ÐÅÏ¢Äþ¾²Öܱ¨-2021ÄêµÚ11ÖÜ

Ðû²¼Ê±¼ä 2021-03-15

> ±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö


2021Äê03ÔÂ08ÈÕÖÁ03ÔÂ14ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´63¸ö £¬ÖµµÃ¹Ø×¢µÄÊÇMicrosoft Azure SphereδǩÃû´úÂëÖ´ÐЩ¶´£»SAP Solution Manager User-Experience MonitoringÊÚȨ¼ì²éȱʧ©¶´£»Adobe Creative Cloud Desktop ApplicationÈÎÒâÎļþдÈ멶´£»F5 BIG-IP Advanced WAF/ASM»º³åÇøÒç³ö©¶´£»Schneider Electric Interactive Graphical SCADA System CGFÎļþ½âÎöÄÚ´æÆÆ»µ´úÂëÖ´ÐЩ¶´¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇCisco³ÆÆ䲿ÃŲúÎïÒòSnortÖеÄ©¶´Ò×ÊÜDoS¹¥»÷£»Ó¢ÌضûÐû²¼2020Äê²úÎïÄþ¾²ÐԵķÖÎö³ÂËߣ»FlagstarÒøÐеĿͻ§ÐÅϢй¶ £¬²¢ÓÀ¾ÃֹͣʹÓÃAccellion£»Å·ÖÞÒøÐйÜÀí¾ÖµÄExchange·þÎñÆ÷Ôâµ½¹¥»÷ £¬Óʼþϵͳ¹Ø±Õ£»Ñо¿ÍŶӷ¢ÏÖ½©Ê¬ÍøÂçz0MinerÍÚ¿óµÄ¹¥»÷»î¶¯¡£


ƾ¾ÝÒÔÉÏ×ÛÊö £¬±¾ÖÜÄþ¾²ÍþвΪÖС£


> ÖØÒªÄþ¾²Â©¶´Áбí


1.Microsoft Azure SphereδǩÃû´úÂëÖ´ÐЩ¶´


Microsoft Azure Sphere´æÔÚÄþ¾²Â©¶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬¿Éʹ·þÎñ·¨Ê½±ÀÀ£»òÕßÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-27080


2.SAP Solution Manager User-Experience MonitoringÊÚȨ¼ì²éȱʧ©¶´


SAP Solution Manager User-Experience Monitoring´æÔÚÊÚȨ¼ì²éȷʵ©¶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬¿ÉδÊÚȨ¿ØÖÆϵͳ¡£

https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107


3.Adobe Creative Cloud Desktop ApplicationÈÎÒâÎļþдÈ멶´


Adobe Creative Cloud Desktop Application´æÔÚÈÎÒâÎļþдÈ멶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬¿ÉÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâÃüÁî¡£

https://helpx.adobe.com/security/products/creative-cloud/apsb21-18.html


4.F5 BIG-IP Advanced WAF/ASM»º³åÇøÒç³ö©¶´


F5 BIG-IP Advanced WAF/ASM´¦ÖöñÒâHTTPÏìÓ¦´æÔÚ»º³åÇøÒç³ö©¶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇó £¬¿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£

https://www.auscert.org.au/bulletins/ESB-2021.0872


5.Schneider Electric Interactive Graphical SCADA System CGFÎļþ½âÎöÄÚ´æÆÆ»µ´úÂëÖ´ÐЩ¶´


Schneider Electric Interactive Graphical SCADA System CGFÎļþ½âÎö´æÔÚÄÚ´æÆÆ»µÂ©¶´ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÎļþÇëÇó £¬ÓÕʹÓû§½âÎö £¬¿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÕßÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£

