ÐÅÏ¢Äþ¾²Öܱ¨-2020ÄêµÚ08ÖÜ

Ðû²¼Ê±¼ä 2020-02-24

> ±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö


2020Äê02ÔÂ17ÈÕÖÁ23ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´51¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇB&R Industrial Automation Automation Studio SNMP·þÎñÊÚȨ©¶´; Apache Tomcat AJPconnectorÎļþ°üÂÞ©¶´£»Adobe Media EncoderÔ½½çд´úÂëÖ´ÐЩ¶´£»Cisco Enterprise NFV Infrastructure SoftwareÉý¼¶×é¼þÑé֤©¶´£»Ansible pipe lookup²å¼þÈÎÒâÃüÁîÖ´ÐЩ¶´ ¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇÖйúÈËÃñÒøÐÐÐû²¼2020°æ¡¶ÍøÉÏÒøÐÐϵͳÐÅÏ¢Äþ¾²Í¨Óù淶¡·£»Apache TomcatÎļþ°üÂÞ©¶´£¨CVE-2020-1938£©£»Äþ¾²Ñо¿ÈËÔ±Åû¶΢Èí¶à¸ö×ÓÓòÃû±»½Ù³ÖÎÊÌ⣻ÃÀ¹úÌìÈ»Æø¹ÜµÀÔËÓªÉÌÔâµ½ÀÕË÷Èí¼þ¹¥»÷£»ÒÁÀʺڿÍÀûÓÃVPNÈí¼þ©¶´¹¥»÷È«ÇòµÄÆóÒµºÍÕþ¸®»ú¹¹ ¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖÐ ¡£


>ÖØÒªÄþ¾²Â©¶´Áбí


1. B&R Industrial Automation Automation Studio SNMP·þÎñÊÚȨ©¶´


B&R Industrial Automation Automation Studio SNMP·þÎñ´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÐ޸ķþÎñÅäÖà ¡£

https://www.us-cert.gov/ics/advisories/icsa-20-051-01

2. Apache Tomcat AJPconnectorÎļþ°üÂÞ©¶´


Apache Tomcat AJPconnector´æÔÚʵÏÖȱÏݵ¼ÖÂÏà¹Ø²ÎÊý¿É¿Ø£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ɶÁȡϵͳÎļþ»òÖ´ÐÐÈÎÒâ´úÂë ¡£

https://mp.weixin.qq.com/s/qIG_z9imxdLUobviSv7knw

3. Adobe Media EncoderÔ½½çд´úÂëÖ´ÐЩ¶´


Adobe Media Encoder´¦ÖÃÎļþ´æÔÚ»º³åÇøÒç³ö©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÎļþÇëÇó£¬ÓÕʹÓÃÓÚ½âÎö£¬¿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐÈÎÒâ´úÂë ¡£

https://helpx.adobe.com/security/products/media-encoder/apsb20-10.html

4. Cisco Enterprise NFV Infrastructure SoftwareÉý¼¶×é¼þÑé֤©¶´


Cisco Enterprise NFV Infrastructure SoftwareÉý¼¶×é¼þ´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó£¬Éý¼¶¶ñÒâ¹Ì¼þ£¬Ö´ÐÐÈÎÒâ´úÂë ¡£

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nfvis-codex-shs4NhvS

5. Ansible pipe lookup²å¼þÈÎÒâÃüÁîÖ´ÐЩ¶´


Ansible pipe lookup²å¼þsubprocess.Popen()´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÖ´ÐÐÈÎÒâÃüÁî ¡£

