ÐÅÏ¢°²È«Öܱ¨-2019ÄêµÚ23ÖÜ

°ä²¼¹¦·ò 2019-06-17

±¾Öܰ²È«Ì¬ÊÆ×ÛÊö



2019Äê6ÔÂ10ÈÕÖÁ16ÈÕ¹²ÊÕ¼°²È«·ì϶63¸ö £¬ÖµµÃ¹Ø×¢µÄÊÇSAP E-Commerce CVE-2019-0308Ô¶³Ì´úÂë×¢Èë·ì϶  £»Adobe CampaignËÁÒâ´úÂëÖ´Ðзì϶  £» WAGO Industrial Managed Switches SSHÓ²±àÂë·ì϶  £»Microsoft Word CVE-2019-1034ÄÚ´æ·ÛËé´úÂëÖ´Ðзì϶  £»Dahua IPC-HFW1XXXÉãÏñ»ú»º³åÇøÒç¶Âí½Å¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇ


¹È¸è֤ʵºÚ¿ÍÔøÀûÓõÚÈý·½ÔÚAndroidÊÖ»úÉÏ×°ÖúóÃÅ  £»HSMÑϳÁ·ì϶ £¬Ó°Ïì¶à¸öÒøÐÓ×¢ÔÆ·þÎñÉ̺͵±¾Ö»ú¹¹  £»Ê©ÄÍµÂµçÆøModicon M580¶à¸ö·ì϶ £¬¿Éµ¼ÖÂDoS¼°ÐÅϢй¶  £»·É»úÁ㲿¼þ³§ÉÌASCOÔâÀÕË÷Èí¼þ¹¥»÷ £¬²¿Ãʤ³§ÒѹعØ  £»Evernote Chrome²å¼þXSS·ì϶ £¬²¨¼°Ô¼460ÍòÓû§¡£
ƾ¾ÝÒÔÉÏ×ÛÊö £¬±¾Öܰ²È«ÍþвΪÖС£



³ÁÒª°²È«·ì϶Áбí



1. SAP E-Commerce CVE-2019-0308Ô¶³Ì´úÂë×¢Èë·ì϶
SAP E-Commerce´æÔÚ°²È«·ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬×¢ÈëËÁÒâ´úÂë £¬²¢ÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐС£

https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=521864242


2. Adobe CampaignËÁÒâ´úÂëÖ´Ðзì϶
Adobe Campaign´æÔÚ°²È«·ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬ÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâºÅÁî¡£

https://helpx.adobe.com/security/products/campaign/apsb19-28.html


3. WAGO Industrial Managed Switches SSHÓ²±àÂë·ì϶
WAGO Industrial Managed Switches¶à¸ö²úÆ·´æÔÚÓ²±àÂëSSHÃÜÔ¿·ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬¿ÉδÊÚȨ½Ó¼ûÉ豸¡£

https://ics-cert.us-cert.gov/advisories/ICSA-19-164-02


4. Microsoft Word CVE-2019-1034ÄÚ´æ·ÛËé´úÂëÖ´Ðзì϶
Microsoft Word´¦ÖÃWORDÎļþ´æÔÚ°²È«·ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÎļþÒªÇó £¬ÓÕʹÓû§½âÎö £¬¿ÉÖ´ÐÐËÁÒâ´úÂë¡£

https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2019-1034


5. Dahua IPC-HFW1XXXÉãÏñ»ú»º³åÇøÒç¶Âí½Å
Dahua IPC-HFW1XXX´æÔÚ»º³åÇøÒç¶Âí½Å £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬¿É½øÐлؾø·þÎñ¹¥»÷»òÕßÖ´ÐÐËÁÒâ´úÂë¡£

