VMware vCenter Server¼°Cloud FoundationÆØÒªº¦Çå¾²Îó²î

Ðû²¼Ê±¼ä 2024-09-19
1. VMware vCenter Server¼°Cloud FoundationÆØÒªº¦Çå¾²Îó²î


9ÔÂ18ÈÕ£¬£¬£¬VMware¹«Ë¾½üÆÚ½ÒÆÆÁËÁ½¸öÕë¶ÔÆävCenter ServerºÍCloud Foundation²úÆ·µÄÖØ´óÇå¾²Îó²î£¬£¬£¬CVE-2024-38812ºÍCVE-2024-38813£¬£¬£¬»®·ÖÉæ¼°¶ÑÒç³öºÍȨÏÞÌáÉýÎÊÌ⣬£¬£¬¶ÔvCenter Server 7.0ºÍ8.0¼°Cloud Foundation 4.xºÍ5.x°æ±¾×é³ÉÍþв¡£¡£¡£¡£¡£CVE-2024-38812ÓÈΪÑÏÖØ£¬£¬£¬CVSSÆÀ·Ö¸ß´ï9.8£¬£¬£¬ÔÊÐíÓµÓÐÍøÂç»á¼ûȨÏ޵Ĺ¥»÷Õßͨ¹ý·¢ËͶ¨ÖÆÊý¾Ý°üÖ´ÐÐÔ¶³Ì´úÂë¡£¡£¡£¡£¡£¶øCVE-2024-38813ÔòÄÜÈù¥»÷Õß½«È¨ÏÞÌáÉýÖÁroot¼¶±ð£¬£¬£¬CVSSÆÀ·ÖΪ7.5¡£¡£¡£¡£¡£VMwareÒÑѸËÙÏìÓ¦£¬£¬£¬Ðû²¼ÁËÐÞ²¹³ÌÐò£¬£¬£¬²¢Ç¿ÁÒ±Þ²ßÓû§Á¬Ã¦Éý¼¶ÖÁ×îа汾£¨vCenter Server 8.0 U3b»ò7.0 U3s£¬£¬£¬Cloud FoundationÔòÓ¦ÓÃKB88287ÖеÄÒì²½²¹¶¡£¡£¡£¡£¡£©¡£¡£¡£¡£¡£Ö»¹ÜÏÖÔÚδ·¢Ã÷ÕâЩÎó²îµÄÒ°ÍâʹÓð¸Àý£¬£¬£¬µ«¼øÓÚvCenter ServerÔÚÐéÄ⻯ÇéÐÎÖÎÀíÖеĽ¹µãְ룬£¬£¬ÆäDZÔÚΣº¦½ûÖ¹ºöÊÓ¡£¡£¡£¡£¡£


