VMware vCenter Server¼°Cloud FoundationÆØÒªº¦Çå¾²Îó²î

Ðû²¼Ê±¼ä 2024-09-19
1. VMware vCenter Server¼°Cloud FoundationÆØÒªº¦Çå¾²Îó²î


9ÔÂ18ÈÕ £¬VMware¹«Ë¾½üÆÚ½ÒÆÆÁËÁ½¸öÕë¶ÔÆävCenter ServerºÍCloud Foundation²úÆ·µÄÖØ´óÇå¾²Îó²î £¬CVE-2024-38812ºÍCVE-2024-38813 £¬»®·ÖÉæ¼°¶ÑÒç³öºÍȨÏÞÌáÉýÎÊÌâ £¬¶ÔvCenter Server 7.0ºÍ8.0¼°Cloud Foundation 4.xºÍ5.x°æ±¾×é³ÉÍþв ¡£CVE-2024-38812ÓÈΪÑÏÖØ £¬CVSSÆÀ·Ö¸ß´ï9.8 £¬ÔÊÐíÓµÓÐÍøÂç»á¼ûȨÏ޵Ĺ¥»÷Õßͨ¹ý·¢ËͶ¨ÖÆÊý¾Ý°üÖ´ÐÐÔ¶³Ì´úÂë ¡£¶øCVE-2024-38813ÔòÄÜÈù¥»÷Õß½«È¨ÏÞÌáÉýÖÁroot¼¶±ð £¬CVSSÆÀ·ÖΪ7.5 ¡£VMwareÒÑѸËÙÏìÓ¦ £¬Ðû²¼ÁËÐÞ²¹³ÌÐò £¬²¢Ç¿ÁÒ±Þ²ßÓû§Á¬Ã¦Éý¼¶ÖÁ×îа汾£¨vCenter Server 8.0 U3b»ò7.0 U3s £¬Cloud FoundationÔòÓ¦ÓÃKB88287ÖеÄÒì²½²¹¶ ¡£© ¡£Ö»¹ÜÏÖÔÚδ·¢Ã÷ÕâЩÎó²îµÄÒ°ÍâʹÓð¸Àý £¬µ«¼øÓÚvCenter ServerÔÚÐéÄ⻯ÇéÐÎÖÎÀíÖеĽ¹µãְλ £¬ÆäDZÔÚΣº¦½ûÖ¹ºöÊÓ ¡£


https://cybersecuritynews.com/vmware-vcenter-server-remote-code/#google_vignette


2. CISA ÖÒÑÔ Adobe Flash Player Îó²îÕý±»Æð¾¢Ê¹ÓÃ


9ÔÂ17ÈÕ £¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©½üÆÚ½«ËĸöÑÏÖصÄAdobe Flash PlayerÎó²îÁÐÈëÆäÒÑÖª¿ÉʹÓÃÎó²î£¨KEV£©Ä¿Â¼ÖÐ £¬ÕâЩÎó²îµÄÆعâÔÙ´Î͹ÏÔÁ˼´±ãÔÚFlash PlayerÒÑÐû²¼ÓÚ2020ÄêÖÕֹʹÓúó £¬ÒÅÁôÈí¼þÎó²îµÄÒ»Á¬Çå¾²Íþв ¡£ÕâЩÎó²î £¬°üÀ¨¿É×·ËÝÖÁ2013ÄêµÄCVE-2013-0643ºÍCVE-2013-0648´úÂëÖ´ÐÐÎó²î £¬ÒÔ¼°2014ÄêµÄCVE-2014-0497ÕûÊýÏÂÒçºÍCVE-2014-0502Ë«ÖØÊÍ·ÅÎó²î £¬¶¼ÔøÊÇÁãÈÕ¹¥»÷µÄÄ¿µÄ £¬¶ÔFirefoxÓû§µÈ×é³ÉÍþв ¡£Ö»¹ÜFlash PlayerÔøÊÇÍøÂ绥¶¯ÄÚÈݵĻùʯ £¬µ«Ëæ×Åʱ¼äµÄÍÆÒÆ £¬ËüÒѳÉΪÖ÷ÒªµÄÇå¾²Òþ»¼ £¬ÆµÈÔÊܵ½¹¥»÷ÕßʹÓà ¡£CISAÒò´Ë½ôÆȺôÓõËùÓÐÁª°î»ú¹¹ÔÚ2024Äê10ÔÂ8ÈÕÇ°³¹µ×ÒƳýFlash Player £¬ÒÔ½µµÍDZÔÚµÄÇ徲Σº¦ £¬±£»¤Ãô¸ÐÕþ¸®Êý¾ÝºÍÒªº¦»ù´¡ÉèÊ©ÃâÊÜË𺦠¡£Adobe×Ô2020ÄêÆðÒÑ×èÖ¹Flash PlayerµÄ¿ª·¢ £¬Ö÷Á÷ä¯ÀÀÆ÷Ò²²»ÔÙ¼æÈÝ £¬ËäÈ» Flash Ò»¾­ÔÚ»¥ÁªÍøµÄÉú³¤ÖÐÊ©Õ¹¹ýÖ÷Òª×÷Óà £¬µ«ÆäÇ徲Σº¦ÒÑʹÆä¹ýʱ ¡£


