ÐÅÏ¢Äþ¾²Öܱ¨-2021ÄêµÚ4ÖÜ

Ðû²¼Ê±¼ä 2021-01-25

> ±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö


2021Äê01ÔÂ18ÈÕÖÁ01ÔÂ24ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´57¸ö £¬ÖµµÃ¹Ø×¢µÄÊÇOracle E-Business Suite One-to-One Fulfillment CVE-2021-2101δÃ÷ÈÎÒâ´úÂëÖ´ÐЩ¶´£»Netapp Clustered Data ONTAPÈÎÒâÊý¾ÝÁýÕÖ©¶´£»Delta Electronics ISPSoftÏîÄ¿Îļþ´¦ÖÃÄÚ´æ´íÎóÒýÓôúÂëÖ´ÐЩ¶´£»Cisco SD-WAN vManage Software ÃüÁî×¢È멶´£»Google Chrome Cryptohome²»³äʵ¼ÆıִÐЩ¶´ ¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊǶíÂÞ˹Ìú·´æÔÚ¿É·ÃÎÊÆä¼à¿ØϵͳµÄ©¶´£»FiberHome FTTH ONT·ÓÉÆ÷ÖдæÔÚ28¸öºóÃÅÕÊ»§£»JSOFÅû¶DnsmasqÖÐ7¸öͳ³ÆΪDNSpooqµÄ©¶´£»Malwarebytes³ÆSolarWindsºÚ¿ÍÒÑÈëÇÖÆäÓʼþϵͳ£»Ñо¿ÍŶӷ¢ÏÖFreakOutÀûÓöà¸öЩ¶´µÄ¹¥»÷»î¶¯ ¡£


ƾ¾ÝÒÔÉÏ×ÛÊö £¬±¾ÖÜÄþ¾²ÍþвΪÖÐ ¡£


> ÖØÒªÄþ¾²Â©¶´Áбí


1.Oracle E-Business Suite One-to-One Fulfillment CVE-2021-2101δÃ÷ÈÎÒâ´úÂëÖ´ÐЩ¶´


Oracle E-Business Suite One-to-One Fulfillment´æÔÚδÃ÷Äþ¾²Â©¶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬¿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë ¡£

https://www.oracle.com/security-alerts/cpujan2021.html


2.Netapp Clustered Data ONTAPÈÎÒâÊý¾ÝÁýÕÖ©¶´


Netapp Clustered Data ONTAP´æÔÚδÃ÷Äþ¾²Â©¶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬¿ÉÁýÕÖϵͳÊý¾Ý ¡£

https://security.netapp.com/advisory/ntap-20210119-0001/


3.Delta Electronics ISPSoftÏîÄ¿Îļþ´¦ÖÃÄÚ´æ´íÎóÒýÓôúÂëÖ´ÐЩ¶´


Delta Electronics ISPSoftÏîÄ¿Îļþ´¦ÖôæÔÚÊͷźóʹÓ鶴 £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÎļþÇëÇó £¬ÓÕʹÓû§½âÎö £¬¿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë ¡£

https://us-cert.cisa.gov/ics/advisories/icsa-21-021-01


4.Cisco SD-WAN vManage Software ÃüÁî×¢È멶´


Cisco SD-WAN vManage Software WEB½Ó¿Ú´æÔÚÄþ¾²Â©¶´ £¬ÔÊÐíͨ¹ýÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬¿ÉÒÔROOTÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë ¡£

