ÐÅÏ¢Çå¾²Öܱ¨-2021ÄêµÚ24ÖÜ
Ðû²¼Ê±¼ä 2021-06-15> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
2021Äê06ÔÂ07ÈÕÖÁ06ÔÂ13ÈÕ¹²ÊÕ¼Çå¾²Îó²î73¸ö£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇMicrosoft Windows Defender CVE-2021-31985´úÂëÖ´ÐÐÎó²î£»£»£»Rockwell Automation ISaGRAF CVE-2020-25176 IXLÐÒé´úÂëÖ´ÐÐÎó²î£»£»£»SAP NetWeaver ABAP Server CVE-2021-27632ÄÚ´æÆÆËðÎó²î£»£»£»Schneider Electric IGSS CGFÔ½½çдÎó²î£»£»£»Microsoft Windows TCP/IPÇå¾²ÈÆ¹ýÎó²î¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÃÀ¹úCox MediaÔâµ½ÀÕË÷¹¥»÷£¬£¬£¬£¬µçÊӺ͵çֱ̨²¥ÖÐÖ¹£»£»£»INKYÅû¶ÒÔÌá·ÀÀÕË÷Èí¼þΪÖ÷ÌâµÄÐÂÒ»ÂÖ´¹Âڻ£»£»£»ºÚ¿ÍÔÚ°µÍø¹ûÕæ°üÀ¨84ÒÚÃÜÂëµÄÜöÝÍRockYou2021£»£»£»FBI×·»ØColonial PipelineÖ§¸¶µÄ230ÍòÃÀÔªÊê½ð£»£»£»MicrosoftÇå¾²¸üУ¬£¬£¬£¬ÐÞ¸´7¸ö0dayÔÚÄÚµÄ50¸öÎó²î¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£
> Ö÷ÒªÇå¾²Îó²îÁбí
1.Microsoft Windows Defender CVE-2021-31985´úÂëÖ´ÐÐÎó²î
Microsoft Windows Defender±£´æÇå¾²Îó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31985
2.Rockwell Automation ISaGRAF CVE-2020-25176 IXLÐÒé´úÂëÖ´ÐÐÎó²î
Rockwell Automation ISaGRAF IXLÐÒé´¦Öóͷ£ÎļþÃû±£´æÇå¾²Îó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£
https://us-cert.cisa.gov/ics/advisories/icsa-20-280-01
3.SAP NetWeaver ABAP Server CVE-2021-27632ÄÚ´æÆÆËðÎó²î
SAP NetWeaver ABAP Server±£´æÄÚ´æÆÆËðÎó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»òÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=578125999
4.Schneider Electric IGSS CGFÔ½½çдÎó²î
Schneider Electric IGSS CGFÎļþ´¦Öóͷ£±£´æÔ½½çдÎó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇ󣬣¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»òÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£
