ÐÅÏ¢Çå¾²Öܱ¨-2021ÄêµÚ24ÖÜ
Ðû²¼Ê±¼ä 2021-06-15> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
2021Äê06ÔÂ07ÈÕÖÁ06ÔÂ13ÈÕ¹²ÊÕ¼Çå¾²Îó²î73¸ö£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇMicrosoft Windows Defender CVE-2021-31985´úÂëÖ´ÐÐÎó²î£»£»£»£»Rockwell Automation ISaGRAF CVE-2020-25176 IXLÐÒé´úÂëÖ´ÐÐÎó²î£»£»£»£»SAP NetWeaver ABAP Server CVE-2021-27632ÄÚ´æÆÆËðÎó²î£»£»£»£»Schneider Electric IGSS CGFÔ½½çдÎó²î£»£»£»£»Microsoft Windows TCP/IPÇå¾²ÈÆ¹ýÎó²î¡£¡£¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÃÀ¹úCox MediaÔâµ½ÀÕË÷¹¥»÷£¬£¬£¬µçÊӺ͵çֱ̨²¥ÖÐÖ¹£»£»£»£»INKYÅû¶ÒÔÌá·ÀÀÕË÷Èí¼þΪÖ÷ÌâµÄÐÂÒ»ÂÖ´¹Âڻ£»£»£»£»ºÚ¿ÍÔÚ°µÍø¹ûÕæ°üÀ¨84ÒÚÃÜÂëµÄÜöÝÍRockYou2021£»£»£»£»FBI×·»ØColonial PipelineÖ§¸¶µÄ230ÍòÃÀÔªÊê½ð£»£»£»£»MicrosoftÇå¾²¸üУ¬£¬£¬ÐÞ¸´7¸ö0dayÔÚÄÚµÄ50¸öÎó²î¡£¡£¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£
> Ö÷ÒªÇå¾²Îó²îÁбí
1.Microsoft Windows Defender CVE-2021-31985´úÂëÖ´ÐÐÎó²î
Microsoft Windows Defender±£´æÇå¾²Îó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31985
2.Rockwell Automation ISaGRAF CVE-2020-25176 IXLÐÒé´úÂëÖ´ÐÐÎó²î
Rockwell Automation ISaGRAF IXLÐÒé´¦Öóͷ£ÎļþÃû±£´æÇå¾²Îó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
https://us-cert.cisa.gov/ics/advisories/icsa-20-280-01
3.SAP NetWeaver ABAP Server CVE-2021-27632ÄÚ´æÆÆËðÎó²î
SAP NetWeaver ABAP Server±£´æÄÚ´æÆÆËðÎó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉʹӦÓóÌÐòÍ߽⻣»£»£»òÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=578125999
4.Schneider Electric IGSS CGFÔ½½çдÎó²î
Schneider Electric IGSS CGFÎļþ´¦Öóͷ£±£´æÔ½½çдÎó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇ󣬣¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬¿ÉʹӦÓóÌÐòÍ߽⻣»£»£»òÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£
