ÐÅÏ¢°²È«Öܱ¨-2020ÄêµÚ34ÖÜ

°ä²¼¹¦·ò 2020-08-24

> ±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


2020Äê08ÔÂ17ÈÕÖÁ23ÈÕ¹²ÊÕ¼°²È«·ì϶53¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇMicro Air Vehicle LinkÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶£»Silicon Labs Bluetooth Low Energy SDK CVE-2020-15531»º³åÇøÒç¶Âí½Å£»Apache ShiroÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶£»Beijing Kuangshi Technology MEGVII KoalaδÊÚȨ½Ó¼û·ì϶; ZKTeco FaceDepotȨÏÞÌáÉý·ì϶¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇCactusPete APTÀûÓÃBisonal¹¥»÷Å·ÖÞ½ðÈں;üÊÂ×éÖ¯£»ºÚ¿Í×éÖ¯TeamTNTÀûÓüÓÃÜÈ䳿ÇÔÈ¡AWSƾ֤£»ÓÊÂÖ¹«Ë¾CarnivalϰȾÀÕË÷Èí¼þ£¬²¿ÃÅÊý¾Ý»òÒÑй¶£»Microsoft°ä²¼Windows´ø±í°²È«¸üУ¬½¨¸´ÌáȨ·ì϶£»ThalesµÄ²úÆ·´æÔÚ·ì϶£¬¿ÉÓ°ÏìÊý°ÙÍòIoTÉ豸¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£


³ÁÒª°²È«·ì϶Áбí


1.Micro Air Vehicle LinkÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶


Micro Air Vehicle Link (MAVLink)ʹÓÃÎÊ´ð»úÔì½øÐа汾ЭÉÌ£¬Ã»ÓÐѡȡÉí·ÝÑéÖ¤»úÔ죬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬ÈƹýÉí·ÝÑéÖ¤£¬Ö±½ÓÓë×Ô¶¯¼Ýʻϵͳ½øÐн»»¥¡£

https://github.com/aliasrobotics/RVD/issues/3316


2. Silicon Labs Bluetooth Low Energy SDK CVE-2020-15531»º³åÇøÒç¶Âí½Å


Silicon Labs Bluetooth Low Energy SDK´¦Öñ¨ÎÄÊý¾Ý´æÔÚ»º³åÇøÒç¶Âí½Å£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£

https://github.com/darkmentorllc/jackbnimble/blob/master/host/pocs/silabs_efr32_extadv_rce.py


3. Apache ShiroÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶


Apache Shiro´¦ÖÃHTTPÒªÇó´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉÈÆ¹ýÑé֤δÊÚȨ½Ó¼û¡£

https://lists.apache.org/thread.html/r539f87706094e79c5da0826030384373f0041068936912876856835f%40%3Cdev.shiro.apache.org%3E


4. Beijing Kuangshi Technology MEGVII KoalaδÊÚȨ½Ó¼û·ì϶


Beijing Kuangshi Technology MEGVII Koala 5000¶Ë¿Ú´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ɻñÈ¡ÎïÀí½Ó¼ûȨÏÞ¡£

https://www.trendmicro.com/vinfo/us/threat-encyclopedia/vulnerability/8137/megvii-koala-291c3s-architectural-vulnerability-on-network-relays


5. ZKTeco FaceDepotȨÏÞÌáÉý·ì϶


ZKTeco FaceDepot´æÔÚÁîÅÆ³ÁÓð²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ɴ´½¨ËÁÒâÓû§£¬ÌáÉýȨÏÞ£¬²¢ÏÂÔØÊý¾Ý¿âµÈ¡£

https://www.trendmicro.com/vinfo/us/threat-encyclopedia/vulnerability/8134/zkteco-facedepot-7b-10213-and-zkbiosecurity-server-10020190723-improper-privilege-vulnerability


