¡¾Â©¶´Í¨¸æ¡¿CleoÔ¶³Ì´úÂëÖ´ÐЩ¶´ ( CVE-2024-50623 )
Ðû²¼Ê±¼ä 2024-12-13Ò»¡¢Â©¶´¸ÅÊö
©¶´Ãû³Æ | CleoÔ¶³Ì´úÂëÖ´ÐЩ¶´ | ||
CVE ID | CVE-2024-50623 | ||
©¶´ÀàÐÍ | ÎļþÉÏ´«ºÍÏÂÔØ | ·¢ÏÖʱ¼ä | 2024-12-13 |
©¶´ÆÀ·Ö | 8.8 | ©¶´Æ·¼¶ | ¸ßΣ |
¹¥»÷ÏòÁ¿ | ÍøÂç | ËùÐèȨÏÞ | ÎÞ |
ÀûÓÃÄÑ¶È | µÍ | Óû§½»»¥ | ÊÇ |
PoC/EXP | ÒѹûÈ» | ÔÚÒ°ÀûÓà | ÒÑ·¢ÏÖ |
Cleo LexiCom¡¢VLTransfer ºÍ Harmony ¶¼ÊÇÓÃÓÚÊý¾Ý´«Êä¡¢ÆóÒµ¼¯³ÉºÍµç×ÓÊý¾Ý½»»»£¨EDI£©µÈÈÎÎñµÄÈí¼þ¹¤¾ß£¬Ö÷ÒªÓ¦ÓÃÓÚÆóÒµ¼äµÄÎļþ½»»»¡¢¹©Ó¦Á´¹ÜÀíµÈÁìÓò¡£
2024Äê12ÔÂ13ÈÕ£¬¶«Éƽ̨¼¯ÍÅVSRC¼à²âµ½Cleo LexiCom¡¢VLTransfer ºÍ Harmony²úÎïÖдæÔÚÒ»¸öÔ¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2024-50623£©£¬ÆäCVSSÆÀ·ÖΪ8.8£¬Ä¿Ç°¸Ã©¶´µÄÀûÓÃϸ½Ú¼°PoCÒѹûÈ»£¬ÇÒÒÑ·¢ÏÖ±»ÀûÓá£
Cleo LexiCom¡¢VLTransfer ºÍ HarmonyÈí¼þÖдæÔÚ²»ÊÜÏÞÖƵÄÎļþÉÏ´«ºÍÏÂÔØ©¶´£¬ÓÉÓÚȱ·¦¶ÔÉÏ´«ÎļþºÍÏÂÔع¦Ð§µÄÊʵ±ÑéÖ¤ºÍÏÞÖÆ£¬¹¥»÷Õß¿ÉÄÜÀûÓø鶴ÉÏ´«¶ñÒâÎļþ²¢¿ÉÄÜÀûÓÃϵͳµÄ·ÃÎÊ/ÏÂÔع¦Ð§»òÆäËû»úÖÆ´¥·¢¶ñÒâÎļþÖ´ÐУ¬ÀÖ³ÉÀûÓø鶴¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐУ¬´Ó¶øÔì³ÉÊý¾Ýй¶¡¢¸Ä¶¯£¬ÉõÖÁ½øÒ»²½µÄÍøÂç¹¥»÷¡£
´ËÍ⣬Cleo LexiCom¡¢VLTransfer ºÍ HarmonyÈí¼þ5.8.0.24֮ǰ°æ±¾Öл¹´æÔÚÁíÒ»¸öÔ¶³Ì´úÂëÖ´ÐÐ0 day©¶´£¨ÔÝÎÞCVE-ID£©£¬¸Ã©¶´ÎªCVE-2024-50623Èƹý£¬¹¥»÷Õß¿ÉÄÜͨ¹ýÀûÓÃĬÈϵÄAutorunÎļþ¼ÐÉèÖõ¼ÈëºÍÖ´ÐÐÈÎÒâbash»òPowerShellÃüÁĿǰ¸Ã©¶´µÄÀûÓÃϸ½Ú¼°PoCÒѹûÈ»£¬ÇÒÒѼì²âµ½Â©¶´ÀûÓá£
¶þ¡¢Ó°Ï췶Χ
Cleo Harmony < 5.8.0.24
Cleo VLTrader < 5.8.0.24
Cleo LexiCom < 5.8.0.24
Èý¡¢Äþ¾²´ëÊ©
3.1 Éý¼¶°æ±¾
Ä¿Ç°ÕâЩ©¶´ÒѾÐÞ¸´£¬ÊÜÓ°ÏìÓû§¿ÉÉý¼¶µ½ÒÔÏ°汾£º
Cleo Harmony >= 5.8.0.24
Cleo VLTrader >= 5.8.0.24
Cleo LexiCom >= 5.8.0.24
3.2 ÁÙʱ´ëÊ©
ÔÝÎÞ¡£
3.3 ͨÓý¨Òé
? ¶¨ÆÚ¸üÐÂϵͳ²¹¶¡£¬¼õÉÙϵͳ©¶´£¬ÌáÉý·þÎñÆ÷µÄÄþ¾²ÐÔ¡£
? ¼ÓǿϵͳºÍÍøÂçµÄ·ÃÎÊ¿ØÖÆ£¬Ð޸ķÀ»ðǽ¼Æı£¬¹Ø±Õ·ÇÐëÒªµÄÓ¦Óö˿ڻò·þÎñ£¬¼õÉÙ½«Î£ÏÕ·þÎñ£¨ÈçSSH¡¢RDPµÈ£©Ì»Â¶µ½¹«Íø£¬¼õÉÙ¹¥»÷Ãæ¡£
