ACSCÐû²¼CMSϵͳÇå¾²Ö¸ÄÏ£»NetgearÐÞ¸´Æä·ÓÉÆ÷²úÆ·ÖеĶà¸öÎó²î
Ðû²¼Ê±¼ä 2020-03-061.°Ä´óÀûÑÇACSCÐû²¼CMSϵͳÇå¾²Ö¸ÄÏ
°Ä´óÀûÑÇÍøÂçÇå¾²ÖÐÐÄ£¨ACSC£©Ðû²¼Ò»·ÝÓÃÓÚ±£»¤CMSϵͳµÄÍøÂçÇå¾²Ö¸ÄÏ£¬¸ÃÖ¸ÄϸÅÊöÁËÔõÑùÔÚweb·þÎñÆ÷ÉÏʶ±ðºÍ×îС»¯Ç±ÔÚΣº¦µÄÕ½ÂÔ£¬ÆäÄ¿µÄÊÜÖÚÊÇÈÏÕæÊ¹ÓÃCMS¿ª·¢ºÍ±£»¤ÍøÕ¾»òWebÓ¦ÓóÌÐòµÄÈË¡£¹¥»÷Õß¿ÉÒÔʹÓÃ×Ô¶¯»¯¹¤¾ßɨÃèInternetÉϵÄÇå¾²Îó²î¡£Ò»µ©CMS±»ÈëÇÖ£¬¹¥»÷Õß¿ÉÒÔʹÓÃÆäȨÏÞÀ´£º»ñµÃWebÓ¦ÓóÌÐòµÄÑéÖ¤ÇøÓòºÍÌØÈ¨ÇøÓòµÄ»á¼ûȨÏÞ£»ÉÏ´«¶ñÒâÈí¼þÀ´»ñµÃÔ¶³Ì»á¼û£¬ÀýÈçÉÏ´«Web Shell»òRAT£»ÔÚÕýµ±ÍøÒ³ÉÏ×¢Èë¶ñÒâÄÚÈÝ¡£¹¥»÷Õß»¹¿ÉÒÔ½«ÊÜѬȾµÄWeb·þÎñÆ÷ÓÃ×÷¡°Ë®¿Ó¡±¹¥»÷µÄÒ»²¿·Ö£¬»òÓÃ×÷C&CµÄ»ù´¡ÉèÊ©¡£ACSC½¨Òé½ÓÄɵĻº½â²½·¥°üÀ¨£ºÊ¹ÓÃCMSÍйܷþÎñ£»ÓÅÒìµÄ²¹¶¡ÖÎÀí£»Îó²îÆÀ¹À£»ÕË»§ÖÎÀí£»ÔöÇ¿CMS×°ÖõÄÇå¾²ÐÔ¿ØÖƲ½·¥£»¼à¿ØCMS×°ÖÃÉ϶ÔÍйÜÄÚÈݵÄδÊÚȨ¸ü¸ÄµÈ¡£
ÔÎÄÁ´½Ó£º
https://www.cyber.gov.au/publications/securing-content-management-systems
2.Ñо¿Ö°Ô±ÖÒÑÔ΢ÈíÓÐ600¶à¸ö×ÓÓòÒ×ÔâÐ®ÖÆ
Ñо¿Ö°Ô±ÖÒÑÔ³ÆÎ¢ÈíÓÐ600¶à¸öÕýµ±µÄ×ÓÓòÃûÒ×ÔâÐ®ÖÆºÍÀÄÓá£×ÓÓòÃûÐ®ÖÆÊÇÖ¸¸Ã×ÓÓòµÄDNS¼Í¼ָÏò²»ÔÙ±£´æµÄÓòÃû£¬¶ø½¨Éè¸Ã²»±£´æÓòÃûµÄ¹¥»÷Õß¼´¿ÉʹÓùýʧÉèÖõÄDNS¼ÍÂ¼Ð®ÖÆ¸Ã×ÓÓò¡£¹¥»÷Õß¿ÉÒÔ½«±»Ð®ÖÆ×ÓÓòµÄ»á¼ûÕßµ¼Ïò´¹ÂÚÍøÕ¾¡¢·Ö·¢¶ñÒâÈí¼þ»ò¾ÙÐÐڲƹ¥»÷¡£Çå¾²¹«Ë¾VullnerabilityɨÃèÁË΢Èí²¿·ÖÖ÷ÒªÓòÃûµÄËùÓÐ×ÓÓòÃû£¬·¢Ã÷ÓÐ670¶à¸ö×ÓÓòÒ×Ôâ¹¥»÷£¬°üÀ¨identityhelp.microsoft.com£¬mybrowser.microsoft.com£¬webeditor.visualstudio.com£¬data.teams.microsoft.comºÍsxt.cdn.skype.comµÈ¡£Î¢Èí½²»°ÈËÌåÏÖÒѾÏàʶÁ˸ñ¨¸æ£¬²¢ÕýÔÚÆ¾Ö¤ÐèÒª½ÓÄÉÊʵ±µÄ²½·¥À´±£»¤Î¢ÈíµÄ·þÎñºÍ¿Í»§¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/over-600-microsoft-subdomains-can-be-hijacked-researchers
