ÐÅÏ¢Äþ¾²Öܱ¨-2021ÄêµÚ30ÖÜ
Ðû²¼Ê±¼ä 2021-07-26> ±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö
2021Äê07ÔÂ19ÈÕÖÁ07ÔÂ25ÈÕ¹²ÊÕ¼Äþ¾²Â©¶´66¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇMotorola CX2 HNAP1/GetNetworkTomographySettingsÃüÁîÖ´ÐЩ¶´£»Oracle E-Business Suite Oracle Marketing CVE-2021-2355´úÂëÖ´ÐЩ¶´£»Schneider Electric EVlink CityÓ²±àÂ멶´£»Teradici PCOIP Software Agent vHubÇý¶¯·¨Ê½ÌØȨÌáÉý©¶´£»Apple macOS Big Sur Model I/OͼÏñÔ½½çд´úÂëÖ´ÐЩ¶´¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇÑо¿ÍŶÓÅû¶WindowsÔ¶³Ì´òÓ¡·þÎñÖеÄÐÂ0day£»Check PointÐû²¼2021ÄêQ2Æ·ÅÆÍøÂçµöÓã·ÖÎö³ÂËߣ»ZeroXÍÅ»ïÔÚ°µÍø³öÊÛʯÓ͹«Ë¾É³ÌØ°¢ÃÀ1TBµÄÊý¾Ý£»ÐµÄMosaicLoader¿ÉÀûÓÃWindows DefenderÈƹý¼ì²â£»QualysÅû¶LinuxÄÚºËÖеĵ±µØÌáȨ©¶´Sequoia¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖС£
> ÖØÒªÄþ¾²Â©¶´Áбí
1.Motorola CX2 HNAP1/GetNetworkTomographySettingsÃüÁîÖ´ÐЩ¶´
Motorola CX2 router CX HNAP1/GetNetworkTomographySettings´æÔÚÊäÈëÑé֤©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâÃüÁî¡£
https://github.com/cc-crack/router/blob/master/motocx2.md
2.Oracle E-Business Suite Oracle Marketing CVE-2021-2355´úÂëÖ´ÐЩ¶´
Oracle E-Business Suite Oracle Marketing´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£
https://www.oracle.com/security-alerts/cpujul2021.html
3.Schneider Electric EVlink CityÓ²±àÂ멶´
Schneider Electric EVlink City´æÔÚÓ²±àÂ멶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔ¹ÜÀíÔ±ÉÏÏÂÎÄδÊÚȨ·ÃÎÊϵͳ¡£
http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-194-06
4.Teradici PCOIP Software Agent vHubÇý¶¯·¨Ê½ÌØȨÌáÉý©¶´
