Pilot Credentials±»ºÚй¶ÃÀ¹úº½¿ÕºÍÎ÷ÄϺ½¿Õ²¿·ÖÐÅÏ¢
Ðû²¼Ê±¼ä 2023-06-251¡¢Pilot Credentials±»ºÚй¶ÃÀ¹úº½¿ÕºÍÎ÷ÄϺ½¿Õ²¿·ÖÐÅÏ¢
¾ÝýÌå6ÔÂ24ÈÕ±¨µÀ£¬£¬£¬£¬È«Çò×î´óµÄÁ½¼Òº½¿Õ¹«Ë¾ÃÀ¹úº½¿ÕºÍÎ÷ÄϺ½¿ÕÅû¶ÁËÒòPilot CredentialsÔâµ½ºÚ¿Í¹¥»÷¶øµ¼ÖµÄÊý¾Ýй¶ÊÂÎñ¡£¡£¡£¡£¡£¡£Pilot CredentialsÊÇÖÎÀí¶à¼Òº½¿Õ¹«Ë¾º½ÐÐÔ±ÉêÇëºÍÕÐÆ¸ÍøÕ¾µÄµÚÈý·½¹©Ó¦ÉÌ¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÓÚ4ÔÂ30ÈÕ»á¼ûÁ˺½ÐÐÔ±Ö¤Êéϵͳ£¬£¬£¬£¬²¢ÇÔÈ¡Á˲¿·ÖÉêÇëÈËÔÚº½ÐÐÔ±ºÍѧԱÕÐÆ¸Àú³ÌÖÐÌṩµÄÐÅÏ¢¡£¡£¡£¡£¡£¡£ÃÀ¹úº½¿ÕµÄ5745Ãûº½ÐÐÔ±Êܵ½Ó°Ï죬£¬£¬£¬¶øÎ÷ÄϺ½¿Õ×ܹ²ÓÐ3009Ãûº½ÐÐÔ±Êܵ½Ó°Ïì¡£¡£¡£¡£¡£¡£Á½¼Ò¹«Ë¾¾ùÓÚ5ÔÂ3ÈÕ»ñϤ´ËÊÂÎñ£¬£¬£¬£¬²¢ÌåÏÖ½öÉæ¼°µÚÈý·½¹©Ó¦É̵Äϵͳ£¬£¬£¬£¬²¢Î´Ó°Ï캽¿Õ¹«Ë¾×Ô¼ºµÄϵͳ¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/american-airlines-southwest-airlines-disclose-data-breaches-affecting-pilots/
2¡¢PBIÊý¾ÝÐ¹Â¶Éæ¼°GenworthºÍCalPERSÊý°ÙÍò¿Í»§µÄÐÅÏ¢
¾Ý6ÔÂ23ÈÕ±¨µÀ£¬£¬£¬£¬PBIÑо¿Ð§ÀÍ(PBI)Êý¾Ýй¶£¬£¬£¬£¬Ó°ÏìÁËÆäÈý¸öÏàÖú¹«Ë¾µÄÔ¼475Íò¿Í»§¡£¡£¡£¡£¡£¡£ÕâЩ¹¥»÷ʼÓÚ5ÔÂ27ÈÕ£¬£¬£¬£¬ÆäʱClopÍÅ»ï×îÏÈʹÓÃMOVEit TransferÎó²îÇÔÈ¡×éÖ¯µÄÊý¾Ý¡£¡£¡£¡£¡£¡£µÚÒ»¼ÒÊÜÓ°Ïì×éÖ¯ÊÇλÓÚ¸¥¼ªÄáÑÇÖݵÄÈËÊÙ°ü¹ÜЧÀÍÌṩÉÌGenworth Financial£¬£¬£¬£¬¾ÝÔ¤¼ÆÓ°ÏìÁË250ÖÁ270ÍòÈË¡£¡£¡£¡£¡£¡£µÚ¶þ¼ÒÊܵ½PBIй¶ӰÏìµÄÊÇλÓÚŦԼµÄ°ü¹ÜÌṩÉÌWilton Reassurance£¬£¬£¬£¬Éæ¼°1482490Ãû¿Í»§¡£¡£¡£¡£¡£¡£Êܵ½Ó°ÏìµÄµÚÈý¼Ò¹«Ë¾ÊÇÃÀ¹ú×î´óµÄ¹«¹²ÑøÀÏ»ù½ðCalPERS£¨¼ÓÖݹ«¹²¹ÍÔ±ÍËÐÝϵͳ£©£¬£¬£¬£¬Ó°ÏìÁËÔ¼769000Ãû»áÔ±¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/moveit-breach-impacts-genworth-calpers-as-data-for-32-million-exposed/
