Anker Eufy Homebase 2±£´æRCEÎó²îCVE-2022-21806

Ðû²¼Ê±¼ä 2022-06-21
1¡¢Anker Eufy Homebase 2±£´æRCEÎó²îCVE-2022-21806

      

¾ÝýÌå6ÔÂ16ÈÕ±¨µÀ£¬£¬£¬£¬ £¬£¬AnkerµÄÖÐÑëÖÇÄܼҾÓ×°±¸ÖÐÐÄEufy Homebase 2±£´æ3¸öÇå¾²Îó²î¡£¡£Homebase 2ÊÇËùÓÐAnker EufyÖÇÄܼҾÓ×°±¸µÄÊÓÆµ´æ´¢ºÍÍøÂçÍø¹Ø£¬£¬£¬£¬ £¬£¬×÷ΪÕâЩװ±¸µÄÖÐÐÄÕ¾ÔËÐС£¡£ÆäÖÐ×îÑÏÖØµÄÊÇÒ»¸ö´úÂëÖ´ÐÐÎó²î£¨CVE-2022-21806£¬£¬£¬£¬ £¬£¬CVSSÆÀ·Ö10)£¬£¬£¬£¬ £¬£¬ÊÇÄÚ²¿Ð§ÀÍÆ÷¹¦Ð§ÖеÄÊͷźóʹÓÃÎó²îµ¼Öµģ¬£¬£¬£¬ £¬£¬¿Éͨ¹ýÏòÄ¿µÄ×°±¸·¢ËÍÌØÖÆµÄÍøÂçÊý¾Ý°üÀ´´¥·¢¡£¡£ÆäËüÁ½¸öÎó²î»®·ÖΪ¾Ü¾øÐ§ÀÍÎó²î£¨CVE-2022-26073£©ºÍÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2022-25989£©¡£¡£


https://www.bleepingcomputer.com/news/security/anker-eufy-smart-home-hubs-exposed-to-rce-attacks-by-critical-flaw/


2¡¢ÃÀ¹úFlagstarÒøÐÐ֪ͨÆä¿Í»§È¥ÄêÔâµ½¹¥»÷

      

¾Ý6ÔÂ20ÈÕ±¨µÀ£¬£¬£¬£¬ £¬£¬FlagstarÒøÐÐÕýÔÚ֪ͨ¿Í»§¹ØÓÚÊý¾Ýй¶ÊÂÎñ¡£¡£FlagstarÊÇλÓÚÃÜЪ¸ùÖݵĽðÈÚЧÀÍÌṩÉÌ£¬£¬£¬£¬ £¬£¬Ò²ÊÇÃÀ¹ú×î´óµÄÒøÐÐÖ®Ò»£¬£¬£¬£¬ £¬£¬×Ü×ʲúÁè¼Ý300ÒÚÃÀÔª¡£¡£Æ¾Ö¤Ð¹Â¶Í¨Öª£¬£¬£¬£¬ £¬£¬FlagstarµÄÍøÂçÔÚ2021Äê12Ô±»ÈëÇÖ£¬£¬£¬£¬ £¬£¬¸ÃÒøÐÐÓÚ½ñÄê6ÔÂ2ÈÕ·¢Ã÷¡£¡£¾­ÊӲ죬£¬£¬£¬ £¬£¬¹¥»÷Õß»á¼ûÁ˿ͻ§µÄÏêϸÐÅÏ¢£¬£¬£¬£¬ £¬£¬°üÀ¨ÐÕÃûºÍÉç»áÇå¾²ºÅÂëµÈ¡£¡£´Ë´ÎÊÂÎñÓ°ÏìÁË1547169ÈË£¬£¬£¬£¬ £¬£¬Flagstar½«ÎªÊÜÓ°ÏìµÄСÎÒ˽¼ÒÌṩÁ½ÄêÃâ·ÑµÄÉí·Ý¼à¿ØºÍ±£»£»£»£»£»¤Ð§ÀÍ¡£¡£2021Äê1Ô£¬£¬£¬£¬ £¬£¬¸ÃÐÐÔøÔâµ½ClopÍÅ»ïµÄÀÕË÷¹¥»÷¡£¡£


https://www.bleepingcomputer.com/news/security/flagstar-bank-discloses-data-breach-impacting-15-million-customers/


