ÐÅÏ¢Äþ¾²Öܱ¨-2018ÄêµÚ37ÖÜ
Ðû²¼Ê±¼ä 2018-09-212018Äê09ÔÂ10ÈÕÖÁ16ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´67¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇMicrosoft Word PDFÔ¶³Ì´úÂëÖ´ÐЩ¶´£»Microsoft Jet Database Engine CVE-2018-8393»º³åÇøÒç³ö©¶´£»¶à¿îI-O DATA²úÎïÈÎÒâÃüÁîÖ´ÐЩ¶´£»Cisco SD-WAN Solution CVE-2018-0432´íÎó³ÂËß¹¦Ð§È¨ÏÞÌáÉý©¶´£»Micronet INplc SDK CVE-2018-0671ȨÏÞÌáÉý©¶´¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇVeeamÒòMongoDBÅäÖôíÎóµ¼ÖÂ4.45ÒÚÌõÓû§¼Ç¼й¶£»Ñо¿ÈËÔ±·¢ÏÖ½Ù³ÖÁè¼Ý3700¸öMikroTik·ÓÉÆ÷µÄ¶ñÒâÍÚ¿ó»î¶¯£»Ñо¿ÈËÔ±³Æ¿É¹ûÈ»·ÃÎʵÄ.GitĿ¼µ¼ÖÂÁè¼Ý39Íò¸öÍøÕ¾Ò×Êܹ¥»÷£»NexusguardÐû²¼2018ÄêQ2Íþв³ÂËߣ¬DDoS¹¥»÷ͬ±ÈÔö³¤Áè¼Ý500%£»ÈüÃÅÌú¿ËÐû²¼¼¾¶ÈÒÆ¶¯Íþв³ÂËߣ¬2017ÄêÒÆ¶¯¶ñÒâÈí¼þµÄбäÖÖÊýÁ¿Ôö³¤54%¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖС£
¶þ¡¢ÖØÒªÄþ¾²Â©¶´Áбí
1. Microsoft Word PDFÔ¶³Ì´úÂëÖ´ÐЩ¶´
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8430
2. Microsoft Jet Database Engine CVE-2018-8393»º³åÇøÒç³ö©¶´
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8393
3. ¶à¿îI-O DATA²úÎïÈÎÒâÃüÁîÖ´ÐЩ¶´
http://jvn.jp/en/jp/JVN83701666/index.html
4. Cisco SD-WAN Solution CVE-2018-0432´íÎó³ÂËß¹¦Ð§È¨ÏÞÌáÉý©¶´
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-sd-wan-escalation
5. Micronet INplc SDK CVE-2018-0671ȨÏÞÌáÉý©¶´
Micronet INplc SDK´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓé¶´Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÌáÉýȨÏÞ£¬Ö´ÐÐÈÎÒâ´úÂë¡£
http://www.mnc.co.jp/INplc/info_20180907_E.htm
Èý¡¢ÖØÒªÄþ¾²Ê¼þ×ÛÊö
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/data-management-firm-exposes-445-million-records/
2¡¢Ñо¿ÈËÔ±·¢ÏÖ½Ù³ÖÁè¼Ý3700¸öMikroTik·ÓÉÆ÷µÄ¶ñÒâÍÚ¿ó»î¶¯
