¡¾Â©¶´Í¨¸æ¡¿Ruckus Wireless AdminÔ¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2023-25717£©
Ðû²¼Ê±¼ä 2023-05-15Ò»¡¢Â©¶´¸ÅÊö
CVE ID | CVE-2023-25717 | ·¢ÏÖʱ¼ä | 2023-05-10 |
Àà ÐÍ | RCE | µÈ ¼¶ | ÑÏÖØ |
¹¥»÷ÏòÁ¿ | ÍøÂç | ËùÐèȨÏÞ | ÎÞ |
¹¥»÷ÅÓ´ó¶È | µÍ | Óû§½»»¥ | ÎÞ |
PoC/EXP | ÒѹûÈ» | ÔÚÒ°ÀûÓà | ÊÇ |
5ÔÂ10ÈÕ£¬¶«Éƽ̨VSRC¼à²âµ½FortiGuard LabsÐû²¼Íþвͨ¸æ£¬Åû¶ÁËRuckus Wireless Admin RCE©¶´£¨CVE-2023-25717£¬CVSSv3ÆÀ·Ö9.8£©ÕýÔÚ±»AndoryuBot½©Ê¬ÍøÂç»ý¼«ÀûÓã¬ÒÔÌᳫÂþÑÜʽ¾Ü¾ø·þÎñ£¨DDoS£©¹¥»÷¡£
ÓÅ¿ÆÎÞÏß¹«Ë¾£¨Ruckus Wireless£©ÊÇÒÆ¶¯ÍøÂçÊг¡ÉÏÖªÃûµÄÎÞÏßϵͳ¹©Ó¦ÉÌ¡£¸Ã¹«Ë¾ÃæÏòÈ«ÇòÒÆ¶¯ÔËÓªÉÌ¡¢¿í´ø·þÎñÌṩÉÌºÍÆóÒµÓû§£¬ÖÆÔì¡¢ÏúÊÛÖÖÖÖÊÒÄÚºÍÊÒÍâÐÍ¡°ÖÇÄÜWi-Fi¡±²úÎï¡£
Ruckus Wireless Admin Ãæ°å°æ±¾<=10.4ÖдæÔÚRCE/CSRF©¶´£¨CVE-2023-25717£©£¬¿ÉÒÔͨ¹ýÏòÒ×Êܹ¥»÷µÄÉ豸·¢ËÍδ¾Éí·ÝÑéÖ¤µÄHTTP GETÇëÇóÀ´Ö´ÐдúÂ룬»òÀûÓÃCSRF©¶´ÔÚÄ¿±êÉ豸ÉÏÖ´ÐдúÂ룬ÀÖ³ÉÀûÓøÃ©¶´¿ÉÄܵ¼Ö¿ØÖÆ»òÆÆ»µÒ×Êܹ¥»÷µÄRuckus Wireless APÉ豸¡£Ä¿Ç°¸Ã©¶´µÄPoCÒѾ¹ûÈ»Åû¶¡£
¶þ¡¢Ó°Ï췶Χ
¸Ã©¶´Ó°ÏìÁËÒÔÏÂRUCKUS APÐͺţ¨²¿ÃÅÊÜÓ°Ïì²úÎïÒѾֹ֧ͣ³Ö£©£º
RUCKUS H350
RUCKUS H550
RUCKUS R350
RUCKUS T350c
RUCKUS T350d
RUCKUS T350se
RUCKUS T811-CM (Non-SFP)
Ruckus E510
Ruckus H320
Ruckus H500
Ruckus H510
Ruckus M510
Ruckus M510-JP
Ruckus P300
Ruckus Q410
Ruckus Q710
Ruckus Q910
Ruckus R300
Ruckus R310
Ruckus R320
Ruckus R500
Ruckus R510
Ruckus R550
Ruckus R560
Ruckus R600
Ruckus R610
Ruckus R650
Ruckus R700
Ruckus R710
Ruckus R720
Ruckus R730
Ruckus R750
Ruckus R760
Ruckus R850
Ruckus T300
Ruckus T301n
Ruckus T301s
Ruckus T310c
Ruckus T310d
Ruckus T310n
Ruckus T310s
Ruckus T504
Ruckus T610
Ruckus T710
Ruckus T710s
Ruckus T750
Ruckus T750SE
Ruckus T811-CM
SmartZone 100 (SZ-100)
SmartZone 144 (SZ-144)
SmartZone 144 (SZ-144) - Federal
SmartZone 300 (SZ300)
SmartZone 300 (SZ300) - Federal
ZoneDirector 1000
ZoneDirector 1100
ZoneDirector 1200
ZoneDirector 3000
ZoneDirector 5000
Èý¡¢Äþ¾²´ëÊ©
3.1 Éý¼¶°æ±¾
RuckusÒÑÓÚ2ÔÂÐÞ¸´ÐÞ¸´Á˸é¶´£¬¼øÓڸé¶´ÀûÓÃÄѶȽϵͣ¬ÇÒ©¶´PoCÒѾ¹ûÈ»Åû¶£¬½¨ÒéÈÔδÐÞ¸´¸Ã©¶´µÄÓû§¿É²Î¿¼¹Ù·½Í¨¸æ»ñÈ¡ÏàÓ¦²¹¶¡ÒÔÐÞ¸´¸Ã©¶´¡£
ÏÂÔØÁ´½Ó£º
