ÐÅÏ¢Çå¾²Öܱ¨-2021ÄêµÚ20ÖÜ

Ðû²¼Ê±¼ä 2021-05-17

> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2021Äê05ÔÂ10ÈÕÖÁ05ÔÂ16ÈÕ¹²ÊÕ¼Çå¾²Îó²î70¸ö£¬£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇMicrosoft Exchange Server CVE-2021-31198Ô¶³Ì´úÂëÖ´ÐÐÎó²î£»£»£»£»SAP Business Warehouse´úÂë×¢ÈëÖ´ÐÐÎó²î£»£»£»£»EnvoyproxyÊÚÈ¨ÈÆ¹ýÎó²î£»£»£»£»Rockwell Automation Connected Components Workbench·´ÐòÁл¯´úÂëÖ´ÐÐÎó²î£»£»£»£»Adobe After Effects CVE-2021-28571ÏÂÁî×¢ÈëÎó²î¡£¡£¡£¡£¡£ ¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÃÀ¹úColonial PipelineѬȾÀÕË÷Èí¼þ£¬£¬£¬£¬£¬£¬Ö÷ÒªÊäÓ͹ÜÍ£ÔË£»£»£»£»CISA¡¢NCSC¡¢FBIÓëNSAÁªºÏÐû²¼ÓйضíÂÞ˹SVRµÄ×Éѯ£»£»£»£»Ñо¿ÍŶӳÆ1.28ÒÚiOSÓû§ÒÑѬȾ¶ñÒâÈí¼þXcodeGhost£»£»£»£»TorÍøÂçÐÂÔöÊýǧ¸ö¶ñÒâ½Ó¿Ú£¬£¬£¬£¬£¬£¬¼àÌý¼ÓÃÜÇ®±ÒÏà¹ØµÄÁ÷Á¿£»£»£»£»MicrosoftÐû²¼5Ô²¹¶¡£¬£¬£¬£¬£¬£¬ÐÞ¸´3¸ö0dayÔÚÄÚµÄ55¸öÎó²î¡£¡£¡£¡£¡£ ¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£ ¡£


> Ö÷ÒªÇå¾²Îó²îÁбí


1.Microsoft Exchange Server CVE-2021-31198Ô¶³Ì´úÂëÖ´ÐÐÎó²î


Microsoft Exchange Server±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉʹӦÓóÌÐòÍ߽⣬£¬£¬£¬£¬£¬Ôì³É¾Ü¾øÐ§À͹¥»÷¡£¡£¡£¡£¡£ ¡£

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31198


2.SAP Business Warehouse´úÂë×¢ÈëÖ´ÐÐÎó²î


SAP Business Warehouse±£´æÊäÈëÑéÖ¤Çå¾²Îó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£ ¡£

https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=576094655


3.EnvoyproxyÊÚÈ¨ÈÆ¹ýÎó²î


Envoyproxy´¦Öóͷ£URI·¾¶ÉÏתÒå·û(%2F, %2f, %5C, »ò%5c)±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉÈÆ¹ýÊÚȨ£¬£¬£¬£¬£¬£¬Î´ÊÚȨ»á¼û¡£¡£¡£¡£¡£ ¡£

https://access.redhat.com/security/cve/cve-2021-29492


4.Rockwell Automation Connected Components Workbench·´ÐòÁл¯´úÂëÖ´ÐÐÎó²î


Rockwell Automation Connected Components Workbench´¦Öóͷ£¶ñÒ⹤¾ß±£´æ·´ÐòÁл¯Îó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£ ¡£

https://us-cert.cisa.gov/ics/advisories/icsa-21-133-01


5.Adobe After Effects CVE-2021-28571ÏÂÁî×¢ÈëÎó²î


Adobe After Effects±£´æÏÂÁî×¢ÈëÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§ÒâOSÏÂÁî¡£¡£¡£¡£¡£ ¡£

https://helpx.adobe.com/security/products/after_effects/apsb21-33.html


> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢ÃÀ¹úColonial PipelineѬȾÀÕË÷Èí¼þ£¬£¬£¬£¬£¬£¬Ö÷ÒªÊäÓ͹ÜÍ£ÔË