3.NetgearÐÞ¸´Æä·ÓÉÆ÷²úÆ·ÖеĶà¸öÎó²î
NetgearÐÞ¸´ÆäÎÞÏßAC·ÓÉÆ÷Nighthawk£¨R7800£©ÖеÄÒ»¸öRCEÎó²î£¬¸ÃÎó²î±»Netgear×·×ÙΪPSV-2019-0076£¬¿ÉÔÊÐíδ¾Éí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ØÖÆÂ·ÓÉÆ÷£¬ÊÜÓ°ÏìµÄ°æ±¾Îª1.0.2.68֮ǰµÄ¹Ì¼þ°æ±¾¡£Netgear²¢Î´Åû¶Óë¸ÃÎó²îÓйصÄÏêϸÐÅÏ¢£¬½ö±Þ²ß¿Í»§»á¼ûÔÚÏßÖ§³ÖÒ³ÃæÒÔÏÂÔØ¸ÃÎó²îµÄ²¹¶¡¡£R7800·ÓÉÆ÷»¹Êܵ½ÑéÖ¤ºóÏÂÁî×¢ÈëÎó²î£¨¸ú×ÙΪPSV-2018-0352£©µÄÓ°Ï죬ÊÜÓ°ÏìµÄ¹Ì¼þ°æ±¾Îª1.0.2.60֮ǰµÄ°æ±¾¡£¸ÃÎó²î»¹Ó°ÏìÁËD6000¡¢R6000¡¢R7000¡¢R8000¡¢R9000ºÍXR500ϵÁÐµÄÆäËü29¸öÐͺŵÄ·ÓÉÆ÷¡£±ðµÄ£¬ÁíÒ»¸öÏÂÁî×¢ÈëÎó²î£¨PSV-2019-0051£©Ó°ÏìÁËR6400¡¢R6700¡¢R6900ºÍR7900 SKUÖеÄ5¸öÐͺŵÄ·ÓÉÆ÷¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/critical-netgear-bug-impacts-nighthawk-router/153445/
4.˼¿ÆÐÞ¸´Webex PlayerÖеÄÁ½¸öRCEÎó²î
˼¿ÆÐû²¼²úÆ·Çå¾²¸üУ¬ÐÞ¸´¶à¸öÎó²î£¬ÆäÖаüÀ¨Webex PlayerÖеÄÁ½¸öRCEÎó²î£¨CVE-2020-3127ºÍCVE-2020-3128£©¡£ÕâÁ½¸öÎó²îÊÇÓÉÓÚδ¶Ô´æ´¢ÎªARF£¨¸ß¼¶¼Í¼ÃûÌã©»òWRF£¨Webex¼Í¼ÃûÌ㩵ÄWebex¼Í¼ÖеÄÔªËØ¾ÙÐгä·ÖÑéÖ¤¶øµ¼Öµģ¬¹¥»÷Õß¿ÉÒÔͨ¹ýÁ´½Ó»òµç×ÓÓʼþ¸½¼þÏòÓû§·¢ËͶñÒâµÄARF»òWRFÎļþ£¬ÓÕʹÓû§·¿ª¸ÃÎļþ²¢ÒÔÄ¿½ñÓû§È¨ÏÞÖ´ÐÐí§Òâ´úÂë¡£ÊÜÓ°ÏìµÄ²úÆ·°üÀ¨WebEx Network Recording PlayerºÍWebex