ÐÅÏ¢Çå¾²Öܱ¨-2020ÄêµÚ33ÖÜ
Ðû²¼Ê±¼ä 2020-08-17> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
2020Äê08ÔÂ10ÈÕÖÁ08ÔÂ16ÈÕ¹²ÊÕ¼Çå¾²Îó²î77¸ö£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇApache Struts CVE-2019-0230´úÂëÖ´ÐÐÎó²î£»£»£»£»£»Citrix Systems XenMobile Server CVE-2020-8211δÃ÷í§Òâ´úÂëÖ´ÐÐÎó²î£»£»£»£»£»Schneider Electric APC Easy UPS On-Line `FileUploadServlet`·¾¶±éÀúÎó²î£»£»£»£»£»SAP Business Objects Business Intelligence Platform XvfbÑéÖ¤ÈÆ¹ýÎó²î; Shenzhen Hichip Vision Technology Firmware P2PЧÀÍ´úÂëÖ´ÐÐÎó²î¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇFBIÖÒÑÔÒÁÀʺڿÍʹÓÃF5 BIG-IPÎó²î¹¥»÷ADC×°±¸£»£»£»£»£»Check Point·¢Ã÷¸ßͨµÄSnapdragonоƬ±£´æ400¶à¸öÎó²î£»£»£»£»£»Nusenu·¢Ã÷δ֪×éÖ¯Ð®ÖÆTor½üËÄ·ÖÖ®Ò»µÄ³ö¿Ú½Úµã£»£»£»£»£»AdobeÐû²¼Çå¾²¸üУ¬£¬£¬£¬ÐÞ¸´¶à¿î²úÆ·ÖеÄ26¸öÎó²î£»£»£»£»£»FBIºÍNSAÁªºÏÅû¶¶íÂÞ˹Õë¶ÔLinuxµÄ¶ñÒâÈí¼þDrovorub¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£
> Ö÷ÒªÇå¾²Îó²îÁбí
1. Apache Struts CVE-2019-0230´úÂëÖ´ÐÐÎó²î
Apache Struts¿ò¼ÜÔÚ±»Ç¿ÖÆÊ¹ÓÃʱ£¬£¬£¬£¬»á¶Ô±êÇ©µÄÊôÐÔ¾ÙÐжþ´ÎÇóÖµÎó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬¿ÉÖ´ÐÐí§Òâ´úÂë¡£¡£Ö»ÓÐÔÚStruts±êÇ©ÊôÐÔÖÐÇ¿ÖÆÊ¹ÓÃOGNL±í´ïʽʱ£¬£¬£¬£¬²Å»ª´¥·¢Îó²î¡£¡£
https://cwiki.apache.org/confluence/display/ww/s2-059
2. Citrix Systems XenMobile Server CVE-2020-8211δÃ÷í§Òâ´úÂëÖ´ÐÐÎó²î
Citrix Systems XenMobile Server±£´æÎ´Ã÷Çå¾²Îó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£
https://www.auscert.org.au/bulletins/ESB-2020.2780/
3. Schneider Electric APC Easy UPS On-Line `FileUploadServlet`·¾¶±éÀúÎó²î
Schneider Electric APC Easy UPS On-Line `FileUploadServlet`±£´æÄ¿Â¼±éÀúÎó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬¿ÉÉÏ´«í§ÒâÎļþµ½í§ÒâĿ¼¡£¡£
https://us-cert.cisa.gov/ics/advisories/icsa-20-224-02
4. SAP Business Objects Business Intelligence Platform XvfbÑéÖ¤ÈÆ¹ýÎó²î
SAP Business Objects Business Intelligence Platform Xvfb±£´æÑéÖ¤ÈÆ¹ýÎó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬¿ÉδÊÚȨ»á¼ûÓ¦Óᣡ£
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552603345
5. Shenzhen Hichip Vision Technology Firmware P2PЧÀÍ´úÂëÖ´ÐÐÎó²î
Shenzhen Hichip Vision Technology Firmware P2PЧÀͱ£´æÇå¾²Îó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£
https://redprocyon.com
> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢FBIÖÒÑÔÒÁÀʺڿÍʹÓÃF5 BIG-IPÎó²î¹¥»÷ADC×°±¸
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/fbi-iranian-hackers-trying-to-exploit-critical-f5-big-ip-flaw/
2¡¢Check Point·¢Ã÷¸ßͨµÄSnapdragonоƬ±£´æ400¶à¸öÎó²î
ÔÎÄÁ´½Ó£º
https://www.hackread.com/chip-flaws-turn-android-phones-into-spying-tool/
3¡¢Nusenu·¢Ã÷δ֪×éÖ¯Ð®ÖÆTor½üËÄ·ÖÖ®Ò»µÄ³ö¿Ú½Úµã
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/a-mysterious-group-has-hijacked-tor-exit-nodes-to-perform-ssl-stripping-attacks/
4¡¢AdobeÐû²¼Çå¾²¸üУ¬£¬£¬£¬ÐÞ¸´¶à¿î²úÆ·ÖеÄ26¸öÎó²î
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/adobe-fixes-critical-code-execution-bugs-in-acrobat-and-reader/
5¡¢FBIºÍNSAÁªºÏÅû¶¶íÂÞ˹Õë¶ÔLinuxµÄ¶ñÒâÈí¼þDrovorub
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/fbi-and-nsa-expose-new-linux-malware-drovorub-used-by-russian-state-hackers/