˼¿ÆÐÞ¸´·¢Ã÷ÐÒ飨CDP£©ÖÐÎå¸ö¸ßΣÎó²î£¬Ó°ÏìÊý°ÙÍò×°±¸£»Ñо¿Ö°Ô±Åû¶º£Ë¼Ð¾Æ¬ÖÐÉÐδÐÞ¸´µÄºóÃÅÎó²î¼°PoC
Ðû²¼Ê±¼ä 2020-02-071.˼¿ÆÐÞ¸´·¢Ã÷ÐÒ飨CDP£©ÖÐÎå¸ö¸ßΣÎó²î£¬Ó°ÏìÊý°ÙÍò×°±¸

ÎïÁªÍøÇå¾²¹«Ë¾ArmisÔÚ˼¿Æ·¢Ã÷ÐÒ飨CDP£©Öз¢Ã÷Îå¸ö¸ßΣÎó²î£¬Ó°ÏìÊý°ÙÍò×°±¸¡£CDPÊÇ˼¿Æ×°±¸Ê¹ÓõÄרÓеÚ2²ã£¨Êý¾ÝÁ´Â·²ã£©ÐÒ飬ÓÃÓÚ·¢Ã÷ÍâµØÍøÂçÉÏµÄÆäËü˼¿Æ×°±¸¡£Ä¬ÈÏÇéÐÎÏ£¬ÏÕЩËùÓÐ˼¿Æ²úÆ·£¨°üÀ¨Â·ÓÉÆ÷¡¢½»Á÷»úÒÔ¼°IPµç»°ºÍÉãÏñ»ú£©¾ùÆôÓôËÐÒé¡£ÕâÎå¸öÎó²î±»³ÆÎªCDPwn£¬°üÀ¨ËĸöÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2020-3110¡¢CVE-2020-3111¡¢CVE-2020-3118¡¢CVE-2020-3119£©ºÍÒ»¸ö¾Ü¾ø·þÎñÎó²î£¨CVE-2020-3120£©¡£ÒÑÍùÊ®ÄêÖÐÐû²¼µÄ˼¿Æ¹Ì¼þ°æ±¾¾ùÊܵ½ÕâЩÎó²îµÄÓ°Ï죬ÕâЩÎó²î¿ÉÄÜÊ¹ÉøÍ¸µ½ÆóÒµÍøÂçÖеÄÍâµØ¹¥»÷ÕßÄܹ»Ö´ÐÐÖÐÐÄÈ˹¥»÷¡¢¼àÊÓÓïÒô»òÊÓÆµºô½Ð¡¢ÍøÂçºÍ×ß©Êý¾ÝÒÔ¼°ÆÆËðÍøÂç·Ö¶Î¡£ÏÖÔÚ˼¿ÆÒѾÐû²¼ÁËÏà¹Ø²úÆ·µÄ¹Ì¼þ¸üÐÂÀ´ÐÞ¸´ÕâЩÎó²î¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/cisco-patches-critical-cdp-flaws-affecting-millions-of-devices/
2.Ñо¿Ö°Ô±Åû¶º£Ë¼Ð¾Æ¬ÖÐÉÐδÐÞ¸´µÄºóÃÅÎó²î¼°PoC
¶íÂÞ˹Ç徲ר¼ÒVladislav YarmakÐû²¼ÁËËûÔÚº£Ë¼Ð¾Æ¬Öз¢Ã÷µÄºóÃÅ»úÖÆµÄÊÖÒÕϸ½Ú£¬²¢ÌåÏÖÓÉÓÚ¶Ô¹©Ó¦ÉÌȱ·¦ÐÅÍУ¬ËûûÓÐÏòº£Ë¼Åû¶¸ÃÎó²î¡£¸ÃºóÃÅ»úÖÆ¿ÉÒÔʹ¹¥»÷Õß»ñµÃroot shell»á¼ûȨÏÞ²¢ÍêÈ«¿ØÖÆ×°±¸£¬ÏêϸÀ´Ëµ£¬¹¥»÷Õß¿ÉÄÜʹÓà ºóÃÅͨ¹ýÔÚTCP¶Ë¿Ú9530ÉÏÏò»ùÓÚº£Ë¼Ð¾Æ¬µÄ×°±¸·¢ËÍһϵÁÐÏÂÁÕâЩÏÂÁîÔÊÐí¹¥»÷ÕßÔÚ×°±¸ÉÏÆôÓÃTelnet·þÎñ£¬È»ºó¹¥»÷Õß¿ÉÒÔʹÓÃÁù¸öTelnetƾ֤֮һµÇ¼£¬²¢»ñµÃ¶ÔrootÕÊ»§µÄ»á¼ûȨÏÞ¡£Yarmak»¹ÔÚgithubÉÏÐû²¼Á˸ÃÎó²îµÄPoC´úÂë¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/97367/hacking/hisilicon-chips-backdoor.html
