ÐÅÏ¢Äþ¾²Öܱ¨-2021ÄêµÚ29ÖÜ

Ðû²¼Ê±¼ä 2021-07-19

±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö


2021Äê07ÔÂ12ÈÕÖÁ07ÔÂ18ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´70¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇMicrosoft Windows Defender CVE-2021-34522´úÂë×¢È멶´ £»SAP NetWeaver ABAP Server²»ÕýÈ·Ñé֤©¶´ £»Adobe Illustrator CVE-2021-28591Ô½½çд´úÂëÖ´ÐЩ¶´ £»Fortinet FortiSandbox OSÃüÁî×¢È멶´ £»Schneider Electric EVlink Charging StationsÓ²±àÂëÑéÖ¤Èƹý©¶´ ¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇMint Mobile³ÆÆä·¢ÉúÊý¾Ýй¶£¬ÇÒ²¿ÃÅ¿Í»§±»×ªÍø £»Ñо¿ÈËÔ±Åû¶½üÆÚð³ä¶íÂÞ˹Õþ¸®µÄµöÓã¹¥»÷»î¶¯ £»KaseyaÄþ¾²¸üÐÂÐÞ¸´REvilÔÚ¹©Ó¦Á´¹¥»÷ÖÐÓõÄ0day £»Î¢ÈíÐû²¼7Ô·ÝÄþ¾²¸üУ¬ÐÞ¸´9¸ö0dayÔÚÄÚµÄ117¸ö©¶´ £»SolarWindsÐÞ¸´Serv-UÖÐÒѱ»ÀûÓõÄÔ¶³Ì´úÂëÖ´ÐЩ¶´ ¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖÐ ¡£


> ÖØÒªÄþ¾²Â©¶´Áбí


1.Microsoft Windows Defender CVE-2021-34522´úÂë×¢È멶´


Microsoft Windows Defender´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉʹӦÓ÷¨Ê½±ÀÀ £»òÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë ¡£

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34522


2.SAP NetWeaver ABAP Server²»ÕýÈ·Ñé֤©¶´


SAP NetWeaver ABAP Server´æÔÚ²»ÕýÈ·Ñé֤©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉδÊÚȨ·ÃÎÊÓ¦Óà ¡£

https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=580617506


3.Adobe Illustrator CVE-2021-28591Ô½½çд´úÂëÖ´ÐЩ¶´


Adobe Illustrator´æÔÚÔ½½ç䩶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÎļþÇëÇó£¬ÓÕʹÓû§½âÎö£¬¿ÉʹӦÓ÷¨Ê½±ÀÀ £»òÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë ¡£

https://helpx.adobe.com/security/products/illustrator/apsb21-42.html


4.Fortinet FortiSandbox OSÃüÁî×¢È멶´


Fortinet FortiSandboxÐá̽Ä £¿é´æÔÚÊäÈëÑé֤©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔÓ¦ÓÃÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë ¡£

https://www.auscert.org.au/bulletins/ESB-2021.2385


5.Schneider Electric EVlink Charging StationsÓ²±àÂëÑéÖ¤Èƹý©¶´


Schneider Electric EVlink Charging Stations COOKIE´æÔÚÓ²±àÂ멶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉδÊÚȨÒÔ¹ÜÀíÔ±ÉÏÏÂÎÄ·ÃÎÊϵͳ ¡£

https://packetstormsecurity.com/files/163505/Schneider-Electric-EVlink-Charging-Stations-Authentication-Bypass-Code-Execution.html


