ÐÅÏ¢Çå¾²Öܱ¨-2020ÄêµÚ02ÖÜ

Ðû²¼Ê±¼ä 2020-01-13


±¾ÖÜÇ徲̬ÊÆ×ÛÊö


2020Äê01ÔÂ06ÈÕÖÁ12ÈÕ¹²ÊÕ¼Çå¾²Îó²î57¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇCisco Webex Video Mesh Software WEBÏÂÁî×¢ÈëÎó²î; Mozilla Firefox Windows XPCVariant.cppÀàÐÍ»ìÏý´úÂëÖ´ÐÐÎó²î £»Android Realtek rtlwifi driverÔ¶³Ì´úÂëÖ´ÐÐÎó²î £»Android Sound subsystemȨÏÞÌáÉýÎó²î £»Billion Smart Energy Router SG600R2ÏÂÁîÖ´ÐÐÎó²î ¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇUpstream SecurityÐû²¼2020°æ¡¶Æû³µÍøÂçÇå¾²±¨¸æ¡· £»Î¢ÈíÐû²¼RDP±©Á¦¹¥»÷ÆÊÎö±¨¸æ£¬Æ½¾ùÒ»Á¬Ê±¼äΪ2-3Ìì £»MITREÐû²¼ÊÊÓÃÓÚ¹¤Òµ¿ØÖÆϵͳµÄATT£¦CK¿ò¼Ü £»Î¢ÈíÐÞ¸´AccessÖеÄÐÅϢй¶Îó²î£¨CVE-2019-1463£© £»MozillaÐû²¼¸üÐÂ,ÐÞ¸´Firefox 0dayÎó²î(CVE-2019-11707) ¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬±¾ÖÜÇå¾²ÍþвΪÖÐ ¡£



Ö÷ÒªÇå¾²Îó²îÁбí


1. Cisco Webex Video Mesh Software WEBÏÂÁî×¢ÈëÎó²î


Cisco Webex Video Mesh Software releases WEB½Ó¿Ú±£´æÇå¾²Îó²î£¬ÔÊÐíͨ¹ýÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó£¬ÒÔROOTȨÏÞÖ´ÐÐí§ÒâÏÂÁî ¡£

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-webex-video


2. Mozilla Firefox Windows XPCVariant.cppÀàÐÍ»ìÏý´úÂëÖ´ÐÐÎó²î


Mozilla Firefox XPCVariant.cpp±£´æÀàÐÍ»ìÏýÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄWEBÇëÇó£¬ÓÕʹÓû§ÆÊÎö£¬¿ÉʹӦÓóÌÐò±ÀÀ £»òÖ´ÐÐí§Òâ´úÂë ¡£

https://www.mozilla.org/en-US/security/advisories/mfsa2020-02/


3. Android Realtek rtlwifi driverÔ¶³Ì´úÂëÖ´ÐÐÎó²î


Android Realtek rtlwifi driver±£´æδÃ÷Çå¾²Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó£¬ÒÔϵͳȨÏÞÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë ¡£

https://source.android.google.cn/security/bulletin/2020-01-01


4. Android Sound subsystemȨÏÞÌáÉýÎó²î


Android Sound subsystem±£´æδÃ÷Çå¾²Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉÌáÉýȨÏÞ ¡£

https://source.android.google.cn/security/bulletin/2020-01-01


5. Billion Smart Energy Router SG600R2ÏÂÁîÖ´ÐÐÎó²î


Billion Smart Energy Router SG600R2°üÀ¨system_command.asp¾ç±¾ÒÔrootȨÏÞÖ´ÐУ¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔrootȨÏÞÖ´ÐÐí§ÒâÏÂÁî ¡£

https://github.com/InnotecSystem/Device-Reversing/wiki/Firmware-Inspection


Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢Upstream SecurityÐû²¼2020°æ¡¶Æû³µÍøÂçÇå¾²±¨¸æ¡·


ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


Upstream Security2020°æ¡¶Æû³µÍøÂçÇå¾²±¨¸æ¡·»ùÓÚ¶ÔÒÑÍùÊ®ÄêÖÐ367Æð¹ûÕ汨¸æµÄÆû³µÍøÂçÇå¾²ÊÂÎñ¾ÙÐÐÆÊÎö£¬ÖصãÇ¿µ÷ÁË2019Äêʱ´ú·¢Ã÷µÄÎó²îÓë¿´·¨ ¡£¸Ã±¨¸æÖ¸³ö£¬»¥ÁªÍøÆû³µÒÑÔÚ½ÓÊÜÆû³µÊг¡£¬ÏÖÔÚÒÑÓÐ3.3ÒÚÁ¾»¥ÁªÍøÆû³µ£¬ÕâÒâζ×Åÿ´Î¹¥»÷µÄDZÔÚÆÆËðÁ¦³É±¶ÔöÌí£¬´ó¹æÄ£µÄ¹¥»÷ÊÂÎñ¿ÉÄÜ»áÆÆËðÕû¸ö¶¼»á£¬ÉõÖÁµ¼ÖÂÔÖÄÑÐÔµÄÉúÃüËðʧ ¡£×Ô2016ÄêÒÔÀ´£¬Ã¿ÄêÆû³µÍøÂçÇå¾²ÊÂÎñµÄÊýÄ¿ÔöÌíÁË605%£¬½ö2019ÄêÒ»Äê¾ÍÔöÌíÁËÒ»±¶ÒÔÉÏ ¡£ÔÚ2019Ä꣬ÓÐ57%µÄÊÂÎñÊÇÓÉÍøÂç×ï·¸¾ÙÐеÄ£¬ÆäÄ¿µÄÊÇÆÆËðÓªÒµ¡¢ÇÔÈ¡¿î×Ó»òË÷ÒªÊê½ð ¡£½öÓÐ38%ÊÇÑо¿Ö°Ô±µÄ±¨¸æ£¬ÆäÄ¿µÄÏò¹«Ë¾ºÍÏûºÄÕß¾¯ÃܸæÏÖµÄÎó²î ¡£


Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2020/01/06/automotive-cybersecurity-incidents/


2¡¢Î¢ÈíÐû²¼RDP±©Á¦¹¥»÷ÆÊÎö±¨¸æ£¬Æ½¾ùÒ»Á¬Ê±¼äΪ2-3Ìì


ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


΢ÈíÐû²¼ÁËÒ»·ÝÕë¶ÔRDP±©Á¦¹¥»÷µÄÆÊÎö±¨¸æ£¬¸ÃÏîÑо¿ÊÇ»ùÓÚ´ÓÁè¼Ý4.5Íò¸ö×°ÖÃÁËÃâ·ÑMicrosoft Defender ATPµÄÊÂÇéÕ¾ÉÏÍøÂçµÄÊý¾Ý ¡£ÕâЩÊý¾ÝÓëʧ°ÜºÍÀֳɵÄRDPµÇ¼ÊÂÎñÓйأ¨»®·ÖÊÇIDΪ4265ºÍ4264µÄWindowsÊÂÎñ£©£¬²¢ÇÒÉæ¼°Óû§/¹¥»÷Õß¿ÉÄÜʹÓõÄÓû§ÃûÏêϸÐÅÏ¢£¬Êý¾ÝÍøÂçÁ˼¸¸öÔµÄʱ¼ä ¡£Î¢ÈíÔÚ±¨¸æÖÐÌåÏÖ£¬×î½üÊӲ쵽µÄRDP±©Á¦¹¥»÷ƽ¾ùÒ»Á¬2-3Ì죬Լ90£¥µÄ°¸ÀýÒ»Á¬Ê±¼äÔÚÒ»ÖÜÄÚ£¬Ö»Óв»µ½5£¥µÄ°¸ÀýÒ»Á¬Ê±¼äÔÚÁ½ÖÜ»òÒÔÉÏ ¡£Ô¼ÓÐ0.08£¥µÄRDP±©Á¦¹¥»÷ÀֳɾÙÐÐÁ˵Ǽ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.microsoft.com/security/blog/2019/12/18/data-science-for-cybersecurity-a-probabilistic-time-series-model-for-detecting-rdp-inbound-brute-force-attacks/


3¡¢MITREÐû²¼ÊÊÓÃÓÚ¹¤Òµ¿ØÖÆϵͳµÄATT£¦CK¿ò¼Ü


ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


±¾ÖܶþMITERÐû²¼ÁËÆäATT£¦CK¿ò¼ÜµÄ³õʼ°æ±¾£¬¸Ã°æ±¾Öصã¹Ø×¢ÁËÕë¶Ô¹¤Òµ¿ØÖÆϵͳ£¨ICS£©µÄ¶ñÒâ¹¥»÷ÕßʹÓõÄÕ½ÂÔºÍÊÖÒÕ ¡£Ö¼ÔÚ×ÊÖúÒªº¦»ù´¡ÉèÊ©ºÍÆäËûʹÓÃICSµÄ×éÖ¯ÆÀ¹ÀÆäÍøÂçΣº¦ ¡£³ýÁËÌṩ¹¥»÷Õ½ÂÔºÍÊÖÒÕ¾ØÕóÍ⣬»¹ÏÈÈÝÁ˹¥»÷ÊÖÒÕµÄϸ½Ú¡¢¹¥»÷ÕßʹÓõĶñÒâÈí¼þÒÔ¼°ÒÑÖªµÄÕë¶ÔICSµÄ·¸·¨ÍÅ»ï ¡£Ëü»¹°üÀ¨Ò»¸ö×ʲúÖÖ±ð£¬ÓÃÓÚ×ÊÖú×éÖ¯Ïàʶ¿ÉÓ¦ÓÃÓÚÆäÇéÐεÄÊÖÒÕ ¡£´Ë°æ±¾ÐÎòÁË81ÖÖ¹¥»÷ÊÖÒÕ¡¢17ÖÖ¶ñÒâÈí¼þ¡¢10¸ö·¸·¨ÍÅ»ïºÍ7ÖÖ×ʲú ¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/mitre-releases-attck-knowledge-base-industrial-control-systems


