Published 11月 30, 2022 by Kevin

CISA發布了本周的漏洞清單

CISA發布了本周的漏洞清單,其中包含了1個9.9與很多9.8嚴重漏洞,包含了以下產品:


詳情請看:

Vulnerability Summary for the Week




Read More
      edit
Published 11月 30, 2022 by Kevin

CISA發布了7個工業控制系統的安全公告

CISA發布了7個工業控制系統的安全公告,包含安全議題,漏洞與曝露的風險:

  • ICSA-22-333-01 Mitsubishi Electric GOT2000
  • ICSA-22-333-02 Hitachi Energys IED Connectivity Packages and PCM600 Products
  • ICSA-22-333-03 Hitachi Energys MicroSCADA ProX SYS600 Products
  • ICSA-22-333-04 Moxa UC Series
  • ICSA-22-333-05 Mitsubishi Electric FA Engineering Software
  • ICSA-21-334-02 Mitsubishi MELSEC and MELIPC Series (Update E)
  • ICSA-19-346-02 Omron PLC CJ and CS Series (Update A)
詳情請看:
Read More

      edit
Published 11月 30, 2022 by Kevin

微軟的稽核原則建議

微軟的稽核原則建議

微軟建議從這個設定開始,用來協助偵測入侵,這些資料表包含Windows預設設定、基準建議,以及這些作業系統的更強建議。

文章建議了應該要監控事件類型:

  • 發生的可能性很高,表示未經授權的活動

  • 誤判數字低

  • 發生時應該會產生調查/鑒識回應

並包含兩種類型的事件:

  1. 即使發生單一事件,也會指出未經授權的活動

  2. 累積的事件高於預期和接受的基準


詳請請參考:

稽核原則建議


Read More
      edit
Published 11月 29, 2022 by Kevin

CISA新增了2個弱點漏洞到已知被利用的弱點漏洞清單

CISA新增了2個弱點漏洞到已知被利用的弱點漏洞清單,應盡快修補此弱點漏洞:

  • CVE-2021-35587:Oracle Fusion Middleware Unspecified Vulnerability
  • CVE-2022-4135: Google Chrome Heap Buffer Overflow Vulnerability
詳情請看:
KNOWN EXPLOITED VULNERABILITIES CATALOG
Read More
      edit
Published 11月 28, 2022 by Kevin

8個應該停用的安全小技巧

 8個應該停用的安全小技巧

Watchguard CSO發表了一篇8個應該停用的安全小技巧,包含的內容如下: 
  • 密碼最少應該8碼:文中建議應該改為最少12碼,最好可以到16碼。
  • 定期變更密碼:主要是人們為了記得一直改的密碼,會用容易猜的密碼,但是如果登入驗證還是只有密碼這一個方式,還是建議要定期更改。所以最好的方法應該是導入MFA,這樣只有在密碼已經可能外洩時,才需要更改密碼。
  • 推動強密碼實踐:應該改為推行密碼管理工具與MFA。
  • 對來自陌生人的鏈接和附件持懷疑態度:這個提示已經過時不是因為它是錯誤的,而是因為它的包容性不夠。 您應該告訴您的用戶對每個人的鏈接和附件持懷疑態度,即使是他們認識的人。
  • 使用者是無法教育的:資訊安全意識提升的教育還是非常重要的。
  • 防火牆與防毒軟體已經足夠了
  • 僅安全工具就足以保護我們
  • 讓 IT 或 CISO 承擔網絡安全責任
詳請請看: 
Read More
      edit
Published 11月 26, 2022 by Kevin

微軟PowerToy新功能Hosts File Editor,編輯電腦的Hosts檔案

微軟PowerToy新功能Hosts File Editor

微軟PowerToy新功能Hosts File Editor,可以直接用來編輯電腦的Hosts檔案,就不用再去檔案總管裡面的Windows/System32/Drivers/etc裡面找Hosts了。

詳請請看:

hosts-file-editor

PowerToys

Read More
      edit
Published 11月 24, 2022 by Kevin

Kaspersky:安全購物的守則

Kaspersky發佈了一篇關於安全購物的守則,提出以下的重點:
  • 使用密碼複雜度夠強的密碼
  • 使用公眾網路時,要用VPN保護連線。
  • 不要連結信用卡或銀行帳號到網路購物商店。
  • 使用線上的付費服務。
  • 使用獨立的信用卡來支援網路商店。
  • 確認每一筆付款資料.
  • 使用可靠的安全保護機制。
詳情請看:

Read More
      edit
Published 11月 23, 2022 by Kevin

CISA發布了8個工業控制系統的安全公告

CISA發布了8個工業控制系統的安全公告,包含安全議題,漏洞與曝露的風險:
  • ICSA-22-326-01 AVEVA Edge
  • ICSA-22-326-02 Digital Alert Systems DASDEC
  • ICSA-22-326-03 Phoenix Contact Automation Worx
  • ICSA-22-326-04 GE Cimplicity
  • ICSA-22-326-05 Moxa Multiple ARM-Based Computers
  • ICSMA-21-152-01 Hillrom Medical Device Management (Update C)
  • ICSA-20-212-04 Mitsubishi Electric Factory Automation Engineering Products (Update I)
  • ICSA-21-049-02 Mitsubishi Electric FA Engineering Software Products (Update G)
詳情請看:
Read More
      edit
Published 11月 23, 2022 by Kevin

CISA發布了本周的漏洞清單

      edit
Published 11月 20, 2022 by Kevin

微軟發布了創新者的零信任安全性指南

微軟發布了創新者的零信任安全性指南 

微軟發布了創新者的零信任安全性指南,從幾個方向,指導如何推動零信任架構:

  1. 保護現代工作場所
  2. 零信任的六個風險區域
  3. 推動零信任部屬的策略
  4. 協調流程與自動化
  5. 打造安全性文化
  6. 如何與董事會討論零信任


詳情請看:

創新者的零信任安全性指南

Read More
      edit
Published 11月 18, 2022 by Kevin

微軟的30天免費學習系列

微軟的30天免費學習系列,包含以下的課程:
  • Data Science
  • Fusion
  • Serverless
  • Power Platform
  • Data Analytics
  • Static Web Apps
  • Progressive Web Apps
  • Microsoft Graph
詳情請看:
Read More
      edit
Published 11月 18, 2022 by Kevin

CISA發布了2個工業控制系統的安全公告

      edit
Published 11月 17, 2022 by Kevin

部分office版本的將終止服務

部分office版本的將終止服務,包含以下產品:

  • Office 2013 reaches end of support on April 11, 2023
  • Office 2019 for Mac reaches end of support on October 10, 2023.
  • Connecting Office 2016 and Office 2019 to Microsoft 365 reaches end of support on October 10, 2023

詳情請看:
Read More
      edit
Published 11月 16, 2022 by Kevin

CISA發布了本周的漏洞清單

 CISA發布了本周的漏洞清單,其中包含了很多9.8嚴重漏洞,包含了以下產品:

