ÐÅÏ¢Äþ¾²Öܱ¨-2020ÄêµÚ02ÖÜ
Ðû²¼Ê±¼ä 2020-01-13
±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö
2020Äê01ÔÂ06ÈÕÖÁ12ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´57¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇCisco Webex Video Mesh Software WEBÃüÁî×¢È멶´; Mozilla Firefox Windows XPCVariant.cppÀàÐÍ»ìÏý´úÂëÖ´ÐЩ¶´£»Android Realtek rtlwifi driverÔ¶³Ì´úÂëÖ´ÐЩ¶´£»Android Sound subsystemȨÏÞÌáÉý©¶´£»Billion Smart Energy Router SG600R2ÃüÁîÖ´ÐЩ¶´¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇUpstream SecurityÐû²¼2020°æ¡¶Æû³µÍøÂçÄþ¾²³ÂËß¡·£»Î¢ÈíÐû²¼RDP±©Á¦¹¥»÷·ÖÎö³ÂËߣ¬Æ½¾ùÁ¬Ðøʱ¼äΪ2-3Ì죻MITREÐû²¼ÊÊÓÃÓÚ¹¤Òµ¿ØÖÆϵͳµÄATT£¦CK¿ò¼Ü£»Î¢ÈíÐÞ¸´AccessÖеÄÐÅϢ鶩¶´£¨CVE-2019-1463£©£»MozillaÐû²¼¸üÐÂ,ÐÞ¸´Firefox 0day©¶´(CVE-2019-11707)¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖС£
ÖØÒªÄþ¾²Â©¶´Áбí
1. Cisco Webex Video Mesh Software WEBÃüÁî×¢È멶´
Cisco Webex Video Mesh Software releases WEB½Ó¿Ú´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíͨ¹ýÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó£¬ÒÔROOTȨÏÞÖ´ÐÐÈÎÒâÃüÁî¡£
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-webex-video
2. Mozilla Firefox Windows XPCVariant.cppÀàÐÍ»ìÏý´úÂëÖ´ÐЩ¶´
Mozilla Firefox XPCVariant.cpp´æÔÚÀàÐÍ»ìÏý©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄWEBÇëÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐÈÎÒâ´úÂë¡£
https://www.mozilla.org/en-US/security/advisories/mfsa2020-02/
3. Android Realtek rtlwifi driverÔ¶³Ì´úÂëÖ´ÐЩ¶´
Android Realtek rtlwifi driver´æÔÚδÃ÷Äþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó£¬ÒÔϵͳȨÏÞÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£
https://source.android.google.cn/security/bulletin/2020-01-01
4. Android Sound subsystemȨÏÞÌáÉý©¶´
