ÐÅÏ¢Çå¾²Öܱ¨-2021ÄêµÚ11ÖÜ
Ðû²¼Ê±¼ä 2021-03-15> ±¾ÖÜÇ徲̬ÊÆ×ÛÊö
2021Äê03ÔÂ08ÈÕÖÁ03ÔÂ14ÈÕ¹²ÊÕ¼Çå¾²Îó²î63¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇMicrosoft Azure SphereδÊðÃû´úÂëÖ´ÐÐÎó²î£»SAP Solution Manager User-Experience MonitoringÊÚȨ¼ì²éȱʧÎó²î£»Adobe Creative Cloud Desktop Applicationí§ÒâÎļþдÈëÎó²î£»F5 BIG-IP Advanced WAF/ASM»º³åÇøÒç³öÎó²î£»Schneider Electric Interactive Graphical SCADA System CGFÎļþÆÊÎöÄÚ´æÆÆËð´úÂëÖ´ÐÐÎó²î¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇCisco³ÆÆ䲿·Ö²úÆ·ÒòSnortÖеÄÎó²îÒ×ÊÜDoS¹¥»÷£»Ó¢ÌضûÐû²¼2020Äê²úÆ·Çå¾²ÐÔµÄÆÊÎö±¨¸æ£»FlagstarÒøÐеĿͻ§ÐÅϢй¶£¬²¢ÓÀÊÀ×èֹʹÓÃAccellion£»Å·ÖÞÒøÐÐÖÎÀí¾ÖµÄExchange·þÎñÆ÷Ôâµ½¹¥»÷£¬Óʼþϵͳ¹Ø±Õ£»Ñо¿ÍŶӷ¢Ã÷½©Ê¬ÍøÂçz0MinerÍÚ¿óµÄ¹¥»÷Ô˶¯¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬±¾ÖÜÇå¾²ÍþвΪÖС£
> Ö÷ÒªÇå¾²Îó²îÁбí
1.Microsoft Azure SphereδÊðÃû´úÂëÖ´ÐÐÎó²î
Microsoft Azure Sphere±£´æÇå¾²Îó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿Éʹ·þÎñ³ÌÐò±ÀÀ£»òÕßÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-27080
2.SAP Solution Manager User-Experience MonitoringÊÚȨ¼ì²éȱʧÎó²î
SAP Solution Manager User-Experience Monitoring±£´æÊÚȨ¼ì²éȷʵÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉδÊÚȨ¿ØÖÆϵͳ¡£
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107
3.Adobe Creative Cloud Desktop Applicationí§ÒâÎļþдÈëÎó²î
Adobe Creative Cloud Desktop Application±£´æí§ÒâÎļþдÈëÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§ÒâÏÂÁî¡£
https://helpx.adobe.com/security/products/creative-cloud/apsb21-18.html
4.F5 BIG-IP Advanced WAF/ASM»º³åÇøÒç³öÎó²î
