ÃÀ¹úÖÚÒéԺͨ¹ý¡¶°ü¹ÜÄÜÔ´»ù´¡ÉèÊ©·¨°¸¡·£»TP-LinkÐÞ¸´²¿·ÖArcher·ÓÉÆ÷ÖеÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î
Ðû²¼Ê±¼ä 2019-12-17
1.ÃÀ¹úÖÚÒéԺͨ¹ý¡¶°ü¹ÜÄÜÔ´»ù´¡ÉèÊ©·¨°¸¡·
Ëæ×Å2020Äê¡¶¹ú·ÀÊÚȨ·¨¡·£¨NDAA£©µÄͨ¹ý£¬ÃÀ¹úÖÚÒéԺҲͨ¹ýÁË¡¶°ü¹ÜÄÜÔ´»ù´¡ÉèÊ©·¨°¸¡·¡£¸Ã·¨°¸½«ÔÚÃÀ¹úÄÜÔ´²¿¹ú¼ÒʵÑéÊÒÄÚ½¨ÉèÒ»¸öΪÆÚÁ½ÄêµÄÊÔµãÍýÏ룬ÆäÄ¿µÄÊÇ·¢Ã÷ÄÜÔ´²¿·ÖʵÌå»ú¹¹ÖеÄÇå¾²Îó²îºÍ¸ôÀëÒªº¦µÄµçÍøÏµÍ³¡£ÆÀ¹ÀµÄÊÖÒպͱê×¼°üÀ¨Ä£ÄâºÍ·ÇÊý×Ö¿ØÖÆÏµÍ³¡¢×¨ÓÿØÖÆÏµÍ³ºÍÎïÀí¿ØÖÆ¼Æ»®¡£¸Ã·¨°¸»¹ÒªÇó½¨ÉèÒ»¸öÊÂÇé×飬ÆäʹÃüÊÇÆÊÎö¹ú¼ÒʵÑéÊÒÌá³öµÄ½â¾ö¼Æ»®£¬²¢Öƶ©Ò»Ïî±£»¤ÄÜÔ´ÍøµÄ¹ú¼ÒÕ½ÂÔ¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/bill-protect-us-energy-grid-cyberattacks-passes-ndaa
2.FacebookÔ¼2.9ÍòÔ±¹¤µÄÈËΪÊý¾Ý±»µÁ
ƾ֤Åí²©ÉçµÄ±¨µÀ£¬ÉϸöÔ·¸·¨·Ö×Ó´ÓFacebookÒ»ÃûÔ±¹¤µÄÆû³µÖÐ͵ÇÔÁ˶à¸öÓ²ÅÌ£¬ÆäÖд洢ÁËÔ¼2.9ÍòÏÖÈκÍǰÈÎFacebook¹ÍÔ±µÄÈËΪÊý¾Ý¡£¸ÃÊÂÎñ±¬·¢ÔÚ11ÔÂ17ÈÕ£¬FacebookÔÚÈýÌìºóÒâʶµ½Êý¾Ýй¶£¬µ«Ö±µ½ÉÏÖÜÎå²Å×îÏÈ֪ͨÊÜÓ°ÏìµÄÔ±¹¤¡£±»µÁµÄÓ²ÅÌûÓмÓÃÜ£¬ÆäÖаüÀ¨µÄÔ±¹¤ÐÅÏ¢°üÀ¨ÒøÐÐÕ˺źÍÉç»áÇå¾²ÂëºóËÄλµÈ¡£¸ÃÊÂÎñûÓÐÓ°ÏìFacebookÓû§µÄÐÅÏ¢¡£³öÓÚÉóÉ÷˼Á¿£¬Facebook½²»°ÈËÌåÏÖ½«ÎªÊÜÓ°ÏìµÄÔ±¹¤ÌṩÃâ·ÑµÄÉí·Ý͵ÇÔºÍÐÅÓÃ¼à¿Ø·þÎñ¡£
ÔÎÄÁ´½Ó£º
https://thehill.com/policy/cybersecurity/474503-payroll-data-of-thousands-of-current-former-facebook-employees-stolen
3.ÄÏ·ÇConor¹«Ë¾Ð¹Â¶100¶àÍòÒÆ¶¯Óû§µÄä¯ÀÀ¼Í¼
vpnMentor·¢Ã÷ÄÏ·ÇICT¹«Ë¾Conor SolutionsµÄÊý¾Ý¿â¿É¹ûÕæ»á¼ûÇÒûÓмÓÃÜ£¬µ¼ÖÂÁè¼Ý100ÍòÒÆ¶¯Óû§µÄ˽ÈËä¯ÀÀÊý¾ÝºÍСÎÒ˽¼Òʶ±ðÐÅϢй¶¡£Êý¾Ý¿âÖаüÀ¨µÄÐÅÏ¢°üÀ¨Ë÷ÒýÃû³Æ¡¢MSISDN£¨ÊÖ»úºÅÂ룩¡¢IPµØµã¡¢ÅþÁ¬»ò»á¼ûÍøÕ¾µÄÒ»Á¬Ê±¼ä¡¢Ã¿¸ö»á»°´«ÊäµÄÊý¾ÝÁ¿¡¢»á¼û¹ýµÄÍøÕ¾µÄÍêÕûURLµÈ¡£ÕâЩÊý¾Ýº¸ÇÁË·ÇÖÞºÍÄÏÃÀ¹ú¼Ò£¨°üÀ¨ÄÏ·Ç£©µÄÖÚ¶àÒÆ¶¯ISP¿Í»§Êý¾Ý£¬Êý¾Ý×ܾÞϸÁè¼Ý890GB£¬¼Í¼ÌõÊýÁè¼ÝÁè¼Ý100ÍòÌõ¡£vpnMentorÓÚ11ÔÂ12ÈÕÊ״η¢Ã÷¸ÃÊý¾Ý¿â£¬²¢ÏòConor±¨¸æÁ˸ÃÎÊÌâ¡£ConorËæºó¹Ø±ÕÁË»á¼ûȨÏÞ£¬µ«Î´ÏòvpnMentorÌṩÉùÃ÷¡£
ÔÎÄÁ´½Ó£º
https://mybroadband.co.za/news/security/332188-private-browsing-history-of-south-african-mobile-users-exposed.html
