ACSC°ä²¼CMSϵͳ°²È«Ö¸ÄÏ£»Netgear½¨¸´Æä·ÓÉÆ÷²úÆ·ÖеĶà¸ö·ì϶
°ä²¼¹¦·ò 2020-03-061.°Ä´óÀûÑÇACSC°ä²¼CMSϵͳ°²È«Ö¸ÄÏ
°Ä´óÀûÑÇÍøÂ簲ȫÖÐÐÄ£¨ACSC£©°ä²¼Ò»·ÝÓÃÓÚ±£»¤CMSϵͳµÄÍøÂ簲ȫָÄÏ£¬¸ÃÖ¸ÄϸÅÊöÁËÈôºÎÔÚweb·þÎñÆ÷Éϼø±ðºÍ×îÓ×»¯Ç±ÔÚ·çÏÕµÄÕ½Êõ£¬ÆäÖ¸±êÊܶàÊÇÕÆ¹ÜʹÓÃCMS¿ª·¢ºÍ±£»¤ÍøÕ¾»òWebÀûÓ÷¨Ê½µÄÈË¡£¹¥»÷ÕßÄܹ»Ê¹ÓÃ×Ô¶¯»¯¹¤¾ßɨÃèInternetÉϵݲȫ·ì϶¡£Ò»µ©CMS±»ÈëÇÖ£¬¹¥»÷ÕßÄܹ»ÀûÓÃÆäȨÏÞÀ´£º»ñµÃWebÀûÓ÷¨Ê½µÄÑéÖ¤ÇøÓòºÍÌØÈ¨ÇøÓòµÄ½Ó¼ûȨÏÞ£»ÉÏ´«¶ñÒâÈí¼þÀ´»ñµÃÔ¶³Ì½Ó¼û£¬ÀýÈçÉÏ´«Web Shell»òRAT£»ÔںϷ¨ÍøÒ³ÉÏ×¢Èë¶ñÒâÄÚÈÝ¡£¹¥»÷Õß»¹Äܹ»½«ÊÜϰȾµÄWeb·þÎñÆ÷ÓÃ×÷¡°Ë®¿Ó¡±¹¥»÷µÄÒ»²¿ÃÅ£¬»òÓÃ×÷C&CµÄ»ù´¡ÉèÊ©¡£ACSC½¨Òé²ÉÈ¡µÄ»º½â´ëÊ©Ô̺¬£ºÊ¹ÓÃCMSÍйܷþÎñ£»ÓÅÁ¼µÄ²¹¶¡ÖÎÀí£»·ì϶ÆÀ¹À£»ÕË»§ÖÎÀí£»¼ÓÇ¿CMS×°ÖõݲȫÐÔ½ÚÔì´ëÊ©£»¼à¿ØCMS×°ÖÃÉ϶ÔÍйÜÄÚÈݵÄδÊÚȨ¸ü¸ÄµÈ¡£
ÔÎÄÁ´½Ó£º
https://www.cyber.gov.au/publications/securing-content-management-systems
2.×êÑÐÈËÔ±ÖÒ¸æÎ¢ÈíÓÐ600¶à¸ö×ÓÓòÒ×Ôâ½Ù³Ö
×êÑÐÈËÔ±ÖÒ¸æ³ÆÎ¢ÈíÓÐ600¶à¸öºÏ·¨µÄ×ÓÓòÃûÒ×Ôâ½Ù³ÖºÍÀÄÓá£×ÓÓòÃû½Ù³ÖÊÇÖ¸¸Ã×ÓÓòµÄDNS¼Í¼ָÏò²»ÔÙ´æÔÚµÄÓòÃû£¬¶ø´´½¨¸Ã²»´æÔÚÓòÃûµÄ¹¥»÷Õß¼´¿ÉÀûÓÃÃýÎóÅäÖõÄDNS¼Í¼½Ù³Ö¸Ã×ÓÓò¡£¹¥»÷ÕßÄܹ»½«±»½Ù³Ö×ÓÓòµÄ½Ó¼ûÕßµ¼Ïò´¹µöÍøÕ¾¡¢·Ö·¢¶ñÒâÈí¼þ»ò½øÐÐڲƹ¥»÷¡£°²È«¹«Ë¾VullnerabilityɨÃèÁË΢Èí²¿ÃųÁÒªÓòÃûµÄËùÓÐ×ÓÓòÃû£¬·¢ÏÖÓÐ670¶à¸ö×ÓÓòÒ×Ôâ¹¥»÷£¬Ô̺¬identityhelp.microsoft.com£¬mybrowser.microsoft.com£¬webeditor.visualstudio.com£¬data.teams.microsoft.comºÍsxt.cdn.skype.comµÈ¡£Î¢Èí½²»°È˰µÊ¾ÒѾÏàʶÁ˸û㱨£¬²¢ÔÚÆ¾¾Ý±ØÒª²ÉÈ¡Êʵ±µÄ´ëÊ©À´±£»¤Î¢ÈíµÄ·þÎñºÍ¿Í»§¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/over-600-microsoft-subdomains-can-be-hijacked-researchers
