BadBox¶ñÒâÈí¼þ½©Ê¬ÍøÂçÒ»Á¬À©ÕÅ£¬£¬£¬£¬£¬£¬È«ÇòѬȾװ±¸³¬19.2Íǫ̀
Ðû²¼Ê±¼ä 2024-12-201. BadBox¶ñÒâÈí¼þ½©Ê¬ÍøÂçÒ»Á¬À©ÕÅ£¬£¬£¬£¬£¬£¬È«ÇòѬȾװ±¸³¬19.2Íǫ̀
12ÔÂ19ÈÕ£¬£¬£¬£¬£¬£¬BadBox Android ¶ñÒâÈí¼þ½©Ê¬ÍøÂçÔÚÈ«Çò¹æÄ£ÄÚÒ»Á¬À©ÕÅ£¬£¬£¬£¬£¬£¬Ñ¬È¾×°±¸ÊýÄ¿ÒÑÁè¼Ý192,000̨£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨×ÅÃûÆ·ÅÆµÄÖÇÄܵçÊÓºÍÖÇÄÜÊÖ»ú£¬£¬£¬£¬£¬£¬ÈçYandexºÍº£ÐÅ¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ×î³õͨ¹ý¹©Ó¦Á´¹¥»÷ѬȾ²»×ÅÃûÖÆÔìÉ̵Ä×°±¸£¬£¬£¬£¬£¬£¬ÏÖÒÑÀ©Õ¹µ½ÔÚÏßÏúÊÛµÄÎÞÃû²úÆ·¼°ÆäËû×ÅÃûÆ·ÅÆ¡£¡£¡£¡£ÆäÄ¿µÄÖ÷ÒªÊÇ»ñÈ¡¾¼ÃÀûÒæ£¬£¬£¬£¬£¬£¬Í¨¹ý½«×°±¸Äð³ÉסլÊðÀí»òÓÃÓÚ¹ã¸æÚ²ÆÊµÏÖ¡£¡£¡£¡£Ö»¹ÜµÂ¹úÁª°îÐÅÏ¢Çå¾²¾Ö£¨BSI£©ÔøÐû²¼µ·»ÙBadBoxµÄÐж¯£¬£¬£¬£¬£¬£¬ÇжÏÁË30,000̨װ±¸µÄͨѶ£¬£¬£¬£¬£¬£¬µ«BadBoxÈÔÔÚ¼ÌÐøÉú³¤¡£¡£¡£¡£BitSightÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þÒÑ×°ÖÃÔÚ192,000̨װ±¸ÉÏ£¬£¬£¬£¬£¬£¬ÇÒÊýÄ¿ÈÔÔÚÎȲ½ÔöÌí¡£¡£¡£¡£ÊÜÓ°ÏìµÄ×°±¸Ö÷ҪλÓÚ¶íÂÞ˹¡¢Öйú¡¢Ó¡¶È¡¢°×¶íÂÞ˹¡¢°ÍÎ÷ºÍÎÚ¿ËÀ¼¡£¡£¡£¡£ÏûºÄÕßÓ¦Ó¦ÓÃ×îеĹ̼þÇå¾²¸üС¢½«ÖÇÄÜ×°±¸ÓëÒªº¦ÏµÍ³¸ôÀë²¢ÔÚ²»Ê¹ÓÃʱ¶Ï¿ªÍøÂçÅþÁ¬£¬£¬£¬£¬£¬£¬ÒÔÌá·ÀBadBoxѬȾ¡£¡£¡£¡£Èô×°±¸ÎÞ¿ÉÓøüУ¬£¬£¬£¬£¬£¬½¨Òé¶Ï¿ªÍøÂç»ò¹Ø±Õ×°±¸¡£¡£¡£¡£Ñ¬È¾¼£Ïó°üÀ¨¹ýÈÈ¡¢ÐÔÄÜϽµ¡¢´¦Öóͷ£Æ÷ʹÓÃÂʸߺÍÍøÂçÁ÷Á¿Òì³£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/badbox-malware-botnet-infects-192-000-android-devices-despite-disruption/
2. ΢Èí365 OfficeÓ¦ÓÃÏÖ¡°²úÆ·ÒÑÍ£Óá±¹ýʧ£¬£¬£¬£¬£¬£¬Ô´ÓÚÔÊÐíÖ¤±ä»»ÎÊÌâ
