D-Link NASµÄí§ÒâÏÂÁî×¢ÈëºÍÓ²±àÂëºóÃÅ

Ðû²¼Ê±¼ä 2024-04-08
1. D-Link NASµÄí§ÒâÏÂÁî×¢ÈëºÍÓ²±àÂëºóÃÅ


4ÔÂ6ÈÕ£¬£¬£¬ÍþвÑо¿Ö°Ô±Åû¶Á˶à¸ö²»ÔÚÖ§³ÖµÄ D-Link ÍøÂ總¼Ó´æ´¢ (NAS) ×°±¸ÐͺÅÖб£´æÐµÄí§ÒâÏÂÁî×¢ÈëºÍÓ²±àÂëºóÃÅȱÏÝ¡£¡£¡£¡£¸ÃÎÊÌâ±£´æÓÚ¡°/cgi-bin/nas_sharing.cgi¡±¾ç±¾ÖУ¬£¬£¬Ó°ÏìÆä HTTP GET ÇëÇó´¦Öóͷ£³ÌÐò×é¼þ¡£¡£¡£¡£µ¼Ö¸ÃȱÏÝ£¨±àºÅΪ CVE-2024-3273£©µÄÁ½¸öÖ÷ÒªÎÊÌâÊÇͨ¹ýÓ²±àÂëÕÊ»§£¨Óû§Ãû£º¡°messagebus¡±ºÍ¿ÕÃÜÂ룩´Ù³ÉµÄºóÃÅÒÔ¼°Í¨¹ý¡°system¡±²ÎÊýµÄÏÂÁî×¢ÈëÎÊÌâ¡£¡£¡£¡£ÏÂÁî×¢ÈëȱÏÝÊÇÓÉÓÚͨ¹ý HTTP GET ÇëÇó½« Base64 ±àÂëµÄÏÂÁîÌí¼Óµ½¡°system¡±²ÎÊý£¬£¬£¬È»ºóÖ´ÐиÃÏÂÁî¶øÒýÆðµÄ¡£¡£¡£¡£D-LinkΪ¾É×°±¸½¨ÉèÁË ×¨ÃŵÄÖ§³ÖÒ³Ãæ £¬£¬£¬Óû§¿ÉÒÔÔÚÆäÖÐä¯ÀÀµµ°¸ÒÔ²éÕÒ×îеÄÇå¾²ºÍ¹Ì¼þ¸üС£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/over-92-000-exposed-d-link-nas-devices-have-a-backdoor-account/


