PAN OS±£´æCVSSv3ÆÀ·Ö10µÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¬£¬£¬£¬£¬£¬¿ÉÈÆ¹ý·À»ðǽ£»£»£»£»£»ºÚ¿Íй¶°ÍÎ÷×Üͳ¼°20Íò¹«ÎñԱСÎÒ˽¼ÒÐÅÏ¢

Ðû²¼Ê±¼ä 2020-06-30

1.PAN OS±£´æCVSSv3ÆÀ·Ö10µÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¬£¬£¬£¬£¬£¬¿ÉÈÆ¹ý·À»ðǽ


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


Palo Alto NetworksÅû¶ÁËÒ»¸öÖØ´óÎó²î£¨CVE-2020-2021£©£¬£¬£¬£¬£¬£¬¸ÃÎó²î¿ÉʹºÚ¿ÍÈÆ¹ý·À»ðǽºÍÆä¹«Ë¾VPN²úÆ·µÄÉí·ÝÑéÖ¤¡£¡£¡£¡£¡£¡£¡£¡£¸ÃÎó²îÊÇÔÚCVSSv3ÑÏÖØÆ·¼¶ÖлñµÃ10·ÖµÄÓÐÊýÎó²îÖ®Ò»£¬£¬£¬£¬£¬£¬¼È²»ÐèÒª¸ß¼¶ÊÖÒÕÊÖÒÕ£¬£¬£¬£¬£¬£¬ÓÖ¿ÉÒÔͨ¹ýInternet¾ÙÐÐÔ¶³ÌʹÓᣡ£¡£¡£¡£¡£¡£¡£ºÚ¿Í¿ÉÒÔʹÓøÃÎó²î¸ü¸ÄPAN OSµÄÉèÖú͹¦Ð§£¬£¬£¬£¬£¬£¬À´ÊµÏÖ¹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£ÃÀ¹úÍøÂç˾ÁÔòÒªÇóËùÓÐÊÜCVE-2020-2021Ó°ÏìµÄ×°±¸Á¬Ã¦ÐÞ¸´¸ÃÎó²î£¬£¬£¬£¬£¬£¬²¢ÌåÏÖÍâ¹úµÄAPT×éÖ¯¿ÉÄܺܿì¾Í»áʵÑéʹÓøÃÎó²îÌᳫ¹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/us-cyber-command-says-foreign-hackers-will-most-likely-exploit-new-pan-os-security-bug/


2.ºÚ¿Íй¶°ÍÎ÷×Üͳ¼°20Íò¹«ÎñԱСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬£¬¾¯·½ÈÔÔÚÊÓ²ìÖÐ


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


ºÚ¿Í×éÖ¯Anonymous BrazilÉù³Æ£¬£¬£¬£¬£¬£¬°ÍÎ÷×Üͳ²©¶ûË÷ÄÉÂÞºÍËûµÄ¶ù×Ó£¬£¬£¬£¬£¬£¬ÒÔ¼°¶àÃû²¿³¤µÄСÎÒ˽¼ÒÏêϸÐÅÏ¢ÒѾ­Ð¹Â¶£¬£¬£¬£¬£¬£¬Ëæºó°ÍÎ÷Áª°î¾¯Ô±¶Ô´ËÊÂÎñÕö¿ªÁËÊӲ졣¡£¡£¡£¡£¡£¡£¡£ÊӲ췢Ã÷£¬£¬£¬£¬£¬£¬³ýÁËÔÚÍøÉÏ×ß©µÄÐÅÏ¢Í⣬£¬£¬£¬£¬£¬¸ÃºÚ¿Í×éÖ¯»¹ÍµÈ¡ÁËÁè¼Ý20ÍòÃûÎäÊ¿ºÍÕþ¸®¹ÙÔ±µÄÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¡£ÎªÍµÊØÐÅÏ¢£¬£¬£¬£¬£¬£¬ºÚ¿Í¹¥»÷Á˶à¸öÖݵĴóѧ¡¢ÊÐÕþÌüºÍÊÐÒé»áϵͳ£¬£¬£¬£¬£¬£¬½öÔÚÄÏÀï°Â¸ñÀ¼µÂÖÝ£¬£¬£¬£¬£¬£¬¾ÍÓÐ90¶à¸ö»ú¹¹Ôâµ½¹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬¾¯·½¶Ô´ËÊÂÈÔÔÚÊÓ²ìÖС£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/brazilian-federal-police-investigates-presidential-data-leak/    