https://us-cert.cisa.gov/ics/advisories/icsa-21-159-04
5.Microsoft Windows TCP/IPÇå¾²ÈÆ¹ýÎó²î
Microsoft Windows Windows TCP/IP±£´æÇå¾²Îó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉÈÆ¹ýÇå¾²ÏÞÖÆÎ´ÊÚȨ»á¼û¡£¡£¡£¡£
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31970
> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢ÃÀ¹úCox MediaÔâµ½ÀÕË÷¹¥»÷£¬£¬£¬µçÊӺ͵çֱ̨²¥ÖÐÖ¹
ÃÀ¹ú×î´óµÄýÌ弯ÍÅÖ®Ò»Cox Media Group£¨CMG£©Ôâµ½ÀÕË÷¹¥»÷£¬£¬£¬²¿·ÖµçÊӺ͵çֱ̨²¥ÖÐÖ¹¡£¡£¡£¡£¸Ã¹«Ë¾ÓµÓÐ33¼ÒµçÊǪ́¡¢54¸ö¹ã²¥µç̨¡¢¶à¸ö¿çƽ̨Á÷ýÌåÊÓÆµÆ½Ì¨ºÍÊý×ÖÆ½Ì¨¡£¡£¡£¡£Inside Radio³Æ¹¥»÷±¬·¢ÔÚ6ÔÂ3ÈÕÉÏÎ磬£¬£¬Æä¶ÔCMGµÄ¶à¸öµç̨¾ÙÐÐÁËËæ»ú¼ì²é£¬£¬£¬·¢Ã÷µçÌ¨ÍøÕ¾ÈÔ¿É»á¼û£¬£¬£¬µ«ÔÚÏßÁ÷ýÌåÒÑÀëÏߣ¬£¬£¬²¢ÌáÐÑ¡°ÒôƵÔÝʱ²»¿ÉÓᱡ£¡£¡£¡£ÕâÊÇÀÕË÷Èí¼þÍÅ»ïµÚ¶þ´Î¹¥»÷ÃÀ¹úÖ÷ÒªµÄýÌ幫˾£¬£¬£¬2019Äê9Ô£¬£¬£¬CBSÆìÏÂµÄ¹ã²¥ÍøÂçEntercomÔâµ½¹¥»÷£¬£¬£¬µ¼Ö²¿·Ö¹ã²¥µç̨ÖÐÖ¹¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
http://www.insideradio.com/free/cox-media-group-stations-still-offline-a-day-after-apparent-malware-attack/article_7c619380-c506-11eb-9b7b-4f6576d00aa0.html
2¡¢INKYÅû¶ÒÔÌá·ÀÀÕË÷Èí¼þΪÖ÷ÌâµÄÐÂÒ»ÂÖ´¹Âڻ
ÓʼþÇ徲ƽ̨INKYÅû¶ÒÔÌá·ÀÀÕË÷Èí¼þΪÖ÷ÌâµÄÐÂÒ»ÂÖ´¹Âڻ¡£¡£¡£¡£½üÆÚ¶ÔColonial PipelineµÄÀÕË÷Èí¼þ¹¥»÷Òý·¢ÁËеĴ¹Âڻ£¬£¬£¬¸Ã»î¶¯µÄÓʼþ¾ùΪÓÐÕë¶ÔÐԵĽôÆÈ֪ͨ£¬£¬£¬½¨ÒéÊÕ¼þÈ˵ã»÷Á´½ÓÒÔ×°ÖÃϵͳ¸üУ¬£¬£¬À´¼ì²â²¢Ìá·À×îеÄÀÕË÷Èí¼þ¡£¡£¡£¡£¹¥»÷ÕßʹÓõÄÓòÃûΪms-sysupdate[.]comºÍselectionpatch [.]com£¬£¬£¬ÕâºÜÈÝÒ×±»ÎóÒÔΪÊÇÕýµ±ÓòÃû£¬£¬£¬Æä»¹Ê¹ÓÃÁËCobalt Strike¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/phishing-uses-colonial-pipeline-ransomware-lures-to-infect-victims/
3¡¢ºÚ¿ÍÔÚ°µÍø¹ûÕæ°üÀ¨84ÒÚÃÜÂëµÄÜöÝÍRockYou2021