https://www.dahuasecurity.com/support/cybersecurity/details/617



 ³ÁÒª°²È«ÊÂÎñ×ÛÊö



1¡¢¹È¸è֤ʵºÚ¿ÍÔøÀûÓõÚÈý·½ÔÚAndroidÊÖ»úÉÏ×°ÖúóÃÅ

±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾

¹È¸è֤ʵ2017ÄêºÚ¿ÍÔøÀûÓõÚÈý·½¹©¸øÉ̹¹½¨µÄ·¨Ê½´úÂëÔÚAndroidÊÖ»úÉÏ×°ÖÃTriadaºóÃÅ¡£¹È¸èûÓоßÌå×¢Ã÷ÄÄЩÉ豸Êܵ½ÁËÓ°Ïì £¬µ«°²È«³§ÉÌDr.WebÔøÔÚ2017ÄêµÄ×êÑл㱨ÖÐÖ¸³öÊÜÓ°ÏìµÄÉè±¸Æ·ÅÆÔ̺¬Leagoo M5 Plues¡¢Leagoo M8¡¢Nomu S10ºÍNomu S20µÈ¡£¸ÃºóÃÅÖ¼ÔÚÏòÓû§µÄÉè±¸ÍÆËÍÀ¬»øÓʼþºÍδÊÚȨµÄ¸æ°×µÈ¡£

Ô­ÎÄÁ´½Ó£º
https://www.cyberscoop.com/android-backdoor-triada-mobile-supply-chain/

2¡¢HSMÑϳÁ·ì϶ £¬Ó°Ïì¶à¸öÒøÐÓ×¢ÔÆ·þÎñÉ̺͵±¾Ö»ú¹¹


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


Ledger°²È«×êÑÐÈËÔ±Åû¶һ¼ÒÖØÒª³§É̵ÄHSM£¨Ó²¼þ°²È«Ä£¿é£©ÖеÄÑϳÁ·ì϶ £¬¸Ã·ì϶¿ÉÔÊÐí¼ìË÷´æ´¢ÔÚHSMÖеÄÃô¸ÐÊý¾Ý¡£HSMÊÇÓ²¼þ¸ôÀëÉ豸 £¬³£ÓÃÓÚ½ðÈÚ»ú¹¹¡¢µ±¾Ö»ú¹¹¡¢Êý¾ÝÖÐÐÄ¡¢ÔÆ·þÎñÉ̺͵çÐÅÔËÓªÉ̵È¡£Æ¾¾Ý×êÑÐÈËÔ±µÄ»ã±¨ £¬¸Ã·ì϶ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷Õ߯ëÈ«½ÚÔìHSM £¬´Ó¶ø¼ìË÷¼ÓÃÜÃÜÔ¿ºÍÖÎÀíԱʹ´¦µÈÐÅÏ¢¡£×êÑÐÈËÔ±²¢Î´Åû¶ÊÜÓ°ÏìµÄ³§ÉÌÃû³Æ £¬µ«CryptosenseÖ¸³ö¸Ã³§ÉÌ¿ÉÄÜÊǽðÑÅÍØ¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/major-hsm-vulnerabilities-impact-banks-cloud-providers-governments/

3¡¢Ê©ÄÍµÂµçÆøModicon M580¶à¸ö·ì϶ £¬¿Éµ¼ÖÂDoS¼°ÐÅϢй¶


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


˼¿ÆTalosÅû¶ʩÄÍµÂµçÆøModicon M580ÖеĶà¸ö·ì϶¡£Modicon M580ÊÇÊ©ÄÍµÂµçÆøModiconϵÁпɱà³Ì×Ô¶¯»¯½ÚÔìÆ÷µÄ×îвúÆ· £¬×êÑÐÈËÔ±ÔÚÆä¹Ì¼þ°æ±¾SV2.70Öз¢ÏÖ¶à¸ö·ì϶ £¬Ô̺¬¿Éµ¼ÖÂDoSµÄ·ì϶£¨CVE-2018-7846¡¢CVE-2018-7849¡¢CVE-2018-7843£© £¬¿Éµ¼ÖÂÐÅϢй¶µÄ·ì϶£¨CVE-2018-7844¡¢CVE-2018-7848£©¼°Éí·ÝÑéÖ¤ÈÆ¹ý·ì϶£¨CVE-2018-7842£©µÈ¡£