3.Ñо¿Ö°Ô±·¢Ã÷ÃÀ¹ú¹ú·À²¿£¨DOD£©ÍøÕ¾ÔËÐÐÃÅÂÞ±ÒÍÚ¿ó·þÎñ
Çå¾²Ñо¿Ö°Ô±ÉϸöÔ·¢Ã÷ÃÀ¹ú¹ú·À²¿£¨DOD£©ÔËÓªµÄWeb·þÎñÆ÷ÖÐѬȾÁ˼ÓÃÜÇ®±ÒÍÚ¿ó½©Ê¬ÍøÂç¡£Ó¡¶ÈÇå¾²Ñо¿Ô±Nitesh Suranaͨ¹ý¹ú·À²¿µÄ¹Ù·½Îó²îÉͽðÍýÏë·¢Ã÷²¢±¨¸æÁË´ËÎÊÌâ¡£×î³õ£¬Îó²î±¨¸æÊÇÕë¶ÔÓëDODÓò¹ØÁªµÄAWS·þÎñÆ÷ÉÏÔËÐеÄÉèÖùýʧµÄJenkins×Ô¶¯»¯·þÎñÆ÷Ìá½»µÄ£¬Surana·¢Ã÷ÈκÎÈ˶¼¿ÉÒÔÔÚûÓеǼƾ֤µÄÇéÐÎÏ»á¼ûJenkins·þÎñÆ÷¡£ØÊºóSuranaÒâʶµ½¸ÃJenkins·þÎñÆ÷ÔÚËû·¢Ã÷֮ǰÒѾѬȾÁËÃÅÂÞ±ÒÍÚ¿ó½©Ê¬ÍøÂ硣ʹÓÃXMRHunter·þÎñ£¬Ñо¿Ö°Ô±·¢Ã÷½©Ê¬ÍøÂçµÄÃÅÂޱҵصãÄ¿½ñ³ÖÓÐ35.4¸öÃÅÂÞ±Ò£¬¼ÛÖµÂÔ¸ßÓÚ2700ÃÀÔª£¬µ«Õâ²¢²»¿É׼ȷԤ¼Æ¸Ã½©Ê¬ÍøÂçµÄÔËÐÐÇéÐΡ£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/bug-hunter-finds-cryptocurrency-mining-botnet-on-dod-network/
4.ÂíË¹ÌØÀïºÕÌØ´óѧÏòÀÕË÷Èí¼þ¹¥»÷ÕßÖ§¸¶30±ÈÌØ±ÒÊê½ð
ÂíË¹ÌØÀïºÕÌØ´óѧÌåÏÖÔÚÔâµ½ÀÕË÷Èí¼þ¹¥»÷ºó£¬ËüÖ§¸¶ÁË30±ÈÌØ±ÒµÄÊê½ðÒÔ»Ö¸´ÆäÅÌËã»úϵͳ¡£¸Ã´óѧ¸±Ð£³¤Äá¿Ë¡¤²©Ë¹£¨Nick Bos£©ÔÚÐÂÎÅÐû²¼»áÉÏ·ÖÏíÁËÕâÒ»Êý×Ö¡£BosÖ¸³ö£¬¸ÃÊÂÎñʼÓÚ2019Äê11Ô£¬´¹ÂÚ¹¥»÷ÕßÈëÇÖÁËÒ»Ãû´óѧԱ¹¤µÄµç×ÓÓʼþÕÊ»§£¬È»ºóÔÚ12ÔÂ24ÈÕͨ¹ýÀÕË÷Èí¼þÑ¬È¾Ëø¶¨ÁË´óѧµÄÅÌËã»úϵͳ£¬µ¼ÖÂÔ±¹¤ÎÞ·¨»á¼ûÆäµç×ÓÓʼþ»òÊÂÇéÕ¾¡£Æ¾Ö¤Êý×ÖÇå¾²¹«Ë¾Fox-ITµÄÊӲ죬¸Ã¹¥»÷ÊÂÎñÓë·¸·¨ÍÅ»ïTA505Óйء£
ÔÎÄÁ´½Ó£º
https://www.tripwire.com/state-of-security/security-data-protection/university-of-maastricht-paid-30-bitcoins-to-ransomware-attackers/
5.ÈÕ±¾¹ú·À³Ð°üÉÌPascoºÍKobelco»®·ÖÅû¶ºÚ¿ÍÈëÇÖÊÂÎñ