  • activity_log_project -- activity_log:CSV Injection vulnerability in Activity Log Team Activity Log <= 2.8.3 on WordPress.
  • apache -- commons_bcel:Apache Commons BCEL has a number of APIs that would normally only allow changing specific class characteristics. However, due to an out-of-bounds writing issue, these APIs can be used to produce arbitrary bytecode. This could be abused in applications that pass attacker-controllable data to those APIs, giving the attacker more control over the resulting bytecode than otherwise expected. Update to Apache Commons BCEL 6.6.0.
  • citrix -- gateway:Unauthorized access to Gateway user capabilities
  • citrix -- gateway:User login brute force protection functionality bypass
  • democritus -- d8s-dates:The d8s-dates for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-timezones package. The affected version of d8s-htm is 0.1.0.
  • democritus -- d8s-networking:The d8s-networking for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-json package. The affected version of d8s-htm is 0.1.0.
  • democritus -- d8s-networking:The d8s-networking for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-user-agents package. The affected version of d8s-htm is 0.1.0.
  • democritus -- d8s-python:The d8s-python for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-algorithms package. The affected version of d8s-htm is 0.1.0.
  • democritus -- d8s-python:The d8s-python for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-grammars package. The affected version of d8s-htm is 0.1.0.
  • democritus -- d8s-stats:The d8s-stats for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-math package. The affected version of d8s-htm is 0.1.0.
  • democritus -- d8s-strings:The d8s-strings for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-uuids package. The affected version of d8s-htm is 0.1.0.
  • democritus -- d8s-timer:The d8s-timer for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-uuids package. The affected version of d8s-htm is 0.1.0.
  • democritus -- d8s-urls:The d8s-urls for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-domains package. The affected version of d8s-htm is 0.1.0.
  • democritus -- d8s-xml:The d8s-xml for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-utility package. The affected version of d8s-htm is 0.1.0.
  • flowring -- agentflow_bpm:The file upload function of Agentflow BPM has insufficient filtering for special characters in URLs. An unauthenticated remote attacker can exploit this vulnerability to upload arbitrary file and execute arbitrary code to manipulate system or disrupt service.
  • fluentforms -- contact_form:The Contact Form Plugin WordPress plugin before 4.3.13 does not validate and escape fields when exporting form entries as CSV, leading to a CSV injection
  • huawei -- emui:The system framework layer has a vulnerability of serialization/deserialization mismatch. Successful exploitation of this vulnerability may cause privilege escalation.
  • huawei -- harmonyos:The DRM module has a vulnerability in verifying the secure memory attributes. Successful exploitation of this vulnerability may cause abnormal video playback.
  • mahara -- mahara:Mahara 21.04 before 21.04.7, 21.10 before 21.10.5, 22.04 before 22.04.3, and 22.10 before 22.10.0 potentially allow a PDF export to trigger a remote shell if the site is running on Ubuntu and the flag -dSAFER is not set with Ghostscript.
  • maxonerp -- maxon:A vulnerability classified as critical has been found in Maxon ERP. This affects an unknown part of the file /index.php/purchase_order/browse_data. The manipulation of the argument tb_search leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-213039.
  • mendix -- saml:A vulnerability has been identified in Mendix SAML Module (Mendix 7 compatible) (All versions < V1.17.0), Mendix SAML Module (Mendix 7 compatible) (All versions >= V1.17.0), Mendix SAML Module (Mendix 8 compatible) (All versions < V2.3.0), Mendix SAML Module (Mendix 8 compatible) (All versions >= V2.3.0 < V2.3.2), Mendix SAML Module (Mendix 9 compatible, New Track) (All versions < V3.3.1), Mendix SAML Module (Mendix 9 compatible, New Track) (All versions >= V3.3.1 < V3.3.5), Mendix SAML Module (Mendix 9 compatible, Upgrade Track) (All versions < V3.3.0), Mendix SAML Module (Mendix 9 compatible, Upgrade Track) (All versions >= V3.3.0 < V3.3.4). Affected versions of the module insufficiently protect from packet capture replay, only when the not recommended, non default configuration option `'Allow Idp Initiated Authentication'` is enabled. This CVE entry describes the incomplete fix for CVE-2022-37011 in a specific non default configuration.
  • microsoft -- azure_rtos_usbx:Azure RTOS USBX is a USB host, device, and on-the-go (OTG) embedded stack, that is fully integrated with Azure RTOS ThreadX. Prior to version 6.1.12, the USB DFU UPLOAD functionality may be utilized to introduce a buffer overflow resulting in overwrite of memory contents. In particular cases this may allow an attacker to bypass security features or execute arbitrary code. The implementation of `ux_device_class_dfu_control_request` function prevents buffer overflow during handling of DFU UPLOAD command when current state is `UX_SYSTEM_DFU_STATE_DFU_IDLE`. This issue has been patched, please upgrade to version 6.1.12. As a workaround, add the `UPLOAD_LENGTH` check in all possible states.
  • microsoft -- exchange_server:Microsoft Exchange Server Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-41123.
  • nec -- expresscluster_x_singleserversafe:Path traversal vulnerability in CLUSTERPRO X 5.0 for Windows and earlier, EXPRESSCLUSTER X 5.0 for Windows and earlier, CLUSTERPRO X 5.0 SingleServerSafe for Windows and earlier, EXPRESSCLUSTER X 5.0 SingleServerSafe for Windows and earlier allows a remote unauthenticated attacker to overwrite existing files on the file system and to potentially execute arbitrary code.
  • nec -- expresscluster_x_singleserversafe:Buffer overflow vulnerability in CLUSTERPRO X 5.0 for Windows and earlier, EXPRESSCLUSTER X 5.0 for Windows and earlier, CLUSTERPRO X 5.0 SingleServerSafe for Windows and earlier, EXPRESSCLUSTER X 5.0 SingleServerSafe for Windows and earlier allows a remote unauthenticated attacker to overwrite existing files on the file system and to potentially execute arbitrary code.