3.Netgear½¨¸´Æä·ÓÉÆ÷²úÆ·ÖеĶà¸ö·ì϶
Netgear½¨¸´ÆäÎÞÏßAC·ÓÉÆ÷Nighthawk£¨R7800£©ÖеÄÒ»¸öRCE·ì϶£¬¸Ã·ì϶±»Netgear×·×ÙΪPSV-2019-0076£¬¿ÉÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß½ÚÔì·ÓÉÆ÷£¬ÊÜÓ°ÏìµÄ°æ±¾Îª1.0.2.68֮ǰµÄ¹Ì¼þ°æ±¾¡£Netgear²¢Î´Åû¶Óë¸Ã·ì϶ÓйصľßÌåÐÅÏ¢£¬½ö¶½´Ù¿Í»§½Ó¼ûÔÚÏßÖ§³ÖÒ³ÃæÒÔÏÂÔØ¸Ã·ì϶µÄ²¹¶¡¡£R7800·ÓÉÆ÷»¹Êܵ½ÑéÖ¤ºóºÅÁî×¢Èë·ì϶£¨¸ú×ÙΪPSV-2018-0352£©µÄÓ°Ï죬ÊÜÓ°ÏìµÄ¹Ì¼þ°æ±¾Îª1.0.2.60֮ǰµÄ°æ±¾¡£¸Ã·ì϶»¹Ó°ÏìÁËD6000¡¢R6000¡¢R7000¡¢R8000¡¢R9000ºÍXR500ϵÁÐµÄÆäËü29¸öÐͺŵÄ·ÓÉÆ÷¡£´Ë±í£¬ÁíÒ»¸öºÅÁî×¢Èë·ì϶£¨PSV-2019-0051£©Ó°ÏìÁËR6400¡¢R6700¡¢R6900ºÍR7900 SKUÖеÄ5¸öÐͺŵÄ·ÓÉÆ÷¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/critical-netgear-bug-impacts-nighthawk-router/153445/
4.˼¿Æ½¨¸´Webex PlayerÖеÄÁ½¸öRCE·ì϶
˼¿Æ°ä²¼²úÆ·°²È«¸üУ¬½¨¸´¶à¸ö·ì϶£¬ÆäÖÐÔ̺¬Webex PlayerÖеÄÁ½¸öRCE·ì϶£¨CVE-2020-3127ºÍCVE-2020-3128£©¡£ÕâÁ½¸ö·ì϶ÊÇÓÉÓÚδ¶Ô´æ´¢ÎªARF£¨¸ß¼¶¼Í¼Ìåʽ£©»òWRF£¨Webex¼Í¼Ìåʽ£©µÄWebex¼Í¼ÖеÄÔªËØ½øÐгä·ÖÑéÖ¤¶øµ¼Öµģ¬¹¥»÷ÕßÄܹ»Í¨¹ýÁ´½Ó»òµç×ÓÓʼþ¸½¼þÏòÓû§·¢ËͶñÒâµÄARF»òWRFÎļþ£¬ÓÕʹÓû§´ò¿ª¸ÃÎļþ²¢ÒÔµ±Ç°Óû§È¨ÏÞÖ´ÐÐËÁÒâ´úÂë¡£ÊÜÓ°ÏìµÄ²úÆ·Ô̺¬WebEx Network Recording PlayerºÍWebex