SAPÇå¾²¸üÐÂÐÞ¸´NetWeaverÖеÄÑÏÖØÎó²î£»£»£»£»£»£»£»£»Î¢Èí7Ô·ÝÇå¾²¸üÐÂÐÞ¸´¶à¸ö²úÆ·ÖÐ123¸öÎó²î
Ðû²¼Ê±¼ä 2020-07-151.SAPÐû²¼Çå¾²¸üУ¬£¬£¬ÐÞ¸´NetWeaverÖеÄÑÏÖØÎó²î
2020Äê7ÔÂ13ÈÕ£¬£¬£¬SAPÐû²¼ÁËÒ»¸öÇå¾²¸üУ¬£¬£¬ÐÞ¸´ÁËÒ»¸öSAP NetWeaverÖеÄÑÏÖØÎó²î£¨CVE-2020-6287£©£¬£¬£¬CVSSÆÀ·ÖΪ10·Ö¡£¡£¡£¡£¸ÃÎó²îÔ´ÓÚSAP NetWeaver AS JavaµÄWeb×é¼þÖÐȱÉÙÉí·ÝÑéÖ¤¡£¡£¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬´ËÇå¾²Îó²îÏÖÔÚ¿ÉÄÜ»áÓ°Ïì40000¶à¸öSAPϵͳ¡£¡£¡£¡£SPA¹«Ë¾»¹·¢Ã÷ÖÁÉÙÓÐ2500¸öÒ×Êܹ¥»÷µÄSAPϵͳֱ½Ó̻¶ÓÚ»¥ÁªÍø£¬£¬£¬ÆäÖб±ÃÀÕ¼33%£¬£¬£¬Å·ÖÞÕ¼29%ºÍÑÇ̫ռ27%¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://us-cert.cisa.gov/ncas/alerts/aa20-195a
2.΢ÈíÐû²¼7Ô·ÝÇå¾²¸üУ¬£¬£¬ÐÞ¸´¶à¸ö²úÆ·ÖÐ123¸öÎó²î
΢ÈíÐû²¼ÁË7Ô·ݵÄÖܶþ²¹¶¡³ÌÐò£¬£¬£¬ÐÞ¸´¶à¸ö²úÆ·ÖÐ123¸öÎó²î£¬£¬£¬ÆäÖÐ18¸öΪÑÏÖØÎó²î¡£¡£¡£¡£´Ë´ÎÇå¾²¸üÐÂÖÐÐÞ¸´µÄ×îÑÏÖØµÄÎó²îΪÑÏÖØÆ·¼¶Îª10.0µÄÎó²î£¨CVE-2020-1350£©£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓøÃÎó²î¾ÙÐÐÔ¶³Ì´úÂëÖ´ÐУ¬£¬£¬¸ÃÎó²îÒѱ»Check PointÃüÃûΪSigRed¡£¡£¡£¡£±ðµÄ£¬£¬£¬»¹ÐÞ¸´ÁËMicrosoft EdgeºÍVBScriptÒýÇæÖб£´æµÄ¼¸¸ö½ÏΪÑÏÖØµÄÎó²î£¬£¬£¬»®·ÖΪWindows×ÖÌå¿âÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2020-1436£©ºÍGDIÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2020-1435£©£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓÃÆä¾ÙÐÐÏÂÁîÖ´ÐС£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://us-cert.cisa.gov/ncas/current-activity/2020/07/14/microsoft-releases-july-2020-security-updates
3.еÄMirai±äÌåÕë¶ÔComtrend·ÓÉÆ÷ÖеÄÏÂÁî×¢ÈëÎó²î
Ç÷ÊÆ¿Æ¼¼µÄÇå¾²Ñо¿Ö°Ô±·¢Ã÷£¬£¬£¬IoT½©Ê¬ÍøÂçMiraiµÄбäÌåÕë¶ÔComtrend·ÓÉÆ÷ÖеÄÏÂÁî×¢ÈëÎó²î£¨CVE-2020-10173£©¡£¡£¡£¡£¸ÃÎó²îÊǾÓÉÉí·ÝÑéÖ¤µÄÏÂÁî×¢ÈëÎó²î£¬£¬£¬¿É±»Ô¶³Ì¹¥»÷ÕßʹÓÃÆÆËð·ÓÉÆ÷ÖÎÀíµÄÍøÂç¡£¡£¡£¡£Õë¶Ô¸ÃÎó²îµÄPoCÒѹûÕæÐû²¼£¬£¬£¬µ«Mirai±äÌåÊǵÚÒ»¸öʵÑéʹÓôËÎó²îµÄ¶ñÒâÈí¼þ¡£¡£¡£¡£±ðµÄ£¬£¬£¬¸ÃбäÌå×ܹ²Ê¹ÓÃÁË9¸öÎó²î£¬£¬£¬ÆäÖаüÀ¨Netlink GPON·ÓÉÆ÷ÖÐÏà¶Ô½ÏеÄÎó²î¡£¡£¡£¡£¸Ã±äÌå¿ÉÓ°ÏìLG SuperSign EZ CMS¡¢AVTECH devices¡¢D-Link devices¡¢MVPower DVR¡¢Symantec Web Gateway 5.0.2.8ºÍThinkPHP¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/new-mirai-variant-targets-vulnerability-comtrend-routers?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Securityweek+%28SecurityWeek+RSS+Feed%29
