ÐÅÏ¢°²È«Öܱ¨-2021ÄêµÚ11ÖÜ
°ä²¼¹¦·ò 2021-03-15> ±¾Öܰ²È«Ì¬ÊÆ×ÛÊö
2021Äê03ÔÂ08ÈÕÖÁ03ÔÂ14ÈÕ¹²ÊÕ¼°²È«·ì϶63¸ö£¬£¬ÖµµÃ¹Ø×¢µÄÊÇMicrosoft Azure SphereδÊðÃû´úÂëÖ´Ðзì϶£»SAP Solution Manager User-Experience MonitoringÊÚȨ²é³È±Ê§·ì϶£»Adobe Creative Cloud Desktop ApplicationËÁÒâÎļþдÈë·ì϶£»F5 BIG-IP Advanced WAF/ASM»º³åÇøÒç³ö·ì϶£»Schneider Electric Interactive Graphical SCADA System CGFÎļþ½âÎöÄÚ´æ·ÛËé´úÂëÖ´Ðзì϶¡£¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇCisco³ÆÆä²¿ÃŲúÆ·ÒòSnortÖеķì϶Ò×ÊÜDoS¹¥»÷£»Ó¢Ìضû°ä²¼2020Äê²úÆ·°²È«ÐԵķÖÎö»ã±¨£»FlagstarÒøÐеĿͻ§ÐÅϢй¶£¬£¬²¢ÓÀÔ¶ÖÕ³¡Ê¹ÓÃAccellion£»Å·ÖÞÒøÐÐÖÎÀí¾ÖµÄExchange·þÎñÆ÷Ôâµ½¹¥»÷£¬£¬Óʼþϵͳ¹Ø±Õ£»×êÑÐÍŶӷ¢ÏÖ½©Ê¬ÍøÂçz0MinerÍÚ¿óµÄ¹¥»÷»î¶¯¡£¡£¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬£¬±¾Öܰ²È«ÍþвΪÖС£¡£¡£
> ÖØÒª°²È«·ì϶Áбí
1.Microsoft Azure SphereδÊðÃû´úÂëÖ´Ðзì϶
Microsoft Azure Sphere´æÔÚ°²È«·ì϶£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬¿Éʹ·þÎñ·¨Ê½±ÀÀ£»òÕßÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£¡£¡£
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-27080
2.SAP Solution Manager User-Experience MonitoringÊÚȨ²é³È±Ê§·ì϶
SAP Solution Manager User-Experience Monitoring´æÔÚÊÚȨ²é³µÄÈ··ì϶£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬¿ÉδÊÚȨ½ÚÖÆÏµÍ³¡£¡£¡£
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107
3.Adobe Creative Cloud Desktop ApplicationËÁÒâÎļþдÈë·ì϶
Adobe Creative Cloud Desktop Application´æÔÚËÁÒâÎļþдÈë·ì϶£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâºÅÁî¡£¡£¡£
https://helpx.adobe.com/security/products/creative-cloud/apsb21-18.html
4.F5 BIG-IP Advanced WAF/ASM»º³åÇøÒç³ö·ì϶
F5 BIG-IP Advanced WAF/ASM´¦ÖöñÒâHTTPÏìÓ¦´æÔÚ»º³åÇøÒç³ö·ì϶£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£¡£¡£
https://www.auscert.org.au/bulletins/ESB-2021.0872
5.Schneider Electric Interactive Graphical SCADA System CGFÎļþ½âÎöÄÚ´æ·ÛËé´úÂëÖ´Ðзì϶
Schneider Electric Interactive Graphical SCADA System CGFÎļþ½âÎö´æÔÚÄÚ´æ·ÛËé·ì϶£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÎļþÒªÇ󣬣¬ÓÕʹÓû§½âÎö£¬£¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÕßÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£¡£¡£
https://us-cert.cisa.gov/ics/advisories/icsa-21-070-01
> ÖØÒª°²È«ÊÂÎñ×ÛÊö
1¡¢¡¢¡¢Cisco³ÆÆä²¿ÃŲúÆ·ÒòSnortÖеķì϶Ò×ÊÜDoS¹¥»÷