3¡¢Î¢Èí¼ì²âµ½Ä¾Âí»¯OpenSSHÕë¶ÔLinuxºÍIoT×°±¸µÄ»î¶¯
6ÔÂ22ÈÕ£¬£¬£¬£¬Î¢ÈíÐû²¼±¨¸æ³ÆÆä×î½ü·¢Ã÷ÁËÒ»ÖÖʹÓÃ×Ô½ç˵ºÍ¿ªÔ´¹¤¾ßÀ´Õë¶Ô̻¶ÓÚ»¥ÁªÍøµÄLinuxϵͳºÍIoT×°±¸µÄ¹¥»÷¡£¡£¡£¡£¡£¡£¸Ã¹¥»÷ʹÓÃÁËľÂí»¯OpenSSHÀ´¿ØÖƱ»Ñ¬È¾µÄ×°±¸£¬£¬£¬£¬²¢×°ÖÃÁËÍÚ¿ó¶ñÒâÈí¼þ¡£¡£¡£¡£¡£¡£¹¥»÷ÕßÔÚ»ñµÃ»á¼ûȨÏ޺󣬣¬£¬£¬»á×°ÖÃľÂíOpenSSHÈí¼þ°ü£¬£¬£¬£¬Ö¼ÔÚÔÚÄ¿µÄ×°±¸ÖÐ×°ÖúóÃŲ¢ÇÔÈ¡SSHƾ֤ÒÔά³Ö³¤ÆÚÐÔ¡£¡£¡£¡£¡£¡£¸ÃºóÃÅÓÖ×°ÖÃÁËÖÖÖÖ¹¤¾ßºÍ×é¼þ£¬£¬£¬£¬ÀýÈçRootkitºÍIRC botÀ´Ð®ÖÆ×°±¸×ÊÔ´ÒÔ¾ÙÐÐÍÚ¿ó»î¶¯¡£¡£¡£¡£¡£¡£
https://www.microsoft.com/en-us/security/blog/2023/06/22/iot-devices-and-linux-based-systems-targeted-by-openssh-trojan-campaign/
4¡¢VMwareÐÞ¸´ÆävCenter ServerÖеĶà¸öÇå¾²Îó²î
ýÌå6ÔÂ23Èճƣ¬£¬£¬£¬VMwareÐû²¼¸üУ¬£¬£¬£¬ÐÞ¸´ÁËvCenter ServerÖеÄ5¸öÇå¾²Îó²î¡£¡£¡£¡£¡£¡£ÕâЩÎó²î±£´æÓÚDCE/RPCÐÒéµÄʵÏÖÖС£¡£¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄÎó²î°üÀ¨¶ÑÒç³öÎó²î(CVE-2023-20892)¡¢ÊͷźóʹÓÃÎó²î(CVE-2023-20893)¡¢Ô½½çдÈëÎó²î£¨CVE-2023-20894£©ÒÔ¼°Ô½½ç¶ÁÈ¡Îó²î(CVE-2023-20895ºÍCVE-2023-20896)¡£¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬£¬Ç°Á½¸öÎó²î£¨CVE-2023-20892ºÍCVE-2023-20893£©¿É±»Î´¾Éí·ÝÑéÖ¤µÄ¹¥»÷ÕßʹÓ㬣¬£¬£¬À´»ñÈ¡´úÂëÖ´ÐÐȨÏÞ¡£¡£¡£¡£¡£¡£
https://securityaffairs.com/147774/hacking/vmware-vcenter-server-memory-corruption-bugs.html
