BadBox¶ñÒâÈí¼þ½©Ê¬ÍøÂçÒ»Á¬À©ÕÅ£¬£¬ £¬£¬£¬£¬È«ÇòѬȾװ±¸³¬19.2Íǫ̀

Ðû²¼Ê±¼ä 2024-12-20

1. BadBox¶ñÒâÈí¼þ½©Ê¬ÍøÂçÒ»Á¬À©ÕÅ£¬£¬ £¬£¬£¬£¬È«ÇòѬȾװ±¸³¬19.2Íǫ̀


12ÔÂ19ÈÕ£¬£¬ £¬£¬£¬£¬BadBox Android ¶ñÒâÈí¼þ½©Ê¬ÍøÂçÔÚÈ«Çò¹æÄ£ÄÚÒ»Á¬À©ÕÅ£¬£¬ £¬£¬£¬£¬Ñ¬È¾×°±¸ÊýÄ¿ÒÑÁè¼Ý192,000̨£¬£¬ £¬£¬£¬£¬ÆäÖаüÀ¨×ÅÃûÆ·ÅÆµÄÖÇÄܵçÊÓºÍÖÇÄÜÊÖ»ú£¬£¬ £¬£¬£¬£¬ÈçYandexºÍº£ÐÅ¡£¡£¸Ã¶ñÒâÈí¼þ×î³õͨ¹ý¹©Ó¦Á´¹¥»÷ѬȾ²»×ÅÃûÖÆÔìÉ̵Ä×°±¸£¬£¬ £¬£¬£¬£¬ÏÖÒÑÀ©Õ¹µ½ÔÚÏßÏúÊÛµÄÎÞÃû²úÆ·¼°ÆäËû×ÅÃûÆ·ÅÆ¡£¡£ÆäÄ¿µÄÖ÷ÒªÊÇ»ñÈ¡¾­¼ÃÀûÒæ£¬£¬ £¬£¬£¬£¬Í¨¹ý½«×°±¸Äð³ÉסլÊðÀí»òÓÃÓÚ¹ã¸æÚ²Æ­ÊµÏÖ¡£¡£Ö»¹ÜµÂ¹úÁª°îÐÅÏ¢Çå¾²¾Ö£¨BSI£©ÔøÐû²¼µ·»ÙBadBoxµÄÐж¯£¬£¬ £¬£¬£¬£¬ÇжÏÁË30,000̨װ±¸µÄͨѶ£¬£¬ £¬£¬£¬£¬µ«BadBoxÈÔÔÚ¼ÌÐøÉú³¤¡£¡£BitSightÑо¿Ö°Ô±·¢Ã÷£¬£¬ £¬£¬£¬£¬¸Ã¶ñÒâÈí¼þÒÑ×°ÖÃÔÚ192,000̨װ±¸ÉÏ£¬£¬ £¬£¬£¬£¬ÇÒÊýÄ¿ÈÔÔÚÎȲ½ÔöÌí¡£¡£ÊÜÓ°ÏìµÄ×°±¸Ö÷ҪλÓÚ¶íÂÞ˹¡¢Öйú¡¢Ó¡¶È¡¢°×¶íÂÞ˹¡¢°ÍÎ÷ºÍÎÚ¿ËÀ¼¡£¡£ÏûºÄÕßÓ¦Ó¦ÓÃ×îеĹ̼þÇå¾²¸üС¢½«ÖÇÄÜ×°±¸ÓëÒªº¦ÏµÍ³¸ôÀë²¢ÔÚ²»Ê¹ÓÃʱ¶Ï¿ªÍøÂçÅþÁ¬£¬£¬ £¬£¬£¬£¬ÒÔÌá·ÀBadBoxѬȾ¡£¡£Èô×°±¸ÎÞ¿ÉÓøüУ¬£¬ £¬£¬£¬£¬½¨Òé¶Ï¿ªÍøÂç»ò¹Ø±Õ×°±¸¡£¡£Ñ¬È¾¼£Ïó°üÀ¨¹ýÈÈ¡¢ÐÔÄÜϽµ¡¢´¦Öóͷ£Æ÷ʹÓÃÂʸߺÍÍøÂçÁ÷Á¿Òì³£¡£¡£


https://www.bleepingcomputer.com/news/security/badbox-malware-botnet-infects-192-000-android-devices-despite-disruption/