https://cybersecuritynews.com/vmware-vcenter-server-remote-code/#google_vignette


2. CISA ÖÒÑÔ Adobe Flash Player Îó²îÕý±»Æð¾¢Ê¹ÓÃ


9ÔÂ17ÈÕ£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©½üÆÚ½«ËĸöÑÏÖØµÄAdobe Flash PlayerÎó²îÁÐÈëÆäÒÑÖª¿ÉʹÓÃÎó²î£¨KEV£©Ä¿Â¼ÖУ¬£¬£¬ÕâЩÎó²îµÄÆØ¹âÔÙ´Î͹ÏÔÁ˼´±ãÔÚFlash PlayerÒÑÐû²¼ÓÚ2020ÄêÖÕֹʹÓú󣬣¬£¬ÒÅÁôÈí¼þÎó²îµÄÒ»Á¬Çå¾²Íþв¡£¡£¡£¡£¡£ÕâЩÎó²î£¬£¬£¬°üÀ¨¿É×·ËÝÖÁ2013ÄêµÄCVE-2013-0643ºÍCVE-2013-0648´úÂëÖ´ÐÐÎó²î£¬£¬£¬ÒÔ¼°2014ÄêµÄCVE-2014-0497ÕûÊýÏÂÒçºÍCVE-2014-0502Ë«ÖØÊÍ·ÅÎó²î£¬£¬£¬¶¼ÔøÊÇÁãÈÕ¹¥»÷µÄÄ¿µÄ£¬£¬£¬¶ÔFirefoxÓû§µÈ×é³ÉÍþв¡£¡£¡£¡£¡£Ö»¹ÜFlash PlayerÔøÊÇÍøÂ绥¶¯ÄÚÈݵĻùʯ£¬£¬£¬µ«Ëæ×Åʱ¼äµÄÍÆÒÆ£¬£¬£¬ËüÒѳÉΪÖ÷ÒªµÄÇå¾²Òþ»¼£¬£¬£¬ÆµÈÔÊܵ½¹¥»÷ÕßʹÓᣡ£¡£¡£¡£CISAÒò´Ë½ôÆÈºôÓõËùÓÐÁª°î»ú¹¹ÔÚ2024Äê10ÔÂ8ÈÕǰ³¹µ×ÒÆ³ýFlash Player£¬£¬£¬ÒÔ½µµÍDZÔÚµÄÇ徲Σº¦£¬£¬£¬±£»£»£» £»¤Ãô¸ÐÕþ¸®Êý¾ÝºÍÒªº¦»ù´¡ÉèÊ©ÃâÊÜË𺦡£¡£¡£¡£¡£Adobe×Ô2020ÄêÆðÒÑ×èÖ¹Flash PlayerµÄ¿ª·¢£¬£¬£¬Ö÷Á÷ä¯ÀÀÆ÷Ò²²»ÔÙ¼æÈÝ£¬£¬£¬ËäÈ» Flash Ò»¾­ÔÚ»¥ÁªÍøµÄÉú³¤ÖÐʩչ¹ýÖ÷Òª×÷Ó㬣¬£¬µ«ÆäÇ徲Σº¦ÒÑʹÆä¹ýʱ¡£¡£¡£¡£¡£


https://securityonline.info/cisa-warns-of-actively-exploited-adobe-flash-player-vulnerabilities/


3. UNC2970×é֯ʹÓÃľÂí»¯PDFÔĶÁÆ÷¹¥»÷Òªº¦»ù´¡ÉèÊ©


9ÔÂ17ÈÕ£¬£¬£¬MandiantÕ¹ÏÖÁËÓ볯ÏʹØÁªµÄUNC2970×éÖ¯ÌᳫµÄÖØ´óÍøÂçÌØ¹¤»î¶¯£¬£¬£¬¸Ã×é֯ʹÓø߶ȶ¨ÖƵÄÍøÂç´¹ÂÚÊֶΣ¬£¬£¬Õë¶ÔÄÜÔ´ºÍº½¿Õº½ÌìµÈÒªº¦ÐÐÒµµÄ¸ß¼¶Ô±¹¤¡£¡£¡£¡£¡£UNC2970ͨ¹ýαװ³É×ÅÃûÆóÒµµÄÊÂÇéʱ»úÓÕ¶ü£¬£¬£¬ÏòÄ¿µÄ·¢ËͰüÀ¨Ä¾Âí»¯SumatraPDFÔĶÁÆ÷µÄZIPÎļþ£¬£¬£¬¸ÃÔĶÁÆ÷ÄÚǶMISTPENºóÃÅ£¬£¬£¬Ò»µ©Êܺ¦ÕßʹÓÃÆä·­¿ªÎ±×°³ÉְλÐÎòµÄPDFÎļþ£¬£¬£¬¼´´¥·¢Ñ¬È¾Á´¡£¡£¡£¡£¡£MISTPEN×÷ΪһÖÖÒþÃØ¹¤¾ß£¬£¬£¬Ö§³Ö¶àÖÖ¶ñÒâ²Ù×÷£¬£¬£¬Ê¹ÓÃÕýµ±Ð§ÀÍÈÚÈëÍøÂçÁ÷Á¿£¬£¬£¬ÒÔʵÏÖºã¾Ã¿ØÖƺÍÊý¾ÝÇÔÈ¡¡£¡£¡£¡£¡£UNC2970ͨ¹ýÐ޸ĿªÔ´Èí¼þ´úÂëºÍÈ«ÐÄÉè¼ÆµÄְλÐÎò£¬£¬£¬Ìá¸ßÁ˹¥»÷µÄÒþ²ØÐÔºÍÀÖ³ÉÂÊ£¬£¬£¬¶Ô¶à¸ö¹ú¼ÒµÄ»ù´¡ÉèÊ©Çå¾²×é³ÉÖØ´óÍþв¡£¡£¡£¡£¡£¼øÓÚÆäÕë¶ÔÒªº¦ÁìÓòµÄ»î¶¯£¬£¬£¬Ïà¹Ø×éÖ¯Ðè½ôÆÈÔöÇ¿·ÀÓù²½·¥£¬£¬£¬ÒÔµÖÓù´ËÀà¸ß¼¶ÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£¡£¡£