Android Sound subsystem´æÔÚδÃ÷Äþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÌáÉýȨÏÞ¡£
https://source.android.google.cn/security/bulletin/2020-01-01
5. Billion Smart Energy Router SG600R2ÃüÁîÖ´ÐЩ¶´
Billion Smart Energy Router SG600R2°üÂÞsystem_command.asp½Å±¾ÒÔrootȨÏÞÖ´ÐУ¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔrootȨÏÞÖ´ÐÐÈÎÒâÃüÁî¡£
https://github.com/InnotecSystem/Device-Reversing/wiki/Firmware-Inspection
ÖØÒªÄþ¾²Ê¼þ×ÛÊö
1¡¢Upstream SecurityÐû²¼2020°æ¡¶Æû³µÍøÂçÄþ¾²³ÂËß¡·
Upstream Security2020°æ¡¶Æû³µÍøÂçÄþ¾²³ÂËß¡·»ùÓÚ¶Ô¹ýȥʮÄêÖÐ367Æð¹ûÈ»³ÂËßµÄÆû³µÍøÂçÄþ¾²Ê¼þ½øÐзÖÎö£¬ÖصãÇ¿µ÷ÁË2019ÄêÆڼ䷢Ïֵĩ¶´Óë¼û½â¡£¸Ã³ÂËßÖ¸³ö£¬»¥ÁªÍøÆû³µÒÑÔÚ½Ó¹ÜÆû³µÊг¡£¬Ä¿Ç°ÒÑÓÐ3.3ÒÚÁ¾»¥ÁªÍøÆû³µ£¬ÕâÒâζ×Åÿ´Î¹¥»÷µÄDZÔÚÆÆ»µÁ¦³É±¶Ôö³¤£¬´ó¹æÄ£µÄ¹¥»÷ʼþ¿ÉÄÜ»áÆÆ»µÕû¸ö¶¼ÊУ¬ÉõÖÁµ¼ÖÂÔÖÄÑÐÔµÄÉúÃüËðʧ¡£×Ô2016ÄêÒÔÀ´£¬Ã¿ÄêÆû³µÍøÂçÄþ¾²Ê¼þµÄÊýÁ¿Ôö³¤ÁË605%£¬½ö2019ÄêÒ»Äê¾ÍÔö³¤ÁËÒ»±¶ÒÔÉÏ¡£ÔÚ2019Ä꣬ÓÐ57%µÄʼþÊÇÓÉÍøÂç×ï·¸½øÐеģ¬ÆäÄ¿µÄÊÇÆÆ»µÒµÎñ¡¢ÇÔÈ¡½ðÇ®»òË÷ÒªÊê½ð¡£½öÓÐ38%ÊÇÑо¿ÈËÔ±µÄ³ÂËߣ¬ÆäÄ¿µÄÏò¹«Ë¾ºÍÏû·ÑÕß¾¯ÃܸæÏֵĩ¶´¡£
ÔÎÄÁ´½Ó£º
https://www.helpnetsecurity.com/2020/01/06/automotive-cybersecurity-incidents/
2¡¢Î¢ÈíÐû²¼RDP±©Á¦¹¥»÷·ÖÎö³ÂËߣ¬Æ½¾ùÁ¬Ðøʱ¼äΪ2-3Ìì
΢ÈíÐû²¼ÁËÒ»·ÝÕë¶ÔRDP±©Á¦¹¥»÷µÄ·ÖÎö³ÂËߣ¬¸ÃÏîÑо¿ÊÇ»ùÓÚ´ÓÁè¼Ý4.5Íò¸ö°²×°ÁËÃâ·ÑMicrosoft Defender ATPµÄÊÂÇéÕ¾ÉÏÊÕ¼¯µÄÊý¾Ý¡£ÕâЩÊý¾ÝÓëʧ°ÜºÍÀֳɵÄRDPµÇ¼Ê¼þÓйأ¨·Ö±ðÊÇIDΪ4265ºÍ4264µÄWindowsʼþ£©£¬¶øÇÒÉæ¼°Óû§/¹¥»÷Õß¿ÉÄÜʹÓõÄÓû§ÃûÏêϸÐÅÏ¢£¬Êý¾ÝÊÕ¼¯Á˼¸¸öÔµÄʱ¼ä¡£Î¢ÈíÔÚ³ÂËßÖÐÌåÏÖ£¬×î½üÊӲ쵽µÄRDP±©Á¦¹¥»÷ƽ¾ùÁ¬Ðø2-3Ì죬Լ90£¥µÄ°¸ÀýÁ¬Ðøʱ¼äÔÚÒ»ÖÜÄÚ£¬Ö»Óв»µ½5£¥µÄ°¸ÀýÁ¬Ðøʱ¼äÔÚÁ½ÖÜ»òÒÔÉÏ¡£Ô¼ÓÐ0.08£¥µÄRDP±©Á¦¹¥»÷ÀֳɽøÐÐÁ˵Ǽ¡£
ÔÎÄÁ´½Ó£º
https://www.microsoft.com/security/blog/2019/12/18/data-science-for-cybersecurity-a-probabilistic-time-series-model-for-detecting-rdp-inbound-brute-force-attacks/
3¡¢MITREÐû²¼ÊÊÓÃÓÚ¹¤Òµ¿ØÖÆϵͳµÄATT£¦CK¿ò¼Ü
