¡¶Î¬ËûÃü¡·ÖðÈÕÇå¾²¼òѶ20181220
Ðû²¼Ê±¼ä 2018-12-20
KibanaÊÇElasticsearchµÄÊý¾Ý¿ÉÊÓ»¯¹¤¾ß£¬£¬£¬£¬ÆäConsole²å¼þ±£´æÍâµØÎļþ°üÀ¨£¨LFI£©Îó²î£¬£¬£¬£¬Ñо¿Ö°Ô±Ðû²¼Á˸ÃÎó²îµÄPoC´úÂë¡£¡£¡£¸ÃÎó²î£¨CVE-2018-17246£©Ó°ÏìÁË6.4.3ºÍ5.6.13֮ǰµÄKibana°æ±¾£¬£¬£¬£¬ÀÖ³ÉʹÓøÃÎó²î¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐС£¡£¡£ElasticÒÑÔÚ×îа汾µÄKibanaÖÐÐÞ¸´Á˸ÃÎó²î£¬£¬£¬£¬ÈôÊÇÓû§ÔÝʱÎÞ·¨¸üУ¬£¬£¬£¬Ò²¿ÉÒÔÔÚÉèÖÃÎļþÖнûÓøÃConsole²å¼þÀ´¹æ±ÜÕâÒ»ÎÊÌâ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/file-inclusion-bug-in-kibana-console-for-elasticsearch-gets-exploit-code/2¡¢»ªË¶ºÍ¼¼¼ÎÇý¶¯³ÌÐò±£´æ¶à¸öÎó²î£¬£¬£¬£¬²¿·ÖÈÔδÐÞ¸´
SecureAuthÑо¿Ö°Ô±·¢Ã÷»ªË¶ºÍ¼¼¼ÎµÄËĸöÇý¶¯³ÌÐò±£´æ7¸öÎó²î£¬£¬£¬£¬¹²Ó°ÏìÁË5¸öÈí¼þ²úÆ·¡£¡£¡£ÆäÖлªË¶µÄAura Sync£¨v1.07.22¼°Ö®Ç°µÄ°æ±¾£©×°ÖõÄÇý¶¯£¨GLCKIoºÍAsusgio£©±£´æÈý¸öÎó²î£¨CVE-2018-18537¡¢CVE-2018-18536ºÍCVE-2018-18535£©£¬£¬£¬£¬ÕâЩÎó²î¿Éµ¼ÖÂÌáȨ¡¢ÏµÍ³Íß½âºÍÍâµØ´úÂëÖ´ÐС£¡£¡£¼¼¼ÎµÄGPCIDrvºÍGDrvÇý¶¯³ÌÐò±£´æ4¸öÎó²î£¨CVE-2018-19320~CVE-2018-19323£©£¬£¬£¬£¬Í¬Ñù¿Éµ¼ÖÂÌáȨºÍϵͳÍß½âµÈ¡£¡£¡£SecureAuthÓÚ2017Äê11ÔÂ×îÏÈͬ»ªË¶Ïàͬ£¬£¬£¬£¬µ«Ö±ÖÁ2018Äê5Ô»ªË¶Ö»ÐÞ¸´ÁËÈý¸öÎó²îÖеÄÒ»¸ö¡£¡£¡£SecureAuthÓÚ2018Äê4ÔÂ24ÈÕ×îÏÈͬ¼¼¼ÎÏàͬ£¬£¬£¬£¬µ«¼¼¼Î¹¤³Ìʦ»Ø¸´³ÆÆä²úƷûÓÐÊܵ½Ëù±¨¸æµÄÎó²îµÄÓ°Ïì¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/asus-gigabyte-drivers-contain-code-execution-vulnerabilities-pocs-galore/3¡¢ABB PLCÍø¹Ø±£´æÁ½¸öÎó²î£¬£¬£¬£¬¿Éµ¼Ö¾ܾøÐ§ÀÍ
Applied RiskÑо¿Ö°Ô±·¢Ã÷ABB¹«Ë¾µÄPLCÍø¹Ø£¨GATE-E1ºÍGATE-E2£©±£´æÁ½¸öÇå¾²Îó²î¡£¡£¡£ÕâÁ½¸öÎó²î»®·ÖÊÇ×°±¸ÖÎÀí½çÃæµÄÉí·ÝÑé֤ȱʧÎó²î£¨CVE-2018-18995£©ºÍXSSÎó²î£¨CVE-2018-18997£©¡£¡£¡£ABB³ÆÓÉÓÚÊÜÓ°ÏìµÄ²úÆ·ÒѾµÖ´ïʹÓÃÊÙÃü£¬£¬£¬£¬Òò´Ë²»»áÕë¶ÔÕâЩÎó²îÐû²¼¹Ì¼þ¸üС£¡£¡£Ñо¿Ö°Ô±²¢Ã»Óз¢Ã÷¸ÃÎó²îÔÚÒ°ÍⱻʹÓõÄÖ¤¾Ý¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/78995/security/abb-plc-gateways-flaws.html4¡¢NASAÅû¶Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬²¿·ÖÔ±¹¤µÄPIIÐÅÏ¢±»µÁ
