ÐÅÏ¢Çå¾²Öܱ¨-2020ÄêµÚ42ÖÜ
Ðû²¼Ê±¼ä 2020-10-19> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
2020Äê10ÔÂ12ÈÕÖÁ10ÔÂ18ÈÕ¹²ÊÕ¼Çå¾²Îó²î62¸ö£¬£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇAdobe Flash Player¿ÕÖ¸ÕëÒýÓÃÔ¶³Ì´úÂëÖ´ÐÐÎó²î£»£»£»£»£»Microsoft Windows Hyper-V CVE-2020-1047ȨÏÞÌáÉýÎó²î£»£»£»£»£»SAP Solution Manager OSÏÂÁî×¢ÈëÎó²î£»£»£»£»£»Microhard Bullet-LTE PingÏÂÁî×¢Èë´úÂëÖ´ÐÐÎó²î£»£»£»£»£»Veritas APTAREÊÚȨ¼ì²é´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇBlackBerryÐû²¼¹ØÓÚBAHAMUT×éÖ¯µÄÆÊÎö±¨¸æ£»£»£»£»£»LumuÐû²¼2020Äê¶ÈÀÕË÷Èí¼þÓ°ÏìÆÊÎöµÄÐÅϢͼ£»£»£»£»£»AdobeÐÞ¸´Flash PlayerÖеÄÔ¶³ÌÖ´ÐдúÂëÎó²î£»£»£»£»£»AgariÐû²¼BECÔÚÈ«Çò¹æÄ£ÄÚÂþÑܺÍÇ÷ÊÆµÄÆÊÎö±¨¸æ£»£»£»£»£»CNSAÐû²¼¡¶2020ÖйúÍøÂçÊÓÌýÉú³¤Ñо¿±¨¸æ¡·¡£¡£¡£¡£¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£¡£
> Ö÷ÒªÇå¾²Îó²îÁбí
1.Adobe Flash Player¿ÕÖ¸ÕëÒýÓÃÔ¶³Ì´úÂëÖ´ÐÐÎó²î
Adobe Flash Player´¦Öóͷ£SWF±£´æ¿ÕÖ¸ÕëÒýÓÃÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»£»£»òÕßÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£
https://helpx.adobe.com/security/products/flash-player/apsb20-58.html
2.Microsoft Windows Hyper-V CVE-2020-1047ȨÏÞÌáÉýÎó²î
Microsoft Windows Hyper-V´¦Öóͷ£Äڴ湤¾ß±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬£¬£¬¿ÉÌáÉýȨÏÞ¡£¡£¡£¡£¡£¡£
https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2020-1047
3.SAP Solution Manager OSÏÂÁî×¢ÈëÎó²î
SAP Solution ManagerµÄCA Introscope Enterprise Manager±£´æÊäÈëÑéÖ¤Îó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬ÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§ÒâOSÏÂÁî¡£¡£¡£¡£¡£¡£
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=558632196
4.Microhard Bullet-LTE PingÏÂÁî×¢Èë´úÂëÖ´ÐÐÎó²î
Microhard Bullet-LTE tools.sh´¦Öóͷ£ping²ÎÊý±£´æÊäÈëÑéÖ¤Îó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£¡£
https://www.zerodayinitiative.com/advisories/ZDI-20-1205/
5.Veritas APTAREÊÚȨ¼ì²é´úÂëÖ´ÐÐÎó²î
Veritas APTAREÊÚȨ¼ì²é±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬ÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£
https://www.veritas.com/content/support/en_US/security/VTS20-006#issue1
> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢BlackBerryÐû²¼¹ØÓÚBAHAMUT×éÖ¯µÄÆÊÎö±¨¸æ

