PAN OS±£´æCVSSv3ÆÀ·Ö10µÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¬£¬£¬£¬¿ÉÈÆ¹ý·À»ðǽ £»£»£»£»£»ºÚ¿Íй¶°ÍÎ÷×Üͳ¼°20Íò¹«ÎñԱСÎÒ˽¼ÒÐÅÏ¢

Ðû²¼Ê±¼ä 2020-06-30

1.PAN OS±£´æCVSSv3ÆÀ·Ö10µÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¬£¬£¬£¬¿ÉÈÆ¹ý·À»ðǽ


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Palo Alto NetworksÅû¶ÁËÒ»¸öÖØ´óÎó²î£¨CVE-2020-2021£©£¬£¬£¬£¬¸ÃÎó²î¿ÉʹºÚ¿ÍÈÆ¹ý·À»ðǽºÍÆä¹«Ë¾VPN²úÆ·µÄÉí·ÝÑéÖ¤¡£¡£ ¡£¡£¸ÃÎó²îÊÇÔÚCVSSv3ÑÏÖØÆ·¼¶ÖлñµÃ10·ÖµÄÓÐÊýÎó²îÖ®Ò»£¬£¬£¬£¬¼È²»ÐèÒª¸ß¼¶ÊÖÒÕÊÖÒÕ£¬£¬£¬£¬ÓÖ¿ÉÒÔͨ¹ýInternet¾ÙÐÐÔ¶³ÌʹÓᣡ£ ¡£¡£ºÚ¿Í¿ÉÒÔʹÓøÃÎó²î¸ü¸ÄPAN OSµÄÉèÖú͹¦Ð§£¬£¬£¬£¬À´ÊµÏÖ¹¥»÷¡£¡£ ¡£¡£ÃÀ¹úÍøÂç˾ÁÔòÒªÇóËùÓÐÊÜCVE-2020-2021Ó°ÏìµÄ×°±¸Á¬Ã¦ÐÞ¸´¸ÃÎó²î£¬£¬£¬£¬²¢ÌåÏÖÍâ¹úµÄAPT×éÖ¯¿ÉÄܺܿì¾Í»áʵÑéʹÓøÃÎó²îÌᳫ¹¥»÷¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/us-cyber-command-says-foreign-hackers-will-most-likely-exploit-new-pan-os-security-bug/


2.ºÚ¿Íй¶°ÍÎ÷×Üͳ¼°20Íò¹«ÎñԱСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬¾¯·½ÈÔÔÚÊÓ²ìÖÐ


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


ºÚ¿Í×éÖ¯Anonymous BrazilÉù³Æ£¬£¬£¬£¬°ÍÎ÷×Üͳ²©¶ûË÷ÄÉÂÞºÍËûµÄ¶ù×Ó£¬£¬£¬£¬ÒÔ¼°¶àÃû²¿³¤µÄСÎÒ˽¼ÒÏêϸÐÅÏ¢ÒѾ­Ð¹Â¶£¬£¬£¬£¬Ëæºó°ÍÎ÷Áª°î¾¯Ô±¶Ô´ËÊÂÎñÕö¿ªÁËÊӲ졣¡£ ¡£¡£ÊӲ췢Ã÷£¬£¬£¬£¬³ýÁËÔÚÍøÉÏ×ß©µÄÐÅÏ¢Í⣬£¬£¬£¬¸ÃºÚ¿Í×éÖ¯»¹ÍµÈ¡ÁËÁè¼Ý20ÍòÃûÎäÊ¿ºÍÕþ¸®¹ÙÔ±µÄÊý¾Ý¡£¡£ ¡£¡£ÎªÍµÊØÐÅÏ¢£¬£¬£¬£¬ºÚ¿Í¹¥»÷Á˶à¸öÖݵĴóѧ¡¢ÊÐÕþÌüºÍÊÐÒé»áϵͳ£¬£¬£¬£¬½öÔÚÄÏÀï°Â¸ñÀ¼µÂÖÝ£¬£¬£¬£¬¾ÍÓÐ90¶à¸ö»ú¹¹Ôâµ½¹¥»÷¡£¡£ ¡£¡£ÏÖÔÚ£¬£¬£¬£¬¾¯·½¶Ô´ËÊÂÈÔÔÚÊÓ²ìÖС£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/brazilian-federal-police-investigates-presidential-data-leak/    


