ÐÅÏ¢°²È«Öܱ¨-2019ÄêµÚ30ÖÜ

°ä²¼¹¦·ò 2019-08-05

> ±¾Öܰ²È«Ì¬ÊÆ×ÛÊö



2019Äê7ÔÂ29ÈÕÖÁ8ÔÂ04ÈÕ¹²ÊÕ¼°²È«·ì϶50¸ö £¬ÖµµÃ¹Ø×¢µÄÊÇAlcatel-Lucent Enterprise 8008 Cloud Edition Deskphone VoIPÃÜÂë¸ü¸ÄºÅÁî×¢Èë·ì϶£»Puppet Enterprise PE's express installĬÈÏÃÜÂë·ì϶£»Wind River Systems VxWorks IPÑ¡Ïî½âÎö»º³åÇøÒç¶Âí½Å£»Polycom UC SoftwareÉÏ´«Îļþ´úÂëÖ´Ðзì϶£»cPanel SQL×¢Èë·ì϶¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇŦԼͨ¹ýÐÂÊý¾Ýй¶֪ͨ·¨°¸ £¬Êý¾Ý¼à¹ÜÔÙ´ÎÉý¼¶£»Capital Oneй¶1.06ÒÚÓû§ÐÅÏ¢ £¬ÏÓÒÉÈËÒѱ»²¶£»VxWorks½¨¸´11¸ö°²È«·ì϶ £¬Ó°Ï쳬¹ý20ÒŲ́É豸£»Amcrest¼ÒÓÃÉãÏñÍ·ÑϳÁ·ì϶ £¬¿ÉÔÊÐí¹¥»÷ÕßÔ¶³Ì¼àÌýÓû§£»ÖÇÀû1430Íò¹«ÃñÐÅϢй¶ £¬Õ¼È«¹ú×ÜÈ˶¡½ü80%¡£


ƾ¾ÝÒÔÉÏ×ÛÊö £¬±¾Öܰ²È«ÍþвΪÖС£



> ³ÁÒª°²È«·ì϶Áбí



1. Alcatel-Lucent Enterprise 8008 Cloud Edition Deskphone VoIPÃÜÂë¸ü¸ÄºÅÁî×¢Èë·ì϶


Alcatel-Lucent Enterprise 8008 Cloud Edition Deskphone VoIP ÃÜÂë¸ü¸Ä½çÃæ¸ü¸ÄÃÜÂë´¦ÖôæÔÚ°²È«·ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬¿ÉÖ´ÐÐËÁÒâOSºÅÁî¡£

https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_Alcatel_8008CloudEditionDeskPhone.pdf?_=1559026340

2. Puppet Enterprise PE's express installĬÈÏÃÜÂë·ì϶


Puppet Enterprise PE's express install´æÔÚĬÈÏÃÜÂë·ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬¿ÉδÊÚȨ½Ó¼û¡£
https://puppet.com/security/cve/CVE-2019-10694

3. Wind River Systems VxWorks IPÑ¡Ïî½âÎö»º³åÇøÒç¶Âí½Å


Wind River Systems VxWorks IPÑ¡Ïî´¦ÖôæÔÚ»º³åÇøÒç¶Âí½Å £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë¡£
https://www.us-cert.gov/ics/advisories/icsa-19-211-01

4. Polycom UC SoftwareÉÏ´«Îļþ´úÂëÖ´Ðзì϶


Polycom UC SoftwareÉÏ´«Îļþ´æÔÚ°²È«·ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬¿ÉÖ´ÐÐËÁÒâ´úÂë¡£
https://support.polycom.com/content/dam/polycom-support/global/documentation/remote-code-execution-vulnerability-in-ucs-software-v1-0.pdf

5. cPanel SQL×¢Èë·ì϶


cPanel´æÔÚSQL×¢Èë·ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄSQLÒªÇó £¬²Ù×÷Êý¾Ý¿â £¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»òÖ´ÐÐËÁÒâ´úÂë¡£
https://documentation.cpanel.net/display/CL/58+Change+Log