BlackBerryÐû²¼Á˹ØÓÚBAHAMUTÍøÂçÌØ¹¤×éÖ¯µÄÆÊÎö±¨¸æ£¬£¬£¬£¬£¬£¬·¢Ã÷Æä¶ÔÕþ¸®¹ÙÔ±ºÍÖ÷ÒªÐÐÒµÌᳫÁË´ó×ڸ߶ÈÖØ´óµÄ¹¥»÷¡£¡£¡£¡£¡£¡£Ñо¿Åú×¢£¬£¬£¬£¬£¬£¬¸ÃÍÅ»ïµÄ»î¶¯¹æÄ£±ÈÒÔǰÒÔΪµÄÒªÆÕ±éµÃ¶à£¬£¬£¬£¬£¬£¬°üÀ¨ÁËGoogle PlayÊÐËÁºÍApp StoreÖеÄÊ®¼¸¸ö¶ñÒâÓ¦ÓóÌÐò¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬BlackBerry»¹ÒÔΪ£¬£¬£¬£¬£¬£¬BAHAMUT¿ÉÒÔÓëÖÁÉÙÒ»Ãû0day¿ª·¢Ö°Ô±½Ó´¥£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃ0day¹¥»÷¶à¸öÄ¿µÄ£¬£¬£¬£¬£¬£¬ÕâÔ¶Ô¶Áè¼ÝÁË´ó´ó¶¼ÆäËûºÚ¿Í×éÖ¯µÄ¹¥»÷ˮƽ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.infosecurity-magazine.com/news/cyber-espionage-bahamut-staggering/
2¡¢LumuÐû²¼2020Äê¶ÈÀÕË÷Èí¼þÓ°ÏìÆÊÎöµÄÐÅϢͼ

LumuÐû²¼ÁËÒ»ÕÅÐÅϢͼ£¬£¬£¬£¬£¬£¬Ïêϸ˵Ã÷ÎúÀÕË÷Èí¼þµÄ±¾Ç®ºÍ¹æÄ££¬£¬£¬£¬£¬£¬ÒÔ×ÊÖúÆóҵȨºâËûÃǵÄÊܺ¦Î£º¦¡£¡£¡£¡£¡£¡£¾ÝÆÊÎö£¬£¬£¬£¬£¬£¬½ñÄêÈ«ÇòÀÕË÷Èí¼þµÄ±¾Ç®Îª200ÒÚÃÀÔª£¬£¬£¬£¬£¬£¬Æ½¾ùÿ´ÎµÄ¹¥»÷±¾Ç®Áè¼Ý400ÍòÃÀÔª£¬£¬£¬£¬£¬£¬²¢ÇÒÓÐ36£¥µÄÊܺ¦ÕßÖ§¸¶ÁËÊê½ð£¬£¬£¬£¬£¬£¬ÆäÖÐ17£¥»¹Ã»ÄÜÍì»ØËûÃǵÄÊý¾Ý¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬ÔÚ±±ÃÀÓÐ69%µÄ¹«Ë¾±¨¸æ³ÆÊܵ½ÁËÀÕË÷Èí¼þµÄÓ°Ï죬£¬£¬£¬£¬£¬¶øÔÚÅ·ÖÞÓÐ57%¡£¡£¡£¡£¡£¡£Ïà½Ï¶øÑÔ£¬£¬£¬£¬£¬£¬±±ÃÀµÄÕþ¸®»ú¹¹Êܵ½µÄ¹¥»÷×îΪÑÏÖØ£¬£¬£¬£¬£¬£¬Æä´ÎÊÇÖÆÔìÒµºÍÐÞ½¨Òµ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://lumu.io/resources/2020-ransomware-flashcard/
3¡¢AdobeÐÞ¸´Flash PlayerÖеÄÔ¶³ÌÖ´ÐдúÂëÎó²î

AdobeÐÞ¸´ÁËFlash PlayerÖÐÑÏÖØµÄÔ¶³ÌÖ´ÐдúÂëÎó²î£¨³ÆÎªCVE-2020-9746£©¡£¡£¡£¡£¡£¡£AdobeÖ¸³ö£¬£¬£¬£¬£¬£¬ÔÚĬÈÏÇéÐÎÏ£¬£¬£¬£¬£¬£¬ºÚ¿Í¿ÉÒÔͨ¹ýÔÚÓû§»á¼ûÍøÕ¾Ê±ÔÚTLS / SSLת´ïµÄHTTPÏìÓ¦ÖвåÈë¶ñÒâ×Ö·û´®À´Ê¹ÓôËÎó²î¡£¡£¡£¡£¡£¡£ÀÖ³ÉʹÓôËÎó²îºó£¬£¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÓ¦ÓÃÍ߽⣬£¬£¬£¬£¬£¬´Ó¶øÊ¹¹¥»÷Õß¿ÉÒÔÔÚ»á¼ûÕßµÄÅÌËã»úÉÏÔ¶³ÌÖ´ÐÐÏÂÁî¡£¡£¡£¡£¡£¡£ÕâЩÏÂÁÔÚÓû§µÄÇå¾²ÇéÐÎÖÐÖ´ÐУ¬£¬£¬£¬£¬£¬²¢²»ÐèÒªÖÎÀíԱȨÏÞ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/adobe-fixes-critical-security-vulnerability-in-flash-player/
4¡¢AgariÐû²¼BECÔÚÈ«Çò¹æÄ£ÄÚÂþÑܺÍÇ÷ÊÆµÄÆÊÎö±¨¸æ

