SAPÇå¾²¸üÐÂÐÞ¸´NetWeaverÖеÄÑÏÖØÎó²î£»£»£»£»Î¢Èí7Ô·ÝÇå¾²¸üÐÂÐÞ¸´¶à¸ö²úÆ·ÖÐ123¸öÎó²î
Ðû²¼Ê±¼ä 2020-07-151.SAPÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´NetWeaverÖеÄÑÏÖØÎó²î
2020Äê7ÔÂ13ÈÕ£¬£¬£¬£¬£¬£¬SAPÐû²¼ÁËÒ»¸öÇå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´ÁËÒ»¸öSAP NetWeaverÖеÄÑÏÖØÎó²î£¨CVE-2020-6287£©£¬£¬£¬£¬£¬£¬CVSSÆÀ·ÖΪ10·Ö¡£¡£¡£¸ÃÎó²îÔ´ÓÚSAP NetWeaver AS JavaµÄWeb×é¼þÖÐȱÉÙÉí·ÝÑéÖ¤¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬£¬£¬´ËÇå¾²Îó²îÏÖÔÚ¿ÉÄÜ»áÓ°Ïì40000¶à¸öSAPϵͳ¡£¡£¡£SPA¹«Ë¾»¹·¢Ã÷ÖÁÉÙÓÐ2500¸öÒ×Êܹ¥»÷µÄSAPϵͳֱ½Ó̻¶ÓÚ»¥ÁªÍø£¬£¬£¬£¬£¬£¬ÆäÖб±ÃÀÕ¼33%£¬£¬£¬£¬£¬£¬Å·ÖÞÕ¼29%ºÍÑÇ̫ռ27%¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://us-cert.cisa.gov/ncas/alerts/aa20-195a
2.΢ÈíÐû²¼7Ô·ÝÇå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´¶à¸ö²úÆ·ÖÐ123¸öÎó²î
΢ÈíÐû²¼ÁË7Ô·ݵÄÖܶþ²¹¶¡³ÌÐò£¬£¬£¬£¬£¬£¬ÐÞ¸´¶à¸ö²úÆ·ÖÐ123¸öÎó²î£¬£¬£¬£¬£¬£¬ÆäÖÐ18¸öΪÑÏÖØÎó²î¡£¡£¡£´Ë´ÎÇå¾²¸üÐÂÖÐÐÞ¸´µÄ×îÑÏÖØµÄÎó²îΪÑÏÖØÆ·¼¶Îª10.0µÄÎó²î£¨CVE-2020-1350£©£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓøÃÎó²î¾ÙÐÐÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬£¬£¬£¬¸ÃÎó²îÒѱ»Check PointÃüÃûΪSigRed¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬»¹ÐÞ¸´ÁËMicrosoft EdgeºÍVBScriptÒýÇæÖб£´æµÄ¼¸¸ö½ÏΪÑÏÖØµÄÎó²î£¬£¬£¬£¬£¬£¬»®·ÖΪWindows×ÖÌå¿âÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2020-1436£©ºÍGDIÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2020-1435£©£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓÃÆä¾ÙÐÐÏÂÁîÖ´ÐС£¡£¡£
ÔÎÄÁ´½Ó£º
https://us-cert.cisa.gov/ncas/current-activity/2020/07/14/microsoft-releases-july-2020-security-updates
3.еÄMirai±äÌåÕë¶ÔComtrend·ÓÉÆ÷ÖеÄÏÂÁî×¢ÈëÎó²î
Ç÷ÊÆ¿Æ¼¼µÄÇå¾²Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬IoT½©Ê¬ÍøÂçMiraiµÄбäÌåÕë¶ÔComtrend·ÓÉÆ÷ÖеÄÏÂÁî×¢ÈëÎó²î£¨CVE-2020-10173£©¡£¡£¡£¸ÃÎó²îÊǾÓÉÉí·ÝÑéÖ¤µÄÏÂÁî×¢ÈëÎó²î£¬£¬£¬£¬£¬£¬¿É±»Ô¶³Ì¹¥»÷ÕßʹÓÃÆÆËð·ÓÉÆ÷ÖÎÀíµÄÍøÂç¡£¡£¡£Õë¶Ô¸ÃÎó²îµÄPoCÒѹûÕæÐû²¼£¬£¬£¬£¬£¬£¬µ«Mirai±äÌåÊǵÚÒ»¸öʵÑéʹÓôËÎó²îµÄ¶ñÒâÈí¼þ¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬¸ÃбäÌå×ܹ²Ê¹ÓÃÁË9¸öÎó²î£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨Netlink GPON·ÓÉÆ÷ÖÐÏà¶Ô½ÏеÄÎó²î¡£¡£¡£¸Ã±äÌå¿ÉÓ°ÏìLG SuperSign EZ CMS¡¢AVTECH devices¡¢D-Link devices¡¢MVPower DVR¡¢Symantec Web Gateway 5.0.2.8ºÍThinkPHP¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/new-mirai-variant-targets-vulnerability-comtrend-routers?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Securityweek+%28SecurityWeek+RSS+Feed%29
