ÐÅÏ¢°²È«Öܱ¨-2021ÄêµÚ20ÖÜ

°ä²¼¹¦·ò 2021-05-17

> ±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


2021Äê05ÔÂ10ÈÕÖÁ05ÔÂ16ÈÕ¹²ÊÕ¼°²È«·ì϶70¸ö£¬£¬ÖµµÃ¹Ø×¢µÄÊÇMicrosoft Exchange Server CVE-2021-31198Ô¶³Ì´úÂëÖ´Ðзì϶£»£»SAP Business Warehouse´úÂë×¢ÈëÖ´Ðзì϶£»£»EnvoyproxyÊÚÈ¨ÈÆ¹ý·ì϶£»£»Rockwell Automation Connected Components Workbench·´ÐòÁл¯´úÂëÖ´Ðзì϶£»£»Adobe After Effects CVE-2021-28571ºÅÁî×¢Èë·ì϶¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇÃÀ¹úColonial PipelineϰȾÀÕË÷Èí¼þ£¬£¬ÖØÒªÊäÓ͹ÜÍ£ÔË£»£»CISA ¡¢¡¢NCSC ¡¢¡¢FBIÓëNSA½áºÏ°ä²¼ÓйضíÂÞ˹SVRµÄÕ÷ѯ£»£»×êÑÐÍŶӳÆ1.28ÒÚiOSÓû§ÒÑϰȾ¶ñÒâÈí¼þXcodeGhost£»£»TorÍøÂçÐÂÔöÊýǧ¸ö¶ñÒâ½Ó¿Ú£¬£¬¼àÌý¼ÓÃÜÇ®±ÒÓйصÄÁ÷Á¿£»£»Microsoft°ä²¼5Ô²¹¶¡£¬£¬ÐÞ¸´3¸ö0dayÔÚÄÚµÄ55¸ö·ì϶¡£¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬£¬±¾Öܰ²È«ÍþвΪÖС£¡£


> ÖØÒª°²È«·ì϶Áбí


1.Microsoft Exchange Server CVE-2021-31198Ô¶³Ì´úÂëÖ´Ðзì϶


Microsoft Exchange Server´æÔÚ°²È«·ì϶£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ££¬£¬Ôì³É»Ø¾ø·þÎñ¹¥»÷¡£¡£

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31198


2.SAP Business Warehouse´úÂë×¢ÈëÖ´Ðзì϶


SAP Business Warehouse´æÔÚÊäÈëÑéÖ¤°²È«·ì϶£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£¡£

https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=576094655


3.EnvoyproxyÊÚÈ¨ÈÆ¹ý·ì϶


Envoyproxy´¦ÖÃURIõè¾¶ÉÏתÒå·û(%2F, %2f, %5C, »ò%5c)´æÔÚ°²È«·ì϶£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬¿ÉÈÆ¹ýÊÚȨ£¬£¬Î´ÊÚȨ½Ó¼û¡£¡£

https://access.redhat.com/security/cve/cve-2021-29492


4.Rockwell Automation Connected Components Workbench·´ÐòÁл¯´úÂëÖ´Ðзì϶


Rockwell Automation Connected Components Workbench´¦ÖöñÒâ¶ÔÏó´æÔÚ·´ÐòÁл¯·ì϶£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£¡£

https://us-cert.cisa.gov/ics/advisories/icsa-21-133-01


5.Adobe After Effects CVE-2021-28571ºÅÁî×¢Èë·ì϶


Adobe After Effects´æÔÚºÅÁî×¢Èë·ì϶£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâOSºÅÁî¡£¡£

