Verizon͸¶²¿·ÖÓû§µÄÐÅϢй¶²¢Ôâµ½SIM¿¨½»Á÷¹¥»÷

Ðû²¼Ê±¼ä 2022-10-20
1¡¢Verizon͸¶²¿·ÖÓû§µÄÐÅϢй¶²¢Ôâµ½SIM¿¨½»Á÷¹¥»÷

      

¾Ý10ÔÂ18ÈÕ±¨µÀ£¬Verizon²¿·ÖÔ¤¸¶·Ñ¿Í»§µÄÐÅϢй¶¡£Verizon³Æ£¬ÔÚ2022Äê10ÔÂ6ÈÕÖÁ10ÔÂ10ÈÕʱ´ú£¬Î´¾­ÊÚȨµÄµÚÈý·½»á¼ûÁËÓû§ÓÃÓÚ×Ô¶¯¸¶¿îµÄÐÅÓÿ¨µÄ×îºóËÄλÊý×Ö£¬²¢ÔÚSIM¿¨½»Á÷¹¥»÷ÖÐʹÓÃÁËй¶µÄÐÅÓÿ¨ÐÅÏ¢¡£VerizonÌåÏÖ£¬ËûÃÇ×î½ü·¢Ã÷ÁËÉæ¼°Ô¼250¸öÔ¤¸¶·ÑÎÞÏßÕË»§µÄδ¾­ÊÚȨµÄÔ˶¯£¬¸Ã¹«Ë¾ÒѾ­½ÓÄÉÁËÌØÁíÍâ²½·¥£¬ÒÔ±£»¤Æä¿Í»§ÃâÊÜδ¾­ÊÚȨµÄ»á¼û»òڲƭ¹¥»÷¡£


https://www.bleepingcomputer.com/news/security/verizon-notifies-prepaid-customers-their-accounts-were-breached/


2¡¢OracleÐû²¼2022Äê10Ô·ÝÇå¾²¸üÐÂÐÞ¸´366¸öÎó²î     

      

OracleÔÚ10ÔÂ18ÈÕÐû²¼ÁË2022Äê10Ô·ݵÄÖ÷Òª¸üУ¬ÐÞ¸´Á˶à¸ö²úÆ·ÖеÄ366¸öÎó²î¡£´Ë´ÎÐÞ¸´µÄ½ÏΪÑÏÖØµÄÎó²î°üÀ¨OracleÇå¾²±¸·Ý(Apache HTTP·þÎñÆ÷)ÖеÄÎó²îCVE-2022-31813¡¢OracleÉÌÎñƽ̨DynamoÓ¦ÓóÌÐò¿ò¼Ü(dom4j)ÖеÄÎó²îCVE-2020-10683ºÍOracleÍ¨Ñ¶ÔÆÔ­Éú½¹µãÇå¾²±ßÑØ±£»¤ÊðÀíÖеÄÎó²îCVE-2022-1292¡£ÆäÖв¿·ÖÎó²î¿É±»Ô¶³Ì¹¥»÷ÕßÓÃÀ´¿ØÖÆÊÜÓ°ÏìµÄϵͳ£¬Ñо¿Ö°Ô±½¨ÒéÓû§Á¬Ã¦Éó²é¸üв¢Ó¦ÓÃÐëÒªµÄ»º½â²½·¥¡£


https://www.oracle.com/security-alerts/cpuoct2022.html


3¡¢ÃÀ¹úKeystone HealthÊý¾Ýй¶ÊÂÎñÓ°ÏìÔ¼23Íò»¼Õß

      

ýÌå10ÔÂ18Èճƣ¬±öϦ·¨ÄáÑÇÖÝÒ½ÁƱ£½¡ÌṩÉÌKeystone HealthµÄÊý¾Ýй¶ÊÂÎñÓ°Ïì235237¸ö»¼Õß¡£KeystoneÔÚ8ÔÂ19ÈÕ·¢Ã÷Ò»ÆðÍøÂçÇå¾²ÊÂÎñµ¼ÖÂÆäijЩϵͳÖÐÖ¹¡£¾­ÊӲ췢Ã÷£¬Î´¾­ÊÚȨµÄµÚÈý·½ÔÚ2022Äê7ÔÂ28ÈÕÖÁ8ÔÂ19ÈÕʱ´ú»á¼ûÁËÆäϵͳÄÚµÄÎļþ£¬°üÀ¨»¼ÕßÐÕÃû¡¢Éç»áÇå¾²ºÅÂëºÍÁÙ´²ÐÅÏ¢µÈ¡£¸Ã»ú¹¹ÌåÏÖ£¬ËüÒѾ­Í¨ÖªÊÜÓ°Ï컼Õߣ¬²¢½«ÎªËûÃÇÌṩÐÅÓüà²â·þÎñ¡£


https://www.securityweek.com/keystone-health-data-breach-impacts-235000-patients


4¡¢KasperskyÅû¶DiceyFÕë¶Ô¶«ÄÏÑÇÔÚÏ߶ij¡µÄ¹¥»÷Ô˶¯

      

