ÐÅÏ¢Çå¾²Öܱ¨-2021ÄêµÚ30ÖÜ

Ðû²¼Ê±¼ä 2021-07-26

> ±¾ÖÜÇ徲̬ÊÆ×ÛÊö


2021Äê07ÔÂ19ÈÕÖÁ07ÔÂ25ÈÕ¹²ÊÕ¼Çå¾²Îó²î66¸ö £¬ÖµµÃ¹Ø×¢µÄÊÇMotorola CX2 HNAP1/GetNetworkTomographySettingsÏÂÁîÖ´ÐÐÎó²î £»Oracle E-Business Suite Oracle Marketing CVE-2021-2355´úÂëÖ´ÐÐÎó²î £»Schneider Electric EVlink CityÓ²±àÂëÎó²î £»Teradici PCOIP Software Agent vHubÇý¶¯³ÌÐòÌØȨÌáÉýÎó²î £»Apple macOS Big Sur Model I/OͼÏñÔ½½çд´úÂëÖ´ÐÐÎó²î¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÑо¿ÍŶÓÅû¶WindowsÔ¶³Ì´òÓ¡·þÎñÖеÄÐÂ0day £»Check PointÐû²¼2021ÄêQ2Æ·ÅÆÍøÂç´¹ÂÚÆÊÎö±¨¸æ £»ZeroXÍÅ»ïÔÚ°µÍø³öÊÛʯÓ͹«Ë¾É³ÌØ°¢ÃÀ1TBµÄÊý¾Ý £»ÐµÄMosaicLoader¿ÉʹÓÃWindows DefenderÈƹý¼ì²â £»QualysÅû¶LinuxÄÚºËÖеÄÍâµØÌáȨÎó²îSequoia¡£


ƾ֤ÒÔÉÏ×ÛÊö £¬±¾ÖÜÇå¾²ÍþвΪÖС£


> Ö÷ÒªÇå¾²Îó²îÁбí


1.Motorola CX2 HNAP1/GetNetworkTomographySettingsÏÂÁîÖ´ÐÐÎó²î


Motorola CX2 router CX  HNAP1/GetNetworkTomographySettings±£´æÊäÈëÑéÖ¤Îó²î £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§ÒâÏÂÁî¡£

https://github.com/cc-crack/router/blob/master/motocx2.md


2.Oracle E-Business Suite Oracle Marketing CVE-2021-2355´úÂëÖ´ÐÐÎó²î


Oracle E-Business Suite Oracle Marketing±£´æÇå¾²Îó²î £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£

https://www.oracle.com/security-alerts/cpujul2021.html


3.Schneider Electric EVlink CityÓ²±àÂëÎó²î


Schneider Electric EVlink City±£´æÓ²±àÂëÎó²î £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬¿ÉÒÔÖÎÀíÔ±ÉÏÏÂÎÄδÊÚȨ»á¼ûϵͳ¡£

http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-194-06


4.Teradici PCOIP Software Agent vHubÇý¶¯³ÌÐòÌØȨÌáÉýÎó²î


Teradici PCOIP Software Agent vHubÇý¶¯³ÌÐò¿É½ÓÊÜÀ´×Ôí§Òâ³ÌÐòµÄÏÂÁî £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬¿ÉÌáÉýÌØȨ¡£

https://advisory.teradici.com/security-advisories/100/


5.Apple macOS Big Sur Model I/OͼÏñÔ½½çд´úÂëÖ´ÐÐÎó²î


Apple macOS Big Sur Model I/OͼÏñ´¦Öóͷ£±£´æÔ½½çдÎó²î £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬¿ÉÒÔÄÚºËÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£

https://support.apple.com/en-us/HT212602l


> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢Ñо¿ÍŶÓÅû¶WindowsÔ¶³Ì´òÓ¡·þÎñÖеÄÐÂ0day