Teradici PCOIP Software Agent vHubÇý¶¯·¨Ê½¿É½ÓÊÜÀ´×ÔÈÎÒⷨʽµÄÃüÁÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÌáÉýÌØȨ¡£
https://advisory.teradici.com/security-advisories/100/
5.Apple macOS Big Sur Model I/OͼÏñÔ½½çд´úÂëÖ´ÐЩ¶´
Apple macOS Big Sur Model I/OͼÏñ´¦ÖôæÔÚÔ½½ç䩶´£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔÄÚºËÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£
https://support.apple.com/en-us/HT212602l
> ÖØÒªÄþ¾²Ê¼þ×ÛÊö
1¡¢Ñо¿ÍŶÓÅû¶WindowsÔ¶³Ì´òÓ¡·þÎñÖеÄÐÂ0day
Ñо¿ÍŶӹûÈ»Åû¶ÁËÒ»¸öеÄ0day£¬¹¥»÷ÕßÀûÓø鶴¿ÉÒÔͨ¹ýÔ¶³Ì´òÓ¡·þÎñ»ñµÃWindowsÉϵÄSYSTEMȨÏÞ¡£Ñо¿ÈËÔ±Benjamin Delpy³Æ£¬¸Ã©¶´ÀûÓÃÁËWindows Point and Print¹¦Ð§Öеġ°Queue-Specific Files¡±ÌØÐÔ¡£ÔÚ°²×°´òÓ¡»úʱ£¬¹©Ó¦ÉÌÌṩµÄ°²×°·¨Ê½¿ÉÒÔÖ¸¶¨Ò»×éÓëÌض¨´òÓ¡ÐÐÁÐÏà¹ØÁªµÄÈκÎÀàÐ͵ÄÎļþ£¬¸ÃÎļþ½«±»ÏÂÔص½Ã¿Ò»¸öÁ¬½Óµ½´Ë´òÓ¡·þÎñÆ÷µÄ¿Í»§¶Ë¡£Òò´Ë£¬µ±¿Í»§¶ËÁ¬½Óµ½¹¥»÷ÕßËù¿ØÖƵĴòÓ¡·þÎñÆ÷ʱ£¬½«×Ô¶¯ÏÂÔز¢ÒÔSYSTEMȨÏÞÖ´ÐжñÒâDLL¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/microsoft/new-windows-print-spooler-zero-day-exploitable-via-remote-print-servers/
2¡¢Check PointÐû²¼2021ÄêQ2Æ·ÅÆÍøÂçµöÓã·ÖÎö³ÂËß
Check PointÐû²¼ÁË2021ÄêQ2Æ·ÅÆÍøÂçµöÓã·ÖÎö³ÂËß¡£³ÂËßÖ¸³ö£¬Óë2020ÄêQ4ºÍ2021ÄêQ1Ò»Ñù£¬MicrosoftÔٴγÉΪÍøÂç·¸×ï·Ö×Ó×î³£Õë¶ÔµÄÆ·ÅÆ£¬45%µÄÆ·ÅÆÍøÂçµöÓãʵÑ鶼ÓëMicrosoftÓйأ¬±ÈQ1Ôö¼ÓÁË6%¡£º½Ô˹«Ë¾DHLΪµÚ¶þ´óÄ¿±ê£¬Õ¼±ÈΪ26%¡£Æä´ÎΪÑÇÂíÑ·(11%)¡¢Bestbuy(4%)¡¢¹È¸è(3%)¡¢ÁìÓ¢(3%)¡¢Dropbox(1%)¡¢Chase(1%)¡¢Æ»¹û(%)ºÍPaypal(0.5%)¡£´ËÍ⣬¿Æ¼¼ÈÔÈ»ÊÇÆ·ÅÆÍøÂçµöÓã¹¥»÷×îÖ÷ÒªµÄÄ¿±êÐÐÒµ£¬Æä´ÎÊÇÔËÊäºÍÁãÊÛÐÐÒµ¡£
ÔÎÄÁ´½Ó£º
https://blog.checkpoint.com/2021/07/15/brand-phishing-report-q2-2021-microsoft-continues-reign/
3¡¢ZeroXÍÅ»ïÔÚ°µÍø³öÊÛʯÓ͹«Ë¾É³ÌØ°¢ÃÀ1TBµÄÊý¾Ý