4¡¢Î¢ÈíÐÞ¸´AccessÖеÄÐÅϢй¶Îó²î£¨CVE-2019-1463£©


ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


µç×ÓÓʼþÇå¾²¹«Ë¾Mimecast͸¶£¬Microsoft AccessÖеÄÐÅϢй¶Îó²î¿ÉÄܵ¼ÖÂϵͳÄÚ´æÖеÄÃô¸ÐÊý¾Ý±»ÎÞÒâÖÐÉúÑÄÔÚÊý¾Ý¿âÎļþÖÐ ¡£¸ÃÎó²î£¨CVE-2019-1463£©±»³ÆΪMDB Leaker£¬Óë¡°Ó¦ÓóÌÐò¶ÔϵͳÄÚ´æµÄ²»µ±ÖÎÀí¡±ÓйØ£¬Ëü¿ÉÄܵ¼ÖÂδ³õʼ»¯µÄÄÚ´æÔªËصÄÄÚÈÝÉúÑĵ½Microsoft Access MDBÎļþÖÐ ¡£Ö»¹ÜÕâЩÊý¾Ý¿ÉÄܺÁÎÞÓô¦£¬µ«ËüÒ²¿ÉÄÜ°üÀ¨¸ß¶ÈÃô¸ÐµÄÐÅÏ¢£¬ÀýÈçÃÜÂë¡¢WebÇëÇó¡¢Ö¤ÊéÒÔ¼°Óò»òÓû§Êý¾Ý ¡£MimecastÌåÏÖÏÖÔÚ²»»áÐû²¼ÓйØCVE-2019-1463µÄÈκÎÊÖÒÕÐÅÏ¢£¬Ò²Ã»ÓÐÖ¤¾ÝÅú×¢¸ÃÎó²îÒÑÔÚÒ°ÍⱻʹÓà ¡£Î¢ÈíÒÑÔÚ2019Äê12ÔµIJ¹¶¡¸üÐÂÖÐÐÞ¸´Á˸ÃÎó²î£¬Æ¾Ö¤Î¢ÈíµÄ˵·¨£¬¸ÃÎó²î»áÓ°ÏìOffice 2010¡¢2013¡¢2016¡¢2019ºÍ365 ProPlus ¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/microsoft-access-files-could-include-unintentionally-saved-sensitive-data


5¡¢MozillaÐû²¼¸üÐÂ,ÐÞ¸´Firefox 0dayÎó²î(CVE-2019-11707)


ÓÅ·¢¹ú¼Ê¡¤ËæÓŶø¶¯Ò»´¥¼´·¢


MozillaÐû²¼ÁËFirefox 72.0.1ºÍFirefox ESR 68.4.1£¬ÐÞ¸´ÒÑÔÚÒ°Íâ±»Æð¾¢Ê¹ÓõÄ0day£¨CVE-2019-11707£© ¡£¸ÃÎó²î±»¹éÀàΪÀàÐÍ»ìÏýÎó²î£¬Ó°ÏìÁËIonMonkey JIT±àÒëÆ÷£¬Æ¾Ö¤MozillaµÄÇ徲ͨ¸æ£¬IonMonkey JIT±àÒëÆ÷ÖÐÓÃÓÚÉèÖÃÊý×éÔªËصÄÓÖÃûÐÅÏ¢²»×¼È·£¬¿ÉÄܻᵼÖÂÀàÐÍ»ìÏý ¡£Ç±ÔÚ¹¥»÷Õß¿Éͨ¹ý½«Óû§Öض¨ÏòÖÁ¶ñÒâÍøÒ³À´´¥·¢¸ÃÎó²î£¬µ¼Ö´úÂëÖ´Ðлò´¥·¢Í߽⠡£ÃÀ¹úCISAÒ²·¢³öÖÒÑԳƹ¥»÷Õß¿ÉÄÜʹÓôËÎó²îÀ´¿ØÖÆÊÜÓ°ÏìµÄϵͳ£¬²¢½¨ÒéÓû§Éó²éMozillaÇ徲ת´ïºÍÓ¦ÓÃÇå¾²¸üР¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/mozilla-firefox-7201-patches-actively-exploited-zero-day/