  • nec -- expresscluster_x_singleserversafe:Weak File and Folder Permissions vulnerability in CLUSTERPRO X 5.0 for Windows and earlier, EXPRESSCLUSTER X 5.0 for Windows and earlier, CLUSTERPRO X 5.0 SingleServerSafe for Windows and earlier, EXPRESSCLUSTER X 5.0 SingleServerSafe for Windows and earlier allows a remote unauthenticated attacker to overwrite existing files on the file system and to potentially execute arbitrary code.
  • nec -- expresscluster_x_singleserversafe:Uncontrolled Search Path Element in CLUSTERPRO X 5.0 for Windows and earlier, EXPRESSCLUSTER X 5.0 for Windows and earlier, CLUSTERPRO X 5.0 SingleServerSafe for Windows and earlier, EXPRESSCLUSTER X 5.0 SingleServerSafe for Windows and earlier allows a remote unauthenticated attacker to overwrite existing files on the file system and to potentially execute arbitrary code.
  • netwrix -- auditor:Remote code execution vulnerabilities exist in the Netwrix Auditor User Activity Video Recording component affecting both the Netwrix Auditor server and agents installed on monitored systems. The remote code execution vulnerabilities exist within the underlying protocol used by the component, and potentially allow an unauthenticated remote attacker to execute arbitrary code as the NT AUTHORITY\SYSTEM user on affected systems, including on systems Netwrix Auditor monitors.
  • objectfirst -- object_first:An issue was discovered in Object First 1.0.7.712. The authorization service has a flow that allows getting access to the Web UI without knowing credentials. For signing, the JWT token uses a secret key that is generated through a function that doesn't produce cryptographically strong sequences. An attacker can predict these sequences and generate a JWT token. As a result, an attacker can get access to the Web UI. This is fixed in 1.0.13.1611.
  • online_diagnostic_lab_management_system_project -- online_diagnostic_lab_management_system: Online Diagnostic Lab Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /odlms//classes/Master.php?f=delete_activity.
  • openfga -- openfga:OpenFGA is a high-performance authorization/permission engine inspired by Google Zanzibar. Versions prior to 0.2.5 are vulnerable to authorization bypass under certain conditions. You are affected by this vulnerability if you added a tuple with a wildcard (*) assigned to a tupleset relation (the right hand side of a ‘from’ statement). This issue has been patched in version v0.2.5. This update is not backward compatible with any authorization model that uses wildcard on a tupleset relation.
  • opmc -- woocommerce_dropshipping: The WooCommerce Dropshipping WordPress plugin before 4.4 does not properly sanitise and escape a parameter before using it in a SQL statement via a REST endpoint available to unauthenticated users, leading to a SQL injection
  • parseplatform -- parse-server:Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Versions prior to 4.10.18, and prior to 5.3.1 on the 5.X branch, are vulnerable to Remote Code Execution via prototype pollution. An attacker can use this prototype pollution sink to trigger a remote code execution through the MongoDB BSON parser. This issue is patched in version 5.3.1 and in 4.10.18. There are no known workarounds.
  • powercom_co_ltd -- upsmon_pro:UPSMON Pro login function has insufficient authentication. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication and get administrator privilege to access, control system or disrupt service.
  • roxyfileman -- roxy_fileman:Roxy Fileman 1.4.6 allows Remote Code Execution via a .phar upload, because the default FORBIDDEN_UPLOADS value in conf.json only blocks .php, .php4, and .php5 files. (Visiting any .phar file invokes the PHP interpreter in some realistic web-server configurations.)
  • samsung -- pass:Improper access control in Samsung Pass prior to version 4.0.05.1 allows attackers to unauthenticated access via keep open feature.
  • sanitization_management_system_project -- sanitization_management_system: A vulnerability classified as critical has been found in SourceCodester Sanitization Management System. Affected is an unknown function of the file /php-sms/classes/Master.php?f=save_quote. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-213012.
  • symantec -- endpoint_detection_and_response: Symantec Endpoint Detection and Response (SEDR) Appliance, prior to 4.7.0, may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.
  • vmware -- workspace_one_assist:VMware Workspace ONE Assist prior to 22.10 contains an Authentication Bypass vulnerability. A malicious actor with network access to Workspace ONE Assist may be able to obtain administrative access without the need to authenticate to the application.
  • vmware -- workspace_one_assist:VMware Workspace ONE Assist prior to 22.10 contains a Broken Authentication Method vulnerability. A malicious actor with network access to Workspace ONE Assist may be able to obtain administrative access without the need to authenticate to the application.
  • vmware -- workspace_one_assist:VMware Workspace ONE Assist prior to 22.10 contains a Broken Access Control vulnerability. A malicious actor with network access to Workspace ONE Assist may be able to obtain administrative access without the need to authenticate to the application.
  • vmware -- workspace_one_assist:VMware Workspace ONE Assist prior to 22.10 contains a Session fixation vulnerability. A malicious actor who obtains a valid session token may be able to authenticate to the application using that token.
  • wago -- i/o-check_service:In WAGO I/O-Check Service in multiple products an attacker can send a specially crafted packet containing OS commands to crash the diagnostic tool and write memory.
  • xfce -- xfce4-settings:In Xfce xfce4-settings A2:B45before 4.16.4 and 4.17.x before 4.17.1, there is an argument injection vulnerability in xfce4-mime-helper.
詳情請看: 
Read More
      edit
Published 11月 16, 2022 by Kevin