±¾Ô£¬Ò»¸öÃûΪZeroXµÄºÚ¿ÍÍÅ»ïÔÚ°µÍøÒÔ500ÍòÃÀÔªµÄ¼Û¸ñ³öÊÛɳÌØ°¢ÃÀ¹«Ë¾1TBµÄÊý¾Ý¡£É³ÌØ°¢À²®Ê¯Ó͹«Ë¾¼ò³ÆɳÌØ°¢ÃÀ£¨Saudi Aramco£©£¬ÊÇÊÀ½çÉÏ×î´óµÄ¹«¹²Ê¯ÓͺÍÌìÈ»Æø¹«Ë¾Ö®Ò»£¬ÓµÓÐÁè¼Ý66000ÃûÔ±¹¤£¬ÄêÊÕÈë½ü2300ÒÚÃÀÔª¡£ZeroX³ÆÕâЩÊý¾ÝÊÇÔÚ2020Äêͨ¹ýÈëÇÖɳÌØ°¢ÃÀµÄÍøÂç¼°·þÎñÆ÷»ñµÃµÄ£¬ÆäÖÐ×îÔçµÄ¿É×·Ëݵ½1993Äê¡£´Ë´Î鶵ÄÊý¾Ý°üÂÞ14254ÃûÔ±¹¤µÄÍêÕûÐÅÏ¢¡¢ÖÖÖÖϵͳµÄÏîÄ¿¹æ·¶£»ÄÚ²¿ÃÅÎö³ÂËß¡¢ÐÒé¡¢Ðź¯¡¢¶©¼Û±í£»Scadaµã¡¢Wi-Fi¡¢IPÉãÏñ»úºÍIoTÉ豸µÄÍøÂç½á¹¹£»Aramco¿Í»§Ãûµ¥¡¢·¢Æ±ºÍºÏͬµÈ¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/saudi-aramco-data-breach-sees-1-tb-stolen-data-for-sale/
4¡¢ÐµÄMosaicLoader¿ÉÀûÓÃWindows DefenderÈƹý¼ì²â
BitdefenderÑо¿ÈËÔ±·¢ÏÖжñÒâÈí¼þMosaicLoader¿ÉÀûÓÃWindows DefenderÈƹý¼ì²â¡£¸Ã¶ñÒâÈí¼þͨ¹ýËÑË÷ÒýÇæ½á¹ûαװ³ÉÆƽâÈí¼þ£¬¾ßÓÐÅÓ´óµÄÄÚ²¿½á¹¹£¬Ö¼ÔÚÈƹý¶ñÒâÈí¼þ·ÖÎö¡£ÆäÄ£·ÂÀàËÆÓںϷ¨Èí¼þµÄÎļþÐÅÏ¢²¢Ê¹ÓÃС¿éºÍÎÞÐòÖ´ÐÐ˳Ðò½øÐдúÂë»ìÏý¡£ÔÚÀÖ³ÉѬȾĿ±êºó£¬×î³õµÄ»ùÓÚDelphiµÄdropper»á´ÓÔ¶³Ì·þÎñÆ÷»ñÈ¡ÏÂÒ»½×¶ÎµÄpayload£¬²¢ÔÚWindows DefenderÖÐΪÏÂÔصĿÉÖ´ÐÐÎļþÌí¼Óµ±µØÅųýÏîÒÔÈƹýɱ¶¾Èí¼þµÄɨÃè¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2021/07/this-new-malware-hides-itself-among.html
5¡¢QualysÅû¶LinuxÄÚºËÖеĵ±µØÌáȨ©¶´Sequoia
QualysÑо¿ÈËÔ±Åû¶ÁËLinuxÄÚºËÖеĵ±µØÌáȨ©¶´Sequoia¡£¸Ã©¶´×·×ÙΪCVE-2021-33909£¬´æÔÚÓÚÓÃÀ´¹ÜÀíÓû§Êý¾ÝµÄÎļþϵͳ²ã£¬ÊÇÓÉÓÚfs/seq_file.cûÓÐÕýÈ·ÏÞÖÆseq»º³åÇø·ÖÅä¶øµ¼Öµġ£Qualys³Æ£¬¸Ã©¶´Ó°ÏìÁË×Ô2014ÄêÒÔÀ´Ðû²¼µÄËùÓÐLinuxÄں˰汾¡£´ËÍ⣬Ñо¿ÈËÔ±»¹·¢ÏÖÁËsystemdÖеÄÒ»¸ö¶ÑÕ»ºÄ¾¡µ¼Öµľܾø·þÎñ©¶´£¨CVE-2021-33910£©£¬´æÔÚÓÚ2015Äê4ÔÂÖ®ºóÐû²¼µÄËùÓÐsystemd°æ±¾ÖС£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/new-linux-kernel-bug-lets-you-get-root-on-most-modern-distros/