https://us-cert.cisa.gov/ics/advisories/icsa-21-159-04
5.Microsoft Windows TCP/IPÇå¾²ÈÆ¹ýÎó²î
Microsoft Windows Windows TCP/IP±£´æÇå¾²Îó²î£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬¿ÉÈÆ¹ýÇå¾²ÏÞÖÆÎ´ÊÚȨ»á¼û¡£¡£
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31970
> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢ÃÀ¹úCox MediaÔâµ½ÀÕË÷¹¥»÷£¬£¬£¬£¬µçÊӺ͵çֱ̨²¥ÖÐÖ¹
ÃÀ¹ú×î´óµÄýÌ弯ÍÅÖ®Ò»Cox Media Group£¨CMG£©Ôâµ½ÀÕË÷¹¥»÷£¬£¬£¬£¬²¿·ÖµçÊӺ͵çֱ̨²¥ÖÐÖ¹¡£¡£¸Ã¹«Ë¾ÓµÓÐ33¼ÒµçÊǪ́¡¢54¸ö¹ã²¥µç̨¡¢¶à¸ö¿çƽ̨Á÷ýÌåÊÓÆµÆ½Ì¨ºÍÊý×ÖÆ½Ì¨¡£¡£Inside Radio³Æ¹¥»÷±¬·¢ÔÚ6ÔÂ3ÈÕÉÏÎ磬£¬£¬£¬Æä¶ÔCMGµÄ¶à¸öµç̨¾ÙÐÐÁËËæ»ú¼ì²é£¬£¬£¬£¬·¢Ã÷µçÌ¨ÍøÕ¾ÈÔ¿É»á¼û£¬£¬£¬£¬µ«ÔÚÏßÁ÷ýÌåÒÑÀëÏߣ¬£¬£¬£¬²¢ÌáÐÑ¡°ÒôƵÔÝʱ²»¿ÉÓᱡ£¡£ÕâÊÇÀÕË÷Èí¼þÍÅ»ïµÚ¶þ´Î¹¥»÷ÃÀ¹úÖ÷ÒªµÄýÌ幫˾£¬£¬£¬£¬2019Äê9Ô£¬£¬£¬£¬CBSÆìÏÂµÄ¹ã²¥ÍøÂçEntercomÔâµ½¹¥»÷£¬£¬£¬£¬µ¼Ö²¿·Ö¹ã²¥µç̨ÖÐÖ¹¡£¡£
ÔÎÄÁ´½Ó£º
http://www.insideradio.com/free/cox-media-group-stations-still-offline-a-day-after-apparent-malware-attack/article_7c619380-c506-11eb-9b7b-4f6576d00aa0.html
2¡¢INKYÅû¶ÒÔÌá·ÀÀÕË÷Èí¼þΪÖ÷ÌâµÄÐÂÒ»ÂÖ´¹Âڻ
ÓʼþÇ徲ƽ̨INKYÅû¶ÒÔÌá·ÀÀÕË÷Èí¼þΪÖ÷ÌâµÄÐÂÒ»ÂÖ´¹Âڻ¡£¡£½üÆÚ¶ÔColonial PipelineµÄÀÕË÷Èí¼þ¹¥»÷Òý·¢ÁËеĴ¹Âڻ£¬£¬£¬£¬¸Ã»î¶¯µÄÓʼþ¾ùΪÓÐÕë¶ÔÐԵĽôÆÈ֪ͨ£¬£¬£¬£¬½¨ÒéÊÕ¼þÈ˵ã»÷Á´½ÓÒÔ×°ÖÃϵͳ¸üУ¬£¬£¬£¬À´¼ì²â²¢Ìá·À×îеÄÀÕË÷Èí¼þ¡£¡£¹¥»÷ÕßʹÓõÄÓòÃûΪms-sysupdate[.]comºÍselectionpatch [.]com£¬£¬£¬£¬ÕâºÜÈÝÒ×±»ÎóÒÔΪÊÇÕýµ±ÓòÃû£¬£¬£¬£¬Æä»¹Ê¹ÓÃÁËCobalt Strike¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/phishing-uses-colonial-pipeline-ransomware-lures-to-infect-victims/
3¡¢ºÚ¿ÍÔÚ°µÍø¹ûÕæ°üÀ¨84ÒÚÃÜÂëµÄÜöÝÍRockYou2021
