¡¾Îó²îͨ¸æ¡¿CleoÔ¶³Ì´úÂëÖ´ÐÐÎó²î ( CVE-2024-50623 )
Ðû²¼Ê±¼ä 2024-12-13Ò»¡¢Îó²î¸ÅÊö
Îó²îÃû³Æ | CleoÔ¶³Ì´úÂëÖ´ÐÐÎó²î | ||
CVE ID | CVE-2024-50623 | ||
Îó²îÀàÐÍ | ÎļþÉÏ´«ºÍÏÂÔØ | ·¢Ã÷ʱ¼ä | 2024-12-13 |
Îó²îÆÀ·Ö | 8.8 | Îó²îÆ·¼¶ | ¸ßΣ |
¹¥»÷ÏòÁ¿ | ÍøÂç | ËùÐèȨÏÞ | ÎÞ |
ʹÓÃÄÑ¶È | µÍ | Óû§½»»¥ | ÊÇ |
PoC/EXP | ÒѹûÕæ | ÔÚҰʹÓà | ÒÑ·¢Ã÷ |
Cleo LexiCom¡¢VLTransfer ºÍ Harmony ¶¼ÊÇÓÃÓÚÊý¾Ý´«Êä¡¢ÆóÒµ¼¯³ÉºÍµç×ÓÊý¾Ý½»Á÷£¨EDI£©µÈʹÃüµÄÈí¼þ¹¤¾ß£¬Ö÷ÒªÓ¦ÓÃÓÚÆóÒµ¼äµÄÎļþ½»Á÷¡¢¹©Ó¦Á´ÖÎÀíµÈÁìÓò¡£
2024Äê12ÔÂ13ÈÕ£¬ÓÅ·¢¹ú¼ÊÍøÕ¾¹ÙÍø¼¯ÍÅVSRC¼à²âµ½Cleo LexiCom¡¢VLTransfer ºÍ Harmony²úÆ·Öб£´æÒ»¸öÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2024-50623£©£¬ÆäCVSSÆÀ·ÖΪ8.8£¬ÏÖÔÚ¸ÃÎó²îµÄʹÓÃϸ½Ú¼°PoCÒѹûÕ棬ÇÒÒÑ·¢Ã÷±»Ê¹Óá£
Cleo LexiCom¡¢VLTransfer ºÍ HarmonyÈí¼þÖб£´æ²»ÊÜÏÞÖƵÄÎļþÉÏ´«ºÍÏÂÔØÎó²î£¬ÓÉÓÚȱ·¦¶ÔÉÏ´«ÎļþºÍÏÂÔع¦Ð§µÄÊʵ±ÑéÖ¤ºÍÏÞÖÆ£¬¹¥»÷Õß¿ÉÄÜʹÓøÃÎó²îÉÏ´«¶ñÒâÎļþ²¢¿ÉÄÜʹÓÃϵͳµÄ»á¼û/ÏÂÔع¦Ð§»òÆäËû»úÖÆ´¥·¢¶ñÒâÎļþÖ´ÐУ¬ÀÖ³ÉʹÓøÃÎó²î¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐУ¬´Ó¶øÔì³ÉÊý¾Ýй¶¡¢¸Ä¶¯£¬ÉõÖÁ½øÒ»²½µÄÍøÂç¹¥»÷¡£
±ðµÄ£¬Cleo LexiCom¡¢VLTransfer ºÍ HarmonyÈí¼þ5.8.0.24֮ǰ°æ±¾Öл¹±£´æÁíÒ»¸öÔ¶³Ì´úÂëÖ´ÐÐ0 dayÎó²î£¨ÔÝÎÞCVE-ID£©£¬¸ÃÎó²îΪCVE-2024-50623Èƹý£¬¹¥»÷Õß¿ÉÄÜͨ¹ýʹÓÃĬÈϵÄAutorunÎļþ¼ÐÉèÖõ¼ÈëºÍÖ´ÐÐí§Òâbash»òPowerShellÏÂÁÏÖÔÚ¸ÃÎó²îµÄʹÓÃϸ½Ú¼°PoCÒѹûÕ棬ÇÒÒѼì²âµ½Îó²îʹÓá£
¶þ¡¢Ó°Ïì¹æÄ£
Cleo Harmony < 5.8.0.24
Cleo VLTrader < 5.8.0.24
Cleo LexiCom < 5.8.0.24
Èý¡¢Çå¾²²½·¥
3.1 Éý¼¶°æ±¾
ÏÖÔÚÕâЩÎó²îÒѾÐÞ¸´£¬ÊÜÓ°ÏìÓû§¿ÉÉý¼¶µ½ÒÔÏ°汾£º
Cleo Harmony >= 5.8.0.24
Cleo VLTrader >= 5.8.0.24
Cleo LexiCom >= 5.8.0.24
3.2 ÔÝʱ²½·¥
ÔÝÎÞ¡£
3.3 ͨÓý¨Òé
? °´ÆÚ¸üÐÂϵͳ²¹¶¡£¬ïÔÌϵͳÎó²î£¬ÌáÉý·þÎñÆ÷µÄÇå¾²ÐÔ¡£
? ÔöǿϵͳºÍÍøÂçµÄ»á¼û¿ØÖÆ£¬Ð޸ķÀ»ðǽսÂÔ£¬¹Ø±Õ·ÇÐëÒªµÄÓ¦Óö˿ڻò·þÎñ£¬ïÔ̽«Î£ÏÕ·þÎñ£¨ÈçSSH¡¢RDPµÈ£©Ì»Â¶µ½¹«Íø£¬ïÔ̹¥»÷Ãæ¡£