3.SnykÐû²¼±¨¸æ£¬£¬£¬£¬¿ªÔ´Èí¼þ°üÖеÄÐÂÎó²î±ÈÈ¥ÄêϽµÁË20£¥


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


SnykÐû²¼±¨¸æÌåÏÖ£¬£¬£¬£¬½ñÄ꿪ԴÈí¼þ°üÖеÄÐÂÎó²îÊýÄ¿±ÈÈ¥ÄêϽµÁË20£¥¡£¡£ ¡£¡£¸Ã±¨¸æ¶ÔÄÇЩӰÏìÁËʹÓÿªÔ´¿â×éÖ¯µÄÕûÌåÇå¾²ÐÔµÄÎó²îºÍ6¸öÖ÷Á÷µÄÉú̬ϵͳ¾ÙÐÐÁËÑо¿¡£¡£ ¡£¡£Ñо¿·¢Ã÷£¬£¬£¬£¬ÔÚ2019Ä꣬£¬£¬£¬ÐÂÎó²îïÔÌ­Á˽ü20£¥ £»£»£»£»£»¿çÕ¾¾ç±¾Îó²îÒÀÈ»ÊÇÊÇ×î³£¼ûµÄÎó²î £»£»£»£»£»³£¼ûLinux¿¯ÐаæÖб¨¸æµÄÐÂÎó²îÅú×¢£¬£¬£¬£¬ÐèÒªÖÜÈ«¼àÊÓÈÝÆ÷Ó³ÏñÖеÄÐÂÎó²î £»£»£»£»£»ÔÚ´ó´ó¶¼Éú̬ϵͳÖУ¬£¬£¬£¬SQL×¢ÈëÎó²îÊýÄ¿ÓÐËù½µµÍ£¬£¬£¬£¬Ê¹ÓÃPHPµÄÎó²îÈ´ÓÐËùÔöÌí¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2020/06/29/vulnerabilities-open-source-packages/


4.¹¥»÷µÂÖÝTxDOTµÄÀÕË÷Èí¼þΪRansom X£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÕþ¸®ºÍÆóÒµ


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


¾­ÊӲ죬£¬£¬£¬¹¥»÷Á˵ÿËÈøË¹ÖÝ·¨ÔººÍµÃ¿ËÈøË¹Öݽ»Í¨ÔËÊ䲿 £¨TxDOT£©µÄÀÕË÷Èí¼þΪRansom X£¬£¬£¬£¬ÆäÖ÷ÒªÕë¶ÔÕþ¸®ºÍÆóÒµ¡£¡£ ¡£¡£Ñо¿Ö°Ô±Í¨¹ý¶ÔRansom XÑù±¾µÄÑо¿£¬£¬£¬£¬·¢Ã÷Æä¿ÉÒÔ½«ÖÕÖ¹ÓëÇå¾²Èí¼þ¡¢Êý¾Ý¿âЧÀÍÆ÷¡¢MSPÈí¼þ¡¢Ô¶³Ì»á¼û¹¤¾ßºÍÓʼþЧÀÍÆ÷ÓйصÄ289¸öÀú³Ì£¬£¬£¬£¬Ëü»¹¿ÉÒÔÈÆ¹ýÖÖÖÖWindowsϵͳÎļþ¼ÐÒÔ¼°Ê¹ÓÃÁ˰üÀ¨.ani¡¢.cabºÍ.cplÔÚÄÚµÄÊýÊ®¸öÀ©Õ¹ÃûµÄËùÓÐÎļþ¡£¡£ ¡£¡£Í¨¹ýÈÆ¹ýÕâЩÎļþ¼Ð£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔ¼ÓÃÜÅÌËã»ú£¬£¬£¬£¬Í¬Ê±Ò²¿ÉÒÔ¹¥»÷ÍøÂçÉÏµÄÆäËûÅÌËã»ú£¬£¬£¬£¬¶ø²»±Øµ£Ðį乤¾ß±»¼ÓÃÜ¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/new-ransom-x-ransomware-used-in-texas-txdot-cyberattack/