3¡¢Robert Half³ÆºÚ¿ÍÒѹ¥»÷Æä1000¶à¸ö¿Í»§µÄÕÊ»§

      

ýÌå6ÔÂ17Èճƣ¬£¬£¬£¬ £¬£¬ÈËÁ¦×ÊÔ´¹«Ë¾Robert HalfµÄ1000¶à¸ö¿Í»§µÄÕÊ»§Ôâµ½¹¥»÷¡£¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬ £¬£¬¹¥»÷ÕßÔÚ4ÔÂ26ÈÕÖÁ5ÔÂ16ÈÕʱ´úÈëÇÖÁËRobertHalf.comÍøÕ¾µÄÕÊ»§£¬£¬£¬£¬ £¬£¬¸ÃÊÂÎñÓÚ5ÔÂ31ÈÕ±»·¢Ã÷£¬£¬£¬£¬ £¬£¬Ó°ÏìÁË1058СÎÒ˽¼Ò¡£¡£´Ë´Îй¶Á˿ͻ§ÐÕÃû¡¢µØµãºÍÉç»áÇå¾²ºÅÂëµÈСÎÒ˽¼ÒÐÅÏ¢£¬£¬£¬£¬ £¬£¬ÒÔ¼°ÈËΪºÍ˰ÊյȲÆÎñÐÅÏ¢¡£¡£¸Ã¹«Ë¾Ã»ÓйûÕæ¹ØÓÚ¹¥»÷µÄ¸ü¶àÐÅÏ¢£¬£¬£¬£¬ £¬£¬µ«Æ¾Ö¤ÆäÐÎò£¬£¬£¬£¬ £¬£¬ËƺõÉæ¼°Æ¾Ö¤Ìî³ä¹¥»÷¡£¡£Robert Half½¨Òé¿Í»§¸ü¸ÄʹÓÃÁËÏàͬƾ֤µÄÆäËüÕÊ»§£¬£¬£¬£¬ £¬£¬²¢½«ÎªÊÜÓ°ÏìµÄСÎÒ˽¼ÒÌṩÁ½ÄêµÄÉí·Ý¼à¿ØÐ§ÀÍ¡£¡£


https://www.securityweek.com/staffing-firm-robert-half-says-hackers-targeted-over-1000-customer-accounts


4¡¢Lookout³ÆÌع¤Èí¼þHermitÓëÒâ´óÀûRCS LabÓйØ

      

6ÔÂ16ÈÕ£¬£¬£¬£¬ £¬£¬LookoutµÄ×îÐÂÑо¿½«Ìع¤Èí¼þHermitºÍÒâ´óÀûRCS LabÁªÏµÆðÀ´¡£¡£Ñо¿Ö°Ô±ÌåÏÖ£¬£¬£¬£¬ £¬£¬ËûÃÇÔÚ2022Äê4Ô¼ì²âµ½ÁËеÄÑù±¾¡£¡£HermitÊÇÄ£¿£¿£¿£¿£¿é»¯¶ñÒâÈí¼þ£¬£¬£¬£¬ £¬£¬¾ßÓжàÖÖ¹¦Ð§£¬£¬£¬£¬ £¬£¬¿ÉÂ¼ÖÆÒôƵ¡¢²¦´òºÍÖØ¶¨Ïòµç»°ÒÔ¼°ÍøÂç¶àÖÖÊý¾Ý¡£¡£Ëüͨ¹ýSMSÐÂΞÙÐÐÈö²¥£¬£¬£¬£¬ £¬£¬Ã°³äÈýÐÇ¡¢VivoºÍOppoµÄÓ¦Ó㬣¬£¬£¬ £¬£¬Lookout½«¸ÃÆä¹é×ïÓÚÒâ´óÀûRCS Lab SpAºÍÒ»¼ÒµçÐÅЧÀÍÌṩÉÌTykelab Srl¡£¡£


