ÐÅÏ¢Çå¾²Öܱ¨-2021ÄêµÚ33ÖÜ

Ðû²¼Ê±¼ä 2021-08-23

>±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2021Äê08ÔÂ09ÈÕÖÁ08ÔÂ15ÈÕ¹²ÊÕ¼Çå¾²Îó²î58¸ö £¬£¬£¬£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇMicrosoft Dynamics CVE-2021-36946¿çÕ¾¾ç±¾Îó²î £»£»£»£»£»£»SAP Business Oneí§ÒâÎļþÉÏ´«´úÂëÖ´ÐÐÎó²î £»£»£»£»£»£»SapphireIMSÏÂÁî×¢ÈëÎó²î £»£»£»£»£»£»Adobe Connect CVE-2021-36061Çå¾²ÈÆ¹ýÎó²î £»£»£»£»£»£»Apache ServiceComb Service-Center CVE-2021-21501·¾¶±éÀúÎó²î¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÑо¿Ö°Ô±·¢Ã÷ʹÓÃExchangeÖÐÎó²îProxyShellµÄ¹¥»÷»î¶¯ £»£»£»£»£»£»Ñо¿ÍŶӷ¢Ã÷ʹÓÃArcadyan¹Ì¼þÖÐÎó²î×°ÖÃMiraiµÄ»î¶¯ £»£»£»£»£»£»RansomEXXÍÅ»ïÉù³ÆÒÑÇÔÈ¡ÉÝ³ÞÆ·ÅÆZegnaÁè¼Ý20GBÊý¾Ý £»£»£»£»£»£»Î¢ÈíÖܶþÇå¾²¸üР£¬£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´°üÀ¨3¸ö0dayÔÚÄÚµÄ44¸öÎó²î £»£»£»£»£»£»KasperskyÐû²¼2021ÄêQ2À¬»øÓʼþºÍ´¹ÂڻµÄ±¨¸æ¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö £¬£¬£¬£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£



>Ö÷ÒªÇå¾²Îó²îÁбí


1.Microsoft Dynamics CVE-2021-36946¿çÕ¾¾ç±¾Îó²î


Microsoft Dynamics±£´æ¿çÕ¾¾ç±¾Îó²î £¬£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²î×¢Èë¶ñÒâ¾ç±¾»òHTML´úÂë £¬£¬£¬£¬£¬£¬£¬£¬µ±¶ñÒâÊý¾Ý±»Éó²éʱ £¬£¬£¬£¬£¬£¬£¬£¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»òÐ®ÖÆÓû§»á»°¡£¡£¡£


https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36946



2.SAP Business Oneí§ÒâÎļþÉÏ´«´úÂëÖ´ÐÐÎó²î


SAP Business One±£´æí§ÒâÎļþÉÏ´«Îó²î £¬£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬£¬£¬£¬£¬£¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£


https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=582222806


3.SapphireIMSÏÂÁî×¢ÈëÎó²î


SapphireIMS±£´æÓ²±àÂëºÍÊäÈëÑéÖ¤Îó²î £¬£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬£¬£¬£¬£¬£¬£¬£¬¿ÉÈÆ¹ýÇå¾²ÏÞÖÆ £¬£¬£¬£¬£¬£¬£¬£¬Ö´ÐÐí§ÒâÏÂÁî¡£¡£¡£


https://www.sapphireims.com/patches/


4.Adobe Connect CVE-2021-36061Çå¾²ÈÆ¹ýÎó²î


Adobe Connect±£´æÇå¾²ÈÆ¹ýÎó²î £¬£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬£¬£¬£¬£¬£¬£¬£¬¿ÉδÊÚȨ»á¼ûÓ¦Óᣡ£¡£


https://helpx.adobe.com/security/products/connect/apsb21-66.html


5.Apache ServiceComb Service-Center CVE-2021-21501·¾¶±éÀúÎó²î


Apache ServiceComb Service-Center±£´æÉèÖùýʧÎó²î £¬£¬£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬£¬£¬£¬£¬£¬£¬£¬¿É¾ÙÐÐĿ¼±éÀú¹¥»÷ £¬£¬£¬£¬£¬£¬£¬£¬»ñÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£


https://lists.apache.org/thread.html/r337be65e504eac52a12e89d7de40345e5d335deee9dd7288f7f59b81%40%3Cdev.servicecomb.apache.org%3E


