ÐÅÏ¢Äþ¾²Öܱ¨-2019ÄêµÚ31ÖÜ

Ðû²¼Ê±¼ä 2019-08-12

> ±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö



2019Äê8ÔÂ05ÈÕÖÁ11ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´49¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇCisco Enterprise NFV Infrastructure Software OSÃüÁî×¢È멶´£»MicroDigital N-series cameras´úÂëÖ´ÐЩ¶´£»Cisco Small Business 220 Series Smart Switches WEB½çÃ滺³åÆ÷Òç³ö©¶´£»MongoDB ServerȨÏÞÌáÉý©¶´£»Android Qualcomm HLOS×é¼þȨÏÞÌáÉý©¶´¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊǸßͨоƬ´æÔÚQualPwn©¶´£¬²¨¼°æçÁú855µÈ¶à¿îSoC;¿¨°Í˹»ùÐû²¼2019ÄêµÚ¶þ¼¾¶ÈDDoS¹¥»÷Ç÷ÊƳÂËß;Ñо¿ÈËÔ±Åû¶²¨Òô787ÄÚ²¿ÍøÂçÖеĶà¸öÄþ¾²Â©¶´;Ñо¿ÍŶÓÐû²¼2019Ä깤¿ØÍþв³ÂËߣ¬¾Å´ó·¸×ïÍÅ»ïרעÓÚICS;GoogleºÍNASAÒòJira·þÎñÆ÷ÅäÖôíÎóµ¼ÖÂÃô¸ÐÊý¾Ýй¶¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖС£


> ÖØÒªÄþ¾²Â©¶´Áбí



1. Cisco Enterprise NFV Infrastructure Software OSÃüÁî×¢È멶´


Cisco Enterprise NFV Infrastructure Software WebÃÅ»§¿ò¼Ü´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó£¬ÒÔrootȨÏÞÖ´ÐÐÈÎÒâÃüÁî¡£

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-nfv-commandinj


2. MicroDigital N-series cameras´úÂëÖ´ÐЩ¶´


MicroDigital N-series cameras ¡®action¡¯²ÎÊý´¦ÖôæÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£

https://pastebin.com/PSyqqs1g


3. Cisco Small Business 220 Series Smart Switches WEB½çÃ滺³åÆ÷Òç³ö©¶´


Cisco Small Business 220 Series Smart Switches WEB½çÃæ´æÔÚ»º³åÇøÒç³ö©¶´£¬ÔÊÐí¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉʹÉ豸±ÀÀ£»òÖ´ÐÐÈÎÒâ´úÂë¡£

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190806-sb220-rce


4. MongoDB ServerȨÏÞÌáÉý©¶´


MongoDB Server´æÔڻỰÖØÓ鶴£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÖØÓÃÒѽ¨Á¢µÄ»á»°£¬Î´ÊÚȨ·ÃÎÊ¡£

https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0829


5. Android Qualcomm HLOS×é¼þȨÏÞÌáÉý©¶´


Android Qualcomm HLOS×é¼þ´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÌáÉýȨÏÞ¡£
https://source.android.com/security/bulletin/2019-08-01.html


> ÖØÒªÄþ¾²Ê¼þ×ÛÊö



1¡¢¸ßͨоƬ´æÔÚQualPwn©¶´£¬²¨¼°æçÁú855µÈ¶à¿îSoC

¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

¸ßͨ¶à¿îSoCÊܵ½Á½¸ö©¶´µÄÓ°Ï죬ÕâÁ½¸ö©¶´±»³ÆΪQualPwn£¬·Ö±ðÊÇÓ°Ïì¸ßͨWLAN×é¼þ¼°AndroidÄں˵Ļº³åÇøÒç³ö©¶´£¨CVE-2019-10538£©ÒÔ¼°¸ßͨWLAN¼°Modem¹Ì¼þÖеĻº³åÇøÒç³ö©¶´£¨CVE-2019-10540£©¡£Æ¾¾Ý¸ßͨÐû²¼µÄÄþ¾²Í¨¸æ£¬ºóÕßÓ°ÏìµÄ²úÎï°üÂÞSD 820¡¢SD 835¡¢SD 845¡¢SD 850¡¢SD 855µÈ20¶à¿îоƬ¡£¸ßͨºÍAndroidÍŶÓÒѾ­Ðû²¼ÁËÏà¹ØÐÞ¸´²¹¶¡¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/qualpwn-vulnerabilities-in-qualcomm-chips-let-hackers-compromise-android-devices/

2¡¢¿¨°Í˹»ùÐû²¼2019ÄêµÚ¶þ¼¾¶ÈDDoS¹¥»÷Ç÷ÊƳÂËß


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾Ý¿¨°Í˹»ùµÄ2019ÄêQ2 DDoS¹¥»÷³ÂËߣ¬±¾¼¾¶ÈµÄDDoS¹¥»÷ÊýÁ¿±ÈÉÏÒ»¼¾¶ÈÉٵöà¡£ÕâÖÖƽ¾²¿ÉÄÜÊÇÓÉÓÚÏļ¾ÍøÂç·¸×ï»î¶¯µÄ´«Í³ÐÔ¼õÉÙËùÖ£¬Óë2018ÄêQ2Ïà±È£¬¹¥»÷×ÜÊýʵ¼ÊÉÏÔö³¤ÁË18¸ö°Ù·Öµã£¬ÕâÒâζ×Å×Ô2019Äê³õÒÔÀ´ÊӲ쵽µÄDDoSÔö³¤Ç÷ÊÆÈÔÈ»´æÔÚ¡£±¾¼¾¶ÈÖйú»¹ÊÇDDoS¹¥»÷ÊýÁ¿×î¶àµÄµØÓò£¨63.80£¥£©£¬Æä´ÎÊÇÃÀ¹ú£¨17.57£¥£©¡£±¾¼¾¶ÈÁ¬Ðøʱ¼ä×µÄ¹¥»÷´ï509¸öСʱ£¬´´ÏÂÁËеÄÀúÊ·¼Ç¼¡£

