ÐÅÏ¢°²È«Öܱ¨-2021ÄêµÚ11ÖÜ

°ä²¼¹¦·ò 2021-03-15

> ±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


2021Äê03ÔÂ08ÈÕÖÁ03ÔÂ14ÈÕ¹²ÊÕ¼°²È«·ì϶63¸ö £¬ÖµµÃ¹Ø×¢µÄÊÇMicrosoft Azure SphereδÊðÃû´úÂëÖ´Ðзì϶ £»SAP Solution Manager User-Experience MonitoringÊÚȨ²é³­È±Ê§·ì϶ £»Adobe Creative Cloud Desktop ApplicationËÁÒâÎļþдÈë·ì϶ £»F5 BIG-IP Advanced WAF/ASM»º³åÇøÒç¶Âí½Å £»Schneider Electric Interactive Graphical SCADA System CGFÎļþ½âÎöÄÚ´æ·ÛËé´úÂëÖ´Ðзì϶¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇCisco³ÆÆä²¿ÃŲúÆ·ÒòSnortÖеķì϶Ò×ÊÜDoS¹¥»÷ £»Ó¢Ìضû°ä²¼2020Äê²úÆ·°²È«ÐԵķÖÎö»ã±¨ £»FlagstarÒøÐеĿͻ§ÐÅϢй¶ £¬²¢ÓÀÔ¶ÖÕ³¡Ê¹ÓÃAccellion £»Å·ÖÞÒøÐÐÖÎÀí¾ÖµÄExchange·þÎñÆ÷Ôâµ½¹¥»÷ £¬Óʼþϵͳ¹Ø¹Ø £»×êÑÐÍŶӷ¢ÏÖ½©Ê¬ÍøÂçz0MinerÍÚ¿óµÄ¹¥»÷»î¶¯¡£


ƾ¾ÝÒÔÉÏ×ÛÊö £¬±¾Öܰ²È«ÍþвΪÖС£


> ³ÁÒª°²È«·ì϶Áбí


1.Microsoft Azure SphereδÊðÃû´úÂëÖ´Ðзì϶


Microsoft Azure Sphere´æÔÚ°²È«·ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬¿Éʹ·þÎñ·¨Ê½±ÀÀ £»òÕßÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-27080


2.SAP Solution Manager User-Experience MonitoringÊÚȨ²é³­È±Ê§·ì϶


SAP Solution Manager User-Experience Monitoring´æÔÚÊÚȨ²é³­µÄÈ··ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬¿ÉδÊÚȨ½ÚÔìϵͳ¡£

https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=571343107


3.Adobe Creative Cloud Desktop ApplicationËÁÒâÎļþдÈë·ì϶


Adobe Creative Cloud Desktop Application´æÔÚËÁÒâÎļþдÈë·ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâºÅÁî¡£

https://helpx.adobe.com/security/products/creative-cloud/apsb21-18.html


4.F5 BIG-IP Advanced WAF/ASM»º³åÇøÒç¶Âí½Å


F5 BIG-IP Advanced WAF/ASM´¦ÖöñÒâHTTPÏìÓ¦´æÔÚ»º³åÇøÒç¶Âí½Å £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó £¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ £»òÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£

https://www.auscert.org.au/bulletins/ESB-2021.0872


5.Schneider Electric Interactive Graphical SCADA System CGFÎļþ½âÎöÄÚ´æ·ÛËé´úÂëÖ´Ðзì϶


Schneider Electric Interactive Graphical SCADA System CGFÎļþ½âÎö´æÔÚÄÚ´æ·ÛËé·ì϶ £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÎļþÒªÇó £¬ÓÕʹÓû§½âÎö £¬¿ÉʹÀûÓ÷¨Ê½±ÀÀ £»òÕßÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£