2. Áè¼Ý1.6Íò¸öIVANTI VPNÈÔÈ»Ò×Êܵ½CVE-2024-21894µÄ¹¥»÷


4ÔÂ6ÈÕ£¬£¬£¬Shadowserver Ñо¿Ö°Ô±±¨¸æ³Æ£¬£¬£¬Ô¼Äª 16500 ¸ö Ivanti Connect Secure ºÍ Poly Secure Íø¹ØÈÝÒ×Êܵ½×î½ü±¨¸æµÄ RCE CVE-2024-21894µÄÓ°Ïì¡£¡£¡£¡£¸Ã¹«Ë¾ÒÑÐû²¼ÁËÇå¾²¸üУ¬£¬£¬ÒÔ½â¾öÓ°Ïì Connect Secure ºÍÕ½ÂÔÇå¾²Íø¹ØµÄËĸöÇå¾²Îó²î£¬£¬£¬ÕâЩÎó²î¿ÉÄܵ¼Ö´úÂëÖ´Ðк;ܾøÐ§ÀÍ (DoS)£¬£¬£¬°üÀ¨CVE-2024-21894¡£¡£¡£¡£CVE-2024-21894£¨CVSS ÆÀ·Ö 8.2£©ÊÇ Ivanti Connect Secure£¨9.x¡¢22.x£©ºÍ Ivanti Policy Secure µÄ IPSec ×é¼þÖеĶÑÒç³öÎó²î£¬£¬£¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¶ñÒâÓû§ÔÚÒÔÏÂλÖ÷¢ËÍÌØÖÆÇëÇó£ºÏÂÁî - ʹЧÀÍÍß½â´Ó¶øµ¼Ö DoS ¹¥»÷¡£¡£¡£¡£ÔÚijЩÇéÐÎÏ£¬£¬£¬Õâ¿ÉÄܻᵼÖÂÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£Shadowserver Ñо¿Ö°Ô±É¨ÃèÁË»¥ÁªÍøÉÏÊÇ·ñ±£´æÒ×ÊÜ CVE-2024-21894 Ó°ÏìµÄʵÀý£¬£¬£¬²¢±¨¸æ³ÆÔ¼ÓÐ 16,500 ¸öʵÀýÈÔÈ»ÈÝÒ×Êܵ½¹¥»÷¡£¡£¡£¡£´ó´ó¶¼Ò×Êܹ¥»÷µÄϵͳλÓÚÃÀ¹ú£¨×èֹ׫д±¾ÎÄʱÓÐ 4686 ¸ö£©£¬£¬£¬Æä´ÎÊÇÈÕ±¾£¨2009 Ä꣩ºÍÓ¢¹ú£¨1032 ¸ö£©¡£¡£¡£¡£


https://securityaffairs.com/161544/security/ivanti-16500-vulnerable-istances.html


3. ÃÀ¹úÎÀÉú²¿ÖÒÑÔÒ½Ôº IT ЧÀĮ́Ò×Ôâµ½ºÚ¿Í¹¥»÷


4ÔÂ6ÈÕ£¬£¬£¬ÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿ (HHS) ÖÒÑԳƣ¬£¬£¬ºÚ¿ÍÏÖÔÚÕýÔÚʹÓÃÉç»á¹¤³ÌÕ½ÂÔÀ´¹¥»÷Ò½ÁƱ£½¡ºÍ¹«¹²ÎÀÉú (HPH) ÁìÓòµÄ IT ЧÀĮ́¡£¡£¡£¡£ÎÀÉú²¿·ÖÍøÂçÇ徲Эµ÷ÖÐÐÄ (HC3) ±¾ÖÜÐû²¼µÄ²¿·Ö¾¯±¨³Æ£¬£¬£¬ÕâЩսÂÔÔÊÐí¹¥»÷Õßͨ¹ý×¢²á×Ô¼ºµÄ¶àÖØÉí·ÝÑéÖ¤ (MFA) ×°±¸À´»á¼ûÄ¿µÄ×éÖ¯µÄϵͳ¡£¡£¡£¡£ÔÚÕâЩ¹¥»÷ÖУ¬£¬£¬ÍþвÐÐΪÕßʹÓÃÍâµØÇøÓò´úÂëÖµçð³ä²ÆÎñ²¿·ÖÔ±¹¤µÄ×éÖ¯£¬£¬£¬²¢ÌṩÇÔÈ¡µÄÉí·ÝÑéÖ¤ÏêϸÐÅÏ¢£¬£¬£¬°üÀ¨¹«Ë¾ ID ºÍÉç»áÇå¾²ºÅÂë¡£¡£¡£¡£ËûÃÇʹÓÃÕâЩÃô¸ÐÐÅÏ¢²¢Éù³Æ×Ô¼ºµÄÖÇÄÜÊÖ»úÒÑË𻵣¬£¬£¬Ëµ·þ IT ×ÊÖų́ÔÚ¹¥»÷ÕߵĿØÖÆÏÂÔÚ MFA ÖÐ×¢²áÐÂ×°±¸¡£¡£¡£¡£ÕâʹËûÃÇÄܹ»»á¼û¹«Ë¾×ÊÔ´£¬£¬£¬²¢ÔÊÐíËûÃÇÔÚÉÌÒµµç×ÓÓʼþй¶¹¥»÷ÖÐÖØ¶¨ÏòÒøÐÐÉúÒâ¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/us-health-dept-warns-hospitals-of-hackers-targeting-it-help-desks/