CISA發布了1個工業控制系統的安全公告

      edit
Published 11月 15, 2022 by Kevin

CISA新增了1個弱點漏洞到已知被利用的弱點漏洞清單

CISA新增了一個弱點漏洞到已知被利用的弱點漏洞清單,應盡快修補此弱點漏洞:

  • CVE-2022-41049:Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability
Read More
      edit
Published 11月 14, 2022 by Kevin

用wmic指令找notebook的硬體序號,型號

用wmic指令找notebook的硬體序號,型號 

打開windows的cmd,執行以下指令,就不用再把notebook翻過來了。

  • wmic bios get serialnumber
這一個指令也可以:
  • wmic csproduct get identifyingnumber
另外忘記了notebook的型號了嗎?wmic也能找:
  • wmic csproduct get version

Read More
      edit
Published 11月 12, 2022 by Kevin

Azure SC-900安全性、合規性和身分識別基礎知識的免費學習資源

Azure SC-900安全性、合規性和身分識別基礎知識的免費學習資源

Azure SC-900安全性、合規性和身分識別基礎知識的免費學習資源,主要介紹這些主題:

介绍安全性和符合性概念

描述身分識別概念

描述 Azure AD 的服务和标识类型

描述 Azure AD 的驗證功能

描述 Azure AD 的存取管理功能

描述 Azure AD 的身分識別保護和治理功能

描述 Azure 中的基本安全性功能

描述 Azure 的安全性管理功能

描述 Microsoft Sentinel 的安全功能

描述使用 Microsoft 365 Defender 威脅防護

描述 Microsoft 的服務信任入口網站與隱私權

說明 Microsoft Purview 的資訊保護和資料生命週期管理資訊

描述 Microsoft Purview 中的內部風險處理能力

描述 Microsoft Purview 的電子文件探索和稽核功能

描述 Azure 中的資源治理功能


詳請請參考:

Course SC-900T00: Microsoft Security, Compliance, and Identity Fundamentals

 

Read More
      edit
Published 11月 11, 2022 by Kevin

CISA發布了12個工業控制系統的安全公告

CISA發布了3個工業控制系統的安全公告,包含安全議題,漏洞與曝露的風險:

  • ICSA-22-314-01 Siemens Parasolid
  • ICSA-22-314-02 Siemens Missing Web Server Login Page of Industrial Controllers
  • ICSA-22-314-03 Siemens SINEC Network Management System Logback Component
  • ICSA-22-314-04 Siemens SINUMERIK ONE and SINUMERIK MC
  • ICSA-22-314-05 Siemens RUGGEDCOM ROS
  • ICSA-22-314-06 Siemens QMS Automotive
  • ICSA-22-314-07 Omron NJNX-series Machine Automation Controllers
  • ICSA-22-314-08 Omron NJNX-series
  • ICSA-22-314-09 Siemens Teamcenter Visualization and JT2Go
  • ICSA-22-314-10 Siemens SCALANCE W1750D
  • ICSA-22-314-11 Siemens SICAM Q100
  • ICSA-21-350-06 Siemens CAPITAL VSTAR (Update A)
  • ICSA-22-286-15 Siemens SCALANCE X-200 and X-200IRT Families (Update A)
  • ICSA-22-258-03 Siemens RUGGEDCOM ROS (Update A)
  • ICSA-22-228-02 LS ELEC PLC and XG5000 (Update A)
  • ICSA-22-298-06 Delta Electronic DIAEnergie (Update A)
  • ICSA-22-258-04 Siemens Mendix SAML Module (Update A)
  • ICSA-22-286-11 Siemens SCALANCE and RUGGEDCOM Products (Update A)
  • ICSA-21-350-13 Siemens Questa and ModelSim (Update A)
  • ICSA-22-069-01 Siemens RUGGEDCOM Devices (Update C)
詳情請看:
Read More
      edit
Published 11月 10, 2022 by Kevin