12ÔÂ19ÈÕ£¬£¬£¬£¬£¬£¬Î¢ÈíÕýÔÚÊÓ²ìÒ»¸öµ¼ÖÂMicrosoft 365 OfficeÓ¦ÓÃÓû§´¥·¢¡°²úÆ·ÒÑÍ£Óá±¹ýʧµÄÎÊÌâ¡£¡£¡£¡£¾ÝRedditºÍ΢ÈíÉçÇøÍøÕ¾Éϵı¨¸æ£¬£¬£¬£¬£¬£¬Óû§ÔÚOfficeÓ¦ÓÃÖÐËæ»úÊÕµ½´Ë¹ýʧ£¬£¬£¬£¬£¬£¬Ôì³ÉÔÓÂÒºÍÖÐÖ¹¡£¡£¡£¡£ÎÊÌâÔ´ÓÚÖÎÀíÔ±ÌᳫµÄÔÊÐíÖ¤±ä»»£¬£¬£¬£¬£¬£¬ÈçÒÆ¶¯Óû§µ½²î±ðµÄÔÊÐí×é»ò¸ü¸ÄÓû§¶©ÔÄ¡£¡£¡£¡£µ±ÖÎÀíԱɾ³ý²¢ÖØÐÂÌí¼ÓÓû§µ½ÔÊÐíÖ¤×é¡¢µ÷½âÔÊÐíÖ¤»òЧÀÍÍýÏëÉèÖ㬣¬£¬£¬£¬£¬»òÇл»¡°×îа汾µÄ×ÀÃæÓ¦ÓóÌÐò¡±Ð§ÀÍÍýÏëʱ£¬£¬£¬£¬£¬£¬Ò²»á´¥·¢´ËÎÊÌâ¡£¡£¡£¡£Óû§¿ÉÒÔͨ¹ýµ¥»÷¹ýʧºá·ùÉϵġ°ÖØÐ¼¤»î¡±°´Å¥»òÍ˳ö²¢ÖØÐÂÆô¶¯Microsoft 365Ó¦ÓÃÀ´½â¾ö´ËÎÊÌâ¡£¡£¡£¡£ÈôÊÇÎÊÌâÈÔÈ»±£´æ£¬£¬£¬£¬£¬£¬½¨ÒéÁªÏµÖÎÀíÔ±¼ì²é¶©ÔÄÊÇ·ñÒÑÓâÆÚ¡£¡£¡£¡£Î¢Èí½¨ÒéÓÐδ½â¾öÖ§³Ö°¸ÀýµÄÓû§ÌṩʹÓÃOfficeÔÊÐíÕï¶Ï¹¤¾ßÍøÂçµÄÕï¶ÏÊý¾Ý£¬£¬£¬£¬£¬£¬²¢ÌáÐÑÊÜÓ°ÏìµÄÓû§Ìṩ´æ´¢ÔÚ%temp%/diagnosticsĿ¼ÖеÄÈÕÖ¾¡£¡£¡£¡£ËäȻ΢ÈíÉÐδÐû²¼ÐÞ¸´Ê±¼ä±í£¬£¬£¬£¬£¬£¬µ«Æä¹¤³ÌÍŶÓÕýÔÚÆð¾¢ÊÓ²ì´ËÎÊÌ⣬£¬£¬£¬£¬£¬²¢ÃãÀøÊÜÓ°ÏìµÄÓû§ºÍÖÎÀíÔ±¹Ø×¢ÆäÖ§³ÖÇþµÀÒÔ»ñÈ¡¸üС£¡£¡£¡£
https://www.bleepingcomputer.com/news/microsoft/microsoft-365-users-hit-by-random-product-deactivation-errors/
3. ÑÇÂíÑ·Ó¦ÓÃÊÐËÁ¾ªÏÖBMI CalculationVsn¶ñÒâÌØ¹¤Èí¼þ
12ÔÂ19ÈÕ£¬£¬£¬£¬£¬£¬ÔÚÑÇÂíÑ·Ó¦ÓÃÊÐËÁÖУ¬£¬£¬£¬£¬£¬Ò»¿îÃûΪ¡°BMI CalculationVsn¡±µÄAndroidÓ¦ÓóÌÐò±»·¢Ã÷ÏÖʵÉÏÊÇÒ»¿î¶ñÒâÌØ¹¤Èí¼þ£¬£¬£¬£¬£¬£¬Ëüαװ³É¿µ½¡¹¤¾ßÇÔÈ¡Óû§×°±¸Êý¾Ý¡£¡£¡£¡£¸ÃÓ¦ÓÃÓÉÂõ¿Ë·ÆÊµÑéÊÒµÄÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬²¢Òѱ»´ÓÊÐËÁÖÐÒÆ³ý£¬£¬£¬£¬£¬£¬µ«ÒÑ×°ÖõÄÓû§ÐèÊÖ¶¯É¾³ý²¢Ö´ÐÐÍêÕûɨÃèÒÔɨ³ý²ÐÁôºÛ¼£¡£¡£¡£¡£¸ÃÌØ¹¤Èí¼þÓÉ¡°PT