ÐÅÏ¢Çå¾²Öܱ¨-2018ÄêµÚ37ÖÜ
Ðû²¼Ê±¼ä 2018-09-212018Äê09ÔÂ10ÈÕÖÁ16ÈÕ¹²ÊÕ¼Çå¾²Îó²î67¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇMicrosoft Word PDFÔ¶³Ì´úÂëÖ´ÐÐÎó²î£»Microsoft Jet Database Engine CVE-2018-8393»º³åÇøÒç³öÎó²î£»¶à¿îI-O DATA²úÆ·í§ÒâÏÂÁîÖ´ÐÐÎó²î£»Cisco SD-WAN Solution CVE-2018-0432¹ýʧ±¨¸æ¹¦Ð§È¨ÏÞÌáÉýÎó²î£»Micronet INplc SDK CVE-2018-0671ȨÏÞÌáÉýÎó²î¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇVeeamÒòMongoDBÉèÖùýʧµ¼ÖÂ4.45ÒÚÌõÓû§¼Í¼й¶£»Ñо¿Ö°Ô±·¢Ã÷ЮÖÆÁè¼Ý3700¸öMikroTik·ÓÉÆ÷µÄ¶ñÒâÍÚ¿óÔ˶¯£»Ñо¿Ö°Ô±³Æ¿É¹ûÕæ»á¼ûµÄ.GitĿ¼µ¼ÖÂÁè¼Ý39Íò¸öÍøÕ¾Ò×Êܹ¥»÷£»NexusguardÐû²¼2018ÄêQ2Íþв±¨¸æ£¬DDoS¹¥»÷ͬ±ÈÔöÌíÁè¼Ý500%£»ÈüÃÅÌú¿ËÐû²¼¼¾¶ÈÒƶ¯Íþв±¨¸æ£¬2017ÄêÒƶ¯¶ñÒâÈí¼þµÄбäÖÖÊýÄ¿ÔöÌí54%¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬±¾ÖÜÇå¾²ÍþвΪÖС£
¶þ¡¢Ö÷ÒªÇå¾²Îó²îÁбí
1. Microsoft Word PDFÔ¶³Ì´úÂëÖ´ÐÐÎó²î
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8430
2. Microsoft Jet Database Engine CVE-2018-8393»º³åÇøÒç³öÎó²î
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8393
3. ¶à¿îI-O DATA²úÆ·í§ÒâÏÂÁîÖ´ÐÐÎó²î
http://jvn.jp/en/jp/JVN83701666/index.html
4. Cisco SD-WAN Solution CVE-2018-0432¹ýʧ±¨¸æ¹¦Ð§È¨ÏÞÌáÉýÎó²î
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-sd-wan-escalation
5. Micronet INplc SDK CVE-2018-0671ȨÏÞÌáÉýÎó²î
Micronet INplc SDK±£´æÇå¾²Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉÌáÉýȨÏÞ£¬Ö´ÐÐí§Òâ´úÂë¡£
http://www.mnc.co.jp/INplc/info_20180907_E.htm
Èý¡¢Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/data-management-firm-exposes-445-million-records/
2¡¢Ñо¿Ö°Ô±·¢Ã÷ЮÖÆÁè¼Ý3700¸öMikroTik·ÓÉÆ÷µÄ¶ñÒâÍÚ¿óÔ˶¯