https://securityonline.info/unc2970s-backdoor-deployed-via-trojanized-pdf-reader-targets-critical-infrastructure/


4. ¶íÂÞ˹Çå¾²¹«Ë¾Dr.WebÔâºÚ¿Í¹¥»÷


9ÔÂ18ÈÕ£¬£¬£¬¶íÂÞ˹×ÅÃûµÄ·´¶ñÒâÈí¼þ¹«Ë¾Doctor Web£¨Dr.Web£©¹ûÕæÐû²¼£¬£¬£¬ÆäIT»ù´¡ÉèÊ©ÔâÓöÁËÍøÂç¹¥»÷£¬£¬£¬²¢Òò´Ë·¢Ã÷ÁËÇå¾²Îó²î¡£¡£¡£¡£¡£ÃæÁÙÕâÒ»½ôÆÈÇéÐΣ¬£¬£¬Dr.WebѸËÙ½ÓÄÉÐж¯£¬£¬£¬ÇжÏÁËËùÓÐЧÀÍÆ÷ÓëÄÚ²¿ÍøÂçµÄÅþÁ¬£¬£¬£¬ÒÔ±ÜÃâ¹¥»÷½øÒ»²½À©É¢¡£¡£¡£¡£¡£´Ë´Î¹¥»÷ʼÓÚ9ÔÂ14ÈÕ£¬£¬£¬Dr.WebËæ¼´Õö¿ªÁËÏ꾡µÄÊӲ첢ÑÏÃÜ¼à¿ØÊÂ̬Éú³¤¡£¡£¡£¡£¡£ÔÚÊÓ²ìʱ´ú£¬£¬£¬ÎªÁ˰ü¹Ü¿Í»§Çå¾²£¬£¬£¬Dr.Web²»µÃ²»ÔÚÖÜÒ»ÔÝÍ£Á˲¡¶¾Êý¾Ý¿âµÄ¸üÐÂЧÀÍ¡£¡£¡£¡£¡£È»¶ø£¬£¬£¬¹«Ë¾Ç¿µ÷£¬£¬£¬¶Ô»ù´¡ÉèÊ©µÄÆÆËðÍýÏëÒѱ»ÊµÊ±×èÖ¹£¬£¬£¬ËùÓÐÊÜDr.Web±£»£»£» £»¤µÄÓû§ÏµÍ³¾ùδÊܵ½Ó°Ïì¡£¡£¡£¡£¡£ÖÜÈý£¬£¬£¬Dr.WebÐû²¼Òѻָ´²¡¶¾Êý¾Ý¿âµÄ¸üÐÂЧÀÍ£¬£¬£¬²¢È·ÈÏ´Ë´ÎÇå¾²ÊÂÎñ²¢Î´¸øÆä¿Í»§´øÀ´ÈκθºÃæÓ°Ïì¡£¡£¡£¡£¡£Îª³¹µ×Ïû³ýÇå¾²Íþв£¬£¬£¬Dr.Web½ÓÄÉÁ˰üÀ¨Ê¹ÓÃÊÊÓÃÓÚLinuxµÄDr.Web FixIt!ÔÚÄÚµÄһϵÁÐÓ¦¼±²½·¥£¬£¬£¬²¢ÀֳɸôÀëÁËDZÔÚΣº¦¡£¡£¡£¡£¡£¹«Ë¾ÍøÂçµÄÊý¾ÝΪÇ徲ר¼ÒÌṩÁËÒªº¦ÐÅÏ¢£¬£¬£¬×ÊÖúËûÃÇÈ·±£ÏµÍ³Çå¾²ÎÞÓÝ¡£¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/russian-security-firm-drweb-disconnects-all-servers-after-breach/


