ÐÅÏ¢Çå¾²Öܱ¨-2020ÄêµÚ42ÖÜ

Ðû²¼Ê±¼ä 2020-10-19

> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2020Äê10ÔÂ12ÈÕÖÁ10ÔÂ18ÈÕ¹²ÊÕ¼Çå¾²Îó²î62¸ö£¬£¬£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇAdobe Flash Player¿ÕÖ¸ÕëÒýÓÃÔ¶³Ì´úÂëÖ´ÐÐÎó²î£»£»£»£»£»£»£»Microsoft Windows Hyper-V CVE-2020-1047ȨÏÞÌáÉýÎó²î£»£»£»£»£»£»£»SAP Solution Manager OSÏÂÁî×¢ÈëÎó²î£»£»£»£»£»£»£»Microhard Bullet-LTE PingÏÂÁî×¢Èë´úÂëÖ´ÐÐÎó²î£»£»£»£»£»£»£»Veritas APTAREÊÚȨ¼ì²é´úÂëÖ´ÐÐÎó²î¡£¡£¡£ ¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇBlackBerryÐû²¼¹ØÓÚBAHAMUT×éÖ¯µÄÆÊÎö±¨¸æ£»£»£»£»£»£»£»LumuÐû²¼2020Äê¶ÈÀÕË÷Èí¼þÓ°ÏìÆÊÎöµÄÐÅϢͼ£»£»£»£»£»£»£»AdobeÐÞ¸´Flash PlayerÖеÄÔ¶³ÌÖ´ÐдúÂëÎó²î£»£»£»£»£»£»£»AgariÐû²¼BECÔÚÈ«Çò¹æÄ£ÄÚÂþÑܺÍÇ÷ÊÆµÄÆÊÎö±¨¸æ£»£»£»£»£»£»£»CNSAÐû²¼¡¶2020ÖйúÍøÂçÊÓÌýÉú³¤Ñо¿±¨¸æ¡·¡£¡£¡£ ¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£ ¡£¡£


Ö÷ÒªÇå¾²Îó²îÁбí


1.Adobe Flash Player¿ÕÖ¸ÕëÒýÓÃÔ¶³Ì´úÂëÖ´ÐÐÎó²î


Adobe Flash Player´¦Öóͷ£SWF±£´æ¿ÕÖ¸ÕëÒýÓÃÎó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»£»£»£»£»òÕßÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£ ¡£¡£

https://helpx.adobe.com/security/products/flash-player/apsb20-58.html


2.Microsoft Windows Hyper-V CVE-2020-1047ȨÏÞÌáÉýÎó²î


Microsoft Windows Hyper-V´¦Öóͷ£Äڴ湤¾ß±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬£¬£¬£¬¿ÉÌáÉýȨÏÞ¡£¡£¡£ ¡£¡£

https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2020-1047


3.SAP Solution Manager OSÏÂÁî×¢ÈëÎó²î


SAP Solution ManagerµÄCA Introscope Enterprise Manager±£´æÊäÈëÑéÖ¤Îó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬ÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§ÒâOSÏÂÁî¡£¡£¡£ ¡£¡£

https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=558632196


4.Microhard Bullet-LTE PingÏÂÁî×¢Èë´úÂëÖ´ÐÐÎó²î


Microhard Bullet-LTE tools.sh´¦Öóͷ£ping²ÎÊý±£´æÊäÈëÑéÖ¤Îó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£ ¡£¡£

https://www.zerodayinitiative.com/advisories/ZDI-20-1205/


5.Veritas APTAREÊÚȨ¼ì²é´úÂëÖ´ÐÐÎó²î


Veritas APTAREÊÚȨ¼ì²é±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬£¬ÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£ ¡£¡£


https://www.veritas.com/content/support/en_US/security/VTS20-006#issue1


> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢BlackBerryÐû²¼¹ØÓÚBAHAMUT×éÖ¯µÄÆÊÎö±¨¸æ


