PAN OS±£´æCVSSv3ÆÀ·Ö10µÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¬£¬£¬£¬£¬¿ÉÈÆ¹ý·À»ðǽ£»£»£»£»ºÚ¿Íй¶°ÍÎ÷×Üͳ¼°20Íò¹«ÎñԱСÎÒ˽¼ÒÐÅÏ¢

Ðû²¼Ê±¼ä 2020-06-30

1.PAN OS±£´æCVSSv3ÆÀ·Ö10µÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¬£¬£¬£¬£¬¿ÉÈÆ¹ý·À»ðǽ


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


Palo Alto NetworksÅû¶ÁËÒ»¸öÖØ´óÎó²î£¨CVE-2020-2021£©£¬£¬£¬£¬£¬¸ÃÎó²î¿ÉʹºÚ¿ÍÈÆ¹ý·À»ðǽºÍÆä¹«Ë¾VPN²úÆ·µÄÉí·ÝÑéÖ¤¡£¡£¡£¡£¡£¡£¸ÃÎó²îÊÇÔÚCVSSv3ÑÏÖØÆ·¼¶ÖлñµÃ10·ÖµÄÓÐÊýÎó²îÖ®Ò»£¬£¬£¬£¬£¬¼È²»ÐèÒª¸ß¼¶ÊÖÒÕÊÖÒÕ£¬£¬£¬£¬£¬ÓÖ¿ÉÒÔͨ¹ýInternet¾ÙÐÐÔ¶³ÌʹÓᣡ£¡£¡£¡£¡£ºÚ¿Í¿ÉÒÔʹÓøÃÎó²î¸ü¸ÄPAN OSµÄÉèÖú͹¦Ð§£¬£¬£¬£¬£¬À´ÊµÏÖ¹¥»÷¡£¡£¡£¡£¡£¡£ÃÀ¹úÍøÂç˾ÁÔòÒªÇóËùÓÐÊÜCVE-2020-2021Ó°ÏìµÄ×°±¸Á¬Ã¦ÐÞ¸´¸ÃÎó²î£¬£¬£¬£¬£¬²¢ÌåÏÖÍâ¹úµÄAPT×éÖ¯¿ÉÄܺܿì¾Í»áʵÑéʹÓøÃÎó²îÌᳫ¹¥»÷¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/us-cyber-command-says-foreign-hackers-will-most-likely-exploit-new-pan-os-security-bug/


2.ºÚ¿Íй¶°ÍÎ÷×Üͳ¼°20Íò¹«ÎñԱСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬£¬¾¯·½ÈÔÔÚÊÓ²ìÖÐ


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


ºÚ¿Í×éÖ¯Anonymous BrazilÉù³Æ£¬£¬£¬£¬£¬°ÍÎ÷×Üͳ²©¶ûË÷ÄÉÂÞºÍËûµÄ¶ù×Ó£¬£¬£¬£¬£¬ÒÔ¼°¶àÃû²¿³¤µÄСÎÒ˽¼ÒÏêϸÐÅÏ¢ÒѾ­Ð¹Â¶£¬£¬£¬£¬£¬Ëæºó°ÍÎ÷Áª°î¾¯Ô±¶Ô´ËÊÂÎñÕö¿ªÁËÊӲ졣¡£¡£¡£¡£¡£ÊӲ췢Ã÷£¬£¬£¬£¬£¬³ýÁËÔÚÍøÉÏ×ß©µÄÐÅÏ¢Í⣬£¬£¬£¬£¬¸ÃºÚ¿Í×éÖ¯»¹ÍµÈ¡ÁËÁè¼Ý20ÍòÃûÎäÊ¿ºÍÕþ¸®¹ÙÔ±µÄÊý¾Ý¡£¡£¡£¡£¡£¡£ÎªÍµÊØÐÅÏ¢£¬£¬£¬£¬£¬ºÚ¿Í¹¥»÷Á˶à¸öÖݵĴóѧ¡¢ÊÐÕþÌüºÍÊÐÒé»áϵͳ£¬£¬£¬£¬£¬½öÔÚÄÏÀï°Â¸ñÀ¼µÂÖÝ£¬£¬£¬£¬£¬¾ÍÓÐ90¶à¸ö»ú¹¹Ôâµ½¹¥»÷¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬¾¯·½¶Ô´ËÊÂÈÔÔÚÊÓ²ìÖС£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/brazilian-federal-police-investigates-presidential-data-leak/    


