ÐÅÏ¢°²È«Öܱ¨-2020ÄêµÚ02ÖÜ

°ä²¼¹¦·ò 2020-01-13


±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


2020Äê01ÔÂ06ÈÕÖÁ12ÈÕ¹²ÊÕ¼°²È«·ì϶57¸ö £¬ÖµµÃ¹Ø×¢µÄÊÇCisco Webex Video Mesh Software WEBºÅÁî×¢Èë·ì϶; Mozilla Firefox Windows XPCVariant.cppÀàÐÍ»ìºÏ´úÂëÖ´Ðзì϶£»Android Realtek rtlwifi driverÔ¶³Ì´úÂëÖ´Ðзì϶£»Android Sound subsystemȨÏÞÌáÉý·ì϶£»Billion Smart Energy Router SG600R2ºÅÁîÖ´Ðзì϶¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇUpstream Security°ä²¼2020°æ¡¶Æû³µÍøÂ簲ȫ»ã±¨¡·£»Î¢Èí°ä²¼RDP±©Á¦¹¥»÷·ÖÎö»ã±¨ £¬¾ùÔȳÖÐø¹¦·òΪ2-3Ì죻MITRE°ä²¼ºÏÓÃÓÚ¹¤Òµ½ÚÔìϵͳµÄATT£¦CK¿ò¼Ü£»Î¢Èí½¨¸´AccessÖеÄÐÅϢй¶·ì϶£¨CVE-2019-1463£©£»Mozilla°ä²¼¸üÐÂ,½¨¸´Firefox 0day·ì϶(CVE-2019-11707)¡£


ƾ¾ÝÒÔÉÏ×ÛÊö £¬±¾Öܰ²È«ÍþвΪÖС£



³ÁÒª°²È«·ì϶Áбí


1. Cisco Webex Video Mesh Software WEBºÅÁî×¢Èë·ì϶


Cisco Webex Video Mesh Software releases WEB½Ó¿Ú´æÔÚ°²È«·ì϶ £¬ÔÊÐíͨ¹ýÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬ÒÔROOTȨÏÞÖ´ÐÐËÁÒâºÅÁî¡£

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-webex-video


2. Mozilla Firefox Windows XPCVariant.cppÀàÐÍ»ìºÏ´úÂëÖ´Ðзì϶


Mozilla Firefox XPCVariant.cpp´æÔÚÀàÐÍ»ìºÏ·ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄWEBÒªÇó £¬ÓÕʹÓû§½âÎö £¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë¡£

https://www.mozilla.org/en-US/security/advisories/mfsa2020-02/


3. Android Realtek rtlwifi driverÔ¶³Ì´úÂëÖ´Ðзì϶


Android Realtek rtlwifi driver´æÔÚδÃ÷°²È«·ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬ÒÔϵͳȨÏ޸ߵÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£

https://source.android.google.cn/security/bulletin/2020-01-01


4. Android Sound subsystemȨÏÞÌáÉý·ì϶


Android Sound subsystem´æÔÚδÃ÷°²È«·ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬¿ÉÌáÉýȨÏÞ¡£

https://source.android.google.cn/security/bulletin/2020-01-01


5. Billion Smart Energy Router SG600R2ºÅÁîÖ´Ðзì϶


Billion Smart Energy Router SG600R2Ô̺¬system_command.asp¾ç±¾ÒÔrootȨÏÞÖ´ÐÐ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬Äܹ»rootȨÏÞÖ´ÐÐËÁÒâºÅÁî¡£

