ÐÅÏ¢Äþ¾²Öܱ¨-2020ÄêµÚ09ÖÜ

Ðû²¼Ê±¼ä 2020-03-03

> ±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö


2020Äê02ÔÂ24ÈÕÖÁ3ÔÂ01ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´54¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇGoogle Chrome V8ÀàÐÍ»ìÏý©¶´; Moxa PT-7528 WEB·þÎñÆ÷»º³åÇøÒç³ö©¶´£»Cisco NX-OS Software CDPЭÒéÈÎÒâ´úÂëÖ´ÐЩ¶´£»Red Hat UndertowÎļþÉÏ´«´úÂëÖ´ÐЩ¶´£»Tonnet TAT-76ĬÈÏÃÜÂëÉí·ÝÑéÖ¤Èƹý©¶´ ¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇÁªÏë¡¢»ÝÆÕ¼°´÷¶ûÍâΧÉ豸ÊÜδǩÃû¹Ì¼þ©¶´Ó°Ï죬4G LTEЩ¶´ÔÊÐí¹¥»÷Õß×¢²á¸¶·ÑµÄ¶©ÔÄ»òÍøÕ¾·þÎñ£¬²©Í¨Wi-FiоƬKr??k¼ÓÃÜ©¶´£¬Ó°ÏìÁè¼ÝÊ®ÒŲ́É豸£¬Exchange ServerÔ¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2020-0688£©£¬Å·ÖÞÍøÂçÓëÐÅÏ¢Äþ¾²¾ÖÐû²¼Ò½ÔºÍøÂçÄþ¾²²É¹ºÖ¸ÄÏ ¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖÐ ¡£


>ÖØÒªÄþ¾²Â©¶´Áбí


1. Google Chrome V8ÀàÐÍ»ìÏý©¶´


Google Chrome V8´æÔÚÀàÐÍ»ìÏý©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄWEBÒ³ÇëÇó£¬ÓÕʹÓû§½âÎö£¬Ê¹Ó¦Ó÷¨Ê½±ÀÀ£»ò¿ÉÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë ¡£


https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop_24.html


2. Moxa PT-7528 WEB·þÎñÆ÷»º³åÇøÒç³ö©¶´


Moxa PT-7528 WEB·þÎñÆ÷´æÔÚ»º³åÇøÒç³ö©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐÈÎÒâ´úÂë ¡£


https://www.us-cert.gov/ics/advisories/icsa-20-056-03


3. Cisco NX-OS Software CDPЭÒéÈÎÒâ´úÂëÖ´ÐЩ¶´


Cisco NX-OS Software CDPЭÒé´¦ÖôæÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔROOTȨÏÞÖ´ÐÐÈÎÒâ´úÂë ¡£


https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-fxos-nxos-cdp


4. Red Hat UndertowÎļþÉÏ´«´úÂëÖ´ÐЩ¶´


Red Hat Undertow´æÔÚAJPÎļþ¶ÁÈ¡ºÍ°üÂÞ©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÖ´ÐÐÈÎÒâ´úÂë ¡£

https://access.redhat.com/security/cve/cve-2020-1745


5. Tonnet TAT-76ĬÈÏÃÜÂëÉí·ÝÑéÖ¤Èƹý©¶´


Tonnet TAT-76 DVR¹Ì¼þ°üÂÞÓдíÎóÅäÖõÄÉí·ÝÑéÖ¤»úÖÆ£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴»ñȡĬÈÏÃÜÂ룬Ìá½»ÌØÊâµÄÇëÇ󣬿ÉδÊÚȨ·ÃÎÊ ¡£