https://us-cert.cisa.gov/ics/advisories/icsa-21-070-01


> ÖØÒªÄþ¾²Ê¼þ×ÛÊö


1¡¢Cisco³ÆÆ䲿ÃŲúÎïÒòSnortÖеÄ©¶´Ò×ÊÜDoS¹¥»÷


1.jpg


Cisco³ÆÆ䲿ÃŲúÎïÒòSnort¼ì²âÒýÇæÖеÄ©¶´Ò×ÊÜDoS¹¥»÷¡£¸Ã©¶´Î»ÓÚSnort¼ì²âÒýÇæµÄÒÔÌ«ÍøÖ¡½âÂëÆ÷ÖÐ £¬±»×·×ÙΪCVE-2021-1285 £¬CVSSÆÀ·ÖΪ7.4¡£¸Ã©¶´ÊǶÔÒÔÌ«ÍøÖ¡µÄ´íÎó×´¿ö´¦Öò»ÕýÈ·ËùÖ £¬Î´¾­ÑéÖ¤µÄ¹¥»÷Õß¿ÉÒÔÏòÄ¿±êÉ豸·¢ËͶñÒâÒÔÌ«ÍøÖ¡À´ÀûÓôË©¶´¡£ÀÖ³ÉÀûÓø鶴¿ÉÒԺľ¡Ä¿±êÉè±¹ØÁ¬Ä´ÅÅÌ¿Õ¼ä £¬µ¼Ö¹ÜÀíÔ±ÎÞ·¨µÇ¼µ½¸ÃÉ豸»ò¸ÃÉ豸ÎÞ·¨ÕýÈ·Æô¶¯¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/115341/security/cisco-products-dos-snort-issue.html


2¡¢Ó¢ÌضûÐû²¼2020Äê²úÎïÄþ¾²ÐԵķÖÎö³ÂËß


2.jpg


Ó¢ÌضûÐû²¼ÁË2020Äê²úÎïÄþ¾²ÐԵķÖÎö³ÂËß¡£³ÂËßÖ¸³ö £¬ÔÚ2020ÄêÅû¶µÄ231¸ö©¶´ÖÐ £¬ÓÐ109¸ö(47%)ÊÇÓÉÓ¢ÌضûÔ±¹¤Í¨¹ýÄþ¾²Ñо¿·¢ÏÖµÄ £¬¶ø¼ÓÈ멶´Éͽð¼Æ»®µÄÍⲿÑо¿ÈËÔ±³ÂËßÁË105¸ö©¶´£¨45£¥£©¡£´ËÍâ £¬ÓÉÍⲿ·¢ÏֵĴó²¿ÃÅ©¶´¶¼´æÔÚÓÚÔÚÈí¼þÖÐ £¬Ö÷ÒªÔÚÓÃÓÚͼÐΡ¢ÍøÂçºÍÀ¶ÑÀ×é¼þµÄÈí¼þʵÓ÷¨Ê½ºÍÈí¼þÇý¶¯·¨Ê½ÖС£ÆäÖÐ £¬Çý¶¯·¨Ê½ºÍÆäËûÈí¼þ×é¼þÖеÄ©¶´×î¶à £¬Îª93¸ö£»Æä´ÎΪ¹Ì¼þ £¬´æÔÚ66¸ö©¶´£»¶øÓÐ58¸ö©¶´Ó°Ïìµ½¹Ì¼þºÍÈí¼þµÄ×éºÏ¡£


Ô­ÎÄÁ´½Ó£º

https://blogs.intel.com/technology/2021/03/ipas-intel-2020-product-security-report/#gs.vg4enn