https://github.com/InnotecSystem/Device-Reversing/wiki/Firmware-Inspection


³ÁÒª°²È«ÊÂÎñ×ÛÊö


1¡¢Upstream Security°ä²¼2020°æ¡¶Æû³µÍøÂ簲ȫ»ã±¨¡·


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Upstream Security2020°æ¡¶Æû³µÍøÂ簲ȫ»ã±¨¡·»ùÓÚ¶Ô´ÓǰʮÄêÖÐ367Æð¹«¿ª»ã±¨µÄÆû³µÍøÂ簲ȫÊÂÎñ½øÐзÖÎö £¬³ÁµãÇ¿µ÷ÁË2019ÄêÆÚ¼ä·¢Ïֵķì϶Óë¼û½â¡£¸Ã»ã±¨Ö¸³ö £¬»¥ÁªÍøÆû³µÒÑÔÚÊÕÊÜÆû³µÊг¡ £¬Ä¿Ç°ÒÑÓÐ3.3ÒÚÁ¾»¥ÁªÍøÆû³µ £¬ÕâÒâζ×Åÿ´Î¹¥»÷µÄDZÔÚ·ÛËéÁ¦³É±¶Ôö³¤ £¬´ó¹æÄ£µÄ¹¥»÷ÊÂÎñ¿ÉÄÜ»á·ÛËéÕû¸ö³ÇÊÐ £¬ÉõÖÁµ¼Ö¿àÄÑÐÔµÄÐÔÃüËðʧ¡£×Ô2016ÄêÒÔÀ´ £¬Ã¿ÄêÆû³µÍøÂ簲ȫÊÂÎñµÄÊýÁ¿Ôö³¤ÁË605% £¬½ö2019ÄêÒ»Äê¾ÍÔö³¤ÁËÒ»±¶ÒÔÉÏ¡£ÔÚ2019Äê £¬ÓÐ57%µÄÊÂÎñÊÇÓÉÍøÂç×ï·¸½øÐеÄ £¬ÆäÖ÷ÕÅÊÇ·ÛËéÒµÎñ¡¢ÇÔÈ¡½ðÇ®»òË÷ÒªÊê½ð¡£½öÓÐ38%ÊÇ×êÑÐÈËÔ±µÄ»ã±¨ £¬ÆäÖ÷ÕÅÏò¹«Ë¾ºÍÏû·ÑÕßÖÒÃܸæÏֵķì϶¡£


Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2020/01/06/automotive-cybersecurity-incidents/


2¡¢Î¢Èí°ä²¼RDP±©Á¦¹¥»÷·ÖÎö»ã±¨ £¬¾ùÔȳÖÐø¹¦·òΪ2-3Ìì


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


΢Èí°ä²¼ÁËÒ»·ÝÕë¶ÔRDP±©Á¦¹¥»÷µÄ·ÖÎö»ã±¨ £¬¸ÃÏî×êÑÐÊÇ»ùÓÚ´Ó³¬¹ý4.5Íò¸ö×°ÖÃÁËÃâ·ÑMicrosoft Defender ATPµÄ¹¤×÷Õ¾ÉÏÍøÂçµÄÊý¾Ý¡£ÕâЩÊý¾ÝÓëʧ°ÜºÍ³É¹¦µÄRDPµÇ¼ÊÂÎñÓйأ¨±ðÀëÊÇIDΪ4265ºÍ4264µÄWindowsÊÂÎñ£© £¬²¢ÇÒÉæ¼°Óû§/¹¥»÷Õß¿ÉÄÜʹÓõÄÓû§Ãû¾ßÌåÐÅÏ¢ £¬Êý¾ÝÍøÂçÁ˼¸¸öԵŦ·ò¡£Î¢ÈíÔڻ㱨ÖаµÊ¾ £¬×î½ü¹Û²ìµ½µÄRDP±©Á¦¹¥»÷¾ùÔȳÖÐø2-3Ìì £¬Ô¼90£¥µÄ°¸Àý³ÖÐø¹¦·òÔÚÒ»ÖÜÄÚ £¬Ö»Óв»µ½5£¥µÄ°¸Àý³ÖÐø¹¦·òÔÚÁ½ÖÜ»òÒÔÉÏ¡£Ô¼ÓÐ0.08£¥µÄRDP±©Á¦¹¥»÷³É¹¦½øÐÐÁ˵Ǽ¡£


Ô­ÎÄÁ´½Ó£º

https://www.microsoft.com/security/blog/2019/12/18/data-science-for-cybersecurity-a-probabilistic-time-series-model-for-detecting-rdp-inbound-brute-force-attacks/


3¡¢MITRE°ä²¼ºÏÓÃÓÚ¹¤Òµ½ÚÔìϵͳµÄATT£¦CK¿ò¼Ü


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


±¾ÖܶþMITER°ä²¼ÁËÆäATT£¦CK¿ò¼ÜµÄ³õʼ°æ±¾ £¬¸Ã°æ±¾³Áµã¹Ø×¢ÁËÕë¶Ô¹¤Òµ½ÚÔìϵͳ£¨ICS£©µÄ¶ñÒâ¹¥»÷ÕßʹÓõÄÕ½ÊõºÍ¼¼Êõ¡£Ö¼ÔÚÔ®Êֹؼü»ù´¡ÉèÊ©ºÍÆäËûʹÓÃICSµÄ×éÖ¯ÆÀ¹ÀÆäÍøÂç·çÏÕ¡£³ýÁËÌṩ¹¥»÷Õ½ÊõºÍ¼¼Êõ¾ØÕó±í £¬»¹½éÉÜÁ˹¥»÷¼¼ÊõµÄϸ½Ú¡¢¹¥»÷ÕßʹÓõĶñÒâÈí¼þÒÔ¼°ÒÑÖªµÄÕë¶ÔICSµÄ·¸×ïÍŻËü»¹Ô̺¬Ò»¸ö×ʲúÀà±ð £¬ÓÃÓÚÔ®ÊÖ×éÖ¯Ïàʶ¿ÉÀûÓÃÓÚÆä»·¾³µÄ¼¼Êõ¡£´Ë°æ±¾ÃèÊöÁË81ÖÖ¹¥»÷¼¼Êõ¡¢17ÖÖ¶ñÒâÈí¼þ¡¢10¸ö·¸×ïÍÅ»ïºÍ7ÖÖ×ʲú¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/mitre-releases-attck-knowledge-base-industrial-control-systems


