PAN OS±£´æCVSSv3ÆÀ·Ö10µÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¬£¬£¬£¬¿ÉÈÆ¹ý·À»ðǽ£»£»£»£»£»ºÚ¿Íй¶°ÍÎ÷×Üͳ¼°20Íò¹«ÎñԱСÎÒ˽¼ÒÐÅÏ¢
Ðû²¼Ê±¼ä 2020-06-301.PAN OS±£´æCVSSv3ÆÀ·Ö10µÄÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¬£¬£¬£¬¿ÉÈÆ¹ý·À»ðǽ
Palo Alto NetworksÅû¶ÁËÒ»¸öÖØ´óÎó²î£¨CVE-2020-2021£©£¬£¬£¬£¬¸ÃÎó²î¿ÉʹºÚ¿ÍÈÆ¹ý·À»ðǽºÍÆä¹«Ë¾VPN²úÆ·µÄÉí·ÝÑéÖ¤¡£¡£¡£¡£¸ÃÎó²îÊÇÔÚCVSSv3ÑÏÖØÆ·¼¶ÖлñµÃ10·ÖµÄÓÐÊýÎó²îÖ®Ò»£¬£¬£¬£¬¼È²»ÐèÒª¸ß¼¶ÊÖÒÕÊÖÒÕ£¬£¬£¬£¬ÓÖ¿ÉÒÔͨ¹ýInternet¾ÙÐÐÔ¶³ÌʹÓᣡ£¡£¡£ºÚ¿Í¿ÉÒÔʹÓøÃÎó²î¸ü¸ÄPAN OSµÄÉèÖú͹¦Ð§£¬£¬£¬£¬À´ÊµÏÖ¹¥»÷¡£¡£¡£¡£ÃÀ¹úÍøÂç˾ÁÔòÒªÇóËùÓÐÊÜCVE-2020-2021Ó°ÏìµÄ×°±¸Á¬Ã¦ÐÞ¸´¸ÃÎó²î£¬£¬£¬£¬²¢ÌåÏÖÍâ¹úµÄAPT×éÖ¯¿ÉÄܺܿì¾Í»áʵÑéʹÓøÃÎó²îÌᳫ¹¥»÷¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/us-cyber-command-says-foreign-hackers-will-most-likely-exploit-new-pan-os-security-bug/
2.ºÚ¿Íй¶°ÍÎ÷×Üͳ¼°20Íò¹«ÎñԱСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬¾¯·½ÈÔÔÚÊÓ²ìÖÐ
ºÚ¿Í×éÖ¯Anonymous BrazilÉù³Æ£¬£¬£¬£¬°ÍÎ÷×Üͳ²©¶ûË÷ÄÉÂÞºÍËûµÄ¶ù×Ó£¬£¬£¬£¬ÒÔ¼°¶àÃû²¿³¤µÄСÎÒ˽¼ÒÏêϸÐÅÏ¢ÒѾй¶£¬£¬£¬£¬Ëæºó°ÍÎ÷Áª°î¾¯Ô±¶Ô´ËÊÂÎñÕö¿ªÁËÊӲ졣¡£¡£¡£ÊӲ췢Ã÷£¬£¬£¬£¬³ýÁËÔÚÍøÉÏ×ß©µÄÐÅÏ¢Í⣬£¬£¬£¬¸ÃºÚ¿Í×éÖ¯»¹ÍµÈ¡ÁËÁè¼Ý20ÍòÃûÎäÊ¿ºÍÕþ¸®¹ÙÔ±µÄÊý¾Ý¡£¡£¡£¡£ÎªÍµÊØÐÅÏ¢£¬£¬£¬£¬ºÚ¿Í¹¥»÷Á˶à¸öÖݵĴóѧ¡¢ÊÐÕþÌüºÍÊÐÒé»áϵͳ£¬£¬£¬£¬½öÔÚÄÏÀï°Â¸ñÀ¼µÂÖÝ£¬£¬£¬£¬¾