https://access.redhat.com/security/cve/cve-2020-1734


> ÖØÒªÄþ¾²Ê¼þ×ÛÊö



1¡¢ÖйúÈËÃñÒøÐÐÐû²¼2020°æ¡¶ÍøÉÏÒøÐÐϵͳÐÅÏ¢Äþ¾²Í¨Óù淶¡·


×ðÁú¶¶È¦ - Ϊdu¶øÉú


ÖйúÈËÃñÒøÐÐÏ·¢¡¶¹ØÓÚ<ÍøÉÏÒøÐÐϵͳÐÅÏ¢Äþ¾²Í¨Óù淶>ÐÐÒµ³ß¶ÈµÄ֪ͨ¡·£¨Òø·¢[2020]35ºÅ£©£¬Ðû²¼Ð°桶ÍøÉÏÒøÐÐϵͳÐÅÏ¢Äþ¾²Í¨Óù淶¡·(JR/T 0068-2020)£¬¸Ã°æ±¾ÊÇ2012°æ¹æ·¶(JR/T 0068-2012)µÄÌæ»»ÐÞ¶©°æ±¾ ¡£Ð°æ¹æ·¶ÓÐÈý¸öÖصãÐÞ¶©ÄÚÈÝ£º1¡¢Õë¶Ôм¼Êõ·ºÆðºÍÓ¦ÓÃÌá³öÁËеÄÄþ¾²ÒªÇó£¨ÀýÈçÔö¼ÓÁËÐéÄ⻯¡¢ÔƼÆËãÄþ¾²Ïà¹ØÒªÇó£¬Ôö¼Ó¹úÃÜSMϵÁÐËã·¨Ïà¹ØµÄÄþ¾²ÒªÇó£¬Ôö¼Ó¶ÔÄþ¾²µ¥ÔªºÍÒƶ¯ÖÕ¶ËÖ§¸¶¿ÉÐÅ»·¾³Ïà¹ØÒªÇ󣩣»2¡¢¾ÍеÄÒµÎñºÍ¼à¹ÜÒªÇó½øÐÐÁËÔö²¹ºÍÃ÷È·£¨ÀýÈçÔö¼ÓÁËÌõÂëÖ§¸¶¡¢½»Ò×Äþ¾²ËøºÍ¢ò¡¢¢óÀàÕË»§µÄÏà¹ØÒªÇ󣩣»3¡¢ÖØÐÂÊáÀí²¢ÌáÉý¹ØÓÚÒµÎñÁ¬ÐøÐÔÓëÔÖÄѻָ´¡¢Äþ¾²Ê¼þÓëÓ¦¼±ÏìÓ¦µÄÄþ¾²ÒªÇó ¡£


Ô­ÎÄÁ´½Ó£º

https://www.cebnet.com.cn/20200219/102639904.html


2¡¢Apache TomcatÎļþ°üÂÞ©¶´£¨CVE-2020-1938£©


×ðÁú¶¶È¦ - Ϊdu¶øÉú


Apache Tomcat·þÎñÆ÷´æÔÚÎļþ°üÂÞ©¶´£¨CVE-2020-1938£©£¬¹¥»÷Õß¿ÉÀûÓø鶴¶ÁÈ¡»ò°üÂÞTomcatÉÏËùÓÐwebappĿ¼ÏµÄÈÎÒâÎļþ£¬È磺webappÅäÖÃÎļþ»òÔ´´úÂëµÈ ¡£¸Ã©¶´ÓëTomcat AJPЭÒéÓйØ£¬Tomcat AJP ConnectorĬÈÏÅäÖÃϼ´Îª¿ªÆô״̬£¬¶øÇÒ¼àÌý¶Ë¿Ú8009 ¡£¸Ã©¶´Ó°ÏìÁËTomcat 6/7/8/9È«°æ±¾£¬Apache¹Ù·½ÒÑÐû²¼9.0.31¡¢8.5.51¼°7.0.100°æ±¾Õë¶Ô´Ë©¶´½øÐÐÐÞ¸´£¬½¨ÒéÓû§ÏÂÔØʹÓà ¡£ÓÉÓÚTomcat 6ÒѾ­Í£Ö¹Î¬»¤£¬½¨ÒéÓû§Éý¼¶µ½×îÐÂÊÜÖ§³ÖµÄTomcat°æ±¾ÒÔÃâÔâÊܹ¥»÷ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.cnvd.org.cn/flaw/show/CNVD-2020-10487


3¡¢Äþ¾²Ñо¿ÈËÔ±Åû¶΢Èí¶à¸ö×ÓÓòÃû±»½Ù³ÖÎÊÌâ


×ðÁú¶¶È¦ - Ϊdu¶øÉú


NIC.gpÄþ¾²Ñо¿Ô±Michel GaschetÖ¸³ö΢Èí´æÔÚ¶à¸ö×ÓÓòÃû½Ù³ÖÎÊÌ⣬ÕâЩ×ÓÓòÃû¿ÉÄܱ»½Ù³ÖºÍÓÃÓÚ¹¥»÷Óû§¡¢Ô±¹¤»òÏÔʾÀ¬»øÄÚÈÝ ¡£ÔÚ¹ýÈ¥ÈýÄêÖУ¬GaschetÒ»Ö±ÔÚÏò΢Èí³ÂËß´øÓдíÎóÅäÖõÄDNS¼Ç¼µÄ×ÓÓòÃû£¬ÀýÈç2017ÄêËû³ÂËßÁË21¸öÒ×±»½Ù³ÖµÄmsn.com×ÓÓòÃû£¬2019ÄêËûÓÖ³ÂËßÁË142¸öÅäÖôíÎóµÄmicrosoft.com×ÓÓòÃû£¬µ«Î¢Èí½öÐÞ¸´ÁËÆäÖÐ5£¥µ½10£¥µÄ×ÓÓòÃû ¡£Gaschet»¹Ö¸³öËûÖÁÉÙÔÚ4¸öºÏ·¨µÄ΢Èí×ÓÓòÖз¢ÏÖÁËÓ¡¶ÈÄáÎ÷ÑÇÆ˿˶ij¡µÄ¹ã¸æ£¬°üÂÞportal.ds.microsoft.com¡¢perfect10.microsoft.com¡¢ies.global.microsoft.comºÍblog-ambassadors.microsoft.com ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/microsoft-has-a-subdomain-hijacking-problem/