4. ÒÔÉ«ÁÐ˾·¨²¿Ôںڿͻ·Ö×ÓÉù³ÆÈëÇÖºóÉó²éÍøÂçÊÂÎñ


4ÔÂ6ÈÕ£¬£¬£¬ ÒÔÉ«ÁÐ˾·¨²¿ÌåÏÖ£¬£¬£¬ÕýÔÚÊÓ²ìÒ»ÆðÍøÂçÊÂÎñ£¬£¬£¬¹æÄ£ÈÔÔÚÉó²éÖУ¬£¬£¬ÐèҪʱ¼äÀ´¼ì²éй¶ÎļþµÄÄÚÈݺ͹æÄ£¼°ÆäȪԴ¡£¡£¡£¡£Ò»¸öÃûΪ Anonymous for Justice µÄ×éÖ¯Éù³Æ¶Ô´Ë´Îй¶ÈÏÕæ£¬£¬£¬²¢³Æ´Ë´Îй¶°üÀ¨¼ìË÷½ü 300 GB µÄÊý¾Ý¡£¡£¡£¡£¸Ã×éÖ¯ÔÚÆäÍøÕ¾ÉÏÌåÏÖ£¬£¬£¬½«¼ÌÐø¹¥»÷ÒÔÉ«ÁУ¬£¬£¬¡°Ö±µ½¼ÓɳսÕù×èÖ¹¡±¡£¡£¡£¡£¸Ã×éÖ¯Ðû²¼Á˾ݳÆÔÚ¹¥»÷»î¶¯ÖлñµÃµÄÎļþ£¬£¬£¬ÀýÈçÖ´·¨Îļþ£¬£¬£¬°üÀ¨±ê¼ÇΪÉñÃØµÄË«±ßЭæÅºÍÌõÔ¼²Ý°¸¡£¡£¡£¡£Â·Í¸ÉçÎÞ·¨×ÔÁ¦ºËʵй¶ÎļþµÄÕæÊµÐÔ¡£¡£¡£¡£Ë¾·¨²¿ÔÚÌû×ÓÖÐÌåÏÖ£¬£¬£¬ÒÑÕë¶ÔÕâÖÖÇéÐÎÌáǰ×öºÃ×¼±¸£¬£¬£¬²¢ÇÒÆäÐж¯²»»áÖÐÖ¹¡£¡£¡£¡£¹ú¼ÒÍøÂç¾Ö±¾ÖÜÔçЩʱ¼äÌåÏÖ£¬£¬£¬Ô¤¼ÆÒÁÀÊÄê¶ÈÊ¥³ÇÈÕÖÜÄ©µÄÍøÂç¹¥»÷ʵÑ齫»áÔöÌí¡£¡£¡£¡£


https://www.reuters.com/world/middle-east/israels-justice-ministry-reviewing-cyber-incident-after-hacktivists-claim-breach-2024-04-05/