1.jpg


BlackBerryÐû²¼Á˹ØÓÚBAHAMUTÍøÂçÌØ¹¤×éÖ¯µÄÆÊÎö±¨¸æ£¬£¬£¬£¬£¬£¬£¬·¢Ã÷Æä¶ÔÕþ¸®¹ÙÔ±ºÍÖ÷ÒªÐÐÒµÌᳫÁË´ó×ڸ߶ÈÖØ´óµÄ¹¥»÷¡£¡£¡£ ¡£¡£Ñо¿Åú×¢£¬£¬£¬£¬£¬£¬£¬¸ÃÍÅ»ïµÄ»î¶¯¹æÄ£±ÈÒÔǰÒÔΪµÄÒªÆÕ±éµÃ¶à£¬£¬£¬£¬£¬£¬£¬°üÀ¨ÁËGoogle PlayÊÐËÁºÍApp StoreÖеÄÊ®¼¸¸ö¶ñÒâÓ¦ÓóÌÐò¡£¡£¡£ ¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬BlackBerry»¹ÒÔΪ£¬£¬£¬£¬£¬£¬£¬BAHAMUT¿ÉÒÔÓëÖÁÉÙÒ»Ãû0day¿ª·¢Ö°Ô±½Ó´¥£¬£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃ0day¹¥»÷¶à¸öÄ¿µÄ£¬£¬£¬£¬£¬£¬£¬ÕâÔ¶Ô¶Áè¼ÝÁË´ó´ó¶¼ÆäËûºÚ¿Í×éÖ¯µÄ¹¥»÷ˮƽ¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.infosecurity-magazine.com/news/cyber-espionage-bahamut-staggering/


2¡¢LumuÐû²¼2020Äê¶ÈÀÕË÷Èí¼þÓ°ÏìÆÊÎöµÄÐÅϢͼ


2.jpg


LumuÐû²¼ÁËÒ»ÕÅÐÅϢͼ£¬£¬£¬£¬£¬£¬£¬Ïêϸ˵Ã÷ÎúÀÕË÷Èí¼þµÄ±¾Ç®ºÍ¹æÄ££¬£¬£¬£¬£¬£¬£¬ÒÔ×ÊÖúÆóҵȨºâËûÃǵÄÊܺ¦Î£º¦¡£¡£¡£ ¡£¡£¾ÝÆÊÎö£¬£¬£¬£¬£¬£¬£¬½ñÄêÈ«ÇòÀÕË÷Èí¼þµÄ±¾Ç®Îª200ÒÚÃÀÔª£¬£¬£¬£¬£¬£¬£¬Æ½¾ùÿ´ÎµÄ¹¥»÷±¾Ç®Áè¼Ý400ÍòÃÀÔª£¬£¬£¬£¬£¬£¬£¬²¢ÇÒÓÐ36£¥µÄÊܺ¦ÕßÖ§¸¶ÁËÊê½ð£¬£¬£¬£¬£¬£¬£¬ÆäÖÐ17£¥»¹Ã»ÄÜÍì»ØËûÃǵÄÊý¾Ý¡£¡£¡£ ¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬£¬ÔÚ±±ÃÀÓÐ69%µÄ¹«Ë¾±¨¸æ³ÆÊܵ½ÁËÀÕË÷Èí¼þµÄÓ°Ï죬£¬£¬£¬£¬£¬£¬¶øÔÚÅ·ÖÞÓÐ57%¡£¡£¡£ ¡£¡£Ïà½Ï¶øÑÔ£¬£¬£¬£¬£¬£¬£¬±±ÃÀµÄÕþ¸®»ú¹¹Êܵ½µÄ¹¥»÷×îΪÑÏÖØ£¬£¬£¬£¬£¬£¬£¬Æä´ÎÊÇÖÆÔìÒµºÍÐÞ½¨Òµ¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://lumu.io/resources/2020-ransomware-flashcard/


3¡¢AdobeÐÞ¸´Flash PlayerÖеÄÔ¶³ÌÖ´ÐдúÂëÎó²î


3.jpg


AdobeÐÞ¸´ÁËFlash PlayerÖÐÑÏÖØµÄÔ¶³ÌÖ´ÐдúÂëÎó²î£¨³ÆÎªCVE-2020-9746£©¡£¡£¡£ ¡£¡£AdobeÖ¸³ö£¬£¬£¬£¬£¬£¬£¬ÔÚĬÈÏÇéÐÎÏ£¬£¬£¬£¬£¬£¬£¬ºÚ¿Í¿ÉÒÔͨ¹ýÔÚÓû§»á¼ûÍøÕ¾Ê±ÔÚTLS / SSLת´ïµÄHTTPÏìÓ¦ÖвåÈë¶ñÒâ×Ö·û´®À´Ê¹ÓôËÎó²î¡£¡£¡£ ¡£¡£ÀÖ³ÉʹÓôËÎó²îºó£¬£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÓ¦ÓÃÍ߽⣬£¬£¬£¬£¬£¬£¬´Ó¶øÊ¹¹¥»÷Õß¿ÉÒÔÔÚ»á¼ûÕßµÄÅÌËã»úÉÏÔ¶³ÌÖ´ÐÐÏÂÁî¡£¡£¡£ ¡£¡£ÕâЩÏÂÁÔÚÓû§µÄÇå¾²ÇéÐÎÖÐÖ´ÐУ¬£¬£¬£¬£¬£¬£¬²¢²»ÐèÒªÖÎÀíԱȨÏÞ¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/adobe-fixes-critical-security-vulnerability-in-flash-player/