? ʹÓÃÆóÒµ¼¶Çå¾²²úÆ·£¬ÌáÉýÆóÒµµÄÍøÂçÇå¾²ÐÔÄÜ¡£
? ÔöǿϵͳÓû§ºÍȨÏÞÖÎÀí£¬ÆôÓöàÒòËØÈÏÖ¤»úÖƺÍ×îСȨÏÞÔÔò£¬Óû§ºÍÈí¼þȨÏÞÓ¦¼á³ÖÔÚ×îµÍÏ޶ȡ£
? ÆôÓÃÇ¿ÃÜÂëÕ½ÂÔ²¢ÉèÖÃΪ°´ÆÚÐ޸ġ£
3.4 ²Î¿¼Á´½Ó
https://support.cleo.com/hc/en-us/articles/27140294267799-Cleo-Product-Security-Advisory-CVE-2024-50623
https://support.cleo.com/hc/en-us/articles/28408134019735-Cleo-Product-Security-Update
https://www.huntress.com/blog/threat-advisory-oh-no-cleo-cleo-software-actively-being-exploited-in-the-wild
https://www.rapid7.com/blog/post/2024/12/11/etr-modular-java-backdoor-dropped-in-cleo-exploitation-campaign/
ËÄ¡¢°æ±¾ÐÅÏ¢
°æ±¾ | ÈÕÆÚ | ±¸×¢ |
V1.0 | 2024-12-13 | Ê×´ÎÐû²¼ |
Îå¡¢¸½Â¼
5.1 ÓÅ·¢¹ú¼ÊÍøÕ¾¹ÙÍø¼ò½é
ÓÅ·¢¹ú¼ÊÍøÕ¾¹ÙÍø½¨ÉèÓÚ1996Ä꣬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ½¨ÉèµÄ¡¢ÓµÓÐÍêÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢Çå¾²¸ß¿Æ¼¼ÆóÒµ¡£ÊǺ£ÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢Çå¾²²úÆ·¡¢Çå¾²·þÎñ½â¾ö¼Æ»®µÄÁ캽ÆóÒµÖ®Ò»¡£
¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°ÓÅ·¢¹ú¼ÊÍøÕ¾¹ÙÍø´óÏ㬹«Ë¾Ô±¹¤6000ÓàÈË£¬Ñз¢ÍŶÓ1200ÓàÈË, ÊÖÒÕ·þÎñÍŶÓ1300ÓàÈË¡£ÔÚÌìϸ÷Ê¡¡¢ÊС¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö£¬ÓµÓÐÁýÕÖÌìϵÄÏúÊÛϵͳ¡¢ÇþµÀϵͳºÍÊÖÒÕÖ§³Öϵͳ¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐС°å¹ÒÅÆÉÏÊС££¨¹ÉƱ´úÂ룺002439£©
¶àÄêÀ´£¬ÓÅ·¢¹ú¼ÊÍøÕ¾¹ÙÍøÖÂÁ¦ÓÚÌṩ¾ßÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷Á¢ÒìµÄÇå¾²²úÆ·ºÍ×î¼Ñʵ¼ù·þÎñ£¬×ÊÖú¿Í»§ÖÜÈ«ÌáÉýÆäIT»ù´¡ÉèÊ©µÄÇå¾²ÐÔºÍÉú²úЧÄÜ£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢Çå¾²¹¤ÒµÁì¾üÆ·Åƶø²»Ð¸Æ𾢡£
5.2 ¹ØÓÚÓÅ·¢¹ú¼ÊÍøÕ¾¹ÙÍø
ÓÅ·¢¹ú¼ÊÍøÕ¾¹ÙÍøÇå¾²Ó¦¼±ÏìÓ¦ÖÐÐÄÒÑÐû²¼1000¶à¸öÎó²îͨ¸æºÍΣº¦Ô¤¾¯£¬ÎÒÃǽ«Ò»Á¬¸ú×ÙÈ«Çò×îеÄÍøÂçÇå¾²ÊÂÎñºÍÎó²î£¬ÎªÆóÒµµÄÐÅÏ¢Çå¾²±£¼Ý»¤º½¡£
¹Ø×¢ÎÒÃÇ£º