ÐÅÏ¢Çå¾²Öܱ¨-2018ÄêµÚ48ÖÜ
Ðû²¼Ê±¼ä 2018-12-03
2018Äê11ÔÂ26ÈÕÖÁ12ÔÂ02ÈÕ¹²ÊÕ¼Çå¾²Îó²î57¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇVMWare WorkstationºÍFusion CVE-2018-6983ÕûÊýÒç³öÎó²î£»Apache Hadoop CVE-2018-11766ȨÏÞÌáÉýÎó²î£»TP-Link Archer C5 ¡®wan_dyn_hostname¡¯Ô¶³ÌÏÂÁîÖ´ÐÐÎó²î£»Schneider Electric Modicon M340ÃÜÂë¸ü¸ÄÎó²î£»FreeBSD CVE-2018-17156»º³åÇøÒç³öÎó²î¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÍòºÀÂùݼ¯Íų¬´ó¹æÄ£Êý¾Ýй¶£¬²¨¼°5ÒÚÓû§£»UberÒò2016ÄêÊý¾Ý鶱»ºÉÀ¼ºÍÓ¢¹ú·£¿î120ÍòÃÀÔª£»Atrium HealthÔâºÚ¿Í¹¥»÷£¬Ô¼265Íò»¼ÕßÐÅϢй¶£»ElasticSearch·þÎñÆ÷̻¶Áè¼Ý5700ÍòÃÀ¹ú¹«ÃñµÄСÎÒ˽¼ÒÊý¾Ý£»»ùÓÚAutoCADµÄÌع¤Ô˶¯±»·¢Ã÷£¬Ö÷ÒªÕë¶ÔÄÜÔ´ÐÐÒµ¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬±¾ÖÜÇå¾²ÍþвΪÖС£
Ö÷ÒªÇå¾²Îó²îÁбí
1. VMWare WorkstationºÍFusion CVE-2018-6983ÕûÊýÒç³öÎó²î
VMWare WorkstationºÍFusion±£´æÕûÊýÒç³öÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉÖ´ÐÐí§Òâ´úÂë¡£http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6983
2. Apache Hadoop CVE-2018-11766ȨÏÞÌáÉýÎó²î
Apache Hadoop±£´æÇå¾²Îó²î£¬ÔÊÐí¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó£¬ÒÔrootȨÏÞÖ´ÐÐí§ÒâÏÂÁî¡£
https://lists.apache.org/thread.html/ff37bbbe09d5f03090e2dd2c3dea95de16ef4249e731f19b8959ce4c@%3Cgeneral.hadoop.apache.org%3E
3. TP-Link Archer C5 ¡®wan_dyn_hostname¡¯Ô¶³ÌÏÂÁîÖ´ÐÐÎó²î
TP-Link Archer C5 ¡®wan_dyn_hostname¡¯²»×¼È·´¦Öóͷ£Óû§ÊäÈëÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉÖ´ÐÐí§ÒâSHELLÏÂÁî¡£
https://github.com/JackDoan/TP-Link-ArcherC5-RCE
4. Schneider Electric Modicon M340ÃÜÂë¸ü¸ÄÎó²î
Schneider Electric Modicon M340 WEB·þÎñÆ÷±£´æÇå¾²Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ɻá¼û¡®password delete¡¯º¯Êý¸ü¸ÄÓû§ÃÜÂë¡£
https://www.schneider-electric.com/en/download/document/SEVD-2018-327-01/
5. FreeBSD CVE-2018-17156»º³åÇøÒç³öÎó²î
FreeBSDÔÚICMPʵÏÖÖб£´æ»º³åÇøÒç³öÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ɾÙÐоܾø·þÎñ¹¥»÷
https://www.freebsd.org/security/advisories/FreeBSD-EN-18:13.icmp.asc
Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢ÍòºÀÂùݼ¯Íų¬´ó¹æÄ£Êý¾Ýй¶£¬²¨¼°5ÒÚÓû§