> ÖØÒªÄþ¾²Ê¼þ×ÛÊö


1¡¢Mint Mobile³ÆÆä·¢ÉúÊý¾Ýй¶£¬ÇÒ²¿ÃÅ¿Í»§±»×ªÍø


1.jpg


Mint Mobile³Æ½üÆÚ·¢ÉúÊý¾Ýй¶Ê¼þ£¬ÇÒ²¿ÃÅ¿Í»§±»×ªµ½ÁíÒ»¼ÒÔËÓªÉ̵ÄÍøÂçÏ ¡£¹¥»÷·¢ÉúÔÚ6ÔÂ8ÈÕÖÁ10ÈÕÖ®¼ä£¬ÓÐδ¾­ÊÚȨµÄ¹¥»÷Õß·ÃÎÊÁËMint MobileÓû§µÄÐÅÏ¢£¬°üÂÞͨ»°¼Ç¼¡¢ÐÕÃû¡¢µØÖ·¡¢Õ˵¥½ð¶î¡¢¹ú¼Êµç»°ÏêϸÐÅÏ¢ÐÅÏ¢¡¢µç×ÓÓʼþºÍÃÜÂëµÈ ¡£ÔçÔÚ1Ô·Ý£¬USCellularÒ²¾­ÀúÁËÒ»´ÎÀàËƵĹ¥»÷£¬¹¥»÷ÕßÓÕʹÔËÓªÉÌÔ±¹¤ÏÂÔØ¿ÉÒÔÔ¶³Ì·ÃÎʹ«Ë¾É豸µÄÈí¼þ£¬È»ºóͨ¹ý¿Í»§¹Øϵ¹ÜÀí (CRM) Èí¼þ·ÃÎÊÓû§µÄ¸öÈËÐÅÏ¢²¢×ªÍø ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/mint-mobile-hit-by-a-data-breach-after-numbers-ported-data-accessed/


2¡¢Ñо¿ÈËÔ±Åû¶½üÆÚð³ä¶íÂÞ˹Õþ¸®µÄµöÓã¹¥»÷»î¶¯


2.jpg


Ñо¿ÈËÔ±Åû¶Á˽üÆÚ´óÁ¿Ã°³ä¶íÂÞ˹Õþ¸®µÄµöÓã¹¥»÷»î¶¯ ¡£ÆäÖУ¬Kaspersky·¢ÏÖαװ³ÉÀ´×Ô¶íÂÞ˹Õþ¸®µÄºÏ·¨Óòwebmaster@gov.ruµÄµöÓã»î¶¯£¬²¢ÌåÏÖÕâÀ๥»÷ͨ³£±È´ó¹æÄ£¹¥»÷¸üÅӴ󣬻¹Ê¹ÓÃÁË×éÖ¯ÖÐÔ±¹¤µÄÕæʵÐÕÃûºÍµç»°ºÅÂë ¡£SearchInformÐÅÏ¢Äþ¾²²¿ÃÅ·¢ÏÖÁËαװ³ÉË°Îñ»ú¹ØµÄµöÓãÓʼþ ¡£Í¬Ê±£¬¶íÂÞ˹¹ú¼ÒÍøÂçRSNetµÄ¹ÜÀí²¿ÃÅÒ²Ðû²¼¾¯¸æ£¬½¨Òé²»Òª´ò¿ªÀ´×ÔRSNetºÏ·¨Óû§»òRSNet¹ÜÀíÈËÔ±µÄÓʼþ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2021/07/cyber-criminals-sending-phishing-mails.html