Player¡£´Ë±í£¬Ë¼¿Æ»¹½¨¸´ÁËIntelligent ProximityÖеÄSSLÖ¤Êé²»×ãÑéÖ¤·ì϶£¨CVE-2020-3155£©ºÍPrime Network RegistrarÖеĿçÕ¾µãÒªÇóαÔì·ì϶£¨CVE-2020-3148£©¡£ÆëÈ«·ì϶ÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/98973/security/cisco-rce-webex-player.html
5.·þ×°ÁãÊÛÉÌJ.CrewÔâײ¿â¹¥»÷£¬¿Í»§ÐÅϢй¶
ÃÀ¹ú·þ×°ÁãÊÛÉÌJ.Crew°ä·¢ÔÚ2019Äê4ÔÂǰºóÔ⵽ײ¿â¹¥»÷£¬¸Ã¹¥»÷µ¼ÖÂÆä²¿Ãſͻ§µÄÕÊ»§ºÍÐÅÏ¢±»ºÚ¿Í½Ó¼û¡£¿ÉÄÜй¶µÄÐÅÏ¢Ô̺¬¿Í»§ÕË»§Öд洢µÄÐÅÓþ¿¨ºÅºóËÄλÊý×Ö¡¢µ½ÆÚÈÕÆÚ¡¢¿¨ÀàÐͺÍÓйØÕ˵¥ÓʼĵØÖ·¡¢¶©µ¥ºÅ¡¢¿ìµÝÈ·Èϵ¥ºÅºÍ·¢»õ״̬¡£J.CrewÒѽûÓÃÁËËùÓÐÊÜÓ°Ïì¿Í»§µÄÕÊ»§£¬²¢ÒªÇóËûÃÇͨ¹ýprivacy@jcrew.com»ò800-205-7956ÓëJ.Crew¿Í»§·þÎñÖÐÐÄÁªÏµºÍ³ÁÖÃÆäÃÜÂë¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/jcrew-disables-user-accounts-after-credential-stuffing-attack/
6.ÓÐÏßµçÊÓÔËÓªÉÌVirgin Media 90Íò¿Í»§ÐÅϢй¶
Virgin MediaÊÇÓ¢¹úºÍ°®¶ûÀ¼µÄÓÐÏßµçÊÓÔËÓªÉÌ£¬¸Ã¹«Ë¾ÔÚ2020Äê2ÔÂ28ÈÕ·¢ÏÔìäÊý¾Ý¿âÖÁÉÙ´Ó2019Äê4ÔÂ19ÈÕÆð¿É¹«¿ª½Ó¼û¡£¸ÃÊý¾Ý¿âÔ̺¬Ô¼Äª90ÍòÈ˵ÄÁªÏµ·½Ê½£¬ÀýÈçÐÕÃû¡¢¼ÒÍ¥µØÖ·ºÍµç×ÓÓʼþµØÖ·¡¢µç»°ºÅÂ룬µ«²»Ô̺¬ÈκÎÃÜÂë»ò²ÆÕþÐÅÏ¢£¬ÀýÈçÐÅÓþ¿¨ºÅÂë»òÒøÐÐÕË»§¡£Æ¾¾ÝÔÚ½øÐеĵ÷²é£¬¸ÃÊý¾Ý¿âÖÁÉÙÔÚ½üÆÚÔâµ½Ò»´ÎδÊÚȨ½Ó¼û£¬Virgin Media²¢²»Ã÷ÏÔÆä½Ó¼ûµÄÁìÓòÒÔ¼°ÊÇ·ñÏÖʵʹÓÃÁËÊý¾Ý¿âÖеÄÈκÎÐÅÏ¢¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/virgin-media-data-breach-exposes-info-of-900-000-customers/


¾©¹«Íø°²±¸11010802024551ºÅ