±¾ÖܶþMITERÐû²¼ÁËÆäATT£¦CK¿ò¼ÜµÄ³õʼ°æ±¾£¬¸Ã°æ±¾Öصã¹Ø×¢ÁËÕë¶Ô¹¤Òµ¿ØÖÆϵͳ£¨ICS£©µÄ¶ñÒâ¹¥»÷ÕßʹÓõļÆıºÍ¼¼Êõ¡£Ö¼ÔÚ×ÊÖúÒªº¦»ù´¡ÉèÊ©ºÍÆäËûʹÓÃICSµÄ×éÖ¯ÆÀ¹ÀÆäÍøÂç·çÏÕ¡£³ýÁËÌṩ¹¥»÷¼ÆıºÍ¼¼Êõ¾ØÕóÍ⣬»¹½éÉÜÁ˹¥»÷¼¼ÊõµÄϸ½Ú¡¢¹¥»÷ÕßʹÓõĶñÒâÈí¼þÒÔ¼°ÒÑÖªµÄÕë¶ÔICSµÄ·¸×ïÍŻËü»¹°üÂÞÒ»¸ö×ʲúÀà±ð£¬ÓÃÓÚ×ÊÖú×éÖ¯Á˽â¿ÉÓ¦ÓÃÓÚÆä»·¾³µÄ¼¼Êõ¡£´Ë°æ±¾ÃèÊöÁË81ÖÖ¹¥»÷¼¼Êõ¡¢17ÖÖ¶ñÒâÈí¼þ¡¢10¸ö·¸×ïÍÅ»ïºÍ7ÖÖ×ʲú¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/mitre-releases-attck-knowledge-base-industrial-control-systems
4¡¢Î¢ÈíÐÞ¸´AccessÖеÄÐÅϢ鶩¶´£¨CVE-2019-1463£©
µç×ÓÓʼþÄþ¾²¹«Ë¾Mimecast͸¶£¬Microsoft AccessÖеÄÐÅϢ鶩¶´¿ÉÄܵ¼ÖÂϵͳÄÚ´æÖеÄÃô¸ÐÊý¾Ý±»ÎÞÒâÖÐÉú´æÔÚÊý¾Ý¿âÎļþÖС£¸Ã©¶´£¨CVE-2019-1463£©±»³ÆΪMDB Leaker£¬Óë¡°Ó¦Ó÷¨Ê½¶ÔϵͳÄÚ´æµÄ²»Í×¹ÜÀí¡±Óйأ¬Ëü¿ÉÄܵ¼ÖÂδ³õʼ»¯µÄÄÚ´æÔªËصÄÄÚÈÝÉú´æµ½Microsoft Access MDBÎļþÖС£¾¡¹ÜÕâЩÊý¾Ý¿ÉÄܺÁÎÞÓô¦£¬µ«ËüÒ²¿ÉÄÜ°üÂ޸߶ÈÃô¸ÐµÄÐÅÏ¢£¬ÀýÈçÃÜÂë¡¢WebÇëÇó¡¢Ö¤ÊéÒÔ¼°Óò»òÓû§Êý¾Ý¡£MimecastÌåÏÖÄ¿Ç°²»»áÐû²¼ÓйØCVE-2019-1463µÄÈκμ¼ÊõÐÅÏ¢£¬Ò²Ã»ÓÐÖ¤¾Ý±íÃ÷¸Ã©¶´ÒÑÔÚÒ°Íâ±»ÀûÓá£Î¢ÈíÒÑÔÚ2019Äê12ÔµIJ¹¶¡¸üÐÂÖÐÐÞ¸´Á˸鶴£¬Æ¾¾Ý΢ÈíµÄ˵·¨£¬¸Ã©¶´»áÓ°ÏìOffice 2010¡¢2013¡¢2016¡¢2019ºÍ365 ProPlus¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/microsoft-access-files-could-include-unintentionally-saved-sensitive-data
5¡¢MozillaÐû²¼¸üÐÂ,ÐÞ¸´Firefox 0day©¶´(CVE-2019-11707)
MozillaÐû²¼ÁËFirefox 72.0.1ºÍFirefox ESR 68.4.1£¬ÐÞ¸´ÒÑÔÚÒ°Íâ±»»ý¼«ÀûÓõÄ0day£¨CVE-2019-11707£©¡£¸Ã©¶´±»¹éÀàΪÀàÐÍ»ìÏý©¶´£¬Ó°ÏìÁËIonMonkey JIT±àÒëÆ÷£¬Æ¾¾ÝMozillaµÄÄþ¾²Í¨¸æ£¬IonMonkey JIT±àÒëÆ÷ÖÐÓÃÓÚÉèÖÃÊý×éÔªËصıðÃûÐÅÏ¢²»ÕýÈ·£¬¿ÉÄܻᵼÖÂÀàÐÍ»ìÏý¡£Ç±ÔÚ¹¥»÷Õß¿Éͨ¹ý½«Óû§Öض¨ÏòÖÁ¶ñÒâÍøÒ³À´´¥·¢¸Ã©¶´£¬µ¼Ö´úÂëÖ´Ðлò´¥·¢Í߽⡣ÃÀ¹úCISAÒ²·¢³ö¾¯¸æ³Æ¹¥»÷Õß¿ÉÄÜÀûÓôË©¶´À´¿ØÖÆÊÜÓ°ÏìµÄϵͳ£¬²¢½¨ÒéÓû§¼ì²ìMozillaÄþ¾²Í¨±¨ºÍÓ¦ÓÃÄþ¾²¸üС£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/mozilla-firefox-7201-patches-actively-exploited-zero-day/