ÐÅÏ¢Äþ¾²Öܱ¨-2021ÄêµÚ46ÖÜ
Ðû²¼Ê±¼ä 2021-11-15±¾Öܹ²ÊÕ¼Äþ¾²Â©¶´58¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇAdobe RoboHelp ServerĿ¼±éÀú´úÂëÖ´ÐЩ¶´£»ServiceTonic Helpdesk softwareδÊÚȨ·ÃÎÊ©¶´£»Microsoft Windows Active Directory CVE-2021-42278ȨÏÞÌáÉý©¶´£»Microsoft Windows Remote Desktop Client´úÂëÖ´ÐЩ¶´£»Siemens SIMATIC PCS 7Ŀ¼±éÀú©¶´¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇÑо¿ÈËÔ±·¢ÏÖð³äÄþ¾²¹«Ë¾ProofpointµÄµöÓã»î¶¯£»Í³³ÆΪNUCLEUS:13µÄ¶à¸ö©¶´Ó°ÏìÎ÷ÃÅ×ÓRTOS£»BusyBoxÖÐ14¸öЩ¶´Ó°ÏìÊý°ÙÍò»ùÓÚUnixµÄÉ豸£»Î¢ÈíÐû²¼11Ô¸üУ¬ÐÞ¸´6¸ö0dayÔÚÄÚµÄ55¸ö©¶´£»ESET·¢ÏÖLazarusÀûÓõÁ°æµÄIDA Pro·Ö·¢¶ñÒâÈí¼þ¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖС£
>ÖØÒªÄþ¾²Â©¶´Áбí
1. Adobe RoboHelp ServerĿ¼±éÀú´úÂëÖ´ÐЩ¶´
Adobe RoboHelp Server´æÔÚĿ¼±éÀú©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£
https://www.zerodayinitiative.com/advisories/ZDI-21-1305/
2. ServiceTonic Helpdesk softwareδÊÚȨ·ÃÎÊ©¶´
ServiceTonic Helpdesk software´æÔÚÊÚȨ»úÖÆ©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ɲ»Ê¹ÓÃÃÜÂëδÊÚȨ·ÃÎÊϵͳ¡£
https://www.srlabs.de/bites/chaining-three-zero-day-exploits-in-itsm-software-servicetonic-for-remote-code-execution
3. Microsoft Windows Active Directory CVE-2021-42278ȨÏÞÌáÉý©¶´
Microsoft Windows Active Directory´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔÌáÉýÌØȨ¡£
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-42278
4. Microsoft Windows Remote Desktop Client´úÂëÖ´ÐЩ¶´
Microsoft Windows Remote Desktop Client´æÔÚδÃ÷Äþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔϵͳÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-38666
5. Siemens SIMATIC PCS 7Ŀ¼±éÀú©¶´
Siemens SIMATIC PCS 7´æÔÚĿ¼±éÀú©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£
https://cert-portal.siemens.com/productcert/pdf/ssa-840188.pdf
>ÖØÒªÄþ¾²Ê¼þ×ÛÊö
1¡¢Ñо¿ÈËÔ±·¢ÏÖð³äÄþ¾²¹«Ë¾ProofpointµÄµöÓã»î¶¯
ArmorbloxµÄÑо¿ÍŶÓÓÚ11ÔÂ4ÈÕÅû¶ÁËð³äÍøÂçÄþ¾²¹«Ë¾ProofpointµÄµöÓã»î¶¯¡£ÕâЩµöÓãÓʼþµÄÖ÷ÌâΪ¡°Re£ºPayoff Request¡±£¬Éù³Æ°üÂÞÒ»·Ýͨ¹ýProofpoint·¢Ë͵ĵÖѺ´û¿îÏà¹ØÎļþ£¬Ö¼ÔÚÇÔÈ¡Ä¿±êµÄMicrosoft Office 365ºÍGoogle Gmailƾ¾Ý¡£¸ÃÓʼþÊÇ´Ó±»µÁµÄ¸öÈËÕÊ»§·¢Ë͵ģ¬·¢¼þÈ˵ÄÓòÃûÓòΪ¡°sdis34[.]fr¡±£¬ÕâÊÇ·¨¹úÄϲ¿µÄÒ»¸öÏû·À¾ÈÔ®²¿ÃÅ£¬¶øµöÓãÒ³ÃæÍйÜÔÚgreenleafproperties[.]co[.]ukÓò¡£
