¡¶Î¬ËûÃü¡·ÖðÈÕ°²È«¼òѶ20181220
°ä²¼¹¦·ò 2018-12-20
KibanaÊÇElasticsearchµÄÊý¾Ý¿ÉÊÓ»¯¹¤¾ß£¬ÆäConsole²å¼þ´æÔÚ±¾µØÎļþÔ̺¬£¨LFI£©·ì϶£¬×êÑÐÈËÔ±°ä²¼Á˸÷ì϶µÄPoC´úÂë¡£¸Ã·ì϶£¨CVE-2018-17246£©Ó°ÏìÁË6.4.3ºÍ5.6.13֮ǰµÄKibana°æ±¾£¬³É¹¦ÀûÓø÷ì϶¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£ElasticÒÑÔÚ×îа汾µÄKibanaÖн¨¸´Á˸÷ì϶£¬ÈôÊÇÓû§ÁÙʱÎÞ·¨¸üУ¬Ò²Äܹ»ÔÚÅäÖÃÎļþÖнûÓøÃConsole²å¼þÀ´¶ã±ÜÕâÒ»ÎÊÌâ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/file-inclusion-bug-in-kibana-console-for-elasticsearch-gets-exploit-code/2¡¢»ªË¶ºÍ¼¼¼ÎÇý¶¯·¨Ê½´æÔÚ¶à¸ö·ì϶£¬²¿ÃÅÈÔ佨¸´
SecureAuth×êÑÐÈËÔ±·¢ÏÖ»ªË¶ºÍ¼¼¼ÎµÄËĸöÇý¶¯·¨Ê½´æÔÚ7¸ö·ì϶£¬¹²Ó°ÏìÁË5¸öÈí¼þ²úÆ·¡£ÆäÖлªË¶µÄAura Sync£¨v1.07.22¼°Ö®Ç°µÄ°æ±¾£©×°ÖõÄÇý¶¯£¨GLCKIoºÍAsusgio£©´æÔÚÈý¸ö·ì϶£¨CVE-2018-18537¡¢CVE-2018-18536ºÍCVE-2018-18535£©£¬ÕâЩ·ì϶¿Éµ¼ÖÂÌáȨ¡¢ÏµÍ³±ÀÀ£ºÍ±¾µØ´úÂëÖ´ÐС£¼¼¼ÎµÄGPCIDrvºÍGDrvÇý¶¯·¨Ê½´æÔÚ4¸ö·ì϶£¨CVE-2018-19320~CVE-2018-19323£©£¬Í¬Ñù¿Éµ¼ÖÂÌáȨºÍϵͳ±ÀÀ£µÈ¡£SecureAuthÓÚ2017Äê11ÔÂÆðͷͬ»ªË¶¹µÍ¨£¬µ«Ö±ÖÁ2018Äê5Ô»ªË¶Ö»½¨¸´ÁËÈý¸ö·ì϶ÖеÄÒ»¸ö¡£SecureAuthÓÚ2018Äê4ÔÂ24ÈÕÆðͷͬ¼¼¼Î¹µÍ¨£¬µ«¼¼¼Î¹¤³Ìʦ»Ø¸´³ÆÆä²úƷûÓÐÊܵ½Ëù»ã±¨µÄ·ì϶µÄÓ°Ïì¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/asus-gigabyte-drivers-contain-code-execution-vulnerabilities-pocs-galore/3¡¢ABB PLCÍø¹Ø´æÔÚÁ½¸ö·ì϶£¬¿Éµ¼Ö»ؾø·þÎñ
Applied Risk×êÑÐÈËÔ±·¢ÏÖABB¹«Ë¾µÄPLCÍø¹Ø£¨GATE-E1ºÍGATE-E2£©´æÔÚÁ½¸ö°²È«·ì϶¡£ÕâÁ½¸ö·ì϶±ðÀëÊÇÉ豸ÖÎÀí½çÃæµÄÉí·ÝÑé֤ȱʧ·ì϶£¨CVE-2018-18995£©ºÍXSS·ì϶£¨CVE-2018-18997£©¡£ABB³ÆÓÉÓÚÊÜÓ°ÏìµÄ²úÆ·ÒѾ´ïµ½Ê¹ÓÃÊÙÃü£¬Òò¶ø²»»áÕë¶ÔÕâЩ·ì϶°ä²¼¹Ì¼þ¸üС£×êÑÐÈËÔ±²¢Ã»Óз¢Ïָ÷ì϶ÔÚÒ°±í±»ÀûÓõÄÖ¤¾Ý¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/78995/security/abb-plc-gateways-flaws.html4¡¢NASAÅû¶Êý¾Ýй¶ÊÂÎñ£¬²¿ÃÅÔ±¹¤µÄPIIÐÅÏ¢±»µÁ