Çå¾²Ñо¿Ö°Ô±Troy Mursch·¢Ã÷Ò»¸öʹÓÃÎó²î£¨CVE-2018-14847£©Ð®ÖÆMikroTik·ÓÉÆ÷¾ÙÐÐÍÚ¿óµÄ¹¥»÷Ô˶¯¡£ËäÈ»¸Ã·ÓÉÆ÷µÄ³§ÉÌÒÑÔÚ4Ô·ÝÐû²¼ÁËÏà¹ØÐÞ¸´²¹¶¡£¬µ«ÈÔÓв¿·ÖÓû§Ã»ÓоÙÐÐÉý¼¶¡£Æ¾Ö¤Mursch±¨¸æµÄÍÚ¿ó¾ç±¾£¬ÔÚShodanÉÏ¿ÉËÑË÷µ½3734¸öMikroTik×°±¸¡£´ó´ó¶¼ÊÜѬȾµÄ×°±¸¶¼¼¯ÖÐÔÚÄÏÃÀÖÞ£¬Ö÷ÒªÊÇ°ÍÎ÷£¨2612£©ºÍ°¢¸ùÍ¢£¨480£©¡£¸ÃÍÚ¿ó¾ç±¾½«MikroTik·ÓÉÆ÷µÄCPUʹÓÃÂÊÔöÌíµ½80%²¢Ò»Á¬¾ÙÐÐÍÚ¿ó¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/over-3-700-mikrotik-routers-abused-in-cryptojacking-campaigns/
3¡¢Ñо¿Ö°Ô±³Æ¿É¹ûÕæ»á¼ûµÄ.GitĿ¼µ¼ÖÂÁè¼Ý39Íò¸öÍøÕ¾Ò×Êܹ¥»÷
Lynt ServicesµÄÑо¿Ö°Ô±Vladim¨ªrSmitka·¢Ã÷¿É¹ûÕæ»á¼ûµÄ.gitĿ¼µ¼ÖÂÁè¼Ý39Íò¸öÍøÕ¾Ò×Êܹ¥»÷¡£Ðí¶àWeb¿ª·¢Ö°Ô±Ê¹ÓÿªÔ´¹¤¾ßGitÀ´¹¹½¨Ò³Ã棬µ«ËûÃÇÍùÍù½«.gitÎļþ¼ÐÒÅÁôÔÚÍøÕ¾µÄ¹«¹²¿É»á¼û²¿·Ö£¬ÉõÖÁ°üÀ¨Ò»Ð©Ö÷ÒªµÄÐÅÏ¢£¬ÀýÈçÍøÕ¾½á¹¹µÄÐÅÏ¢¡¢Êý¾Ý¿âÃÜÂë¡¢APIÃÜÔ¿¡¢¿ª·¢IDEÉèÖõȡ£
ÔÎÄÁ´½Ó£º
https://threatpost.com/open-git-directories-leave-390k-websites-vulnerable/137299/
4¡¢NexusguardÐû²¼2018ÄêQ2Íþв±¨¸æ£¬DDoS¹¥»÷ͬ±ÈÔöÌíÁè¼Ý500%
ƾ֤NexusguardµÄ2018ÄêµÚ¶þ¼¾¶ÈÍþв±¨¸æ£¬DDoS¹¥»÷ƽ¾ùÔöÌíÁè¼Ý26Gbps£¬¹æÄ£ÔöÌíÁËÁè¼Ý500%¡£Óë2017ÄêͬÆÚÏà±È£¬DDoS¹¥»÷µÄ×î´ó¹æÄ£·ÁËËı¶£¬´ï359Gbps¡£Ñо¿Ö°Ô±³ÆÊý¾ÝµÄ¼¤ÔöÔ´ÓÚÎïÁªÍø½©Ê¬ÍøÂçSatoriµÄÔöÌí¡£×î´óµÄ0dayΣº¦À´×ÔÓÚ²î±ðµÄ¼ÒÓ÷ÓÉÆ÷£¬¹¥»÷Õß¿ÉÄÜʹÓÃÕâЩװ±¸Õë¶ÔÒªº¦·þÎñºÍÍøÂçÌᳫ´ó¹æÄ£DDoS¹¥»÷¡£Synºé·º¹¥»÷Õ¼ÓÐÁËÖ÷µ¼Ö°Î»¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/ddos-attacks-increase-in-size-by/
5¡¢ÈüÃÅÌú¿ËÐû²¼¼¾¶ÈÒƶ¯Íþв±¨¸æ£¬2017ÄêÒƶ¯¶ñÒâÈí¼þµÄбäÖÖÊýÄ¿ÔöÌí54%
ÈüÃÅÌú¿ËµÄ¼¾¶ÈÒƶ¯Íþв±¨¸æ×ܽáÁË2017ÄêµÄÒƶ¯ÍþвÊý¾Ý£¬Ö÷Òª·¢Ã÷°üÀ¨Òƶ¯¶ñÒâÈí¼þµÄ±äÖÖºÍÊýÄ¿¶¼ÓÐËùÔöÌí£¬2017ÄêÒƶ¯¶ñÒâÈí¼þ±äÖÖµÄÊýÄ¿ÔöÌíÁË54%£»²¿·ÖÒƶ¯×°±¸¼ÌÐøʹÓùýʱµÄ²Ù×÷ϵͳ£¬Ö»ÓÐ3%µÄAndroid×°±¸¸üÐÂÖÁ×îеIJÙ×÷ϵͳ°æ±¾£¬41%µÄAndroid×°±¸ÖÁÉÙȱÉÙÁ½¸öÔµÄÇå¾²²¹¶¡£¬iOS×°±¸Ïà¶Ô½ÏºÃ£¬80%µÄiOS×°±¸×°ÖÃÁË×îеĸüУ»Î£ÏÕµÄWi-FiÍøÂç±ÈÒÔÍùÈκÎʱ¼ä¶¼Ô½·¢Æձ顣
ÔÎÄÁ´½Ó£º
https://www.symantec.com/connect/es/blogs/las-amenazas-moviles