1.jpg


ÃÀ¹ú×î´óµÄȼÁϹܵÀ¹«Ë¾Colonial PipelineÔâµ½ÀÕË÷Èí¼þ¹¥»÷£¬£¬£¬£¬£¬£¬5500Ó¢ÀïÊäÓ͹ÜÍ£ÔË¡£¡£¡£¡£¡£ ¡£Colonial PipelineÌìÌì´ÓµÂ¿ËÈøË¹ÖÝÔËËÍ250ÍòͰʯÓ͵½¶«º£°¶ºÍŦԼ£¬£¬£¬£¬£¬£¬¸Ã¹ÜµÀÁýÕÖÁËÃÀ¹ú¶«º£°¶45£¥µÄȼÁϹ©Ó¦¡£¡£¡£¡£¡£ ¡£¸Ã¹«Ë¾ÔÚÉÏÖÜÁùÌåÏÖ£¬£¬£¬£¬£¬£¬ÆäÓÚ5ÔÂ7ÈÕÔâµ½ÀÕË÷¹¥»÷£¬£¬£¬£¬£¬£¬·¢Ã÷¹¥»÷ºó×Ô¶¯¹Ø±ÕÁËÒªº¦µÄϵͳÒÔ×èÖ¹Èö²¥£¬£¬£¬£¬£¬£¬ÏÖÔÚÕýÓëÇå¾²¹«Ë¾ÏàÖú¶Ô¸ÃÊÂÎñµÄÐÔ×Ӻ͹æÄ£¾ÙÐÐÊӲ졣¡£¡£¡£¡£ ¡£ÃÀ¹úµÄij¹ÙÔ±³Æ£¬£¬£¬£¬£¬£¬´Ë´ÎÀÕË÷¹¥»÷ÊÂÎñÓëDarkSideÍÅ»ïÓйØ¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/largest-us-pipeline-shuts-down-operations-after-ransomware-attack/


2¡¢CISA¡¢NCSC¡¢FBIÓëNSAÁªºÏÐû²¼ÓйضíÂÞ˹SVRµÄ×Éѯ


2.jpg


CISAÓëÓ¢¹ú¹ú¼ÒÍøÂçÇå¾²ÖÐÐÄ£¨NCSC£©¡¢Áª°îÊÓ²ì¾Ö£¨FBI£©ºÍ¹ú¼ÒÇå¾²¾Ö£¨NSA£©ÁªºÏÐû²¼ÓйضíÂÞ˹SVRµÄÇå¾²×Éѯ¡£¡£¡£¡£¡£ ¡£¸Ã×Éѯָ³öSVRËÆºõÒÑͨ¹ý¸ü¸ÄÆäÊÖÒպͳÌÐò£¨TTP£©£¬£¬£¬£¬£¬£¬À´×èÖ¹×éÖ¯·¢Ã÷Æä»î¶¯ºÍ½ÓÄɵ÷½â²½·¥¡£¡£¡£¡£¡£ ¡£±ðµÄ£¬£¬£¬£¬£¬£¬SVRÖ÷ÒªÕë¶ÔÕþ¸®¡¢Öǿ⡢Õþ²ßºÍÄÜÔ´Ïà¹ØµÄ×éÖ¯£¬£¬£¬£¬£¬£¬ÒÔ¼°ÓÐʱЧÐÔµÄÄ¿µÄ£¬£¬£¬£¬£¬£¬ÀýÈç2020ÄêÓëCOVID-19ÒßÃçÏà¹ØµÄ×éÖ¯¡£¡£¡£¡£¡£ ¡£ºÚ¿ÍÖ÷ҪʹÓÃÁËCVE-2018-13379¡¢CVE-2019-1653ºÍCVE-2019-2725µÈ11¸öÎó²î¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/current-activity/2021/05/07/joint-ncsc-cisa-fbi-nsa-cybersecurity-advisory-russian-svr


3¡¢Ñо¿ÍŶӳÆ1.28ÒÚiOSÓû§ÒÑѬȾ¶ñÒâÈí¼þXcodeGhost


3.jpg


Ñо¿ÍŶӳÆ£¬£¬£¬£¬£¬£¬ÔÚ×î½üµÄ¶ñÒâÈí¼þ¹¥»÷ÖУ¬£¬£¬£¬£¬£¬Áè¼Ý1.28ÒÚiOSÓû§³ÉΪ¹¥»÷Ä¿µÄ¡£¡£¡£¡£¡£ ¡£¹¥»÷ÕßÔڴ˴λÖÐʹÓÃÁËXcodeGhost£¬£¬£¬£¬£¬£¬¸Ã¶ñÒâÈí¼þÓÚ2015ÄêÊ״ηºÆð¡£¡£¡£¡£¡£ ¡£AppleÖÒÑԳƣ¬£¬£¬£¬£¬£¬Ô¼Äª2500¸öÓ¦ÓÃѬȾÁ˶ñÒâXcode´úÂë¡£¡£¡£¡£¡£ ¡£¾Ý±¨µÀ£¬£¬£¬£¬£¬£¬ÆäÖÐÔ¼55%µÄÓû§ÊÇÖйúÈË£¬£¬£¬£¬£¬£¬¶ø66%µÄÏÂÔØÁ¿ÓëÖйúÓйØ¡£¡£¡£¡£¡£ ¡£ÌØÊâÊÇ£¬£¬£¬£¬£¬£¬Ò»Ð©¹ãÊܽӴýµÄÓ¦ÓÃÒ²ÒÑѬȾÁ˸öñÒâÈí¼þ£¬£¬£¬£¬£¬£¬°üÀ¨ÓÎÏ·¡°ÄÕÅ­µÄСÄñ2¡±¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2021/05/xcodeghost-malware-infected-around-128m.html


