ÐÅÏ¢°²È«Öܱ¨-2020ÄêµÚ09ÖÜ

°ä²¼¹¦·ò 2020-03-03

> ±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


2020Äê02ÔÂ24ÈÕÖÁ3ÔÂ01ÈÕ¹²ÊÕ¼°²È«·ì϶54¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇGoogle Chrome V8ÀàÐÍ»ìºÏ·ì϶; Moxa PT-7528 WEB·þÎñÆ÷»º³åÇøÒç¶Âí½Å£»Cisco NX-OS Software CDPºÍ̸ËÁÒâ´úÂëÖ´Ðзì϶£»Red Hat UndertowÎļþÉÏ´«´úÂëÖ´Ðзì϶£»Tonnet TAT-76ĬÈÏÃÜÂëÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇåÚÏë¡¢»Ý±é¼°´÷¶û±íΧÉ豸ÊÜδÊðÃû¹Ì¼þ·ì϶ӰÏ죬4G LTEзì϶ÔÊÐí¹¥»÷Õß×¢²á¸¶·ÑµÄ¶©ÔÄ»òÍøÕ¾·þÎñ£¬²©Í¨Wi-FiоƬKr??k¼ÓÃÜ·ì϶£¬Ó°Ï쳬¹ýÊ®ÒŲ́É豸£¬Exchange ServerÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2020-0688£©£¬Å·ÖÞÍøÂçÓëÐÅÏ¢°²È«¾Ö°ä²¼Ò½ÔºÍøÂ簲ȫ²É¹ºÖ¸ÄÏ¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£


>³ÁÒª°²È«·ì϶Áбí


1. Google Chrome V8ÀàÐÍ»ìºÏ·ì϶


Google Chrome V8´æÔÚÀàÐÍ»ìºÏ·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄWEBÒ³ÒªÇó£¬ÓÕʹÓû§½âÎö£¬Ê¹ÀûÓ÷¨Ê½±ÀÀ£»òÄܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£


https://chromereleases.googleblog.com/2020/02/stable-channel-update-for-desktop_24.html


2. Moxa PT-7528 WEB·þÎñÆ÷»º³åÇøÒç¶Âí½Å


Moxa PT-7528 WEB·þÎñÆ÷´æÔÚ»º³åÇøÒç¶Âí½Å£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë¡£


https://www.us-cert.gov/ics/advisories/icsa-20-056-03


3. Cisco NX-OS Software CDPºÍ̸ËÁÒâ´úÂëÖ´Ðзì϶


Cisco NX-OS Software CDPºÍ̸´¦ÖôæÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Äܹ»ROOTȨÏÞÖ´ÐÐËÁÒâ´úÂë¡£


https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-fxos-nxos-cdp


4. Red Hat UndertowÎļþÉÏ´«´úÂëÖ´Ðзì϶


Red Hat Undertow´æÔÚAJPÎļþ¶ÁÈ¡ºÍÔ̺¬·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉÖ´ÐÐËÁÒâ´úÂë¡£

https://access.redhat.com/security/cve/cve-2020-1745


5. Tonnet TAT-76ĬÈÏÃÜÂëÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶


Tonnet TAT-76 DVR¹Ì¼þÔ̺¬ÓÐÃýÎóÅäÖõÄÉí·ÝÑéÖ¤»úÔ죬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶»ñȡĬÈÏÃÜÂ룬Ìá½»ÌØÊâµÄÒªÇ󣬿ÉδÊÚȨ½Ó¼û¡£