5. FleetPandaЧÀÍÆ÷ÉèÖùýʧ̻¶°ÙÍò·ÝÃô¸ÐÎļþ


9ÔÂ18ÈÕ£¬£¬£¬Ê¯ÓÍÓëȼÁÏÐÐÒµµÄÁìÏÈÈí¼þ¹©Ó¦ÉÌFleetPandaÒòЧÀÍÆ÷ÉèÖùýʧ¶øÔâÓöÁËÑÏÖØµÄÊý¾Ýй¶ÊÂÎñ£¬£¬£¬½ü°ÙÍò·ÝÃô¸ÐÎļþ±»²»·¨Ì»Â¶¡£¡£¡£¡£¡£ÕâЩÎļþº­¸ÇÁË´Ó2019ÄêÖÁ2024Äê8Ôµķ¢Æ±¡¢ÔËÊä¼Í¼¡¢¼ÝÕÕÐÅÏ¢¼°Åä¾°ÊÓ²ìµÈ£¬£¬£¬Éæ¼°¼ÓÖÝ¡¢¶íÀÕ¸Ô¡¢µÂ¿ËÈøË¹µÈ¶à¸öÖÝ£¬£¬£¬×ÜÁ¿¸ß´ï193GB¡£¡£¡£¡£¡£ÍøÂçÇ徲ר¼ÒJeremiah Fowler·¢Ã÷ÁËÕâһδÊܱ£»£»£» £»¤µÄÊý¾Ý¿â£¬£¬£¬ÆäÄÚÈÝÏ꾡µØÕ¹ÏÖÁËÐÐÒµÄÚµÄȼÁÏÔËÊäÓëÓªÒµÍùÀ´£¬£¬£¬ÉõÖÁ°üÀ¨ÁËÉç»áÇå¾²ºÅÂëµÈ¸ß¶ÈÃô¸ÐµÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£¡£¡£´Ë´Îй¶²»µ«Íþвµ½Ð¡ÎÒ˽¼ÒÒþ˽Çå¾²£¬£¬£¬»¹¿ÉÄÜÒý·¢Éí·Ý͵ÇԺ;­¼ÃËðʧ£¬£¬£¬Í¬Ê±£¬£¬£¬·¸·¨·Ö×Ó¿ÉÄÜʹÓ÷¢Æ±ÐÅϢʵÑéڲƭÐÐΪ¡£¡£¡£¡£¡£¶ÔʯÓͺÍȼÁÏÐÐÒµ¶øÑÔ£¬£¬£¬¹©Ó¦Á´µÄÎȹÌÐÔºÍÐÅÏ¢Çå¾²ÒàÊܵ½¹¥»÷£¬£¬£¬¿ÉÄÜÒý·¢Êг¡²¨¶¯ºÍ¼ÛÇ®ÉÏÕÇ¡£¡£¡£¡£¡£Fowler½¨ÒéÆóÒµÓ¦½«Ãô¸ÐÊý¾ÝÓëÒ»Ñùƽ³£ÓªÒµÎļþÊèÉ¢´æ´¢£¬£¬£¬Ç¿»¯»á¼û¿ØÖÆ£¬£¬£¬°´ÆÚ¸üÐÂϵͳ²¢ÔöǿԱ¹¤Åàѵ£¬£¬£¬ÒÔ¹¹½¨Ô½·¢Îȹ̵ÄÍøÂçÇå¾²·ÀµØ¡£¡£¡£¡£¡£