ÍòºÀ¹ú¼ÊÂùݼ¯ÍÅ(Marriott International)½ñÈÕÐû²¼£¬ÆìÏÂϲ´ïÎÝÂùÝ(Starwood Hotel)µÄÒ»¸öÖ÷¹ËÔ¤¶©Êý¾Ý¿â±»ºÚ¿ÍÈëÇÖ£¬¿ÉÄÜÓÐÔ¼5ÒÚÖ÷¹ËµÄÐÅϢй¶¡£¸ÃÐÂÎÅÐû²¼ºó£¬ÍòºÀ¹ú¼ÊÂùݹɼÛÔÚ½ñÈÕÅÌÇ°ÉúÒâÖÐÒ»¶ÈϵøÓâ5%¡£ÍòºÀ¹ú¼ÊÂùݳƣ¬ÊÓ²ìЧ¹ûÏÔʾ£¬ÓÐһδÊÚȨ·½¸´ÖƲ¢¼ÓÃÜÁËÕâЩÊý¾Ý¡£²¢ÇÒ£¬×Ô2014Äê¾Í×îÏÈÁ˶Ôϲ´ïÎÝÂùÝÍøÂç¾ÙÐÐδÊÚȨ»á¼û¡£ÏÖÔÚ£¬ÍòºÀ¹ú¼ÊÂùÝÒѽÓÄÉÁ˵÷½â²½·¥£¬µ«²¢Î´Ðû²¼½øÒ»²½µÄÐÅÏ¢¡£ÍòºÀ¹ú¼ÊÂùݳƣ¬ÕâЩ¿ÉÄܱ»Ð¹Â¶µÄÐÅÏ¢°üÀ¨Ö÷¹ËµÄÐÕÃû¡¢Í¨Ñ¶µØµã¡¢µç»°ºÅÂë¡¢µç×ÓÓÊÏä¡¢»¤ÕÕºÅÂ롢ϲ´ïÎÝVIP¿Í»§ÐÅÏ¢¡¢³öÉúÈÕÆÚ¡¢ÐÔ±ðºÍÆäËûһЩСÎÒ˽¼ÒÐÅÏ¢¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2018/11/marriott-starwood-data-breach.html
2¡¢UberÒò2016ÄêÊý¾Ý鶱»ºÉÀ¼ºÍÓ¢¹ú·£¿î120ÍòÃÀÔª

Ó¢¹úµÄÐÅϢרԱ°ì¹«ÊÒ£¨ICO£©ÒÔ¼°ºÉÀ¼µÄÊý¾Ý±£»¤»ú¹¹Autoriteit Persoonsgegevens»®·ÖÒò2016Äê10ÔµÄÊý¾Ýй¶ÊÂÎñ¶ÔUber´¦ÒÔ38.5ÍòÓ¢°÷ºÍ60ÍòÅ·ÔªµÄ·£¿î¡£ICOÌåÏÖ¸ÃÊÂÎñÓ°ÏìÁËÓ¢¹úµÄ270ÍòUberÓû§ÒÔ¼°8.2Íò˾»ú¡£ºÉÀ¼DPA³ÆÓÐ17.4ÍòºÉÀ¼¹«ÃñÊܵ½Ó°Ïì¡£·£¿îµÄÖ÷ÒªÔµ¹ÊÔÓÉÊÇUberÑÓ³ÙÁ˽üÒ»Äê²Å±¨¸æ´Ë´Îй¶ÊÂÎñ£¬ÕâÑÏÖØÎ¥·´ÁËÏà¹ØÖ´·¨ÌõÀý£¬²¢ÇÒʹÊÜÓ°ÏìµÄÓû§ºÍ˾»úÃæÁÙ¸ü¸ßµÄÚ²ÆΣº¦¡£
https://www.bleepingcomputer.com/news/security/uber-fined-for-covering-up-2016-data-breach/
3¡¢Atrium HealthÔâºÚ¿Í¹¥»÷£¬Ô¼265Íò»¼ÕßÐÅϢй¶

ÃÀ¹ú±±¿¨ÂÞÀ³ÄÉÖÝ·ÇÓªÀûÒ½ÁÆ»ú¹¹Atrium HealthÔâºÚ¿Í¹¥»÷£¬Ô¼265Íò»¼ÕßµÄÐÅϢй¶¡£¸Ã¹¥»÷ÊÂÎñ±¬·¢ÔÚ9ÔÂ22ÈÕÖÁ9ÔÂ29ÈÕʱ´ú£¬Ð¹Â¶µÄÐÅÏ¢°üÀ¨ÐÕÃû¡¢¼Òͥסַ¡¢³öÉúÈÕÆÚ¡¢°ü¹ÜÐÅÏ¢¡¢·þÎñÈÕÆÚ¡¢Ò½ÁƼͼ±àºÅºÍÕË»§Óà¶îµÈ¡£±ðµÄ£¬ÉÐÓпìÒª70Íò¸öÉç±£ºÅÂëй¶£¬µ«Ã»ÓвÆÎñÐÅϢй¶¡£¸Ã×éÖ¯Òѽ«Ïà¹ØÊÂÎñ֪ͨFBI£¬²¢ÏòÊÜÓ°ÏìµÄ»¼ÕßÌṩÃâ·ÑµÄÐÅÓüà¿Ø·þÎñ¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/atrium-health-data-breach-exposed-2-65-million-patient-records/
4¡¢ElasticSearch·þÎñÆ÷̻¶Áè¼Ý5700ÍòÃÀ¹ú¹«ÃñµÄСÎÒ˽¼ÒÊý¾Ý