ÈÕ±¾¹ú·À³Ð°üÉÌPasco Corporation£¨Pasco£©ºÍKobe Steel£¨Kobelco£©»®·ÖÅû¶ÁË2018Äê5ÔºÍ2015Äê6ÔÂ/2016Äê8Ô±¬·¢µÄºÚ¿ÍÈëÇÖÊÂÎñ¡£KobelcoÊÇÈÕ±¾×ÔÎÀ¶Ó£¨SDF£©Ç±Í§Áã¼þµÄ×ÅÃû¹©Ó¦ÉÌ£¬¶øPascoÊÇÎÀÐÇÊý¾ÝµÄÌṩÉÌ£¬¶þÕß»¹È·ÈÏÁËÁ½´ÎÊÂÎñʱ´úÆäÄÚ²¿ÍøÂç¾ùÔ⵽δÊÚȨ»á¼ûÒÔ¼°ÔÚ¹¥»÷ºóÆäÅÌËã»úϵͳÔâµ½¶ñÒâÈí¼þѬȾ¡£Æ¾Ö¤Pasco½ÒÏþµÄ¹Ù·½ÉùÃ÷£¬µ½ÏÖÔÚΪֹÊÓ²ìÖÐûÓз¢Ã÷ÖîÈçÐÅÏ¢×ß©֮ÀàµÄË𺦡£µ«Ö»¹ÜKobelcoµÄ¹Ù·½ÉùÃ÷ûÓÐÌá¼°£¬¡¶ÈÕ¾ÐÂÎÅ¡· ±¨µÀ¸Ã¹«Ë¾µÄ250¸ö°üÀ¨Óë¹ú·À²¿ºÍСÎÒ˽¼ÒÐÅÏ¢ÓйصÄÊý¾ÝÎļþÔâµ½Ë𺦡£Á½¼Ò¹«Ë¾ÊÇ2016ÄêÖÁ2019Äêʱ´úÈÕ±¾±»ºÚ¿ÍÈëÇÖµÄËļÒÓë¹ú·ÀÓйصĹ«Ë¾ÖеÄ×îºóÁ½¼Ò£¬ÁíÍâÁ½¼ÒÊÇÈýÁâµç»úºÍNEC£¬ËüÃÇ»®·ÖÔÚ1ÔÂ20ÈÕºÍ1ÔÂ30ÈÕÐû²¼µÄÉùÃ÷ÖÐ֤ʵÆäϵͳÔâµ½ÈëÇÖ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/japanese-defense-contractors-kobe-steel-pasco-disclose-breaches/
6.¶íÀÕ¸ÔÖÝÒ½Áƹ©Ó¦ÉÌHealth Shareй¶65.4Íò»¼ÕßÐÅÏ¢
¶íÀÕ¸ÔÖÝÒ½ÁƽòÌùе÷×éÖ¯£¨CCO£©µÄHealth ShareÅû¶һÏîÊý¾Ýй¶ÊÂÎñ£¬ÔÚÔËÊ乩ӦÉÌGridWorks ICµÄÌõ¼Ç±¾µçÄÔ±»µÁºó¹²ÓÐ654362Ãû»¼ÕßµÄÐÅϢй¶¡£¸ÃÊÂÎñ±¬·¢ÔÚ2019Äê11ÔÂ18ÈÕ£¬±»µÁµÄÌõ¼Ç±¾µçÄÔ°üÀ¨¼¸ÖÖÀàÐ͵ϼÕßÐÅÏ¢£¬°üÀ¨ÐÕÃû¡¢µØµã¡¢µç»°ºÅÂë¡¢³öÉúÈÕÆÚ¡¢Éç»á°ü¹ÜºÅºÍÒ½ÁƽòÌùIDºÅ¡£Æ¾Ö¤Health ShareµÄÉùÃ÷£¬¸ÃÊÂÎñ²¢Î´Ì»Â¶»¼ÕßµÄÒ½ÁÆÀúÊ·¼Í¼¡£Health Share½«ÎªÊÜÓ°ÏìµÄ»¼ÕßÌṩ1ÄêµÄÃâ·ÑÉí·Ý¼à¿Ø·þÎñ£¬°üÀ¨ÐÅÓÃ¼à¿Ø¡¢Ú²Æ×ÉѯºÍÉí·Ý͵ÇÔ»Ö¸´¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/medicaid-cco-vendor-breach-exposes-health-personal-info-of-654k/


¾©¹«Íø°²±¸11010802024551ºÅ