5¡¢Camaro DragonʹÓÃUSBÇý¶¯Æ÷¹¥»÷Å·ÖÞµÄÒ½ÁÆ»ú¹¹
Check PointÔÚ6ÔÂ22ÈÕÅû¶ÁËCamaro DragonʹÓÃUSBÇý¶¯Æ÷·Ö·¢¶ñÒâÈí¼þµÄ»î¶¯¡£¡£¡£¡£¡£¡£¸Ã»î¶¯ÊÇÔÚ¶ÔÅ·ÖÞÒ»¼ÒÒ½ÁÆ»ú¹¹Ôâµ½µÄ¹¥»÷¾ÙÐÐÊÓ²ìµÄÀú³ÌÖз¢Ã÷µÄ¡£¡£¡£¡£¡£¡£¾ÝϤ£¬£¬£¬£¬Ä³Ô±¹¤ÔÚÑÇÖÞµÄÒ»´Î¾Û»áÖн«×Ô¼ºµÄUSB²åÈëͬʵÄÅÌËã»úʱ±»Ñ¬È¾¡£¡£¡£¡£¡£¡£¸ÃÔ±¹¤·µ»ØÅ·ÖÞµÄÒ½ÁÆ»ú¹¹ºó£¬£¬£¬£¬ÎÞÒâÖÐͨ¹ý´ËUSBѬȾÁËÒ½ÔºµÄϵͳ¡£¡£¡£¡£¡£¡£Ñ¬È¾Á´°üÀ¨Ò»¸öÃûΪHopperTickµÄDelphi launcher£¬£¬£¬£¬Í¨¹ýUSBÈö²¥£¬£¬£¬£¬ÆäÖ÷ÒªpayloadÃûΪWispRider£¬£¬£¬£¬ÈÏÕæÔÚÅþÁ¬µ½»úеʱѬȾװ±¸¡£¡£¡£¡£¡£¡£WispRiderµÄ²¿·Ö±äÌ廹¿ÉÒԳ䵱ºóÃŲ¢Èƹýɱ¶¾Èí¼þ£¬£¬£¬£¬ÓëÆäÒ»ÆðÌṩµÄÉÐÓÐÒ»¸öÇÔȡģ¿£¿£¿éHPCustPartUI.dll¡£¡£¡£¡£¡£¡£
https://research.checkpoint.com/2023/beyond-the-horizon-traveling-the-world-on-camaro-dragons-usb-flash-drives/
6¡¢AppleÐÞ¸´ÔÚTriangulation»î¶¯Öб»Ê¹ÓõĶà¸öÎó²î
6ÔÂ22ÈÕ±¨µÀ³Æ£¬£¬£¬£¬AppleÐÞ¸´ÁËiOS¡¢iPadOS¡¢macOS¡¢watchOSºÍSafariÖеĶà¸öÎó²î¡£¡£¡£¡£¡£¡£ÆäÖаüÀ¨×Ô2019ÄêÒÔÀ´Ò»Ö±»îÔ¾µÄTriangulation»î¶¯Öб»Ê¹ÓõÄÁ½¸öÎó²î£¬£¬£¬£¬ÄÚºËÖеÄÕûÊýÒç³öÎó²î£¨CVE-2023-32434 £©ºÍWebKitÖеÄÄÚ´æËð»µÎó²î£¨WebKit ÖеÄÄÚ´æËð»µÎó²î£©¡£¡£¡£¡£¡£¡£AppleÌåÏÖÕâÁ½¸öÎó²î¿ÉÄÜÒѱ»ÓÃÓÚ¹¥»÷iOS 15.7֮ǰµÄiOS°æ±¾¡£¡£¡£¡£¡£¡£´Ë´Î»¹ÐÞ¸´Á˵ÚÈý¸öÁãÈÕÎó²î£¨CVE-2023-32439£©£¬£¬£¬£¬¸ÃÎó²îÔÚ´¦Öóͷ£¶ñÒâWebÄÚÈÝʱ¿ÉÄܵ¼ÖÂí§Òâ´úÂëÖ´ÐС£¡£¡£¡£¡£¡£
https://thehackernews.com/2023/06/zero-day-alert-apple-releases-patches.html


¾©¹«Íø°²±¸11010802024551ºÅ