https://tvn.twcert.org.tw/taiwanvn/TVN-201910003


> ÖØÒªÄþ¾²Ê¼þ×ÛÊö


1¡¢ÁªÏë¡¢»ÝÆÕ¼°´÷¶ûÍâΧÉ豸ÊÜδǩÃû¹Ì¼þ©¶´Ó°Ïì


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾ÝEclypsiumµÄÑо¿£¬Wi-FiÊÊÅäÆ÷¡¢USB¼¯ÏßÆ÷¡¢´¥¿Ø°åºÍÉãÏñÍ·ÖеÄδǩÃû¹Ì¼þ©¶´¿ÉÄÜʹÊý°ÙÍòÍâΧÉ豸ÃæÁÙÍøÂç¹¥»÷µÄ·çÏÕ ¡£ÊÜÓ°ÏìµÄ²úÎï°üÂÞÁªÏëÌõ¼Ç±¾µçÄÔÖеÄTouchPadºÍTrackPoint¹Ì¼þ¡¢»ÝÆÕÌõ¼Ç±¾µçÄÔÖеÄHP Wide Vision FHDÉãÏñÍ·¹Ì¼þÒÔ¼°´÷¶ûXPSÌõ¼Ç±¾µçÄÔÖеÄWi-FiÊÊÅäÆ÷µÈ ¡£ÓÉÓÚÕâЩ²úÎïÔÚ½øÐй̼þ¸üÐÂʱȱ·¦Êʵ±µÄ´úÂëÇ©ÃûÑéÖ¤ºÍÉí·ÝÑéÖ¤£¬¹¥»÷Õß¿ÉÄÜͨ¹ý¶ñÒâ¹Ì¼þ¸üÐÂÀ´Ö´ÐÐÐÅϢй¶¡¢Ô¶³Ì´úÂëÖ´ÐС¢¾Ü¾ø·þÎñµÈ¹¥»÷ ¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/lenovo-hp-dell-peripherals-unpatched-firmware/152936/


2¡¢4G LTEЩ¶´ÔÊÐí¹¥»÷Õß×¢²á¸¶·ÑµÄ¶©ÔÄ»òÍøÕ¾·þÎñ


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


²¨ºè³¶û´óѧµÄÒ»ÏîÐÂÑо¿±íÃ÷£¬4GÒƶ¯Í¨Ðų߶ÈÖеÄÒ»¸ö©¶´¿ÉÄÜʹ¹¥»÷Õß¼ÙðÓû§À´×¢²á¶©ÔÄ»ò¸¶·ÑÍøÕ¾·þÎñ ¡£ÕâÏî¹¥»÷¼¼Êõ±»³ÆΪIMP4GT£¬Ñо¿ÈËÔ±³ÆÆäÓ°ÏìÁËËùÓеÄLTEͨÐÅÉ豸£¬Õâ°üÂÞ¡°¼¸ºõËùÓеġ±ÖÇÄÜÊÖ»ú¡¢Æ½°åµçÄԺͲ¿ÃÅIoTÉ豸 ¡£IMP4GTµÄÒªº¦ÒªËØÊÇÀûÓÃÈí¼þ½ç˵µÄÎÞÏßµçÀ´À¹½ØºÍÆÛÆ­Òƶ¯É豸Óë»ùÕ¾Ö®¼äµÄͨÐÅÐŵÀ ¡£ËäÈ»Êý¾Ý°üÔÚÊÖ»úºÍ»ùÕ¾Ö®¼äÒÔ¼ÓÃÜ·½Ê½´«Ê䣬µ«ÓÉÓÚȱ·¦ÍêÕûÐÔ±£»¤£¬¿ÉÒÔͨ¹ýÐÞ¸ÄÊý¾Ý°üÀ´´¥·¢´íÎó ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/lte-security-flaw-can-be-abused-to-take-out-subscriptions-at-your-expense/?&web_view=true


3¡¢²©Í¨Wi-FiоƬKr??k¼ÓÃÜ©¶´£¬Ó°ÏìÁè¼ÝÊ®ÒŲ́É豸


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ESETÑо¿ÈËÔ±ÔÚBroadcom£¨²©Í¨£©ºÍCypressµÄWi-FiоƬÖз¢ÏÖЩ¶´Kr??k£¬¸Ã©¶´£¨CVE-2019-15126£©¿Éµ¼ÖÂÒ×Êܹ¥»÷µÄÉ豸ʹÓÃÈ«Áã¼ÓÃÜÃÜÔ¿À´¼ÓÃÜÓû§µÄ²¿ÃÅͨÐÅÐÅÏ¢ ¡£ÔÚÀֳɵĹ¥»÷ÖУ¬¹¥»÷Õß¿ÉÒÔ½âÃÜÓÉÒ×Êܹ¥»÷µÄÉ豸´«ÊäµÄijЩÎÞÏßÍøÂçÊý¾Ý°ü ¡£¸Ã©¶´Ó°ÏìµÄÉ豸°üÂÞÑÇÂíÑ·£¨Echo¡¢Kindle£©¡¢Æ»¹û£¨iPhone¡¢iPad¡¢MacBook£©¡¢¹È¸è£¨Nexus£©¡¢ÈýÐÇ£¨Galaxy£©¡¢Ê÷Ý®ÅÉ£¨Pi 3£©¡¢Ð¡Ã×£¨RedMi£©µÄijЩ¿Í»§¶ËÉ豸ÒÔ¼°»ªË¶ºÍ»ªÎªµÄijЩAPºÍ·ÓÉÆ÷É豸£¬ÊؾÉÔ¤¼ÆÓÐÁè¼ÝÊ®ÒÚÉ豸ÊÜÓ°Ïì ¡£CypressÒѾ­Ïò¹©Ó¦ÉÌÐû²¼Á˹̼þÐÞ¸´·¨Ê½£¬Óû§¿Éͨ¹ýÆäÉ豸ÖÆÔìÉÌ»ñÈ¡ÏàÓ¦¸üР¡£Ñо¿ÈËԱûÓÐÔÚ¸ßͨ¡¢Realtek¡¢RalinkºÍMediatekµÄWiFiоƬÖз¢Ïָ鶴 ¡£