3.SnykÐû²¼±¨¸æ£¬£¬£¬£¬£¬£¬¿ªÔ´Èí¼þ°üÖеÄÐÂÎó²î±ÈÈ¥ÄêϽµÁË20£¥


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


SnykÐû²¼±¨¸æÌåÏÖ£¬£¬£¬£¬£¬£¬½ñÄ꿪ԴÈí¼þ°üÖеÄÐÂÎó²îÊýÄ¿±ÈÈ¥ÄêϽµÁË20£¥¡£¡£¡£¡£¡£¡£¡£¡£¸Ã±¨¸æ¶ÔÄÇЩӰÏìÁËʹÓÿªÔ´¿â×éÖ¯µÄÕûÌåÇå¾²ÐÔµÄÎó²îºÍ6¸öÖ÷Á÷µÄÉú̬ϵͳ¾ÙÐÐÁËÑо¿¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿·¢Ã÷£¬£¬£¬£¬£¬£¬ÔÚ2019Ä꣬£¬£¬£¬£¬£¬ÐÂÎó²îïÔÌ­Á˽ü20£¥£»£»£»£»£»¿çÕ¾¾ç±¾Îó²îÒÀÈ»ÊÇÊÇ×î³£¼ûµÄÎó²î£»£»£»£»£»³£¼ûLinux¿¯ÐаæÖб¨¸æµÄÐÂÎó²îÅú×¢£¬£¬£¬£¬£¬£¬ÐèÒªÖÜÈ«¼àÊÓÈÝÆ÷Ó³ÏñÖеÄÐÂÎó²î£»£»£»£»£»ÔÚ´ó´ó¶¼Éú̬ϵͳÖУ¬£¬£¬£¬£¬£¬SQL×¢ÈëÎó²îÊýÄ¿ÓÐËù½µµÍ£¬£¬£¬£¬£¬£¬Ê¹ÓÃPHPµÄÎó²îÈ´ÓÐËùÔöÌí¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2020/06/29/vulnerabilities-open-source-packages/


4.¹¥»÷µÂÖÝTxDOTµÄÀÕË÷Èí¼þΪRansom X£¬£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÕþ¸®ºÍÆóÒµ


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


¾­ÊӲ죬£¬£¬£¬£¬£¬¹¥»÷Á˵ÿËÈøË¹ÖÝ·¨ÔººÍµÃ¿ËÈøË¹Öݽ»Í¨ÔËÊ䲿 £¨TxDOT£©µÄÀÕË÷Èí¼þΪRansom X£¬£¬£¬£¬£¬£¬ÆäÖ÷ÒªÕë¶ÔÕþ¸®ºÍÆóÒµ¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Í¨¹ý¶ÔRansom XÑù±¾µÄÑо¿£¬£¬£¬£¬£¬£¬·¢Ã÷Æä¿ÉÒÔ½«ÖÕÖ¹ÓëÇå¾²Èí¼þ¡¢Êý¾Ý¿âЧÀÍÆ÷¡¢MSPÈí¼þ¡¢Ô¶³Ì»á¼û¹¤¾ßºÍÓʼþЧÀÍÆ÷ÓйصÄ289¸öÀú³Ì£¬£¬£¬£¬£¬£¬Ëü»¹¿ÉÒÔÈÆ¹ýÖÖÖÖWindowsϵͳÎļþ¼ÐÒÔ¼°Ê¹ÓÃÁ˰üÀ¨.ani¡¢.cabºÍ.cplÔÚÄÚµÄÊýÊ®¸öÀ©Õ¹ÃûµÄËùÓÐÎļþ¡£¡£¡£¡£¡£¡£¡£¡£Í¨¹ýÈÆ¹ýÕâЩÎļþ¼Ð£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔ¼ÓÃÜÅÌËã»ú£¬£¬£¬£¬£¬£¬Í¬Ê±Ò²¿ÉÒÔ¹¥»÷ÍøÂçÉÏµÄÆäËûÅÌËã»ú£¬£¬£¬£¬£¬£¬¶ø²»±Øµ£Ðį乤¾ß±»¼ÓÃÜ¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/new-ransom-x-ransomware-used-in-texas-txdot-cyberattack/