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-cmdinjm-9QMSmgcn


5.Google Chrome Cryptohome²»³äʵ¼ÆıִÐЩ¶´


Google Chrome Cryptohome´æÔÚ²»³äʵ¼ÆıִÐЩ¶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄWEBÒ³ÇëÇó £¬ÓÕʹÓû§½âÎö £¬¿ÉʹӦÓ÷¨Ê½±ÀÀ£»ò¿ÉÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë ¡£

https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop_19.html


> ÖØÒªÄþ¾²Ê¼þ×ÛÊö


1¡¢¶íÂÞ˹Ìú·´æÔÚ¿É·ÃÎÊÆä¼à¿ØϵͳµÄ©¶´


1.jpg


¶íÂÞ˹Ìú·¹«Ë¾´æÔÚ©¶´ £¬¿ÉÓÃÀ´·ÃÎÊÆä¼à¿ØϵͳºÍÄÚ²¿·þÎñ ¡£¸Ã©¶´ÊÇÓÉÓÚĬÈÏÇé¿öÏÂMikroTik·ÓÉÆ÷ÉϵÄÃÜÂëδ¸ü¸ÄËùµ¼ÖµÄ £¬ºÚ¿Í¿ÉÀûÓø鶴ÔÚÒ»ÖÜÄڹرÕÌú·ÉϵÄËùÓмà¿Ø £¬¶ø»Ö¸´ÏµÍ³ÐèÒªÖÁÉÙÒ»¸öÔµÄʱ¼ä £¬»¨·Ñ1.3ÒÚ¬²¼£¨180ÍòÃÀÔª£© ¡£Ä¿Ç° £¬¸Ã©¶´Òѱ»ÐÞ¸´ £¬µ«²»ÄÜÈ·¶¨ÊÇ·ñÓй¥»÷ÕßÀûÓÃÆä·Ç·¨·ÃÎʹý¹«Ë¾µÄϵͳ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2021/01/hackers-accessed-thousands-of.html


2¡¢FiberHome FTTH ONT·ÓÉÆ÷ÖдæÔÚ28¸öºóÃÅÕÊ»§


2.png


Ñо¿ÈËÔ±Pierre Kim·¢ÏÖFiberHome FTTH ONT·ÓÉÆ÷ÖдæÔÚ28¸öºóÃÅÕÊ»§ºÍ¶à¸öÆäËû©¶´ ¡£¸Ã·ÓÉÆ÷Ö÷Òª²¿ÊðÓÚÄÏÃÀºÍ¶«ÄÏÑÇ £¬Í¨³£°²×°ÔÚÑ¡ÔñǧÕ×λµÄ¹«Ô¢Â¥ÄÚ¡¢¼ÒÍ¥»òÆóÒµÄÚ²¿ ¡£Kim³ÆÆä·¢ÏÖ´óÁ¿¿É±»ÀÄÓÃÀ´½Ó¹ÜISPµÄºóÃźÍ©¶´ £¬ÀýÈçºóÃÅÔÊÐí¹¥»÷Õßͨ¹ý·¢ËÍÌØÖƵÄHTTPSÇëÇó[https£º// [ip]/telnet £¿enable=0£¦key=calculated£¨BR0_MAC£©]Óë·ÓÉÆ÷µÄTelnetÁ¬½Ó £¬Web·þÎñÆ÷°üÂÞ22¸öÓɲîÒìµÄInternet·þÎñÌṩÉÌʹÓõÄÓ²±àÂëƾ¾ÝµÈ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/multiple-backdoors-and-vulnerabilities-discovered-in-fiberhome-routers/


