CodeMeterÖб£´æÑÏÖØÎó²î£¬£¬£¬£¬£¬¿Éµ¼ÖÂOT¹©Ó¦Á´¹¥»÷£»£»ACSCÐû²¼¡¶2019¨C2020Äê¶ÈÍøÂçÍþв±¨¸æ¡·
Ðû²¼Ê±¼ä 2020-09-11
Claroty·¢Ã÷Î÷ÃÅ×ӵȶ¥¼¶ICS¹©Ó¦ÉÌʹÓõĵÚÈý·½¹¤Òµ×é¼þCodeMeterÖб£´æ6¸öÑÏÖØµÄÎó²î£¬£¬£¬£¬£¬»ò½«µ¼ÖÂOT¹©Ó¦Á´¹¥»÷£¬£¬£¬£¬£¬ÕâЩÎó²îµÄCVSSÆÀ·Ö¾ùΪ10.0¡£¡£¡£¡£¡£CISAÌåÏÖ£¬£¬£¬£¬£¬¹¥»÷ÕßÀÖ³ÉʹÓÃÕâЩÎó²îºó¿É¸ü¸ÄºÍαÔìÔÊÐíÖ¤Îļþ£¬£¬£¬£¬£¬µ¼Ö¾ܾøÐ§ÀÍÇéÐΣ¬£¬£¬£¬£¬Ç±ÔÚµØÊµÏÖÔ¶³ÌÖ´ÐдúÂë¡¢¶ÁÈ¡¶ÑÊý¾Ý²¢×èÖ¹ÒÀÀµCodeMeterµÄµÚÈý·½Èí¼þµÄÕý³£ÔËÐС£¡£¡£¡£¡£ÆäÖÐ×îÑÏÖØµÄÎó²î¿Éͨ¹ýÆÆËðCodeMeterÍ¨Ñ¶ÐæÅºÍÄÚ²¿APÒÔIÔ¶³ÌÖ´ÐдúÂ룬£¬£¬£¬£¬ÊµÏÖICSϵͳµÄÍêÈ«½ÓÊÜ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/critical-bugs-enable-ot-supply/
2.ºÚ¿Í¹¥»÷˹Âå·¥¿Ë¼ÓÃÜÇ®±ÒÉúÒâËù£¬£¬£¬£¬£¬ÍµÈ¡¼ÛÖµ540ÍòÃÀԪǮ±Ò

ºÚ¿Í¹¥»÷˹Âå·¥¿Ë¼ÓÃÜÇ®±ÒÉúÒâËùETERBASE£¬£¬£¬£¬£¬ÍµÈ¡Á˼ÛÖµ540ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÓÚ±¾ÖÜËÄÅû¶¸ÃÊÂÎñ£¬£¬£¬£¬£¬ÌåÏÖÆä´æ´¢Á˱ÈÌØ±Ò¡¢ÒÔÌ«±Ò¡¢ALGO¡¢Ripple¡¢TezosºÍTRONµÄÁù¸ö¼ÓÃÜÇ®°üÎļþ±»µÁ£¬£¬£¬£¬£¬ÆäÒѼì²âµ½¹¥»÷£¬£¬£¬£¬£¬µ«ÎÞ·¨×èÖ¹ËüµÄ±¬·¢¡£¡£¡£¡£¡£ETERBASEÌåÏÖ£¬£¬£¬£¬£¬ËüÔÚÕâЩǮ±Ò±»µÁʱ¾Í¶ÔÆä¾ÙÐÐÁ˸ú×Ù£¬£¬£¬£¬£¬ÏÖÔÚ±»µÁ×ʽðÔÚ¸÷×ÔÇø¿éÁ´ÉϵÄ×ªÒÆ£¬£¬£¬£¬£¬¸Ã¹«Ë¾Ò²ÁªÏµÁ˱»µÁ×ʽðËùÔÚµÄÉúÒâÒÔÊǶ³½á±»µÁ×ʽ𡣡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/slovak-cryptocurrency-exchange-eterbase-discloses-5-4-million-hack/
3.Ñо¿Ö°Ô±·¢Ã÷ÐÂÐ͹¥»÷Raccoon£¬£¬£¬£¬£¬Õë¶ÔTLS¼ÓÃÜÐÒéÇÔÊØÐÅÏ¢

Ñо¿Ö°Ô±Åû¶ÁËÕë¶ÔTLS¼ÓÃÜÐÒéµÄÐÂÐ͹¥»÷·½·¨Raccoon£¬£¬£¬£¬£¬¸Ã¹¥»÷¿ÉÓÃÓÚ½âÃÜÓû§ºÍЧÀÍÆ÷Ö®¼äµÄHTTPSÅþÁ¬²¢¶ÁÈ¡Ãô¸ÐͨѶ¡£¡£¡£¡£¡£Raccoon¹¥»÷´Ó»ù´¡ÉÏ˵ÊÇ׼ʱ¹¥»÷£¬£¬£¬£¬£¬¹¥»÷Õß»áÕÉÁ¿Ö´ÐÐÒÑÖªÃÜÂë²Ù×÷ËùÐèµÄʱ¼ä£¬£¬£¬£¬£¬ÒÔÈ·¶¨²¿·ÖËã·¨¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³Æ£¬£¬£¬£¬£¬ËùÓÐʹÓÃDiffie-HellmanÃÜÔ¿½»Á÷À´½¨ÉèTLSÅþÁ¬µÄЧÀÍÆ÷¶¼ÈÝÒ×Êܵ½´ËÀ๥»÷¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬Ò»Ð©¹©Ó¦ÉÌ£¬£¬£¬£¬£¬ÈçMicrosoft¡¢Mozilla¡¢OpenSSLºÍF5 NetworksÒÑÐû²¼Çå¾²¸üÐÂÒÔ×èÖ¹Raccoon¹¥»÷¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/raccoon-attack-allows-hackers-to-break-tls-encryption-under-certain-conditions/
4.ZeppelinÉý¼¶»Ø¹é£¬£¬£¬£¬£¬ÒÔ·¢Æ±ÎªÖ÷ÌâÈö²¥ÐµÄľÂí

