²©Í¨Wi-FiоƬKr??k¼ÓÃÜÎó²î £¬£¬£¬£¬£¬Ó°ÏìÁè¼ÝÊ®ÒŲ́װ±¸£»£»£»£»Ó¢¹ú½ðÈÚî¿Ïµ»ú¹¹ÈÏ¿Éй¶ÏûºÄÕßÒþ˽ÐÅÏ¢

Ðû²¼Ê±¼ä 2020-02-27

1.²©Í¨Wi-FiоƬKr??k¼ÓÃÜÎó²î £¬£¬£¬£¬£¬Ó°ÏìÁè¼ÝÊ®ÒŲ́װ±¸


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ESETÑо¿Ö°Ô±ÔÚBroadcom£¨²©Í¨£©ºÍCypressµÄWi-FiоƬÖз¢Ã÷ÐÂÎó²îKr??k £¬£¬£¬£¬£¬¸ÃÎó²î£¨CVE-2019-15126£©¿Éµ¼ÖÂÒ×Êܹ¥»÷µÄ×°±¸Ê¹ÓÃÈ«Áã¼ÓÃÜÃÜÔ¿À´¼ÓÃÜÓû§µÄ²¿·ÖͨѶÐÅÏ¢¡£ ¡£¡£¡£¡£¡£¡£ÔÚÀֳɵĹ¥»÷ÖÐ £¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔ½âÃÜÓÉÒ×Êܹ¥»÷µÄ×°±¸´«ÊäµÄijЩÎÞÏßÍøÂçÊý¾Ý°ü¡£ ¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓ°ÏìµÄ×°±¸°üÀ¨ÑÇÂíÑ·£¨Echo¡¢Kindle£©¡¢Æ»¹û£¨iPhone¡¢iPad¡¢MacBook£©¡¢¹È¸è£¨Nexus£©¡¢ÈýÐÇ£¨Galaxy£©¡¢Ê÷Ý®ÅÉ£¨Pi 3£©¡¢Ð¡Ã×£¨RedMi£©µÄijЩ¿Í»§¶Ë×°±¸ÒÔ¼°»ªË¶ºÍ»ªÎªµÄijЩAPºÍ·ÓÉÆ÷×°±¸ £¬£¬£¬£¬£¬ÊؾÉÔ¤¼ÆÓÐÁè¼ÝÊ®ÒÚ×°±¸ÊÜÓ°Ïì¡£ ¡£¡£¡£¡£¡£¡£CypressÒѾ­Ïò¹©Ó¦ÉÌÐû²¼Á˹̼þÐÞ¸´³ÌÐò £¬£¬£¬£¬£¬Óû§¿Éͨ¹ýÆä×°±¸ÖÆÔìÉÌ»ñÈ¡ÏìÓ¦¸üС£ ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Ã»ÓÐÔÚ¸ßͨ¡¢Realtek¡¢RalinkºÍMediatekµÄWiFiоƬÖз¢Ã÷¸ÃÎó²î¡£ ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.welivesecurity.com/2020/02/26/krook-serious-vulnerability-affected-encryption-billion-wifi-devices/


2.Exchange ServerÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2020-0688£©


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ZDIÅû¶΢ÈíExchange ServerÖÐÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2020-0688£©µÄÊÖÒÕϸ½Ú¡£ ¡£¡£¡£¡£¡£¡£Î¢Èí×î³õ³Æ¸ÃÎó²îÊÇÓÉÄÚ´æË𻵵¼Ö嵀 £¬£¬£¬£¬£¬µ«ØÊºó½«ÐÎòÐÞÕýΪ¸ÃÎó²îÊÇÓÉExchange ServerÔÚ×°ÖÃʱδÄÜ׼ȷ½¨ÉèΨһµÄ¼ÓÃÜÃÜÔ¿µ¼ÖµÄ¡£ ¡£¡£¡£¡£¡£¡£¸ÃÎó²î±£´æÓÚExchange¿ØÖÆÃæ°å£¨ECP£©×é¼þÖÐ £¬£¬£¬£¬£¬ÓÉÓÚʹÓÃÁ˾²Ì¬ÃÜÔ¿ £¬£¬£¬£¬£¬¾­ÓÉÉí·ÝÑéÖ¤µÄ¹¥»÷Õß¿ÉÒÔÓÕʹЧÀÍÆ÷·´ÐòÁл¯¶ñÒâÖÆ×÷µÄViewStateÊý¾Ý £¬£¬£¬£¬£¬´Ó¶øÔÚЧÀÍÆ÷ÉÏECPÓ¦Óã¨SYSTEMȨÏÞ£©µÄÉÏÏÂÎÄÖÐÖ´ÐÐí§Òâ.NET´úÂë¡£ ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zerodayinitiative.com/blog/2020/2/24/cve-2020-0688-remote-code-execution-on-microsoft-exchange-server-through-fixed-cryptographic-keys