2. ΢Èí365 OfficeÓ¦ÓÃÏÖ¡°²úÆ·ÒÑÍ£Óá±¹ýʧ£¬£¬ £¬£¬£¬£¬Ô´ÓÚÔÊÐíÖ¤±ä»»ÎÊÌâ


12ÔÂ19ÈÕ£¬£¬ £¬£¬£¬£¬Î¢ÈíÕýÔÚÊÓ²ìÒ»¸öµ¼ÖÂMicrosoft 365 OfficeÓ¦ÓÃÓû§´¥·¢¡°²úÆ·ÒÑÍ£Óá±¹ýʧµÄÎÊÌâ¡£¡£¾ÝRedditºÍ΢ÈíÉçÇøÍøÕ¾Éϵı¨¸æ£¬£¬ £¬£¬£¬£¬Óû§ÔÚOfficeÓ¦ÓÃÖÐËæ»úÊÕµ½´Ë¹ýʧ£¬£¬ £¬£¬£¬£¬Ôì³ÉÔÓÂÒºÍÖÐÖ¹¡£¡£ÎÊÌâÔ´ÓÚÖÎÀíÔ±ÌᳫµÄÔÊÐíÖ¤±ä»»£¬£¬ £¬£¬£¬£¬ÈçÒÆ¶¯Óû§µ½²î±ðµÄÔÊÐí×é»ò¸ü¸ÄÓû§¶©ÔÄ¡£¡£µ±ÖÎÀíԱɾ³ý²¢ÖØÐÂÌí¼ÓÓû§µ½ÔÊÐíÖ¤×é¡¢µ÷½âÔÊÐíÖ¤»òЧÀÍÍýÏëÉèÖ㬣¬ £¬£¬£¬£¬»òÇл»¡°×îа汾µÄ×ÀÃæÓ¦ÓóÌÐò¡±Ð§ÀÍÍýÏëʱ£¬£¬ £¬£¬£¬£¬Ò²»á´¥·¢´ËÎÊÌâ¡£¡£Óû§¿ÉÒÔͨ¹ýµ¥»÷¹ýʧºá·ùÉϵġ°ÖØÐ¼¤»î¡±°´Å¥»òÍ˳ö²¢ÖØÐÂÆô¶¯Microsoft 365Ó¦ÓÃÀ´½â¾ö´ËÎÊÌâ¡£¡£ÈôÊÇÎÊÌâÈÔÈ»±£´æ£¬£¬ £¬£¬£¬£¬½¨ÒéÁªÏµÖÎÀíÔ±¼ì²é¶©ÔÄÊÇ·ñÒÑÓâÆÚ¡£¡£Î¢Èí½¨ÒéÓÐδ½â¾öÖ§³Ö°¸ÀýµÄÓû§ÌṩʹÓÃOfficeÔÊÐíÕï¶Ï¹¤¾ßÍøÂçµÄÕï¶ÏÊý¾Ý£¬£¬ £¬£¬£¬£¬²¢ÌáÐÑÊÜÓ°ÏìµÄÓû§Ìṩ´æ´¢ÔÚ%temp%/diagnosticsĿ¼ÖеÄÈÕÖ¾¡£¡£ËäȻ΢ÈíÉÐδÐû²¼ÐÞ¸´Ê±¼ä±í£¬£¬ £¬£¬£¬£¬µ«Æä¹¤³ÌÍŶÓÕýÔÚÆð¾¢ÊÓ²ì´ËÎÊÌ⣬£¬ £¬£¬£¬£¬²¢ÃãÀøÊÜÓ°ÏìµÄÓû§ºÍÖÎÀíÔ±¹Ø×¢ÆäÖ§³ÖÇþµÀÒÔ»ñÈ¡¸üС£¡£


https://www.bleepingcomputer.com/news/microsoft/microsoft-365-users-hit-by-random-product-deactivation-errors/


