ÐÅÏ¢Çå¾²Öܱ¨-2021ÄêµÚ24ÖÜ

Ðû²¼Ê±¼ä 2021-06-15

> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2021Äê06ÔÂ07ÈÕÖÁ06ÔÂ13ÈÕ¹²ÊÕ¼Çå¾²Îó²î73¸ö£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇMicrosoft Windows Defender CVE-2021-31985´úÂëÖ´ÐÐÎó²î£»£»£» £»Rockwell Automation ISaGRAF CVE-2020-25176 IXLЭÒé´úÂëÖ´ÐÐÎó²î£»£»£» £»SAP NetWeaver ABAP Server CVE-2021-27632ÄÚ´æÆÆËðÎó²î£»£»£» £»Schneider Electric IGSS CGFÔ½½çдÎó²î£»£»£» £»Microsoft Windows TCP/IPÇå¾²ÈÆ¹ýÎó²î ¡£¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÃÀ¹úCox MediaÔâµ½ÀÕË÷¹¥»÷£¬£¬£¬µçÊӺ͵çֱ̨²¥ÖÐÖ¹£»£»£» £»INKYÅû¶ÒÔÌá·ÀÀÕË÷Èí¼þΪÖ÷ÌâµÄÐÂÒ»ÂÖ´¹Âڻ£»£»£» £»ºÚ¿ÍÔÚ°µÍø¹ûÕæ°üÀ¨84ÒÚÃÜÂëµÄÜöÝÍRockYou2021£»£»£» £»FBI×·»ØColonial PipelineÖ§¸¶µÄ230ÍòÃÀÔªÊê½ð£»£»£» £»MicrosoftÇå¾²¸üУ¬£¬£¬ÐÞ¸´7¸ö0dayÔÚÄÚµÄ50¸öÎó²î ¡£¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖÐ ¡£¡£¡£¡£


> Ö÷ÒªÇå¾²Îó²îÁбí


1.Microsoft Windows Defender CVE-2021-31985´úÂëÖ´ÐÐÎó²î


Microsoft Windows Defender±£´æÇå¾²Îó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë ¡£¡£¡£¡£

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31985


2.Rockwell Automation ISaGRAF CVE-2020-25176 IXLЭÒé´úÂëÖ´ÐÐÎó²î


Rockwell Automation ISaGRAF IXLЭÒé´¦Öóͷ£ÎļþÃû±£´æÇå¾²Îó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë ¡£¡£¡£¡£

https://us-cert.cisa.gov/ics/advisories/icsa-20-280-01


3.SAP NetWeaver ABAP Server CVE-2021-27632ÄÚ´æÆÆËðÎó²î


SAP NetWeaver ABAP Server±£´æÄÚ´æÆÆËðÎó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉʹӦÓóÌÐòÍ߽⻣»£» £»òÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë ¡£¡£¡£¡£

https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=578125999


4.Schneider Electric IGSS CGFÔ½½çдÎó²î


Schneider Electric IGSS CGFÎļþ´¦Öóͷ£±£´æÔ½½çдÎó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇ󣬣¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬¿ÉʹӦÓóÌÐòÍ߽⻣»£» £»òÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë ¡£¡£¡£¡£

https://us-cert.cisa.gov/ics/advisories/icsa-21-159-04


5.Microsoft Windows TCP/IPÇå¾²ÈÆ¹ýÎó²î


Microsoft Windows Windows TCP/IP±£´æÇå¾²Îó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉÈÆ¹ýÇå¾²ÏÞÖÆÎ´ÊÚȨ»á¼û ¡£¡£¡£¡£

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31970


> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢ÃÀ¹úCox MediaÔâµ½ÀÕË÷¹¥»÷£¬£¬£¬µçÊӺ͵çֱ̨²¥ÖÐÖ¹


