ÐÅÏ¢Çå¾²Öܱ¨-2021ÄêµÚ24ÖÜ

Ðû²¼Ê±¼ä 2021-06-15

> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2021Äê06ÔÂ07ÈÕÖÁ06ÔÂ13ÈÕ¹²ÊÕ¼Çå¾²Îó²î73¸ö£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇMicrosoft Windows Defender CVE-2021-31985´úÂëÖ´ÐÐÎó²î£» £»£»£»Rockwell Automation ISaGRAF CVE-2020-25176 IXLЭÒé´úÂëÖ´ÐÐÎó²î£» £»£»£»SAP NetWeaver ABAP Server CVE-2021-27632ÄÚ´æÆÆËðÎó²î£» £»£»£»Schneider Electric IGSS CGFÔ½½çдÎó²î£» £»£»£»Microsoft Windows TCP/IPÇå¾²ÈÆ¹ýÎó²î¡£¡£¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÃÀ¹úCox MediaÔâµ½ÀÕË÷¹¥»÷£¬£¬£¬µçÊӺ͵çֱ̨²¥ÖÐÖ¹£» £»£»£»INKYÅû¶ÒÔÌá·ÀÀÕË÷Èí¼þΪÖ÷ÌâµÄÐÂÒ»ÂÖ´¹Âڻ£» £»£»£»ºÚ¿ÍÔÚ°µÍø¹ûÕæ°üÀ¨84ÒÚÃÜÂëµÄÜöÝÍRockYou2021£» £»£»£»FBI×·»ØColonial PipelineÖ§¸¶µÄ230ÍòÃÀÔªÊê½ð£» £»£»£»MicrosoftÇå¾²¸üУ¬£¬£¬ÐÞ¸´7¸ö0dayÔÚÄÚµÄ50¸öÎó²î¡£¡£¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£


> Ö÷ÒªÇå¾²Îó²îÁбí


1.Microsoft Windows Defender CVE-2021-31985´úÂëÖ´ÐÐÎó²î


Microsoft Windows Defender±£´æÇå¾²Îó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31985


2.Rockwell Automation ISaGRAF CVE-2020-25176 IXLЭÒé´úÂëÖ´ÐÐÎó²î


Rockwell Automation ISaGRAF IXLЭÒé´¦Öóͷ£ÎļþÃû±£´æÇå¾²Îó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£

https://us-cert.cisa.gov/ics/advisories/icsa-20-280-01


3.SAP NetWeaver ABAP Server CVE-2021-27632ÄÚ´æÆÆËðÎó²î


SAP NetWeaver ABAP Server±£´æÄÚ´æÆÆËðÎó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉʹӦÓóÌÐòÍ߽⻠£»£»£»òÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£

https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=578125999


4.Schneider Electric IGSS CGFÔ½½çдÎó²î


Schneider Electric IGSS CGFÎļþ´¦Öóͷ£±£´æÔ½½çдÎó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇ󣬣¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬¿ÉʹӦÓóÌÐòÍ߽⻠£»£»£»òÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£

https://us-cert.cisa.gov/ics/advisories/icsa-21-159-04


5.Microsoft Windows TCP/IPÇå¾²ÈÆ¹ýÎó²î


Microsoft Windows Windows TCP/IP±£´æÇå¾²Îó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉÈÆ¹ýÇå¾²ÏÞÖÆÎ´ÊÚȨ»á¼û¡£¡£¡£¡£¡£

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31970


> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢ÃÀ¹úCox MediaÔâµ½ÀÕË÷¹¥»÷£¬£¬£¬µçÊӺ͵çֱ̨²¥ÖÐÖ¹


