ÐÅÏ¢Äþ¾²Öܱ¨-2021ÄêµÚ4ÖÜ
Ðû²¼Ê±¼ä 2021-01-25> ±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö
2021Äê01ÔÂ18ÈÕÖÁ01ÔÂ24ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´57¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇOracle E-Business Suite One-to-One Fulfillment CVE-2021-2101δÃ÷ÈÎÒâ´úÂëÖ´ÐЩ¶´£»Netapp Clustered Data ONTAPÈÎÒâÊý¾ÝÁýÕÖ©¶´£»Delta Electronics ISPSoftÏîÄ¿Îļþ´¦ÖÃÄÚ´æ´íÎóÒýÓôúÂëÖ´ÐЩ¶´£»Cisco SD-WAN vManage Software ÃüÁî×¢È멶´£»Google Chrome Cryptohome²»³äʵ¼ÆıִÐЩ¶´¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊǶíÂÞ˹Ìú·´æÔÚ¿É·ÃÎÊÆä¼à¿ØϵͳµÄ©¶´£»FiberHome FTTH ONT·ÓÉÆ÷ÖдæÔÚ28¸öºóÃÅÕÊ»§£»JSOFÅû¶DnsmasqÖÐ7¸öͳ³ÆΪDNSpooqµÄ©¶´£»Malwarebytes³ÆSolarWindsºÚ¿ÍÒÑÈëÇÖÆäÓʼþϵͳ£»Ñо¿ÍŶӷ¢ÏÖFreakOutÀûÓöà¸öЩ¶´µÄ¹¥»÷»î¶¯¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖС£
> ÖØÒªÄþ¾²Â©¶´Áбí
1.Oracle E-Business Suite One-to-One Fulfillment CVE-2021-2101δÃ÷ÈÎÒâ´úÂëÖ´ÐЩ¶´
Oracle E-Business Suite One-to-One Fulfillment´æÔÚδÃ÷Äþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£
https://www.oracle.com/security-alerts/cpujan2021.html
2.Netapp Clustered Data ONTAPÈÎÒâÊý¾ÝÁýÕÖ©¶´
Netapp Clustered Data ONTAP´æÔÚδÃ÷Äþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÁýÕÖϵͳÊý¾Ý¡£
https://security.netapp.com/advisory/ntap-20210119-0001/
3.Delta Electronics ISPSoftÏîÄ¿Îļþ´¦ÖÃÄÚ´æ´íÎóÒýÓôúÂëÖ´ÐЩ¶´
Delta Electronics ISPSoftÏîÄ¿Îļþ´¦ÖôæÔÚÊͷźóʹÓ鶴£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÎļþÇëÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉʹӦÓ÷¨Ê½±ÀÀ£»òÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£
https://us-cert.cisa.gov/ics/advisories/icsa-21-021-01
4.Cisco SD-WAN vManage Software ÃüÁî×¢È멶´
Cisco SD-WAN vManage Software WEB½Ó¿Ú´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíͨ¹ýÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔROOTÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-cmdinjm-9QMSmgcn
5.Google Chrome Cryptohome²»³äʵ¼ÆıִÐЩ¶´
Google Chrome Cryptohome´æÔÚ²»³äʵ¼ÆıִÐЩ¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄWEBÒ³ÇëÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉʹӦÓ÷¨Ê½±ÀÀ£»ò¿ÉÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£
https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop_19.html
> ÖØÒªÄþ¾²Ê¼þ×ÛÊö
1¡¢¶íÂÞ˹Ìú·´æÔÚ¿É·ÃÎÊÆä¼à¿ØϵͳµÄ©¶´