Visionet Data Internasional¡±Ðû²¼£¬£¬£¬£¬£¬£¬×î³õÐû´«ÎªÉíÌåÖÊÁ¿Ö¸Êý£¨BMI£©ÅÌËãÆ÷£¬£¬£¬£¬£¬£¬µ«ºǫִ́ÐжñÒâ²Ù×÷£¬£¬£¬£¬£¬£¬°üÀ¨Æô¶¯ÆÁÄ»Â¼ÖÆÐ§ÀÍ¡¢É¨ÃèÒÑ×°ÖõÄÓ¦ÓóÌÐòÒÔ¼°×èµ²²¢ÍøÂç¶ÌÐÅ£¬£¬£¬£¬£¬£¬°üÀ¨Ò»´ÎÐÔÃÜÂëºÍÑéÖ¤Âë¡£¡£¡£¡£¼øÓÚ´ËÀàΣÏÕÓ¦ÓÃÈÔÄÜÌÓ±ÜÕýµ±Ó¦ÓÃÊÐËÁµÄ´úÂëÉó²é£¬£¬£¬£¬£¬£¬AndroidÓû§Ó¦Ö»×°ÖÃÀ´×Ô×ÅÃû¿¯ÐÐÉ̵ÄÓ¦Ó㬣¬£¬£¬£¬£¬²¢×Ðϸ¼ì²éËùÇëÇóµÄȨÏÞ£¬£¬£¬£¬£¬£¬ÔÚ×°Öúó×÷·ÏÓÐΣº¦µÄȨÏÞ¡£¡£¡£¡£Í¬Ê±£¬£¬£¬£¬£¬£¬¼á³ÖGoogle Play Protect»îԾ״̬¹ØÓÚ¼ì²â²¢×èÖ¹ÒÑÖª¶ñÒâÈí¼þÖÁ¹ØÖ÷Òª¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/android-spyware-found-on-amazon-appstore-disguised-as-health-app/
4. Mirai¶ñÒâÈí¼þʹÓÃĬÈÏÆ¾Ö¤Ñ¬È¾Session Smart·ÓÉÆ÷
12ÔÂ19ÈÕ£¬£¬£¬£¬£¬£¬Õ°²©ÍøÂçÏò¿Í»§·¢³öÖÒÑÔ£¬£¬£¬£¬£¬£¬Ö¸³öMirai¶ñÒâÈí¼þÕýÔÚʹÓÃĬÈÏÆ¾Ö¤¹¥»÷²¢Ñ¬È¾Session Smart·ÓÉÆ÷£¬£¬£¬£¬£¬£¬½ø¶øÌᳫÂþÑÜʽ¾Ü¾øÐ§ÀÍ(DDoS)¹¥»÷¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þ»áɨÃè¾ßÓÐĬÈϵǼƾ֤µÄ×°±¸£¬£¬£¬£¬£¬£¬²¢ÔÚ»ñµÃ»á¼ûȨÏÞºóÔ¶³ÌÖ´ÐÐÏÂÁî¡£¡£¡£¡£Õ°²©ÍøÂ罨Òé¿Í»§Á¬Ã¦¸ü¸ÄËùÓÐSession Smart·ÓÉÆ÷ÉϵÄĬÈÏÆ¾Ö¤£¬£¬£¬£¬£¬£¬²¢Ê¹ÓÃÆæÒìÇÒÇ¿µÄÃÜÂ룬£¬£¬£¬£¬£¬Í¬Ê±¼á³Ö¹Ì¼þ¸üУ¬£¬£¬£¬£¬£¬Éó²é»á¼ûÈÕÖ¾ÖеÄÒì³££¬£¬£¬£¬£¬£¬²¢°²ÅÅÈëÇÖ¼ì²âϵͳºÍ·À»ðǽÀ´ÔöÇ¿Çå¾²ÐÔ¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬Õ°²©ÍøÂ绹ÌáÐÑÖÎÀíÔ±×¢ÖØÇ±ÔÚµÄÈëÇÖÖ¸±ê£¬£¬£¬£¬£¬£¬ÈçɨÃè³£¼û¶Ë¿Ú¡¢SSHЧÀ͵ǼʵÑéʧ°Ü¡¢³öÕ¾Á÷Á¿¼¤ÔöµÈ¡£¡£¡£¡£ÒѾѬȾµÄ·ÓÉÆ÷±ØÐèÖØÐÂÓ³Ïñ»¯²Å»ªÖØÐÂÉÏÏß¡£¡£¡£¡£´Ëǰ£¬£¬£¬£¬£¬£¬Õ°²©ÍøÂçÒ²Ôø¶à´ÎÖÒÑÔÆä²úÆ·Öб£´æµÄÔ¶³Ì´úÂëÖ´ÐÐÎó²îºÍÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¬£¬£¬£¬£¬£¬²¢Ðû²¼ÁËÏìÓ¦µÄ²¹¶¡¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/juniper-warns-of-mirai-botnet-targeting-session-smart-routers/
5. BeyondTrustÔâÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬·¢Ã÷Çå¾²Îó²î²¢½ôÆÈÓ¦¶Ô
12ÔÂ19ÈÕ£¬£¬£¬£¬£¬£¬BeyondTrustÊÇÒ»¼ÒÌá¹©ÌØÈ¨»á¼ûÖÎÀíºÍÇå¾²Ô¶³Ì»á¿´·¨¾ö¼Æ»®µÄÍøÂçÇå¾²¹«Ë¾£¬£¬£¬£¬£¬£¬ÔÚ12Ô³õÔâÊÜÁËÍøÂç¹¥»÷¡£¡£¡£¡£ÍþвÐÐΪÕßÈëÇÖÁËÆä²¿·ÖÔ¶³ÌÖ§³ÖSaaSʵÀý£¬£¬£¬£¬£¬£¬»ñµÃÁËÔ¶³ÌÖ§³ÖSaaS APIÃÜÔ¿µÄ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬¿ÉÒÔÖØÖÃÍâµØÓ¦ÓóÌÐòÕÊ»§µÄÃÜÂë¡£¡£¡£¡£BeyondTrustÁ¬Ã¦×÷·ÏÁËAPIÃÜÔ¿£¬£¬£¬£¬£¬£¬Í¨ÖªÁËÊÜÓ°ÏìµÄ¿Í»§£¬£¬£¬£¬£¬£¬²¢ÔÝÍ£ÁËÕâЩʵÀý¡£¡£¡£¡£ÔÚÊÓ²ìÀú³ÌÖУ¬£¬£¬£¬£¬£¬·¢Ã÷ÁËÁ½¸öÎó²î£¬£¬£¬£¬£¬£¬ÆäÖÐÒ»¸öΪÑÏÖØµÄÏÂÁî×¢ÈëÎó²îCVE-2024-12356£¬£¬£¬£¬£¬£¬ÁíÒ»¸öΪÖеÈÑÏÖØÐÔÎó²îCVE-2024-12686¡£¡£¡£¡£BeyondTrustÒÑ×Ô¶¯ÔÚËùÓÐÔÆÊµÀýÉÏÓ¦ÓÃÁËÕë¶ÔÕâÁ½¸öȱÏݵIJ¹¶¡£¬£¬£¬£¬£¬£¬µ«ÔËÐÐ×ÔÍйÜʵÀýµÄÓû§ÐèÒªÊÖ¶¯Ó¦ÓÃÇå¾²¸üС£¡£¡£¡£ÏÖÔÚÉв»ÇåÎúÍþвÐÐΪÕßÊÇ·ñʹÓÃÕâЩÎó²îÀ´¹¥»÷ÏÂÓοͻ§£¬£¬£¬£¬£¬£¬µ«CISAÌåÏÖCVE-2024-12356Òѱ»Ê¹ÓÃÓÚ¹¥»÷¡£¡£¡£¡£BeyondTrustÌåÏÖ£¬£¬£¬£¬£¬£¬ËûÃÇÕýÔÚ¼ÌÐøÓë×ÔÁ¦µÄµÚÈý·½ÍøÂçÇå¾²¹«Ë¾ÏàÖú¾ÙÐг¹µ×ÊӲ죬£¬£¬£¬£¬£¬²¢×¨×¢ÓÚÈ·±£ËùÓпͻ§ÊµÀý¶¼»ñµÃÖÜÈ«¸üкÍÇå¾²°ü¹Ü¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/beyondtrust-says-hackers-breached-remote-support-saas-instances/