1.jpg


ÃÀ¹ú×î´óµÄýÌ弯ÍÅÖ®Ò»Cox Media Group£¨CMG£©Ôâµ½ÀÕË÷¹¥»÷£¬£¬£¬²¿·ÖµçÊӺ͵çֱ̨²¥ÖÐÖ¹¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÓµÓÐ33¼ÒµçÊǪ́¡¢54¸ö¹ã²¥µç̨¡¢¶à¸ö¿çƽ̨Á÷ýÌåÊÓÆµÆ½Ì¨ºÍÊý×ÖÆ½Ì¨¡£¡£¡£¡£¡£Inside Radio³Æ¹¥»÷±¬·¢ÔÚ6ÔÂ3ÈÕÉÏÎ磬£¬£¬Æä¶ÔCMGµÄ¶à¸öµç̨¾ÙÐÐÁËËæ»ú¼ì²é£¬£¬£¬·¢Ã÷µçÌ¨ÍøÕ¾ÈÔ¿É»á¼û£¬£¬£¬µ«ÔÚÏßÁ÷ýÌåÒÑÀëÏߣ¬£¬£¬²¢ÌáÐÑ¡°ÒôƵÔÝʱ²»¿ÉÓᱡ£¡£¡£¡£¡£ÕâÊÇÀÕË÷Èí¼þÍÅ»ïµÚ¶þ´Î¹¥»÷ÃÀ¹úÖ÷ÒªµÄýÌ幫˾£¬£¬£¬2019Äê9Ô£¬£¬£¬CBSÆìÏÂµÄ¹ã²¥ÍøÂçEntercomÔâµ½¹¥»÷£¬£¬£¬µ¼Ö²¿·Ö¹ã²¥µç̨ÖÐÖ¹¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

http://www.insideradio.com/free/cox-media-group-stations-still-offline-a-day-after-apparent-malware-attack/article_7c619380-c506-11eb-9b7b-4f6576d00aa0.html


2¡¢INKYÅû¶ÒÔÌá·ÀÀÕË÷Èí¼þΪÖ÷ÌâµÄÐÂÒ»ÂÖ´¹Âڻ


2.jpg


ÓʼþÇ徲ƽ̨INKYÅû¶ÒÔÌá·ÀÀÕË÷Èí¼þΪÖ÷ÌâµÄÐÂÒ»ÂÖ´¹Âڻ¡£¡£¡£¡£¡£½üÆÚ¶ÔColonial PipelineµÄÀÕË÷Èí¼þ¹¥»÷Òý·¢ÁËеĴ¹Âڻ£¬£¬£¬¸Ã»î¶¯µÄÓʼþ¾ùΪÓÐÕë¶ÔÐԵĽôÆÈ֪ͨ£¬£¬£¬½¨ÒéÊÕ¼þÈ˵ã»÷Á´½ÓÒÔ×°ÖÃϵͳ¸üУ¬£¬£¬À´¼ì²â²¢Ìá·À×îеÄÀÕË÷Èí¼þ¡£¡£¡£¡£¡£¹¥»÷ÕßʹÓõÄÓòÃûΪms-sysupdate[.]comºÍselectionpatch [.]com£¬£¬£¬ÕâºÜÈÝÒ×±»ÎóÒÔΪÊÇÕýµ±ÓòÃû£¬£¬£¬Æä»¹Ê¹ÓÃÁËCobalt Strike¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/phishing-uses-colonial-pipeline-ransomware-lures-to-infect-victims/


3¡¢ºÚ¿ÍÔÚ°µÍø¹ûÕæ°üÀ¨84ÒÚÃÜÂëµÄÜöÝÍRockYou2021


3.jpg


ijºÚ¿ÍÔÚ°µÍøÐû²¼ÁË100GBµÄTXTÎļþ£¬£¬£¬ÆäÖаüÀ¨84ÒÚ¸öÃÜÂ룬£¬£¬ÕâЩÃÜÂë¿ÉÄÜÊÇ´Ó֮ǰµÄй¶ÊÂÎñÖкϲ¢¶øÀ´µÄ¡£¡£¡£¡£¡£ºÚ¿Í³ÆÆäÖаüÀ¨µÄËùÓÐÃÜÂ볤¶È¾ùΪ6-20¸ö×Ö·û£¬£¬£¬É¾³ýÁË·ÇASCII×Ö·ûºÍ¿Õ¸ñ¡£¡£¡£¡£¡£Æä»¹ÌåÏÖ¸ÃÜöÝͰüÀ¨820ÒÚ¸öÃÜÂ룬£¬£¬µ«¾­ÓÉÑо¿Ö°Ô±²âÊÔ£¬£¬£¬ÆäÖÐÖ»ÓÐ8459060239¸öÊÇΨһµÄ£¬£¬£¬ÕâËÆºõÊÇÓÐÊ·ÒÔÀ´×î´óµÄÃÜÂëÜöÝÍ¡£¡£¡£¡£¡£¸ÃÜöÝͱ»³ÆÎªRockYou2021£¬£¬£¬»òÐíÊDzο¼ÁË2009Ä걬·¢µÄRockYouÊý¾Ýй¶ÊÂÎñ£¬£¬£¬ºÚ¿ÍÇÔÈ¡ÁËÁè¼Ý3200ÍòÓû§µÄÃÜÂë¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://cybernews.com/security/rockyou2021-alltime-largest-password-compilation-leaked/