¶íÂÞ˹Ìú·¹«Ë¾´æÔÚ©¶´£¬¿ÉÓÃÀ´·ÃÎÊÆä¼à¿ØϵͳºÍÄÚ²¿·þÎñ¡£¸Ã©¶´ÊÇÓÉÓÚĬÈÏÇé¿öÏÂMikroTik·ÓÉÆ÷ÉϵÄÃÜÂëδ¸ü¸ÄËùµ¼Öµģ¬ºÚ¿Í¿ÉÀûÓø鶴ÔÚÒ»ÖÜÄڹرÕÌú·ÉϵÄËùÓмà¿Ø£¬¶ø»Ö¸´ÏµÍ³ÐèÒªÖÁÉÙÒ»¸öÔµÄʱ¼ä£¬»¨·Ñ1.3ÒÚ¬²¼£¨180ÍòÃÀÔª£©¡£Ä¿Ç°£¬¸Ã©¶´Òѱ»ÐÞ¸´£¬µ«²»ÄÜÈ·¶¨ÊÇ·ñÓй¥»÷ÕßÀûÓÃÆä·Ç·¨·ÃÎʹý¹«Ë¾µÄϵͳ¡£
ÔÎÄÁ´½Ó£º
https://www.ehackingnews.com/2021/01/hackers-accessed-thousands-of.html
2¡¢FiberHome FTTH ONT·ÓÉÆ÷ÖдæÔÚ28¸öºóÃÅÕÊ»§
Ñо¿ÈËÔ±Pierre Kim·¢ÏÖFiberHome FTTH ONT·ÓÉÆ÷ÖдæÔÚ28¸öºóÃÅÕÊ»§ºÍ¶à¸öÆäËû©¶´¡£¸Ã·ÓÉÆ÷Ö÷Òª²¿ÊðÓÚÄÏÃÀºÍ¶«ÄÏÑÇ£¬Í¨³£°²×°ÔÚÑ¡ÔñǧÕ×λµÄ¹«Ô¢Â¥ÄÚ¡¢¼ÒÍ¥»òÆóÒµÄÚ²¿¡£Kim³ÆÆä·¢ÏÖ´óÁ¿¿É±»ÀÄÓÃÀ´½Ó¹ÜISPµÄºóÃźÍ©¶´£¬ÀýÈçºóÃÅÔÊÐí¹¥»÷Õßͨ¹ý·¢ËÍÌØÖƵÄHTTPSÇëÇó[https£º// [ip]/telnet£¿enable=0£¦key=calculated£¨BR0_MAC£©]Óë·ÓÉÆ÷µÄTelnetÁ¬½Ó£¬Web·þÎñÆ÷°üÂÞ22¸öÓɲîÒìµÄInternet·þÎñÌṩÉÌʹÓõÄÓ²±àÂëƾ¾ÝµÈ¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/multiple-backdoors-and-vulnerabilities-discovered-in-fiberhome-routers/
3¡¢JSOFÅû¶DnsmasqÖÐ7¸öͳ³ÆΪDNSpooqµÄ©¶´
JSOFµÄÑо¿ÈËÔ±Åû¶ÁËDnsmasqÖеÄ7¸öDNSpooq©¶´¡£DnsmasqÊÇ»ùÓÚ*NIX²Ù×÷ϵͳµÄDNSת·¢¿Í»§¶Ë£¬Í¨³£ÔÚÖÖÖÖÍøÂçÉ豸µÄ¹Ì¼þÖС£´Ë´Î×ܹ²Åû¶ÁË7¸ö©¶´£¬ËûÃDZ»Í³³ÆΪDNSpooq£¬ÆäÖÐ4¸öÊÇ»º³åÇøÒç³ö©¶´£¬¿ÉÄܵ¼ÖÂÔ¶³ÌÖ´ÐдúÂ룬¶øÆäËû3¸ö©¶´Ôò¿Éµ¼ÖÂDNS»º´æÖж¾¡£JSOF³Æ¹¥»÷Õ߿ɽáºÏʹÓÃDNSpooqºÍ¾É°æDnsmasqÈí¼þ£¬¶ÔÖ±½Ó̻¶ÔÚInternetÉϵÄDnsmasq½øÐй¥»÷£¬¶øÇÒÊÜÓ°ÏìÉ豸Ëù´¦µÄÄÚÍøÉϵÄÆäËüÉ豸Ҳ½«´¦ÓÚΣÏÕÖ®ÖС£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/dnspooq-lets-attackers-poison-dns-cache-records/
4¡¢Malwarebytes³ÆSolarWindsºÚ¿ÍÒÑÈëÇÖÆäÓʼþϵͳ
Äþ¾²¹«Ë¾Malwarebytes³ÆSolarWinds±³ºóµÄºÚ¿ÍÒÑÈëÇÖÆäÓʼþϵͳ¡£¸Ã¹«Ë¾Ö¸³ö£¬ËäÈ»ÆäûÓÐʹÓÃSolarWinds£¬µ«ÓëÆäËû¹«Ë¾Ò»ÑùÔâµ½ÁËSolarWinds¹©Ó¦Á´¹¥»÷¡£¹¥»÷·¢ÉúÔÚÈ¥Ä꣬ºÚ¿ÍÀûÓÃAzure Active DirectoryÖеÄ©¶´ºÍ¶ñÒâOffice 365Ó¦Ó÷¨Ê½£¬¶Ô¹«Ë¾²¿ÃÅϵͳÌᳫÁ˹¥»÷¡£¾¹ýÊӲ죬¸Ã¹«Ë¾È·¶¨¹¥»÷Õß½ö»ñµÃÁ˲¿ÃÅÄÚ²¿ÓʼþµÄ·ÃÎÊȨ£¬ÆäÄÚ²¿Éú²ú»·¾³²¢Î´Êܵ½Ó°Ï죬ĿǰÈÔ¿ÉÄþ¾²Ê¹ÓÃMalwarebytesÈí¼þ¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/113628/hacking/malwarebytes-solarwinds-attack.html
5¡¢Ñо¿ÍŶӷ¢ÏÖFreakOutÀûÓöà¸öЩ¶´µÄ¹¥»÷»î¶¯
Ñо¿ÍŶӷ¢ÏÖ½©Ê¬ÍøÂçFreakOutÀûÓöà¸öЩ¶´µÄ¹¥»÷»î¶¯¡£´Ë´Î¹¥»÷Ö÷ÒªÕë¶ÔTerraMaster²Ù×÷ϵͳ¡¢Zend FrameworkºÍLiferay Portal£¬ÀûÓÃÁËCVE-2020-28188¡¢ CVE-2021-3007ºÍCVE-2020-7961©¶´¡£FreakOut¾ßÓзþÎñ¶Ë¿ÚɨÃè¡¢ÊÕ¼¯ÐÅÏ¢¡¢ÍøÂçÐá̽»ò·¢¶¯ÂþÑÜʽ¾Ü¾ø·þÎñ(DDoS)¹¥»÷µÈ¹¦Ð§£¬¿ÉѬȾLinuxÉ豸£¬²¢ÀûÓÃÆäÍÚ¼ÓÃÜ»õ±Ò¡¢ÔÚ¹«Ë¾ÍøÂçÉϺáÏòÁ÷´«»òαװ³ÉÊÜÓ°ÏìµÄ¹«Ë¾¹¥»÷ÆäËûÄ¿±ê¡£
ÔÎÄÁ´½Ó£º
https://research.checkpoint.com/2021/freakout-leveraging-newest-vulnerabilities-for-creating-a-botnet/