10ÔÂ17ÈÕ£¬KasperskyÅû¶ÁËDiceyFÕë¶Ô¶«ÄÏÑÇÔÚÏ߶ij¡µÄ¹¥»÷Ô˶¯¡£¸ÃÔ˶¯ÖÁÉÙ×Ô2021Äê11ÔÂÒÔÀ´Ò»Ö±»îÔ¾£¬ÆäËÆºõ²»ÊdzöÓÚ¾­¼ÃÄ¿µÄ£¬¶øÊǾÙÐÐÒþ²ØµÄÌØ¹¤Ô˶¯ºÍ֪ʶ²úȨÇÔÈ¡¡£¸ÃAPTÍÅ»ïʹÓõĹ¥»÷¿ò¼ÜÃûΪGamePlayerFramework£¬ÕâÊǶÔC++¶ñÒâÈí¼þPuppetLoaderµÄC#ÖØÐ´¡£DiceyF»¹Ê¹ÓÃÒ»¸öÄ£ÄâMango Employee Data SynchronizerµÄGUIÓ¦Ó㬸ÃÓ¦Óý«YunaÏÂÔØ³ÌÐò×°Öõ½Ä¿µÄµÄÍøÂçÖС£


https://securelist.com/diceyf-deploys-gameplayerframework-in-online-casino-development-studio/107723/


5¡¢SafeBreach³Æ¼ì²âµ½Ò»ÖÖеÄFUD powershellºóÃÅ

      

SafeBreachÔÚ10ÔÂ18ÈÕ³ÆÆä½üÆÚ¼ì²âµ½Ò»ÖÖеÄÍêÈ«²»¿É¼ì²â(FUD)powershellºóÃÅ¡£¹¥»÷ʼÓÚ´øÓжñÒâÎĵµApply Form.docmµÄµç×ÓÓʼþ¡£¸Ã¶ñÒâÎĵµÓÚ2022Äê8ÔÂ25ÈÕ´ÓÔ¼µ©ÉÏ´«£¬¿É×°Öò¢Ö´ÐÐupdater.vbs¾ç±¾£¬À´½¨ÉèÒ»¸öÍýÏëʹÃüð³äͨÀýµÄWindows¸üС£VBS¾ç±¾Ö´ÐÐÁ½¸öPowerShell¾ç±¾Script.ps1ºÍTemp.ps1£¬ËüÃÇÔÚVirusTotalÉϾùδ±»¼ì²âΪ¶ñÒâ¾ç±¾¡£Script.ps1»áÅþÁ¬µ½¹¥»÷ÕßC2£¬Temp.ps1½âÂëÏìÓ¦ÖеÄÏÂÁî¡£


https://www.safebreach.com/resources/blog/safebreach-labs-researchers-uncover-new-fully-undetectable-powershell-backdoor/


6¡¢ZoomÐÞ¸´ÊÊÓÃÓÚmacOSµÄ²úÆ·ÖеÄÎó²îCVE-2022-28762

      

¾Ý10ÔÂ18ÈÕ±¨µÀ£¬ZoomÐÞ¸´ÁËÊÊÓÃÓÚmacOSµÄZoom Client for MeetingsÖеÄÎó²î£¨CVE-2022-28762£©¡£¸ÃÎó²îµÄCVSSÆÀ·ÖΪ7.3£¬µ±Í¨¹ýÔËÐÐÌØ¶¨µÄZoomÓ¦ÓÃÆôÓÃÏà»úģʽÅä¾°×÷ΪZoomÓ¦ÓòãAPIµÄÒ»²¿·Öʱ£¬¿Í»§¶Ë»á·­¿ªÒ»¸öÍâµØµ÷ÊԶ˿ڡ£ÍâµØ¶ñÒâÓû§¿ÉÒÔʹÓõ÷ÊÔ¶Ë¿ÚÅþÁ¬²¢¿ØÖÆÔÚZoom¿Í»§¶ËÖÐÔËÐеÄÓ¦ÓᣱðµÄ£¬¸Ã¹«Ë¾»¹ÐÞ¸´ÁËÁíÒ»¸öÎó²îCVE-2022-28761£¬ËüÓ°ÏìÁËZoom On-Premise Meeting Connector¶àýÌå·ÓÉÆ÷(MMR)¡£ 


https://securityaffairs.co/wordpress/137266/security/zoom-macos-cve-2022-28762.html