ÔÎÄÁ´½Ó£º
https://www.armorblox.com/blog/proofpoint-credential-phishing/
2¡¢Í³³ÆΪNUCLEUS:13µÄ¶à¸ö©¶´Ó°ÏìÎ÷ÃÅ×ÓRTOS
ForescoutºÍMedigateµÄÑо¿ÈËÔ±ÔÚ11ÔÂ9ÈÕÅû¶ÁËNucleusÖÐ13¸ö©¶´µÄϸ½Ú¡£NucleusÊÇÎ÷ÃÅ×ÓµÄʵʱ²Ù×÷ϵͳ(RTOS)£¬Í¨³£ÔËÐÐÔÚÒ½ÁÆÉ豸¡¢Æû³µ¡¢ÖÇÄÜÊÖ»ú¡¢ÎïÁªÍøÉ豸¡¢¹¤ÒµplcµÈÉ豸µÄƬÉÏϵͳ(SoC)¡£ÕâЩ©¶´Í³³ÆΪNUCLEUS:13£¬Ó°ÏìÁËNucleus TCP/IP¶ÑÕ»¡£ÆäÖУ¬×îÑÏÖصÄÊÇÓ°ÏìÁËFTP·þÎñÆ÷×é¼þµÄÔ¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2021-31886£©£¬CVSSÆÀ·ÖΪ9.8£¬ÊÇÓÉÓÚ¶ÔUSERÃüÁ¶ÈµÄÑéÖ¤²»ÕýÈ·µ¼Öµġ£
ÔÎÄÁ´½Ó£º
https://therecord.media/nucleus13-vulnerabilities-impact-siemens-medical-industrial-equipment/
3¡¢BusyBoxÖÐ14¸öЩ¶´Ó°ÏìÊý°ÙÍò»ùÓÚUnixµÄÉ豸
Èí¼þ¿ª·¢¹«Ë¾JFrogºÍÄþ¾²¹«Ë¾ClarotyÔÚ11ÔÂ9ÈÕÁªºÏÅû¶ÁËBusyBoxÖÐ14¸ö©¶´µÄϸ½Ú¡£BusyBox±»³ÆΪǶÈëʽLinuxµÄ¡°ÈðÊ¿¾üµ¶¡±£¬¿É½«ÖÖÖÖ³£¼ûµÄUnixÓ¦ÓûòС·¨Ê½£¨ÀýÈçcp¡¢ls¡¢grep£©×éºÏ³ÉÒ»¸ö¿ÉÖ´ÐÐÎļþ¡£ÕâЩ©¶´´æÔÚÓÚBusyBox 1.16µ½1.33.1µÄ¶à¸ö°æ±¾£¬Ó°ÏìÁËÊý°ÙÍò»ùÓÚUnixµÄÉ豸¡£ÆäÖнÏΪÑÏÖصÄÊÇawkÖеÄDoS©¶´CVE-2021-42383¡¢CVE-2021-42384ºÍCVE-2021-42385µÈ¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/124429/hacking/busybox-vulnerabilities.html
4¡¢Î¢ÈíÐû²¼11Ô¸üУ¬ÐÞ¸´6¸ö0dayÔÚÄÚµÄ55¸ö©¶´
΢ÈíÔÚ11ÔÂ9ÈÕÐû²¼Á˱¾ÔµÄÖܶþ²¹¶¡£¬×ܼÆÐÞ¸´ÁË55¸ö©¶´¡£´Ë´ÎÐÞ¸´ÁË6¸ö0 day£¬°üÂÞExcelÖÐÄþ¾²¹¦Ð§Èƹý©¶´£¨CVE-2021-42292£©¡¢Exchange ServerÖÐRCE£¨CVE-2021-42321£©£¬RDPÖÐÐÅϢ鶩¶´£¨CVE-2021-38631ºÍCVE-2021-41371£©£¬ÒÔ¼°3DÖмì²ìÆ÷RCE£¨CVE-2021-43208ºÍCVE-2021-43209£©¡£ÆäÖУ¬CVE-2021-42292ºÍCVE-2021-42321Òѱ»ÓÃÓÚ¶ñÒâ¹¥»÷»î¶¯¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/microsoft/microsoft-november-2021-patch-tuesday-fixes-6-zero-days-55-flaws/
5¡¢ESET·¢ÏÖLazarusÀûÓõÁ°æµÄIDA Pro·Ö·¢¶ñÒâÈí¼þ
ESETÍŶÓÓÚ11ÔÂ10ÈÕ·¢ÏÖ³¯ÏʺڿÍÍÅ»ïLazarusÀûÓõÁ°æIDA Pro¹¥»÷Äþ¾²Ñо¿ÈËÔ±µÄ»î¶¯¡£Ñо¿ÈËԱͨ³£Ê¹ÓÃÄæÏò¹¤³ÌÓ¦ÓÃIDA ProÀ´·ÖÎö©¶´ºÍ¶ñÒâÈí¼þ£¬¶ø´Ë´Î·¢ÏÖµÄIDA Pro 7.5°æ±¾°üÂÞÁËÁ½¸öÃûΪidahelp.dllºÍwin_fw.dllµÄ¶ñÒâDLL¡£ÆäÖУ¬win_fw.dll½«ÔÚWindowsÈÎÎñµ÷Öη¨Ê½Öд´½¨Ò»¸öÐÂÈÎÎñ£¬¸ÃÈÎÎñ½«Æô¶¯idahelper.dll£¬È»ºóidahelper.dll½«Á¬½Óµ½devguardmap[.]orgÍøÕ¾²¢ÏÂÔØÔ¶³Ì·ÃÎÊľÂíNukeSpedµÄpayload¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/lazarus-hackers-target-researchers-with-trojanized-ida-pro/