4¡¢Î¢Èí½¨¸´AccessÖеÄÐÅϢй¶·ì϶£¨CVE-2019-1463£©


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


µç×ÓÓʼþ°²È«¹«Ë¾Mimecastй© £¬Microsoft AccessÖеÄÐÅϢй¶·ì϶¿ÉÄܵ¼ÖÂϵͳÄÚ´æÖеÄÃô¸ÐÊý¾Ý±»ÎÞÒâÖб£ÁôÔÚÊý¾Ý¿âÎļþÖС£¸Ã·ì϶£¨CVE-2019-1463£©±»³ÆÎªMDB Leaker £¬Óë¡°ÀûÓ÷¨Ê½¶ÔϵͳÄÚ´æµÄ²»µ±ÖÎÀí¡±ÓйØ £¬Ëü¿ÉÄܵ¼ÖÂδ³õʼ»¯µÄÄÚ´æÔªËصÄÄÚÈݱ£Áôµ½Microsoft Access MDBÎļþÖС£Ö»¹ÜÕâЩÊý¾Ý¿ÉÄܺÁÎÞÓô¦ £¬µ«ËüÒ²¿ÉÄÜÔ̺¬¸ß¶ÈÃô¸ÐµÄÐÅÏ¢ £¬ÀýÈçÃÜÂë¡¢WebÒªÇó¡¢Ö¤ÊéÒÔ¼°Óò»òÓû§Êý¾Ý¡£Mimecast°µÊ¾Ä¿Ç°²»»á°ä²¼ÓйØCVE-2019-1463µÄÈκμ¼ÊõÐÅÏ¢ £¬Ò²Ã»ÓÐÖ¤¾ÝÅú×¢¸Ã·ì϶ÒÑÔÚÒ°±í±»ÀûÓá£Î¢ÈíÒÑÔÚ2019Äê12ÔµIJ¹¶¡¸üÐÂÖн¨¸´Á˸÷ì϶ £¬Æ¾¾Ý΢ÈíµÄ˵·¨ £¬¸Ã·ì϶»áÓ°ÏìOffice 2010¡¢2013¡¢2016¡¢2019ºÍ365 ProPlus¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/microsoft-access-files-could-include-unintentionally-saved-sensitive-data


5¡¢Mozilla°ä²¼¸üÐÂ,½¨¸´Firefox 0day·ì϶(CVE-2019-11707)


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


Mozilla°ä²¼ÁËFirefox 72.0.1ºÍFirefox ESR 68.4.1 £¬½¨¸´ÒÑÔÚÒ°±í±»»ý¼«ÀûÓõÄ0day£¨CVE-2019-11707£©¡£¸Ã·ì϶±»¹éÀàΪÀàÐÍ»ìºÏ·ì϶ £¬Ó°ÏìÁËIonMonkey JIT±àÒëÆ÷ £¬Æ¾¾ÝMozillaµÄ°²È«²¼¸æ £¬IonMonkey JIT±àÒëÆ÷ÖÐÓÃÓÚÉèÖÃÊý×éÔªËØµÄ±ðºÅÐÅÏ¢²»ÕýÈ· £¬¿ÉÄܻᵼÖÂÀàÐÍ»ìºÏ¡£Ç±ÔÚ¹¥»÷Õß¿Éͨ¹ý½«Óû§³Á¶¨ÏòÖÁ¶ñÒâÍøÒ³À´´¥·¢¸Ã·ì϶ £¬µ¼Ö´úÂëÖ´Ðлò´¥·¢±ÀÀ£¡£ÃÀ¹úCISAÒ²·¢³öÖÒ¸æ³Æ¹¥»÷Õß¿ÉÄÜÀûÓô˷ì϶À´½ÚÔìÊÜÓ°ÏìµÄϵͳ £¬²¢½¨ÒéÓû§²é¿´Mozilla°²È«´«µÝºÍÀûÓð²È«¸üС£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/mozilla-firefox-7201-patches-actively-exploited-zero-day/