ÐÅÏ¢Çå¾²Öܱ¨-2020ÄêµÚ42ÖÜ

Ðû²¼Ê±¼ä 2020-10-19

> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2020Äê10ÔÂ12ÈÕÖÁ10ÔÂ18ÈÕ¹²ÊÕ¼Çå¾²Îó²î62¸ö£¬£¬£¬ £¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇAdobe Flash Player¿ÕÖ¸ÕëÒýÓÃÔ¶³Ì´úÂëÖ´ÐÐÎó²î £» £»£»Microsoft Windows Hyper-V CVE-2020-1047ȨÏÞÌáÉýÎó²î £» £»£»SAP Solution Manager OSÏÂÁî×¢ÈëÎó²î £» £»£»Microhard Bullet-LTE PingÏÂÁî×¢Èë´úÂëÖ´ÐÐÎó²î £» £»£»Veritas APTAREÊÚȨ¼ì²é´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£¡£ ¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇBlackBerryÐû²¼¹ØÓÚBAHAMUT×éÖ¯µÄÆÊÎö±¨¸æ £» £»£»LumuÐû²¼2020Äê¶ÈÀÕË÷Èí¼þÓ°ÏìÆÊÎöµÄÐÅϢͼ £» £»£»AdobeÐÞ¸´Flash PlayerÖеÄÔ¶³ÌÖ´ÐдúÂëÎó²î £» £»£»AgariÐû²¼BECÔÚÈ«Çò¹æÄ£ÄÚÂþÑܺÍÇ÷ÊÆµÄÆÊÎö±¨¸æ £» £»£»CNSAÐû²¼¡¶2020ÖйúÍøÂçÊÓÌýÉú³¤Ñо¿±¨¸æ¡·¡£¡£¡£¡£¡£ ¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬ £¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£ ¡£¡£¡£


Ö÷ÒªÇå¾²Îó²îÁбí


1.Adobe Flash Player¿ÕÖ¸ÕëÒýÓÃÔ¶³Ì´úÂëÖ´ÐÐÎó²î


Adobe Flash Player´¦Öóͷ£SWF±£´æ¿ÕÖ¸ÕëÒýÓÃÎó²î£¬£¬£¬ £¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬ £¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬ £¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ £» £»£»òÕßÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£ ¡£¡£¡£

https://helpx.adobe.com/security/products/flash-player/apsb20-58.html


2.Microsoft Windows Hyper-V CVE-2020-1047ȨÏÞÌáÉýÎó²î


Microsoft Windows Hyper-V´¦Öóͷ£Äڴ湤¾ß±£´æÇå¾²Îó²î£¬£¬£¬ £¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬ £¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬ £¬£¬£¬¿ÉÌáÉýȨÏÞ¡£¡£¡£¡£¡£ ¡£¡£¡£

https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2020-1047


3.SAP Solution Manager OSÏÂÁî×¢ÈëÎó²î


SAP Solution ManagerµÄCA Introscope Enterprise Manager±£´æÊäÈëÑéÖ¤Îó²î£¬£¬£¬ £¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬ £¬£¬£¬ÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§ÒâOSÏÂÁî¡£¡£¡£¡£¡£ ¡£¡£¡£

https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=558632196


4.Microhard Bullet-LTE PingÏÂÁî×¢Èë´úÂëÖ´ÐÐÎó²î


Microhard Bullet-LTE tools.sh´¦Öóͷ£ping²ÎÊý±£´æÊäÈëÑéÖ¤Îó²î£¬£¬£¬ £¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬ £¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£ ¡£¡£¡£

https://www.zerodayinitiative.com/advisories/ZDI-20-1205/


5.Veritas APTAREÊÚȨ¼ì²é´úÂëÖ´ÐÐÎó²î


Veritas APTAREÊÚȨ¼ì²é±£´æÇå¾²Îó²î£¬£¬£¬ £¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬ £¬£¬£¬ÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£ ¡£¡£¡£


https://www.veritas.com/content/support/en_US/security/VTS20-006#issue1


> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢BlackBerryÐû²¼¹ØÓÚBAHAMUT×éÖ¯µÄÆÊÎö±¨¸æ


1.jpg


BlackBerryÐû²¼Á˹ØÓÚBAHAMUTÍøÂçÌØ¹¤×éÖ¯µÄÆÊÎö±¨¸æ£¬£¬£¬ £¬£¬£¬·¢Ã÷Æä¶ÔÕþ¸®¹ÙÔ±ºÍÖ÷ÒªÐÐÒµÌᳫÁË´ó×ڸ߶ÈÖØ´óµÄ¹¥»÷¡£¡£¡£¡£¡£ ¡£¡£¡£Ñо¿Åú×¢£¬£¬£¬ £¬£¬£¬¸ÃÍÅ»ïµÄ»î¶¯¹æÄ£±ÈÒÔǰÒÔΪµÄÒªÆÕ±éµÃ¶à£¬£¬£¬ £¬£¬£¬°üÀ¨ÁËGoogle PlayÊÐËÁºÍApp StoreÖеÄÊ®¼¸¸ö¶ñÒâÓ¦ÓóÌÐò¡£¡£¡£¡£¡£ ¡£¡£¡£±ðµÄ£¬£¬£¬ £¬£¬£¬BlackBerry»¹ÒÔΪ£¬£¬£¬ £¬£¬£¬BAHAMUT¿ÉÒÔÓëÖÁÉÙÒ»Ãû0day¿ª·¢Ö°Ô±½Ó´¥£¬£¬£¬ £¬£¬£¬²¢Ê¹ÓÃ0day¹¥»÷¶à¸öÄ¿µÄ£¬£¬£¬ £¬£¬£¬ÕâÔ¶Ô¶Áè¼ÝÁË´ó´ó¶¼ÆäËûºÚ¿Í×éÖ¯µÄ¹¥»÷ˮƽ¡£¡£¡£¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/cyber-espionage-bahamut-staggering/


2¡¢LumuÐû²¼2020Äê¶ÈÀÕË÷Èí¼þÓ°ÏìÆÊÎöµÄÐÅϢͼ


2.jpg


LumuÐû²¼ÁËÒ»ÕÅÐÅϢͼ£¬£¬£¬ £¬£¬£¬Ïêϸ˵Ã÷ÎúÀÕË÷Èí¼þµÄ±¾Ç®ºÍ¹æÄ££¬£¬£¬ £¬£¬£¬ÒÔ×ÊÖúÆóҵȨºâËûÃǵÄÊܺ¦Î£º¦¡£¡£¡£¡£¡£ ¡£¡£¡£¾ÝÆÊÎö£¬£¬£¬ £¬£¬£¬½ñÄêÈ«ÇòÀÕË÷Èí¼þµÄ±¾Ç®Îª200ÒÚÃÀÔª£¬£¬£¬ £¬£¬£¬Æ½¾ùÿ´ÎµÄ¹¥»÷±¾Ç®Áè¼Ý400ÍòÃÀÔª£¬£¬£¬ £¬£¬£¬²¢ÇÒÓÐ36£¥µÄÊܺ¦ÕßÖ§¸¶ÁËÊê½ð£¬£¬£¬ £¬£¬£¬ÆäÖÐ17£¥»¹Ã»ÄÜÍì»ØËûÃǵÄÊý¾Ý¡£¡£¡£¡£¡£ ¡£¡£¡£±ðµÄ£¬£¬£¬ £¬£¬£¬ÔÚ±±ÃÀÓÐ69%µÄ¹«Ë¾±¨¸æ³ÆÊܵ½ÁËÀÕË÷Èí¼þµÄÓ°Ï죬£¬£¬ £¬£¬£¬¶øÔÚÅ·ÖÞÓÐ57%¡£¡£¡£¡£¡£ ¡£¡£¡£Ïà½Ï¶øÑÔ£¬£¬£¬ £¬£¬£¬±±ÃÀµÄÕþ¸®»ú¹¹Êܵ½µÄ¹¥»÷×îΪÑÏÖØ£¬£¬£¬ £¬£¬£¬Æä´ÎÊÇÖÆÔìÒµºÍÐÞ½¨Òµ¡£¡£¡£¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://lumu.io/resources/2020-ransomware-flashcard/


3¡¢AdobeÐÞ¸´Flash PlayerÖеÄÔ¶³ÌÖ´ÐдúÂëÎó²î


3.jpg


AdobeÐÞ¸´ÁËFlash PlayerÖÐÑÏÖØµÄÔ¶³ÌÖ´ÐдúÂëÎó²î£¨³ÆÎªCVE-2020-9746£©¡£¡£¡£¡£¡£ ¡£¡£¡£AdobeÖ¸³ö£¬£¬£¬ £¬£¬£¬ÔÚĬÈÏÇéÐÎÏ£¬£¬£¬ £¬£¬£¬ºÚ¿Í¿ÉÒÔͨ¹ýÔÚÓû§»á¼ûÍøÕ¾Ê±ÔÚTLS / SSLת´ïµÄHTTPÏìÓ¦ÖвåÈë¶ñÒâ×Ö·û´®À´Ê¹ÓôËÎó²î¡£¡£¡£¡£¡£ ¡£¡£¡£ÀÖ³ÉʹÓôËÎó²îºó£¬£¬£¬ £¬£¬£¬¿ÉÄܵ¼ÖÂÓ¦ÓÃÍ߽⣬£¬£¬ £¬£¬£¬´Ó¶øÊ¹¹¥»÷Õß¿ÉÒÔÔÚ»á¼ûÕßµÄÅÌËã»úÉÏÔ¶³ÌÖ´ÐÐÏÂÁî¡£¡£¡£¡£¡£ ¡£¡£¡£ÕâЩÏÂÁÔÚÓû§µÄÇå¾²ÇéÐÎÖÐÖ´ÐУ¬£¬£¬ £¬£¬£¬²¢²»ÐèÒªÖÎÀíԱȨÏÞ¡£¡£¡£¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/adobe-fixes-critical-security-vulnerability-in-flash-player/