4¡¢AgariÐû²¼BECÔÚÈ«Çò¹æÄ£ÄÚÂþÑܺÍÇ÷ÊÆµÄÆÊÎö±¨¸æ


4.jpg


AgariÍøÂçÇ鱨²¿£¨ACID£©Ðû²¼ÁËBECÔÚÈ«Çò¹æÄ£ÄÚÂþÑܺÍÇ÷ÊÆµÄÆÊÎö±¨¸æ£¬£¬£¬£¬£¬£¬£¬ÒÔ¸üºÃµØÏàʶBEC¹¥»÷»î¶¯¡£¡£¡£ ¡£¡£±¨¸æ°üÀ¨ÁË2019Äê5ÔÂÖÁ2020Äê7ÔÂÖ®¼äµÄ9000¶à´Î·ÀÓù»î¶¯µÄÊý¾Ý£¬£¬£¬£¬£¬£¬£¬·¢Ã÷ÓÐ60£¥µÄ¹¥»÷ÕßÀ´×Ô·ÇÖÞµÄ11¸ö¹ú¼Ò£¬£¬£¬£¬£¬£¬£¬ÆäÖÐ83£¥Î»ÓÚÄáÈÕÀûÑÇ¡£¡£¡£ ¡£¡£½ü30£¥µÄ¹¥»÷ÕßÀ´×ÔÃÀÖÞ£¬£¬£¬£¬£¬£¬£¬ÆäÖеÄ89£¥À´×ÔÃÀ¹ú£¬£¬£¬£¬£¬£¬£¬²¢ÇÒ¹¥»÷ÕßÖ÷ҪȺ¼¯ÔÚһЩ´ó¶¼ÊУ¬£¬£¬£¬£¬£¬£¬°üÀ¨ÑÇÌØÀ¼´ó¡¢Å¦Ô¼¡¢ÂåÉ¼í¶¡¢ÐÝ˹¶ØºÍÂõ°¢ÃÜ¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.agari.com/email-security-blog/business-email-compromise-geography/


5¡¢CNSAÐû²¼¡¶2020ÖйúÍøÂçÊÓÌýÉú³¤Ñо¿±¨¸æ¡·


5.jpg


10ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬£¬ÖйúÍøÂçÊÓÌý½ÚĿЧÀÍЭ»áÐû²¼¡¶2020ÖйúÍøÂçÊÓÌýÉú³¤Ñо¿±¨¸æ¡·£¬£¬£¬£¬£¬£¬£¬Ê׶ȹûÕæÎÒ¹úÍøÂçÊÓÌýÓû§¹æÄ£ºÍ¹¤Òµ¹æÄ£¡£¡£¡£ ¡£¡£¸Ã±¨¸æ»ùÓÚÊý¾ÝÍÚ¾ò¡¢µ÷ÑÐÒÔ¼°µÚÈý·½Êý¾Ý£¬£¬£¬£¬£¬£¬£¬¶Ô2019-2020ÄêµÄÍøÂçÊÓÌýÐÐÒµÏÖ×´ºÍÉú³¤Ç÷ÊÆ¾ÙÐÐȨÍþ¡¢ÖÜÈ«µÄÑÐÅС£¡£¡£ ¡£¡£±¨¸æÏÔʾ£¬£¬£¬£¬£¬£¬£¬×èÖ¹2020Äê6Ô£¬£¬£¬£¬£¬£¬£¬ÎÒ¹úÍøÂçÊÓÌýÓû§¹æÄ£´ï9.01ÒÚ£¬£¬£¬£¬£¬£¬£¬ 2019ÄêÍøÂçÊÓÌý¹¤Òµ¹æÄ£´ï4541.3ÒÚ¡£¡£¡£ ¡£¡£ÆäÖжÌÊÓÆµµÄÓû§Ê¹ÓÃÂÊ×î¸ß£¬£¬£¬£¬£¬£¬£¬´ï87.0%£¬£¬£¬£¬£¬£¬£¬Óû§¹æÄ£8.18ÒÚ£»£»£»£»£»£»£»×ÛºÏÊÓÆµµÄÓû§Ê¹ÓÃÂÊΪ77.1%£¬£¬£¬£¬£¬£¬£¬Óû§¹æÄ£7.24ÒÚ¡£¡£¡£ ¡£¡£


Ô­ÎÄÁ´½Ó£º

http://www.xinhuanet.com/info/2020-10/13/c_139436283.htm