1.jpg


Ñо¿ÍŶӹûÕæÅû¶ÁËÒ»¸öеÄ0day £¬¹¥»÷ÕßʹÓøÃÎó²î¿ÉÒÔͨ¹ýÔ¶³Ì´òÓ¡·þÎñ»ñµÃWindowsÉϵÄSYSTEMȨÏÞ¡£Ñо¿Ö°Ô±Benjamin Delpy³Æ £¬¸ÃÎó²îʹÓÃÁËWindows Point and Print¹¦Ð§Öеġ°Queue-Specific Files¡±ÌØÕ÷¡£ÔÚ×°ÖôòÓ¡»úʱ £¬¹©Ó¦ÉÌÌṩµÄ×°ÖóÌÐò¿ÉÒÔÖ¸¶¨Ò»×éÓëÌض¨´òÓ¡ÐÐÁÐÏà¹ØÁªµÄÈκÎÀàÐ͵ÄÎļþ £¬¸ÃÎļþ½«±»ÏÂÔص½Ã¿Ò»¸öÅþÁ¬µ½´Ë´òÓ¡·þÎñÆ÷µÄ¿Í»§¶Ë¡£Òò´Ë £¬µ±¿Í»§¶ËÅþÁ¬µ½¹¥»÷ÕßËù¿ØÖƵĴòÓ¡·þÎñÆ÷ʱ £¬½«×Ô¶¯ÏÂÔز¢ÒÔSYSTEMȨÏÞÖ´ÐжñÒâDLL¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/microsoft/new-windows-print-spooler-zero-day-exploitable-via-remote-print-servers/


2¡¢Check PointÐû²¼2021ÄêQ2Æ·ÅÆÍøÂç´¹ÂÚÆÊÎö±¨¸æ


2.jpg


Check PointÐû²¼ÁË2021ÄêQ2Æ·ÅÆÍøÂç´¹ÂÚÆÊÎö±¨¸æ¡£±¨¸æÖ¸³ö £¬Óë2020ÄêQ4ºÍ2021ÄêQ1Ò»Ñù £¬MicrosoftÔٴγÉΪÍøÂç·¸·¨·Ö×Ó×î³£Õë¶ÔµÄÆ·ÅÆ £¬45%µÄÆ·ÅÆÍøÂç´¹ÂÚʵÑ鶼ÓëMicrosoftÓÐ¹Ø £¬±ÈQ1ÔöÌíÁË6%¡£º½Ô˹«Ë¾DHLΪµÚ¶þ´óÄ¿µÄ £¬Õ¼±ÈΪ26%¡£Æä´ÎΪÑÇÂíÑ·(11%)¡¢Bestbuy(4%)¡¢¹È¸è(3%)¡¢ÁìÓ¢(3%)¡¢Dropbox(1%)¡¢Chase(1%)¡¢Æ»¹û(%)ºÍPaypal(0.5%)¡£±ðµÄ £¬¿Æ¼¼ÈÔÈ»ÊÇÆ·ÅÆÍøÂç´¹ÂÚ¹¥»÷×îÖ÷ÒªµÄÄ¿µÄÐÐÒµ £¬Æä´ÎÊÇÔËÊäºÍÁãÊÛÐÐÒµ¡£


Ô­ÎÄÁ´½Ó£º

https://blog.checkpoint.com/2021/07/15/brand-phishing-report-q2-2021-microsoft-continues-reign/


