ÐÅÏ¢Çå¾²Öܱ¨-2021ÄêµÚ11ÖÜ

Ðû²¼Ê±¼ä 2021-03-15

> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2021Äê03ÔÂ08ÈÕÖÁ03ÔÂ14ÈÕ¹²ÊÕ¼Çå¾²Îó²î63¸ö£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇMicrosoft Azure SphereδÊðÃû´úÂëÖ´ÐÐÎó²î£»£»£»SAP Solution Manager User-Experience MonitoringÊÚȨ¼ì²éȱʧÎó²î£»£»£»Adobe Creative Cloud Desktop Applicationí§ÒâÎļþдÈëÎó²î£»£»£»F5 BIG-IP Advanced WAF/ASM»º³åÇøÒç³öÎó²î£»£»£»Schneider Electric Interactive Graphical SCADA System CGFÎļþÆÊÎöÄÚ´æÆÆËð´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇCisco³ÆÆä²¿·Ö²úÆ·ÒòSnortÖеÄÎó²îÒ×ÊÜDoS¹¥»÷£»£»£»Ó¢ÌضûÐû²¼2020Äê²úÆ·Çå¾²ÐÔµÄÆÊÎö±¨¸æ£»£»£»FlagstarÒøÐеĿͻ§ÐÅϢй¶£¬£¬£¬²¢ÓÀÊÀ×èֹʹÓÃAccellion£»£»£»Å·ÖÞÒøÐÐÖÎÀí¾ÖµÄExchangeЧÀÍÆ÷Ôâµ½¹¥»÷£¬£¬£¬Óʼþϵͳ¹Ø±Õ£»£»£»Ñо¿ÍŶӷ¢Ã÷½©Ê¬ÍøÂçz0MinerÍÚ¿óµÄ¹¥»÷»î¶¯¡£¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£


> Ö÷ÒªÇå¾²Îó²îÁбí


1.Microsoft Azure SphereδÊðÃû´úÂëÖ´ÐÐÎó²î


Microsoft Azure Sphere±£´æÇå¾²Îó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉʹЧÀͳÌÐòÍ߽⻣»£»òÕßÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-27080


2.SAP Solution Manager User-Experience MonitoringÊÚȨ¼ì²éȱʧÎó²î


SAP Solution Manager User-Experience Monitoring±£´æÊÚȨ¼ì²éȷʵÎó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉδÊÚȨ¿ØÖÆÏµÍ³¡£¡£¡£¡£

https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107


3.Adobe Creative Cloud Desktop Applicationí§ÒâÎļþдÈëÎó²î


Adobe Creative Cloud Desktop Application±£´æí§ÒâÎļþдÈëÎó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£

https://helpx.adobe.com/security/products/creative-cloud/apsb21-18.html


4.F5 BIG-IP Advanced WAF/ASM»º³åÇøÒç³öÎó²î


F5 BIG-IP Advanced WAF/ASM´¦Öóͷ£¶ñÒâHTTPÏìÓ¦±£´æ»º³åÇøÒç³öÎó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉʹӦÓóÌÐòÍ߽⻣»£»òÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£

https://www.auscert.org.au/bulletins/ESB-2021.0872


5.Schneider Electric Interactive Graphical SCADA System CGFÎļþÆÊÎöÄÚ´æÆÆËð´úÂëÖ´ÐÐÎó²î


Schneider Electric Interactive Graphical SCADA System CGFÎļþÆÊÎö±£´æÄÚ´æÆÆËðÎó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇ󣬣¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬¿ÉʹӦÓóÌÐòÍ߽⻣»£»òÕßÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£

https://us-cert.cisa.gov/ics/advisories/icsa-21-070-01


> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢Cisco³ÆÆä²¿·Ö²úÆ·ÒòSnortÖеÄÎó²îÒ×ÊÜDoS¹¥»÷