4¡¢AgariÐû²¼BECÔÚÈ«Çò¹æÄ£ÄÚÂþÑܺÍÇ÷ÊÆµÄÆÊÎö±¨¸æ


4.jpg


AgariÍøÂçÇ鱨²¿£¨ACID£©Ðû²¼ÁËBECÔÚÈ«Çò¹æÄ£ÄÚÂþÑܺÍÇ÷ÊÆµÄÆÊÎö±¨¸æ£¬£¬£¬ £¬£¬£¬ÒÔ¸üºÃµØÏàʶBEC¹¥»÷»î¶¯¡£¡£¡£¡£¡£ ¡£¡£¡£±¨¸æ°üÀ¨ÁË2019Äê5ÔÂÖÁ2020Äê7ÔÂÖ®¼äµÄ9000¶à´Î·ÀÓù»î¶¯µÄÊý¾Ý£¬£¬£¬ £¬£¬£¬·¢Ã÷ÓÐ60£¥µÄ¹¥»÷ÕßÀ´×Ô·ÇÖÞµÄ11¸ö¹ú¼Ò£¬£¬£¬ £¬£¬£¬ÆäÖÐ83£¥Î»ÓÚÄáÈÕÀûÑÇ¡£¡£¡£¡£¡£ ¡£¡£¡£½ü30£¥µÄ¹¥»÷ÕßÀ´×ÔÃÀÖÞ£¬£¬£¬ £¬£¬£¬ÆäÖеÄ89£¥À´×ÔÃÀ¹ú£¬£¬£¬ £¬£¬£¬²¢ÇÒ¹¥»÷ÕßÖ÷ҪȺ¼¯ÔÚһЩ´ó¶¼ÊУ¬£¬£¬ £¬£¬£¬°üÀ¨ÑÇÌØÀ¼´ó¡¢Å¦Ô¼¡¢ÂåÉ¼í¶¡¢ÐÝ˹¶ØºÍÂõ°¢ÃÜ¡£¡£¡£¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.agari.com/email-security-blog/business-email-compromise-geography/


5¡¢CNSAÐû²¼¡¶2020ÖйúÍøÂçÊÓÌýÉú³¤Ñо¿±¨¸æ¡·


5.jpg


10ÔÂ12ÈÕ£¬£¬£¬ £¬£¬£¬ÖйúÍøÂçÊÓÌý½ÚĿЧÀÍЭ»áÐû²¼¡¶2020ÖйúÍøÂçÊÓÌýÉú³¤Ñо¿±¨¸æ¡·£¬£¬£¬ £¬£¬£¬Ê׶ȹûÕæÎÒ¹úÍøÂçÊÓÌýÓû§¹æÄ£ºÍ¹¤Òµ¹æÄ£¡£¡£¡£¡£¡£ ¡£¡£¡£¸Ã±¨¸æ»ùÓÚÊý¾ÝÍÚ¾ò¡¢µ÷ÑÐÒÔ¼°µÚÈý·½Êý¾Ý£¬£¬£¬ £¬£¬£¬¶Ô2019-2020ÄêµÄÍøÂçÊÓÌýÐÐÒµÏÖ×´ºÍÉú³¤Ç÷ÊÆ¾ÙÐÐȨÍþ¡¢ÖÜÈ«µÄÑÐÅС£¡£¡£¡£¡£ ¡£¡£¡£±¨¸æÏÔʾ£¬£¬£¬ £¬£¬£¬×èÖ¹2020Äê6Ô£¬£¬£¬ £¬£¬£¬ÎÒ¹úÍøÂçÊÓÌýÓû§¹æÄ£´ï9.01ÒÚ£¬£¬£¬ £¬£¬£¬ 2019ÄêÍøÂçÊÓÌý¹¤Òµ¹æÄ£´ï4541.3ÒÚ¡£¡£¡£¡£¡£ ¡£¡£¡£ÆäÖжÌÊÓÆµµÄÓû§Ê¹ÓÃÂÊ×î¸ß£¬£¬£¬ £¬£¬£¬´ï87.0%£¬£¬£¬ £¬£¬£¬Óû§¹æÄ£8.18ÒÚ £» £»£»×ÛºÏÊÓÆµµÄÓû§Ê¹ÓÃÂÊΪ77.1%£¬£¬£¬ £¬£¬£¬Óû§¹æÄ£7.24ÒÚ¡£¡£¡£¡£¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

http://www.xinhuanet.com/info/2020-10/13/c_139436283.htm