Ô­ÎÄÁ´½Ó£º
https://blog.talosintelligence.com/2019/06/vulnerability-spotlight-multiple.html

4¡¢·É»úÁ㲿¼þ³§ÉÌASCOÔâÀÕË÷Èí¼þ¹¥»÷ £¬²¿Ãʤ³§ÒѹعØ


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


¾Ý±ÈÀûʱýÌ屨· £¬·É»úÁ㲿¼þ³§ÉÌASCOλÓÚ±ÈÀûʱÔú·ÒÌØÄ·µÄ¹¤³§ÔâÀÕË÷Èí¼þϰȾ £¬¸Ã¹«Ë¾ÒÑÖÕ³¡ÁËËĸö¹ú¶ÈµÄ¹¤³§³ö²ú¡£¸ÃϰȾÊÂÎñ²úÉúÔÚ6ÔÂ7ÈÕÐÇÆÚÎå £¬×î³õÓ°ÏìÁ˸ù«Ë¾Î»ÓÚ±ÈÀûʱµÄ¹¤³§ £¬µ«ASCOÒ²¹Ø¹ØÁËλÓڵ¹ú¡¢¼ÓÄôóºÍÃÀ¹úµÄ¹¤³§¡£¾Ý±¨Â·Í  £»ú¹¦·òÔ¤¼ÆÎªÒ»ÖÜ £¬Ô̺¬¼´½«µ½À´µÄÖÜÄ©¡£¸Ã¹«Ë¾²¢Î´Ð¹Â©¸ü¶àÐÅÏ¢ £¬Ä¿Ç°Ò²²»ÖªÂ·ÀÕË÷Èí¼þµÄÃû³Æ¡£ASCOÊÇÊÀ½çÉÏ×î´óµÄ·É»úÁ㲿¼þ³§ÉÌÖ®Ò» £¬Æä¿Í»§Ô̺¬¿Õ¿Í¡¢²¨ÒôÉõÖÁ¾üÓᢺ½¿ÕÁìÓòµÄ¹«Ë¾µÈ¡£

Ô­ÎÄÁ´½Ó£º
https://www.zdnet.com/article/ransomware-halts-production-for-days-at-major-airplane-parts-manufacturer/

5¡¢Evernote Chrome²å¼þXSS·ì϶ £¬²¨¼°Ô¼460ÍòÓû§


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


°²È«³§ÉÌGuardio·¢ÏÖEvernoteµÄChrome²å¼þ£¨Evernote Web Clipper£©ÖдæÔÚÒ»¸öÑϳÁµÄXSS·ì϶ £¬¿ÉÔÊÐí¹¥»÷Õß½Ó¼ûÓû§ÔÚµÚÈý·½·þÎñÖеÄÃô¸ÐÐÅÏ¢¡£ÓÉÓÚEvernote¹ãÊÜÓ­½Ó £¬¸Ã·ì϶¿ÉÄܲ¨¼°Ô¼460ÍòÓû§¡£¸Ã·ì϶£¨CVE-2019-12592£©ÊôÓÚ²å¼þÖеıàÂëÂß¼­ÃýÎó £¬¿ÉÈÆ¹ýä¯ÀÀÆ÷µÄͬԴսÊõ £¬Ê¹µÃ¹¥»÷Õß½Ó¼ûµÚÈý·½·þÎñµÄÃô¸ÐÓû§ÐÅÏ¢ £¬Ô̺¬Éí·ÝÑéÖ¤ÐÅÏ¢¡¢²ÆÕþÐÅÏ¢¡¢É罻ýÌå̸ÌìÐÅÏ¢¡¢µç×ÓÓʼþÐÅÏ¢µÈ¡£½¨ÒéÓû§¸üÐÂÖÁ7.11.1¼°¸ü¸ß°æ±¾¡£

Ô­ÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/critical-flaw-in-evernote-add-on-exposed-sensitive-data-of-millions/