3. ÑÇÂíÑ·Ó¦ÓÃÊÐËÁ¾ªÏÖBMI CalculationVsn¶ñÒâÌØ¹¤Èí¼þ


12ÔÂ19ÈÕ£¬£¬ £¬£¬£¬£¬ÔÚÑÇÂíÑ·Ó¦ÓÃÊÐËÁÖУ¬£¬ £¬£¬£¬£¬Ò»¿îÃûΪ¡°BMI CalculationVsn¡±µÄAndroidÓ¦ÓóÌÐò±»·¢Ã÷ÏÖʵÉÏÊÇÒ»¿î¶ñÒâÌØ¹¤Èí¼þ£¬£¬ £¬£¬£¬£¬Ëüαװ³É¿µ½¡¹¤¾ßÇÔÈ¡Óû§×°±¸Êý¾Ý¡£¡£¸ÃÓ¦ÓÃÓÉÂõ¿Ë·ÆÊµÑéÊÒµÄÑо¿Ö°Ô±·¢Ã÷£¬£¬ £¬£¬£¬£¬²¢Òѱ»´ÓÊÐËÁÖÐÒÆ³ý£¬£¬ £¬£¬£¬£¬µ«ÒÑ×°ÖõÄÓû§ÐèÊÖ¶¯É¾³ý²¢Ö´ÐÐÍêÕûɨÃèÒÔɨ³ý²ÐÁôºÛ¼£¡£¡£¸ÃÌØ¹¤Èí¼þÓÉ¡°PT Visionet Data Internasional¡±Ðû²¼£¬£¬ £¬£¬£¬£¬×î³õÐû´«ÎªÉíÌåÖÊÁ¿Ö¸Êý£¨BMI£©ÅÌËãÆ÷£¬£¬ £¬£¬£¬£¬µ«ºǫִ́ÐжñÒâ²Ù×÷£¬£¬ £¬£¬£¬£¬°üÀ¨Æô¶¯ÆÁÄ»Â¼ÖÆÐ§ÀÍ¡¢É¨ÃèÒÑ×°ÖõÄÓ¦ÓóÌÐòÒÔ¼°×èµ²²¢ÍøÂç¶ÌÐÅ£¬£¬ £¬£¬£¬£¬°üÀ¨Ò»´ÎÐÔÃÜÂëºÍÑéÖ¤Âë¡£¡£¼øÓÚ´ËÀàΣÏÕÓ¦ÓÃÈÔÄÜÌÓ±ÜÕýµ±Ó¦ÓÃÊÐËÁµÄ´úÂëÉó²é£¬£¬ £¬£¬£¬£¬AndroidÓû§Ó¦Ö»×°ÖÃÀ´×Ô×ÅÃû¿¯ÐÐÉ̵ÄÓ¦Ó㬣¬ £¬£¬£¬£¬²¢×Ðϸ¼ì²éËùÇëÇóµÄȨÏÞ£¬£¬ £¬£¬£¬£¬ÔÚ×°Öúó×÷·ÏÓÐΣº¦µÄȨÏÞ¡£¡£Í¬Ê±£¬£¬ £¬£¬£¬£¬¼á³ÖGoogle Play Protect»îԾ״̬¹ØÓÚ¼ì²â²¢×èÖ¹ÒÑÖª¶ñÒâÈí¼þÖÁ¹ØÖ÷Òª¡£¡£


https://www.bleepingcomputer.com/news/security/android-spyware-found-on-amazon-appstore-disguised-as-health-app/


4. Mirai¶ñÒâÈí¼þʹÓÃĬÈÏÆ¾Ö¤Ñ¬È¾Session Smart·ÓÉÆ÷


12ÔÂ19ÈÕ£¬£¬ £¬£¬£¬£¬Õ°²©ÍøÂçÏò¿Í»§·¢³öÖÒÑÔ£¬£¬ £¬£¬£¬£¬Ö¸³öMirai¶ñÒâÈí¼þÕýÔÚʹÓÃĬÈÏÆ¾Ö¤¹¥»÷²¢Ñ¬È¾Session Smart·ÓÉÆ÷£¬£¬ £¬£¬£¬£¬½ø¶øÌᳫÂþÑÜʽ¾Ü¾øÐ§ÀÍ(DDoS)¹¥»÷¡£¡£¸Ã¶ñÒâÈí¼þ»áɨÃè¾ßÓÐĬÈϵǼƾ֤µÄ×°±¸£¬£¬ £¬£¬£¬£¬²¢ÔÚ»ñµÃ»á¼ûȨÏÞºóÔ¶³ÌÖ´ÐÐÏÂÁî¡£¡£Õ°²©ÍøÂ罨Òé¿Í»§Á¬Ã¦¸ü¸ÄËùÓÐSession Smart·ÓÉÆ÷ÉϵÄĬÈÏÆ¾Ö¤£¬£¬ £¬£¬£¬£¬²¢Ê¹ÓÃÆæÒìÇÒÇ¿µÄÃÜÂ룬£¬ £¬£¬£¬£¬Í¬Ê±¼á³Ö¹Ì¼þ¸üУ¬£¬ £¬£¬£¬£¬Éó²é»á¼ûÈÕÖ¾ÖеÄÒì³££¬£¬ £¬£¬£¬£¬²¢°²ÅÅÈëÇÖ¼ì²âϵͳºÍ·À»ðǽÀ´ÔöÇ¿Çå¾²ÐÔ¡£¡£±ðµÄ£¬£¬ £¬£¬£¬£¬Õ°²©ÍøÂ绹ÌáÐÑÖÎÀíÔ±×¢ÖØÇ±ÔÚµÄÈëÇÖÖ¸±ê£¬£¬ £¬£¬£¬£¬ÈçɨÃè³£¼û¶Ë¿Ú¡¢SSHЧÀ͵ǼʵÑéʧ°Ü¡¢³öÕ¾Á÷Á¿¼¤ÔöµÈ¡£¡£ÒѾ­Ñ¬È¾µÄ·ÓÉÆ÷±ØÐèÖØÐÂÓ³Ïñ»¯²Å»ªÖØÐÂÉÏÏß¡£¡£´Ëǰ£¬£¬ £¬£¬£¬£¬Õ°²©ÍøÂçÒ²Ôø¶à´ÎÖÒÑÔÆä²úÆ·Öб£´æµÄÔ¶³Ì´úÂëÖ´ÐÐÎó²îºÍÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¬£¬ £¬£¬£¬£¬²¢Ðû²¼ÁËÏìÓ¦µÄ²¹¶¡¡£¡£