https://support.ruckuswireless.com/security_bulletins/315
3.2 ÁÙʱ´ëÊ©
²»Ê¹ÓÃʱ¿ÉÒÔ½ûÓÃRUCKUS APÉ豸µÄÔ¶³Ì¹ÜÀíÃæ°å·ÃÎÊ¡£
3.3 ͨÓý¨Òé
l ¶¨ÆÚ¸üÐÂϵͳ²¹¶¡£¬¼õÉÙϵͳ©¶´£¬ÌáÉý·þÎñÆ÷µÄÄþ¾²ÐÔ¡£
l ¼ÓǿϵͳºÍÍøÂçµÄ·ÃÎÊ¿ØÖÆ£¬Ð޸ķÀ»ðǽ¼ÆÄ±£¬¹Ø±Õ·ÇÐëÒªµÄÓ¦Óö˿ڻò·þÎñ£¬¼õÉÙ½«Î£ÏÕ·þÎñ£¨ÈçSSH¡¢RDPµÈ£©Ì»Â¶µ½¹«Íø£¬¼õÉÙ¹¥»÷Ãæ¡£
l ʹÓÃÆóÒµ¼¶Äþ¾²²úÎÌáÉýÆóÒµµÄÍøÂçÄþ¾²ÐÔÄÜ¡£
l ¼ÓǿϵͳÓû§ºÍȨÏÞ¹ÜÀí£¬ÆôÓöàÒòËØÈÏÖ¤»úÖÆºÍ×îСȨÏÞÔÔò£¬Óû§ºÍÈí¼þȨÏÞÓ¦±£³ÖÔÚ×îµÍÏÞ¶È¡£
l ÆôÓÃÇ¿ÃÜÂë¼ÆÄ±²¢ÉèÖÃΪ¶¨ÆÚÐ޸ġ£
3.4 ²Î¿¼Á´½Ó
https://support.ruckuswireless.com/security_bulletins/315
https://www.fortiguard.com/threat-signal-report/5151/exploitation-spike-observed-for-ruckus-wireless-admin-rce-vulnerability-cve-2023-25717
https://cybir.com/2023/cve/proof-of-concept-ruckus-wireless-admin-10-4-unauthenticated-remote-code-execution-csrf-ssrf/
https://www.bleepingcomputer.com/news/security/critical-ruckus-rce-flaw-exploited-by-new-ddos-botnet-malware/
ËÄ¡¢°æ±¾ÐÅÏ¢
°æ±¾ | ÈÕÆÚ | ±¸×¢ |
V1.0 | 2023-05-15 | Ê×´ÎÐû²¼ |
Îå¡¢¸½Â¼
5.1 ¶«Éƽ̨¼ò½é
¶«Éƽ̨½¨Á¢ÓÚ1996Ä꣬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ´´½¨µÄ¡¢ÓµÓÐÍêÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢Äþ¾²¸ß¿Æ¼¼ÆóÒµ¡£ÊǹúÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢Äþ¾²²úÎï¡¢Äþ¾²·þÎñ½â¾ö·½°¸µÄÁ캽ÆóÒµÖ®Ò»¡£
¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°¶«Éƽ̨´óÏ㬹«Ë¾Ô±¹¤6000ÓàÈË£¬Ñз¢ÍŶÓ1200ÓàÈË, ¼¼Êõ·þÎñÍŶÓ1300ÓàÈË¡£ÔÚÈ«¹ú¸÷Ê¡¡¢ÊС¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö£¬ÓµÓÐÁýÕÖÈ«¹úµÄÏúÊÛÌåϵ¡¢ÇþµÀÌåϵºÍ¼¼ÊõÖ§³ÖÌåϵ¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐС°å¹ÒÅÆÉÏÊС££¨¹ÉƱ´úÂ룺002439£©
¶àÄêÀ´£¬¶«Éƽ̨ÖÂÁ¦ÓÚÌṩ¾ßÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷´´ÐµÄÄþ¾²²úÎïºÍ×î¼Ñʵ¼ù·þÎñ£¬×ÊÖú¿Í»§È«ÃæÌáÉýÆäIT»ù´¡ÉèÊ©µÄÄþ¾²ÐÔºÍÉú²úЧÄÜ£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢Äþ¾²¹¤ÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸Å¬Á¦¡£
5.2 ¹ØÓÚ¶«Éƽ̨
¶«Éƽ̨Äþ¾²Ó¦¼±ÏìÓ¦ÖÐÐÄÒÑÐû²¼1000¶à¸ö©¶´Í¨¸æºÍ·çÏÕÔ¤¾¯£¬ÎÒÃǽ«Á¬Ðø¸ú×ÙÈ«Çò×îеÄÍøÂçÄþ¾²Ê¼þºÍ©¶´£¬ÎªÆóÒµµÄÐÅÏ¢Äþ¾²±£¼Ý»¤º½¡£
¹Ø×¢ÎÒÃÇ£º