4¡¢ÃÀ¹úÌìÈ»Æø¹ÜµÀÔËÓªÉÌÔâµ½ÀÕË÷Èí¼þ¹¥»÷


×ðÁú¶¶È¦ - Ϊdu¶øÉú


ƾ¾ÝÃÀ¹ú¹úÍÁÄþ¾²²¿ÍøÂçÄþ¾²ºÍ»ù´¡ÉèÊ©Äþ¾²¾Ö£¨DHS CISA£©Ðû²¼µÄͨ±¨£¬Ò»¼Òδ¾ßÃûµÄÃÀ¹úÌìÈ»ÆøѹËõ¹¤³§ÔâÀÕË÷Èí¼þ¹¥»÷£¬µ¼ÖÂÔËÓªÖжÏÁËÁ½ÌìµÄʱ¼ä ¡£CISAÌåÏÖ¹¥»÷ÕßÊ×ÏÈÀûÓõöÓãÁ´½Ó»ñµÃÁ˶ԸÃ×éÖ¯ITÍøÂçµÄ·ÃÎÊ£¬È»ºóתÏòÆäOTÍøÂç²¢²¿ÊðÁËÉÌÓÃÀÕË÷Èí¼þ ¡£¸ÃÈí¼þͬʱÔÚITºÍOTÍøÂçÉ϶Թ«Ë¾µÄÊý¾Ý½øÐмÓÃÜ£¬ÒÔ×îºéÁ÷ƽµØÆÆ»µÆóÒµ£¬È»ºó²ÅÒªÇóÖ§¸¶Êê½ð ¡£¸ÃÀÕË÷Èí¼þ²¢Î´Ó°ÏìÈκÎPLC£¬µ«ÈËÀà²Ù×÷Ô±ÎÞ·¨»ã×ܺͶÁÈ¡Ïà¹Ø¹¤Òµ¹ý³ÌÖеÄÊý¾Ý£¬ÀýÈçHMI¡¢Êý¾ÝÀúÊ·¼Ç¼ºÍÂÖѯ·þÎñÆ÷£¬´Ó¶øµ¼ÖÂÔ±¹¤ÎÞ·¨ÕÆÎչܵÀÉèÊ©µÄÔËÐÐÇé¿ö ¡£¹ÜµÀÔËÓªÉÌʵʩÁË¡°Óмƻ®µÄ¡¢ÊܿصĹرա±´ëÊ©£¬ÒÔÔ¤·À²¢ÖÆÖ¹ÈκÎʼþµÄ·¢Éú ¡£CISAÌåÏÖÔËÓªÖжÏÁ¬ÐøÁËÔ¼Á½Ì죬Ȼºó»Ö¸´ÁËÕý³£ÔË×÷ ¡£CISAûÓÐ͸¶ÀÕË÷Èí¼þµÄÃû³Æ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/dhs-says-ransomware-hit-us-gas-pipeline-operator/


5¡¢ÒÁÀʺڿÍÀûÓÃVPNÈí¼þ©¶´¹¥»÷È«ÇòµÄÆóÒµºÍÕþ¸®»ú¹¹


×ðÁú¶¶È¦ - Ϊdu¶øÉú


ƾ¾ÝÄþ¾²³§ÉÌClearSkyµÄÒ»·Ý³ÂËߣ¬ÒÁÀʺڿÍÒ»Ö±ÔÚÀûÓÃVPNÈí¼þÖеÄ©¶´ÔÚÊÀ½ç¸÷µØµÄ¹«Ë¾ÖÐÖ²ÈëºóÃÅ£¬ÆäÄ¿±êº­¸ÇIT¡¢µçÐÅ¡¢Ê¯ÓͺÍÌìÈ»Æø¡¢º½¿Õ¡¢Äþ¾²ÁìÓòµÄ¹«Ë¾ºÍÕþ¸®»ú¹¹ ¡£ÒÁÀʺڿÍÒѽ«Pulse Secure¡¢Fortinet¡¢Palo Alto NetworksºÍCitrixµÄVPN¶¨Î»ÎªÈëÇÖ´óÐ͹«Ë¾µÄ¹¤¾ß£¬ÆäÀûÓõÄ©¶´°üÂÞPulse Secure VPN(CVE-2019-11510)¡¢Fortinet FortiOS VPN(CVE-2018-13379)¡¢Palo Alto Networks VPN(CVE-2019-1579)ÒÔ¼°Citrix VPN(CVE-2019-19781)µÈ ¡£¶ÔÕâЩϵͳµÄ¹¥»÷ʼÓÚÈ¥ÄêÏÄÌ죬µ«µ½2020ÄêÕâÖÖ¹¥»÷ÈÔÔÚ¼ÌÐø ¡£ClearSky³ÂËßÇ¿µ÷£¬¶ÔÈ«ÇòVPN·þÎñÆ÷µÄ¹¥»÷ËƺõÊÇÖÁÉÙÈý¸öÒÁÀʺڿÍ×éÖ¯µÄÊÂÇ飬°üÂÞAPT33¡¢APT34ºÍAPT39 ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/iranian-hackers-have-been-hacking-vpn-servers-to-plant-backdoors-in-companies-around-the-world/