3.SnykÐû²¼±¨¸æ£¬£¬£¬£¬£¬¿ªÔ´Èí¼þ°üÖеÄÐÂÎó²î±ÈÈ¥ÄêϽµÁË20£¥


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


SnykÐû²¼±¨¸æÌåÏÖ£¬£¬£¬£¬£¬½ñÄ꿪ԴÈí¼þ°üÖеÄÐÂÎó²îÊýÄ¿±ÈÈ¥ÄêϽµÁË20£¥¡£¡£¡£¡£¡£¡£¸Ã±¨¸æ¶ÔÄÇЩӰÏìÁËʹÓÿªÔ´¿â×éÖ¯µÄÕûÌåÇå¾²ÐÔµÄÎó²îºÍ6¸öÖ÷Á÷µÄÉú̬ϵͳ¾ÙÐÐÁËÑо¿¡£¡£¡£¡£¡£¡£Ñо¿·¢Ã÷£¬£¬£¬£¬£¬ÔÚ2019Ä꣬£¬£¬£¬£¬ÐÂÎó²îïÔÌ­Á˽ü20£¥£»£»£»£»¿çÕ¾¾ç±¾Îó²îÒÀÈ»ÊÇÊÇ×î³£¼ûµÄÎó²î£»£»£»£»³£¼ûLinux¿¯ÐаæÖб¨¸æµÄÐÂÎó²îÅú×¢£¬£¬£¬£¬£¬ÐèÒªÖÜÈ«¼àÊÓÈÝÆ÷Ó³ÏñÖеÄÐÂÎó²î£»£»£»£»ÔÚ´ó´ó¶¼Éú̬ϵͳÖУ¬£¬£¬£¬£¬SQL×¢ÈëÎó²îÊýÄ¿ÓÐËù½µµÍ£¬£¬£¬£¬£¬Ê¹ÓÃPHPµÄÎó²îÈ´ÓÐËùÔöÌí¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.helpnetsecurity.com/2020/06/29/vulnerabilities-open-source-packages/


4.¹¥»÷µÂÖÝTxDOTµÄÀÕË÷Èí¼þΪRansom X£¬£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÕþ¸®ºÍÆóÒµ


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


¾­ÊӲ죬£¬£¬£¬£¬¹¥»÷Á˵ÿËÈøË¹ÖÝ·¨ÔººÍµÃ¿ËÈøË¹Öݽ»Í¨ÔËÊ䲿 £¨TxDOT£©µÄÀÕË÷Èí¼þΪRansom X£¬£¬£¬£¬£¬ÆäÖ÷ÒªÕë¶ÔÕþ¸®ºÍÆóÒµ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Í¨¹ý¶ÔRansom XÑù±¾µÄÑо¿£¬£¬£¬£¬£¬·¢Ã÷Æä¿ÉÒÔ½«ÖÕÖ¹ÓëÇå¾²Èí¼þ¡¢Êý¾Ý¿âЧÀÍÆ÷¡¢MSPÈí¼þ¡¢Ô¶³Ì»á¼û¹¤¾ßºÍÓʼþЧÀÍÆ÷ÓйصÄ289¸öÀú³Ì£¬£¬£¬£¬£¬Ëü»¹¿ÉÒÔÈÆ¹ýÖÖÖÖWindowsϵͳÎļþ¼ÐÒÔ¼°Ê¹ÓÃÁ˰üÀ¨.ani¡¢.cabºÍ.cplÔÚÄÚµÄÊýÊ®¸öÀ©Õ¹ÃûµÄËùÓÐÎļþ¡£¡£¡£¡£¡£¡£Í¨¹ýÈÆ¹ýÕâЩÎļþ¼Ð£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔ¼ÓÃÜÅÌËã»ú£¬£¬£¬£¬£¬Í¬Ê±Ò²¿ÉÒÔ¹¥»÷ÍøÂçÉÏµÄÆäËûÅÌËã»ú£¬£¬£¬£¬£¬¶ø²»±Øµ£Ðį乤¾ß±»¼ÓÃÜ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/new-ransom-x-ransomware-used-in-texas-txdot-cyberattack/