5.Ó¥Ñۻع飬£¬£¬£¬£¬£¬APT30ͨ¹ýÂíÀ´Î÷ÑÇÕþ¸®¾Û»áÓʼþ·Ö·¢ÐºóÃÅ


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


Ñо¿Ö°Ô±·¢Ã÷APT30µÄºóÃÅÐÂÑù±¾£¬£¬£¬£¬£¬£¬°üÀ¨BACKSPACEºÍNETEAGLEºóÃÅ£¬£¬£¬£¬£¬£¬²¢Í¨¹ýÂíÀ´Î÷ÑÇÕþ¸®¾Û»áÓʼþ¾ÙÐзַ¢¡£¡£¡£¡£¡£¡£¡£¡£µÚÒ»¸öºóÃŵĶñÒâÑù±¾±»Ð´ÈëÁËMicrosoft OfficeÄ£°åÎļþ¼Ð£¬£¬£¬£¬£¬£¬²¢ÒÔÂíÀ´Î÷ÑÇÕþ¸®¾Û»áÒé³ÌΪÖ÷Ì⣬£¬£¬£¬£¬£¬Í¨¹ýÓʼþ¾ÙÐзַ¢¡£¡£¡£¡£¡£¡£¡£¡£µÚ¶þ¸öºóÃŵÄÑù±¾±»·ÅÔÚÆô¶¯Îļþ¼ÐÏ£¬£¬£¬£¬£¬£¬ÎļþÔÚÏµÍ³ÖØÐÂÆô¶¯ºóÔËÐС£¡£¡£¡£¡£¡£¡£¡£³ý´ËÖ®Í⣬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±»¹·¢Ã÷ÁËRHttpCtrlºóÃźÍRCtrlºóÃÅ¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/eagle-eye-is-back-apt30/


6.Õë¶ÔÖ½ÖÊͶƱµÄ¿ÉÀ©Õ¹²àÐŵÀ¹¥»÷¿ÉÇÔȡѡÃñÒþ˽


ÍòÀû¹ú¼Ê¹ÙÍø(ÖйúÓÎ)ÓÐÏÞ¹«Ë¾


Ñо¿Ö°Ô±·¢Ã÷Õë¶ÔÖ½ÖÊͶƱµÄ¿ÉÀ©Õ¹²àÐŵÀ¹¥»÷£¬£¬£¬£¬£¬£¬¿ÉʹÓÃÆäÇÔȡѡÃñÒþ˽¡£¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±»ùÓÚArduino¿ª·¢°åºÍÂó¿Ë·ç¹¹½¨ÁËÒ»ÖÖ×°±¸£¬£¬£¬£¬£¬£¬¸Ã×°±¸Äܹ»¸ß¾«¶ÈµØ¶Ôľ×ÀÉϱê¼ÇµÄλÖþÙÐÐÈý½ÇÕÉÁ¿£¬£¬£¬£¬£¬£¬Í¨¹ýÕâÖÖ·½·¨¿ÉÒÔ»ñµÃÑ¡ÃñÔÚѡƱÉÏ×ö³öÑ¡ÔñµÄ±ê¼Ç¡£¡£¡£¡£¡£¡£¡£¡£Ö®ºóͨ¹ýÃæ²¿Ê¶±ðÀ´¾ÙÐÐÔö²¹¹¥»÷£¬£¬£¬£¬£¬£¬¼´ÔÚͶƱվÖÐ×°ÖÃÉãÏñ»ú£¬£¬£¬£¬£¬£¬ÒÔ×Ô¶¯¼ì²âÍÑÀëͶƱվµÄÖ°Ô±¡£¡£¡£¡£¡£¡£¡£¡£Á¬ÏµÕâÁ½ÖÖÒªÁ죬£¬£¬£¬£¬£¬½«Õë¶ÔÖ½ÖÊͶƱ¾ÙÐÐÍêÈ«×Ô¶¯»¯µÄ¹¥»÷¡£¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://ieeexplore.ieee.org/abstract/document/8806759/