ijºÚ¿ÍÔÚ°µÍøÐû²¼ÁË100GBµÄTXTÎļþ£¬£¬£¬ÆäÖаüÀ¨84ÒÚ¸öÃÜÂ룬£¬£¬ÕâЩÃÜÂë¿ÉÄÜÊÇ´Ó֮ǰµÄй¶ÊÂÎñÖкϲ¢¶øÀ´µÄ¡£¡£¡£¡£ºÚ¿Í³ÆÆäÖаüÀ¨µÄËùÓÐÃÜÂ볤¶È¾ùΪ6-20¸ö×Ö·û£¬£¬£¬É¾³ýÁË·ÇASCII×Ö·ûºÍ¿Õ¸ñ¡£¡£¡£¡£Æä»¹ÌåÏÖ¸ÃÜöÝͰüÀ¨820ÒÚ¸öÃÜÂ룬£¬£¬µ«¾ÓÉÑо¿Ö°Ô±²âÊÔ£¬£¬£¬ÆäÖÐÖ»ÓÐ8459060239¸öÊÇΨһµÄ£¬£¬£¬ÕâËÆºõÊÇÓÐÊ·ÒÔÀ´×î´óµÄÃÜÂëÜöÝÍ¡£¡£¡£¡£¸ÃÜöÝͱ»³ÆÎªRockYou2021£¬£¬£¬»òÐíÊDzο¼ÁË2009Ä걬·¢µÄRockYouÊý¾Ýй¶ÊÂÎñ£¬£¬£¬ºÚ¿ÍÇÔÈ¡ÁËÁè¼Ý3200ÍòÓû§µÄÃÜÂë¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://cybernews.com/security/rockyou2021-alltime-largest-password-compilation-leaked/
4¡¢FBI×·»ØColonial PipelineÖ§¸¶µÄ230ÍòÃÀÔªÊê½ð
ÃÀ¹úFBIºÍDOJÁªºÏ×·»ØÁËColonial PipelineÖ§¸¶µÄÌ©°ëÊê½ð¡£¡£¡£¡£5ÔÂ7ÈÕ£¬£¬£¬¸Ã¹«Ë¾Ôâµ½ÁËDarkSideÀÕË÷Èí¼þ¹¥»÷ȼÁϹܵÀ¹Ø±Õ£¬£¬£¬Îª´ËÆäÖ§¸¶ÁË×ܼÆ440ÍòÃÀÔªµÄÊê½ð£¬£¬£¬´Ë´Î×·»ØÁËÆäÖеÄ230ÍòÃÀÔª¡£¡£¡£¡£DOJÌåÏÖ£¬£¬£¬ËûÃÇͨ¹ýÉó²é±ÈÌØ±Ò¹«¹²·ÖÀàÕË£¬£¬£¬¸ú×ÙÁ˶à´Î±ÈÌØ±ÒתÕË£¬£¬£¬²¢È·¶¨Ô¼Äª63.7±ÈÌØ±ÒÒÑ×ªÒÆµ½Ìض¨µØµã£¬£¬£¬¶øFBIÓµÓиõصãµÄ˽Կ»ò´óÖµÈЧµÄµØµã¡£¡£¡£¡£ÃÀ¹ú˾·¨²¿»¹³Æ£¬£¬£¬ÊÂʵÉÏÁª°îÊÓ²ì¾Ö´ÓÒ»×îÏȾÍÉèÁËȦÌס£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/fbi-claws-back-millions-darksides-ransom/166705/
5¡¢MicrosoftÇå¾²¸üУ¬£¬£¬ÐÞ¸´7¸ö0dayÔÚÄÚµÄ50¸öÎó²î
MicrosoftÐû²¼ÁË6Ô·ݵÄÖܶþÇå¾²¸üУ¬£¬£¬ÐÞ¸´Á˰üÀ¨7¸ö0dayÔÚÄÚµÄ50¸öÎó²î¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄ0day°üÀ¨WindowsÄÚºËÐÅϢй¶Îó²î£¨CVE-2021-31955£©¡¢Windows NTFSÌáȨÎó²î£¨CVE-2021-31956£©¡¢Microsoft DWMÌáȨÎó²î£¨CVE-2021-33739£©¡¢Windows MSHTMLƽ̨RCEÎó²î£¨CVE-2021-33742£©¡¢MicrosoftÔöÇ¿ÐͼÓÃÜÌṩ³ÌÐòÌáȨÎó²î£¨CVE-2021-31199ºÍCVE-2021-31201£©ºÍWindowsÔ¶³Ì×ÀÃæÐ§À;ܾøÐ§ÀÍÎó²î£¨CVE-2021-31968£©¡£¡£¡£¡£ÆäÖУ¬£¬£¬Ç°6¸ö0dayÒÑÔÚÒÑÍù±»Ê¹Óùý¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/microsoft/microsoft-june-2021-patch-tuesday-fixes-6-exploited-zero-days-50-flaws/