ÐÅÏ¢°²È«Öܱ¨-2019ÄêµÚ31ÖÜ
°ä²¼¹¦·ò 2019-08-12> ±¾Öܰ²È«Ì¬ÊÆ×ÛÊö
2019Äê8ÔÂ05ÈÕÖÁ11ÈÕ¹²ÊÕ¼°²È«·ì϶49¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇCisco Enterprise NFV Infrastructure Software OSºÅÁî×¢Èë·ì϶£»MicroDigital N-series cameras´úÂëÖ´Ðзì϶£»Cisco Small Business 220 Series Smart Switches WEB½çÃæ»º³åÆ÷Òç¶Âí½Å£»MongoDB ServerȨÏÞÌáÉý·ì϶£»Android Qualcomm HLOS×é¼þȨÏÞÌáÉý·ì϶¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊǸßͨоƬ´æÔÚQualPwn·ì϶£¬²¨¼°æçÁú855µÈ¶à¿îSoC;¿¨°Í˹»ù°ä²¼2019ÄêµÚ¶þ¼¾¶ÈDDoS¹¥»÷Ç÷Ïò»ã±¨;×êÑÐÈËÔ±Åû¶²¨Òô787ÄÚ²¿ÍøÂçÖеĶà¸ö°²È«·ì϶;×êÑÐÍŶӰ䲼2019Ä깤¿ØÍþв»ã±¨£¬¾Å´ó·¸×ïÍÅ»ïרһÓÚICS;GoogleºÍNASAÒòJira·þÎñÆ÷ÅäÖÃÃýÎóµ¼ÖÂÃô¸ÐÊý¾Ýй¶¡£
> ³ÁÒª°²È«·ì϶Áбí
1. Cisco Enterprise NFV Infrastructure Software OSºÅÁî×¢Èë·ì϶
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-nfv-commandinj
2. MicroDigital N-series cameras´úÂëÖ´Ðзì϶
https://pastebin.com/PSyqqs1g
3. Cisco Small Business 220 Series Smart Switches WEB½çÃæ»º³åÆ÷Òç¶Âí½Å
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190806-sb220-rce
4. MongoDB ServerȨÏÞÌáÉý·ì϶
https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0829
5. Android Qualcomm HLOS×é¼þȨÏÞÌáÉý·ì϶
https://source.android.com/security/bulletin/2019-08-01.html
> ³ÁÒª°²È«ÊÂÎñ×ÛÊö
¸ßͨ¶à¿îSoCÊܵ½Á½¸ö·ì϶µÄÓ°Ï죬ÕâÁ½¸ö·ì϶±»³ÆÎªQualPwn£¬±ðÀëÊÇÓ°Ïì¸ßͨWLAN×é¼þ¼°AndroidÄں˵Ļº³åÇøÒç¶Âí½Å£¨CVE-2019-10538£©ÒÔ¼°¸ßͨWLAN¼°Modem¹Ì¼þÖеĻº³åÇøÒç¶Âí½Å£¨CVE-2019-10540£©¡£Æ¾¾Ý¸ßͨ°ä²¼µÄ°²È«²¼¸æ£¬ºóÕßÓ°ÏìµÄ²úÆ·Ô̺¬SD 820¡¢SD 835¡¢SD 845¡¢SD 850¡¢SD 855µÈ20¶à¿îоƬ¡£¸ßͨºÍAndroidÍŶÓÒѾ°ä²¼ÁËÓйؽ¨¸´²¹¶¡¡£
ÔÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/qualpwn-vulnerabilities-in-qualcomm-chips-let-hackers-compromise-android-devices/
2¡¢¿¨°Í˹»ù°ä²¼2019ÄêµÚ¶þ¼¾¶ÈDDoS¹¥»÷Ç÷Ïò»ã±¨
ÔÎÄÁ´½Ó£ºhttps://securelist.com/ddos-report-q2-2019/91934/
3¡¢×êÑÐÈËÔ±Åû¶²¨Òô787ÄÚ²¿ÍøÂçÖеĶà¸ö°²È«·ì϶
IOActive×êÑÐÈËÔ±Ruben SantamartaÔÚBlack Hat´ó»áÉÏÅû¶Á˲¨Òô787ÃλÿͻúÖеĶà¸ö°²È«·ì϶¡£ÕâЩ·ì϶Óë·É»úµÄ³ÉÔ±ÐÅÏ¢·þÎñ/ÊØ»¤ÏµÍ³£¨CIS/MS£©Óйأ¬¹¥»÷Õß¿ÉÀûÓÃÕâЩ·ì϶Ïò·É»úµÄ¹Ø¼ü°²Õûϵͳ£¨ÀýÈçÒýÇæ¡¢Ô춯ϵͳ¡¢´«¸ÐÆ÷£©·¢ËͶñÒâºÅÁî¡£´Ë±í£¬¹¥»÷Õß»¹¿Éͨ¹ýÈëÇÖ·É»úµÄÎÀÐÇÉ豸¼°ÎÞÏßͨѶÇþ·ÏòÊØ»¤¹¤³ÌʦÌṩÃýÎóµÄϵͳÐÅÏ¢¡£²¨ÒôÐû³ÆÕâЩÎÊÌâ²»»á×é³ÉÍøÂçÍþв£¬ÓÉÓÚÆä·À»¤´ëÊ©Äܹ»×èÖ¹´ËÀ๥»÷¡£
ÔÎÄÁ´½Ó£ºhttps://www.wired.com/story/boeing-787-code-leak-security-flaws/?verso=true
4¡¢×êÑÐÍŶӰ䲼2019Ä깤¿ØÍþв»ã±¨£¬¾Å´ó·¸×ïÍÅ»ïרһÓÚICS
ÔÎÄÁ´½Ó£ºhttps://dragos.com/wp-content/uploads/Dragos-Oil-and-Gas-Threat-Perspective-2019.pdf
5¡¢GoogleºÍNASAÒòJira·þÎñÆ÷ÅäÖÃÃýÎóµ¼ÖÂÃô¸ÐÊý¾Ýй¶
JiraÊÇÒ»¸öÊ¢ÐеÄÏîÄ¿ÖÎÀí½â¾ö¹æ»®£¬°²È«×êÑÐÔ±Avinash Jain·¢ÏÖµ±ÔÚJira CloudÖд´½¨ÐµÄfilterºÍdashboardʱ£¬ÆäĬÈϿɼûÐÔÊÇ¡°ËùÓÓ×±£¬ÕâºÜÈÝÒ×±»Àí½âΪ¡°ÆóÒµÄÚ²¿ËùÓÐÈË¡±µ«ÏÖʵÉÏËüÖ¸µÄÊÇ¡°»¥ÁªÍøÉϵÄËùÓÐÈË¡±¡£ÕâÖÖÅäÖÃÃýÎóʹµÃºÜ¶à×éÖ¯µÄÃô¸ÐÏîÄ¿ÐÅÏ¢ÆØ¹â£¬Ô̺¬Google¡¢Yahoo¡¢NASA¡¢Lenovo¡¢1Password¡¢ZendeskÒÔ¼°µ±¾Ö»ú¹¹µÈ¡£
ÔÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/misconfigured-jira-servers-leak-info-on-users-and-projects/


¾©¹«Íø°²±¸11010802024551ºÅ