F5 BIG-IP Advanced WAF/ASM´¦Öóͷ£¶ñÒâHTTPÏìÓ¦±£´æ»º³åÇøÒç³öÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬿ÉʹӦÓóÌÐò±ÀÀ£»òÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£
https://www.auscert.org.au/bulletins/ESB-2021.0872
5.Schneider Electric Interactive Graphical SCADA System CGFÎļþÆÊÎöÄÚ´æÆÆËð´úÂëÖ´ÐÐÎó²î
Schneider Electric Interactive Graphical SCADA System CGFÎļþÆÊÎö±£´æÄÚ´æÆÆËðÎó²î£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇó£¬ÓÕʹÓû§ÆÊÎö£¬¿ÉʹӦÓóÌÐò±ÀÀ£»òÕßÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£
https://us-cert.cisa.gov/ics/advisories/icsa-21-070-01
> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢Cisco³ÆÆ䲿·Ö²úÆ·ÒòSnortÖеÄÎó²îÒ×ÊÜDoS¹¥»÷
Cisco³ÆÆ䲿·Ö²úÆ·ÒòSnort¼ì²âÒýÇæÖеÄÎó²îÒ×ÊÜDoS¹¥»÷¡£¸ÃÎó²îλÓÚSnort¼ì²âÒýÇæµÄÒÔÌ«ÍøÖ¡½âÂëÆ÷ÖУ¬±»×·×ÙΪCVE-2021-1285£¬CVSSÆÀ·ÖΪ7.4¡£¸ÃÎó²îÊǶÔÒÔÌ«ÍøÖ¡µÄ¹ýʧ״̬´¦Öóͷ£²»×¼È·ËùÖ£¬Î´ÂÄÀúÖ¤µÄ¹¥»÷Õß¿ÉÒÔÏòÄ¿µÄ×°±¸·¢ËͶñÒâÒÔÌ«ÍøÖ¡À´Ê¹ÓôËÎó²î¡£ÀÖ³ÉʹÓøÃÎó²î¿ÉÒԺľ¡Ä¿µÄÉè±¹ØÁ¬Ä´ÅÅ̿ռ䣬µ¼ÖÂÖÎÀíÔ±ÎÞ·¨µÇ¼µ½¸Ã×°±¸»ò¸Ã×°±¸ÎÞ·¨×¼È·Æô¶¯¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/115341/security/cisco-products-dos-snort-issue.html
2¡¢Ó¢ÌضûÐû²¼2020Äê²úÆ·Çå¾²ÐÔµÄÆÊÎö±¨¸æ
Ó¢ÌضûÐû²¼ÁË2020Äê²úÆ·Çå¾²ÐÔµÄÆÊÎö±¨¸æ¡£±¨¸æÖ¸³ö£¬ÔÚ2020ÄêÅû¶µÄ231¸öÎó²îÖУ¬ÓÐ109¸ö(47%)ÊÇÓÉÓ¢ÌضûÔ±¹¤Í¨¹ýÇå¾²Ñо¿·¢Ã÷µÄ£¬¶ø¼ÓÈëÎó²îÉͽðÍýÏëµÄÍⲿÑо¿Ö°Ô±±¨¸æÁË105¸öÎó²î£¨45£¥£©¡£±ðµÄ£¬ÓÉÍⲿ·¢Ã÷µÄ´ó²¿·ÖÎó²î¶¼±£´æÓÚÔÚÈí¼þÖУ¬Ö÷ÒªÔÚÓÃÓÚͼÐΡ¢ÍøÂçºÍÀ¶ÑÀ×é¼þµÄÈí¼þÊÊÓóÌÐòºÍÈí¼þÇý¶¯³ÌÐòÖС£ÆäÖУ¬Çý¶¯³ÌÐòºÍÆäËûÈí¼þ×é¼þÖеÄÎó²î×î¶à£¬Îª93¸ö£»Æä´ÎΪ¹Ì¼þ£¬±£´æ66¸öÎó²î£»¶øÓÐ58¸öÎó²îÓ°Ïìµ½¹Ì¼þºÍÈí¼þµÄ×éºÏ¡£
ÔÎÄÁ´½Ó£º