Cisco³ÆÆä²¿ÃŲúÆ·ÒòSnort¼ì²âÒýÇæÖеķì϶Ò×ÊÜDoS¹¥»÷¡£¡£¡£¸Ã·ì϶λÓÚSnort¼ì²âÒýÇæµÄÒÔÌ«ÍøÖ¡½âÂëÆ÷ÖУ¬£¬±»×·×ÙΪCVE-2021-1285£¬£¬CVSSÆÀ·ÖΪ7.4¡£¡£¡£¸Ã·ì϶ÊǶÔÒÔÌ«ÍøÖ¡µÄÃýÎóÇé¿ö´¦Öò»ÕýÈ·ËùÖ£¬£¬Î´¾ÑéÖ¤µÄ¹¥»÷ÕßÄܹ»ÏòÖ¸±êÉ豸·¢ËͶñÒâÒÔÌ«ÍøÖ¡À´ÀûÓô˷ì϶¡£¡£¡£³É¹¦ÀûÓø÷ì϶Äܹ»ºÄ¾¡Ö¸±êÉ豸ÉϵĴÅÅ̿ռ䣬£¬µ¼ÖÂÖÎÀíÔ±ÎÞ·¨µÇ¼µ½¸ÃÉ豸»ò¸ÃÉ豸ÎÞ·¨ÕýÈ·Æô¶¯¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/115341/security/cisco-products-dos-snort-issue.html
2¡¢¡¢¡¢Ó¢Ìضû°ä²¼2020Äê²úÆ·°²È«ÐԵķÖÎö»ã±¨

Ó¢ÌØ¶û°ä²¼ÁË2020Äê²úÆ·°²È«ÐԵķÖÎö»ã±¨¡£¡£¡£»ã±¨Ö¸³ö£¬£¬ÔÚ2020ÄêÅû¶µÄ231¸ö·ì϶ÖУ¬£¬ÓÐ109¸ö(47%)ÊÇÓÉÓ¢ÌØ¶ûÔ±¹¤Í¨¹ý°²È«×êÑз¢Ïֵ쬣¬¶ø²Î¼Ó·ì϶Éͽð´òËãµÄÍⲿ×êÑÐÈËÔ±»ã±¨ÁË105¸ö·ì϶£¨45£¥£©¡£¡£¡£´ËÍ⣬£¬ÓÉÍⲿ·¢ÏֵĴó²¿ÃÅ·ì϶¶¼´æÔÚÓÚÔÚÈí¼þÖУ¬£¬ÖØÒªÔÚÓÃÓÚͼÐΡ¢¡¢¡¢ÍøÂçºÍÀ¶ÑÀ×é¼þµÄÈí¼þʵÓ÷¨Ê½ºÍÈí¼þÇý¶¯·¨Ê½ÖС£¡£¡£ÆäÖУ¬£¬Çý¶¯·¨Ê½ºÍÆäËûÈí¼þ×é¼þÖеķì϶×î¶à£¬£¬Îª93¸ö£»Æä´ÎΪ¹Ì¼þ£¬£¬´æÔÚ66¸ö·ì϶£»¶øÓÐ58¸ö·ì϶ӰÏìµ½¹Ì¼þºÍÈí¼þµÄ×éºÏ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blogs.intel.com/technology/2021/03/ipas-intel-2020-product-security-report/#gs.vg4enn
3¡¢¡¢¡¢FlagstarÒøÐеĿͻ§ÐÅϢй¶£¬£¬²¢ÓÀÔ¶ÖÕ³¡Ê¹ÓÃAccellion