 >Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢Ñо¿Ö°Ô±·¢Ã÷ʹÓÃExchangeÖÐÎó²îProxyShellµÄ¹¥»÷»î¶¯


Ñо¿Ö°Ô±·¢Ã÷ʹÓÃExchangeÖÐÎó²îProxyShellµÄ¹¥»÷»î¶¯.jpg


2021 Black Hat´ó»áÉÏͳ³ÆÎªProxyShellµÄ3¸öÎó²îµÄϸ½Ú¹ûÕæºó £¬£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÆð¾¢Ê¹ÓøÃÎó²îµÄ»î¶¯¡£¡£¡£ProxyShell°üÀ¨ACLÈÆ¹ýÎó²î£¨CVE-2021-34473£©¡¢ Exchange PowerShellºó¶ËµÄÌáȨÎó²î£¨CVE-2021-34523£©ºÍí§ÒâÎļþдÈëµ¼ÖµÄRCEÎó²î£¨CVE-2021-31207£©¡£¡£¡£ÕâЩÎó²î¿ÉÒÔͨ¹ýIISÖеĶ˿Ú443ÉÏÔËÐеÄMicrosoft Exchange¿Í»§¶Ë»á¼ûЧÀÍ(CAS)Ô¶³ÌʹÓà £¬£¬£¬£¬£¬£¬£¬£¬Á¬ÏµÊ¹ÓÿɾÙÐÐδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì´úÂëÖ´ÐС£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/microsoft/microsoft-exchange-servers-scanned-for-proxyshell-vulnerability-patch-now/


2¡¢Ñо¿ÍŶӷ¢Ã÷ʹÓÃArcadyan¹Ì¼þÖÐÎó²î×°ÖÃMiraiµÄ»î¶¯


Ñо¿ÍŶӷ¢Ã÷ʹÓÃArcadyan¹Ì¼þÖÐÎó²î×°ÖÃMiraiµÄ»î¶¯.jpg


Õ°²©ÍøÂçµÄÑо¿ÍŶÓÔÚ½üÆÚ·¢Ã÷ÁËʹÓÃArcadyan¹Ì¼þÖÐÎó²îµÄ¹¥»÷»î¶¯¡£¡£¡£¸ÃÎó²îÊÇ·¾¶±éÀúÎó²î £¬£¬£¬£¬£¬£¬£¬£¬×·×ÙΪCVE-2021-20090 £¬£¬£¬£¬£¬£¬£¬£¬ÆÀ·ÖΪ9.9¡£¡£¡£±£´æÓÚʹÓÃArcadyan¹Ì¼þµÄ·ÓÉÆ÷µÄweb½çÃæÉÏ £¬£¬£¬£¬£¬£¬£¬£¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÈÆ¹ýÉí·ÝÑéÖ¤ £¬£¬£¬£¬£¬£¬£¬£¬Ó°ÏìÁËÊýÊ®ÖÖÐͺŵÄÊý°ÙÍǫ̀·ÓÉÆ÷¡£¡£¡£×ÔÉÏÖÜËÄÒÔÀ´ £¬£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚÒ°·¢Ã÷ÁËʹÓôËÎó²îµÄ¹¥»÷»î¶¯,Ö¼ÔÚ½ÓÊÜÄ¿µÄ×°±¸²¢×°Öý©Ê¬ÍøÂçMiraiµÄpayload¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/actively-exploited-bug-bypasses-authentication-on-millions-of-routers/