Çå¾²³§ÉÌHackenµÄÑо¿Ö°Ô±Bob Diachenkoͨ¹ýShodan·¢Ã÷ÁËÒ»¸ö¿É¹ûÕæ»á¼ûµÄElasticSearch·þÎñÆ÷£¬ÆäÊý¾Ý¿â̻¶ÁËÁè¼Ý5700ÍòÃÀ¹ú¹«ÃñµÄСÎÒ˽¼ÒÊý¾Ý¡£ÕâЩÊý¾Ý°üÀ¨ÐÕÃû¡¢µç×ÓÓʼþµØµã¡¢¼Òͥסַ¡¢ÖÝ¡¢ÓÊÕþ±àÂë¡¢µç»°ºÅÂëºÍIPµØµãµÈÐÅÏ¢¡£Ñо¿Ö°Ô±ÎÞ·¨È·Èϸ÷þÎñÆ÷µÄËùÓÐÕߣ¬µ«ËûÒÔΪ¼ÓÄôóÊý¾Ý¹«Ë¾Data£¦Leads»òÐíÓëÖ®Óйء£ÏÖÔڸ÷þÎñÆ÷Òѱ»¾ÙÐÐÇå¾²¼Ó¹Ì¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/elasticsearch-server-exposed-the-personal-data-of-over-57-million-us-citizens/
5¡¢»ùÓÚAutoCADµÄÌع¤Ô˶¯±»·¢Ã÷£¬Ö÷ÒªÕë¶ÔÄÜÔ´ÐÐÒµ

Çå¾²³§ÉÌForcepoint·¢Ã÷Ò»¸öʹÓûùÓÚAutoCADµÄ¶ñÒâÈí¼þµÄй¤ÒµÌع¤Ô˶¯£¬¸ÃÔ˶¯×Ô2014ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬Æä2018ÄêÔ˶¯µÄнüÊܺ¦ÕßÖ÷ҪλÓÚÖйú¡¢Ó¡¶È¡¢ÍÁ¶úÆäºÍ°¢ÁªÇõ¡£ForcepointÌåÏÖ¸ÃÔ˶¯±³ºóµÄÍŶӿÉÄÜÊ®·ÖÖش󣬹¥»÷ÕßÀֳɵع¥»÷ÁËλÓÚ²î±ð¹ú¼Ò/µØÇøµÄ¶à¸ö¹«Ë¾£¬ÆäÖÐÖÁÉÙÒ»¸ö¹¥»÷Ô˶¯Ö÷ÒªÕë¶ÔÄÜÔ´Òµ£¬ÁíÒ»¸ö¹¥»÷Ô˶¯×¨×¢ÓÚÆû³µÖÆÔìÒµ¡£¹¥»÷ÕßÖ÷ҪʹÓðüÀ¨¶ñÒâAutoCADÎļþ»òÏÂÔØÁ´½ÓµÄÓã²æʽ´¹ÂÚÓʼþʵÑé¹¥»÷£¬ÕâЩAutoCADÎļþÖаüÀ¨Òþ²ØµÄ.fasÄ£¿é£¨ÀàËÆÓÚwordÖеĺ꣩£¬ÓÃÓÚÅþÁ¬Ô¶³ÌC&C²¢ÏÂÔØÆäËü¶ñÒâÈí¼þ¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/new-industrial-espionage-campaign-leverages-autocad-based-malware/
ÉùÃ÷£º±¾×ÊѶÓÉÓÅ·¢¹ú¼ÊÍøÕ¾¹ÙÍøάËûÃüÇ徲С×é·ÒëºÍÕûÀí