ÐÅÏ¢°²È«Öܱ¨-2021ÄêµÚ46ÖÜ
°ä²¼¹¦·ò 2021-11-15±¾Öܹ²ÊÕ¼°²È«·ì϶58¸ö£¬£¬ÖµµÃ¹Ø×¢µÄÊÇAdobe RoboHelp ServerĿ¼±éÀú´úÂëÖ´Ðзì϶£»ServiceTonic Helpdesk softwareδÊÚȨ½Ó¼û·ì϶£»Microsoft Windows Active Directory CVE-2021-42278ȨÏÞÌáÉý·ì϶£»Microsoft Windows Remote Desktop Client´úÂëÖ´Ðзì϶£»Siemens SIMATIC PCS 7Ŀ¼±éÀú·ì϶¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇ×êÑÐÈËÔ±·¢ÏÖ¼ÙÒⰲȫ¹«Ë¾ProofpointµÄ´¹µö»î¶¯£»Í³³ÆÎªNUCLEUS:13µÄ¶à¸ö·ì϶ӰÏìÎ÷ÃÅ×ÓRTOS£»BusyBoxÖÐ14¸öзì϶ӰÏìÊý°ÙÍò»ùÓÚUnixµÄÉ豸£»Î¢Èí°ä²¼11Ô¸üУ¬£¬ÐÞ¸´6¸ö0dayÔÚÄÚµÄ55¸ö·ì϶£»ESET·¢ÏÖLazarusÀûÓõÁ°æµÄIDA Pro·Ö·¢¶ñÒâÈí¼þ¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬£¬±¾Öܰ²È«ÍþвΪÖС£
>ÖØÒª°²È«·ì϶Áбí
1. Adobe RoboHelp ServerĿ¼±éÀú´úÂëÖ´Ðзì϶
Adobe RoboHelp Server´æÔÚĿ¼±éÀú·ì϶£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£
https://www.zerodayinitiative.com/advisories/ZDI-21-1305/
2. ServiceTonic Helpdesk softwareδÊÚȨ½Ó¼û·ì϶
ServiceTonic Helpdesk software´æÔÚÊÚȨ»úÖÆ·ì϶£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬¿É²»Ê¹ÓÃÃÜÂëδÊÚȨ½Ó¼ûϵͳ¡£
https://www.srlabs.de/bites/chaining-three-zero-day-exploits-in-itsm-software-servicetonic-for-remote-code-execution
3. Microsoft Windows Active Directory CVE-2021-42278ȨÏÞÌáÉý·ì϶
Microsoft Windows Active Directory´æÔÚ°²È«·ì϶£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬Äܹ»ÌáÉýÌØÈ¨¡£
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-42278
4. Microsoft Windows Remote Desktop Client´úÂëÖ´Ðзì϶
Microsoft Windows Remote Desktop Client´æÔÚδÃ÷°²È«·ì϶£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬Äܹ»ÏµÍ³¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-38666
5. Siemens SIMATIC PCS 7Ŀ¼±éÀú·ì϶
Siemens SIMATIC PCS 7´æÔÚĿ¼±éÀú·ì϶£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬣¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£
https://cert-portal.siemens.com/productcert/pdf/ssa-840188.pdf
>ÖØÒª°²È«ÊÂÎñ×ÛÊö
1¡¢×êÑÐÈËÔ±·¢ÏÖ¼ÙÒⰲȫ¹«Ë¾ProofpointµÄ´¹µö»î¶¯
ArmorbloxµÄ×êÑÐÍŶÓÓÚ11ÔÂ4ÈÕÅû¶Á˼ÙÒâÍøÂ簲ȫ¹«Ë¾ProofpointµÄ´¹µö»î¶¯¡£ÕâЩ´¹µöÓʼþµÄÖ÷ÌâΪ¡°Re£º£ºPayoff Request¡±£¬£¬Ðû³ÆÔ̺¬Ò»·Ýͨ¹ýProofpoint·¢Ë͵ĵÖѺ´û¿îÓйØÎļþ£¬£¬Ö¼ÔÚÇÔȡָ±êµÄMicrosoft Office 365ºÍGoogle GmailÍ´´¦¡£¸ÃÓʼþÊÇ´Ó±»µÁµÄСÎÒÕÊ»§·¢Ë͵쬣¬·¢¼þÈ˵ÄÓòÃûÓòΪ¡°sdis34[.]fr¡±£¬£¬ÕâÊÇ·¨¹úÄϲ¿µÄÒ»¸öÏû·À½Ó¼Ã²¿ÃÅ£¬£¬¶ø´¹µöÒ³ÃæÍйÜÔÚgreenleafproperties[.]co[.]ukÓò¡£