NASA±»ºÚ£¬Æ¾¾Ý¸Ã»ú¹¹µÄ˵·¨£¬NASAÔÚ10ÔÂ23ÈÕ·¢ÏÖÁËÕâÒ»Êý¾Ýй¶ÊÂÎñ£¬ÆäÒ»¸ö´æ´¢Ó×ÎÒÉí·ÝÐÅÏ¢£¨PII£©µÄ·þÎñÆ÷Ôâµ½ºÚ¿ÍÈëÇÖ£¬2006Äê7ÔÂÖÁ2018Äê10ÔÂÆÚ¼ä²ÎÓëNASAµÄÔ±¹¤µÄPIIÐÅϢй¶£¬Ô̺¬È¥Ö°»òµ÷Ö°µÄÔ±¹¤¡£NASAĿǰռÓÐÔ¼17300ÃûÔ±¹¤¡£¸Ã»ú¹¹°µÊ¾Ã»ÓÐÌ«¿Õ¹¤×÷Êܵ½Ó°Ïì¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2018/12/nasa-hack-data-breach.html5¡¢McAfee°ä²¼12ÔÂÍøÂçÍþв»ã±¨£¬·Ö½âÍþвÇ÷ÏòµÄÑݱä
ƾ¾ÝMcAfee³¢ÊÔÊÒ°ä²¼µÄ2018Äê12ÔÂÍøÂçÍþв»ã±¨£¬2018ÄêµÚÈý¼¾¶ÈÕë¶ÔÎïÁªÍøÉ豸µÄжñÒâÈí¼þÔö³¤ÁË72%£¬¶ø´ÓǰËĸö¼¾¶ÈµÄ×ÜÌåÔö³¤ÊÇ203£¥£»ÐµĶñÒâ¿ó¹¤Ôö³¤Á˽ü55%£¬¶ø´ÓǰËĸö¼¾¶ÈµÄ×ÜÌåÔö³¤ÊÇ4467%¡£¶ÔÓÚÎÞÎļþ¶ñÒâÈí¼þÀàÐÍ£¬ÐµÄJavaScript¶ñÒâÈí¼þÔö³¤ÁË45%£¬¶øÐµÄPowerShell¶ñÒâÈí¼þÔö³¤ÁË24%¡£ÐµÄÒÆ¶¯¶ñÒâÈí¼þÏ÷¼õÁË24%£¬ÐµÄmacOS¶ñÒâÈí¼þÑù±¾Ôö³¤ÁË9%¡£
ÔÎÄÁ´½Ó£º
https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/mcafee-labs-threats-report-examines-cybercriminal-underground-iot-malware-other-threats/6¡¢APT28´´½¨ZebrocyľÂíµÄÐÂGo˵»°±äÌå
Palo Alto NetworksµÄUnit42×êÑÐÍŶӷ¢ÏÖAPT×éÖ¯Sofacy£¨±ðÃûAPT28£©¿ª·¢ÁËGo˵»°°æ±¾µÄZebrocyľÂíбäÌå¡£´Óǰ¸Ã×éÖ¯Ò²¿ª·¢ÁËAutoIt¡¢Delphi¡¢VB.NET¡¢C££ºÍVisual C ++°æ±¾µÄZebrocy£¬×êÑÐÈËÔ±ÒÔΪSofacy´´½¨¶àÖÖ˵»°µÄ±äÌåÊÇΪÁ˸üºÃµØ¶ã±Ü¼ì²â¡£Zebrocy Go±äÌåµÄµÚÒ»´Î¹¥»÷²úÉúÔÚ2018Äê10ÔÂ11ÈÕ£¬Í¨¹ý´¹µöÓʼþ½øÐн»¸¶£¬µ«ÆäϰȾÁ´ÖеÄPowerShell¾ç±¾´æÔÚ±àÂëÃýÎó£¬Òò¶øÕâÒ»´Î¹¥»÷ÊÇʧ°ÜµÄ¡£µÚ¶þ´Î¹¥»÷²úÉúÔÚ10ÔÂÖÐÑ®µ½11ÔÂÖÐѮ֮¼ä¡£
ÔÎÄÁ´½Ó£º
https://unit42.paloaltonetworks.com/sofacy-creates-new-go-variant-of-zebrocy-tool/ÉêÃ÷£º±¾×ÊѶÓÉGA»Æ½ð¼×άËûÃü°²È«Ó××é·ÒëºÍÕû¶Ù


¾©¹«Íø°²±¸11010802024551ºÅ