ÐÅÏ¢°²È«Öܱ¨-2021ÄêµÚ20ÖÜ
°ä²¼¹¦·ò 2021-05-17> ±¾Öܰ²È«Ì¬ÊÆ×ÛÊö
2021Äê05ÔÂ10ÈÕÖÁ05ÔÂ16ÈÕ¹²ÊÕ¼°²È«·ì϶70¸ö£¬£¬ÖµµÃ¹Ø×¢µÄÊÇMicrosoft Exchange Server CVE-2021-31198Ô¶³Ì´úÂëÖ´Ðзì϶£»£»SAP Business Warehouse´úÂë×¢ÈëÖ´Ðзì϶£»£»EnvoyproxyÊÚÈ¨ÈÆ¹ý·ì϶£»£»Rockwell Automation Connected Components Workbench·´ÐòÁл¯´úÂëÖ´Ðзì϶£»£»Adobe After Effects CVE-2021-28571ºÅÁî×¢Èë·ì϶¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇÃÀ¹úColonial PipelineϰȾÀÕË÷Èí¼þ£¬£¬ÖØÒªÊäÓ͹ÜÍ£ÔË£»£»CISA¡¢¡¢NCSC¡¢¡¢FBIÓëNSA½áºÏ°ä²¼ÓйضíÂÞ˹SVRµÄÕ÷ѯ£»£»×êÑÐÍŶӳÆ1.28ÒÚiOSÓû§ÒÑϰȾ¶ñÒâÈí¼þXcodeGhost£»£»TorÍøÂçÐÂÔöÊýǧ¸ö¶ñÒâ½Ó¿Ú£¬£¬¼àÌý¼ÓÃÜÇ®±ÒÓйصÄÁ÷Á¿£»£»Microsoft°ä²¼5Ô²¹¶¡£¬£¬ÐÞ¸´3¸ö0dayÔÚÄÚµÄ55¸ö·ì϶¡£¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬£¬±¾Öܰ²È«ÍþвΪÖС£¡£
> ÖØÒª°²È«·ì϶Áбí
1.Microsoft Exchange Server CVE-2021-31198Ô¶³Ì´úÂëÖ´Ðзì϶
Microsoft Exchange Server´æÔÚ°²È«·ì϶£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ££¬£¬Ôì³É»Ø¾ø·þÎñ¹¥»÷¡£¡£
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31198
2.SAP Business Warehouse´úÂë×¢ÈëÖ´Ðзì϶
SAP Business Warehouse´æÔÚÊäÈëÑéÖ¤°²È«·ì϶£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£¡£
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=576094655
3.EnvoyproxyÊÚÈ¨ÈÆ¹ý·ì϶
Envoyproxy´¦ÖÃURIõè¾¶ÉÏתÒå·û(%2F, %2f, %5C, »ò%5c)´æÔÚ°²È«·ì϶£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬¿ÉÈÆ¹ýÊÚȨ£¬£¬Î´ÊÚȨ½Ó¼û¡£¡£
https://access.redhat.com/security/cve/cve-2021-29492
4.Rockwell Automation Connected Components Workbench·´ÐòÁл¯´úÂëÖ´Ðзì϶
Rockwell Automation Connected Components Workbench´¦ÖöñÒâ¶ÔÏó´æÔÚ·´ÐòÁл¯·ì϶£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£¡£
https://us-cert.cisa.gov/ics/advisories/icsa-21-133-01
5.Adobe After Effects CVE-2021-28571ºÅÁî×¢Èë·ì϶
Adobe After Effects´æÔÚºÅÁî×¢Èë·ì϶£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâOSºÅÁî¡£¡£
https://helpx.adobe.com/security/products/after_effects/apsb21-33.html
> ÖØÒª°²È«ÊÂÎñ×ÛÊö
1¡¢¡¢ÃÀ¹úColonial PipelineϰȾÀÕË÷Èí¼þ£¬£¬ÖØÒªÊäÓ͹ÜÍ£ÔË