4¡¢FBI×·»ØColonial PipelineÖ§¸¶µÄ230ÍòÃÀÔªÊê½ð


4.jpg


ÃÀ¹úFBIºÍDOJÁªºÏ×·»ØÁËColonial PipelineÖ§¸¶µÄÌ©°ëÊê½ð¡£¡£¡£¡£¡£5ÔÂ7ÈÕ£¬£¬£¬¸Ã¹«Ë¾Ôâµ½ÁËDarkSideÀÕË÷Èí¼þ¹¥»÷ȼÁϹܵÀ¹Ø±Õ£¬£¬£¬Îª´ËÆäÖ§¸¶ÁË×ܼÆ440ÍòÃÀÔªµÄÊê½ð£¬£¬£¬´Ë´Î×·»ØÁËÆäÖеÄ230ÍòÃÀÔª¡£¡£¡£¡£¡£DOJÌåÏÖ£¬£¬£¬ËûÃÇͨ¹ýÉó²é±ÈÌØ±Ò¹«¹²·ÖÀàÕË£¬£¬£¬¸ú×ÙÁ˶à´Î±ÈÌØ±ÒתÕË£¬£¬£¬²¢È·¶¨Ô¼Äª63.7±ÈÌØ±ÒÒÑ×ªÒÆµ½Ìض¨µØµã£¬£¬£¬¶øFBIÓµÓиõصãµÄ˽Կ»ò´óÖµÈЧµÄµØµã¡£¡£¡£¡£¡£ÃÀ¹ú˾·¨²¿»¹³Æ£¬£¬£¬ÊÂʵÉÏÁª°îÊÓ²ì¾Ö´ÓÒ»×îÏȾÍÉèÁËȦÌס£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/fbi-claws-back-millions-darksides-ransom/166705/


5¡¢MicrosoftÇå¾²¸üУ¬£¬£¬ÐÞ¸´7¸ö0dayÔÚÄÚµÄ50¸öÎó²î


5.jpg


MicrosoftÐû²¼ÁË6Ô·ݵÄÖܶþÇå¾²¸üУ¬£¬£¬ÐÞ¸´Á˰üÀ¨7¸ö0dayÔÚÄÚµÄ50¸öÎó²î¡£¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄ0day°üÀ¨WindowsÄÚºËÐÅϢй¶Îó²î£¨CVE-2021-31955£©¡¢Windows NTFSÌáȨÎó²î£¨CVE-2021-31956£©¡¢Microsoft DWMÌáȨÎó²î£¨CVE-2021-33739£©¡¢Windows MSHTMLƽ̨RCEÎó²î£¨CVE-2021-33742£©¡¢MicrosoftÔöÇ¿ÐͼÓÃÜÌṩ³ÌÐòÌáȨÎó²î£¨CVE-2021-31199ºÍCVE-2021-31201£©ºÍWindowsÔ¶³Ì×ÀÃæÐ§À;ܾøÐ§ÀÍÎó²î£¨CVE-2021-31968£©¡£¡£¡£¡£¡£ÆäÖУ¬£¬£¬Ç°6¸ö0dayÒÑÔÚÒÑÍù±»Ê¹Óùý¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/microsoft/microsoft-june-2021-patch-tuesday-fixes-6-exploited-zero-days-50-flaws/