Windows 10 版本 21H1 即將於 2022 年 12 月 13 日終止服務

最後倒數了,以下的版本將在12月13日終止服務了:

  • Windows 10 企業版,版本 21H1
  • Windows 10 企業版多重工作階段,版本 21H1
  • Windows 10 教育版,版本 21H1
  • Windows 10 IoT 企業版,版本 21H1
  • Windows 10 家用版,版本 21H1
  • Windows 10 專業版,版本 21H1
  • Windows 10 專業教育版,版本 21H1
  • Windows 10 工作站專業版,版本 21H1
詳情請看: 
Read More
      edit
Published 11月 09, 2022 by Kevin

CISA新增了七個弱點漏洞到已知被利用的弱點漏洞清單

CISA新增了一個弱點漏洞到已知被利用的弱點漏洞清單,應盡快修補此弱點漏洞:

  • CVE-2022-41091:Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability
  • CVE-2022-41073:Microsoft Windows Print Spooler Privilege Escalation Vulnerability
  • CVE-2022-41125:Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability
  • CVE-2022-41128:Microsoft Windows Scripting Languages Remote Code Execution Vulnerability
  • CVE-2021-25337:Samsung Mobile Devices Improper Access Control Vulnerability
  • CVE-2021-25369:Samsung Mobile Devices Improper Access Control Vulnerability
  • CVE-2021-25370:Samsung Mobile Devices Memory Corruption Vulnerability
詳情請看:

Read More
      edit
Published 11月 08, 2022 by Kevin

CISA發布了本周的漏洞清單

 CISA發布了本周的漏洞清單

CISA發布了本周的漏洞清單,其中包含了很多9.8與一個10,包含了以下產品:
  • honeywell -- c200_firmware:10
  • apple -- iphone_os
  • apple -- macos
  • apple -- macos
  • arubanetworks -- aruba_edgeconnect_enterprise_orchestrator
  • arubanetworks -- aruba_edgeconnect_enterprise_orchestrator
  • arubanetworks -- aruba_edgeconnect_enterprise_orchestrator
  • auieo -- candidats
  • awpcp -- another_wordpress_classifieds_plugin
  • browserify-shim_project -- _browserify-shim
  • browserify-shim_project -- browserify-shim
  • centreon -- centreon
  • chatwoot -- chatwoot
  • clinics_patient_management_system_project -- clinics_patient_management_system
  • cloudflare -- warp
  • datahub_project -- datahub
  • deltaww -- infrasuite_device_master
  • deltaww -- infrasuite_device_master
  • deltaww -- infrasuite_device_master
  • deltaww -- infrasuite_device_master
  • deltaww -- infrasuite_device_master
  • dlink -- dir-823g_firmware
  • dlink -- dir-846_firmware
  • easyiicms -- easyiicms
  • eaton -- foreseer_electrical_power_monitoring_system
  • ehoney_project -- ehoney
  • ehoney_project -- ehoney
  • ehoney_project -- ehoney
  • ehoney_project -- ehoney
  • ehoney_project -- ehoney
  • f5 -- njs
  • fluentd -- fluentd
  • fortinet -- fortiadc
  • frauscher -- frauscher_diagnostic_system_102
  • gitlab -- gitlab
  • glpi-project -- glpi
  • haxx -- curl
  • heidenhain -- heros
  • hitachi -- infrastructure_analytics_advisor
  • honeywell -- c200_firmware
  • ibm -- infosphere_information_server
  • keystonejs -- keystone
  • lesspipe_project -- lesspipe
  • mkcms_project -- mkcms
  • mkcms_project -- mkcms
  • mkcms_project -- mkcms
  • octopus -- octopus_server
  • opennebula -- opennebula
  • phpmyfaq -- phpmyfaq
  • phppointofsale -- php_point_of_sale
  • phppointofsale -- php_point_of_sale
  • pingcap -- tidb
  • redis -- redis
  • rukovoditel -- rukovoditel
  • sick -- sim1000_fx_firmware
  • sick -- sim1004-0p0g311_firmware
  • sick -- sim2000_firmware
  • sick -- sim2000st_firmware
  • softnext -- mail_sqr_expert
  • stimulsoft -- reports
  • tenda -- ac23_firmware
  • tenda -- ac23_firmware
  • tenda -- ac23_firmware
  • tenda -- ac23_firmware
  • tenda -- ac23_firmware
  • tenda -- ac23_firmware
  • tenda -- ac23_firmware
  • tenda -- ac23_firmware
  • tim_campus_confession_wall_project -- tim_campus_confession_wall
  • vmware -- spring_security
  • xfig_project -- xfig
  • xmldom_project -- xmldom