https://tvn.twcert.org.tw/taiwanvn/TVN-201910003


> ³ÁÒª°²È«ÊÂÎñ×ÛÊö


1¡¢åÚÏë¡¢»Ý±é¼°´÷¶û±íΧÉ豸ÊÜδÊðÃû¹Ì¼þ·ì϶ӰÏì


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾ÝEclypsiumµÄ×êÑУ¬Wi-FiÊÊÅäÆ÷¡¢USB¼¯Ï߯÷¡¢´¥¿Ø°åºÍÉãÏñÍ·ÖеÄδÊðÃû¹Ì¼þ·ì϶¿ÉÄÜʹÊý°ÙÍò±íΧÉè±¸Ãæ¶ÔÍøÂç¹¥»÷µÄ·çÏÕ¡£ÊÜÓ°ÏìµÄ²úÆ·Ô̺¬åÚÏë±Ê¼Ç±¾µçÄÔÖеÄTouchPadºÍTrackPoint¹Ì¼þ¡¢»ÝÆÕ±Ê¼Ç±¾µçÄÔÖеÄHP Wide Vision FHDÉãÏñÍ·¹Ì¼þÒÔ¼°´÷¶ûXPS±Ê¼Ç±¾µçÄÔÖеÄWi-FiÊÊÅäÆ÷µÈ¡£ÓÉÓÚÕâЩ²úÆ·ÔÚ½øÐй̼þ¸üÐÂʱ²»×ãÊʵ±µÄ´úÂëÊðÃûÑéÖ¤ºÍÉí·ÝÑéÖ¤£¬¹¥»÷Õß¿ÉÄÜͨ¹ý¶ñÒâ¹Ì¼þ¸üÐÂÀ´Ö´ÐÐÐÅϢй¶¡¢Ô¶³Ì´úÂëÖ´ÐÓ×¢»Ø¾ø·þÎñµÈ¹¥»÷¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/lenovo-hp-dell-peripherals-unpatched-firmware/152936/


2¡¢4G LTEзì϶ÔÊÐí¹¥»÷Õß×¢²á¸¶·ÑµÄ¶©ÔÄ»òÍøÕ¾·þÎñ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


²¨ºè³¶û´óѧµÄÒ»ÏîÐÂ×êÑÐÅú×¢£¬4GÒÆ¶¯Í¨Ñ¶³ß¶ÈÖеÄÒ»¸ö·ì϶¿ÉÄÜʹ¹¥»÷Õß¼ÙðÓû§À´×¢²á¶©ÔÄ»ò¸¶·ÑÍøÕ¾·þÎñ¡£ÕâÏî¹¥»÷¼¼Êõ±»³ÆÎªIMP4GT£¬×êÑÐÈËÔ±³ÆÆäÓ°ÏìÁËËùÓеÄLTEͨѶÉ豸£¬ÕâÔ̺¬¡°ÏÕЩËùÓеġ±ÖÇÄÜÊÖ»ú¡¢Æ½°åµçÄԺͲ¿ÃÅIoTÉ豸¡£IMP4GTµÄ¹Ø¼üÉí·ÖÊÇÀûÓÃÈí¼þ½ç˵µÄÎÞÏßµçÀ´À¹½ØºÍºýÅªÒÆ¶¯É豸Óë»ùÕ¾Ö®¼äµÄͨѶÐÅ·¡£¹ÌÈ»Êý¾Ý°üÔÚÊÖ»úºÍ»ùÕ¾Ö®¼äÒÔ¼ÓÃÜ·½Ê½´«Ê䣬µ«ÓÉÓÚ²»×ãÆëÈ«ÐÔ±£»¤£¬Äܹ»Í¨¹ýÅú¸ÄÊý¾Ý°üÀ´´¥·¢ÃýÎó¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/lte-security-flaw-can-be-abused-to-take-out-subscriptions-at-your-expense/?&web_view=true


3¡¢²©Í¨Wi-FiоƬKr??k¼ÓÃÜ·ì϶£¬Ó°Ï쳬¹ýÊ®ÒŲ́É豸


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ESET×êÑÐÈËÔ±ÔÚBroadcom£¨²©Í¨£©ºÍCypressµÄWi-FiоƬÖз¢ÏÖзì϶Kr??k£¬¸Ã·ì϶£¨CVE-2019-15126£©¿Éµ¼ÖÂÒ×Êܹ¥»÷µÄÉ豸ʹÓÃÈ«Áã¼ÓÃÜÃÜÔ¿À´¼ÓÃÜÓû§µÄ²¿ÃÅͨѶÐÅÏ¢¡£Ôڳɹ¦µÄ¹¥»÷ÖУ¬¹¥»÷ÕßÄܹ»½âÃÜÓÉÒ×Êܹ¥»÷µÄÉ豸´«ÊäµÄijЩÎÞÏßÍøÂçÊý¾Ý°ü¡£¸Ã·ì϶ӰÏìµÄÉ豸Ô̺¬ÑÇÂíÑ·£¨Echo¡¢Kindle£©¡¢Æ»¹û£¨iPhone¡¢iPad¡¢MacBook£©¡¢¹È¸è£¨Nexus£©¡¢ÈýÐÇ£¨Galaxy£©¡¢Ê÷Ý®ÅÉ£¨Pi 3£©¡¢Ó×Ã×£¨RedMi£©µÄijЩ¿Í»§¶ËÉ豸ÒÔ¼°»ªË¶ºÍ»ªÎªµÄijЩAPºÍ·ÓÉÆ÷É豸£¬ÊؾɹÀ¼ÆÓг¬¹ýÊ®ÒÚÉ豸ÊÜÓ°Ïì¡£CypressÒѾ­Ïò¹©¸øḚ́䲼Á˹̼þ½¨¸´·¨Ê½£¬Óû§¿Éͨ¹ýÆäÉ豸Ôì×÷ÉÌ»ñÈ¡ÏàÓ¦¸üС£×êÑÐÈËԱûÓÐÔÚ¸ßͨ¡¢Realtek¡¢RalinkºÍMediatekµÄWiFiоƬÖз¢Ïָ÷ì϶¡£