https://www.bleepingcomputer.com/news/security/juniper-warns-of-mirai-botnet-targeting-session-smart-routers/


5. BeyondTrustÔâÍøÂç¹¥»÷£¬£¬ £¬£¬£¬£¬·¢Ã÷Çå¾²Îó²î²¢½ôÆÈÓ¦¶Ô


12ÔÂ19ÈÕ£¬£¬ £¬£¬£¬£¬BeyondTrustÊÇÒ»¼ÒÌá¹©ÌØÈ¨»á¼ûÖÎÀíºÍÇå¾²Ô¶³Ì»á¿´·¨¾ö¼Æ»®µÄÍøÂçÇå¾²¹«Ë¾£¬£¬ £¬£¬£¬£¬ÔÚ12Ô³õÔâÊÜÁËÍøÂç¹¥»÷¡£¡£ÍþвÐÐΪÕßÈëÇÖÁËÆä²¿·ÖÔ¶³ÌÖ§³ÖSaaSʵÀý£¬£¬ £¬£¬£¬£¬»ñµÃÁËÔ¶³ÌÖ§³ÖSaaS APIÃÜÔ¿µÄ»á¼ûȨÏÞ£¬£¬ £¬£¬£¬£¬¿ÉÒÔÖØÖÃÍâµØÓ¦ÓóÌÐòÕÊ»§µÄÃÜÂë¡£¡£BeyondTrustÁ¬Ã¦×÷·ÏÁËAPIÃÜÔ¿£¬£¬ £¬£¬£¬£¬Í¨ÖªÁËÊÜÓ°ÏìµÄ¿Í»§£¬£¬ £¬£¬£¬£¬²¢ÔÝÍ£ÁËÕâЩʵÀý¡£¡£ÔÚÊÓ²ìÀú³ÌÖУ¬£¬ £¬£¬£¬£¬·¢Ã÷ÁËÁ½¸öÎó²î£¬£¬ £¬£¬£¬£¬ÆäÖÐÒ»¸öΪÑÏÖØµÄÏÂÁî×¢ÈëÎó²îCVE-2024-12356£¬£¬ £¬£¬£¬£¬ÁíÒ»¸öΪÖеÈÑÏÖØÐÔÎó²îCVE-2024-12686¡£¡£BeyondTrustÒÑ×Ô¶¯ÔÚËùÓÐÔÆÊµÀýÉÏÓ¦ÓÃÁËÕë¶ÔÕâÁ½¸öȱÏݵIJ¹¶¡£¬£¬ £¬£¬£¬£¬µ«ÔËÐÐ×ÔÍйÜʵÀýµÄÓû§ÐèÒªÊÖ¶¯Ó¦ÓÃÇå¾²¸üС£¡£ÏÖÔÚÉв»ÇåÎúÍþвÐÐΪÕßÊÇ·ñʹÓÃÕâЩÎó²îÀ´¹¥»÷ÏÂÓοͻ§£¬£¬ £¬£¬£¬£¬µ«CISAÌåÏÖCVE-2024-12356Òѱ»Ê¹ÓÃÓÚ¹¥»÷¡£¡£BeyondTrustÌåÏÖ£¬£¬ £¬£¬£¬£¬ËûÃÇÕýÔÚ¼ÌÐøÓë×ÔÁ¦µÄµÚÈý·½ÍøÂçÇå¾²¹«Ë¾ÏàÖú¾ÙÐг¹µ×ÊӲ죬£¬ £¬£¬£¬£¬²¢×¨×¢ÓÚÈ·±£ËùÓпͻ§ÊµÀý¶¼»ñµÃÖÜÈ«¸üкÍÇå¾²°ü¹Ü¡£¡£


https://www.bleepingcomputer.com/news/security/beyondtrust-says-hackers-breached-remote-support-saas-instances/