https://hackread.com/server-misconfiguration-fuel-software-exposed-pii-data/


6. Delta Primeƽ̨ÔâÊÜÍøÂç¹¥»÷£¬£¬£¬¼ÓÃÜÇ®±ÒʧÔô½üÁù°ÙÍòÃÀÔª


9ÔÂ18ÈÕ£¬£¬£¬Delta Primeƽ̨½üÆÚÔâÓöÑÏÖØÍøÂç¹¥»÷£¬£¬£¬µ¼Ö¼ÛÖµ¸ß´ïÔ¼600ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò±»µÁ£¬£¬£¬Ô¶³¬×î³õ±¨¸æµÄ450ÍòÃÀÔªËðʧ¡£¡£¡£¡£¡£Çø¿éÁ´Çå¾²¹«Ë¾CyversÓÚ9ÔÂ16ÈÕÂÊÏÈ½ÒÆÆ´ËÊ£¬£¬£¬Ö¸³öºÚ¿ÍÒÑ×îÏȽ«ÍµÈ¡µÄUSDCת»»ÎªETH£¬£¬£¬²¢ÖÒÑÔÔÚ¼ì²â³õÆÚ£¬£¬£¬ºÚ¿ÍÇ®°üÈÔÒ»Á¬´Óƽ̨³é×Ê£¬£¬£¬Íþв½øÒ»²½Ëðʧ¡£¡£¡£¡£¡£Ëæºó£¬£¬£¬Fuzzland´ú±íÈ·ÈÏÁËËðʧ×ܶîÒÑÅÊÉýÖÁ½ü600ÍòÃÀÔª£¬£¬£¬²¢Õ¹ÏÖ±£´æ¸ü¶à¶ñÒâÉúÒâ»î¶¯¡£¡£¡£¡£¡£´Ë´ÎÈëÇÖ±»¹éÒòÓÚDelta Primeƽ̨Ǯ°ü¹ÜÀíÔ±ÃÜԿʧÔô£¬£¬£¬ºÚ¿Íµ½ÊÖºó¿ØÖÆÁËÍйÜÊðÀíºÏÔ¼µÄÇ®°ü£¬£¬£¬½ø¶øÐ޸ĺÏÔ¼ÉèÖ㬣¬£¬½«ÆäÖØ¶¨ÏòÖÁ¶ñÒâºÏÔ¼£¬£¬£¬´Ó¶øÔÚArbitrumÍøÂçÉÏ·Å×ÝÇÔÈ¡×ʽ𣬣¬£¬×ÜËðʧ¹ÀËãµÖ´ï590ÍòÃÀÔª¡£¡£¡£¡£¡£ÕâÒ»ÊÂÎñÒýÆðÁËÍøÂçÇå¾²ÁìÓòµÄ¸ß¶È¹Ø×¢£¬£¬£¬×¨¼ÒÖÒÑÔºÚ¿ÍδÀ´¿ÉÄÜÃé×¼¸ü´ó¹æÄ£µÄÄ¿µÄ£¬£¬£¬ÌØÊâÊÇÃÀ¹ú¼ÓÃÜÇ®±ÒETF»ù½ð£¬£¬£¬ÆäÖØ´óµÄ±ÈÌØ±Ò´¢±¸¶ÔºÚ¿Í¼«¾ßÓÕ»óÁ¦£¬£¬£¬°üÀ¨³¯ÏÊLazarus¼¯ÍŵÈDZÔÚÍþв¡£¡£¡£¡£¡£¾ÝDuneÆÊÎöƽ̨Êý¾ÝÏÔʾ£¬£¬£¬±ÈÌØ±ÒÖ§³ÖµÄETF×Ü×ʲúÒѸߴï534ÒÚÃÀÔª£¬£¬£¬½øÒ»²½Í¹ÏÔÁË´ËÀà×ʲúµÄÇ徲Σº¦¡£¡£¡£¡£¡£


https://securityonline.info/cyberattack-on-delta-prime-losses-soar-to-6m/