Äþ¾²Ñо¿ÈËÔ±Troy Mursch·¢ÏÖÒ»¸öÀûÓé¶´£¨CVE-2018-14847£©½Ù³ÖMikroTik·ÓÉÆ÷½øÐÐÍÚ¿óµÄ¹¥»÷»î¶¯¡£ËäÈ»¸Ã·ÓÉÆ÷µÄ³§ÉÌÒÑÔÚ4Ô·ÝÐû²¼ÁËÏà¹ØÐÞ¸´²¹¶¡£¬µ«ÈÔÓв¿ÃÅÓû§Ã»ÓнøÐÐÉý¼¶¡£Æ¾¾ÝMursch³ÂËßµÄÍÚ¿ó½Å±¾£¬ÔÚShodanÉÏ¿ÉËÑË÷µ½3734¸öMikroTikÉ豸¡£´ó¶àÊýÊÜѬȾµÄÉ豸¶¼¼¯ÖÐÔÚÄÏÃÀÖÞ£¬Ö÷ÒªÊǰÍÎ÷£¨2612£©ºÍ°¢¸ùÍ¢£¨480£©¡£¸ÃÍÚ¿ó½Å±¾½«MikroTik·ÓÉÆ÷µÄCPUʹÓÃÂÊÔö¼Óµ½80%²¢Á¬Ðø½øÐÐÍÚ¿ó¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/over-3-700-mikrotik-routers-abused-in-cryptojacking-campaigns/
3¡¢Ñо¿ÈËÔ±³Æ¿É¹ûÈ»·ÃÎʵÄ.GitĿ¼µ¼ÖÂÁè¼Ý39Íò¸öÍøÕ¾Ò×Êܹ¥»÷
Lynt ServicesµÄÑо¿ÈËÔ±Vladim¨ªrSmitka·¢ÏֿɹûÈ»·ÃÎʵÄ.gitĿ¼µ¼ÖÂÁè¼Ý39Íò¸öÍøÕ¾Ò×Êܹ¥»÷¡£Ðí¶àWeb¿ª·¢ÈËԱʹÓÿªÔ´¹¤¾ßGitÀ´¹¹½¨Ò³Ã棬µ«ËûÃÇÍùÍù½«.gitÎļþ¼ÐÒÅÁôÔÚÍøÕ¾µÄ¹«¹²¿É·ÃÎʲ¿ÃÅ£¬ÉõÖÁ°üÂÞÒ»Ð©ÖØÒªµÄÐÅÏ¢£¬ÀýÈçÍøÕ¾½á¹¹µÄÐÅÏ¢¡¢Êý¾Ý¿âÃÜÂë¡¢APIÃÜÔ¿¡¢¿ª·¢IDEÉèÖõȡ£
ÔÎÄÁ´½Ó£º
https://threatpost.com/open-git-directories-leave-390k-websites-vulnerable/137299/
4¡¢NexusguardÐû²¼2018ÄêQ2Íþв³ÂËߣ¬DDoS¹¥»÷ͬ±ÈÔö³¤Áè¼Ý500%
ƾ¾ÝNexusguardµÄ2018ÄêµÚ¶þ¼¾¶ÈÍþв³ÂËߣ¬DDoS¹¥»÷ƽ¾ùÔö³¤Áè¼Ý26Gbps£¬¹æÄ£Ôö¼ÓÁËÁè¼Ý500%¡£Óë2017ÄêͬÆÚÏà±È£¬DDoS¹¥»÷µÄ×î´ó¹æÄ£·ÁËËı¶£¬´ï359Gbps¡£Ñо¿ÈËÔ±³ÆÊý¾ÝµÄ¼¤ÔöÔ´ÓÚÎïÁªÍø½©Ê¬ÍøÂçSatoriµÄÔö³¤¡£×î´óµÄ0day·çÏÕÀ´×ÔÓÚ²îÒìµÄ¼ÒÓ÷ÓÉÆ÷£¬¹¥»÷Õß¿ÉÄÜÀûÓÃÕâЩÉ豸Õë¶ÔÒªº¦·þÎñºÍÍøÂçÌᳫ´ó¹æÄ£DDoS¹¥»÷¡£Synºé·º¹¥»÷Õ¼¾ÝÁËÖ÷µ¼Ö°Î»¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/ddos-attacks-increase-in-size-by/
5¡¢ÈüÃÅÌú¿ËÐû²¼¼¾¶ÈÒÆ¶¯Íþв³ÂËߣ¬2017ÄêÒÆ¶¯¶ñÒâÈí¼þµÄбäÖÖÊýÁ¿Ôö³¤54%
ÈüÃÅÌú¿ËµÄ¼¾¶ÈÒÆ¶¯Íþв³ÂËß×ܽáÁË2017ÄêµÄÒÆ¶¯ÍþвÊý¾Ý£¬Ö÷Òª·¢ÏÖ°üÂÞÒÆ¶¯¶ñÒâÈí¼þµÄ±äÖÖºÍÊýÁ¿¶¼ÓÐËùÔö¼Ó£¬2017ÄêÒÆ¶¯¶ñÒâÈí¼þ±äÖÖµÄÊýÁ¿Ôö¼ÓÁË54%£»²¿ÃÅÒÆ¶¯É豸¼ÌÐøÊ¹ÓùýʱµÄ²Ù×÷ϵͳ£¬Ö»ÓÐ3%µÄAndroidÉ豸¸üÐÂÖÁ×îеIJÙ×÷ϵͳ°æ±¾£¬41%µÄAndroidÉ豸ÖÁÉÙȱÉÙÁ½¸öÔµÄÄþ¾²²¹¶¡£¬iOSÉ豸Ïà¶Ô½ÏºÃ£¬80%µÄiOSÉ豸°²×°ÁË×îеĸüУ»Î£ÏÕµÄWi-FiÍøÂç±ÈÒÔÍùÈκÎʱºò¶¼Ô½·¢¹ã·º¡£
ÔÎÄÁ´½Ó£º
https://www.symantec.com/connect/es/blogs/las-amenazas-moviles