4¡¢TorÍøÂçÐÂÔöÊýǧ¸ö¶ñÒâ½Ó¿Ú£¬£¬£¬£¬£¬£¬¼àÌý¼ÓÃÜÇ®±ÒÏà¹ØµÄÁ÷Á¿


4.jpg


The Record³Æ£¬£¬£¬£¬£¬£¬×Ô2020ÄêÒÔÀ´TorÍøÂçÐÂÔöÊýǧ¸ö¶ñÒâ½Ó¿Ú£¬£¬£¬£¬£¬£¬¼àÌý¼ÓÃÜÇ®±ÒÏà¹ØÍøÕ¾µÄÁ÷Á¿¡£¡£¡£¡£¡£ ¡£ÔÚÕë¶ÔTorÍøÂçµÄ¹¥»÷ÖУ¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉʹÓÃÆä¿ØÖÆµÄÇ®°üÌæ»»Õýµ±Ç®°üµÄµØµãÀ´Ð®ÖÆÉúÒâ¡£¡£¡£¡£¡£ ¡£±ðµÄ£¬£¬£¬£¬£¬£¬Nusenu·¢Ã÷ºÚ¿ÍÒѾ­Á½´ÎÍ»ÆÆÁËÆä×Ô2020Äê5ÔÂÒÔÀ´µÄ¼Í¼(¶ñÒâ½Ó¿Ú±ÈÀýΪ23%):2020Äê10ÔÂ30ÈÕ£¬£¬£¬£¬£¬£¬ºÚ¿ÍÍÅ»ïʹÓÃÁËÁè¼Ý26%µÄtorÍøÂç½Ó¿Ú£¬£¬£¬£¬£¬£¬µ½2021Äê02ÔÂ02ÈÕ£¬£¬£¬£¬£¬£¬ÆäÒѾ­ÖÎÀíÁËÁè¼Ý27%µÄ½Ó¿Ú¡£¡£¡£¡£¡£ ¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬¶ñÒâ½Ó¿Ú¾ùÒÑ´ÓTorÍøÂçÖÐÒÆ³ý¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/117749/deep-web/tor-exit-nodes-ssl-stripping.html


5¡¢MicrosoftÐû²¼5Ô²¹¶¡£¬£¬£¬£¬£¬£¬ÐÞ¸´3¸ö0dayÔÚÄÚµÄ55¸öÎó²î


5.jpg


MicrosoftÐû²¼5Ô·ݵÄÖܶþ²¹¶¡£¬£¬£¬£¬£¬£¬ÐÞ¸´°üÀ¨3¸ö0dayÔÚÄÚµÄ55¸öÎó²î¡£¡£¡£¡£¡£ ¡£´Ë´ÎÐÞ¸´µÄ0 day»®·ÖÊÇNETºÍVisual StudioÖеÄÌáȨÎó²î£¨CVE-2021-31204£©¡¢Microsoft Exchange ServerÖеÄÇå¾²¹¦Ð§ÈƹýÎó²î£¨CVE-2021-31207£©ºÍͨÓù¤¾ßÖеÄÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2021-31200£©£¬£¬£¬£¬£¬£¬ÕâЩÎó²î»¹Î´±»ÔÚҰʹÓᣡ£¡£¡£¡£ ¡£±ðµÄ£¬£¬£¬£¬£¬£¬»¹ÐÞ¸´ÁËHTTP.sysÖеÄÔ¶³ÌÖ´ÐдúÂëÎó²î£¨CVE-2021-31166£©ºÍIEä¯ÀÀÆ÷ÖеÄÄÚ´æËð»µÎó²î£¨CVE-2021-26419£©µÈÎó²î¡£¡£¡£¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/microsoft-patch-tuesday-55-vulnerabilities-4-critical-3-publicly-known