ijºÚ¿ÍÔÚ°µÍøÐû²¼ÁË100GBµÄTXTÎļþ£¬£¬£¬£¬ÆäÖаüÀ¨84ÒÚ¸öÃÜÂ룬£¬£¬£¬ÕâЩÃÜÂë¿ÉÄÜÊÇ´Ó֮ǰµÄй¶ÊÂÎñÖкϲ¢¶øÀ´µÄ¡£¡£ºÚ¿Í³ÆÆäÖаüÀ¨µÄËùÓÐÃÜÂ볤¶È¾ùΪ6-20¸ö×Ö·û£¬£¬£¬£¬É¾³ýÁË·ÇASCII×Ö·ûºÍ¿Õ¸ñ¡£¡£Æä»¹ÌåÏÖ¸ÃÜöÝͰüÀ¨820ÒÚ¸öÃÜÂ룬£¬£¬£¬µ«¾ÓÉÑо¿Ö°Ô±²âÊÔ£¬£¬£¬£¬ÆäÖÐÖ»ÓÐ8459060239¸öÊÇΨһµÄ£¬£¬£¬£¬ÕâËÆºõÊÇÓÐÊ·ÒÔÀ´×î´óµÄÃÜÂëÜöÝÍ¡£¡£¸ÃÜöÝͱ»³ÆÎªRockYou2021£¬£¬£¬£¬»òÐíÊDzο¼ÁË2009Ä걬·¢µÄRockYouÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬ºÚ¿ÍÇÔÈ¡ÁËÁè¼Ý3200ÍòÓû§µÄÃÜÂë¡£¡£
ÔÎÄÁ´½Ó£º
https://cybernews.com/security/rockyou2021-alltime-largest-password-compilation-leaked/
4¡¢FBI×·»ØColonial PipelineÖ§¸¶µÄ230ÍòÃÀÔªÊê½ð
ÃÀ¹úFBIºÍDOJÁªºÏ×·»ØÁËColonial PipelineÖ§¸¶µÄÌ©°ëÊê½ð¡£¡£5ÔÂ7ÈÕ£¬£¬£¬£¬¸Ã¹«Ë¾Ôâµ½ÁËDarkSideÀÕË÷Èí¼þ¹¥»÷ȼÁϹܵÀ¹Ø±Õ£¬£¬£¬£¬Îª´ËÆäÖ§¸¶ÁË×ܼÆ440ÍòÃÀÔªµÄÊê½ð£¬£¬£¬£¬´Ë´Î×·»ØÁËÆäÖеÄ230ÍòÃÀÔª¡£¡£DOJÌåÏÖ£¬£¬£¬£¬ËûÃÇͨ¹ýÉó²é±ÈÌØ±Ò¹«¹²·ÖÀàÕË£¬£¬£¬£¬¸ú×ÙÁ˶à´Î±ÈÌØ±ÒתÕË£¬£¬£¬£¬²¢È·¶¨Ô¼Äª63.7±ÈÌØ±ÒÒÑ×ªÒÆµ½Ìض¨µØµã£¬£¬£¬£¬¶øFBIÓµÓиõصãµÄ˽Կ»ò´óÖµÈЧµÄµØµã¡£¡£ÃÀ¹ú˾·¨²¿»¹³Æ£¬£¬£¬£¬ÊÂʵÉÏÁª°îÊÓ²ì¾Ö´ÓÒ»×îÏȾÍÉèÁËȦÌס£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/fbi-claws-back-millions-darksides-ransom/166705/
5¡¢MicrosoftÇå¾²¸üУ¬£¬£¬£¬ÐÞ¸´7¸ö0dayÔÚÄÚµÄ50¸öÎó²î
MicrosoftÐû²¼ÁË6Ô·ݵÄÖܶþÇå¾²¸üУ¬£¬£¬£¬ÐÞ¸´Á˰üÀ¨7¸ö0dayÔÚÄÚµÄ50¸öÎó²î¡£¡£´Ë´ÎÐÞ¸´µÄ0day°üÀ¨WindowsÄÚºËÐÅϢй¶Îó²î£¨CVE-2021-31955£©¡¢Windows NTFSÌáȨÎó²î£¨CVE-2021-31956£©¡¢Microsoft DWMÌáȨÎó²î£¨CVE-2021-33739£©¡¢Windows MSHTMLƽ̨RCEÎó²î£¨CVE-2021-33742£©¡¢MicrosoftÔöÇ¿ÐͼÓÃÜÌṩ³ÌÐòÌáȨÎó²î£¨CVE-2021-31199ºÍCVE-2021-31201£©ºÍWindowsÔ¶³Ì×ÀÃæÐ§À;ܾøÐ§ÀÍÎó²î£¨CVE-2021-31968£©¡£¡£ÆäÖУ¬£¬£¬£¬Ç°6¸ö0dayÒÑÔÚÒÑÍù±»Ê¹Óùý¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/microsoft/microsoft-june-2021-patch-tuesday-fixes-6-exploited-zero-days-50-flaws/