ÍÓÐ90¶à¸ö»ú¹¹Ôâµ½¹¥»÷¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬¾¯·½¶Ô´ËÊÂÈÔÔÚÊÓ²ìÖС£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/brazilian-federal-police-investigates-presidential-data-leak/
3.SnykÐû²¼±¨¸æ£¬£¬£¬£¬¿ªÔ´Èí¼þ°üÖеÄÐÂÎó²î±ÈÈ¥ÄêϽµÁË20£¥
SnykÐû²¼±¨¸æÌåÏÖ£¬£¬£¬£¬½ñÄ꿪ԴÈí¼þ°üÖеÄÐÂÎó²îÊýÄ¿±ÈÈ¥ÄêϽµÁË20£¥¡£¡£¡£¡£¸Ã±¨¸æ¶ÔÄÇЩӰÏìÁËʹÓÿªÔ´¿â×éÖ¯µÄÕûÌåÇå¾²ÐÔµÄÎó²îºÍ6¸öÖ÷Á÷µÄÉú̬ϵͳ¾ÙÐÐÁËÑо¿¡£¡£¡£¡£Ñо¿·¢Ã÷£¬£¬£¬£¬ÔÚ2019Ä꣬£¬£¬£¬ÐÂÎó²îïÔÌÁ˽ü20£¥£»£»£»£»£»¿çÕ¾¾ç±¾Îó²îÒÀÈ»ÊÇÊÇ×î³£¼ûµÄÎó²î£»£»£»£»£»³£¼ûLinux¿¯ÐаæÖб¨¸æµÄÐÂÎó²îÅú×¢£¬£¬£¬£¬ÐèÒªÖÜÈ«¼àÊÓÈÝÆ÷Ó³ÏñÖеÄÐÂÎó²î£»£»£»£»£»ÔÚ´ó´ó¶¼Éú̬ϵͳÖУ¬£¬£¬£¬SQL×¢ÈëÎó²îÊýÄ¿ÓÐËù½µµÍ£¬£¬£¬£¬Ê¹ÓÃPHPµÄÎó²îÈ´ÓÐËùÔöÌí¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.helpnetsecurity.com/2020/06/29/vulnerabilities-open-source-packages/
4.¹¥»÷µÂÖÝTxDOTµÄÀÕË÷Èí¼þΪRansom X£¬£¬£¬£¬Ö÷ÒªÕë¶ÔÕþ¸®ºÍÆóÒµ
¾ÊӲ죬£¬£¬£¬¹¥»÷Á˵ÿËÈøË¹ÖÝ·¨ÔººÍµÃ¿ËÈøË¹Öݽ»Í¨ÔËÊ䲿 £¨TxDOT£©µÄÀÕË÷Èí¼þΪRansom X£¬£¬£¬£¬ÆäÖ÷ÒªÕë¶ÔÕþ¸®ºÍÆóÒµ¡£¡£¡£¡£Ñо¿Ö°Ô±Í¨¹ý¶ÔRansom XÑù±¾µÄÑо¿£¬£¬£¬£¬·¢Ã÷Æä¿ÉÒÔ½«ÖÕÖ¹ÓëÇå¾²Èí¼þ¡¢Êý¾Ý¿âЧÀÍÆ÷¡¢MSPÈí¼þ¡¢Ô¶³Ì»á¼û¹¤¾ßºÍÓʼþЧÀÍÆ÷ÓйصÄ289¸öÀú³Ì£¬£¬£¬£¬Ëü»¹¿ÉÒÔÈÆ¹ýÖÖÖÖWindowsϵͳÎļþ¼ÐÒÔ¼°Ê¹ÓÃÁ˰üÀ¨.ani¡¢.cabºÍ.cplÔÚÄÚµÄÊýÊ®¸öÀ©Õ¹ÃûµÄËùÓÐÎļþ¡£¡£¡£¡£Í¨¹ýÈÆ¹ýÕâЩÎļþ¼Ð£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔ¼ÓÃÜÅÌËã»ú£¬£¬£¬£¬Í¬Ê±Ò²¿ÉÒÔ¹¥»÷ÍøÂçÉÏµÄÆäËûÅÌËã»ú£¬£¬£¬£¬¶ø²»±Øµ£Ðį乤¾ß±»¼ÓÃÜ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/new-ransom-x-ransomware-used-in-texas-txdot-cyberattack/
5.Ó¥Ñۻع飬£¬£¬£¬APT30ͨ¹ýÂíÀ´Î÷ÑÇÕþ¸®¾Û»áÓʼþ·Ö·¢ÐºóÃÅ
Ñо¿Ö°Ô±·¢Ã÷APT30µÄºóÃÅÐÂÑù±¾£¬£¬£¬£¬°üÀ¨BACKSPACEºÍNETEAGLEºóÃÅ£¬£¬£¬£¬²¢Í¨¹ýÂíÀ´Î÷ÑÇÕþ¸®¾Û»áÓʼþ¾ÙÐзַ¢¡£¡£¡£¡£µÚÒ»¸öºóÃŵĶñÒâÑù±¾±»Ð´ÈëÁËMicrosoft OfficeÄ£°åÎļþ¼Ð£¬£¬£¬£¬²¢ÒÔÂíÀ´Î÷ÑÇÕþ¸®¾Û»áÒé³ÌΪÖ÷Ì⣬£¬£¬£¬Í¨¹ýÓʼþ¾ÙÐзַ¢¡£¡£¡£¡£µÚ¶þ¸öºóÃŵÄÑù±¾±»·ÅÔÚÆô¶¯Îļþ¼ÐÏ£¬£¬£¬£¬ÎļþÔÚÏµÍ³ÖØÐÂÆô¶¯ºóÔËÐС£¡£¡£¡£³ý´ËÖ®Í⣬£¬£¬£¬Ñо¿Ö°Ô±»¹·¢Ã÷ÁËRHttpCtrlºóÃźÍRCtrlºóÃÅ¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/eagle-eye-is-back-apt30/
6.Õë¶ÔÖ½ÖÊͶƱµÄ¿ÉÀ©Õ¹²àÐŵÀ¹¥»÷¿ÉÇÔȡѡÃñÒþ˽
Ñо¿Ö°Ô±·¢Ã÷Õë¶ÔÖ½ÖÊͶƱµÄ¿ÉÀ©Õ¹²àÐŵÀ¹¥»÷£¬£¬£¬£¬¿ÉʹÓÃÆäÇÔȡѡÃñÒþ˽¡£¡£¡£¡£Ñо¿Ö°Ô±»ùÓÚArduino¿ª·¢°åºÍÂó¿Ë·ç¹¹½¨ÁËÒ»ÖÖ×°±¸£¬£¬£¬£¬¸Ã×°±¸Äܹ»¸ß¾«¶ÈµØ¶Ôľ×ÀÉϱê¼ÇµÄλÖþÙÐÐÈý½ÇÕÉÁ¿£¬£¬£¬£¬Í¨¹ýÕâÖÖ·½·¨¿ÉÒÔ»ñµÃÑ¡ÃñÔÚѡƱÉÏ×ö³öÑ¡ÔñµÄ±ê¼Ç¡£¡£¡£¡£Ö®ºóͨ¹ýÃæ²¿Ê¶±ðÀ´¾ÙÐÐÔö²¹¹¥»÷£¬£¬£¬£¬¼´ÔÚͶƱվÖÐ×°ÖÃÉãÏñ»ú£¬£¬£¬£¬ÒÔ×Ô¶¯¼ì²âÍÑÀëͶƱվµÄÖ°Ô±¡£¡£¡£¡£Á¬ÏµÕâÁ½ÖÖÒªÁ죬£¬£¬£¬½«Õë¶ÔÖ½ÖÊͶƱ¾ÙÐÐÍêÈ«×Ô¶¯»¯µÄ¹¥»÷¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://ieeexplore.ieee.org/abstract/document/8806759/


¾©¹«Íø°²±¸11010802024551ºÅ