4.ºÚ¿ÍÔÚ°µÍøÉϳöÊÛ1.42ÒÚÌõÃ׸ß÷Âùݿͻ§µÄÏêϸÐÅÏ¢
ºÚ¿ÍÔÚ°µÍøÉÏÐû²¼¹ã¸æ£¬£¬£¬£¬£¬£¬ÒÔ2939.76ÃÀÔªµÄ¼ÛÇ®³öÊÛ142479937ÃûÃ׸ß÷Âùݣ¨MGM£©¿Í»§µÄÏêϸÐÅÏ¢£¬£¬£¬£¬£¬£¬¸Ãй¶ÊýĿԶԶ´óÓÚ×î³õ±¨¸æµÄ1060Íò¡£¡£¡£ºÚ¿ÍÉù³ÆÔÚËûÃÇÆÆËðÁËÓÉNight Lion SecurityÔËÓªµÄÊý¾Ý×ß©¼àÊÓЧÀÍDataViperÖ®ºó»ñµÃÁËÂùݵÄÊý¾Ý£¬£¬£¬£¬£¬£¬µ«Night LionÊ×´´ÈËVinny TroiaÔòÌåÏÖÆä²¢Ã»ÓÐMGMµÄÊý¾Ý¡£¡£¡£MGMÌåÏÖ£¬£¬£¬£¬£¬£¬´Ë´Îй¶±¬·¢ÔÚ2019ÄêÑ×Ì죬£¬£¬£¬£¬£¬ÆäʱºÚ¿ÍÈëÇÖÁËÂùݵÄÒ»Ì¨ÔÆÐ§ÀÍÆ÷²¢ÇÔÈ¡ÁËÂùÝÒÑÍùµÄ¿ÍÈËÐÅÏ¢£¬£¬£¬£¬£¬£¬µ«¸Ã¹«Ë¾Ã»ÓÐ͸¶¹¥»÷µÄ¹æÄ£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/a-hacker-is-selling-details-of-142-million-mgm-hotel-guests-on-the-dark-web/#ftag=RSSbaffb68
5.ºÚ¿ÍÔÚ°µÍø³öÊÛ4Íò¶àÃûÃÀ¹ú¹«ÃñµÄСÎÒ˽¼ÒÏêϸÐÅÏ¢ºÍSSN
ÍþвÇ鱨¹«Ë¾Cyble·¢Ã÷£¬£¬£¬£¬£¬£¬ºÚ¿ÍÕýÔÚ°µÍøÉϳöÊÛԼĪ40000ÃûÃÀ¹ú¹«ÃñµÄСÎÒ˽¼ÒÏêϸÐÅÏ¢ÒÔ¼°ËûÃǵÄÉç»áÇå¾²ºÅÂ루SSN£©¡£¡£¡£´Ë´Î×ß©µÄÊý¾Ý°üÀ¨Ãû×Ö¡¢ÐÕÊÏ¡¢µØµã¡¢ÊС¢ÖÝ¡¢ÓʱࡢÉç»áÇå¾²ºÅÂ루SSN£©ºÍ³öÉúÈÕÆÚ£¨DOB£©µÈÐÅÏ¢¡£¡£¡£´ËÀàÊý¾Ý¿ÉÄܸøÃÀ¹ú¹«Ãñ´øÀ´ÑÏÖØµÄΣº¦£¬£¬£¬£¬£¬£¬¸Ãй¶Êý¾Ý¿É±»ÓÃÓÚ´ó¹æÄ£ÍøÂç´¹Âڻ»ò½ðÈÚڲƻ¡£¡£¡£CybleÒѾÔÚÆäÊý¾Ýй¶¼àÊÓºÍ֪ͨƽ̨AmiBreached.comÉÏΪ¸ÃÊý¾Ý¿â½¨ÉèÁËË÷Òý£¬£¬£¬£¬£¬£¬ÒÔ¹©µ£ÐÄÆäÐÅϢй¶µÄÈËÅÌÎÊ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/105837/malware/40000-us-citizens-darkweb.html?utm_source=rss&utm_medium=rss&utm_campaign=40000-us-citizens-darkweb
6.ÅÄÂôÍøÕ¾LiveAuctioneersÔâ¹¥»÷£¬£¬£¬£¬£¬£¬Ð¹Â¶340ÍòÌõÓû§¼Í¼
ÅÄÂôÍøÕ¾LiveAuctioneersÈÏ¿ÉÆäÔâµ½ÍøÂç¹¥»÷¡£¡£¡£7ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬Ò»ÃûºÚ¿ÍÔÚ°µÍø³öÊÛ´ÓLiveAuctioneersµÄÍøÕ¾ÉÏÇÔÈ¡µÄ340ÍòÌõÓû§¼Í¼£¬£¬£¬£¬£¬£¬²¢±ê¼ÛΪ2500ÃÀÔª¡£¡£¡£¾Ý³Æ£¬£¬£¬£¬£¬£¬´ËÊý¾Ý¿â°üÀ¨Óû§µÄµç×ÓÓʼþµØµã¡¢Óû§Ãû¡¢MD5¹þÏ£ÃÜÂë¡¢Ãû³Æ¡¢µç»°ºÅÂë¡¢µØµã¡¢IPµØµãºÍÉ罻ýÌåÉèÖÃÎļþ¡£¡£¡£³ý´ËÖ®Í⣬£¬£¬£¬£¬£¬¸ÃºÚ¿Í»¹ÌåÏÖÆäÖÐÓÐ300Íò¸öÕÊ»§µÄÃÜÂëÒѱ»ÆÆ½â¡£¡£¡£7ÔÂ11ÈÕ£¬£¬£¬£¬£¬£¬LiveAuctioneersÐû²¼ÁËÇ徲֪ͨ£¬£¬£¬£¬£¬£¬ÌåÏÖËûÃÇÔâµ½Á˹¥»÷µ¼ÖÂÊý¾Ýй¶£¬£¬£¬£¬£¬£¬²¢Ö¸³öºÚ¿ÍÊÇÓÚ6ÔÂ19ÈÕÔÚÆäÊý¾Ý´¦Öóͷ£ÏàÖú¹«Ë¾´¦»á¼ûµÄÕâЩÊý¾Ý¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/liveauctioneers-reports-data-breach-after-user-records-sold-online/


¾©¹«Íø°²±¸11010802024551ºÅ