https://securityonline.info/cisa-warns-of-actively-exploited-adobe-flash-player-vulnerabilities/


3. UNC2970×é֯ʹÓÃľÂí»¯PDFÔĶÁÆ÷¹¥»÷Òªº¦»ù´¡ÉèÊ©


9ÔÂ17ÈÕ £¬MandiantÕ¹ÏÖÁËÓ볯ÏʹØÁªµÄUNC2970×éÖ¯ÌᳫµÄÖØ´óÍøÂçÌع¤Ô˶¯ £¬¸Ã×é֯ʹÓø߶ȶ¨ÖƵÄÍøÂç´¹ÂÚÊֶΠ£¬Õë¶ÔÄÜÔ´ºÍº½¿Õº½ÌìµÈÒªº¦ÐÐÒµµÄ¸ß¼¶Ô±¹¤ ¡£UNC2970ͨ¹ýαװ³É×ÅÃûÆóÒµµÄÊÂÇéʱ»úÓÕ¶ü £¬ÏòÄ¿µÄ·¢ËÍ°üÀ¨Ä¾Âí»¯SumatraPDFÔĶÁÆ÷µÄZIPÎļþ £¬¸ÃÔĶÁÆ÷ÄÚǶMISTPENºóÃÅ £¬Ò»µ©Êܺ¦ÕßʹÓÃÆä·­¿ªÎ±×°³ÉְλÐÎòµÄPDFÎļþ £¬¼´´¥·¢Ñ¬È¾Á´ ¡£MISTPEN×÷ΪһÖÖÒþÃع¤¾ß £¬Ö§³Ö¶àÖÖ¶ñÒâ²Ù×÷ £¬Ê¹ÓÃÕýµ±·þÎñÈÚÈëÍøÂçÁ÷Á¿ £¬ÒÔʵÏÖºã¾Ã¿ØÖƺÍÊý¾ÝÇÔÈ¡ ¡£UNC2970ͨ¹ýÐ޸ĿªÔ´Èí¼þ´úÂëºÍÈ«ÐÄÉè¼ÆµÄְλÐÎò £¬Ìá¸ßÁ˹¥»÷µÄÒþ²ØÐÔºÍÀÖ³ÉÂÊ £¬¶Ô¶à¸ö¹ú¼ÒµÄ»ù´¡ÉèÊ©Çå¾²×é³ÉÖØ´óÍþв ¡£¼øÓÚÆäÕë¶ÔÒªº¦ÁìÓòµÄÔ˶¯ £¬Ïà¹Ø×éÖ¯Ðè½ôÆÈÔöÇ¿·ÀÓù²½·¥ £¬ÒÔµÖÓù´ËÀà¸ß¼¶ÍøÂç´¹ÂÚ¹¥»÷ ¡£


https://securityonline.info/unc2970s-backdoor-deployed-via-trojanized-pdf-reader-targets-critical-infrastructure/


