Rockwell Automation | ¶à¸öÇå¾²Îó²îͨ¸æ
Ðû²¼Ê±¼ä 2020-05-270x00 Îó²î¸ÅÊö
|
²úÆ· |
CVE ID |
Àà ÐÍ |
Îó²îÆ·¼¶ |
Ô¶³ÌʹÓà |
Ó°Ïì¹æÄ£ |
|
Rockwell Automation EDS Subsystem |
CVE-2020-12034 |
SI |
¸ßΣ |
ÊÇ |
FactoryTalk Linx software:6.00,6.10,6.11 RSLinx Classic <= 4.11.00 RSNetWorx software <= 28.00.00 Studio 5000 Logix Designer software <= 32 |
|
CVE-2020-12038 |
B0 |
ÖÐΣ |
·ñ |
0x01 Îó²îÏêÇé
ÂÞ¿ËΤ¶û×Ô¶¯»¯ÓÐÏÞ¹«Ë¾ÊÇÈ«Çò×î´óµÄÖÂÁ¦ÓÚ¹¤Òµ×Ô¶¯»¯ÓëÐÅÏ¢µÄ¹«Ë¾Ö®Ò»£¬£¬£¬£¬ÖÂÁ¦ÓÚ×ÊÖú¿Í»§Ìá¸ßÉú²úÁ¦£¬£¬£¬£¬ÒÔ¼°ÌìÏ¿ÉÒ»Á¬Éú³¤¡£¡£¡£¡£
¿ËÈÕ£¬£¬£¬£¬¹¤ÒµÍøÂçÇå¾²¹«Ë¾ClarotyµÄÑо¿Ö°Ô±·¢Ã÷ÁËÂÞ¿ËΤ¶û²úƷʹÓõĵç×ÓÊý¾Ý±í£¨EDS£©×ÓϵͳÖеÄÁ½¸öÇå¾²Îó²î£¬£¬£¬£¬Îó²îÓëEDS×ÓϵͳÆÊÎöEDSÎļþÄÚÈݵķ½·¨Óйء£¡£¡£¡£EDSÎļþ°üÀ¨×°±¸µÄÉèÖÃÊý¾Ý£¬£¬£¬£¬ÍøÂçÖÎÀí¹¤¾ß½«ÆäÓÃÓÚ±êʶºÍµ÷ÊÔ¡£¡£¡£¡£¹¥»÷Õß¿ÉÒÔ½¨ÉèÒ»¸ö¶ñÒâµÄEDSÎļþ£¬£¬£¬£¬ÒÔ±ãÔÚ±»ÂÞ¿ËΤ¶ûµÄÈí¼þÆÊÎöºó£¬£¬£¬£¬½«WindowsÅú´¦Öóͷ£ÎļþдÈëí§Òâ·¾¶£¬£¬£¬£¬°üÀ¨Æô¶¯Ä¿Â¼£¬£¬£¬£¬Õâ¿ÉÒÔµ¼ÖÂÖØÐÂÆô¶¯ºóÖ´ÐдúÂë¡£¡£¡£¡£
CVE-2020-12034ÊÇRockwell Automation EDS Subsystem SQL×¢ÈëÎó²î¡£¡£¡£¡£¸ÃÎó²îÔ´ÓÚEDS×ÓϵͳûÓжÔÓû§ÊäÈë¾ÙÐгä·ÖµÄÑéÖ¤£¬£¬£¬£¬Ê¹¹¥»÷Õß¿ÉÒÔ½¨Éè¶ñÒâµÄEDSÎļþ¾ÙÐÐSQL×¢È룬£¬£¬£¬µ¼Ö¾ܾøÐ§ÀÍ¡£¡£¡£¡£
CVE-2020-12038ÊÇRockwell Automation EDS Subsystem »º³åÇøÒç³öÎó²î¡£¡£¡£¡£¹¥»÷Õß¿ÉÒÔ½¨Éè¶ñÒâµÄEDSÎļþʹEDSParser COM¹¤¾ßÍ߽⣬£¬£¬£¬´Ó¶øµ¼Ö¾ܾøÐ§ÀÍ¡£¡£¡£¡£
0x02 ´¦Öóͷ£½¨Òé
ÏÖÔÚ³§ÉÌÒÑÐû²¼Éý¼¶²¹¶¡ÒÔÐÞ¸´Îó²î£¬£¬£¬£¬²Î¿¼Á´½Ó£º
https://www.rockwellautomation.com/
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1125928£¨ÐèҪע²á£©
ǶÈëʽ²úÆ·µÄÎó²î»º½â²½·¥£º
? ÔÚ·À»ðǽ/UTM×°±¸ÉϼàÊÓ»òÏÞÖÆTCP 2222¡¢7153¶Ë¿ÚºÍUDP 44818¶Ë¿Ú¡£¡£¡£¡£
Ò»Ñùƽ³£»º½â²½·¥£º
? ¶¨Î»·À»ðǽ·À»¤µÄ¿ØÖÆÏµÍ³ÍøÂçºÍÔ¶³Ì×°±¸£¬£¬£¬£¬²¢½«ÆäÓëÓªÒµÍøÂç¸ôÀ룻£»£»£»£»£»£»
? Ô¶³Ì»á¼ûʱ£¬£¬£¬£¬½¨ÒéʹÓÃÐéÄâרÓÃÍøÂ磨VPN£©£¬£¬£¬£¬²¢È·ÈÏVPN¿ÉÄܱ£´æµÄÎó²î£¬£¬£¬£¬Ð轫VPN¸üе½×îа汾¡£¡£¡£¡£
0x03 Ïà¹ØÐÂÎÅ
https://www.securityweek.com/hackers-can-target-rockwell-industrial-software-malicious-eds-files
0x04 ²Î¿¼Á´½Ó
https://www.us-cert.gov/ics/advisories/icsa-20-140-01
0x05 ʱ¼äÏß
2020-05-27 VSRCÐû²¼Îó²îͨ¸æ


¾©¹«Íø°²±¸11010802024551ºÅ