CDATA OLTÖб£´æ¶à¸ö0day£¬£¬ £¬£¬£¬¿Éͨ¹ýtelnet»á¼ûºóÃÅ£»£»£»È¥Äê14.8£¥µÄAndroid¶ñÒâÈí¼þ²»¿Éɾ³ý

Ðû²¼Ê±¼ä 2020-07-08

1.CDATA OLTÖб£´æ¶à¸ö0day£¬£¬ £¬£¬£¬¿Éͨ¹ýtelnet»á¼ûºóÃÅ


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


CDATA OLTÖб£´æ¶à¸öÎó²î£¬£¬ £¬£¬£¬¶Ô²úÆ·µÄ¶à¸ö°æ±¾¶¼ÓÐÓ°Ïì¡£¡£¡£¡£¡£¡£¡£´Ë´Î·¢Ã÷µÄÖ÷ÒªÎó²î°üÀ¨¿ÉʹÓÃtelnet»á¼ûºóÃÅ£¬£¬ £¬£¬£¬¹¥»÷Õß¿ÉÒÔ´ÓWAN½Ó¿ÚºÍFTTH LAN½Ó¿Ú»á¼ûtelnetЧÀÍ£¬£¬ £¬£¬£¬»ñµÃÖÎÀíÔ±CLI»á¼ûȨÏÞ£»£»£»Æ¾Ö¤ÐÅÏ¢×ß©ºÍÃ÷ÎÄÃûÌÃÆ¾Ö¤£¨telnet£©£¬£¬ £¬£¬£¬¹¥»÷Õß¿ÉÔÚCLIÖÐÔËÐÐÏÂÁî»ñÈ¡ÖÎÀíԱƾ֤£»£»£»¾ßÓÐrootÌØÈ¨µÄEscape Shell£¬£¬ £¬£¬£¬CLIÖÐÓÐÏÂÁî×¢È빦Ч£¬£¬ £¬£¬£¬¹¥»÷Õß¿ÉÒÔÒÔrootÓû§Éí·ÝÖ´ÐÐÏÂÁ£»£»Ô¤ÈÏÖ¤Ô¶³ÌDoS£¬£¬ £¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓûùÓÚIA¡¢»úеѧϰºÍshawarmaµÄÄ£ºýÊÖÒÕ£¬£¬ £¬£¬£¬ÖØÆôËùÓÐOLT£»£»£»Æ¾Ö¤ÐÅÏ¢×ß©ºÍÃ÷ÎÄÆ¾Ö¤£¨HTTP£©£¬£¬ £¬£¬£¬¹¥»÷Õß¿ÉÌáÈ¡Web¡¢Telnetƾ֤ºÍsnmpÅäºÏÌ壨¶Áд£©£»£»£»Èõ¼ÓÃÜËã·¨£»£»£»ÖÎÀí½çÃæ²»Çå¾²£¬£¬ £¬£¬£¬Ö»ÄÜʹÓÃHTTP¡¢telnetºÍSNMPÔ¶³ÌÖÎÀí×°±¸£¬£¬ £¬£¬£¬²»Ö§³ÖHTTP»òSSHµÄSSL / TLS£¬£¬ £¬£¬£¬¹¥»÷Õß¿ÉÒÔ×èµ²ÒÔÃ÷ÎÄÐÎʽ·¢Ë͵ÄÃÜÂ룬£¬ £¬£¬£¬²¢Í¨¹ýMITMÀ´Ð®ÖÆ×°±¸¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://pierrekim.github.io/blog/2020-07-07-cdata-olt-0day-vulnerabilities.html


2.Kaspersky·¢Ã÷È¥Äê14.8£¥µÄAndroid¶ñÒâÈí¼þ²»¿Éɾ³ý


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


KasperskyÑо¿Ö°Ô±·¢Ã÷£¬£¬ £¬£¬£¬È¥ÄêÓÐ14.8£¥µÄAndroid¶ñÒâÈí¼þ²»¿Éɾ³ý¡£¡£¡£¡£¡£¡£¡£È¥Ä꣬£¬ £¬£¬£¬Êܵ½ÊÖ»ú¶ñÒâÈí¼þ»òÊÖ»ú¹ã¸æÈí¼þ¹¥»÷µÄ°²×¿Óû§ÖУ¬£¬ £¬£¬£¬ÓÐ14.8£¥µÄÓû§ÏµÍ³·ÖÇøÔâµ½ÁËѬȾ¡£¡£¡£¡£¡£¡£¡£KasperskyÌåÏÖ£¬£¬ £¬£¬£¬ÏµÍ³·ÖÇøÑ¬È¾»á¸øÊܺ¦Õß´øÀ´ºÜ¸ßµÄΣº¦£¬£¬ £¬£¬£¬ÓÉÓÚÇå¾²½â¾ö¼Æ»®ÎÞ·¨»á¼ûϵͳĿ¼£¬£¬ £¬£¬£¬ÕâÒâζ×ÅËüÎÞ·¨É¾³ý¶ñÒâÎļþ£¬£¬ £¬£¬£¬¶øÕâЩ¶ñÒâÈí¼þ¿ÉÒÔÔÚÓû§²»ÖªÇéµÄÇéÐÎÏÂ×°ÖúÍÔËÐÐÓ¦ÓóÌÐò¡£¡£¡£¡£¡£¡£¡£Kaspersky·¢Ã÷£¬£¬ £¬£¬£¬ÔÚAndroidÖÇÄÜÊÖ»úµÄϵͳ·ÖÇøÖÐ×î³£¼ûµÄ¶ñÒâÈí¼þΪLezokºÍTriadaľÂí¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/android-users-undeletable-adware/157189/


