÅÏ¢Äþ¾²Öܱ¨-2019ÄêµÚ31ÖÜ
Ðû²¼Ê±¼ä 2019-08-12> ±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö
2019Äê8ÔÂ05ÈÕÖÁ11ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´49¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇCisco Enterprise NFV Infrastructure Software OSÃüÁî×¢È멶´£»MicroDigital N-series cameras´úÂëÖ´ÐЩ¶´£»Cisco Small Business 220 Series Smart Switches WEB½çÃ滺³åÆ÷Òç³ö©¶´£»MongoDB ServerȨÏÞÌáÉý©¶´£»Android Qualcomm HLOS×é¼þȨÏÞÌáÉý©¶´¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊǸßͨоƬ´æÔÚQualPwn©¶´£¬²¨¼°æçÁú855µÈ¶à¿îSoC;¿¨°Í˹»ùÐû²¼2019ÄêµÚ¶þ¼¾¶ÈDDoS¹¥»÷Ç÷ÊƳÂËß;Ñо¿ÈËÔ±Åû¶²¨Òô787ÄÚ²¿ÍøÂçÖеĶà¸öÄþ¾²Â©¶´;Ñо¿ÍŶÓÐû²¼2019Ä깤¿ØÍþв³ÂËߣ¬¾Å´ó·¸×ïÍÅ»ïרעÓÚICS;GoogleºÍNASAÒòJira·þÎñÆ÷ÅäÖôíÎóµ¼ÖÂÃô¸ÐÊý¾Ýй¶¡£
> ÖØÒªÄþ¾²Â©¶´Áбí
1. Cisco Enterprise NFV Infrastructure Software OSÃüÁî×¢È멶´
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-nfv-commandinj
2. MicroDigital N-series cameras´úÂëÖ´ÐЩ¶´
https://pastebin.com/PSyqqs1g
3. Cisco Small Business 220 Series Smart Switches WEB½çÃ滺³åÆ÷Òç³ö©¶´
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190806-sb220-rce
4. MongoDB ServerȨÏÞÌáÉý©¶´
https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0829
5. Android Qualcomm HLOS×é¼þȨÏÞÌáÉý©¶´
https://source.android.com/security/bulletin/2019-08-01.html
> ÖØÒªÄþ¾²Ê¼þ×ÛÊö

¸ßͨ¶à¿îSoCÊܵ½Á½¸ö©¶´µÄÓ°Ï죬ÕâÁ½¸ö©¶´±»³ÆΪQualPwn£¬·Ö±ðÊÇÓ°Ïì¸ßͨWLAN×é¼þ¼°AndroidÄں˵Ļº³åÇøÒç³ö©¶´£¨CVE-2019-10538£©ÒÔ¼°¸ßͨWLAN¼°Modem¹Ì¼þÖеĻº³åÇøÒç³ö©¶´£¨CVE-2019-10540£©¡£Æ¾¾Ý¸ßͨÐû²¼µÄÄþ¾²Í¨¸æ£¬ºóÕßÓ°ÏìµÄ²úÎï°üÂÞSD 820¡¢SD 835¡¢SD 845¡¢SD 850¡¢SD 855µÈ20¶à¿îоƬ¡£¸ßͨºÍAndroidÍŶÓÒѾÐû²¼ÁËÏà¹ØÐÞ¸´²¹¶¡¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/qualpwn-vulnerabilities-in-qualcomm-chips-let-hackers-compromise-android-devices/
2¡¢¿¨°Í˹»ùÐû²¼2019ÄêµÚ¶þ¼¾¶ÈDDoS¹¥»÷Ç÷ÊƳÂËß
ÔÎÄÁ´½Ó£ºhttps://securelist.com/ddos-report-q2-2019/91934/
3¡¢Ñо¿ÈËÔ±Åû¶²¨Òô787ÄÚ²¿ÍøÂçÖеĶà¸öÄþ¾²Â©¶´
IOActiveÑо¿ÈËÔ±Ruben SantamartaÔÚBlack Hat´ó»áÉÏÅû¶Á˲¨Òô787ÃλÿͻúÖеĶà¸öÄþ¾²Â©¶´¡£ÕâЩ©¶´Óë·É»úµÄ³ÉÔ±ÐÅÏ¢·þÎñ/ά»¤ÏµÍ³£¨CIS/MS£©Óйأ¬¹¥»÷Õß¿ÉÀûÓÃÕâЩ©¶´Ïò·É»úµÄÒªº¦Äþ¾²ÏµÍ³£¨ÀýÈçÒýÇæ¡¢Öƶ¯ÏµÍ³¡¢´«¸ÐÆ÷£©·¢ËͶñÒâÃüÁî¡£´ËÍ⣬¹¥»÷Õß»¹¿Éͨ¹ýÈëÇÖ·É»úµÄÎÀÐÇÉ豸¼°ÎÞÏßͨÐÅÇþµÀÏòά»¤¹¤³ÌʦÌṩ´íÎóµÄϵͳÐÅÏ¢¡£²¨ÒôÉù³ÆÕâЩÎÊÌâ²»»á×é³ÉÍøÂçÍþв£¬ÒòΪÆä·À»¤´ëÊ©¿ÉÒÔ×èÖ¹´ËÀ๥»÷¡£
ÔÎÄÁ´½Ó£ºhttps://www.wired.com/story/boeing-787-code-leak-security-flaws/?verso=true
4¡¢Ñо¿ÍŶÓÐû²¼2019Ä깤¿ØÍþв³ÂËߣ¬¾Å´ó·¸×ïÍÅ»ïרעÓÚICS
ÔÎÄÁ´½Ó£ºhttps://dragos.com/wp-content/uploads/Dragos-Oil-and-Gas-Threat-Perspective-2019.pdf
5¡¢GoogleºÍNASAÒòJira·þÎñÆ÷ÅäÖôíÎóµ¼ÖÂÃô¸ÐÊý¾Ýй¶
JiraÊÇÒ»¸öÁ÷ÐеÄÏîÄ¿¹ÜÀí½â¾ö·½°¸£¬Äþ¾²Ñо¿Ô±Avinash Jain·¢ÏÖµ±ÔÚJira CloudÖд´½¨ÐµÄfilterºÍdashboardʱ£¬ÆäĬÈϿɼûÐÔÊÇ¡°ËùÓС±£¬ÕâºÜÈÝÒ×±»Àí½âΪ¡°ÆóÒµÄÚ²¿ËùÓÐÈË¡±µ«Êµ¼ÊÉÏËüÖ¸µÄÊÇ¡°»¥ÁªÍøÉϵÄËùÓÐÈË¡±¡£ÕâÖÖÅäÖôíÎóʹµÃÐí¶à×éÖ¯µÄÃô¸ÐÏîÄ¿ÐÅÏ¢Æع⣬°üÂÞGoogle¡¢Yahoo¡¢NASA¡¢Lenovo¡¢1Password¡¢ZendeskÒÔ¼°Õþ¸®»ú¹¹µÈ¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/misconfigured-jira-servers-leak-info-on-users-and-projects/