GRIMMÅû¶iSCSIÖÐÒÑ´æÔÚ15ÄêµÄ3¸ö¸ßΣ©¶´£»GoogleÐû²¼Õë¶ÔChromeä¯ÀÀÆ÷µÄSpectre¹¥»÷µÄPoC

Ðû²¼Ê±¼ä 2021-03-15

1.GRIMMÅû¶iSCSIÖÐÒÑ´æÔÚ15ÄêµÄ3¸ö¸ßΣ©¶´


1.jpg


GRIMMµÄÑо¿ÈËÔ±ÔÚLinuxÄÚºË×ÓϵͳiSCSIÖз¢ÏÖÁË3¸ö¸ßΣ©¶´£¬ÕâЩ©¶´×Ô2006ÄêÒѾ­´æÔÚ ¡£Õâ3¸ö©¶´·Ö±ðΪ¶Ñ»º³åÇøÒç³ö©¶´£¨CVE-2021-27365£©£¬¿Éµ¼Öµ±µØÌáȨ¡¢ÐÅϢй¶ºÍ¾Ü¾ø·þÎñ£»ÄÚºËÖ¸Õëй¶©¶´£¨CVE-2021-27363£©£¬¿Éµ¼ÖÂÐÅϢй¶£»ÒÔ¼°Ô½½ç¶Áȡ©¶´£¨CVE-2021-27364£©£¬¿Éµ¼ÖÂÐÅϢй¶ºÍ¾Ü¾ø·þÎñ ¡£¹¥»÷Õß¿ÉÒÔÀûÓÃÕâЩ©¶´À´ÈƹýKASLR¡¢SMEP¡¢SMAPºÍKPTIµÈÄþ¾²¹¦Ð§ ¡£Ä¿Ç°£¬ÕâЩ©¶´ÒÑÓÚ3ÔÂ7ÈÕ±»ÐÞ¸´ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/15-year-old-linux-kernel-bugs-let-attackers-gain-root-privileges/


2.NCC GroupÅû¶Netgear½»»»»úÖеÄ15¸ö©¶´


2.jpg


NCC GroupÑо¿ÈËÔ±·¢ÏÖNetgearµÄJGS516PEÒÔÌ«Íø½»»»»úÖдæÔÚ15¸ö©¶´ ¡£ÕâЩ©¶´ÖнÏΪÑÏÖØµÄÊÇ´úÂëÖ´ÐЩ¶´£¨CVE-2020-26919£©£¬CVSS v3ÆÀ·ÖΪ9.8£¬¹¥»÷Õß¿ÉÒÔÀûÓÃËüÀ´ÈƹýÉí·ÝÑéÖ¤²¢ÒÔ¹ÜÀíԱȨÏÞÖ´ÐдúÂë ¡£´ËÍ⣬»¹ÓÐCVSS v3ÆÀ·ÖΪ8.8µÄNSDPÉí·ÝÑéÖ¤ÈÆ¹ý©¶´£¨CVE-2020-35231£©ºÍ¿ÉÉÏ´«¶ñÒâ´úÂëµÄ£¨CVE-2020-35220£©µÈ©¶´ ¡£Ä¿Ç°£¬NetgearÒÑÐû²¼Äþ¾²¸üУ¬À´ÐÞ¸´ÉÏÊö©¶´ ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/115586/hacking/netgear-soho-flaws.html


3.GoogleÐû²¼Õë¶ÔChromeä¯ÀÀÆ÷µÄSpectre¹¥»÷µÄPoC


3.jpg


GoogleÐû²¼ÁËÕë¶ÔChromeä¯ÀÀÆ÷JavaScriptÒýÇæµÄSpectre¹¥»÷PoC ¡£Google³Æ£¬¸ÃPoC´úÂë¿ÉÔÚIntel Skylake CPUµÄChrome 88ÉÏÔËÐУ¬ÒÔ1kB/ sµÄËÙ¶È´ÓÉ豸ÄÚ´æÖÐÏÂÔØÊý¾Ý ¡£´ËÍ⣬GoogleÑо¿ÈËÔ±ÍÆ²âPoC´úÂë¿ÉÔÚÆäËûCPU£¨²îÒìµÄ¹©Ó¦É̺ÍÐͺţ©¡¢²Ù×÷ϵͳºÍChromium°æ±¾ÉÏʹÓà ¡£Google½¨ÒéWeb¿ª·¢ÈËԱʹÓà еÄÄþ¾²»úÖÆÀ´»º½âSpectreÓ²¼þ¹¥»÷ºÍ³£¼ûµÄWeb¿çվй¶£¬²¢ÌṩÁËPost-Spectre Web¿ª·¢ºÍ»º½âSide-Channel¹¥»÷µÄÖ¸ÄÏ ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/115573/hacking/google-chrome-spectre-poc.html