https://thehackernews.com/2022/06/researchers-uncover-hermit-android.html


5¡¢CleafyÐû²¼¹ØÓÚAndroid¶ñÒâÈí¼þBRATAµÄÆÊÎö±¨¸æ


CleafyÔÚ6ÔÂ17ÈÕÐû²¼Á˹ØÓÚAndroid¶ñÒâÈí¼þBRATAµÄÆÊÎö±¨¸æ¡£¡£BRATAÓÚ2018Äêµ×Ê×´ÎÔÚ°ÍÎ÷±»·¢Ã÷£¬£¬£¬£¬ £¬£¬ÓÚ2021Äê·ºÆðÔÚÅ·ÖÞ¡£¡£½üÆÚ£¬£¬£¬£¬ £¬£¬Ñо¿Ö°Ô±·¢Ã÷ÔËÓªÍÅ»ïÔÙ´ÎΪ¸ÃAndroid¶ñÒâÈí¼þÌí¼ÓÁ˸ü¶à¹¦Ð§²¢ÇÒË¢ÐÂÁ˹¥»÷Õ½ÂÔ£¬£¬£¬£¬ £¬£¬ÏÖÔÚ¸üÇкϸ߼¶Ò»Á¬Íþв(APT)¹¥»÷»î¶¯µÄģʽ¡£¡£Ð°汾µÄBRATA¸ü¾ßÕë¶ÔÐÔ£¬£¬£¬£¬ £¬£¬ËüÒ»´ÎÖ»Õë¶ÔÒ»¼Ò½ðÈÚ»ú¹¹£¬£¬£¬£¬ £¬£¬Ö»ÓÐÔÚÆä¹¥»÷»î¶¯±äµÃµÍЧʱ²Å»áתÏòÁíÒ»¸öÄ¿µÄ¡£¡£±ðµÄ£¬£¬£¬£¬ £¬£¬BRATAÌí¼ÓÁ˸ü¶àȨÏÞ£¬£¬£¬£¬ £¬£¬ÀýÈç·¢ËͺÍÎüÊÕSMS£¬£¬£¬£¬ £¬£¬Õâ¿ÉÓÃÀ´ÇÔÈ¡ÒøÐз¢Ë͸ø¿Í»§µÄÔÝʱÃÜÂë¡£¡£


https://www.cleafy.com/cleafy-labs/brata-is-evolving-into-an-advanced-persistent-threat


6¡¢Trend MicroÐû²¼2022ÄêOTÇå¾²Ì¬ÊÆµÄÊӲ챨¸æ

      

6ÔÂ15ÈÕ£¬£¬£¬£¬ £¬£¬Trend MicroÐû²¼ÁË2022ÄêOTÇå¾²Ì¬ÊÆµÄÊӲ챨¸æ¡£¡£Ñо¿Ö°Ô±¶Ô2022ÄêÖÆÔì¡¢µçÁ¦ºÍʯÓͺÍ×ÔÈ»Æø¹«Ë¾µÄ¹¤ÒµÍøÂçÇå¾²Ì¬ÊÆ¾ÙÐÐÁËÊӲ졣¡£ÊÓ²ìÏÔʾ£¬£¬£¬£¬ £¬£¬ÔÚÒÑÍù12¸öÔÂÖУ¬£¬£¬£¬ £¬£¬Ê®·ÖÖ®¾ÅµÄ×éÖ¯µÄÉú²ú»òÄÜÔ´¹©Ó¦¶¼Êܵ½¹¥»÷µÄÓ°Ïì¡£¡£¹ØÓÚϵͳÖÐÖ¹µÄÒ»Á¬Ê±¼äºÍ¾­¼ÃËðʧ£¬£¬£¬£¬ £¬£¬56%µÄÊÜ·ÃÕßÌåÏÖÖÐÖ¹»áÒ»Á¬ËÄÌì»ò¸ü³¤Ê±¼ä£»£»£»£»£»È¥ÄêµÄƽ¾ù¾­¼ÃËðʧԼΪ280ÍòÃÀÔª£»£»£»£»£»¾­¼ÃËðʧ³ýÁ˰üÀ¨ÀÕË÷¹¥»÷µÄÊê½ðÖ®Í⣬£¬£¬£¬ £¬£¬ÉÐÓлָ´ÏµÍ³¡¢µÖÓù¹¥»÷ºÍÕÐÆ¸ÌØÊâÔ±¹¤µÄÓöÈ¡£¡£


https://www.trendmicro.com/en_us/research/22/f/state-of-ot-security-2022.html