4. ¶íÂÞ˹Çå¾²¹«Ë¾Dr.WebÔâºÚ¿Í¹¥»÷


9ÔÂ18ÈÕ £¬¶íÂÞ˹×ÅÃûµÄ·´¶ñÒâÈí¼þ¹«Ë¾Doctor Web£¨Dr.Web£©¹ûÕæÐû²¼ £¬ÆäIT»ù´¡ÉèÊ©ÔâÓöÁËÍøÂç¹¥»÷ £¬²¢Òò´Ë·¢Ã÷ÁËÇå¾²Îó²î ¡£ÃæÁÙÕâÒ»½ôÆÈÇéÐÎ £¬Dr.WebѸËÙ½ÓÄÉÐж¯ £¬ÇжÏÁËËùÓзþÎñÆ÷ÓëÄÚ²¿ÍøÂçµÄÅþÁ¬ £¬ÒÔ±ÜÃâ¹¥»÷½øÒ»²½À©É¢ ¡£´Ë´Î¹¥»÷ʼÓÚ9ÔÂ14ÈÕ £¬Dr.WebËæ¼´Õö¿ªÁËÏ꾡µÄÊӲ첢ÑÏÃܼà¿ØÊÂ̬Éú³¤ ¡£ÔÚÊÓ²ìʱ´ú £¬ÎªÁË°ü¹Ü¿Í»§Çå¾² £¬Dr.Web²»µÃ²»ÔÚÖÜÒ»ÔÝÍ£Á˲¡¶¾Êý¾Ý¿âµÄ¸üзþÎñ ¡£È»¶ø £¬¹«Ë¾Ç¿µ÷ £¬¶Ô»ù´¡ÉèÊ©µÄÆÆËðÍýÏëÒѱ»ÊµÊ±×èÖ¹ £¬ËùÓÐÊÜDr.Web±£»¤µÄÓû§ÏµÍ³¾ùδÊܵ½Ó°Ïì ¡£ÖÜÈý £¬Dr.WebÐû²¼Òѻָ´²¡¶¾Êý¾Ý¿âµÄ¸üзþÎñ £¬²¢È·ÈÏ´Ë´ÎÇå¾²ÊÂÎñ²¢Î´¸øÆä¿Í»§´øÀ´ÈκθºÃæÓ°Ïì ¡£Îª³¹µ×Ïû³ýÇå¾²Íþв £¬Dr.Web½ÓÄÉÁË°üÀ¨Ê¹ÓÃÊÊÓÃÓÚLinuxµÄDr.Web FixIt!ÔÚÄÚµÄһϵÁÐÓ¦¼±²½·¥ £¬²¢ÀֳɸôÀëÁËDZÔÚΣº¦ ¡£¹«Ë¾ÍøÂçµÄÊý¾ÝΪÇ徲ר¼ÒÌṩÁËÒªº¦ÐÅÏ¢ £¬×ÊÖúËûÃÇÈ·±£ÏµÍ³Çå¾²ÎÞÓÝ ¡£


https://www.bleepingcomputer.com/news/security/russian-security-firm-drweb-disconnects-all-servers-after-breach/


5. FleetPanda·þÎñÆ÷ÉèÖùýʧ̻¶°ÙÍò·ÝÃô¸ÐÎļþ


9ÔÂ18ÈÕ £¬Ê¯ÓÍÓëȼÁÏÐÐÒµµÄÁìÏÈÈí¼þ¹©Ó¦ÉÌFleetPandaÒò·þÎñÆ÷ÉèÖùýʧ¶øÔâÓöÁËÑÏÖصÄÊý¾Ýй¶ÊÂÎñ £¬½ü°ÙÍò·ÝÃô¸ÐÎļþ±»²»·¨Ì»Â¶ ¡£ÕâЩÎļþº­¸ÇÁË´Ó2019ÄêÖÁ2024Äê8Ôµķ¢Æ±¡¢ÔËÊä¼Í¼¡¢¼ÝÕÕÐÅÏ¢¼°Åä¾°ÊÓ²ìµÈ £¬Éæ¼°¼ÓÖÝ¡¢¶íÀÕ¸Ô¡¢µÂ¿ËÈø˹µÈ¶à¸öÖÝ £¬×ÜÁ¿¸ß´ï193GB ¡£ÍøÂçÇ徲ר¼ÒJeremiah Fowler·¢Ã÷ÁËÕâһδÊܱ£»¤µÄÊý¾Ý¿â £¬ÆäÄÚÈÝÏ꾡µØÕ¹ÏÖÁËÐÐÒµÄÚµÄȼÁÏÔËÊäÓëÓªÒµÍùÀ´ £¬ÉõÖÁ°üÀ¨ÁËÉç»áÇå¾²ºÅÂëµÈ¸ß¶ÈÃô¸ÐµÄСÎÒ˽¼ÒÐÅÏ¢ ¡£´Ë´Îй¶²»µ«Íþвµ½Ð¡ÎÒ˽¼ÒÒþ˽Çå¾² £¬»¹¿ÉÄÜÒý·¢Éí·Ý͵ÇԺ;­¼ÃËðʧ £¬Í¬Ê± £¬·¸·¨·Ö×Ó¿ÉÄÜʹÓ÷¢Æ±ÐÅϢʵÑéڲƭÐÐΪ ¡£¶ÔʯÓͺÍȼÁÏÐÐÒµ¶øÑÔ £¬¹©Ó¦Á´µÄÎȹÌÐÔºÍÐÅÏ¢Çå¾²ÒàÊܵ½¹¥»÷ £¬¿ÉÄÜÒý·¢Êг¡²¨¶¯ºÍ¼ÛÇ®ÉÏÕÇ ¡£Fowler½¨ÒéÆóÒµÓ¦½«Ãô¸ÐÊý¾ÝÓëÒ»Ñùƽ³£ÓªÒµÎļþÊèÉ¢´æ´¢ £¬Ç¿»¯»á¼û¿ØÖÆ £¬°´ÆÚ¸üÐÂϵͳ²¢ÔöÇ¿Ô±¹¤Åàѵ £¬ÒÔ¹¹½¨Ô½·¢Îȹ̵ÄÍøÂçÇå¾²·ÀµØ ¡£