4.ÄϷDZ£ÏÕ¹«Ë¾PPSÔâµ½¹¥»÷£¬¿Í»§¸öÈËÐÅϢй¶


4.jpg


ÄϷDZ£ÏÕºÍͶ×Ê×Éѯ¹«Ë¾PPSÔâµ½¹¥»÷£¬¿Í»§¸öÈËÐÅÏ¢¿ÉÄÜÒѾ­Ð¹Â¶ ¡£¸Ã¹«Ë¾ÔÚÒ»·ÝÉùÃ÷ÖÐÌåÏÖ£¬ÆäÔ⵽δ֪ºÚ¿ÍµÄÍøÂç¹¥»÷£¬·þÎñ¿ÉÄÜ»áÖÐ¶Ï ¡£Ä¿Ç°£¬ËûÃÇÕýÔÚ¶Ô´ËʽøÐÐÊӲ죬²¢ÊÔͼ»Ö¸´ÆäIT»ù´¡¼Ü¹¹µÄ¹¦Ð§Ê± ¡£Ôڴ˹ý¶ÉÆÚ¼ä£¬¸Ã¹«Ë¾»¹ÌṩÁËÐí¶àÌæ´úÁ÷³Ì£¬ÒÔ×îºéÁ÷ƽµØ¼õÉÙ¹¥»÷¶Ô¿Í»§µÄÓ°Ïì ¡£Ä¿Ç°£¬Éв»ÖªµÀPPSÔâµ½µÄ¹¥»÷ÀàÐÍ£¬ÒÔ¼°¿ÉÄÜй¶ÐÅÏ¢µÄ·¶Î§ ¡£


Ô­ÎÄÁ´½Ó£º

https://mybroadband.co.za/news/security/389402-pps-hit-by-cyber-attack.html    


5.Unit42Ðû²¼ÓйØDearCryÀÕË÷Èí¼þµÄ·ÖÎö³ÂËß


5.jpg


Unit42Ðû²¼ÁËÓйØDearCryÀÕË÷Èí¼þµÄ·ÖÎö³ÂËß ¡£DearCryÊÇÒ»¸öеÄÀÕË÷Èí¼þ±äÖÖ£¬¹ØÓÚËüµÄ±¨µÀ×îÔç·ºÆðÔÚ2021Äê3ÔÂ9ÈÕ£¬¿ÉÒÔÀûÓÃMicrosoft Exchange·þÎñÆ÷µÄProxyLogon©¶´½øÐй¥»÷ ¡£¹¥»÷Ä¿±ê°üÂÞÃÀ¹ú¡¢¼ÓÄôóºÍ°Ä´óÀûÑǵȹú¼Ò ¡£´ËÍ⣬¸Ã³ÂËß»¹¼Ç¼ÁËDearCryʹÓõÄÏà¹Ø¼ÆÄ±ÒÔ¼°¼¼ÊõºÍ¹ý³Ì£¨TTP£©£¬²¢Îª¿Í»§ÈçºÎÕýÈ·ÅäÖÃËûÃǵÄÉ豸ÌṩÁ˽¨Òé ¡£


Ô­ÎÄÁ´½Ó£º

https://unit42.paloaltonetworks.com/dearcry-ransomware/


6.Check PointÐû²¼ÓйØExchange¹¥»÷ʼþµÄ·ÖÎö³ÂËß


6.jpg


Check PointÐû²¼ÁËÓйØExchange¹¥»÷ʼþµÄ·ÖÎö³ÂËß ¡£ÔڸóÂËßÖУ¬Check Point Research£¨CPR£©Åû¶ÁËÆäÔÚÈ«Çò·¶Î§ÄÚ×·×ÙµÄʵÑéÀûÓôË©¶´µÄ×éÖ¯µÄ×îнá¹û ¡£CPR·¢ÏÖÈ«ÇòÒÑÓÐÊý°Ù´ÎµÄÀûÓÃʵÑ飻½öÔÚ¹ýÈ¥µÄ72¸öСʱÖУ¬ÊµÑéÀûÓõĴÎÊý¾Í·­ÁË6±¶ÒÔÉÏ£»¹¥»÷µÄ´ÎÊýÀÛ¼ÆÁè¼Ý4800´Î£¬Éæ¼°È«¹úÊý°Ù¸ö×éÖ¯£»ÔâÊܹ¥»÷×î¶àµÄ¹ú¼ÒÊÇÃÀ¹ú£¨Õ¼±È21£¥£©£¬Æä´ÎÊǺÉÀ¼£¨12£¥£©ºÍÍÁ¶úÆä£¨12£¥£©£»ÊÜÓ°Ïì×î´óµÄ²¿ÃÅÊÇÕþ¸®ºÍ¾ü·½£¨Õ¼±È27£¥£©£¬Æä´ÎÊÇÖÆÔìÒµ£¨22£¥£©ºÍÈí¼þ¹©Ó¦ÉÌ£¨9£¥£© ¡£


Ô­ÎÄÁ´½Ó£º

https://blog.checkpoint.com/2021/03/11/exploits-on-organizations-worldwide/