ÐÅÏ¢Äþ¾²Öܱ¨-2020ÄêµÚ33ÖÜ
Ðû²¼Ê±¼ä 2020-08-17> ±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö
2020Äê08ÔÂ10ÈÕÖÁ08ÔÂ16ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´77¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇApache Struts CVE-2019-0230´úÂëÖ´ÐЩ¶´£»Citrix Systems XenMobile Server CVE-2020-8211δÃ÷ÈÎÒâ´úÂëÖ´ÐЩ¶´£»Schneider Electric APC Easy UPS On-Line `FileUploadServlet`·¾¶±éÀú©¶´£»SAP Business Objects Business Intelligence Platform XvfbÑéÖ¤Èƹý©¶´; Shenzhen Hichip Vision Technology Firmware P2P·þÎñ´úÂëÖ´ÐЩ¶´¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇFBI¾¯¸æÒÁÀʺڿÍÀûÓÃF5 BIG-IP©¶´¹¥»÷ADCÉ豸£»Check Point·¢ÏÖ¸ßͨµÄSnapdragonоƬ´æÔÚ400¶à¸ö©¶´£»Nusenu·¢ÏÖδ֪×éÖ¯½Ù³ÖTor½üËÄ·ÖÖ®Ò»µÄ³ö¿Ú½Úµã£»AdobeÐû²¼Äþ¾²¸üУ¬ÐÞ¸´¶à¿î²úÎïÖеÄ26¸ö©¶´£»FBIºÍNSAÁªºÏÅû¶¶íÂÞ˹Õë¶ÔLinuxµÄ¶ñÒâÈí¼þDrovorub¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖС£
> ÖØÒªÄþ¾²Â©¶´Áбí
1. Apache Struts CVE-2019-0230´úÂëÖ´ÐЩ¶´
Apache Struts¿ò¼ÜÔÚ±»Ç¿ÖÆʹÓÃʱ£¬»á¶Ô±êÇ©µÄÊôÐÔ½øÐжþ´ÎÇóֵ©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÖ´ÐÐÈÎÒâ´úÂë¡£Ö»ÓÐÔÚStruts±êÇ©ÊôÐÔÖÐÇ¿ÖÆʹÓÃOGNL±í´ïʽʱ£¬²ÅÆø´¥·¢Â©¶´¡£
https://cwiki.apache.org/confluence/display/ww/s2-059
2. Citrix Systems XenMobile Server CVE-2020-8211δÃ÷ÈÎÒâ´úÂëÖ´ÐЩ¶´
Citrix Systems XenMobile Server´æÔÚδÃ÷Äþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£
https://www.auscert.org.au/bulletins/ESB-2020.2780/
3. Schneider Electric APC Easy UPS On-Line `FileUploadServlet`·¾¶±éÀú©¶´
Schneider Electric APC Easy UPS On-Line `FileUploadServlet`´æÔÚĿ¼±éÀú©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÉÏ´«ÈÎÒâÎļþµ½ÈÎÒâĿ¼¡£
https://us-cert.cisa.gov/ics/advisories/icsa-20-224-02
4. SAP Business Objects Business Intelligence Platform XvfbÑéÖ¤Èƹý©¶´
SAP Business Objects Business Intelligence Platform Xvfb´æÔÚÑéÖ¤Èƹý©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉδÊÚȨ·ÃÎÊÓ¦Óá£
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552603345
5. Shenzhen Hichip Vision Technology Firmware P2P·þÎñ´úÂëÖ´ÐЩ¶´
Shenzhen Hichip Vision Technology Firmware P2P·þÎñ´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£
https://redprocyon.com
> ÖØÒªÄþ¾²Ê¼þ×ÛÊö
1¡¢FBI¾¯¸æÒÁÀʺڿÍÀûÓÃF5 BIG-IP©¶´¹¥»÷ADCÉ豸
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/fbi-iranian-hackers-trying-to-exploit-critical-f5-big-ip-flaw/
2¡¢Check Point·¢ÏÖ¸ßͨµÄSnapdragonоƬ´æÔÚ400¶à¸ö©¶´
ÔÎÄÁ´½Ó£º
https://www.hackread.com/chip-flaws-turn-android-phones-into-spying-tool/
3¡¢Nusenu·¢ÏÖδ֪×éÖ¯½Ù³ÖTor½üËÄ·ÖÖ®Ò»µÄ³ö¿Ú½Úµã
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/a-mysterious-group-has-hijacked-tor-exit-nodes-to-perform-ssl-stripping-attacks/
4¡¢AdobeÐû²¼Äþ¾²¸üУ¬ÐÞ¸´¶à¿î²úÎïÖеÄ26¸ö©¶´
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/adobe-fixes-critical-code-execution-bugs-in-acrobat-and-reader/
5¡¢FBIºÍNSAÁªºÏÅû¶¶íÂÞ˹Õë¶ÔLinuxµÄ¶ñÒâÈí¼þDrovorub
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/fbi-and-nsa-expose-new-linux-malware-drovorub-used-by-russian-state-hackers/