 > ³ÁÒª°²È«ÊÂÎñ×ÛÊö



1¡¢Å¦Ô¼Í¨¹ýÐÂÊý¾Ýй¶֪ͨ·¨°¸ £¬Êý¾Ý¼à¹ÜÔÙ´ÎÉý¼¶


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


ŦԼÖÝÖݳ¤Andrew M. Cuomo½üÈÕÇ©ÊðÁËÒ»ÏîеÄÊý¾Ýй¶֪ͨ·¨°¸ £¬¸Ã·¨°¸µÄÃû³ÆÎª¡°×èÖ¹ºÚ¿Í¼°¸Ä½øµç×ÓÊý¾Ý°²È«¡± £¬¼´SHIELD·¨°¸ £¬Ö¼ÔÚ±£»¤Å¦Ô¼¹«ÃñµÄÒþÖÔÊý¾Ý²¢¼ÓÇ¿¸ÃÖݵÄÊý¾Ýй¶Õþ²ß¡£¸Ã·¨°¸À©´óÁËÓ×ÎÒÐÅÏ¢µÄÁìÓò £¬½«ÉúÎï¼ø±ðÐÅÏ¢¡¢µç×ÓÓʼþµØÖ·¼°ÃÜÂë¡¢°²È«ÎÊÌâ¼°´ð°¸ÁÐÈëÆäÖС£¸Ã·¨°¸»¹Ôö³¤ÁËÃñÊ´¦·£ £¬²¢½«Í¨ÖªÒªÇóÀûÓÃÓÚÈκÎÕ¼ÓÐŦԼ¹«ÃñÒþÖÔÐÅÏ¢µÄÓ×ÎÒ»òʵÌå £¬¶ø²»½ö½öÊÇÔÚŦԼÖÝ·¢Õ¹ÒµÎñµÄʵÌå¡£¸Ã·¨°¸»¹½«ÌṩÉí·Ý͵ÇÔ±£»¤·þÎñдÈë˾·¨ £¬ÒªÇóCRAÔÚ²úÉúÉæ¼°Éç»á°²È«ºÅÂëµÄÊý¾Ýй¶ºó±ØÐëÏòÏû·ÑÕßÌṩºÏÀíµÄ±£»¤·þÎñ¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/new-york-passes-law-to-update-data-breach-notification-requirements/

2¡¢Capital Oneй¶1.06ÒÚÓû§ÐÅÏ¢ £¬ÏÓÒÉÈËÒѱ»²¶


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾

Capital OneÈ·ÈÏÆäϵͳÓÚ3ÔÂ22ÈÕÖÁ23ÈÕÆÚ¼äÔâδÊÚȨ½Ó¼û £¬µ¼ÖÂ1.06ÒÚÓû§µÄÐÅϢй¶ £¬Ô̺¬ÂòÂôÊý¾Ý¡¢ÐÅÓþÆÀ·Ö¡¢Ö§¸¶º¹Çà¡¢Óà¶îÒÔ¼°¹ØÁªµÄÒøÐÐÕË»§ºÍÉç»á°²È«ºÅÂë¡£ÊÜÓ°ÏìµÄÓû§Ô̺¬1ÒÚÃÀ¹úÈ˺Í600Íò¼ÓÄôóÈË¡£Æ¾¾ÝÓйØÖ¤¾Ý £¬FBIÒѾ­¿ÛÁôÁËÏÓÒÉÈËPaige Thompson¡£Capital One°µÊ¾ÓÉÓÚ¿Í»§Í¨Öª¡¢Ãâ·ÑµÄÐÅÓþ¼à¿Ø·þÎñ¡¢°²È«¸Ä½ø³É±¾ÒÔ¼°Ë¾·¨ÓöÈ £¬ÕâÒ»ÊÂÎñ½«µ¼ÖÂÔ¼1ÒÚÖÁ1.5ÒÚÃÀÔªµÄ³É±¾¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.bleepingcomputer.com/news/security/capital-one-data-breach-affects-106-million-people-suspect-arrested/