1.jpg


Cisco³ÆÆä²¿·Ö²úÆ·ÒòSnort¼ì²âÒýÇæÖеÄÎó²îÒ×ÊÜDoS¹¥»÷¡£¡£¡£¡£¸ÃÎó²îλÓÚSnort¼ì²âÒýÇæµÄÒÔÌ«ÍøÖ¡½âÂëÆ÷ÖУ¬£¬£¬±»×·×ÙΪCVE-2021-1285£¬£¬£¬CVSSÆÀ·ÖΪ7.4¡£¡£¡£¡£¸ÃÎó²îÊǶÔÒÔÌ«ÍøÖ¡µÄ¹ýʧ״̬´¦Öóͷ£²»×¼È·ËùÖ£¬£¬£¬Î´ÂÄÀúÖ¤µÄ¹¥»÷Õß¿ÉÒÔÏòÄ¿µÄ×°±¸·¢ËͶñÒâÒÔÌ«ÍøÖ¡À´Ê¹ÓôËÎó²î¡£¡£¡£¡£ÀÖ³ÉʹÓøÃÎó²î¿ÉÒԺľ¡Ä¿µÄÉè±¹ØÁ¬Ä´ÅÅ̿ռ䣬£¬£¬µ¼ÖÂÖÎÀíÔ±ÎÞ·¨µÇ¼µ½¸Ã×°±¸»ò¸Ã×°±¸ÎÞ·¨×¼È·Æô¶¯¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/115341/security/cisco-products-dos-snort-issue.html


2¡¢Ó¢ÌضûÐû²¼2020Äê²úÆ·Çå¾²ÐÔµÄÆÊÎö±¨¸æ


2.jpg


Ó¢ÌØ¶ûÐû²¼ÁË2020Äê²úÆ·Çå¾²ÐÔµÄÆÊÎö±¨¸æ¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬ÔÚ2020ÄêÅû¶µÄ231¸öÎó²îÖУ¬£¬£¬ÓÐ109¸ö(47%)ÊÇÓÉÓ¢ÌØ¶ûÔ±¹¤Í¨¹ýÇå¾²Ñо¿·¢Ã÷µÄ£¬£¬£¬¶ø¼ÓÈëÎó²îÉͽðÍýÏëµÄÍⲿÑо¿Ö°Ô±±¨¸æÁË105¸öÎó²î£¨45£¥£©¡£¡£¡£¡£±ðµÄ£¬£¬£¬ÓÉÍⲿ·¢Ã÷µÄ´ó²¿·ÖÎó²î¶¼±£´æÓÚÔÚÈí¼þÖУ¬£¬£¬Ö÷ÒªÔÚÓÃÓÚͼÐΡ¢ÍøÂçºÍÀ¶ÑÀ×é¼þµÄÈí¼þÊÊÓóÌÐòºÍÈí¼þÇý¶¯³ÌÐòÖС£¡£¡£¡£ÆäÖУ¬£¬£¬Çý¶¯³ÌÐòºÍÆäËûÈí¼þ×é¼þÖеÄÎó²î×î¶à£¬£¬£¬Îª93¸ö£»£»£»Æä´ÎΪ¹Ì¼þ£¬£¬£¬±£´æ66¸öÎó²î£»£»£»¶øÓÐ58¸öÎó²îÓ°Ïìµ½¹Ì¼þºÍÈí¼þµÄ×éºÏ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://blogs.intel.com/technology/2021/03/ipas-intel-2020-product-security-report/#gs.vg4enn


3¡¢FlagstarÒøÐеĿͻ§ÐÅϢй¶£¬£¬£¬²¢ÓÀÊÀ×èֹʹÓÃAccellion


3.jpg


×ܲ¿Î»ÓÚÃÜЪ¸ùÖݵÄFlagstarÒøÐеĿͻ§ÐÅϢй¶£¬£¬£¬²¢Ðû²¼½«ÓÀÊÀ×èֹʹÓÃAccellion¡£¡£¡£¡£¸ÃÒøÐÐÊÇFlagstar BancorpµÄ×Ó¹«Ë¾£¬£¬£¬ÎªÃÀ¹ú¿Í»§ÌṩµäÖÊºÍÆäËû½ðÈÚЧÀÍ¡£¡£¡£¡£´Ë´ÎÊý¾Ýй¶ÊÇÓÉÓÚÆäʹÓõĴ«Êä´óÎļþµÄAccellion FTAÎļþ¹²Ïí³ÌÐò±£´æÒѱ»ÔÚҰʹÓõÄ0day¶øµ¼Öµġ£¡£¡£¡£¸Ã×éÖ¯³ÆÆäÓÚ2021Äê1ÔÂ22ÈÕµÃÖª´ËÊÂÎñ£¬£¬£¬ÏÖÔÚ²¢Î´Í¸Â¶Ó°ÏìµÄ¿Í»§ÊýÄ¿ÒÔ¼°Ð¹Â¶Êý¾ÝµÄÖÖÀ࣬£¬£¬µ«ÌåÏÖFlagstar½«ÓÀÊÀ×èֹʹÓÃAccellionÎļþ¹²ÏíÆ½Ì¨¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/flagstar-bank-customer-data-breached-through-accellion-hack/