3¡¢ZeroXÍÅ»ïÔÚ°µÍø³öÊÛʯÓ͹«Ë¾É³ÌØ°¢ÃÀ1TBµÄÊý¾Ý


3.jpg


±¾Ô £¬Ò»¸öÃûΪZeroXµÄºÚ¿ÍÍÅ»ïÔÚ°µÍøÒÔ500ÍòÃÀÔªµÄ¼ÛÇ®³öÊÛɳÌØ°¢ÃÀ¹«Ë¾1TBµÄÊý¾Ý¡£É³ÌØ°¢À­²®Ê¯Ó͹«Ë¾¼ò³ÆɳÌØ°¢ÃÀ£¨Saudi Aramco£© £¬ÊÇÌìÏÂÉÏ×î´óµÄ¹«¹²Ê¯ÓͺÍ×ÔÈ»Æø¹«Ë¾Ö®Ò» £¬ÓµÓÐÁè¼Ý66000ÃûÔ±¹¤ £¬ÄêÊÕÈë½ü2300ÒÚÃÀÔª¡£ZeroX³ÆÕâЩÊý¾ÝÊÇÔÚ2020Äêͨ¹ýÈëÇÖɳÌØ°¢ÃÀµÄÍøÂç¼°·þÎñÆ÷»ñµÃµÄ £¬ÆäÖÐ×îÔçµÄ¿É×·Ëݵ½1993Äê¡£´Ë´Î鶵ÄÊý¾Ý°üÀ¨14254ÃûÔ±¹¤µÄÍêÕûÐÅÏ¢¡¢ÖÖÖÖϵͳµÄÏîÄ¿¹æ·¶ £»ÄÚ²¿·ÖÎö±¨¸æ¡¢Ð­Òé¡¢Ðź¯¡¢¶¨¼Û±í £»Scadaµã¡¢Wi-Fi¡¢IPÉãÏñ»úºÍIoT×°±¸µÄÍøÂç½á¹¹ £»Aramco¿Í»§Ãûµ¥¡¢·¢Æ±ºÍÌõÔ¼µÈ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/saudi-aramco-data-breach-sees-1-tb-stolen-data-for-sale/


4¡¢ÐµÄMosaicLoader¿ÉʹÓÃWindows DefenderÈƹý¼ì²â


4.jpg


BitdefenderÑо¿Ö°Ô±·¢Ã÷жñÒâÈí¼þMosaicLoader¿ÉʹÓÃWindows DefenderÈƹý¼ì²â¡£¸Ã¶ñÒâÈí¼þͨ¹ýËÑË÷ÒýÇæЧ¹ûαװ³ÉÆƽâÈí¼þ £¬¾ßÓÐÖØ´óµÄÄÚ²¿½á¹¹ £¬Ö¼ÔÚÈƹý¶ñÒâÈí¼þÆÊÎö¡£ÆäÄ£ÄâÀàËÆÓÚÕýµ±Èí¼þµÄÎļþÐÅÏ¢²¢Ê¹ÓÃС¿éºÍÎÞÐòÖ´ÐÐ˳Ðò¾ÙÐдúÂë»ìÏý¡£ÔÚÀÖ³ÉѬȾĿµÄºó £¬×î³õµÄ»ùÓÚDelphiµÄdropper»á´ÓÔ¶³Ì·þÎñÆ÷»ñÈ¡ÏÂÒ»½×¶ÎµÄpayload £¬²¢ÔÚWindows DefenderÖÐΪÏÂÔصĿÉÖ´ÐÐÎļþÌí¼ÓÍâµØɨ³ýÏîÒÔÈƹýɱ¶¾Èí¼þµÄɨÃè¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2021/07/this-new-malware-hides-itself-among.html 


5¡¢QualysÅû¶LinuxÄÚºËÖеÄÍâµØÌáȨÎó²îSequoia


5.jpg


QualysÑо¿Ö°Ô±Åû¶ÁËLinuxÄÚºËÖеÄÍâµØÌáȨÎó²îSequoia¡£¸ÃÎó²î×·×ÙΪCVE-2021-33909 £¬±£´æÓÚÓÃÀ´ÖÎÀíÓû§Êý¾ÝµÄÎļþϵͳ²ã £¬ÊÇÓÉÓÚfs/seq_file.cûÓÐ׼ȷÏÞÖÆseq»º³åÇø·ÖÅɶøµ¼ÖµÄ¡£Qualys³Æ £¬¸ÃÎó²îÓ°ÏìÁË×Ô2014ÄêÒÔÀ´Ðû²¼µÄËùÓÐLinuxÄں˰汾¡£±ðµÄ £¬Ñо¿Ö°Ô±»¹·¢Ã÷ÁËsystemdÖеÄÒ»¸ö¿ÍÕ»ºÄ¾¡µ¼Öµľܾø·þÎñÎó²î£¨CVE-2021-33910£© £¬±£´æÓÚ2015Äê4ÔÂÖ®ºóÐû²¼µÄËùÓÐsystemd°æ±¾ÖС£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/new-linux-kernel-bug-lets-you-get-root-on-most-modern-distros/