https://blogs.intel.com/technology/2021/03/ipas-intel-2020-product-security-report/#gs.vg4enn
3¡¢FlagstarÒøÐеĿͻ§ÐÅϢй¶£¬²¢ÓÀÊÀ×èֹʹÓÃAccellion
×ܲ¿Î»ÓÚÃÜЪ¸ùÖݵÄFlagstarÒøÐеĿͻ§ÐÅϢй¶£¬²¢Ðû²¼½«ÓÀÊÀ×èֹʹÓÃAccellion¡£¸ÃÒøÐÐÊÇFlagstar BancorpµÄ×Ó¹«Ë¾£¬ÎªÃÀ¹ú¿Í»§ÌṩµäÖʺÍÆäËû½ðÈÚ·þÎñ¡£´Ë´ÎÊý¾Ýй¶ÊÇÓÉÓÚÆäʹÓõĴ«Êä´óÎļþµÄAccellion FTAÎļþ¹²Ïí³ÌÐò±£´æÒѱ»ÔÚҰʹÓõÄ0day¶øµ¼Öµġ£¸Ã×éÖ¯³ÆÆäÓÚ2021Äê1ÔÂ22ÈÕµÃÖª´ËÊÂÎñ£¬ÏÖÔÚ²¢Î´Í¸Â¶Ó°ÏìµÄ¿Í»§ÊýÄ¿ÒÔ¼°Ð¹Â¶Êý¾ÝµÄÖÖÀ࣬µ«ÌåÏÖFlagstar½«ÓÀÊÀ×èֹʹÓÃAccellionÎļþ¹²Ïíƽ̨¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/flagstar-bank-customer-data-breached-through-accellion-hack/
4¡¢Å·ÖÞÒøÐÐÖÎÀí¾ÖµÄExchange·þÎñÆ÷Ôâµ½¹¥»÷£¬Óʼþϵͳ¹Ø±Õ
Å·ÖÞÒøÐÐÖÎÀí¾Ö£¨EBA£©³ÆÆäExchange·þÎñÆ÷Ôâµ½¹¥»÷£¬ËùÓÐÓʼþϵͳÒѾ¹Ø±Õ¡£EBAÊÇÅ·ÖÞ½ðÈÚî¿ÏµÏµÍ³µÄÒ»²¿·Ö£¬ËüÈÏÕæ¼àÊÓÅ·ÃËÒøÐÐÒµµÄÕûÌåÓÐÐòÔË×÷¡£ÏÖÔÚ£¬¸ÃÊÂÎñÈÔÔÚÊÓ²ìÖУ¬Éв»È·¶¨ºÚ¿Í»á¼ûÁËʲôÊý¾Ý¡£¸Ã×éÖ¯ÔÚÉÏÖÜÈյijõ³ÌÐò²é³Æ£¬¹¥»÷Õß¿ÉÄÜÒѾ»á¼ûÁË´æ´¢ÔÚµç×ÓÓʼþ·þÎñÆ÷ÉϵÄСÎÒ˽¼ÒÐÅÏ¢¡£µ«ÔÚ±¾ÖÜÒ»µÄÔö²¹¸üÐÂÖÐÌåÏÖ£¬µç×ÓÈ¡Ö¤Àú³ÌÖÐûÓз¢Ã÷Êý¾Ýй¶µÄ¼£Ïó¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/european-banking-authority-discloses-exchange-server-hack/
5¡¢Ñо¿ÍŶӷ¢Ã÷½©Ê¬ÍøÂçz0MinerÍÚ¿óµÄ¹¥»÷Ô˶¯
Ñо¿ÍŶӷ¢Ã÷½©Ê¬ÍøÂçz0MinerÊÔͼ¿ØÖÆJenkinsºÍElasticSearch·þÎñÆ÷À´ÍÚ¾òMonero£¨XMR£©¼ÓÃÜÇ®±ÒµÄ¹¥»÷Ô˶¯¡£z0MinerÊÇÈ¥ÄêÔÚ11Ô±»·¢Ã÷µÄÒ»ÖÖÍÚ¿ó¶ñÒâÈí¼þ£¬ÆäʹÓÃWeblogicÎó²îѬȾÁËÊýǧ̨·þÎñÆ÷¡£¶ø´Ë´ÎÔ˶¯Ê¹ÓÃÁËElasticSearchÖеÄRCEÎó²î£¨CVE-2015-1427£©ºÍÓ°ÏìÁËJenkins·þÎñÆ÷µÄÒ»¸ö¹ÅÀϵÄRCE¡£ÔÚÈëÇÖ·þÎñÆ÷ºó£¬¸Ã¶ñÒâÈí¼þ½«ÏÈÏÂÔضñÒâshell¾ç±¾£¬È»ºóÑ°ÕÒ²¢É¾³ýÒÔÇ°×°ÖõÄÍÚ¿ó¾ç±¾¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/z0miner-botnet-hunts-for-unpatched-elasticsearch-jenkins-servers/