ÔÎÄÁ´½Ó£º£º
https://www.armorblox.com/blog/proofpoint-credential-phishing/
2¡¢Í³³ÆÎªNUCLEUS:13µÄ¶à¸ö·ì϶ӰÏìÎ÷ÃÅ×ÓRTOS
ForescoutºÍMedigateµÄ×êÑÐÈËÔ±ÔÚ11ÔÂ9ÈÕÅû¶ÁËNucleusÖÐ13¸ö·ì϶µÄϸ½Ú¡£NucleusÊÇÎ÷ÃÅ×ÓµÄʵʱ²Ù×÷ϵͳ(RTOS)£¬£¬Í¨³£ÔËÐÐÔÚÒ½ÁÆÉ豸¡¢Æû³µ¡¢ÖÇÄÜÊÖ»ú¡¢ÎïÁªÍøÉ豸¡¢¹¤ÒµplcµÈÉ豸µÄƬÉÏϵͳ(SoC)¡£ÕâЩ·ì϶ͳ³ÆÎªNUCLEUS:13£¬£¬Ó°ÏìÁËNucleus TCP/IP²Ö¿â¡£ÆäÖУ¬£¬×îÑÏÖØµÄÊÇÓ°ÏìÁËFTP·þÎñÆ÷×é¼þµÄÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2021-31886£©£¬£¬CVSSÆÀ·ÖΪ9.8£¬£¬ÊÇÓÉÓÚ¶ÔUSERºÅÁ¶ÈµÄÑéÖ¤²»ÕýÈ·µ¼Öµġ£
ÔÎÄÁ´½Ó£º£º
https://therecord.media/nucleus13-vulnerabilities-impact-siemens-medical-industrial-equipment/
3¡¢BusyBoxÖÐ14¸öзì϶ӰÏìÊý°ÙÍò»ùÓÚUnixµÄÉ豸
Èí¼þ¿ª·¢¹«Ë¾JFrogºÍ°²È«¹«Ë¾ClarotyÔÚ11ÔÂ9ÈÕ½áºÏÅû¶ÁËBusyBoxÖÐ14¸ö·ì϶µÄϸ½Ú¡£BusyBox±»³ÆÎªÇ¶ÈëʽLinuxµÄ¡°ÈðÊ¿¾üµ¶¡±£¬£¬¿É½«¸÷Àà³£¼ûµÄUnixÀûÓûòС·¨Ê½£¨ÀýÈçcp¡¢ls¡¢grep£©×éºÏ³ÉÒ»¸ö¿ÉÖ´ÐÐÎļþ¡£ÕâЩ·ì϶´æÔÚÓÚBusyBox 1.16µ½1.33.1µÄ¶à¸ö°æ±¾£¬£¬Ó°ÏìÁËÊý°ÙÍò»ùÓÚUnixµÄÉ豸¡£ÆäÖнÏΪÑÏÖØµÄÊÇawkÖеÄDoS·ì϶CVE-2021-42383¡¢CVE-2021-42384ºÍCVE-2021-42385µÈ¡£
ÔÎÄÁ´½Ó£º£º
https://securityaffairs.co/wordpress/124429/hacking/busybox-vulnerabilities.html
4¡¢Î¢Èí°ä²¼11Ô¸üУ¬£¬ÐÞ¸´6¸ö0dayÔÚÄÚµÄ55¸ö·ì϶
΢ÈíÔÚ11ÔÂ9ÈÕ°ä²¼Á˱¾ÔµÄÖܶþ²¹¶¡£¬£¬×ܼÆÐÞ¸´ÁË55¸ö·ì϶¡£Õâ´ÎÐÞ¸´ÁË6¸ö0 day£¬£¬Ô̺¬ExcelÖа²È«Ö°ÄÜÈÆ¹ý·ì϶£¨CVE-2021-42292£©¡¢Exchange ServerÖÐRCE£¨CVE-2021-42321£©£¬£¬RDPÖÐÐÅϢй¶·ì϶£¨CVE-2021-38631ºÍCVE-2021-41371£©£¬£¬ÒÔ¼°3DÖв鿴Æ÷RCE£¨CVE-2021-43208ºÍCVE-2021-43209£©¡£ÆäÖУ¬£¬CVE-2021-42292ºÍCVE-2021-42321Òѱ»ÓÃÓÚ¶ñÒâ¹¥»÷»î¶¯¡£
ÔÎÄÁ´½Ó£º£º
https://www.bleepingcomputer.com/news/microsoft/microsoft-november-2021-patch-tuesday-fixes-6-zero-days-55-flaws/
5¡¢ESET·¢ÏÖLazarusÀûÓõÁ°æµÄIDA Pro·Ö·¢¶ñÒâÈí¼þ
ESETÍŶÓÓÚ11ÔÂ10ÈÕ·¢ÏÖ³¯ÏʺڿÍÍÅ»ïLazarusÀûÓõÁ°æIDA Pro¹¥»÷°²È«×êÑÐÈËÔ±µÄ»î¶¯¡£×êÑÐÈËԱͨ³£Ê¹ÓÃÄæÏò¹¤³ÌÀûÓÃIDA ProÀ´·ÖÎö·ì϶ºÍ¶ñÒâÈí¼þ£¬£¬¶øÕâ´Î·¢ÏÖµÄIDA Pro 7.5°æ±¾Ô̺¬ÁËÁ½¸öÃûΪidahelp.dllºÍwin_fw.dllµÄ¶ñÒâDLL¡£ÆäÖУ¬£¬win_fw.dll½«ÔÚWindows¹¤×÷µ÷¶È·¨Ê½Öд´½¨Ò»¸öй¤×÷£¬£¬¸Ã¹¤×÷½«Æô¶¯idahelper.dll£¬£¬¶øºóidahelper.dll½«Ïνӵ½devguardmap[.]orgÍøÕ¾²¢ÏÂÔØÔ¶³Ì½Ó¼ûľÂíNukeSpedµÄpayload¡£
ÔÎÄÁ´½Ó£º£º
https://www.bleepingcomputer.com/news/security/lazarus-hackers-target-researchers-with-trojanized-ida-pro/


¾©¹«Íø°²±¸11010802024551ºÅ