4.ºÚ¿ÍÔÚ°µÍøÉϳöÊÛ1.42ÒÚÌõÃ׸ß÷Âùݿͻ§µÄÏêϸÐÅÏ¢
ºÚ¿ÍÔÚ°µÍøÉÏÐû²¼¹ã¸æ£¬£¬£¬ÒÔ2939.76ÃÀÔªµÄ¼ÛÇ®³öÊÛ142479937ÃûÃ׸ß÷Âùݣ¨MGM£©¿Í»§µÄÏêϸÐÅÏ¢£¬£¬£¬¸Ãй¶ÊýĿԶԶ´óÓÚ×î³õ±¨¸æµÄ1060Íò¡£¡£¡£¡£ºÚ¿ÍÉù³ÆÔÚËûÃÇÆÆËðÁËÓÉNight Lion SecurityÔËÓªµÄÊý¾Ý×ß©¼àÊÓЧÀÍDataViperÖ®ºó»ñµÃÁËÂùݵÄÊý¾Ý£¬£¬£¬µ«Night LionÊ×´´ÈËVinny TroiaÔòÌåÏÖÆä²¢Ã»ÓÐMGMµÄÊý¾Ý¡£¡£¡£¡£MGMÌåÏÖ£¬£¬£¬´Ë´Îй¶±¬·¢ÔÚ2019ÄêÑ×Ì죬£¬£¬ÆäʱºÚ¿ÍÈëÇÖÁËÂùݵÄÒ»Ì¨ÔÆÐ§ÀÍÆ÷²¢ÇÔÈ¡ÁËÂùÝÒÑÍùµÄ¿ÍÈËÐÅÏ¢£¬£¬£¬µ«¸Ã¹«Ë¾Ã»ÓÐ͸¶¹¥»÷µÄ¹æÄ£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/a-hacker-is-selling-details-of-142-million-mgm-hotel-guests-on-the-dark-web/#ftag=RSSbaffb68
5.ºÚ¿ÍÔÚ°µÍø³öÊÛ4Íò¶àÃûÃÀ¹ú¹«ÃñµÄСÎÒ˽¼ÒÏêϸÐÅÏ¢ºÍSSN
ÍþвÇ鱨¹«Ë¾Cyble·¢Ã÷£¬£¬£¬ºÚ¿ÍÕýÔÚ°µÍøÉϳöÊÛԼĪ40000ÃûÃÀ¹ú¹«ÃñµÄСÎÒ˽¼ÒÏêϸÐÅÏ¢ÒÔ¼°ËûÃǵÄÉç»áÇå¾²ºÅÂ루SSN£©¡£¡£¡£¡£´Ë´Î×ß©µÄÊý¾Ý°üÀ¨Ãû×Ö¡¢ÐÕÊÏ¡¢µØµã¡¢ÊС¢ÖÝ¡¢ÓʱࡢÉç»áÇå¾²ºÅÂ루SSN£©ºÍ³öÉúÈÕÆÚ£¨DOB£©µÈÐÅÏ¢¡£¡£¡£¡£´ËÀàÊý¾Ý¿ÉÄܸøÃÀ¹ú¹«Ãñ´øÀ´ÑÏÖØµÄΣº¦£¬£¬£¬¸Ãй¶Êý¾Ý¿É±»ÓÃÓÚ´ó¹æÄ£ÍøÂç´¹Âڻ»ò½ðÈÚڲƻ¡£¡£¡£¡£CybleÒѾÔÚÆäÊý¾Ýй¶¼àÊÓºÍ֪ͨƽ̨AmiBreached.comÉÏΪ¸ÃÊý¾Ý¿â½¨ÉèÁËË÷Òý£¬£¬£¬ÒÔ¹©µ£ÐÄÆäÐÅϢй¶µÄÈËÅÌÎÊ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/105837/malware/40000-us-citizens-darkweb.html?utm_source=rss&utm_medium=rss&utm_campaign=40000-us-citizens-darkweb
6.ÅÄÂôÍøÕ¾LiveAuctioneersÔâ¹¥»÷£¬£¬£¬Ð¹Â¶340ÍòÌõÓû§¼Í¼
ÅÄÂôÍøÕ¾LiveAuctioneersÈÏ¿ÉÆäÔâµ½ÍøÂç¹¥»÷¡£¡£¡£¡£7ÔÂ10ÈÕ£¬£¬£¬Ò»ÃûºÚ¿ÍÔÚ°µÍø³öÊÛ´ÓLiveAuctioneersµÄÍøÕ¾ÉÏÇÔÈ¡µÄ340ÍòÌõÓû§¼Í¼£¬£¬£¬²¢±ê¼ÛΪ2500ÃÀÔª¡£¡£¡£¡£¾Ý³Æ£¬£¬£¬´ËÊý¾Ý¿â°üÀ¨Óû§µÄµç×ÓÓʼþµØµã¡¢Óû§Ãû¡¢MD5¹þÏ£ÃÜÂë¡¢Ãû³Æ¡¢µç»°ºÅÂë¡¢µØµã¡¢IPµØµãºÍÉ罻ýÌåÉèÖÃÎļþ¡£¡£¡£¡£³ý´ËÖ®Í⣬£¬£¬¸ÃºÚ¿Í»¹ÌåÏÖÆäÖÐÓÐ300Íò¸öÕÊ»§µÄÃÜÂëÒѱ»ÆÆ½â¡£¡£¡£¡£7ÔÂ11ÈÕ£¬£¬£¬LiveAuctioneersÐû²¼ÁËÇ徲֪ͨ£¬£¬£¬ÌåÏÖËûÃÇÔâµ½Á˹¥»÷µ¼ÖÂÊý¾Ýй¶£¬£¬£¬²¢Ö¸³öºÚ¿ÍÊÇÓÚ6ÔÂ19ÈÕÔÚÆäÊý¾Ý´¦Öóͷ£ÏàÖú¹«Ë¾´¦»á¼ûµÄÕâЩÊý¾Ý¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/liveauctioneers-reports-data-breach-after-user-records-sold-online/


¾©¹«Íø°²±¸11010802024551ºÅ