TrustwaveÅû¶»ªÎªUSB LTE donglesÖÐÌáȨ©¶´£»ExaGridÔâµ½ContiÀÕË÷¹¥»÷£¬ÒÑÖ§¸¶260ÍòÃÀÔªÊê½ð
Ðû²¼Ê±¼ä 2021-06-041.TrustwaveÅû¶»ªÎªUSB LTE donglesÖеÄÌáȨ©¶´
TrustwaveµÄÑо¿ÈËÔ±Åû¶ÁË»ªÎªE3372ÐÍUSB LTE donglesÖеÄÌáȨ©¶´¡£USB donglesÊÇÒ»ÖÖ¿ÉÒÔ²åÈëÌõ¼Ç±¾µçÄÔºĮ́ʽµçÄÔµÄÓ²¼þ£¬Íâ¹ÛÏñuÅÌ£¬¿ÉÒÔ·ÃÎÊ»¥ÁªÍø¡£Ñо¿ÈËÔ±³ÆÆäÔÚä¯ÀÀdongles°²×°µÄÇý¶¯·¨Ê½Îļþʱ·¢ÏÖ£¬Ã¿´Î²åÈë¸ÃÉ豸¶¼ÊÐ×Ô¶¯ÔËÐÐmbbserviceopen£¬ÔÚWebä¯ÀÀÆ÷´ò¿ª»ªÎªÉ豸¹ÜÀí½çÃ棬¶øÕâ¸öÎļþÊÇÒÔÍêȫȨÏÞ£¨777£©ÔËÐеġ£Ä¿Ç°£¬»ªÎªÒÑÐû²¼Óйظ鶴µÄÄþ¾²×ÉѯºÍ»º½â´ëÊ©¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/huawei-usb-lte-dongles-are-vulnerable-to-privilege-escalation-attacks/
2.CiscoÐû²¼Äþ¾²¸üУ¬ÐÞ¸´Æä¶à¿î²úÎïÖÐÑÏÖصÄ©¶´
CiscoÐû²¼Äþ¾²¸üУ¬ÐÞ¸´ÁËWebex Player¡¢SD-WANºÍASR 5000 ϵÁÐÖеĶà¸ö©¶´¡£´Ë´ÎÐÞ¸´µÄ½ÏΪÑÏÖصÄ©¶´ÊÇWebex PlayerÖеĿɵ¼ÖÂÈÎÒâ´úÂëÖ´ÐеÄÄÚ´æËð»µÂ©¶´£¨CVE-2021-1526¡¢CVE-2021-1502ºÍCVE-2021-1503£©ÒÔ¼°SD-WANÈí¼þÖеÄÌáȨ©¶´£¨CVE-2021-1528£©¡£»¹ÐÞ¸´ÁËASR 5000ϵÁÐÈí¼þ(StarOS) ÖеÄÁ½¸öÊÚȨÈƹý©¶´£¨CVE-2021-1539ºÍCVE-2021-1540£©µÈ©¶´¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/118564/security/cisco-webex-player-sd-wan-asr-5000-flaws.html
3.AMT GamesÔÆ´æ´¢ÅäÖôíÎóй¶½ü600ÍòÓû§µÄÐÅÏ¢
WizCaseÑо¿ÈËÔ±·¢ÏÖAMT GamesµÄElasticSearch·þÎñÆ÷ÅäÖôíÎóй¶590ÍòÓû§µÄÐÅÏ¢¡£AMT GamesÊÇ×ܲ¿Î»ÓÚÖйúµÄÒ»¼ÒÓÎÏ·¿ª·¢ÉÌ£¬ËüµÄÃâ·ÑÊÖ»úÓÎÏ·Battle for the Galaxy£¨ÒøºÓÖ®Õ½£©ÔÚ103¸ö¹ú¼Ò/µØÓòÓµÓÐÊý°ÙÍòÓû§¡£´Ë´Î×ܹ²Ð¹Â¶ÁË1.47TBÊý¾Ý£¬°üÂÞ590Íò¸öÍæ¼Ò×ÊÁÏ¡¢200Íò±Ê½»Ò׺Í587000 Ìõ·´À¡ÏûÏ¢£¬Éæ¼°ÕÊ»§ID¡¢µç×ÓÓʼþµØÖ·¡¢ÓÎÏ·ÄÚ¹ºÖü۸ñºÍÖ§¸¶ÌṩÉ̵ÈÐÅÏ¢¡£Ä¿Ç°£¬¸Ã¹«Ë¾Î´¶Ô´ËʽøÐÐ˵Ã÷£¬µ«½ûÓÃÁ˶ԷþÎñÆ÷µÄ·ÃÎÊ¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/118529/data-breach/amt-games-data-leak.html