3¡¢VxWorks½¨¸´11¸ö°²È«·ì϶ £¬Ó°Ï쳬¹ý20ÒŲ́É豸


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


Armis×êÑÐÈËÔ±ÔÚVxWorks RTOSÖз¢ÏÖ11¸ö°²È«·ì϶ £¬ÕâЩ·ì϶ӰÏìÁ˺½¿Õº½Ìì¡¢¹ú·À¡¢¹¤Òµ¡¢Ò½ÁÆ¡¢Æû³µ¡¢Ïû·Ñµç×ÓµÈÁìÓòµÄ20¶àÒŲ́É豸¡£ÕâЩ·ì϶±»Í³³ÆÎªURGENT/11 £¬¿ÉÔÊÐíÔ¶³Ì¹¥»÷ÕßÈÆ¹ý´«Í³µÄ°²È«½â¾ö¹æ»®²¢ÆëÈ«½ÚÔìÊÜÓ°ÏìµÄÉ豸»òÀàËÆÓÀºãÖ®À¶Ò»Ñùµ¼Ö´ó¹æÄ£µÄÉ豸ÖжÏ £¬²¢ÇÒÎÞÐèÓû§½»»¥¡£ÕâЩ·ì϶´æÔÚÓÚVxWorks 6.5Ö®ºóµÄTCP/IPºÍ̸ջÖÐ £¬Ó°ÏìÁË´Óǰ13ÄêÀ´°ä²¼µÄËùÓÐVxWorks°æ±¾¡£¸Ã¹«Ë¾ÒѾ­ÔÚÉϸöÔ°䲼Á˽¨¸´²¹¶¡ £¬µ«ÕâЩ²¹¶¡Í¨¹ýÉ豸³§ÉÌ´ïµ½Ïû·ÑÕß¿ÉÄÜ»¹±ØÒª¿Ï¶¨µÄ¹¦·ò¡£

Ô­ÎÄÁ´½Ó£ºhttps://thehackernews.com/2019/07/vxworks-rtos-vulnerability.html

4¡¢Amcrest¼ÒÓÃÉãÏñÍ·ÑϳÁ·ì϶ £¬¿ÉÔÊÐí¹¥»÷ÕßÔ¶³Ì¼àÌýÓû§



±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


°²È«³§ÉÌTenable·¢ÏÖAmcrest IP2M-841B¼ÒÓÃÉãÏñÍ·´æÔÚÒ»¸öÑϳÁ·ì϶ £¬¿ÉÔÊÐí¹¥»÷Õßͨ¹ýHTTPÔ¶³Ì¼àÌýÉãÏñÍ·µÄÒôƵÊäÈë¡£¸Ã·ì϶±»ÏóÕ÷ΪCVE-2019-3948 £¬Ó°ÏìÁËÉãÏñÍ·¹Ì¼þ°æ±¾V2.520.AC00.18.R £¬²¢ÇÒÎÞÐèÉí·ÝÑéÖ¤¼´¿ÉÀûÓá£´Ë±í £¬¸Ã²úÆ·Ò²Ò×ÊÜÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶£¨CVE-2017-7927£©¹¥»÷¡£AmcrestÒѾ­°ä²¼Óйؽ¨¸´²¹¶¡¡£


Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/iot-home-security-camera-allows-hackers-to-listen-in-over-http/

5¡¢ÖÇÀû1430Íò¹«ÃñÐÅϢй¶ £¬Õ¼È«¹ú×ÜÈ˶¡½ü80%


±¦ÔËÀ³¡¤(ÖйúÇø)×îйٷ½ÍøÕ¾


Wizcase×êÑÐÍŶӷ¢ÏÖÒ»¸öElasticsearchÊý¾Ý¿â¶³öÁ˳¬¹ý1430ÍòÖÇÀû¹«ÃñµÄÑ¡¾ÙÐÅÏ¢ £¬Õ¼¸Ã¹ú×ÜÈ˶¡µÄ½ü80%¡£ÕâЩÐÅÏ¢Ô̺¬ÐÕÃû¡¢¼Òͥסַ¡¢ÐԱ𡢴ºÇïºÍÄÉ˰ºÅÂë¡£ÖÇÀûÑ¡¾Ù·þÎñServelµÄ½²»°ÈËÈ·ÈÏÁËÕâЩÊý¾ÝµÄÕæÊµÐÔ £¬µ«·ñ¶¨¸Ã·þÎñÆ÷ÊôÓÚËûÃÇ¡£¸Ã½²»°È˰µÊ¾ÕâЩÐÅÏ¢¶ÔÓ¦ÓÚ2017ÄêµÄÊý¾Ý £¬¿ÉÄÜÊǵÚÈý·½´ÓÆäÍøÕ¾ÉÏÍøÂç»ã×ܵÃÀ´¡£

Ô­ÎÄÁ´½Ó£ºhttps://www.zdnet.com/article/voter-records-for-80-of-chiles-population-left-exposed-online/