×ܲ¿Î»ÓÚÃÜЪ¸ùÖݵÄFlagstarÒøÐеĿͻ§ÐÅϢй¶£¬£¬²¢°ä·¢½«ÓÀÔ¶ÖÕ³¡Ê¹ÓÃAccellion¡£¡£¡£¸ÃÒøÐÐÊÇFlagstar BancorpµÄ×Ó¹«Ë¾£¬£¬ÎªÃÀ¹ú¿Í»§ÌṩµÖѺºÍÆäËû½ðÈÚ·þÎñ¡£¡£¡£Õâ´ÎÊý¾Ýй¶ÊÇÓÉÓÚÆäʹÓõĴ«Êä´óÎļþµÄAccellion FTAÎļþ¹²Ïí·¨Ê½´æÔÚÒѱ»ÔÚÒ°ÀûÓõÄ0day¶øµ¼Öµġ£¡£¡£¸Ã×éÖ¯³ÆÆäÓÚ2021Äê1ÔÂ22ÈÕµÃÖª´ËÊÂÎñ£¬£¬Ä¿Ç°²¢Î´Ð¹Â©Ó°ÏìµÄ¿Í»§ÊýÁ¿ÒÔ¼°Ð¹Â¶Êý¾ÝµÄÖÖÀ࣬£¬µ«°µÊ¾Flagstar½«ÓÀÔ¶ÖÕ³¡Ê¹ÓÃAccellionÎļþ¹²ÏíÆ½Ì¨¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/flagstar-bank-customer-data-breached-through-accellion-hack/
4¡¢¡¢¡¢Å·ÖÞÒøÐÐÖÎÀí¾ÖµÄExchange·þÎñÆ÷Ôâµ½¹¥»÷£¬£¬Óʼþϵͳ¹Ø±Õ

Å·ÖÞÒøÐÐÖÎÀí¾Ö£¨EBA£©³ÆÆäExchange·þÎñÆ÷Ôâµ½¹¥»÷£¬£¬ËùÓÐÓʼþϵͳÒѾ¹Ø±Õ¡£¡£¡£EBAÊÇÅ·ÖÞ½ðÈÚ¼à¹ÜϵͳµÄÒ»²¿ÃÅ£¬£¬ËüÕÆ¹Ü¼à¶½Å·ÃËÒøÐÐÒµµÄÕûÌåÓÐÐòÔË×÷¡£¡£¡£Ä¿Ç°£¬£¬¸ÃÊÂÎñÈÔÔÚµ÷²éÖУ¬£¬Éв»È·¶¨ºÚ¿Í½Ó¼ûÁËʲôÊý¾Ý¡£¡£¡£¸Ã×éÖ¯ÔÚÉÏÖÜÈյijõ´ëÊ©²é³Æ£¬£¬¹¥»÷Õß¿ÉÄÜÒѾ½Ó¼ûÁË´æ´¢ÔÚµç×ÓÓʼþ·þÎñÆ÷ÉϵÄСÎÒÐÅÏ¢¡£¡£¡£µ«ÔÚ±¾ÖÜÒ»µÄ²¹³ä¸üÐÂÖаµÊ¾£¬£¬µç×Óȡ֤¹ý³ÌÖÐûÓз¢ÏÖÊý¾Ýй¶µÄ¼£Ï󡣡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/european-banking-authority-discloses-exchange-server-hack/
5¡¢¡¢¡¢×êÑÐÍŶӷ¢ÏÖ½©Ê¬ÍøÂçz0MinerÍÚ¿óµÄ¹¥»÷»î¶¯

×êÑÐÍŶӷ¢ÏÖ½©Ê¬ÍøÂçz0MinerÊÔͼ½ÚÖÆJenkinsºÍElasticSearch·þÎñÆ÷À´ÍÚ¾òMonero£¨XMR£©¼ÓÃÜÇ®±ÒµÄ¹¥»÷»î¶¯¡£¡£¡£z0MinerÊÇÈ¥ÄêÔÚ11Ô±»·¢ÏÖµÄÒ»ÖÖÍÚ¿ó¶ñÒâÈí¼þ£¬£¬ÆäÀûÓÃWeblogic·ì϶ϰȾÁËÊýǧ̨·þÎñÆ÷¡£¡£¡£¶øÕâ´Î»î¶¯ÀûÓÃÁËElasticSearchÖеÄRCE·ì϶£¨CVE-2015-1427£©ºÍÓ°ÏìÁËJenkins·þÎñÆ÷µÄÒ»¸ö¹ÅÀϵÄRCE¡£¡£¡£ÔÚÈëÇÖ·þÎñÆ÷ºó£¬£¬¸Ã¶ñÒâÈí¼þ½«ÏÈÏÂÔØ¶ñÒâshell¾ç±¾£¬£¬¶øºóѰÕÒ²¢É¾³ýÒÔǰװÖõÄÍÚ¿ó¾ç±¾¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/z0miner-botnet-hunts-for-unpatched-elasticsearch-jenkins-servers/


¾©¹«Íø°²±¸11010802024551ºÅ