https://us-cert.cisa.gov/ics/advisories/icsa-21-070-01


> ³ÁÒª°²È«ÊÂÎñ×ÛÊö


1¡¢Cisco³ÆÆä²¿ÃŲúÆ·ÒòSnortÖеķì϶Ò×ÊÜDoS¹¥»÷


1.jpg


Cisco³ÆÆä²¿ÃŲúÆ·ÒòSnort¼ì²âÒýÇæÖеķì϶Ò×ÊÜDoS¹¥»÷¡£¸Ã·ì϶λÓÚSnort¼ì²âÒýÇæµÄÒÔÌ«ÍøÖ¡½âÂëÆ÷ÖÐ £¬±»×·×ÙΪCVE-2021-1285 £¬CVSSÆÀ·ÖΪ7.4¡£¸Ã·ì϶ÊǶÔÒÔÌ«ÍøÖ¡µÄÃýÎóÇé¿ö´¦Öò»ÕýÈ·ËùÖ £¬Î´¾­ÑéÖ¤µÄ¹¥»÷ÕßÄܹ»ÏòÖ¸±êÉ豸·¢ËͶñÒâÒÔÌ«ÍøÖ¡À´ÀûÓô˷ì϶¡£³É¹¦ÀûÓø÷ì϶Äܹ»ºÄ¾¡Ö¸±êÉ豸ÉϵĴÅÅ̿ռä £¬µ¼ÖÂÖÎÀíÔ±ÎÞ·¨µÇ¼µ½¸ÃÉ豸»ò¸ÃÉ豸ÎÞ·¨ÕýÈ·Æô¶¯¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/115341/security/cisco-products-dos-snort-issue.html


2¡¢Ó¢Ìضû°ä²¼2020Äê²úÆ·°²È«ÐԵķÖÎö»ã±¨


2.jpg


Ó¢ÌØ¶û°ä²¼ÁË2020Äê²úÆ·°²È«ÐԵķÖÎö»ã±¨¡£»ã±¨Ö¸³ö £¬ÔÚ2020ÄêÅû¶µÄ231¸ö·ì϶ÖÐ £¬ÓÐ109¸ö(47%)ÊÇÓÉÓ¢ÌØ¶ûÔ±¹¤Í¨¹ý°²È«×êÑз¢ÏÖµÄ £¬¶ø²Î¼Ó·ì϶Éͽð´òËãµÄ±í²¿×êÑÐÈËÔ±»ã±¨ÁË105¸ö·ì϶£¨45£¥£©¡£´Ë±í £¬ÓÉ±í²¿·¢ÏֵĴó²¿ÃÅ·ì϶¶¼´æÔÚÓÚÔÚÈí¼þÖÐ £¬ÖØÒªÔÚÓÃÓÚͼÐΡ¢ÍøÂçºÍÀ¶ÑÀ×é¼þµÄÈí¼þʵÓ÷¨Ê½ºÍÈí¼þÇý¶¯·¨Ê½ÖС£ÆäÖÐ £¬Çý¶¯·¨Ê½ºÍÆäËûÈí¼þ×é¼þÖеķì϶×î¶à £¬Îª93¸ö £»Æä´ÎΪ¹Ì¼þ £¬´æÔÚ66¸ö·ì϶ £»¶øÓÐ58¸ö·ì϶ӰÏìµ½¹Ì¼þºÍÈí¼þµÄ×éºÏ¡£


Ô­ÎÄÁ´½Ó£º

https://blogs.intel.com/technology/2021/03/ipas-intel-2020-product-security-report/#gs.vg4enn