1.jpg


ÃÀ¹ú×î´óµÄýÌ弯ÍÅÖ®Ò»Cox Media Group£¨CMG£©Ôâµ½ÀÕË÷¹¥»÷£¬£¬£¬²¿·ÖµçÊӺ͵çֱ̨²¥ÖÐÖ¹ ¡£¡£¡£¡£¸Ã¹«Ë¾ÓµÓÐ33¼ÒµçÊǪ́¡¢54¸ö¹ã²¥µç̨¡¢¶à¸ö¿çƽ̨Á÷ýÌåÊÓÆµÆ½Ì¨ºÍÊý×ÖÆ½Ì¨ ¡£¡£¡£¡£Inside Radio³Æ¹¥»÷±¬·¢ÔÚ6ÔÂ3ÈÕÉÏÎ磬£¬£¬Æä¶ÔCMGµÄ¶à¸öµç̨¾ÙÐÐÁËËæ»ú¼ì²é£¬£¬£¬·¢Ã÷µçÌ¨ÍøÕ¾ÈÔ¿É»á¼û£¬£¬£¬µ«ÔÚÏßÁ÷ýÌåÒÑÀëÏߣ¬£¬£¬²¢ÌáÐÑ¡°ÒôƵÔÝʱ²»¿ÉÓá± ¡£¡£¡£¡£ÕâÊÇÀÕË÷Èí¼þÍÅ»ïµÚ¶þ´Î¹¥»÷ÃÀ¹úÖ÷ÒªµÄýÌ幫˾£¬£¬£¬2019Äê9Ô£¬£¬£¬CBSÆìÏÂµÄ¹ã²¥ÍøÂçEntercomÔâµ½¹¥»÷£¬£¬£¬µ¼Ö²¿·Ö¹ã²¥µç̨ÖÐÖ¹ ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

http://www.insideradio.com/free/cox-media-group-stations-still-offline-a-day-after-apparent-malware-attack/article_7c619380-c506-11eb-9b7b-4f6576d00aa0.html


2¡¢INKYÅû¶ÒÔÌá·ÀÀÕË÷Èí¼þΪÖ÷ÌâµÄÐÂÒ»ÂÖ´¹Âڻ


2.jpg


ÓʼþÇ徲ƽ̨INKYÅû¶ÒÔÌá·ÀÀÕË÷Èí¼þΪÖ÷ÌâµÄÐÂÒ»ÂÖ´¹Âڻ ¡£¡£¡£¡£½üÆÚ¶ÔColonial PipelineµÄÀÕË÷Èí¼þ¹¥»÷Òý·¢ÁËеĴ¹Âڻ£¬£¬£¬¸Ã»î¶¯µÄÓʼþ¾ùΪÓÐÕë¶ÔÐԵĽôÆÈ֪ͨ£¬£¬£¬½¨ÒéÊÕ¼þÈ˵ã»÷Á´½ÓÒÔ×°ÖÃϵͳ¸üУ¬£¬£¬À´¼ì²â²¢Ìá·À×îеÄÀÕË÷Èí¼þ ¡£¡£¡£¡£¹¥»÷ÕßʹÓõÄÓòÃûΪms-sysupdate[.]comºÍselectionpatch [.]com£¬£¬£¬ÕâºÜÈÝÒ×±»ÎóÒÔΪÊÇÕýµ±ÓòÃû£¬£¬£¬Æä»¹Ê¹ÓÃÁËCobalt Strike ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/phishing-uses-colonial-pipeline-ransomware-lures-to-infect-victims/