? ʹÓÃÆóÒµ¼¶Äþ¾²²úÎÌáÉýÆóÒµµÄÍøÂçÄþ¾²ÐÔÄÜ¡£
? ¼ÓǿϵͳÓû§ºÍȨÏÞ¹ÜÀí£¬ÆôÓöàÒòËØÈÏÖ¤»úÖƺÍ×îСȨÏÞÔÔò£¬Óû§ºÍÈí¼þȨÏÞÓ¦±£³ÖÔÚ×îµÍÏ޶ȡ£
? ÆôÓÃÇ¿ÃÜÂë¼Æı²¢ÉèÖÃΪ¶¨ÆÚÐ޸ġ£
3.4 ²Î¿¼Á´½Ó
https://support.cleo.com/hc/en-us/articles/27140294267799-Cleo-Product-Security-Advisory-CVE-2024-50623
https://support.cleo.com/hc/en-us/articles/28408134019735-Cleo-Product-Security-Update
https://www.huntress.com/blog/threat-advisory-oh-no-cleo-cleo-software-actively-being-exploited-in-the-wild
https://www.rapid7.com/blog/post/2024/12/11/etr-modular-java-backdoor-dropped-in-cleo-exploitation-campaign/
ËÄ¡¢°æ±¾ÐÅÏ¢
°æ±¾ | ÈÕÆÚ | ±¸×¢ |
V1.0 | 2024-12-13 | Ê×´ÎÐû²¼ |
Îå¡¢¸½Â¼
5.1 ¶«Éƽ̨¼ò½é
¶«Éƽ̨½¨Á¢ÓÚ1996Ä꣬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ´´½¨µÄ¡¢ÓµÓÐÍêÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢Äþ¾²¸ß¿Æ¼¼ÆóÒµ¡£ÊǹúÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢Äþ¾²²úÎï¡¢Äþ¾²·þÎñ½â¾ö·½°¸µÄÁ캽ÆóÒµÖ®Ò»¡£
¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°¶«Éƽ̨´óÏ㬹«Ë¾Ô±¹¤6000ÓàÈË£¬Ñз¢ÍŶÓ1200ÓàÈË, ¼¼Êõ·þÎñÍŶÓ1300ÓàÈË¡£ÔÚÈ«¹ú¸÷Ê¡¡¢ÊС¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö£¬ÓµÓÐÁýÕÖÈ«¹úµÄÏúÊÛÌåϵ¡¢ÇþµÀÌåϵºÍ¼¼ÊõÖ§³ÖÌåϵ¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐС°å¹ÒÅÆÉÏÊС££¨¹ÉƱ´úÂ룺002439£©
¶àÄêÀ´£¬¶«Éƽ̨ÖÂÁ¦ÓÚÌṩ¾ßÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷´´ÐµÄÄþ¾²²úÎïºÍ×î¼Ñʵ¼ù·þÎñ£¬×ÊÖú¿Í»§È«ÃæÌáÉýÆäIT»ù´¡ÉèÊ©µÄÄþ¾²ÐÔºÍÉú²úЧÄÜ£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢Äþ¾²¹¤ÒµÁì¾üÆ·Åƶø²»Ð¸Å¬Á¦¡£
5.2 ¹ØÓÚ¶«Éƽ̨
¶«Éƽ̨Äþ¾²Ó¦¼±ÏìÓ¦ÖÐÐÄÒÑÐû²¼1000¶à¸ö©¶´Í¨¸æºÍ·çÏÕÔ¤¾¯£¬ÎÒÃǽ«Á¬Ðø¸ú×ÙÈ«Çò×îеÄÍøÂçÄþ¾²Ê¼þºÍ©¶´£¬ÎªÆóÒµµÄÐÅÏ¢Äþ¾²±£¼Ý»¤º½¡£
¹Ø×¢ÎÒÃÇ£º