3.OnePlusÐÞ¸´ÆäϵͳÖÐÎó²î£¬£¬ £¬£¬£¬¿Éµ¼ÖÂÓû§Ð¡ÎÒ˽¼ÒÊý¾Ýй¶


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


ÖйúÊÖ»úÖÆÔìÉÌOnePlus·¢Ã÷Æä·¢Æ±ÏµÍ³Öб£´æÒ»¸öÎó²î£¬£¬ £¬£¬£¬¸ÃÎó²îÉæ¼°ÃÀ¹ú×°±¸µÄ±£ÐÞÆÚÍâάÐÞ£¬£¬ £¬£¬£¬Ð¹Â¶Á˿ͻ§µÄÏêϸÐÅÏ¢£¬£¬ £¬£¬£¬ÆäÖаüÀ¨ÐÕÃû¡¢µç»°ºÅÂë¡¢µçÓʵص㡢IMEIºÅÂëºÍÎïÀíµØµã¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤OnePlusÕö¿ªµÄÄÚ²¿Éó¼ÆÏÔʾ£¬£¬ £¬£¬£¬Ã»ÓÐÖ¤¾ÝÅú×¢¸ÃÎó²îÔø±»Ê¹Óùý¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬ £¬£¬£¬Ê¶±ðϸ½ÚÒÑ´Ó·¢Æ±ÏµÍ³ÖÐɾ³ý£¬£¬ £¬£¬£¬¸ÃÎó²îÒѾ­±»ÐÞ¸´¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.itsecurityguru.org/2020/07/06/oneplus-fixes-vulnerability-that-could-have-exposed-customer-personal-data/?utm_source=rss&utm_medium=rss&utm_campaign=oneplus-fixes-vulnerability-that-could-have-exposed-customer-personal-data


4.Cybernews±ê¼ÇÖйúµÄÁ½¼Ò¹«Ë¾µÄÊý¾Ý¿â¿ÉÔÚÏß»á¼û


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


CybernewsµÄÑо¿Ö°Ô±·¢Ã÷ÁËÁ½¸ö²»Çå¾²µÄÊý¾Ý¿âй¶ÁËÊý°ÙÍòÌõ¼Í¼£¬£¬ £¬£¬£¬ÕâÁ½¸öÊý¾Ý¿â»®·ÖÊôÓÚÖйú¹«Ë¾Ð¢ÐÅͨºÍÉϺ£ÑÓ»ªÖÇÄܿƼ¼¡£¡£¡£¡£¡£¡£¡£ÆäÖÐТÐÅͨµÄÊý¾Ý¿âÓÐÁè¼Ý34ÍòÌõ¼Í¼£¬£¬ £¬£¬£¬°üÀ¨ÊÖ»úºÅÂë¡¢µØµãºÍGPSλÖá¢Óû§Ö§ÊôºÍÆäËû¼à»¤È˵ÄÊÖ»úºÅÂëºÍÐÕÃû¡¢Î»Öù켣£¨°üÀ¨µØµãºÍGPS×ø±ê£©¡¢¹þÏ£ÃÜÂë¡¢SOS¼Í¼ºÍSOS¼Í¼λÖá¢Ð¡ÎÒ˽¼ÒIDµÈ¡£¡£¡£¡£¡£¡£¡£ÉϺ£ÑÓ»ªÐ¹Â¶Á˸ü¶àÃô¸ÐµÄÊý¾Ý£¬£¬ £¬£¬£¬ÀýÈçÒ×ÓÚ½âÂëµÄÒôƵÎļþ¡¢ÐÕÃû¡¢Ô±¹¤IDºÅ¡¢ÐÄÂÊ¡¢ÑõÆøË®Æ½¡¢GPSλÖõÈ¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬ £¬£¬£¬ÕâÁ½¸öÊý¾Ý¿â¶¼ÒѹرÕ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/105609/data-breach/chinese-companies-data-leak.html?utm_source=rss&utm_medium=rss&utm_campaign=chinese-companies-data-leak