https://helpx.adobe.com/security/products/after_effects/apsb21-33.html


> ÖØÒª°²È«ÊÂÎñ×ÛÊö


1 ¡¢¡¢ÃÀ¹úColonial PipelineϰȾÀÕË÷Èí¼þ£¬£¬ÖØÒªÊäÓ͹ÜÍ£ÔË


1.jpg


ÃÀ¹ú×î´óµÄȼÁϹܵÀ¹«Ë¾Colonial PipelineÔâµ½ÀÕË÷Èí¼þ¹¥»÷£¬£¬5500Ó¢ÀïÊäÓ͹ÜÍ£ÔË¡£¡£Colonial PipelineÿÌì´ÓµÂ¿ËÈøË¹ÖÝÊäËÍ250ÍòͰʯÓ͵½¶«º£°¶ºÍŦԼ£¬£¬¸Ã¹ÜµÀ¸²¸ÇÁËÃÀ¹ú¶«º£°¶45£¥µÄȼÁϹ©¸ø¡£¡£¸Ã¹«Ë¾ÔÚÉÏÖÜÁù°µÊ¾£¬£¬ÆäÓÚ5ÔÂ7ÈÕÔâµ½ÀÕË÷¹¥»÷£¬£¬·¢ÏÖ¹¥»÷ºó×Ô¶¯¹Ø±ÕÁ˹ؼüµÄϵͳÒÔÔ¤·À´«²¼£¬£¬Ä¿Ç°ÕýÓ밲ȫ¹«Ë¾ºÏ×÷¶Ô¸ÃÊÂÎñµÄÐÔÖʺÍÁìÓò½øÐе÷²é¡£¡£ÃÀ¹úµÄij¹ÙÔ±³Æ£¬£¬Õâ´ÎÀÕË÷¹¥»÷ÊÂÎñÓëDarkSideÍÅ»ïÓйØ¡£¡£


Ô­ÎÄÁ´½Ó£º£º

https://www.bleepingcomputer.com/news/security/largest-us-pipeline-shuts-down-operations-after-ransomware-attack/


2 ¡¢¡¢CISA ¡¢¡¢NCSC ¡¢¡¢FBIÓëNSA½áºÏ°ä²¼ÓйضíÂÞ˹SVRµÄÕ÷ѯ


2.jpg


CISAÓëÓ¢¹ú¹ú¶ÈÍøÂ簲ȫÖÐÐÄ£¨NCSC£© ¡¢¡¢Áª°îµ÷²é¾Ö£¨FBI£©ºÍ¹ú¶È°²È«¾Ö£¨NSA£©½áºÏ°ä²¼ÓйضíÂÞ˹SVRµÄ°²È«Õ÷ѯ¡£¡£¸ÃÕ÷ѯָ³öSVRËÆºõÒÑͨ¹ý¸ü¸ÄÆä¼¼ÊõºÍ·¨Ê½£¨TTP£©£¬£¬À´Ô¤·À×éÖ¯·¢ÏÖÆä»î¶¯ºÍ²ÉÈ¡²¹¾È´ëÊ©¡£¡£´ËÍ⣬£¬SVRÖØÒªÕë¶Ôµ±¾Ö ¡¢¡¢Öǿ⠡¢¡¢Õþ²ßºÍÄÜÔ´ÓйصÄ×éÖ¯£¬£¬ÒÔ¼°ÓÐʱЧÐÔµÄÖ¸±ê£¬£¬ÀýÈç2020ÄêÓëCOVID-19ÒßÃçÓйصÄ×éÖ¯¡£¡£º£ºÚ¿ÍÖØÒªÊ¹ÓÃÁËCVE-2018-13379 ¡¢¡¢CVE-2019-1653ºÍCVE-2019-2725µÈ11¸ö·ì϶¡£¡£


Ô­ÎÄÁ´½Ó£º£º

https://us-cert.cisa.gov/ncas/current-activity/2021/05/07/joint-ncsc-cisa-fbi-nsa-cybersecurity-advisory-russian-svr


3 ¡¢¡¢×êÑÐÍŶӳÆ1.28ÒÚiOSÓû§ÒÑϰȾ¶ñÒâÈí¼þXcodeGhost


3.jpg


×êÑÐÍŶӳÆ£¬£¬ÔÚ×î½üµÄ¶ñÒâÈí¼þ¹¥»÷ÖУ¬£¬³¬¹ý1.28ÒÚiOSÓû§³ÉΪ¹¥»÷Ö¸±ê¡£¡£¹¥»÷ÕßÔÚÕâ´Î»î¶¯ÖÐʹÓÃÁËXcodeGhost£¬£¬¸Ã¶ñÒâÈí¼þÓÚ2015Äê³õ´Î³öÏÖ¡£¡£AppleÖÒ¸æ³Æ£¬£¬Ô¼Äª2500¸öÀûÓÃϰȾÁ˶ñÒâXcode´úÂë¡£¡£¾Ý±¨µÀ£¬£¬ÆäÖÐÔ¼55%µÄÓû§ÊÇÖйúÈË£¬£¬¶ø66%µÄÏÂÔØÁ¿ÓëÖйúÓйØ¡£¡£³ö¸ñÊÇ£¬£¬Ò»Ð©¹ãÊÜ»¶Ó­µÄÀûÓÃÒ²ÒÑϰȾÁ˸öñÒâÈí¼þ£¬£¬Ô̺¬ÓÎÏ·¡°ÄÕÅ­µÄСÄñ2¡±¡£¡£