Player¡£±ðµÄ£¬Ë¼¿Æ»¹ÐÞ¸´ÁËIntelligent ProximityÖеÄSSLÖ¤Êéȱ·¦ÑéÖ¤Îó²î£¨CVE-2020-3155£©ºÍPrime Network RegistrarÖеĿçÕ¾µãÇëÇóαÔìÎó²î£¨CVE-2020-3148£©¡£ÍêÕûÎó²îÁбíÇë²Î¿¼ÒÔÏÂÁ´½Ó¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/98973/security/cisco-rce-webex-player.html
5.´ò°çÁãÊÛÉÌJ.CrewÔâײ¿â¹¥»÷£¬¿Í»§ÐÅϢй¶
ÃÀ¹ú´ò°çÁãÊÛÉÌJ.CrewÐû²¼ÔÚ2019Äê4ÔÂǰºóÔ⵽ײ¿â¹¥»÷£¬¸Ã¹¥»÷µ¼ÖÂÆä²¿·Ö¿Í»§µÄÕÊ»§ºÍÐÅÏ¢±»ºÚ¿Í»á¼û¡£¿ÉÄÜй¶µÄÐÅÏ¢°üÀ¨¿Í»§ÕË»§Öд洢µÄÐÅÓÿ¨ºÅºóËÄλÊý×Ö¡¢µ½ÆÚÈÕÆÚ¡¢¿¨ÀàÐͺÍÏà¹ØÕ˵¥Óʼĵص㡢¶©µ¥ºÅ¡¢¿ìµÝÈ·Èϵ¥ºÅºÍ·¢»õ״̬¡£J.CrewÒѽûÓÃÁËËùÓÐÊÜÓ°Ïì¿Í»§µÄÕÊ»§£¬²¢ÒªÇóËûÃÇͨ¹ýprivacy@jcrew.com»ò800-205-7956ÓëJ.Crew¿Í»§·þÎñÖÐÐÄÁªÏµºÍÖØÖÃÆäÃÜÂë¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/jcrew-disables-user-accounts-after-credential-stuffing-attack/
6.ÓÐÏßµçÊÓÔËÓªÉÌVirgin Media 90Íò¿Í»§ÐÅϢй¶
Virgin MediaÊÇÓ¢¹úºÍ°®¶ûÀ¼µÄÓÐÏßµçÊÓÔËÓªÉÌ£¬¸Ã¹«Ë¾ÔÚ2020Äê2ÔÂ28ÈÕ·¢Ã÷ÆäÊý¾Ý¿âÖÁÉÙ´Ó2019Äê4ÔÂ19ÈÕÆð¿É¹ûÕæ»á¼û¡£¸ÃÊý¾Ý¿â°üÀ¨Ô¼Äª90ÍòÈ˵ÄÁªÏµ·½·¨£¬ÀýÈçÐÕÃû¡¢¼ÒÍ¥µØµãºÍµç×ÓÓʼþµØµã¡¢µç»°ºÅÂ룬µ«²»°üÀ¨ÈκÎÃÜÂë»ò²ÆÎñÐÅÏ¢£¬ÀýÈçÐÅÓÿ¨ºÅÂë»òÒøÐÐÕË»§¡£Æ¾Ö¤ÕýÔÚ¾ÙÐеÄÊӲ죬¸ÃÊý¾Ý¿âÖÁÉÙÔÚ½üÆÚÔâµ½Ò»´ÎδÊÚȨ»á¼û£¬Virgin Media²¢²»ÇåÎúÆä»á¼ûµÄ¹æÄ£ÒÔ¼°ÊÇ·ñÏÖʵʹÓÃÁËÊý¾Ý¿âÖеÄÈκÎÐÅÏ¢¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/virgin-media-data-breach-exposes-info-of-900-000-customers/


¾©¹«Íø°²±¸11010802024551ºÅ