4¡¢Å·ÖÞÒøÐÐÖÎÀí¾ÖµÄExchangeЧÀÍÆ÷Ôâµ½¹¥»÷£¬£¬£¬Óʼþϵͳ¹Ø±Õ


4.jpg


Å·ÖÞÒøÐÐÖÎÀí¾Ö£¨EBA£©³ÆÆäExchangeЧÀÍÆ÷Ôâµ½¹¥»÷£¬£¬£¬ËùÓÐÓʼþϵͳÒѾ­¹Ø±Õ¡£¡£¡£¡£EBAÊÇÅ·ÖÞ½ðÈÚî¿ÏµÏµÍ³µÄÒ»²¿·Ö£¬£¬£¬ËüÈÏÕæ¼àÊÓÅ·ÃËÒøÐÐÒµµÄÕûÌåÓÐÐòÔË×÷¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬¸ÃÊÂÎñÈÔÔÚÊÓ²ìÖУ¬£¬£¬Éв»È·¶¨ºÚ¿Í»á¼ûÁËʲôÊý¾Ý¡£¡£¡£¡£¸Ã×éÖ¯ÔÚÉÏÖÜÈյijõ³ÌÐò²é³Æ£¬£¬£¬¹¥»÷Õß¿ÉÄÜÒѾ­»á¼ûÁË´æ´¢ÔÚµç×ÓÓʼþЧÀÍÆ÷ÉϵÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£µ«ÔÚ±¾ÖÜÒ»µÄÔö²¹¸üÐÂÖÐÌåÏÖ£¬£¬£¬µç×Óȡ֤Àú³ÌÖÐûÓз¢Ã÷Êý¾Ýй¶µÄ¼£Ï󡣡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/european-banking-authority-discloses-exchange-server-hack/


5¡¢Ñо¿ÍŶӷ¢Ã÷½©Ê¬ÍøÂçz0MinerÍÚ¿óµÄ¹¥»÷»î¶¯


5.jpg


Ñо¿ÍŶӷ¢Ã÷½©Ê¬ÍøÂçz0MinerÊÔͼ¿ØÖÆJenkinsºÍElasticSearchЧÀÍÆ÷À´ÍÚ¾òMonero£¨XMR£©¼ÓÃÜÇ®±ÒµÄ¹¥»÷»î¶¯¡£¡£¡£¡£z0MinerÊÇÈ¥ÄêÔÚ11Ô±»·¢Ã÷µÄÒ»ÖÖÍÚ¿ó¶ñÒâÈí¼þ£¬£¬£¬ÆäʹÓÃWeblogicÎó²îѬȾÁËÊýǧ̨ЧÀÍÆ÷¡£¡£¡£¡£¶ø´Ë´Î»î¶¯Ê¹ÓÃÁËElasticSearchÖеÄRCEÎó²î£¨CVE-2015-1427£©ºÍÓ°ÏìÁËJenkinsЧÀÍÆ÷µÄÒ»¸ö¹ÅÀϵÄRCE¡£¡£¡£¡£ÔÚÈëÇÖЧÀÍÆ÷ºó£¬£¬£¬¸Ã¶ñÒâÈí¼þ½«ÏÈÏÂÔØ¶ñÒâshell¾ç±¾£¬£¬£¬È»ºóѰÕÒ²¢É¾³ýÒÔǰװÖõÄÍÚ¿ó¾ç±¾¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/z0miner-botnet-hunts-for-unpatched-elasticsearch-jenkins-servers/