ÐÅÏ¢°²È«Öܱ¨-2019ÄêµÚ31ÖÜ

°ä²¼¹¦·ò 2019-08-12

> ±¾Öܰ²È«Ì¬ÊÆ×ÛÊö



2019Äê8ÔÂ05ÈÕÖÁ11ÈÕ¹²ÊÕ¼°²È«·ì϶49¸ö £¬ÖµµÃ¹Ø×¢µÄÊÇCisco Enterprise NFV Infrastructure Software OSºÅÁî×¢Èë·ì϶£»MicroDigital N-series cameras´úÂëÖ´Ðзì϶£»Cisco Small Business 220 Series Smart Switches WEB½çÃæ»º³åÆ÷Òç¶Âí½Å£»MongoDB ServerȨÏÞÌáÉý·ì϶£»Android Qualcomm HLOS×é¼þȨÏÞÌáÉý·ì϶¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊǸßͨоƬ´æÔÚQualPwn·ì϶ £¬²¨¼°æçÁú855µÈ¶à¿îSoC;¿¨°Í˹»ù°ä²¼2019ÄêµÚ¶þ¼¾¶ÈDDoS¹¥»÷Ç÷Ïò»ã±¨;×êÑÐÈËÔ±Åû¶²¨Òô787ÄÚ²¿ÍøÂçÖеĶà¸ö°²È«·ì϶;×êÑÐÍŶӰ䲼2019Ä깤¿ØÍþв»ã±¨ £¬¾Å´ó·¸×ïÍÅ»ïרһÓÚICS;GoogleºÍNASAÒòJira·þÎñÆ÷ÅäÖÃÃýÎóµ¼ÖÂÃô¸ÐÊý¾Ýй¶¡£


ƾ¾ÝÒÔÉÏ×ÛÊö £¬±¾Öܰ²È«ÍþвΪÖС£


> ³ÁÒª°²È«·ì϶Áбí



1. Cisco Enterprise NFV Infrastructure Software OSºÅÁî×¢Èë·ì϶


Cisco Enterprise NFV Infrastructure Software WebÃÅ»§¿ò¼Ü´æÔÚ°²È«·ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬ÒÔrootȨÏÞÖ´ÐÐËÁÒâºÅÁî¡£

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-nfv-commandinj


2. MicroDigital N-series cameras´úÂëÖ´Ðзì϶


MicroDigital N-series cameras ¡®action¡¯²ÎÊý´¦ÖôæÔÚ°²È«·ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£

https://pastebin.com/PSyqqs1g


3. Cisco Small Business 220 Series Smart Switches WEB½çÃæ»º³åÆ÷Òç¶Âí½Å


Cisco Small Business 220 Series Smart Switches WEB½çÃæ´æÔÚ»º³åÇøÒç¶Âí½Å £¬ÔÊÐí¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬¿ÉʹÉ豸±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë¡£

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190806-sb220-rce


4. MongoDB ServerȨÏÞÌáÉý·ì϶


MongoDB Server´æÔڻỰ³ÁÓ÷ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬¿É³ÁÓÃÒѳÉÁ¢µÄ»á»° £¬Î´ÊÚȨ½Ó¼û¡£

https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0829


5. Android Qualcomm HLOS×é¼þȨÏÞÌáÉý·ì϶


Android Qualcomm HLOS×é¼þ´æÔÚ°²È«·ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬¿ÉÌáÉýȨÏÞ¡£
https://source.android.com/security/bulletin/2019-08-01.html


> ³ÁÒª°²È«ÊÂÎñ×ÛÊö



1¡¢¸ßͨоƬ´æÔÚQualPwn·ì϶ £¬²¨¼°æçÁú855µÈ¶à¿îSoC

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾

¸ßͨ¶à¿îSoCÊܵ½Á½¸ö·ì϶µÄÓ°Ïì £¬ÕâÁ½¸ö·ì϶±»³ÆÎªQualPwn £¬±ðÀëÊÇÓ°Ïì¸ßͨWLAN×é¼þ¼°AndroidÄں˵Ļº³åÇøÒç¶Âí½Å£¨CVE-2019-10538£©ÒÔ¼°¸ßͨWLAN¼°Modem¹Ì¼þÖеĻº³åÇøÒç¶Âí½Å£¨CVE-2019-10540£©¡£Æ¾¾Ý¸ßͨ°ä²¼µÄ°²È«²¼¸æ £¬ºóÕßÓ°ÏìµÄ²úÆ·Ô̺¬SD 820¡¢SD 835¡¢SD 845¡¢SD 850¡¢SD 855µÈ20¶à¿îоƬ¡£¸ßͨºÍAndroidÍŶÓÒѾ­°ä²¼ÁËÓйؽ¨¸´²¹¶¡¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/qualpwn-vulnerabilities-in-qualcomm-chips-let-hackers-compromise-android-devices/