> ³ÁÒª°²È«ÊÂÎñ×ÛÊö


1¡¢CactusPete APTÀûÓÃBisonal¹¥»÷Å·ÖÞ½ðÈں;üÊÂ×éÖ¯


1.jpg


¿¨°Í˹»ù·¢ÏÖCactusPete APTÕý½øÐÐÒ»³¡Õë¶ÔÕû¸ö¶«Å·¾üʺͽðÈÚ×éÖ¯µÄ»î¶¯£¬²¢Ê¹ÓÃÁ˺óÃÅBisonalµÄбäÌå¡£¸Ã×éÖ¯ÓÚ2013Äê³õ´Î±»·¢ÏÖ£¬ÓëÅ·ÖÞ¡¢¶íÂÞ˹¡¢ÈÕ±¾ºÍº«¹úµÄÍøÂç·¸×ï»î¶¯ÓйØ£¬×¨ÃÅ´Óʵý±¨ÍøÂçºÍ¼äµý»î¶¯¡£CactusPeteʹÓõÄBisonalÊÇÒ»ÖÖÍøÂç¼äµý¹¤¾ß£¬¿ÉÄÜά³Ö¶ÔÊÜϰȾ»úеµÄÓÆ¾ÃÐÔ£¬¿ÉɨÃèÇý¶¯Æ÷¡¢Áгö²¢Ð¹Â¼ûô¸ÐµÄÎļþ¡¢É¾³ýÄÚÈÝ¡¢É±ËÀϵͳ¹ý³ÌÒÔ¼°Ö´ÐдúÂë¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/cactuspete-threat-group-goes-on-the-rampage-with-a-new-bisonal-backdoor/


2¡¢ºÚ¿Í×éÖ¯TeamTNTÀûÓüÓÃÜÈ䳿ÇÔÈ¡AWSƾ֤


2.jpg


TeamTNTÊÇÒ»¸öÕë¶ÔDocker×°ÖõÄÍøÂç·¸×ï×éÖ¯£¬»òÐíΪµÚÒ»¸öʹÆ÷ÓµÓÐÇÔÈ¡AWSƾְ֤ÄܵļÓÃÜÍÚ¾ò¶ñÒâÈí¼þµÄ×éÖ¯¡£Trend Micro½ñÄêÔçЩʱ³½·¢ÏÖ£¬¸Ã×éÖ¯´Ó4ÔÂÆðÍ·»îÔ¾£¬Í¨¹ýÔÚ»¥ÁªÍøÉÏɨÃèÅäÖÃÃýÎóµÄDockerϵͳ½Ó¼û¶³öµÄAPI£¬²¢ÔÚDocker²¿Êð·þÎñÆ÷À´ÔËÐÐDDoSºÍ¼ÓÃܶñÒâÈí¼þ¡£×êÑÐÈËÔ±·¢ÏÖËû»¹Äܹ»É¨ÃèÔËÐÐÔÚAWS»ù´¡¼Ü¹¹ÉÏ·þÎñÆ÷ÖÐµÄ ~/.aws/credentials and ~/.aws/configÎļþ£¬À´»ñÈ¡Amazon Web Services£¨AWS£©Æ¾Ö¤¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/crypto-mining-worm-steal-aws-credentials/