https://hackread.com/server-misconfiguration-fuel-software-exposed-pii-data/


6. Delta Primeƽ̨ÔâÊÜÍøÂç¹¥»÷ £¬¼ÓÃÜÇ®±ÒʧÔô½üÁù°ÙÍòÃÀÔª


9ÔÂ18ÈÕ £¬Delta Primeƽ̨½üÆÚÔâÓöÑÏÖØÍøÂç¹¥»÷ £¬µ¼Ö¼ÛÖµ¸ß´ïÔ¼600ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò±»µÁ £¬Ô¶³¬×î³õ±¨¸æµÄ450ÍòÃÀÔªËðʧ ¡£Çø¿éÁ´Çå¾²¹«Ë¾CyversÓÚ9ÔÂ16ÈÕÂÊÏȽÒÆÆ´ËÊ £¬Ö¸³öºÚ¿ÍÒÑ×îÏȽ«ÍµÈ¡µÄUSDCת»»ÎªETH £¬²¢ÖÒÑÔÔÚ¼ì²â³õÆÚ £¬ºÚ¿ÍÇ®°üÈÔÒ»Á¬´Óƽ̨³é×Ê £¬Íþв½øÒ»²½Ëðʧ ¡£Ëæºó £¬Fuzzland´ú±íÈ·ÈÏÁËËðʧ×ܶîÒÑÅÊÉýÖÁ½ü600ÍòÃÀÔª £¬²¢Õ¹ÏÖ±£´æ¸ü¶à¶ñÒâÉúÒâÔ˶¯ ¡£´Ë´ÎÈëÇÖ±»¹éÒòÓÚDelta Primeƽ̨Ǯ°ü¹ÜÀíÔ±ÃÜԿʧÔô £¬ºÚ¿Íµ½ÊÖºó¿ØÖÆÁËÍйÜÊðÀíºÏÔ¼µÄÇ®°ü £¬½ø¶øÐ޸ĺÏÔ¼ÉèÖà £¬½«ÆäÖض¨ÏòÖÁ¶ñÒâºÏÔ¼ £¬´Ó¶øÔÚArbitrumÍøÂçÉÏ·Å×ÝÇÔÈ¡×ʽ𠣬×ÜËðʧ¹ÀËãµÖ´ï590ÍòÃÀÔª ¡£ÕâÒ»ÊÂÎñÒýÆðÁËÍøÂçÇå¾²ÁìÓòµÄ¸ß¶È¹Ø×¢ £¬×¨¼ÒÖÒÑÔºÚ¿ÍδÀ´¿ÉÄÜÃé×¼¸ü´ó¹æÄ£µÄÄ¿µÄ £¬ÌØÊâÊÇÃÀ¹ú¼ÓÃÜÇ®±ÒETF»ù½ð £¬ÆäÖØ´óµÄ±ÈÌرҴ¢±¸¶ÔºÚ¿Í¼«¾ßÓÕ»óÁ¦ £¬°üÀ¨³¯ÏÊLazarus¼¯ÍŵÈDZÔÚÍþв ¡£¾ÝDuneÆÊÎöƽ̨Êý¾ÝÏÔʾ £¬±ÈÌرÒÖ§³ÖµÄETF×Ü×ʲúÒѸߴï534ÒÚÃÀÔª £¬½øÒ»²½Í¹ÏÔÁË´ËÀà×ʲúµÄÇ徲Σº¦ ¡£


https://securityonline.info/cyberattack-on-delta-prime-losses-soar-to-6m/