Ô­ÎÄÁ´½Ó£ºhttps://securelist.com/ddos-report-q2-2019/91934/

3¡¢Ñо¿ÈËÔ±Åû¶²¨Òô787ÄÚ²¿ÍøÂçÖеĶà¸öÄþ¾²Â©¶´


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


IOActiveÑо¿ÈËÔ±Ruben SantamartaÔÚBlack Hat´ó»áÉÏÅû¶Á˲¨Òô787ÃλÿͻúÖеĶà¸öÄþ¾²Â©¶´¡£ÕâЩ©¶´Óë·É»úµÄ³ÉÔ±ÐÅÏ¢·þÎñ/ά»¤ÏµÍ³£¨CIS/MS£©ÓйØ£¬¹¥»÷Õß¿ÉÀûÓÃÕâЩ©¶´Ïò·É»úµÄÒªº¦Äþ¾²ÏµÍ³£¨ÀýÈçÒýÇæ¡¢Öƶ¯ÏµÍ³¡¢´«¸ÐÆ÷£©·¢ËͶñÒâÃüÁî¡£´ËÍ⣬¹¥»÷Õß»¹¿Éͨ¹ýÈëÇÖ·É»úµÄÎÀÐÇÉ豸¼°ÎÞÏßͨÐÅÇþµÀÏòά»¤¹¤³ÌʦÌṩ´íÎóµÄϵͳÐÅÏ¢¡£²¨ÒôÉù³ÆÕâЩÎÊÌâ²»»á×é³ÉÍøÂçÍþв£¬ÒòΪÆä·À»¤´ëÊ©¿ÉÒÔ×èÖ¹´ËÀ๥»÷¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.wired.com/story/boeing-787-code-leak-security-flaws/?verso=true

4¡¢Ñо¿ÍŶÓÐû²¼2019Ä깤¿ØÍþв³ÂËߣ¬¾Å´ó·¸×ïÍÅ»ïרעÓÚICS

¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¹¤¿ØÄþ¾²³§ÉÌDragosÐû²¼2019Ä깤¿ØÍþв³ÂËߣ¬³ÂËßÖзÖÎöÁËרÃÅÕë¶ÔICSÍøÂçµÄ9¸ö·¸×ïÍŻÆäÖÐ5¸ö·¸×ïÍÅ»ïÖ÷ÒªÕë¶ÔʯÓͺÍÌìÈ»Æø¹«Ë¾£¬°üÂÞHEXANE¡¢MAGNALLIUM¡¢CHRYSENE¡¢XENOTIMEºÍDYMALLOY£¬ÆäÓà4¸ö·¸×ïÍÅ»ïÖ÷ÒªÕë¶ÔÄÜÔ´²¿ÃÅ£¬°üÂÞELECTRUM¡¢RASPITE¡¢ALLANITEºÍCOVELLITE¡£¸Ã³ÂËßÖ¸³öÓÉÓÚ¿ÉÔì³É¸ß¶ÈÕðµ´µÄÕþÖκ;­¼ÃÓ°Ï죬ʯÓͺÍÌìÈ»Æø²¿ÃÅÈÔÈ»ÃæÁÙÆÆ»µÐÔÍøÂç¹¥»÷µÄ·çÏÕ¡£

Ô­ÎÄÁ´½Ó£ºhttps://dragos.com/wp-content/uploads/Dragos-Oil-and-Gas-Threat-Perspective-2019.pdf

5¡¢GoogleºÍNASAÒòJira·þÎñÆ÷ÅäÖôíÎóµ¼ÖÂÃô¸ÐÊý¾Ýй¶


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


JiraÊÇÒ»¸öÁ÷ÐеÄÏîÄ¿¹ÜÀí½â¾ö·½°¸£¬Äþ¾²Ñо¿Ô±Avinash Jain·¢ÏÖµ±ÔÚJira CloudÖд´½¨ÐµÄfilterºÍdashboardʱ£¬ÆäĬÈϿɼûÐÔÊÇ¡°ËùÓС±£¬ÕâºÜÈÝÒ×±»Àí½âΪ¡°ÆóÒµÄÚ²¿ËùÓÐÈË¡±µ«Êµ¼ÊÉÏËüÖ¸µÄÊÇ¡°»¥ÁªÍøÉϵÄËùÓÐÈË¡±¡£ÕâÖÖÅäÖôíÎóʹµÃÐí¶à×éÖ¯µÄÃô¸ÐÏîÄ¿ÐÅÏ¢Æع⣬°üÂÞGoogle¡¢Yahoo¡¢NASA¡¢Lenovo¡¢1Password¡¢ZendeskÒÔ¼°Õþ¸®»ú¹¹µÈ¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/misconfigured-jira-servers-leak-info-on-users-and-projects/