3.VerizonÐû²¼2020ÄêÒÆ¶¯Çå¾²Ö¸Êý±¨¸æ


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ƾ֤VerizonµÄ2020ÄêÒÆ¶¯Çå¾²Ö¸Êý±¨¸æ £¬£¬£¬£¬£¬2019ÄêÈ«ÇòÓÐÎå·ÖÖ®¶þ£¨39£¥£©µÄÆóÒµÔÚÒÆ¶¯Çå¾²·½ÃæÔâÊÜÖØ´óË𺦠£¬£¬£¬£¬£¬ÆäÖÐÐí¶àÊÇͨ¹ýIoT×°±¸¾ÙÐеÄ¡£ ¡£¡£¡£¡£¡£¡£¸Ã±¨¸æÖ¸³öÔâÊÜË𺦣¨ÀֳɵĹ¥»÷µ¼Ö¡°ÏµÍ³·ÀÓùʧЧ¡±£©µÄÆóÒµËùÕ¼°Ù·Ö±È´Ó2018ÄêµÄ27£¥ÉÏÉý £¬£¬£¬£¬£¬¹¥»÷µÄÖ÷ҪЧ¹û°üÀ¨Í£»£»£»£»ú£¨59£¥£©¡¢Êý¾Ýɥʧ£¨56£¥£©ºÍÆäËû×°±¸Êܵ½Ë𺦣¨46£¥£©¡£ ¡£¡£¡£¡£¡£¡£ÔÚÆäËü·½Ãæ £¬£¬£¬£¬£¬²»Çå¾²µÄWi-FiÈÈÃÅÈÔÈ»ÊÇÍøÂçÇ徲Σº¦µÄÖ÷ҪȪԴ£¨20£¥£©¡£ ¡£¡£¡£¡£¡£¡£ÍøÂç´¹ÂÚÒ²ÊÇÒ»¸öÖ÷ÒªÍþв £¬£¬£¬£¬£¬µ«ÔÚÒÆ¶¯×°±¸ÉÏÖ»ÓÐһС²¿·Ö£¨15£¥£©µÄ¹¥»÷ÊÇͨ¹ýµç×ÓÓʼþ·¢Ë굀 £¬£¬£¬£¬£¬¸ü¶à£¨85£¥£©µÄ´¹ÂÚ¹¥»÷ÔòÊÇͨ¹ý̸Ìì¡¢Éú²úÁ¦¹¤¾ß¡¢ÓÎÏ·µÈÓ¦Óñ¬·¢µÄ¡£ ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://enterprise.verizon.com/resources/reports/mobile-security-index/