5.Ó¥Ñۻع飬£¬£¬£¬APT30ͨ¹ýÂíÀ´Î÷ÑÇÕþ¸®¾Û»áÓʼþ·Ö·¢ÐºóÃÅ


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Ñо¿Ö°Ô±·¢Ã÷APT30µÄºóÃÅÐÂÑù±¾£¬£¬£¬£¬°üÀ¨BACKSPACEºÍNETEAGLEºóÃÅ£¬£¬£¬£¬²¢Í¨¹ýÂíÀ´Î÷ÑÇÕþ¸®¾Û»áÓʼþ¾ÙÐзַ¢¡£¡£ ¡£¡£µÚÒ»¸öºóÃŵĶñÒâÑù±¾±»Ð´ÈëÁËMicrosoft OfficeÄ£°åÎļþ¼Ð£¬£¬£¬£¬²¢ÒÔÂíÀ´Î÷ÑÇÕþ¸®¾Û»áÒé³ÌΪÖ÷Ì⣬£¬£¬£¬Í¨¹ýÓʼþ¾ÙÐзַ¢¡£¡£ ¡£¡£µÚ¶þ¸öºóÃŵÄÑù±¾±»·ÅÔÚÆô¶¯Îļþ¼ÐÏ£¬£¬£¬£¬ÎļþÔÚÏµÍ³ÖØÐÂÆô¶¯ºóÔËÐС£¡£ ¡£¡£³ý´ËÖ®Í⣬£¬£¬£¬Ñо¿Ö°Ô±»¹·¢Ã÷ÁËRHttpCtrlºóÃźÍRCtrlºóÃÅ¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/eagle-eye-is-back-apt30/


6.Õë¶ÔÖ½ÖÊͶƱµÄ¿ÉÀ©Õ¹²àÐŵÀ¹¥»÷¿ÉÇÔȡѡÃñÒþ˽


918²©ÌìÌÃ(ÖйúÓÎ)×îйٷ½ÍøÕ¾


Ñо¿Ö°Ô±·¢Ã÷Õë¶ÔÖ½ÖÊͶƱµÄ¿ÉÀ©Õ¹²àÐŵÀ¹¥»÷£¬£¬£¬£¬¿ÉʹÓÃÆäÇÔȡѡÃñÒþ˽¡£¡£ ¡£¡£Ñо¿Ö°Ô±»ùÓÚArduino¿ª·¢°åºÍÂó¿Ë·ç¹¹½¨ÁËÒ»ÖÖ×°±¸£¬£¬£¬£¬¸Ã×°±¸Äܹ»¸ß¾«¶ÈµØ¶Ôľ×ÀÉϱê¼ÇµÄλÖþÙÐÐÈý½ÇÕÉÁ¿£¬£¬£¬£¬Í¨¹ýÕâÖÖ·½·¨¿ÉÒÔ»ñµÃÑ¡ÃñÔÚѡƱÉÏ×ö³öÑ¡ÔñµÄ±ê¼Ç¡£¡£ ¡£¡£Ö®ºóͨ¹ýÃæ²¿Ê¶±ðÀ´¾ÙÐÐÔö²¹¹¥»÷£¬£¬£¬£¬¼´ÔÚͶƱվÖÐ×°ÖÃÉãÏñ»ú£¬£¬£¬£¬ÒÔ×Ô¶¯¼ì²âÍÑÀëͶƱվµÄÖ°Ô±¡£¡£ ¡£¡£Á¬ÏµÕâÁ½ÖÖÒªÁ죬£¬£¬£¬½«Õë¶ÔÖ½ÖÊͶƱ¾ÙÐÐÍêÈ«×Ô¶¯»¯µÄ¹¥»÷¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://ieeexplore.ieee.org/abstract/document/8806759/