Ô­ÎÄÁ´½Ó£º£º

https://www.ehackingnews.com/2021/05/xcodeghost-malware-infected-around-128m.html


4 ¡¢¡¢TorÍøÂçÐÂÔöÊýǧ¸ö¶ñÒâ½Ó¿Ú£¬£¬¼àÌý¼ÓÃÜÇ®±ÒÓйصÄÁ÷Á¿


4.jpg


The Record³Æ£¬£¬×Ô2020ÄêÒÔÀ´TorÍøÂçÐÂÔöÊýǧ¸ö¶ñÒâ½Ó¿Ú£¬£¬¼àÌý¼ÓÃÜÇ®±ÒÓйØÍøÕ¾µÄÁ÷Á¿¡£¡£ÔÚÕë¶ÔTorÍøÂçµÄ¹¥»÷ÖУ¬£¬¹¥»÷Õß¿ÉÀûÓÃÆä½ÚÖÆµÄÇ®°ü´úÌæºÏ·¨Ç®°üµÄµØÖ·À´½Ù³ÖÂòÂô¡£¡£´ËÍ⣬£¬Nusenu·¢ÏÖºÚ¿ÍÒѾ­Á½´ÎÍ»ÆÆÁËÆä×Ô2020Äê5ÔÂÒÔÀ´µÄ¼Í¼(¶ñÒâ½Ó¿Ú±ÈÀýΪ23%):2020Äê10ÔÂ30ÈÕ£¬£¬ºÚ¿ÍÍÅ»ï°Ñ³ÖÁ˳¬¹ý26%µÄtorÍøÂç½Ó¿Ú£¬£¬µ½2021Äê02ÔÂ02ÈÕ£¬£¬ÆäÒѾ­ÖÎÀíÁ˳¬¹ý27%µÄ½Ó¿Ú¡£¡£Ä¿Ç°£¬£¬¶ñÒâ½Ó¿Ú¾ùÒÑ´ÓTorÍøÂçÖÐÒÆ³ý¡£¡£


Ô­ÎÄÁ´½Ó£º£º

https://securityaffairs.co/wordpress/117749/deep-web/tor-exit-nodes-ssl-stripping.html


5 ¡¢¡¢Microsoft°ä²¼5Ô²¹¶¡£¬£¬ÐÞ¸´3¸ö0dayÔÚÄÚµÄ55¸ö·ì϶


5.jpg


Microsoft°ä²¼5Ô·ݵÄÖܶþ²¹¶¡£¬£¬ÐÞ¸´Ô̺¬3¸ö0dayÔÚÄÚµÄ55¸ö·ì϶¡£¡£Õâ´ÎÐÞ¸´µÄ0 day±ðÀëÊÇNETºÍVisual StudioÖеÄÌáȨ·ì϶£¨CVE-2021-31204£© ¡¢¡¢Microsoft Exchange ServerÖеݲȫְÄÜÈÆ¹ý·ì϶£¨CVE-2021-31207£©ºÍͨÓù¤¾ßÖеÄÔ¶³ÌÖ´ÐдúÂë·ì϶£¨CVE-2021-31200£©£¬£¬ÕâЩ·ì϶»¹Î´±»ÔÚÒ°ÀûÓᣡ£´ËÍ⣬£¬»¹ÐÞ¸´ÁËHTTP.sysÖеÄÔ¶³ÌÖ´ÐдúÂë·ì϶£¨CVE-2021-31166£©ºÍIEä¯ÀÀÆ÷ÖеÄÄÚ´æ°Ü»µ·ì϶£¨CVE-2021-26419£©µÈ·ì϶¡£¡£


Ô­ÎÄÁ´½Ó£º£º

https://www.securityweek.com/microsoft-patch-tuesday-55-vulnerabilities-4-critical-3-publicly-known