AgariÍøÂçÇ鱨²¿£¨ACID£©Ðû²¼ÁËBECÔÚÈ«Çò¹æÄ£ÄÚÂþÑܺÍÇ÷ÊÆµÄÆÊÎö±¨¸æ£¬£¬£¬£¬£¬£¬ÒÔ¸üºÃµØÏàʶBEC¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£±¨¸æ°üÀ¨ÁË2019Äê5ÔÂÖÁ2020Äê7ÔÂÖ®¼äµÄ9000¶à´Î·ÀÓù»î¶¯µÄÊý¾Ý£¬£¬£¬£¬£¬£¬·¢Ã÷ÓÐ60£¥µÄ¹¥»÷ÕßÀ´×Ô·ÇÖÞµÄ11¸ö¹ú¼Ò£¬£¬£¬£¬£¬£¬ÆäÖÐ83£¥Î»ÓÚÄáÈÕÀûÑÇ¡£¡£¡£¡£¡£¡£½ü30£¥µÄ¹¥»÷ÕßÀ´×ÔÃÀÖÞ£¬£¬£¬£¬£¬£¬ÆäÖеÄ89£¥À´×ÔÃÀ¹ú£¬£¬£¬£¬£¬£¬²¢ÇÒ¹¥»÷ÕßÖ÷ҪȺ¼¯ÔÚһЩ´ó¶¼ÊУ¬£¬£¬£¬£¬£¬°üÀ¨ÑÇÌØÀ¼´ó¡¢Å¦Ô¼¡¢ÂåÉ¼í¶¡¢ÐÝ˹¶ØºÍÂõ°¢ÃÜ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.agari.com/email-security-blog/business-email-compromise-geography/
5¡¢CNSAÐû²¼¡¶2020ÖйúÍøÂçÊÓÌýÉú³¤Ñо¿±¨¸æ¡·

10ÔÂ12ÈÕ£¬£¬£¬£¬£¬£¬ÖйúÍøÂçÊÓÌý½ÚĿЧÀÍлáÐû²¼¡¶2020ÖйúÍøÂçÊÓÌýÉú³¤Ñо¿±¨¸æ¡·£¬£¬£¬£¬£¬£¬Ê׶ȹûÕæÎÒ¹úÍøÂçÊÓÌýÓû§¹æÄ£ºÍ¹¤Òµ¹æÄ£¡£¡£¡£¡£¡£¡£¸Ã±¨¸æ»ùÓÚÊý¾ÝÍÚ¾ò¡¢µ÷ÑÐÒÔ¼°µÚÈý·½Êý¾Ý£¬£¬£¬£¬£¬£¬¶Ô2019-2020ÄêµÄÍøÂçÊÓÌýÐÐÒµÏÖ×´ºÍÉú³¤Ç÷ÊÆ¾ÙÐÐȨÍþ¡¢ÖÜÈ«µÄÑÐÅС£¡£¡£¡£¡£¡£±¨¸æÏÔʾ£¬£¬£¬£¬£¬£¬×èÖ¹2020Äê6Ô£¬£¬£¬£¬£¬£¬ÎÒ¹úÍøÂçÊÓÌýÓû§¹æÄ£´ï9.01ÒÚ£¬£¬£¬£¬£¬£¬ 2019ÄêÍøÂçÊÓÌý¹¤Òµ¹æÄ£´ï4541.3ÒÚ¡£¡£¡£¡£¡£¡£ÆäÖжÌÊÓÆµµÄÓû§Ê¹ÓÃÂÊ×î¸ß£¬£¬£¬£¬£¬£¬´ï87.0%£¬£¬£¬£¬£¬£¬Óû§¹æÄ£8.18ÒÚ£»£»£»£»£»×ÛºÏÊÓÆµµÄÓû§Ê¹ÓÃÂÊΪ77.1%£¬£¬£¬£¬£¬£¬Óû§¹æÄ£7.24ÒÚ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
http://www.xinhuanet.com/info/2020-10/13/c_139436283.htm


¾©¹«Íø°²±¸11010802024551ºÅ