5. ÈÕ±¾ Hoya µÄ IT ϵͳÔâÊܹ¥»÷ºóÔÝÍ£Éú²ú


4ÔÂ5ÈÕ£¬£¬£¬ÈÕ±¾µÄ Hoya¡ª¡ªÒ»¼ÒÑÛ¾µºÍÒþÐÎÑÛ¾µÖÆÔìÉÌ£¬£¬£¬ÒÔ¼°ÓÃÓÚÖÆÔì°ëµ¼ÌåÖÆÔ졢ƽ°åÏÔʾÆ÷ºÍÓ²ÅÌÇý¶¯Æ÷µÄÌ×¼þ¡ª¡ª IT ϵͳÔâÊܹ¥»÷ºó£¬£¬£¬¸Ã¹«Ë¾ÒÑ×èÖ¹²¿Ñ§Éú²úºÍÏúÊۻ¡£¡£¡£¡£¹Ù·½¶ÔËù±¬·¢ÊÂÎñµÄ¿´·¨ÊÇÄ£ºýµÄ¡£¡£¡£¡£¸Ã¹«Ë¾ÔÊÐí¡°½«½ÓÄɲ½·¥»Ö¸´Éú²úºÍÏúÊۻËùÐèµÄϵͳ£¬£¬£¬²¢¾¡¿ì»Ö¸´Ïò¿Í»§Ìṩ²úÆ·µÄ¹©Ó¦ÏµÍ³¡±¡£¡£¡£¡£Hoya ÏÖÔÚÉв»ÇåÎú¡°¹«Ë¾³ÖÓеÄÉñÃØ»òСÎÒ˽¼ÒÐÅÏ¢ÊÇ·ñÒѱ»Ð¹Â¶»ò±»µÚÈý·½»á¼û¡±£¬£¬£¬²¢ÖÒÑԳơ°ÖÜÈ«ÆÊÎöÔ¤¼ÆÐèÒªÏ൱³¤µÄʱ¼ä¡±¡£¡£¡£¡£


https://www.theregister.com/2024/04/05/hoya_infosec_incident/


6. ºÚ¿ÍʹÓà Magento Îó²îÇÔÈ¡µç×ÓÉÌÎñÍøÕ¾Ö§¸¶Êý¾Ý


4ÔÂ6ÈÕ£¬£¬£¬¸Ã¹¥»÷ʹÓÃÁËCVE-2024-20720£¨CVSS ÆÀ·Ö£º9.1£©£¬£¬£¬Adobe ½«ÆäÐÎòΪ¡°ÌØÊâÔªËØµÄ²»µ±Öк͡±°¸Àý£¬£¬£¬¿ÉÄÜΪí§Òâ´úÂëÖ´ÐÐÆÌÆ½õè¾¶¡£¡£¡£¡£¹«Ë¾ÔÚ 2024 Äê 2 Ô 13 ÈÕÐû²¼µÄÇå¾²¸üÐÂÖнâ¾öÁËÕâ¸öÎÊÌâ¡£¡£¡£¡£Sansec ÌåÏÖ£¬£¬£¬ËüÔÚÊý¾Ý¿âÖз¢Ã÷ÁËÒ»¸ö¡°È«ÐÄÉè¼ÆµÄ½á¹¹Ä£°å¡±£¬£¬£¬¸ÃÄ£°å±»ÓÃÀ´×Ô¶¯×¢Èë¶ñÒâ´úÂëÒÔÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¹¥»÷Õß½« Magento ½á¹¹ÆÊÎöÆ÷Óë beberlei/assert °ü£¨Ä¬ÈÏ×°Öã©Á¬ÏµÆðÀ´Ö´ÐÐϵͳÏÂÁî¡£¡£¡£¡£ÓÉÓڽṹ¿éÓë½áÕʳµÏà¹ØÁª£¬£¬£¬Òò´Ëÿµ±ÇëÇó <store>/checkout/cart ʱ¶¼»áÖ´ÐдËÏÂÁî¡£¡£¡£¡£ÓÐÎÊÌâµÄÏÂÁîÊÇsed£¬£¬£¬ËüÓÃÓÚ²åÈëÒ»¸ö´úÂëÖ´ÐкóÃÅ£¬£¬£¬È»ºóÈÏÕæÌṩ StripeÖ§¸¶ä¯ÀÀÆ÷ÒÔ²¶»ñ²ÆÎñÐÅÏ¢²¢½«Æäй¶µ½ÁíÒ»¸öÊÜѬȾµÄ Magento ÊÐËÁ¡£¡£¡£¡£


https://thehackernews.com/2024/04/hackers-exploit-magento-bug-to-steal.html