5.Ó¥Ñۻع飬£¬£¬£¬£¬APT30ͨ¹ýÂíÀ´Î÷ÑÇÕþ¸®¾Û»áÓʼþ·Ö·¢ÐºóÃÅ


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


Ñо¿Ö°Ô±·¢Ã÷APT30µÄºóÃÅÐÂÑù±¾£¬£¬£¬£¬£¬°üÀ¨BACKSPACEºÍNETEAGLEºóÃÅ£¬£¬£¬£¬£¬²¢Í¨¹ýÂíÀ´Î÷ÑÇÕþ¸®¾Û»áÓʼþ¾ÙÐзַ¢¡£¡£¡£¡£¡£¡£µÚÒ»¸öºóÃŵĶñÒâÑù±¾±»Ð´ÈëÁËMicrosoft OfficeÄ£°åÎļþ¼Ð£¬£¬£¬£¬£¬²¢ÒÔÂíÀ´Î÷ÑÇÕþ¸®¾Û»áÒé³ÌΪÖ÷Ì⣬£¬£¬£¬£¬Í¨¹ýÓʼþ¾ÙÐзַ¢¡£¡£¡£¡£¡£¡£µÚ¶þ¸öºóÃŵÄÑù±¾±»·ÅÔÚÆô¶¯Îļþ¼ÐÏ£¬£¬£¬£¬£¬ÎļþÔÚÏµÍ³ÖØÐÂÆô¶¯ºóÔËÐС£¡£¡£¡£¡£¡£³ý´ËÖ®Í⣬£¬£¬£¬£¬Ñо¿Ö°Ô±»¹·¢Ã÷ÁËRHttpCtrlºóÃźÍRCtrlºóÃÅ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/eagle-eye-is-back-apt30/


6.Õë¶ÔÖ½ÖÊͶƱµÄ¿ÉÀ©Õ¹²àÐŵÀ¹¥»÷¿ÉÇÔȡѡÃñÒþ˽


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


Ñо¿Ö°Ô±·¢Ã÷Õë¶ÔÖ½ÖÊͶƱµÄ¿ÉÀ©Õ¹²àÐŵÀ¹¥»÷£¬£¬£¬£¬£¬¿ÉʹÓÃÆäÇÔȡѡÃñÒþ˽¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±»ùÓÚArduino¿ª·¢°åºÍÂó¿Ë·ç¹¹½¨ÁËÒ»ÖÖ×°±¸£¬£¬£¬£¬£¬¸Ã×°±¸Äܹ»¸ß¾«¶ÈµØ¶Ôľ×ÀÉϱê¼ÇµÄλÖþÙÐÐÈý½ÇÕÉÁ¿£¬£¬£¬£¬£¬Í¨¹ýÕâÖÖ·½·¨¿ÉÒÔ»ñµÃÑ¡ÃñÔÚѡƱÉÏ×ö³öÑ¡ÔñµÄ±ê¼Ç¡£¡£¡£¡£¡£¡£Ö®ºóͨ¹ýÃæ²¿Ê¶±ðÀ´¾ÙÐÐÔö²¹¹¥»÷£¬£¬£¬£¬£¬¼´ÔÚͶƱվÖÐ×°ÖÃÉãÏñ»ú£¬£¬£¬£¬£¬ÒÔ×Ô¶¯¼ì²âÍÑÀëͶƱվµÄÖ°Ô±¡£¡£¡£¡£¡£¡£Á¬ÏµÕâÁ½ÖÖÒªÁ죬£¬£¬£¬£¬½«Õë¶ÔÖ½ÖÊͶƱ¾ÙÐÐÍêÈ«×Ô¶¯»¯µÄ¹¥»÷¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://ieeexplore.ieee.org/abstract/document/8806759/