4.Ç÷ÊÆ¿Æ¼¼Ðû²¼2019Äê¶ÈÇå¾²×ÛÊö±¨¸æ


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ƾ֤Ç÷ÊÆ¿Æ¼¼Ðû²¼µÄ2019Äê¶ÈÇå¾²×ÛÊö±¨¸æ £¬£¬£¬£¬£¬¸Ã¹«Ë¾ÔÚ2019Äê×èÖ¹ÁËÁè¼Ý520Òڴβî±ðµÄÍøÂçÍþв £¬£¬£¬£¬£¬ÆäÖÐÓÐ6100Íò´ÎÓëÀÕË÷Èí¼þ¹¥»÷ÓйØ¡£ ¡£¡£¡£¡£¡£¡£µç×ÓÓʼþÈÔÈ»ÊÇ×îÊܽӴýµÄÍþвǰÑÔ £¬£¬£¬£¬£¬Õ¼ËùÓÐÍþвµÄ91£¥¡£ ¡£¡£¡£¡£¡£¡£2019ÄêÇ÷ÊÆ¿Æ¼¼¼ì²âµ½µÄµç×ÓÓʼþÍþв±È2018ÄêÔöÌíÁË15£¥ £¬£¬£¬£¬£¬ÆäÖÐBEC¹¥»÷µÄ¼ì²âÊýÄ¿ÔöÌíÁË5£¥¡£ ¡£¡£¡£¡£¡£¡£Ö»¹ÜÐÂÀÕË÷Èí¼þ¼Ò×åµÄÊýĿͬ±ÈϽµÁË55£¥ £¬£¬£¬£¬£¬µ«¼ì²âµ½Ð±äÖÖµÄ×ÜÌåÊýĿȴÔöÌíÁË10£¥¡£ ¡£¡£¡£¡£¡£¡£2019Äê¶ñÒâAndroidÓ¦ÓóÌÐòÔöÌíÁË6£¥ £¬£¬£¬£¬£¬µÖ´ï½ü3200Íò £¬£¬£¬£¬£¬ÆäÖÐÓÐÊý°ÙÍòµÄÏÂÔØÀ´×Ô¹Ù·½PlayÊÐËÁ¡£ ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://documents.trendmicro.com/assets/rpt/rpt-the-sprawling-reach-of-complex-threats.pdf


5.Ó¢¹ú½ðÈÚî¿Ïµ»ú¹¹ÈÏ¿Éй¶ÏûºÄÕßÒþ˽ÐÅÏ¢


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ÖܶþÓ¢¹ú½ðÈÚÐÐΪî¿Ïµ¾Ö£¨FCA£©ÈϿɱ¬·¢Êý¾Ýй¶ÊÂÎñ £¬£¬£¬£¬£¬ËüÌåÏÖ¹ýʧµØÐû²¼ÁËÔ¼1600ÃûÏòî¿Ïµ»ú¹¹ÌύͶËßµÄÏûºÄÕßÒþ˽ÐÅÏ¢¡£ ¡£¡£¡£¡£¡£¡£FCA³Æ £¬£¬£¬£¬£¬ÆäÍøÕ¾¹ýʧµØÔÊÐí»á¼ûÕßÉó²éͶËßÕßµÄÐÕÃû¡¢µØµãºÍµç»°ºÅÂë £¬£¬£¬£¬£¬ÒÔ¼°ËûÃÇÔÚ×èÖ¹2019Äê7ÔµÄ18¸öÔÂÖÐËùͶËßµÄÏêϸÐÅÏ¢¡£ ¡£¡£¡£¡£¡£¡£ÕâЩÊý¾ÝÓÚÈ¥Äê11ÔÂÖÁ±¾ÔÂÖ®¼ä¿É¹ûÕæ»á¼û £¬£¬£¬£¬£¬µ«FCAÔö²¹³ÆÃ»ÓÐÏûºÄÕߵIJÆÎñÐÅϢй¶¡£ ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/uk-financial-regulator-admits-data-breach


6.ÈýÐÇÓ¢¹ú¹ÙÍøÐ¹Â¶Ð¡ÎÒ˽¼ÒÊý¾Ý £¬£¬£¬£¬£¬»òÒò¡°ÊÖÒÕ¹ýʧ¡±


¿­·¢¡¤k8(ÖйúÓÎ)¹Ù·½ÍøÕ¾


ÈýÐÇÐû²¼ÒòÓ¢¹ú¹ÙÍø£¨http://samsung.com/UK£©ÉÏ·ºÆð¡°ÊÖÒÕ¹ýʧ¡± £¬£¬£¬£¬£¬µ¼ÖÂÔ¼150ÃûÓû§µÄСÎÒ˽¼ÒÐÅϢй¶ £¬£¬£¬£¬£¬µ«Ã»ÓÐ͸¶ÐÅÏ¢±»ÍâйÓж೤ʱ¼ä¡£ ¡£¡£¡£¡£¡£¡£¾ÝÃÀÁªÉ籨µÀ £¬£¬£¬£¬£¬Ð¹Â¶µÄÐÅÏ¢°üÀ¨Óû§µÄÐÕÃû¡¢µç»°ºÅÂë¡¢µØµã¡¢µç×ÓÓʼþµØµãºÍ¹ýÍùµÄ¶©µ¥×ÊÁÏ £¬£¬£¬£¬£¬µ«²»Éæ¼°ÐÅÓÿ¨ÐÅÏ¢¡£ ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/98501/data-breach/samsung-data-leak.html