Ô­ÎÄÁ´½Ó£º

https://www.welivesecurity.com/2020/02/26/krook-serious-vulnerability-affected-encryption-billion-wifi-devices/


4¡¢Exchange ServerÔ¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2020-0688£©


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ZDIÅû¶΢ÈíExchange ServerÖÐÔ¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2020-0688£©µÄ¼¼Êõϸ½Ú ¡£Î¢Èí×î³õ³Æ¸Ã©¶´ÊÇÓÉÄÚ´æË𻵵¼ÖµÄ£¬µ«ºóÀ´½«ÃèÊöÐÞÕýΪ¸Ã©¶´ÊÇÓÉExchange ServerÔÚ°²×°Ê±Î´ÄÜÕýÈ·´´½¨Î¨Ò»µÄ¼ÓÃÜÃÜÔ¿µ¼Ö嵀 ¡£¸Ã©¶´´æÔÚÓÚExchange¿ØÖÆÃæ°å£¨ECP£©×é¼þÖУ¬ÓÉÓÚʹÓÃÁ˾²Ì¬ÃÜÔ¿£¬¾­¹ýÉí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÒÔÓÕʹ·þÎñÆ÷·´ÐòÁл¯¶ñÒâÖÆ×÷µÄViewStateÊý¾Ý£¬´Ó¶øÔÚ·þÎñÆ÷ÉÏECPÓ¦Óã¨SYSTEMȨÏÞ£©µÄÉÏÏÂÎÄÖÐÖ´ÐÐÈÎÒâ.NET´úÂë ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zerodayinitiative.com/blog/2020/2/24/cve-2020-0688-remote-code-execution-on-microsoft-exchange-server-through-fixed-cryptographic-keys


5¡¢Å·ÖÞÍøÂçÓëÐÅÏ¢Äþ¾²¾ÖÐû²¼Ò½ÔºÍøÂçÄþ¾²²É¹ºÖ¸ÄÏ


¶«É­¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾



Å·ÖÞÍøÂçÓëÐÅÏ¢Äþ¾²¾Ö£¨ENISA£©Ðû²¼Ò½ÔºÍøÂçÄþ¾²²É¹ºÖ¸ÄÏ ¡£¸ÃÖ¸ÄÏÖ¼ÔÚ×ÊÖúÒ½ÔºÔڲɹºÐÂ×ʲúʱÂú×ãÐÅÏ¢Äþ¾²·½ÃæµÄÒªÇó£¬ÌṩÁ˽«ÍøÂçÄþ¾²×÷ΪҽԺ²É¹º¹ý³ÌÖÐÒ»Ïî¹æ¶¨µÄÁ¼ºÃʵ¼ùºÍ½¨Ò飬¶øÇÒ½éÉÜÁËÒ½Ôº×ʲú¼¯ºÏÒÔ¼°ÓëÖ®Ïà¹ØµÄ×îÍ»³öÍøÂçÄþ¾²Íþв ¡£¸Ã³ÂËßÖ÷ÒªÕë¶ÔÔÚÒ½Ôºµ£Èμ¼ÊõÖ°ÎñµÄÒ½ÁƱ£½¡×¨ÒµÈËÔ±£¨CIO£¬CISO£¬CTO£¬ITÍŶÓÒÔ¼°Ò½ÁƱ£½¡×éÖ¯ÖеIJɹºÈËÔ±£©£¬¶øÇÒ¿ÉÒÔΪҽÁÆÉ豸ÖÆÔìÉÌÌṩ²Î¿¼ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2020/02/25/cybersecurity-procurement-hospitals/