3¡¢ÓÊÂÖ¹«Ë¾CarnivalϰȾÀÕË÷Èí¼þ£¬²¿ÃÅÊý¾Ý»òÒÑй¶


3.jpg


È«Çò×î´óµÄÓÊÂÖ¹«Ë¾Carnival CorpÔÚ8ÔÂ15ÈÕÔâµ½ÁËÀÕË÷Èí¼þ¹¥»÷£¬²¿ÃÅÊý¾Ý»òÒÑй¶¡£¸Ã¹«Ë¾°µÊ¾£¬ºÚ¿Í½Ó¼û²¢¼ÓÃÜÁËÆä·Ö¹«Ë¾µÄÐÅÏ¢¼¼Êõϵͳ£¬²¢ÇÒÇÔÈ¡ÁËÎļþ¡£Æ¾¾Ý¶Ô¸ÃÊÂÎñµÄ³õ²½ÆÀ¹À£¬¼ÎÄ껪ÒÔΪ£¬¹¥»÷Õß¿ÉÄÜÒѾ­½Ó¼ûÁËijЩÀ´±öºÍÔ±¹¤µÄÓ×ÎÒÊý¾Ý¡£µ«ÊÇCarnivalûÓÐй©ÓйشËÊÂÎñµÄ¾ßÌåÐÅÏ¢£¬ÀýÈçÀÕË÷Èí¼þÃû³Æ£¬»òÆä¹¥»÷Ó°ÏìÁìÓòµÈ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/worlds-largest-cruise-line-operator-discloses-ransomware-attack/


4¡¢Microsoft°ä²¼Windows´ø±í°²È«¸üУ¬½¨¸´ÌáȨ·ì϶


4.jpg


MicrosoftΪWindows 8.1ºÍWindows Server 2012 R2°ä²¼ÁË´ø±í°²È«¸üУ¬Ö¼ÔÚ½¨¸´ÌáȨ·ì϶£¬¸Ã·ì϶»áÓ°ÏìWindowsÔ¶³Ì½Ó¼û·þÎñ¡£Õâ´Î½¨¸´µÄÁ½¸ö·ì϶±»×·×ÙΪCVE-2020-1530ºÍCVE-2020-1537£¬¹¥»÷ÕßÔڳɹ¦ÀûÓúó¿É»ñµÃ¸ü¸ßµÄȨÏÞ¡£µ«ÊÇÔÚÀûÓÃÕâЩ·ì϶֮ǰ£¬¹¥»÷Õß±ØÒªÏÈÔÚÊܺ¦ÕßµÄÉ豸ÉϱàдִÐÐÌØÈ¨´úÂë¡£Õâ´Î¸üÐÂͨ¹ý¸üÕýWindows Remote Access´¦ÖÃÄÚ´æºÍÎļþ²Ù×÷µÄ·½Ê½À´½â¾ö·ì϶¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/microsoft-issues-out-of-band-kb4578013-windows-security-update/


5¡¢ThalesµÄ²úÆ·´æÔÚ·ì϶£¬¿ÉÓ°ÏìÊý°ÙÍòIoTÉ豸


5.jpg


IBMµÄ°²È«×êÑÐÈËÔ±·¢ÏÖThalesµÄ²úÆ·µÄͨѶÄ£¿éÖдæÔÚÑϳÁ·ì϶£¬¿ÉÓ°ÏìÊý°ÙÍòIoTÉ豸¡£¸Ã·ì϶±»×·×ÙΪCVE-2020-15858£¬ÓÚ2019Äê9Ô³õ´ÎÔÚThalesµÄCinterion EHS8 M2MÄ£¿éÖб»·¢ÏÖ£¬²¢ÓÚ2020Äê2Ô±»½¨¸´¡£ºóÀ´»¹·¢ÏÖËü»¹»áÓ°ÏìÆäËûÊ®¸öÄ£¿é¡£¸Ã·ì϶ÓëÔ̺¬ÓмÓÃÜÃÜÔ¿¡¢ÃÜÂëºÍÖ¤ÊéÖ®ÀàÐÅÏ¢µÄJava´úÂëÓйØ£¬¹¥»÷ÕßÄܹ»ÀûÓô˷ìÏ¶ÈÆ¹ý°²È«»úÔì²¢½Ó¼ûÕâЩÐÅÏ¢£¬¶øºóÀûÓøÃÐÅÏ¢À´½ÚÔìÉ豸»ò½Ó¼ûÔ̺¬¸ÃÉ豸µÄÍøÂç¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/vulnerability-thales-product-could-expose-millions-iot-devices-attacks