NASA±»ºÚ£¬£¬£¬£¬Æ¾Ö¤¸Ã»ú¹¹µÄ˵·¨£¬£¬£¬£¬NASAÔÚ10ÔÂ23ÈÕ·¢Ã÷ÁËÕâÒ»Êý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬ÆäÒ»¸ö´æ´¢Ð¡ÎÒ˽¼ÒÉí·ÝÐÅÏ¢£¨PII£©µÄЧÀÍÆ÷Ôâµ½ºÚ¿ÍÈëÇÖ£¬£¬£¬£¬2006Äê7ÔÂÖÁ2018Äê10ÔÂʱ´ú¼ÓÈëNASAµÄÔ±¹¤µÄPIIÐÅϢй¶£¬£¬£¬£¬°üÀ¨È¥Ö°»òµ÷Ö°µÄÔ±¹¤¡£¡£¡£NASAÏÖÔÚÓµÓÐÔ¼17300ÃûÔ±¹¤¡£¡£¡£¸Ã»ú¹¹ÌåÏÖûÓÐÌ«¿ÕʹÃüÊܵ½Ó°Ïì¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2018/12/nasa-hack-data-breach.html5¡¢McAfeeÐû²¼12ÔÂÍøÂçÍþв±¨¸æ£¬£¬£¬£¬ÆÊÎöÍþвÇ÷ÊÆµÄÑݱä
ƾ֤McAfeeʵÑéÊÒÐû²¼µÄ2018Äê12ÔÂÍøÂçÍþв±¨¸æ£¬£¬£¬£¬2018ÄêµÚÈý¼¾¶ÈÕë¶ÔÎïÁªÍø×°±¸µÄжñÒâÈí¼þÔöÌíÁË72%£¬£¬£¬£¬°ÕÁËÍùËĸö¼¾¶ÈµÄ×ÜÌåÔöÌíÊÇ203£¥£»£»ÐµĶñÒâ¿ó¹¤ÔöÌíÁ˽ü55%£¬£¬£¬£¬°ÕÁËÍùËĸö¼¾¶ÈµÄ×ÜÌåÔöÌíÊÇ4467%¡£¡£¡£¹ØÓÚÎÞÎļþ¶ñÒâÈí¼þÀàÐÍ£¬£¬£¬£¬ÐµÄJavaScript¶ñÒâÈí¼þÔöÌíÁË45%£¬£¬£¬£¬¶øÐµÄPowerShell¶ñÒâÈí¼þÔöÌíÁË24%¡£¡£¡£ÐµÄÒÆ¶¯¶ñÒâÈí¼þïÔÌÁË24%£¬£¬£¬£¬ÐµÄmacOS¶ñÒâÈí¼þÑù±¾ÔöÌíÁË9%¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/mcafee-labs-threats-report-examines-cybercriminal-underground-iot-malware-other-threats/6¡¢APT28½¨ÉèZebrocyľÂíµÄÐÂGoÓïÑÔ±äÌå
Palo Alto NetworksµÄUnit42Ñо¿ÍŶӷ¢Ã÷APT×éÖ¯Sofacy£¨ÓÖÃûAPT28£©¿ª·¢ÁËGoÓïÑÔ°æ±¾µÄZebrocyľÂíбäÌå¡£¡£¡£ÒÑÍù¸Ã×éÖ¯Ò²¿ª·¢ÁËAutoIt¡¢Delphi¡¢VB.NET¡¢C££ºÍVisual C ++°æ±¾µÄZebrocy£¬£¬£¬£¬Ñо¿Ö°Ô±ÒÔΪSofacy½¨Éè¶àÖÖÓïÑԵıäÌåÊÇΪÁ˸üºÃµØÌӱܼì²â¡£¡£¡£Zebrocy Go±äÌåµÄµÚÒ»´Î¹¥»÷±¬·¢ÔÚ2018Äê10ÔÂ11ÈÕ£¬£¬£¬£¬Í¨¹ý´¹ÂÚÓʼþ¾ÙÐн»¸¶£¬£¬£¬£¬µ«ÆäѬȾÁ´ÖеÄPowerShell¾ç±¾±£´æ±àÂë¹ýʧ£¬£¬£¬£¬Òò´ËÕâÒ»´Î¹¥»÷ÊÇʧ°ÜµÄ¡£¡£¡£µÚ¶þ´Î¹¥»÷±¬·¢ÔÚ10ÔÂÖÐÑ®µ½11ÔÂÖÐѮ֮¼ä¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://unit42.paloaltonetworks.com/sofacy-creates-new-go-variant-of-zebrocy-tool/ÉùÃ÷£º±¾×ÊѶÓÉÈËÉú¾ÍÊDz©Î¬ËûÃüÇ徲С×é·ÒëºÍÕûÀí


¾©¹«Íø°²±¸11010802024551ºÅ