6. FortiWLMÆØÑÏÖØÎó²î£º¿ÉÔ¶³Ì½ÓÊÜ×°±¸


12ÔÂ19ÈÕ£¬£¬ £¬£¬£¬£¬FortinetÎÞÏßÖÎÀíÆ÷£¨FortiWLM£©Öб£´æÒ»¸ö±àºÅΪCVE-2023-34990µÄÑÏÖØÎó²î£¬£¬ £¬£¬£¬£¬¸ÃÎó²îÔÊÐíÔ¶³Ì¹¥»÷Õßͨ¹ýÌØÖÆWebÇëÇóÖ´ÐÐδ¾­ÊÚȨµÄ´úÂë»òÏÂÁ£¬ £¬£¬£¬£¬´Ó¶ø½ÓÊÜ×°±¸¡£¡£´ËÎó²îÊÇÒ»¸öÏà¶Ô·¾¶±éÀúÎó²î£¬£¬ £¬£¬£¬£¬ÆÀ·ÖΪ9.8£¬£¬ £¬£¬£¬£¬ÓÉHorizon3Ñо¿Ô±Zach HanleyÔÚ2023Äê5Ô·¢Ã÷¡£¡£È»¶ø£¬£¬ £¬£¬£¬£¬ÔÚ³¤´ïÊ®¸öÔµÄʱ¼äÀ£¬ £¬£¬£¬£¬¸ÃÎó²îδ»ñµÃÐÞ¸´£¬£¬ £¬£¬£¬£¬ÆÈʹHanleyÔÚ2024Äê3Ô¹ûÕæÅû¶ÁËÎó²îÐÅÏ¢ºÍ֤ʵ´úÂ루POC£©¡£¡£Ê¹ÓôËÎó²î£¬£¬ £¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔ¶ÁÈ¡Ãô¸ÐÈÕÖ¾Îļþ£¬£¬ £¬£¬£¬£¬°üÀ¨ÖÎÀíÔ±»á»°ID£¬£¬ £¬£¬£¬£¬½ø¶øÐ®ÖÆÖÎÀíÔ±»á»°²¢»ñÈ¡ÌØÈ¨»á¼û¡£¡£¸ÃÎó²îÓ°ÏìÁËFortiWLM°æ±¾8.6.0ÖÁ8.6.5ºÍ8.5.0ÖÁ8.5.4¡£¡£Ö»¹ÜÑо¿Ö°Ô±ÒÑ·¢³öÖÒÑÔ£¬£¬ £¬£¬£¬£¬µ«ÓÉÓÚȱ·¦CVE IDºÍÇ徲ͨ¸æ£¬£¬ £¬£¬£¬£¬Óû§²¢Î´Òâʶµ½Î£º¦¡£¡£Ö±µ½2024Äê12ÔÂ18ÈÕ£¬£¬ £¬£¬£¬£¬Fortinet²ÅÐû²¼Ç徲ͨ¸æ³Æ£¬£¬ £¬£¬£¬£¬¸ÃÎó²îÒÑÔÚ2023Äê9ÔÂβÐû²¼µÄFortiWLM°æ±¾8.6.6ºÍ8.5.5ÖлñµÃÐÞ¸´¡£¡£¿£Ë¼Á¿µ½FortiWLM±»ÆÕ±éÓ¦ÓÃÓÚÕþ¸®»ú¹¹¡¢Ò½ÁƱ£½¡×éÖ¯¡¢½ÌÓý»ú¹¹ºÍ´óÐÍÆóÒµµÈÒªº¦ÇéÐÎÖУ¬£¬ £¬£¬£¬£¬¸ÃÎó²îµÄ±£´æ¿ÉÄܵ¼ÖÂÕû¸öÍøÂçÖÐÖ¹ºÍÃô¸ÐÊý¾Ýй¶¡£¡£Òò´Ë£¬£¬ £¬£¬£¬£¬Ç¿ÁÒ½¨ÒéFortiWLMÖÎÀíԱʵʱӦÓÃËùÓпÉÓøüС£¡£


https://www.bleepingcomputer.com/news/security/fortinet-warns-of-critical-fortiwlm-bug-giving-hackers-admin-privileges/