Ñо¿Ö°Ô±Juniper Threatlab·¢Ã÷ZeppelinÉý¼¶»Ø¹é£¬£¬£¬£¬£¬ÒÔ·¢Æ±ÎªÖ÷ÌâÈö²¥ÐµÄľÂí¡£¡£¡£¡£¡£ÔÚ×îÐµĹ¥»÷»î¶¯ÖУ¬£¬£¬£¬£¬ºÚ¿ÍÒÀȻʹÓôøÓжñÒâºêµÄÖ÷ÌâΪ·¢Æ±´¹ÂÚµç×ÓÓʼþ¡£¡£¡£¡£¡£ºÚ¿Í½«Visual Basic¾ç±¾µÄƬ¶ÏÒþ²ØÔÚÖÖÖÖͼÏñºóµÄÀ¬»øÎı¾ÖУ¬£¬£¬£¬£¬¶ñÒâºê»áÆÊÎö²¢ÌáÈ¡ÕâЩ¾ç±¾£¬£¬£¬£¬£¬È»ºó½«ÆäдÈëc£º\wordpress\about1.vbsÖеÄÎļþÖС£¡£¡£¡£¡£Ö®ºó£¬£¬£¬£¬£¬Ê¹Óõڶþ¸öºêÖ´ÐÐabout1.vbs£¬£¬£¬£¬£¬ÒÔÏÂÔØÐµÄľÂí¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/zeppelin-ransomware-returns-trojan/159092/
5.ÈýÐÇÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´GalaxyÉϵĶà¸öÎó²î

ÔÚAndroidÐû²¼ÁË9ÔÂÇå¾²¸üк󣬣¬£¬£¬£¬ÈýÐÇÒ²Ðû²¼ÁËÇå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´ÆäGalaxyÉϵĶà¸öÎó²î¡£¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄ×îÑÏÖØµÄÎó²îÖ®Ò»±»×·×ÙΪCVE-2020-0245£¬£¬£¬£¬£¬Ó°ÏìÁËMedia Framework×é¼þ£¬£¬£¬£¬£¬¿Éµ¼ÖÂÔ¶³ÌÖ´ÐдúÂëºÍÐÅÏ¢Åû¶¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬»¹ÐÞ¸´ÁËÆäFramework¡¢Media FrameworkºÍϵͳÖеĶà¸öȨÏÞÌáÉýÎó²î£¨CVE-2020-0074¡¢CVE-2020-0388¡¢CVE-2020-0391¡¢CVE-2020-0401¡¢CVE-2020-0392¡¢CVE-2020-0386ºÍCVE-2020-0394£©¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/samsung-fixes-critical-android-flaws-with-september-updates/
6.ACSCÐû²¼¡¶2019¨C2020Äê¶ÈÍøÂçÍþв±¨¸æ¡·

°Ä´óÀûÑÇÍøÂçÇå¾²ÖÐÐÄ£¨ACSC£©ÒÑÐû²¼ÓйØ2019-2020ÄêÖ÷ÒªÍøÂçÍþвºÍͳ¼ÆÊý¾ÝµÄÄê¶È±¨¸æ¡£¡£¡£¡£¡£¸Ã±¨¸æÇ¿µ÷Ö¸³ö£¬£¬£¬£¬£¬ÍøÂç´¹ÂÚºÍÓã²æ´¹ÂÚÈÔÈ»ÊǺڿͻñȡСÎÒ˽¼ÒÐÅÏ¢»òÓû§Ö¤ÊéÒÔ½øÈëÍøÂç»òÈö²¥¶ñÒâÄÚÈݵÄ×î³£¼ûÒªÁ죬£¬£¬£¬£¬ÀÕË÷Èí¼þÒѳÉΪ¶ÔÆóÒµºÍÕþ¸®µÄÖØ´óÍþв¡£¡£¡£¡£¡£ºÚ¿Íͨ³£Í¨¹ýÓã²æÊ½´¹ÂÚ²»·¨»ñÈ¡Óû§µÇ¼ºÍÖ¤Ê飬£¬£¬£¬£¬È»ºóʹÓÃÔ¶³Ì×ÀÃæÐÒé(RDP)ЧÀÍ×°ÖÃÀÕË÷Èí¼þ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://us-cert.cisa.gov/ncas/current-activity/2020/09/10/acsc-releases-annual-cyber-threat-report-2019-2020


¾©¹«Íø°²±¸11010802024551ºÅ