4.±©Ñ©³ÆÆäÔâµ½´ó¹æÄ£DDoS¹¥»÷£¬Æä·þÎñÒÑÑÓ³Ù»òÖжÏ
±©Ñ©³ÆÆäÔâµ½´ó¹æÄ£DDoS¹¥»÷£¬Õâ¿Éµ¼ÖÂһЩÍæ¼ÒµÄ·þÎñ·ºÆðÑÏÖصÄÑÓ³ÙºÍÁ¬½ÓÖжϡ£¸Ã¹«Ë¾ÓÚ6ÔÂ1ÈÕÐû²¼ÍÆÎĹûÈ»´Ë´Î¹¥»÷£¬²¢ÌåÏÖÆäÕýÔÚŬÁ¦»º½âÕâ¸öÎÊÌâ¡£µ«ÓÐTwitterÓû§¶Ô´ËÉùÃ÷×ö³öÆÀÂÛ£¬³ÆÕâ¿ÉÄÜÊÇÓÉÓÚËûÃÇϵͳµÄ¸ºÔØƽºâ²»¼Ñµ¼Öµģ¬¶ø²»ÊÇDDoS¹¥»÷¡£Õâ¿ÉÄÜÓëÔçЩʱºòÐû²¼µÄȼÉÕµÄÔ¶Õ÷£¨The Burning Crusade£©Óйأ¬ÔçÔÚ½ñÄê1Ô£¬Íæ¼ÒÔÚÍæħÊÞÊÀ½çʱҲÓöµ½ÁËͬÑùµÄÎÊÌâ¡£
ÔÎÄÁ´½Ó£º
https://news.softpedia.com/news/blizzard-experiencing-ddos-attack-possible-high-latency-and-disconnections-533100.shtml
5.ExaGridÔâµ½ContiÀÕË÷¹¥»÷£¬ÒÑÖ§¸¶260ÍòÃÀÔªÊê½ð
±¸·ÝÉ豸¹©Ó¦ÉÌExaGridÔâµ½ContiÀÕË÷¹¥»÷£¬ÔÚ5ÔÂ13ÈÕÖ§¸¶ÁË260ÍòÃÀÔªÊê½ð¡£ºÚ¿ÍÔÚ̸ÅÐÖÐÉù³ÆÆäÒÑÔڸù«Ë¾µÄµÄÍøÂçÖÐÍ£ÁôÒ»¸ö¶àÔ£¬¼ÓÃÜÁËËùÓÐÎļþ·þÎñÆ÷ºÍSQL ·þÎñÆ÷£¬²¢ÏÂÔØÁËÁè¼Ý800GBµÄÐÅÏ¢¡£Ð¹Â¶µÄÐÅÏ¢°üÂÞ¿Í»§ºÍÔ±¹¤µÄ¸öÈËÊý¾Ý¡¢ÉÌÒµºÏͬ¡¢±£ÃÜÐÒé±í¸ñ¡¢²ÆÕþÊý¾Ý¡¢ÄÉË°É걨±íºÍÔ´´úÂë¡£ºÚ¿Í×î³õÒªÇóµÄÊê½ð½ð¶îΪ7480000ÃÀÔª£¬¾¶à´Î̸ÅкóΪ260ÍòÃÀÔª¡£ExaGridÔÚÊÕµ½½âÃܹ¤¾ßÁ½Ììºó³Æ²»Ð¡ÐÄɾ³ýÁËËü£¬²¢ÒªÇóºÚ¿ÍÓÖ·¢ÁËÒ»±é¡£
ÔÎÄÁ´½Ó£º
https://www.computerweekly.com/news/252501665/Exagrid-pays-26m-to-Conti-ransomware-attackers
6.Ñо¿ÈËÔ±ÑÝʾÈçºÎÈƹý΢ÈíAMSIµÄͨÀýÄþ¾²¼Æı
SophosµÄÑо¿ÈËÔ±ÑÝʾÁËÈçºÎÈƹý΢Èí·´¶ñÒâÈí¼þɨÃè½Ó¿Ú (AMSI) µÄͨÀýÄþ¾²¼Æı¡£Ñо¿ÈËÔ±³ÆÒ»ÖÖÒªÁìÊÇÈƹýɨÃ跨ʽ£¬Ê¹ÓûìÏý¡¢¼ÓÃÜ¡¢ÒþдÊõºÍÆäËû¼¼Êõ£¬Ê¹É±¶¾Èí¼þ¸üÄÑ·¢ÏÖpayloadµÄ¹¥»÷Òâͼ£»ÁíÒ»ÖÖÊÇÒ»¿ªÊ¼¾ÍÍêÈ«ÖÆÖ¹¶ñÒâÈí¼þ±»É¨Ãè¡£SophosÌåÏÖ£¬Áè¼Ý98%µÄAMSIʵÑ鶼ÊÇͨ¹ý¸Ä¶¯AMSI¿âÀ´ÊµÏֵģ¬ÓжàÖÖ¶ñÒâÈí¼þ»áÊÔͼÕÒµ½ÒѼÓÔص½ÄÚ´æÖеÄAmsiScanBuffer£¬È»ºóÁýÕÖÆäÖ¸ÁîÒÔÈ·±£É¨ÃèÇëÇóʧ°Ü¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/this-is-how-attackers-bypass-microsoft-antimalware-scan-software-amsi/