3¡¢KaseyaÄþ¾²¸üÐÂÐÞ¸´REvilÔÚ¹©Ó¦Á´¹¥»÷ÖÐÓõÄ0day


3.jpg


KaseyaÐû²¼Äþ¾²¸üУ¬ÐÞ¸´REvilÔÚ¹©Ó¦Á´¹¥»÷ÖÐÓõÄ0day ¡£4Ô£¬ºÉÀ¼Â©¶´Åû¶Ñо¿Ëù (DIVD)Åû¶ÁËKaseyaµÄ7¸ö©¶´ ¡£Ö®ºó£¬Kaseya¶ÔÆäVSA SaaS·þÎñÉϵĴó²¿ÃÅ©¶´Ðû²¼Á˲¹¶¡£¬µ«ÉÐδÍê³ÉÄÚ²¿°æ±¾VSAµÄ²¹¶¡ ¡£¶øREvilÍÅ»ïÏÈÒ»²½ÀûÓÃÁËÕâЩ©¶´£¬ÓÚ7ÔÂ2ÈÕ¶ÔԼĪ60¸öMSPºÍ1500¼ÒÆóÒµ¿Í»§ÌᳫÁË´ó¹æÄ£¹¥»÷ ¡£Ä¿Ç°£¬KaseyaÐû²¼ÁËVSA 9.5.7a (9.5.7.2994) ¸üÐÂÒÔÐÞ¸´REvilʹÓõÄ©¶´£¬°üÂÞCVE-2021-30116¡¢CVE-2021-30119ºÍCVE-2021-30120µÈ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/kaseya-patches-vsa-vulnerabilities-used-in-revil-ransomware-attack/


4¡¢Î¢ÈíÐû²¼7Ô·ÝÄþ¾²¸üУ¬ÐÞ¸´9¸ö0dayÔÚÄÚµÄ117¸ö©¶´


4.jpg


΢ÈíÐû²¼ÁË2021Äê7Ô·ݵÄÖܶþ²¹¶¡£¬ÐÞ¸´ÁË°üÂÞ9¸ö0dayÔÚÄÚµÄ117¸ö©¶´ ¡£ÕâЩ©¶´ÖУ¬44¸öΪԶ³Ì´úÂëÖ´ÐУ¬32¸öΪÌáȨ©¶´£¬14¸öΪÐÅϢ鶩¶´£¬12¸öΪ¾Ü¾ø·þÎñ©¶´£¬8¸öΪÄþ¾²¹¦Ð§Èƹý©¶´£¬7¸öΪÆÛƭ©¶´ ¡£´Ë´ÎÐÞ¸´µÄ9¸ö0dayÖУ¬ÓÐ4¸öÒѱ»ÔÚÔÚÒ°ÀûÓ㬰üÂÞPrintNightmare©¶´£¨CVE-2021-34527£©¡¢WindowsÄÚºËÌáȨ©¶´£¨CVE-2021-33771ºÍCVE-2021-31979£©ÒÔ¼°½Å±¾ÒýÇæÄÚ´æËð»µÂ©¶´£¨CVE-2021-34448£© ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/microsoft/microsoft-july-2021-patch-tuesday-fixes-9-zero-days-117-flaws/


5¡¢SolarWindsÐÞ¸´Serv-UÖÐÒѱ»ÀûÓõÄÔ¶³Ì´úÂëÖ´ÐЩ¶´


5.jpg


SolarWindsÔÚ7ÔÂ9ÈÕÐû²¼µÄServ-U 15.2.3 HF2ÖÐÐÞ¸´ÁËÒ»¸öÒѱ»ÀûÓõÄ0day ¡£MicrosoftÅû¶ÁËServ-U²úÎïµÄÔ¶³Ì´úÂëÖ´ÐÐ0day£¨CVE-2021-35211£©£¬Ô¶³Ì¹¥»÷ÕßÀûÓôË©¶´Äܹ»ÒÔÌØÊâȨÏÞÖ´ÐÐÈÎÒâ´úÂ룬ÔÚÄ¿±êϵͳÉÏ°²×°²¢ÔËÐз¨Ê½¡¢¼ì²ì¡¢¸ü¸Ä»òɾ³ýÊý¾ÝµÈ ¡£Ä¿Ç°¸Ã©¶´ÒѾ­³ö±»Ò°ÀûÓ㬵«SolarWindsÌåÏÖ£¬Èç¹ûServ-U»·¾³ÖÐδÆôÓÃSSH£¬Ôò¸Ã©¶´²»´æÔÚ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/solarwinds-patches-critical-serv-u-vulnerability-exploited-in-the-wild/