6. FortiWLMÆØÑÏÖØÎó²î£º¿ÉÔ¶³Ì½ÓÊÜ×°±¸
12ÔÂ19ÈÕ£¬£¬£¬£¬£¬£¬FortinetÎÞÏßÖÎÀíÆ÷£¨FortiWLM£©Öб£´æÒ»¸ö±àºÅΪCVE-2023-34990µÄÑÏÖØÎó²î£¬£¬£¬£¬£¬£¬¸ÃÎó²îÔÊÐíÔ¶³Ì¹¥»÷Õßͨ¹ýÌØÖÆWebÇëÇóÖ´ÐÐδ¾ÊÚȨµÄ´úÂë»òÏÂÁ£¬£¬£¬£¬£¬´Ó¶ø½ÓÊÜ×°±¸¡£¡£¡£¡£´ËÎó²îÊÇÒ»¸öÏà¶Ô·¾¶±éÀúÎó²î£¬£¬£¬£¬£¬£¬ÆÀ·ÖΪ9.8£¬£¬£¬£¬£¬£¬ÓÉHorizon3Ñо¿Ô±Zach HanleyÔÚ2023Äê5Ô·¢Ã÷¡£¡£¡£¡£È»¶ø£¬£¬£¬£¬£¬£¬ÔÚ³¤´ïÊ®¸öÔµÄʱ¼äÀ£¬£¬£¬£¬£¬¸ÃÎó²îδ»ñµÃÐÞ¸´£¬£¬£¬£¬£¬£¬ÆÈʹHanleyÔÚ2024Äê3Ô¹ûÕæÅû¶ÁËÎó²îÐÅÏ¢ºÍ֤ʵ´úÂ루POC£©¡£¡£¡£¡£Ê¹ÓôËÎó²î£¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔ¶ÁÈ¡Ãô¸ÐÈÕÖ¾Îļþ£¬£¬£¬£¬£¬£¬°üÀ¨ÖÎÀíÔ±»á»°ID£¬£¬£¬£¬£¬£¬½ø¶øÐ®ÖÆÖÎÀíÔ±»á»°²¢»ñÈ¡ÌØÈ¨»á¼û¡£¡£¡£¡£¸ÃÎó²îÓ°ÏìÁËFortiWLM°æ±¾8.6.0ÖÁ8.6.5ºÍ8.5.0ÖÁ8.5.4¡£¡£¡£¡£Ö»¹ÜÑо¿Ö°Ô±ÒÑ·¢³öÖÒÑÔ£¬£¬£¬£¬£¬£¬µ«ÓÉÓÚȱ·¦CVE IDºÍÇ徲ͨ¸æ£¬£¬£¬£¬£¬£¬Óû§²¢Î´Òâʶµ½Î£º¦¡£¡£¡£¡£Ö±µ½2024Äê12ÔÂ18ÈÕ£¬£¬£¬£¬£¬£¬Fortinet²ÅÐû²¼Ç徲ͨ¸æ³Æ£¬£¬£¬£¬£¬£¬¸ÃÎó²îÒÑÔÚ2023Äê9ÔÂβÐû²¼µÄFortiWLM°æ±¾8.6.6ºÍ8.5.5ÖлñµÃÐÞ¸´¡£¡£¡£¡£¿£¿£¿£¿£¿£Ë¼Á¿µ½FortiWLM±»ÆÕ±éÓ¦ÓÃÓÚÕþ¸®»ú¹¹¡¢Ò½ÁƱ£½¡×éÖ¯¡¢½ÌÓý»ú¹¹ºÍ´óÐÍÆóÒµµÈÒªº¦ÇéÐÎÖУ¬£¬£¬£¬£¬£¬¸ÃÎó²îµÄ±£´æ¿ÉÄܵ¼ÖÂÕû¸öÍøÂçÖÐÖ¹ºÍÃô¸ÐÊý¾Ýй¶¡£¡£¡£¡£Òò´Ë£¬£¬£¬£¬£¬£¬Ç¿ÁÒ½¨ÒéFortiWLMÖÎÀíԱʵʱӦÓÃËùÓпÉÓøüС£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/fortinet-warns-of-critical-fortiwlm-bug-giving-hackers-admin-privileges/