3¡¢FlagstarÒøÐеĿͻ§ÐÅϢй¶ £¬²¢ÓÀ¾ÃֹͣʹÓÃAccellion


3.jpg


×ܲ¿Î»ÓÚÃÜЪ¸ùÖݵÄFlagstarÒøÐеĿͻ§ÐÅϢй¶ £¬²¢Ðû²¼½«ÓÀ¾ÃֹͣʹÓÃAccellion¡£¸ÃÒøÐÐÊÇFlagstar BancorpµÄ×Ó¹«Ë¾ £¬ÎªÃÀ¹ú¿Í»§ÌṩµÖѺºÍÆäËû½ðÈÚ·þÎñ¡£´Ë´ÎÊý¾Ýй¶ÊÇÓÉÓÚÆäʹÓõĴ«Êä´óÎļþµÄAccellion FTAÎļþ¹²Ïí·¨Ê½´æÔÚÒѱ»ÔÚÒ°ÀûÓõÄ0day¶øµ¼ÖµÄ¡£¸Ã×éÖ¯³ÆÆäÓÚ2021Äê1ÔÂ22ÈÕµÃÖª´Ëʼþ £¬Ä¿Ç°²¢Î´Í¸Â¶Ó°ÏìµÄ¿Í»§ÊýÁ¿ÒÔ¼°Ð¹Â¶Êý¾ÝµÄÖÖÀà £¬µ«ÌåÏÖFlagstar½«ÓÀ¾ÃֹͣʹÓÃAccellionÎļþ¹²Ïíƽ̨¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/flagstar-bank-customer-data-breached-through-accellion-hack/


4¡¢Å·ÖÞÒøÐйÜÀí¾ÖµÄExchange·þÎñÆ÷Ôâµ½¹¥»÷ £¬Óʼþϵͳ¹Ø±Õ


4.jpg


Å·ÖÞÒøÐйÜÀí¾Ö£¨EBA£©³ÆÆäExchange·þÎñÆ÷Ôâµ½¹¥»÷ £¬ËùÓÐÓʼþϵͳÒѾ­¹Ø±Õ¡£EBAÊÇÅ·ÖÞ½ðÈÚ¼à¹ÜÌåϵµÄÒ»²¿ÃÅ £¬ËüÂôÁ¦¼à¶½Å·ÃËÒøÐÐÒµµÄÕûÌåÓÐÐòÔË×÷¡£Ä¿Ç° £¬¸ÃʼþÈÔÔÚÊÓ²ìÖÐ £¬Éв»È·¶¨ºÚ¿Í·ÃÎÊÁËʲôÊý¾Ý¡£¸Ã×éÖ¯ÔÚÉÏÖÜÈյijõ·¨Ê½²é³Æ £¬¹¥»÷Õß¿ÉÄÜÒѾ­·ÃÎÊÁË´æ´¢ÔÚµç×ÓÓʼþ·þÎñÆ÷ÉϵĸöÈËÐÅÏ¢¡£µ«ÔÚ±¾ÖÜÒ»µÄÔö²¹¸üÐÂÖÐÌåÏÖ £¬µç×ÓÈ¡Ö¤¹ý³ÌÖÐûÓз¢ÏÖÊý¾Ýй¶µÄ¼£Ïó¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/european-banking-authority-discloses-exchange-server-hack/


5¡¢Ñо¿ÍŶӷ¢ÏÖ½©Ê¬ÍøÂçz0MinerÍÚ¿óµÄ¹¥»÷»î¶¯


5.jpg


Ñо¿ÍŶӷ¢ÏÖ½©Ê¬ÍøÂçz0MinerÊÔͼ¿ØÖÆJenkinsºÍElasticSearch·þÎñÆ÷À´ÍÚ¾òMonero£¨XMR£©¼ÓÃÜ»õ±ÒµÄ¹¥»÷»î¶¯¡£z0MinerÊÇÈ¥ÄêÔÚ11Ô±»·¢ÏÖµÄÒ»ÖÖÍÚ¿ó¶ñÒâÈí¼þ £¬ÆäÀûÓÃWeblogic©¶´Ñ¬È¾ÁËÊýǧ̨·þÎñÆ÷¡£¶ø´Ë´Î»î¶¯ÀûÓÃÁËElasticSearchÖеÄRCE©¶´£¨CVE-2015-1427£©ºÍÓ°ÏìÁËJenkins·þÎñÆ÷µÄÒ»¸ö¹ÅÀϵÄRCE¡£ÔÚÈëÇÖ·þÎñÆ÷ºó £¬¸Ã¶ñÒâÈí¼þ½«ÏÈÏÂÔضñÒâshell½Å±¾ £¬È»ºóÑ°ÕÒ²¢É¾³ýÒÔÇ°°²×°µÄÍÚ¿ó½Å±¾¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/z0miner-botnet-hunts-for-unpatched-elasticsearch-jenkins-servers/