ÃÀ¹ú×î´óµÄȼÁϹܵÀ¹«Ë¾Colonial PipelineÔâµ½ÀÕË÷Èí¼þ¹¥»÷£¬£¬5500Ó¢ÀïÊäÓ͹ÜÍ£ÔË¡£¡£Colonial PipelineÿÌì´ÓµÂ¿ËÈøË¹ÖÝÊäËÍ250ÍòͰʯÓ͵½¶«º£°¶ºÍŦԼ£¬£¬¸Ã¹ÜµÀ¸²¸ÇÁËÃÀ¹ú¶«º£°¶45£¥µÄȼÁϹ©¸ø¡£¡£¸Ã¹«Ë¾ÔÚÉÏÖÜÁù°µÊ¾£¬£¬ÆäÓÚ5ÔÂ7ÈÕÔâµ½ÀÕË÷¹¥»÷£¬£¬·¢ÏÖ¹¥»÷ºó×Ô¶¯¹Ø±ÕÁ˹ؼüµÄϵͳÒÔÔ¤·À´«²¼£¬£¬Ä¿Ç°ÕýÓ밲ȫ¹«Ë¾ºÏ×÷¶Ô¸ÃÊÂÎñµÄÐÔÖʺÍÁìÓò½øÐе÷²é¡£¡£ÃÀ¹úµÄij¹ÙÔ±³Æ£¬£¬Õâ´ÎÀÕË÷¹¥»÷ÊÂÎñÓëDarkSideÍÅ»ïÓйء£¡£
ÔÎÄÁ´½Ó£º£º
https://www.bleepingcomputer.com/news/security/largest-us-pipeline-shuts-down-operations-after-ransomware-attack/
2¡¢¡¢CISA¡¢¡¢NCSC¡¢¡¢FBIÓëNSA½áºÏ°ä²¼ÓйضíÂÞ˹SVRµÄÕ÷ѯ

CISAÓëÓ¢¹ú¹ú¶ÈÍøÂ簲ȫÖÐÐÄ£¨NCSC£©¡¢¡¢Áª°îµ÷²é¾Ö£¨FBI£©ºÍ¹ú¶È°²È«¾Ö£¨NSA£©½áºÏ°ä²¼ÓйضíÂÞ˹SVRµÄ°²È«Õ÷ѯ¡£¡£¸ÃÕ÷ѯָ³öSVRËÆºõÒÑͨ¹ý¸ü¸ÄÆä¼¼ÊõºÍ·¨Ê½£¨TTP£©£¬£¬À´Ô¤·À×éÖ¯·¢ÏÖÆä»î¶¯ºÍ²ÉÈ¡²¹¾È´ëÊ©¡£¡£´ËÍ⣬£¬SVRÖØÒªÕë¶Ôµ±¾Ö¡¢¡¢Öǿ⡢¡¢Õþ²ßºÍÄÜÔ´ÓйصÄ×éÖ¯£¬£¬ÒÔ¼°ÓÐʱЧÐÔµÄÖ¸±ê£¬£¬ÀýÈç2020ÄêÓëCOVID-19ÒßÃçÓйصÄ×éÖ¯¡£¡£º£ºÚ¿ÍÖØÒªÊ¹ÓÃÁËCVE-2018-13379¡¢¡¢CVE-2019-1653ºÍCVE-2019-2725µÈ11¸ö·ì϶¡£¡£
ÔÎÄÁ´½Ó£º£º
https://us-cert.cisa.gov/ncas/current-activity/2021/05/07/joint-ncsc-cisa-fbi-nsa-cybersecurity-advisory-russian-svr
3¡¢¡¢×êÑÐÍŶӳÆ1.28ÒÚiOSÓû§ÒÑϰȾ¶ñÒâÈí¼þXcodeGhost

