PAN OS´æÔÚCVSSv3ÆÀ·Ö10µÄÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶£¬¿ÉÈÆ¹ý·À»ðǽ£»ºÚ¿Íй¶°ÍÎ÷×Üͳ¼°20Íò¹«ÎñÔ±Ó×ÎÒÐÅÏ¢

°ä²¼¹¦·ò 2020-06-30

1.PAN OS´æÔÚCVSSv3ÆÀ·Ö10µÄÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶£¬¿ÉÈÆ¹ý·À»ðǽ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Palo Alto NetworksÅû¶ÁËÒ»¸ö³Á´ó·ì϶£¨CVE-2020-2021£©£¬¸Ã·ì϶¿ÉʹºÚ¿ÍÈÆ¹ý·À»ðǽºÍÆä¹«Ë¾VPN²úÆ·µÄÉí·ÝÑéÖ¤¡£¸Ã·ì϶ÊÇÔÚCVSSv3ÑϳÁµÈ¼¶ÖлñµÃ10·ÖµÄº±¼û·ì϶֮һ£¬¼È²»±ØÒª¸ß¼¶¼¼Êõ¼¼Êõ£¬ÓÖÄܹ»Í¨¹ýInternet½øÐÐÔ¶³ÌÀûÓ᣺ڿÍÄܹ»ÀûÓø÷ì϶¸ü¸ÄPAN OSµÄÉèÖúÍÖ°ÄÜ£¬À´ÊµÏÖ¹¥»÷¡£ÃÀ¹úÍøÂç˾ÁÔòÒªÇóËùÓÐÊÜCVE-2020-2021Ó°ÏìµÄÉ豸µ±¼´½¨¸´¸Ã·ì϶£¬²¢°µÊ¾±í¹úµÄAPT×éÖ¯¿ÉÄܺܿì¾Í»á³¢ÊÔÀûÓø÷ì϶ÌáÒé¹¥»÷¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/us-cyber-command-says-foreign-hackers-will-most-likely-exploit-new-pan-os-security-bug/


2.ºÚ¿Íй¶°ÍÎ÷×Üͳ¼°20Íò¹«ÎñÔ±Ó×ÎÒÐÅÏ¢£¬¾¯·½ÈÔÔÚµ÷²éÖÐ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ºÚ¿Í×éÖ¯Anonymous BrazilÐû³Æ£¬°ÍÎ÷×Üͳ²©¶ûË÷ÄÉÂÞºÍËûµÄ¶ù×Ó£¬ÒÔ¼°¶àÃû²¿³¤µÄÓ×ÎÒ¾ßÌåÐÅÏ¢ÒѾ­Ð¹Â¶£¬Ëæºó°ÍÎ÷Áª¹ú¾¯Ô±¶Ô´ËÊÂÎñ·¢Õ¹Á˵÷²é¡£µ÷²é·¢ÏÖ£¬³ýÁËÔÚÍøÉÏй©µÄÐÅÏ¢±í£¬¸ÃºÚ¿Í×éÖ¯»¹µÁÈ¡Á˳¬¹ý20ÍòÃûÎäÊ¿ºÍµ±¾Ö¹ÙÔ±µÄÊý¾Ý¡£ÎªµÁÊØÐÅÏ¢£¬ºÚ¿Í¹¥»÷Á˶à¸öÖݵĴóѧ¡¢ÊÐÕþÌüºÍÊÐÒé»áϵͳ£¬½öÔÚÄÏÀï°Â¸ñÀ¼µÂÖÝ£¬¾ÍÓÐ90¶à¸ö»ú¹¹Ôâµ½¹¥»÷¡£Ä¿Ç°£¬¾¯·½¶Ô´ËÊÂÈÔÔÚµ÷²éÖС£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/brazilian-federal-police-investigates-presidential-data-leak/    


3.Snyk°ä²¼»ã±¨£¬¿ªÔ´Èí¼þ°üÖеÄзì϶±ÈÈ¥Äê½µÂäÁË20£¥


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Snyk°ä²¼»ã±¨°µÊ¾£¬½ñÄ꿪ԴÈí¼þ°üÖеÄзì϶ÊýÁ¿±ÈÈ¥Äê½µÂäÁË20£¥¡£¸Ã»ã±¨¶ÔÄÇЩӰÏìÁËʹÓÿªÔ´¿â×éÖ¯µÄÕûÌ尲ȫÐԵķì϶ºÍ6¸öÖ÷Á÷µÄÉú̬ϵͳ½øÐÐÁË×êÑС£×êÑз¢ÏÖ£¬ÔÚ2019Ä꣬зì϶Ï÷¼õÁ˽ü20£¥£»¿çÕ¾¾ç±¾·ì϶ÒÀÈ»ÊÇÊÇ×î³£¼ûµÄ·ì϶£»³£¼ûLinux¿¯ÐаæÖл㱨µÄзì϶Åú×¢£¬±ØÒªÈ«Ãæ¼à¶½ÈÝÆ÷Ó³ÏñÖеÄзì϶£»ÔÚ´óÎÞÊýÉú̬ϵͳÖУ¬SQL×¢Èë·ì϶ÊýÁ¿ÓÐËù½µµÍ£¬Ê¹ÓÃPHPµÄ·ì϶ȴÓÐËùÔö³¤¡£


Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2020/06/29/vulnerabilities-open-source-packages/


4.¹¥»÷µÂÖÝTxDOTµÄÀÕË÷Èí¼þΪRansom X£¬ÖØÒªÕë¶Ôµ±¾ÖºÍÆóÒµ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¾­µ÷²é£¬¹¥»÷Á˵ÿËÈøË¹ÖÝ·¨ÔººÍµÃ¿ËÈøË¹Öݽ»Í¨ÔËÊ䲿 £¨TxDOT£©µÄÀÕË÷Èí¼þΪRansom X£¬ÆäÖØÒªÕë¶Ôµ±¾ÖºÍÆóÒµ¡£×êÑÐÈËԱͨ¹ý¶ÔRansom XÑù±¾µÄ×êÑУ¬·¢ÏÔìäÄܹ»½«ÖÕÖ¹Ó밲ȫÈí¼þ¡¢Êý¾Ý¿â·þÎñÆ÷¡¢MSPÈí¼þ¡¢Ô¶³Ì½Ó¼û¹¤¾ßºÍÓʼþ·þÎñÆ÷ÓйصÄ289¸ö¹ý³Ì£¬Ëü»¹Äܹ»Èƹý¸÷ÀàWindowsϵͳÎļþ¼ÐÒÔ¼°Ê¹ÓÃÁËÔ̺¬.ani¡¢.cabºÍ.cplÔÚÄÚµÄÊýÊ®¸öÀ©´óÃûµÄËùÓÐÎļþ¡£Í¨¹ýÈÆ¹ýÕâЩÎļþ¼Ð£¬¹¥»÷ÕßÄܹ»¼ÓÃÜÍÆËã»ú£¬Í¬Ê±Ò²Äܹ»¹¥»÷ÍøÂçÉÏµÄÆäËûÍÆËã»ú£¬¶ø²»Óò»°²Æä¹¤¾ß±»¼ÓÃÜ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/new-ransom-x-ransomware-used-in-texas-txdot-cyberattack/


5.Ó¥Ñۻع飬APT30ͨ¹ýÂíÀ´Î÷Ñǵ±¾Ö»áÒéÓʼþ·Ö·¢ÐºóÃÅ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


×êÑÐÈËÔ±·¢ÏÖAPT30µÄºóÃÅÐÂÑù±¾£¬Ô̺¬BACKSPACEºÍNETEAGLEºóÃÅ£¬²¢Í¨¹ýÂíÀ´Î÷Ñǵ±¾Ö»áÒéÓʼþ½øÐзַ¢¡£µÚÒ»¸öºóÃŵĶñÒâÑù±¾±»Ð´ÈëÁËMicrosoft OfficeÄ£°åÎļþ¼Ð£¬²¢ÒÔÂíÀ´Î÷Ñǵ±¾Ö»áÒéÒé³ÌΪÖ÷Ì⣬ͨ¹ýÓʼþ½øÐзַ¢¡£µÚ¶þ¸öºóÃŵÄÑù±¾±»·ÅÔÚÆô¶¯Îļþ¼ÐÏ£¬ÎļþÔÚϵͳ³ÁÐÂÆô¶¯ºóÔËÐС£³ý´ËÖ®±í£¬×êÑÐÈËÔ±»¹·¢ÏÖÁËRHttpCtrlºóÃźÍRCtrlºóÃÅ¡£


Ô­ÎÄÁ´½Ó£º

https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/eagle-eye-is-back-apt30/


6.Õë¶ÔÖ½ÖÊͶƱµÄ¿ÉÀ©´ó²àÐÅ·¹¥»÷¿ÉÇÔȡѡÃñÒþÖÔ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


×êÑÐÈËÔ±·¢ÏÖÕë¶ÔÖ½ÖÊͶƱµÄ¿ÉÀ©´ó²àÐÅ·¹¥»÷£¬¿ÉÀûÓÃÆäÇÔȡѡÃñÒþÖÔ¡£×êÑÐÈËÔ±»ùÓÚArduino¿ª·¢°åºÍÂó¿Ë·ç¹¹½¨ÁËÒ»ÖÖÉ豸£¬¸ÃÉ豸¿ÉÄܸ߾«¶ÈµØ¶Ôľ×ÀÉÏÏóÕ÷µÄµØÎ»½øÐÐÈý½ÇÕÉÁ¿£¬Í¨¹ýÕâÖÖ·½Ê½Äܹ»»ñµÃÑ¡ÃñÔÚѡƱÉÏ×ö³öÑ¡ÔñµÄÏóÕ÷¡£Ö®ºóͨ¹ýÃæ²¿¼ø±ðÀ´½øÐв¹³ä¹¥»÷£¬¼´ÔÚͶƹؾÖÐ×°ÖÃÉãÏñ»ú£¬ÒÔ×Ô¶¯¼ì²âÍÑÀëͶƹؾµÄÈËÔ±¡£½áºÏÕâÁ½ÖÖ²½Ö裬½«Õë¶ÔÖ½ÖÊͶƱ½øÐÐÆëÈ«×Ô¶¯»¯µÄ¹¥»÷¡£


Ô­ÎÄÁ´½Ó£º

https://ieeexplore.ieee.org/abstract/document/8806759/