3¡¢ºÚ¿ÍÔÚ°µÍø¹ûÕæ°üÀ¨84ÒÚÃÜÂëµÄÜöÝÍRockYou2021


3.jpg


ijºÚ¿ÍÔÚ°µÍøÐû²¼ÁË100GBµÄTXTÎļþ£¬£¬£¬ÆäÖаüÀ¨84ÒÚ¸öÃÜÂ룬£¬£¬ÕâЩÃÜÂë¿ÉÄÜÊÇ´Ó֮ǰµÄй¶ÊÂÎñÖкϲ¢¶øÀ´µÄ ¡£¡£¡£¡£ºÚ¿Í³ÆÆäÖаüÀ¨µÄËùÓÐÃÜÂ볤¶È¾ùΪ6-20¸ö×Ö·û£¬£¬£¬É¾³ýÁË·ÇASCII×Ö·ûºÍ¿Õ¸ñ ¡£¡£¡£¡£Æä»¹ÌåÏÖ¸ÃÜöÝͰüÀ¨820ÒÚ¸öÃÜÂ룬£¬£¬µ«¾­ÓÉÑо¿Ö°Ô±²âÊÔ£¬£¬£¬ÆäÖÐÖ»ÓÐ8459060239¸öÊÇΨһµÄ£¬£¬£¬ÕâËÆºõÊÇÓÐÊ·ÒÔÀ´×î´óµÄÃÜÂëÜöÝÍ ¡£¡£¡£¡£¸ÃÜöÝͱ»³ÆÎªRockYou2021£¬£¬£¬»òÐíÊDzο¼ÁË2009Ä걬·¢µÄRockYouÊý¾Ýй¶ÊÂÎñ£¬£¬£¬ºÚ¿ÍÇÔÈ¡ÁËÁè¼Ý3200ÍòÓû§µÄÃÜÂë ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://cybernews.com/security/rockyou2021-alltime-largest-password-compilation-leaked/


4¡¢FBI×·»ØColonial PipelineÖ§¸¶µÄ230ÍòÃÀÔªÊê½ð


4.jpg


ÃÀ¹úFBIºÍDOJÁªºÏ×·»ØÁËColonial PipelineÖ§¸¶µÄÌ©°ëÊê½ð ¡£¡£¡£¡£5ÔÂ7ÈÕ£¬£¬£¬¸Ã¹«Ë¾Ôâµ½ÁËDarkSideÀÕË÷Èí¼þ¹¥»÷ȼÁϹܵÀ¹Ø±Õ£¬£¬£¬Îª´ËÆäÖ§¸¶ÁË×ܼÆ440ÍòÃÀÔªµÄÊê½ð£¬£¬£¬´Ë´Î×·»ØÁËÆäÖеÄ230ÍòÃÀÔª ¡£¡£¡£¡£DOJÌåÏÖ£¬£¬£¬ËûÃÇͨ¹ýÉó²é±ÈÌØ±Ò¹«¹²·ÖÀàÕË£¬£¬£¬¸ú×ÙÁ˶à´Î±ÈÌØ±ÒתÕË£¬£¬£¬²¢È·¶¨Ô¼Äª63.7±ÈÌØ±ÒÒÑ×ªÒÆµ½Ìض¨µØµã£¬£¬£¬¶øFBIÓµÓиõصãµÄ˽Կ»ò´óÖµÈЧµÄµØµã ¡£¡£¡£¡£ÃÀ¹ú˾·¨²¿»¹³Æ£¬£¬£¬ÊÂʵÉÏÁª°îÊÓ²ì¾Ö´ÓÒ»×îÏȾÍÉèÁËȦÌ× ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://threatpost.com/fbi-claws-back-millions-darksides-ransom/166705/


5¡¢MicrosoftÇå¾²¸üУ¬£¬£¬ÐÞ¸´7¸ö0dayÔÚÄÚµÄ50¸öÎó²î


5.jpg


MicrosoftÐû²¼ÁË6Ô·ݵÄÖܶþÇå¾²¸üУ¬£¬£¬ÐÞ¸´Á˰üÀ¨7¸ö0dayÔÚÄÚµÄ50¸öÎó²î ¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄ0day°üÀ¨WindowsÄÚºËÐÅϢй¶Îó²î£¨CVE-2021-31955£©¡¢Windows NTFSÌáȨÎó²î£¨CVE-2021-31956£©¡¢Microsoft DWMÌáȨÎó²î£¨CVE-2021-33739£©¡¢Windows MSHTMLƽ̨RCEÎó²î£¨CVE-2021-33742£©¡¢MicrosoftÔöÇ¿ÐͼÓÃÜÌṩ³ÌÐòÌáȨÎó²î£¨CVE-2021-31199ºÍCVE-2021-31201£©ºÍWindowsÔ¶³Ì×ÀÃæÐ§À;ܾøÐ§ÀÍÎó²î£¨CVE-2021-31968£© ¡£¡£¡£¡£ÆäÖУ¬£¬£¬Ç°6¸ö0dayÒÑÔÚÒÑÍù±»Ê¹Óùý ¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/microsoft/microsoft-june-2021-patch-tuesday-fixes-6-exploited-zero-days-50-flaws/