×êÑÐÍŶӳƣ¬£¬ÔÚ×î½üµÄ¶ñÒâÈí¼þ¹¥»÷ÖУ¬£¬³¬¹ý1.28ÒÚiOSÓû§³ÉΪ¹¥»÷Ö¸±ê¡£¡£¹¥»÷ÕßÔÚÕâ´Î»î¶¯ÖÐʹÓÃÁËXcodeGhost£¬£¬¸Ã¶ñÒâÈí¼þÓÚ2015Äê³õ´Î³öÏÖ¡£¡£AppleÖÒ¸æ³Æ£¬£¬Ô¼Äª2500¸öÀûÓÃϰȾÁ˶ñÒâXcode´úÂë¡£¡£¾Ý±¨µÀ£¬£¬ÆäÖÐÔ¼55%µÄÓû§ÊÇÖйúÈË£¬£¬¶ø66%µÄÏÂÔØÁ¿ÓëÖйúÓйء£¡£³ö¸ñÊÇ£¬£¬Ò»Ð©¹ãÊÜ»¶ÓµÄÀûÓÃÒ²ÒÑϰȾÁ˸öñÒâÈí¼þ£¬£¬Ô̺¬ÓÎÏ·¡°ÄÕŵÄСÄñ2¡±¡£¡£
ÔÎÄÁ´½Ó£º£º
https://www.ehackingnews.com/2021/05/xcodeghost-malware-infected-around-128m.html
4¡¢¡¢TorÍøÂçÐÂÔöÊýǧ¸ö¶ñÒâ½Ó¿Ú£¬£¬¼àÌý¼ÓÃÜÇ®±ÒÓйصÄÁ÷Á¿

The Record³Æ£¬£¬×Ô2020ÄêÒÔÀ´TorÍøÂçÐÂÔöÊýǧ¸ö¶ñÒâ½Ó¿Ú£¬£¬¼àÌý¼ÓÃÜÇ®±ÒÓйØÍøÕ¾µÄÁ÷Á¿¡£¡£ÔÚÕë¶ÔTorÍøÂçµÄ¹¥»÷ÖУ¬£¬¹¥»÷Õß¿ÉÀûÓÃÆä½ÚÖÆµÄÇ®°ü´úÌæºÏ·¨Ç®°üµÄµØÖ·À´½Ù³ÖÂòÂô¡£¡£´ËÍ⣬£¬Nusenu·¢ÏÖºÚ¿ÍÒѾÁ½´ÎÍ»ÆÆÁËÆä×Ô2020Äê5ÔÂÒÔÀ´µÄ¼Í¼(¶ñÒâ½Ó¿Ú±ÈÀýΪ23%):2020Äê10ÔÂ30ÈÕ£¬£¬ºÚ¿ÍÍÅ»ï°Ñ³ÖÁ˳¬¹ý26%µÄtorÍøÂç½Ó¿Ú£¬£¬µ½2021Äê02ÔÂ02ÈÕ£¬£¬ÆäÒѾÖÎÀíÁ˳¬¹ý27%µÄ½Ó¿Ú¡£¡£Ä¿Ç°£¬£¬¶ñÒâ½Ó¿Ú¾ùÒÑ´ÓTorÍøÂçÖÐÒÆ³ý¡£¡£
ÔÎÄÁ´½Ó£º£º
https://securityaffairs.co/wordpress/117749/deep-web/tor-exit-nodes-ssl-stripping.html
5¡¢¡¢Microsoft°ä²¼5Ô²¹¶¡£¬£¬ÐÞ¸´3¸ö0dayÔÚÄÚµÄ55¸ö·ì϶

Microsoft°ä²¼5Ô·ݵÄÖܶþ²¹¶¡£¬£¬ÐÞ¸´Ô̺¬3¸ö0dayÔÚÄÚµÄ55¸ö·ì϶¡£¡£Õâ´ÎÐÞ¸´µÄ0 day±ðÀëÊÇNETºÍVisual StudioÖеÄÌáȨ·ì϶£¨CVE-2021-31204£©¡¢¡¢Microsoft Exchange ServerÖеݲȫְÄÜÈÆ¹ý·ì϶£¨CVE-2021-31207£©ºÍͨÓù¤¾ßÖеÄÔ¶³ÌÖ´ÐдúÂë·ì϶£¨CVE-2021-31200£©£¬£¬ÕâЩ·ì϶»¹Î´±»ÔÚÒ°ÀûÓᣡ£´ËÍ⣬£¬»¹ÐÞ¸´ÁËHTTP.sysÖеÄÔ¶³ÌÖ´ÐдúÂë·ì϶£¨CVE-2021-31166£©ºÍIEä¯ÀÀÆ÷ÖеÄÄÚ´æ°Ü»µ·ì϶£¨CVE-2021-26419£©µÈ·ì϶¡£¡£
ÔÎÄÁ´½Ó£º£º
https://www.securityweek.com/microsoft-patch-tuesday-55-vulnerabilities-4-critical-3-publicly-known


¾©¹«Íø°²±¸11010802024551ºÅ