詳請請看:
Read More
      edit
Published 11月 06, 2022 by Kevin

微軟:發表企業的法尊挑戰與行動指南

微軟發表企業的法尊挑戰與行動指南

微軟發表企業的法尊挑戰與行動指南,以因應證交所發布的「上市上櫃公司資通安全管控指引」,主要的內容為:

  • 解析: 資通系統盤點及風險評估

        橫跨IT 與OT,全面建立可視性

  • 解析: 資通系統發展及維護安全

        全面落實零信任架構、資安融入開發生命週期

  • 解析: 資通安全防護及控制措施- 基礎架構營運管理

        建立單一且整合的資安監控中心

  • 解析: 資通安全防護及控制措施- 人員、端點及資料管理

        翻轉局部管理思維相輔相成擴大防禦


詳請請看:

微軟:企業的法遵挑戰與行動指南

Read More
      edit
Published 11月 05, 2022 by Kevin

微軟發佈了Azure Data Factory(ADF)十月的新增功能

      edit
Published 11月 04, 2022 by Kevin

CISA發布了了解與回應DDoS攻擊指南

CISA發布了了解與回應DDoS攻擊指南 

CISA發布了了解與回應DDoS攻擊指南,重點摘要如下:

  • DDoS攻擊前的預防措施
    • 盤點核心資產與軟體
    • 了解使用者如何連接到你的服務
    • 註冊的防護服務
    • 了解ISP的DDoS的防護服務
    • 了解網路設備的防護服務
    • 設計與確認網路架構的設計
    • 產出DDoS防護計畫
    • 產出組織的DDoS營運持續計畫
    • 考慮DDoS對實體網路備援的影響
    • 定期進行DDoS防護回應的演練與測試
  • DDoS攻擊時的防護措施
    • 確認是DDoS攻擊
    • 聯絡DDoS ISP確認攻擊目標
    • 了解攻擊的方法
    • 實施防護措施
    • 監控其他網路資產
  • DDoS攻擊後的後續措施
    • 持續監控網路設備
    • 加強DDoS防護計畫
    • 主動監控您的網絡以快速識別 DDoS 攻擊
詳請請看:

Read More
      edit
Published 11月 04, 2022 by Kevin

CISA發布了3個工業控制系統的安全公告

CISA發布了3個工業控制系統的安全公告

CISA發布了3個工業控制系統的安全公告,包含安全議題,漏洞與曝露的風險:

•    ICSA-22-307-01 ETIC RAS 
•    ICSA-22-307-02 Nokia ASIK 5G AirScale System Module 
•    ICSA-22-307-03 Delta Industrial Automation DIALink


詳請請看:

CISA Releases Three Industrial Control Systems Advisories

Read More
      edit
Published 11月 03, 2022 by Kevin

微軟發布了Azure的預覽版本的跨區域負載平衡器

微軟發布了Azure的預覽版本的跨區域負載平衡器 

微軟發布了Azure的預覽版本的跨區域負載平衡器,實現異地備援的高可用性案例,例如:

  • 來自多個區域的連入流量。
  • 立即全域容錯移轉至下一個最佳的區域部署。
  • 將跨區域的負載分配到最接近的 Azure 區域,並保持超低延遲。
  • 能夠在單一端點後方擴大/縮小。
  • 靜態的任一傳播全域 IP 位址
  • 用戶端 IP 保留
  • 建立在現有的負載平衡器解決方案上,無需學習曲線
因為還在預覽版本,所以並沒有提供SLA。

詳請請看:
Read More
      edit
Published 11月 02, 2022 by Kevin

OpenSSL發布了兩個高等級漏洞的更新CVE-2022-3786與CVE-2022-3602

OpenSSL發布了兩個高等級漏洞的更新CVE-2022-3786與CVE-2022-3602


OpenSSL發布了新版本3.0.7,這一個更新可以修補兩個高等級的漏洞,CVE-2022-3786與CVE-2022-3602。

由於此漏洞影響非常多產品,Netherland's National Cyber Security Centrum (NCSC-NL)與CISA維護了一個產品清單,並且標註上各個產品的修補進度。

詳請請看:
Read More
      edit
Published 11月 02, 2022 by Kevin

CISA發布了本周的漏洞清單

CISA發布了本周的漏洞清單

CISA發布了本周的漏洞清單,其中包含了很多9.8與一個10,一個9.9的嚴重漏洞,包含了以下產品:

  • advantech -- r-seenet
  • apache -- flume
  • apache -- heron
  • baramundi -- management_suite
  • bestwebsoft -- post_to_csv
  • dataease -- dataease
  • dell -- powerstoreos
  • deltaww -- diaenergie
  • discourse -- patreon
  • dlink -- dir-816_firmware
  • elearning_system_project -- elearning_system
  • employee_record_management_system_project -- employee_record_management_system
  • exiv2 -- exiv2
  • extended_keccak_code_package_project -- extended_keccak_code_package
  • featherjs -- feathers-sequelize
  • gin-vue-admin_project -- gin-vue-admin
  • github -- runner:9.9
  • goabode -- iota_all-in-one_security_kit_firmware:10
  • keystonejs -- keystone
  • lannerinc -- iac-ast2500a_firmware
  • linux -- linux_kernel
  • microsoft -- azure_command-line_interface
  • online_medicine_ordering_system_project -- online_medicine_ordering_system
  • open-xchange -- ox_app_suite
  • openfga -- openfga
  • pikepdf_project -- pikepdf
  • robustel -- r1510_firmware
  • sanitization_management_system_project -- sanitization_management_system
  • school_activity_updates_with_sms_notification_project -- school_activity_updates_with_sms_notification
  • sem-cms -- semcms
  • siemens -- siveillance_video_mobile_server
  • socket -- socket.io-parser
  • st -- stm32_mw_usb_host
  • uatech -- badaso
  • wintercms -- winter
  • yokogawa -- wtviewerefree
  • zalando -- skipper

Read More
      edit
Published 11月 02, 2022 by Kevin

CISA發布了1個工業控制系統的安全公告

CISA發布了1個工業控制系統的安全公告

CISA發布了1個工業控制系統的安全公告,包含安全議題,漏洞與曝露的風險:

  • ICSA-22-221-01 Mitsubishi Electric Multiple Factory Automation Products (Update C)

  • 詳請請看:
    Read More
          edit
    Published 11月 01, 2022 by Kevin

    Cisco Talos發現了一個簡體中文介面的攻擊框架Alchimist

    Cisco Talos發現了一個簡體中文介面的攻擊框架Alchimist 

    Cisco Talos發現了一個簡體中文介面的攻擊框架Alchimist,MAC、Linux與Windows都可以攻擊。

    主要的內容:

    • Cisco Talos 發現了一個新的攻擊框架,包括一個名為“Alchimist”的命令和控制 (C2) 工具和一個具有遠程管理功能的新惡意軟件“Insekt”。
    • Alchimist 有一個帶有遠程管理功能的簡體中文網頁界面。
    • 該攻擊框架旨在針對 Windows、Linux 和 Mac 機器。
    • Alchimist 和 Insekt 二進製文件在 GoLang 中實現。
    • 該活動包括額外的定制工具,例如 MacOS 開發工具、自定義後門和多個現成工具,例如反向代理。

    詳請請參考:

    Cisco Talos也提供了IOCs在Github上: 
    Read More
          edit