3¡¢JSOFÅû¶DnsmasqÖÐ7¸öͳ³ÆΪDNSpooqµÄ©¶´


3.png


JSOFµÄÑо¿ÈËÔ±Åû¶ÁËDnsmasqÖеÄ7¸öDNSpooq©¶´ ¡£DnsmasqÊÇ»ùÓÚ*NIX²Ù×÷ϵͳµÄDNSת·¢¿Í»§¶Ë £¬Í¨³£ÔÚÖÖÖÖÍøÂçÉ豸µÄ¹Ì¼þÖÐ ¡£´Ë´Î×ܹ²Åû¶ÁË7¸ö©¶´ £¬ËûÃDZ»Í³³ÆΪDNSpooq £¬ÆäÖÐ4¸öÊÇ»º³åÇøÒç³ö©¶´ £¬¿ÉÄܵ¼ÖÂÔ¶³ÌÖ´ÐдúÂë £¬¶øÆäËû3¸ö©¶´Ôò¿Éµ¼ÖÂDNS»º´æÖж¾ ¡£JSOF³Æ¹¥»÷Õ߿ɽáºÏʹÓÃDNSpooqºÍ¾É°æDnsmasqÈí¼þ £¬¶ÔÖ±½Ó̻¶ÔÚInternetÉϵÄDnsmasq½øÐй¥»÷ £¬¶øÇÒÊÜÓ°ÏìÉ豸Ëù´¦µÄÄÚÍøÉϵÄÆäËüÉ豸Ҳ½«´¦ÓÚΣÏÕÖ®ÖÐ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/dnspooq-lets-attackers-poison-dns-cache-records/


4¡¢Malwarebytes³ÆSolarWindsºÚ¿ÍÒÑÈëÇÖÆäÓʼþϵͳ


4.png


Äþ¾²¹«Ë¾Malwarebytes³ÆSolarWinds±³ºóµÄºÚ¿ÍÒÑÈëÇÖÆäÓʼþϵͳ ¡£¸Ã¹«Ë¾Ö¸³ö £¬ËäÈ»ÆäûÓÐʹÓÃSolarWinds £¬µ«ÓëÆäËû¹«Ë¾Ò»ÑùÔâµ½ÁËSolarWinds¹©Ó¦Á´¹¥»÷ ¡£¹¥»÷·¢ÉúÔÚÈ¥Äê £¬ºÚ¿ÍÀûÓÃAzure Active DirectoryÖеÄ©¶´ºÍ¶ñÒâOffice 365Ó¦Ó÷¨Ê½ £¬¶Ô¹«Ë¾²¿ÃÅϵͳÌᳫÁ˹¥»÷ ¡£¾­¹ýÊÓ²ì £¬¸Ã¹«Ë¾È·¶¨¹¥»÷Õß½ö»ñµÃÁ˲¿ÃÅÄÚ²¿ÓʼþµÄ·ÃÎÊȨ £¬ÆäÄÚ²¿Éú²ú»·¾³²¢Î´Êܵ½Ó°Ïì £¬Ä¿Ç°ÈÔ¿ÉÄþ¾²Ê¹ÓÃMalwarebytesÈí¼þ ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/113628/hacking/malwarebytes-solarwinds-attack.html


5¡¢Ñо¿ÍŶӷ¢ÏÖFreakOutÀûÓöà¸öЩ¶´µÄ¹¥»÷»î¶¯


5.png


Ñо¿ÍŶӷ¢ÏÖ½©Ê¬ÍøÂçFreakOutÀûÓöà¸öЩ¶´µÄ¹¥»÷»î¶¯ ¡£´Ë´Î¹¥»÷Ö÷ÒªÕë¶ÔTerraMaster²Ù×÷ϵͳ¡¢Zend FrameworkºÍLiferay Portal £¬ÀûÓÃÁËCVE-2020-28188¡¢ CVE-2021-3007ºÍCVE-2020-7961©¶´ ¡£FreakOut¾ßÓзþÎñ¶Ë¿ÚɨÃè¡¢ÊÕ¼¯ÐÅÏ¢¡¢ÍøÂçÐá̽»ò·¢¶¯ÂþÑÜʽ¾Ü¾ø·þÎñ(DDoS)¹¥»÷µÈ¹¦Ð§ £¬¿ÉѬȾLinuxÉ豸 £¬²¢ÀûÓÃÆäÍÚ¼ÓÃÜ»õ±Ò¡¢ÔÚ¹«Ë¾ÍøÂçÉϺáÏòÁ÷´«»òαװ³ÉÊÜÓ°ÏìµÄ¹«Ë¾¹¥»÷ÆäËûÄ¿±ê ¡£


Ô­ÎÄÁ´½Ó£º

https://research.checkpoint.com/2021/freakout-leveraging-newest-vulnerabilities-for-creating-a-botnet/