2¡¢¿¨°Í˹»ù°ä²¼2019ÄêµÚ¶þ¼¾¶ÈDDoS¹¥»÷Ç÷Ïò»ã±¨


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾Ý¿¨°Í˹»ùµÄ2019ÄêQ2 DDoS¹¥»÷»ã±¨ £¬±¾¼¾¶ÈµÄDDoS¹¥»÷ÊýÁ¿±ÈÉÏÒ»¼¾¶ÈÉٵöà¡£ÕâÖÖ³Á¾²¿ÉÄÜÊÇÓÉÓÚÏļ¾ÍøÂç·¸×ï»î¶¯µÄ´«Í³ÐÔÏ÷¼õËùÖ £¬Óë2018ÄêQ2Ïà±È £¬¹¥»÷×ÜÊýÏÖʵÉÏÔö³¤ÁË18¸ö°Ù·Öµã £¬ÕâÒâζ×Å×Ô2019ËêÊ×ÒÔÀ´¹Û²ìµ½µÄDDoSÔö³¤Ç÷ÏòÒÀÈ»´æÔÚ¡£±¾¼¾¶ÈÖйú»¹ÊÇDDoS¹¥»÷ÊýÁ¿×î¶àµÄµØÓò£¨63.80£¥£© £¬Æä´ÎÊÇÃÀ¹ú£¨17.57£¥£©¡£±¾¼¾¶È³ÖÐø¹¦·ò×µÄ¹¥»÷´ï509¸öÓ×ʱ £¬´´ÏÂÁËеĺ¹Çà¼Í¼¡£

Ô­ÎÄÁ´½Ó£ºhttps://securelist.com/ddos-report-q2-2019/91934/

3¡¢×êÑÐÈËÔ±Åû¶²¨Òô787ÄÚ²¿ÍøÂçÖеĶà¸ö°²È«·ì϶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


IOActive×êÑÐÈËÔ±Ruben SantamartaÔÚBlack Hat´ó»áÉÏÅû¶Á˲¨Òô787ÃλÿͻúÖеĶà¸ö°²È«·ì϶¡£ÕâЩ·ì϶Óë·É»úµÄ³ÉÔ±ÐÅÏ¢·þÎñ/ÊØ»¤ÏµÍ³£¨CIS/MS£©ÓйØ £¬¹¥»÷Õß¿ÉÀûÓÃÕâЩ·ì϶Ïò·É»úµÄ¹Ø¼ü°²Õûϵͳ£¨ÀýÈçÒýÇæ¡¢Ô춯ϵͳ¡¢´«¸ÐÆ÷£©·¢ËͶñÒâºÅÁî¡£´Ë±í £¬¹¥»÷Õß»¹¿Éͨ¹ýÈëÇÖ·É»úµÄÎÀÐÇÉ豸¼°ÎÞÏßͨѶÇþ·ÏòÊØ»¤¹¤³ÌʦÌṩÃýÎóµÄϵͳÐÅÏ¢¡£²¨ÒôÐû³ÆÕâЩÎÊÌâ²»»á×é³ÉÍøÂçÍþв £¬ÓÉÓÚÆä·À»¤´ëÊ©Äܹ»×èÖ¹´ËÀ๥»÷¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.wired.com/story/boeing-787-code-leak-security-flaws/?verso=true

4¡¢×êÑÐÍŶӰ䲼2019Ä깤¿ØÍþв»ã±¨ £¬¾Å´ó·¸×ïÍÅ»ïרһÓÚICS

GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¹¤¿Ø°²È«³§ÉÌDragos°ä²¼2019Ä깤¿ØÍþв»ã±¨ £¬»ã±¨ÖзÖÎöÁËרÃÅÕë¶ÔICSÍøÂçµÄ9¸ö·¸×ïÍŻÆäÖÐ5¸ö·¸×ïÍÅ»ïÖØÒªÕë¶ÔʯÓͺÍÌìÈ»Æø¹«Ë¾ £¬Ô̺¬HEXANE¡¢MAGNALLIUM¡¢CHRYSENE¡¢XENOTIMEºÍDYMALLOY £¬ÆäÓà4¸ö·¸×ïÍÅ»ïÖØÒªÕë¶ÔÄÜÔ´²¿ÃÅ £¬Ô̺¬ELECTRUM¡¢RASPITE¡¢ALLANITEºÍCOVELLITE¡£¸Ã»ã±¨Ö¸³öÓÉÓÚ¿ÉÔì³É¸ß¶ÈÕðµ´µÄÕþÖκ;­¼ÃÓ°Ïì £¬Ê¯ÓͺÍÌìÈ»Æø²¿ÃÅÒÀÈ»Ãæ¶Ô·ÛËéÐÔÍøÂç¹¥»÷µÄ·çÏÕ¡£

Ô­ÎÄÁ´½Ó£ºhttps://dragos.com/wp-content/uploads/Dragos-Oil-and-Gas-Threat-Perspective-2019.pdf

5¡¢GoogleºÍNASAÒòJira·þÎñÆ÷ÅäÖÃÃýÎóµ¼ÖÂÃô¸ÐÊý¾Ýй¶


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


JiraÊÇÒ»¸öÊ¢ÐеÄÏîÄ¿ÖÎÀí½â¾ö¹æ»® £¬°²È«×êÑÐÔ±Avinash Jain·¢ÏÖµ±ÔÚJira CloudÖд´½¨ÐµÄfilterºÍdashboardʱ £¬ÆäĬÈϿɼûÐÔÊÇ¡°ËùÓÓ×± £¬ÕâºÜÈÝÒ×±»Àí½âΪ¡°ÆóÒµÄÚ²¿ËùÓÐÈË¡±µ«ÏÖʵÉÏËüÖ¸µÄÊÇ¡°»¥ÁªÍøÉϵÄËùÓÐÈË¡±¡£ÕâÖÖÅäÖÃÃýÎóʹµÃºÜ¶à×éÖ¯µÄÃô¸ÐÏîÄ¿ÐÅÏ¢ÆØ¹â £¬Ô̺¬Google¡¢Yahoo¡¢NASA¡¢Lenovo¡¢1Password¡¢ZendeskÒÔ¼°µ±¾Ö»ú¹¹µÈ¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/misconfigured-jira-servers-leak-info-on-users-and-projects/