4.½©Ê¬ÍøÂçMomentum DDoS¹¥»÷Ô˶¯µÄÆÊÎö±¨¸æ
Ç÷ÊÆ¿Æ¼¼Ðû²¼¹ØÓÚ½©Ê¬ÍøÂçMomentumй¥»÷Ô˶¯µÄÆÊÎö±¨¸æ¡£MomentumÖ÷ÒªÕë¶ÔLinux×°±¸£¬¿É¹¥»÷¶àÖÖCPU¼Ü¹¹£¬ÀýÈçARM¡¢MIPS¡¢Ó¢Ìضû¡¢Ä¦ÍÐÂÞÀ68020µÈ¡£¸Ã¶ñÒâÈí¼þµÄÖ÷ҪĿµÄÊǰ²ÅźóÃŲ¢½ÓÊÜÏÂÁîÏò¸ø¶¨Ä¿µÄÌᳫDoS¹¥»÷¡£Momentum·Ö·¢µÄºóÃŰüÀ¨Mirai¡¢KaitenºÍBashlite±äÖÖ¡£Ñо¿Ö°Ô±ÆÊÎöµÄÌØ¶¨Ñù±¾Ö÷Òª·Ö·¢MiraiºóÃÅ¡£±ðµÄ£¬Momentumͨ¹ýʹÓÃÖÖÖÖ·ÓÉÆ÷ºÍWeb·þÎñÉϵÄÎó²îÀ´Èö²¥¡£
ÔÎÄÁ´½Ó£º
https://blog.trendmicro.com/trendlabs-security-intelligence/ddos-attacks-and-iot-exploits-new-activity-from-momentum-botnet/
5.Ê©Ä͵ÂÐÞ¸´Modicon¼°EcoStruxureÖеĶà¸öÎó²î

Ê©ÄÍµÂµçÆøÍ¨Öª¿Í»§³ÆÒѾΪijЩModicon¿ØÖÆÆ÷ºÍ¼¸ÖÖEcoStruxure²úÆ·ÖеÄÎó²îÌṩÁ˲¹¶¡¡£Æ¾Ö¤Ê©Ä͵µÄ˵·¨£¬Modicon M580¡¢M340¡¢QuantumºÍPremium¿ØÖÆÆ÷Êܵ½Èý¸ö¾Ü¾ø·þÎñ£¨DoS£©Îó²î£¨CVE-2019-6857¡¢CVE-2019-6856ºÍCVE-2018-7794£©µÄÓ°Ïì¡£ÕâÈý¸öÎó²î¾ùÊÇÓÉ¡°¶ÔÒì³£ÇéÐεIJ»×¼È·¼ì²é¡±µ¼Öµģ¬¾ßÓÐÍøÂç»á¼ûȨÏ޵Ĺ¥»÷Õß¿ÉÒÔͨ¹ýModbus TCPʹÓÃÕâЩÎó²î¡£±ðµÄ£¬Ê©ÄÍµÂµçÆø»¹ÐÞ¸´ÁËÈý¿îEcoStruxure²úÆ·ÖеÄÇå¾²Îó²î£¬°üÀ¨Power SCADA OperationµçÔ´¼àÊӺͿØÖÆÈí¼þÖеĻº³åÇøÒç³öÎó²î£¨CVE-2019-13537£©¡¢ClearSCADAÖеÄÎļþȨÏÞ²»×¼È·Îó²îºÍEcoStruxure Control Expert±à³ÌÈí¼þÖеÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/schneider-electric-patches-vulnerabilities-modicon-ecostruxure-products
6.TP-LinkÐÞ¸´²¿·ÖArcher·ÓÉÆ÷ÖеÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î
TP-LinkÐÞ¸´²¿·ÖArcher·ÓÉÆ÷ÖеÄÇå¾²Îó²î£¨CVE-2019-7405£©£¬¸ÃÎó²îʹµÃ¹¥»÷Õß¿ÉÒÔÎÞÐèÖÎÀíÔ±ÃÜÂë¼´¿É½ÓÊÜ×°±¸¡£¹¥»÷Õß¿Éͨ¹ý·¢ËÍ×Ö·û´®³¤¶ÈÁè¼ÝÔÊÐíµÄ×Ö½ÚÊýµÄHTTPÇëÇó£¬Ê¹µÃÓû§ÃÜÂë±»Ìæ»»Îª¿ÕÖµ£¬´Ó¶ø»ñµÃ·ÓÉÆ÷µÄadminȨÏÞ¡£¸Ã¹¥»÷»¹»áʹÕýµ±Óû§±»Ëø¶¨£¬²¢ÇÒÎÞ·¨Í¨¹ýÓû§½çÃæµÇ¼Web·þÎñ£¨ÃÜÂë±»Çå¿Õ¶øÓû§²¢²»ÖªÇ飩¡£ÊÜÓ°ÏìµÄ²úÆ·ÐͺŰüÀ¨Archer C5 V4¡¢Archer MR200v4¡¢Archer MR6400v4ºÍArcher MR400v3·ÓÉÆ÷£¬½¨ÒéÓû§¾¡¿ì×°Öò¹¶¡¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/tp-link-router-bug-lets-attackers-login-without-passwords/


¾©¹«Íø°²±¸11010802024551ºÅ