PAN OS±£´æCVSSv3ÆÀ·Ö10µÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¬¿ÉÈÆ¹ý·À»ðǽ £»ºÚ¿Íй¶°ÍÎ÷×Üͳ¼°20Íò¹«ÎñԱСÎÒ˽¼ÒÐÅÏ¢

Ðû²¼Ê±¼ä 2020-06-30

1.PAN OS±£´æCVSSv3ÆÀ·Ö10µÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¬¿ÉÈÆ¹ý·À»ðǽ


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


Palo Alto NetworksÅû¶ÁËÒ»¸öÖØ´óÎó²î£¨CVE-2020-2021£©£¬¸ÃÎó²î¿ÉʹºÚ¿ÍÈÆ¹ý·À»ðǽºÍÆä¹«Ë¾VPN²úÆ·µÄÉí·ÝÑéÖ¤¡£¸ÃÎó²îÊÇÔÚCVSSv3ÑÏÖØÆ·¼¶ÖлñµÃ10·ÖµÄÓÐÊýÎó²îÖ®Ò»£¬¼È²»ÐèÒª¸ß¼¶ÊÖÒÕÊÖÒÕ£¬ÓÖ¿ÉÒÔͨ¹ýInternet¾ÙÐÐÔ¶³ÌʹÓ᣺ڿͿÉÒÔʹÓøÃÎó²î¸ü¸ÄPAN OSµÄÉèÖú͹¦Ð§£¬À´ÊµÏÖ¹¥»÷¡£ÃÀ¹úÍøÂç˾ÁÔòÒªÇóËùÓÐÊÜCVE-2020-2021Ó°ÏìµÄ×°±¸Á¬Ã¦ÐÞ¸´¸ÃÎó²î£¬²¢ÌåÏÖÍâ¹úµÄAPT×éÖ¯¿ÉÄܺܿì¾Í»áʵÑéʹÓøÃÎó²îÌᳫ¹¥»÷¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/us-cyber-command-says-foreign-hackers-will-most-likely-exploit-new-pan-os-security-bug/


2.ºÚ¿Íй¶°ÍÎ÷×Üͳ¼°20Íò¹«ÎñԱСÎÒ˽¼ÒÐÅÏ¢£¬¾¯·½ÈÔÔÚÊÓ²ìÖÐ


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


ºÚ¿Í×éÖ¯Anonymous BrazilÉù³Æ£¬°ÍÎ÷×Üͳ²©¶ûË÷ÄÉÂÞºÍËûµÄ¶ù×Ó£¬ÒÔ¼°¶àÃû²¿³¤µÄСÎÒ˽¼ÒÏêϸÐÅÏ¢ÒѾ­Ð¹Â¶£¬Ëæºó°ÍÎ÷Áª°î¾¯Ô±¶Ô´ËÊÂÎñÕö¿ªÁËÊӲ졣ÊӲ췢Ã÷£¬³ýÁËÔÚÍøÉÏ×ß©µÄÐÅÏ¢Í⣬¸ÃºÚ¿Í×éÖ¯»¹ÍµÈ¡ÁËÁè¼Ý20ÍòÃûÎäÊ¿ºÍÕþ¸®¹ÙÔ±µÄÊý¾Ý¡£ÎªÍµÊØÐÅÏ¢£¬ºÚ¿Í¹¥»÷Á˶à¸öÖݵĴóѧ¡¢ÊÐÕþÌüºÍÊÐÒé»áϵͳ£¬½öÔÚÄÏÀï°Â¸ñÀ¼µÂÖÝ£¬¾ÍÓÐ90¶à¸ö»ú¹¹Ôâµ½¹¥»÷¡£ÏÖÔÚ£¬¾¯·½¶Ô´ËÊÂÈÔÔÚÊÓ²ìÖС£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/brazilian-federal-police-investigates-presidential-data-leak/    


3.SnykÐû²¼±¨¸æ£¬¿ªÔ´Èí¼þ°üÖеÄÐÂÎó²î±ÈÈ¥ÄêϽµÁË20£¥


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


SnykÐû²¼±¨¸æÌåÏÖ£¬½ñÄ꿪ԴÈí¼þ°üÖеÄÐÂÎó²îÊýÄ¿±ÈÈ¥ÄêϽµÁË20£¥¡£¸Ã±¨¸æ¶ÔÄÇЩӰÏìÁËʹÓÿªÔ´¿â×éÖ¯µÄÕûÌåÇå¾²ÐÔµÄÎó²îºÍ6¸öÖ÷Á÷µÄÉú̬ϵͳ¾ÙÐÐÁËÑо¿¡£Ñо¿·¢Ã÷£¬ÔÚ2019Ä꣬ÐÂÎó²îïÔÌ­Á˽ü20£¥ £»¿çÕ¾¾ç±¾Îó²îÒÀÈ»ÊÇÊÇ×î³£¼ûµÄÎó²î £»³£¼ûLinux¿¯ÐаæÖб¨¸æµÄÐÂÎó²îÅú×¢£¬ÐèÒªÖÜÈ«¼àÊÓÈÝÆ÷Ó³ÏñÖеÄÐÂÎó²î £»ÔÚ´ó´ó¶¼Éú̬ϵͳÖУ¬SQL×¢ÈëÎó²îÊýÄ¿ÓÐËù½µµÍ£¬Ê¹ÓÃPHPµÄÎó²îÈ´ÓÐËùÔöÌí¡£


Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2020/06/29/vulnerabilities-open-source-packages/


4.¹¥»÷µÂÖÝTxDOTµÄÀÕË÷Èí¼þΪRansom X£¬Ö÷ÒªÕë¶ÔÕþ¸®ºÍÆóÒµ


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


¾­ÊӲ죬¹¥»÷Á˵ÿËÈøË¹ÖÝ·¨ÔººÍµÃ¿ËÈøË¹Öݽ»Í¨ÔËÊ䲿 £¨TxDOT£©µÄÀÕË÷Èí¼þΪRansom X£¬ÆäÖ÷ÒªÕë¶ÔÕþ¸®ºÍÆóÒµ¡£Ñо¿Ö°Ô±Í¨¹ý¶ÔRansom XÑù±¾µÄÑо¿£¬·¢Ã÷Æä¿ÉÒÔ½«ÖÕÖ¹ÓëÇå¾²Èí¼þ¡¢Êý¾Ý¿â·þÎñÆ÷¡¢MSPÈí¼þ¡¢Ô¶³Ì»á¼û¹¤¾ßºÍÓʼþ·þÎñÆ÷ÓйصÄ289¸öÀú³Ì£¬Ëü»¹¿ÉÒÔÈÆ¹ýÖÖÖÖWindowsϵͳÎļþ¼ÐÒÔ¼°Ê¹ÓÃÁ˰üÀ¨.ani¡¢.cabºÍ.cplÔÚÄÚµÄÊýÊ®¸öÀ©Õ¹ÃûµÄËùÓÐÎļþ¡£Í¨¹ýÈÆ¹ýÕâЩÎļþ¼Ð£¬¹¥»÷Õß¿ÉÒÔ¼ÓÃÜÅÌËã»ú£¬Í¬Ê±Ò²¿ÉÒÔ¹¥»÷ÍøÂçÉÏµÄÆäËûÅÌËã»ú£¬¶ø²»±Øµ£Ðį乤¾ß±»¼ÓÃÜ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/new-ransom-x-ransomware-used-in-texas-txdot-cyberattack/


5.Ó¥Ñۻع飬APT30ͨ¹ýÂíÀ´Î÷ÑÇÕþ¸®¾Û»áÓʼþ·Ö·¢ÐºóÃÅ


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


Ñо¿Ö°Ô±·¢Ã÷APT30µÄºóÃÅÐÂÑù±¾£¬°üÀ¨BACKSPACEºÍNETEAGLEºóÃÅ£¬²¢Í¨¹ýÂíÀ´Î÷ÑÇÕþ¸®¾Û»áÓʼþ¾ÙÐзַ¢¡£µÚÒ»¸öºóÃŵĶñÒâÑù±¾±»Ð´ÈëÁËMicrosoft OfficeÄ£°åÎļþ¼Ð£¬²¢ÒÔÂíÀ´Î÷ÑÇÕþ¸®¾Û»áÒé³ÌΪÖ÷Ì⣬ͨ¹ýÓʼþ¾ÙÐзַ¢¡£µÚ¶þ¸öºóÃŵÄÑù±¾±»·ÅÔÚÆô¶¯Îļþ¼ÐÏ£¬ÎļþÔÚÏµÍ³ÖØÐÂÆô¶¯ºóÔËÐС£³ý´ËÖ®Í⣬Ñо¿Ö°Ô±»¹·¢Ã÷ÁËRHttpCtrlºóÃźÍRCtrlºóÃÅ¡£


Ô­ÎÄÁ´½Ó£º

https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/eagle-eye-is-back-apt30/


6.Õë¶ÔÖ½ÖÊͶƱµÄ¿ÉÀ©Õ¹²àÐŵÀ¹¥»÷¿ÉÇÔȡѡÃñÒþ˽


×ðÁú¿­Ê±¡¤(ÖйúÇø)ÈËÉú¾ÍÊDz«!


Ñо¿Ö°Ô±·¢Ã÷Õë¶ÔÖ½ÖÊͶƱµÄ¿ÉÀ©Õ¹²àÐŵÀ¹¥»÷£¬¿ÉʹÓÃÆäÇÔȡѡÃñÒþ˽¡£Ñо¿Ö°Ô±»ùÓÚArduino¿ª·¢°åºÍÂó¿Ë·ç¹¹½¨ÁËÒ»ÖÖ×°±¸£¬¸Ã×°±¸Äܹ»¸ß¾«¶ÈµØ¶Ôľ×ÀÉϱê¼ÇµÄλÖþÙÐÐÈý½ÇÕÉÁ¿£¬Í¨¹ýÕâÖÖ·½·¨¿ÉÒÔ»ñµÃÑ¡ÃñÔÚѡƱÉÏ×ö³öÑ¡ÔñµÄ±ê¼Ç¡£Ö®ºóͨ¹ýÃæ²¿Ê¶±ðÀ´¾ÙÐÐÔö²¹¹¥»÷£¬¼´ÔÚͶƱվÖÐ×°ÖÃÉãÏñ»ú£¬ÒÔ×Ô¶¯¼ì²âÍÑÀëͶƱվµÄÖ°Ô±¡£ÍŽáÕâÁ½ÖÖÒªÁ죬½«Õë¶ÔÖ½ÖÊͶƱ¾ÙÐÐÍêÈ«×Ô¶¯»¯µÄ¹¥»÷¡£


Ô­ÎÄÁ´½Ó£º

https://ieeexplore.ieee.org/abstract/document/8806759/