Ô­ÎÄÁ´½Ó£º

https://www.welivesecurity.com/2020/02/26/krook-serious-vulnerability-affected-encryption-billion-wifi-devices/


4¡¢Exchange ServerÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2020-0688£©


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ZDIÅû¶΢ÈíExchange ServerÖÐÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2020-0688£©µÄ¼¼Êõϸ½Ú¡£Î¢Èí×î³õ³Æ¸Ã·ì϶ÊÇÓÉÄÚ´æ°Ü»µµ¼ÖµÄ£¬µ«ºóÀ´½«ÃèÊö½¨¸ÄΪ¸Ã·ì϶ÊÇÓÉExchange ServerÔÚ×°ÖÃʱδÄÜÕýÈ·´´½¨Î¨Ò»µÄ¼ÓÃÜÃÜÔ¿µ¼ÖµÄ¡£¸Ã·ì϶´æÔÚÓÚExchange½ÚÔìÃæ°å£¨ECP£©×é¼þÖУ¬ÓÉÓÚʹÓÃÁ˾²Ì¬ÃÜÔ¿£¬¾­¹ýÉí·ÝÑéÖ¤µÄ¹¥»÷ÕßÄܹ»ÓÕʹ·þÎñÆ÷·´ÐòÁл¯¶ñÒâÔì×÷µÄViewStateÊý¾Ý£¬´Ó¶øÔÚ·þÎñÆ÷ÉÏECPÀûÓã¨SYSTEMȨÏÞ£©µÄ¸ßµÍÎÄÖÐÖ´ÐÐËÁÒâ.NET´úÂë¡£


Ô­ÎÄÁ´½Ó£º

https://www.zerodayinitiative.com/blog/2020/2/24/cve-2020-0688-remote-code-execution-on-microsoft-exchange-server-through-fixed-cryptographic-keys


5¡¢Å·ÖÞÍøÂçÓëÐÅÏ¢°²È«¾Ö°ä²¼Ò½ÔºÍøÂ簲ȫ²É¹ºÖ¸ÄÏ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾



Å·ÖÞÍøÂçÓëÐÅÏ¢°²È«¾Ö£¨ENISA£©°ä²¼Ò½ÔºÍøÂ簲ȫ²É¹ºÖ¸ÄÏ¡£¸ÃÖ¸ÄÏÖ¼ÔÚÔ®ÊÖÒ½ÔºÔڲɹºÐÂ×ʲúʱÂú×ãÐÅÏ¢°²È«·½ÃæµÄÒªÇó£¬ÌṩÁ˽«ÍøÂ簲ȫ×÷ΪҽԺ²É¹º¹ý³ÌÖÐÒ»Ïî»®¶¨µÄÓÅÁ¼Êµ¼ÊºÍ½¨Ò飬²¢ÇÒ½éÉÜÁËÒ½Ôº×ʲú¼¯ÖÐÒÔ¼°ÓëÖ®ÓйصÄ×î͹ÆðÍøÂ簲ȫÍþв¡£¸Ã»ã±¨ÖØÒªÕë¶ÔÔÚÒ½Ôºµ£Èμ¼ÊõÖ°ÎñµÄÒ½ÁƱ£½¡×¨ÒµÈËÔ±£¨CIO£¬CISO£¬CTO£¬ITÍŶÓÒÔ¼°Ò½ÁƱ£½¡×éÖ¯ÖеIJɹºÈËÔ±£©£¬²¢ÇÒ¿ÉÒÔΪҽÁÆÉ豸Ôì×÷ÉÌÌṩ²Î¿¼¡£


Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2020/02/25/cybersecurity-procurement-hospitals/