5.DXC×Ó¹«Ë¾XchangingѬȾÀÕË÷²¡¶¾£¬£¬ £¬£¬£¬ÉÐÔÚÊÓ²ìÖÐ


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾



È«ÇòITЧÀÍÏ¢Õù¾ö¼Æ»®ÌṩÉÌDXC TechnologyµÄ×Ó¹«Ë¾XchangingµÄÔâµ½ÁËÀÕË÷Èí¼þ¹¥»÷¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÓÚ7ÔÂ5ÈÕÅû¶ÁËÇå¾²Îó²î£¬£¬ £¬£¬£¬µ«Éв»ÇåÎúºÎʱ·¢Ã÷´Ë´Î¹¥»÷ÊÂÎñ¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÉÐδ͸©ÓйØÍøÂç¹¥»÷µÄÏêϸÐÅÏ¢£¬£¬ £¬£¬£¬Ö»ÊÇÅú×¢ÊÇÀÕË÷Èí¼þѬȾÁËÆäϵͳ¡£¡£¡£¡£¡£¡£¡£Æ¾Ö¤XchangingµÄ˵·¨£¬£¬ £¬£¬£¬Ö»ÓÐÒ»¶¨ÃüÄ¿µÄ¿Í»§Êܵ½ÍøÂç¹¥»÷µÄÓ°Ï죬£¬ £¬£¬£¬DXCÏÖÔÚÒѽ«ÊÂÎñ±¨¸æ¸øÖ´·¨²¿·Ö£¬£¬ £¬£¬£¬²¢ÕýÔÚÓëÊÜÓ°ÏìµÄ¿Í»§ÏàÖúÒÔ»Ö¸´¶ÔÆäϵͳµÄ»á¼û¡£¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬ £¬£¬£¬DXCÌåÏÖÏÖÔÚûÓÐÈκμ£ÏóÅú×¢Êý¾ÝÒѱ»ÆÆËð»òɥʧ¡£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/105601/hacking/xchanging-ransomware-attack.html?utm_source=rss&utm_medium=rss&utm_campaign=xchanging-ransomware-attack


6.WatchGuardÐû²¼2020ÄêQ1»¥ÁªÍøÇå¾²±¨¸æ


Z6¡¤×ðÁú¿­Ê±¡¸ÖйúÇø¡¹¹Ù·½ÍøÕ¾


WatchGuardÐû²¼ÁË¡¶2020ÄêµÚÒ»¼¾¶È»¥ÁªÍøÇå¾²±¨¸æ¡·£¬£¬ £¬£¬£¬Ç¿µ÷Á˼ÓÃܶñÒâÈí¼þµÄΣÏÕ£¬£¬ £¬£¬£¬ÌṩÁ˹ØÓÚCOVID-19µÄÇå¾²Ó°ÏìµÄϸ½ÚµÈ¡£¡£¡£¡£¡£¡£¡£WatchguardÌåÏÖ£¬£¬ £¬£¬£¬ÔÚ2020ÄêµÚÒ»¼¾¶È½»¸¶µÄËùÓжñÒâÈí¼þÖУ¬£¬ £¬£¬£¬ÓÐÈý·ÖÖ®¶þÒѼÓÃÜ£¬£¬ £¬£¬£¬ÎÞ·¨¼ì²é´ËÀàÁ÷Á¿µÄÇ徲ϵͳ½«¶Ô´ó´ó¶¼¶ñÒâÈí¼þ¶´¿ª´óÃÅ¡£¡£¡£¡£¡£¡£¡£¸Ã±¨¸æÐÅÏ¢À´×ÔÈ«ÇòÔ¼4.4Íò¸öÇå¾²×°±¸µÄÄäÃûÊý¾Ý£¬£¬ £¬£¬£¬ÕâЩװ±¸×èÖ¹ÁËԼĪ3200Íò¸ö¶ñÒâÈí¼þ±äÌåºÍԼĪ170Íò´ÎÍøÂç¹¥»÷¡£¡£¡£¡£¡£¡£¡£±¨¸æËµ£¬£¬ £¬£¬£¬»ùÓÚÏàͬµÄÊý¾Ý£¬£¬ £¬£¬£¬¸ÃʱÆÚÄÚ72£¥µÄ¼ÓÃܶñÒâÈí¼þ±»¹éÀàΪ0day£¬£¬ £¬£¬£¬Ã»Óв¹¶¡»ò¸üС£¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.globenewswire.com/news-release/2020/06/24/2052424/0/en/WatchGuard-Technologies-Report-Finds-Two-Thirds-of-Malware-is-Encrypted-Invisible-Without-HTTPS-Inspection.html