3¡¢FlagstarÒøÐеĿͻ§ÐÅϢй¶ £¬²¢ÓÀÔ¶ÖÕ³¡Ê¹ÓÃAccellion


3.jpg


×ܲ¿Î»ÓÚÃÜЪ¸ùÖݵÄFlagstarÒøÐеĿͻ§ÐÅϢй¶ £¬²¢°ä·¢½«ÓÀÔ¶ÖÕ³¡Ê¹ÓÃAccellion¡£¸ÃÒøÐÐÊÇFlagstar BancorpµÄ×Ó¹«Ë¾ £¬ÎªÃÀ¹ú¿Í»§ÌṩµÖѺºÍÆäËû½ðÈÚ·þÎñ¡£Õâ´ÎÊý¾Ýй¶ÊÇÓÉÓÚÆäʹÓõĴ«Êä´óÎļþµÄAccellion FTAÎļþ¹²Ïí·¨Ê½´æÔÚÒѱ»ÔÚÒ°ÀûÓõÄ0day¶øµ¼ÖµÄ¡£¸Ã×éÖ¯³ÆÆäÓÚ2021Äê1ÔÂ22ÈÕµÃÖª´ËÊÂÎñ £¬Ä¿Ç°²¢Î´Ð¹Â©Ó°ÏìµÄ¿Í»§ÊýÁ¿ÒÔ¼°Ð¹Â¶Êý¾ÝµÄÖÖÀà £¬µ«°µÊ¾Flagstar½«ÓÀÔ¶ÖÕ³¡Ê¹ÓÃAccellionÎļþ¹²ÏíÆ½Ì¨¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/flagstar-bank-customer-data-breached-through-accellion-hack/


4¡¢Å·ÖÞÒøÐÐÖÎÀí¾ÖµÄExchange·þÎñÆ÷Ôâµ½¹¥»÷ £¬Óʼþϵͳ¹Ø¹Ø


4.jpg


Å·ÖÞÒøÐÐÖÎÀí¾Ö£¨EBA£©³ÆÆäExchange·þÎñÆ÷Ôâµ½¹¥»÷ £¬ËùÓÐÓʼþϵͳÒѾ­¹Ø¹Ø¡£EBAÊÇÅ·ÖÞ½ðÈÚ¼à¹ÜϵͳµÄÒ»²¿ÃÅ £¬ËüÕÆ¹Ü¼à¶½Å·ÃËÒøÐÐÒµµÄÕûÌåÓÐÐòÔË×÷¡£Ä¿Ç° £¬¸ÃÊÂÎñÈÔÔÚµ÷²éÖÐ £¬Éв»È·¶¨ºÚ¿Í½Ó¼ûÁËʲôÊý¾Ý¡£¸Ã×éÖ¯ÔÚÉÏÖÜÈյijõ´ëÊ©²é³Æ £¬¹¥»÷Õß¿ÉÄÜÒѾ­½Ó¼ûÁË´æ´¢ÔÚµç×ÓÓʼþ·þÎñÆ÷ÉϵÄÓ×ÎÒÐÅÏ¢¡£µ«ÔÚ±¾ÖÜÒ»µÄ²¹³ä¸üÐÂÖаµÊ¾ £¬µç×Óȡ֤¹ý³ÌÖÐûÓз¢ÏÖÊý¾Ýй¶µÄ¼£Ïó¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/european-banking-authority-discloses-exchange-server-hack/


5¡¢×êÑÐÍŶӷ¢ÏÖ½©Ê¬ÍøÂçz0MinerÍÚ¿óµÄ¹¥»÷»î¶¯


5.jpg


×êÑÐÍŶӷ¢ÏÖ½©Ê¬ÍøÂçz0MinerÊÔͼ½ÚÔìJenkinsºÍElasticSearch·þÎñÆ÷À´ÍÚ¾òMonero£¨XMR£©¼ÓÃÜÇ®±ÒµÄ¹¥»÷»î¶¯¡£z0MinerÊÇÈ¥ÄêÔÚ11Ô±»·¢ÏÖµÄÒ»ÖÖÍÚ¿ó¶ñÒâÈí¼þ £¬ÆäÀûÓÃWeblogic·ì϶ϰȾÁËÊýǧ̨·þÎñÆ÷¡£¶øÕâ´Î»î¶¯ÀûÓÃÁËElasticSearchÖеÄRCE·ì϶£¨CVE-2015-1427£©ºÍÓ°ÏìÁËJenkins·þÎñÆ÷µÄÒ»¸ö¹ÅÀϵÄRCE¡£ÔÚÈëÇÖ·þÎñÆ÷ºó £¬¸Ã¶ñÒâÈí¼þ½«ÏÈÏÂÔØ¶ñÒâshell¾ç±¾ £¬¶øºóѰÕÒ²¢É¾³ýÒÔǰװÖõÄÍÚ¿ó¾ç±¾¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/z0miner-botnet-hunts-for-unpatched-elasticsearch-jenkins-servers/