3¡¢RansomEXXÍÅ»ïÉù³ÆÒÑÇÔÈ¡ÉÝ³ÞÆ·ÅÆZegnaÁè¼Ý20GBÊý¾Ý


RansomEXXÍÅ»ïÉù³ÆÒÑÇÔÈ¡ÉÝ³ÞÆ·ÅÆZegnaÁè¼Ý20GBÊý¾Ý.jpg


ÀÕË÷ÍÅ»ïRansomEXX½üÆÚÉù³ÆÒÑÇÔÈ¡ÉÝ³ÞÆ·ÅÆZegnaÁè¼Ý20GBÊý¾Ý¡£¡£¡£ZegnaÊÇÒâ´óÀû×îÖøÃûµÄÉݳÞÊ±×°Æ·ÅÆÖ®Ò» £¬£¬£¬£¬£¬£¬£¬£¬ÊÇÈ«ÇòÊÕÈë×î¸ßµÄÄÐ×°Æ·ÅÆ¡£¡£¡£RansomEXX³ÆÒѴӸù«Ë¾ÇÔÈ¡ÁË20.74GBµÄÊý¾Ý £¬£¬£¬£¬£¬£¬£¬£¬²¢Ðû²¼ÁË43¸öÎļþ£¨42¸ö500MBµÄÎļþºÍ1¸ö239.54MBµÄÎļþ£©×÷ΪÑù±¾¡£¡£¡£½üÆÚ £¬£¬£¬£¬£¬£¬£¬£¬RansomEXXÍÅ»ïÔøÑ¬È¾ÁËÒâ´óÀûÀ­Æë°Â´óÇøµÄϵͳ £¬£¬£¬£¬£¬£¬£¬£¬²¢¹¥»÷ÁËÖйų́ÍåµÄÅÌËã»úÓ²¼þÖÆÔìÉ̼¼¼Î£¨GIGABYTE£©¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/120898/data-breach/ransomexx-ransomware-zegna.html


4¡¢Î¢ÈíÖܶþÇå¾²¸üР£¬£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´°üÀ¨3¸ö0dayÔÚÄÚµÄ44¸öÎó²î


΢ÈíÖܶþÇå¾²¸üÐÂ£¬£¬£¬£¬£¬£¬£¬£¬ÐÞ¸´°üÀ¨3¸ö0dayÔÚÄÚµÄ44¸öÎó²î.jpg


΢ÈíÐû²¼2021Äê8ÔµÄÖܶþÇå¾²¸üР£¬£¬£¬£¬£¬£¬£¬£¬×ܼÆÐÞ¸´ÁË44¸öÎó²î¡£¡£¡£ÆäÖаüÀ¨13¸öÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡¢8¸öÐÅϢй¶Îó²î¡¢2¸ö¾Ü¾øÐ§ÀÍÎó²îºÍ4¸öÓÕÆ­Îó²î¡£¡£¡£´Ë´ÎÐÞ¸´µÄ3¸ö0dayΪWindows Print SpoolerÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2021-36936£©¡¢ Windows LSAÖеÄÓÕÆ­Îó²î£¨CVE-2021-36942£©ÒÔ¼°Windows Update MedicЧÀÍÖеÄÌáȨÎó²î£¨CVE-2021-36948£©¡£¡£¡£±ðµÄ £¬£¬£¬£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÒѾ­·¢Ã÷×Ô¶¯Ê¹ÓÃCVE-2021-36948µÄ¹¥»÷»î¶¯¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/microsoft/microsoft-august-2021-patch-tuesday-fixes-3-zero-days-44-flaws/


5¡¢KasperskyÐû²¼2021ÄêQ2À¬»øÓʼþºÍ´¹ÂڻµÄ±¨¸æ


KasperskyÐû²¼2021ÄêQ2À¬»øÓʼþºÍ´¹ÂڻµÄ±¨¸æ.jpg


KasperskyÐû²¼ÁËÓйØ2021ÄêQ2À¬»øÓʼþºÍ´¹ÂڻµÄÆÊÎö±¨¸æ¡£¡£¡£2021ÄêQ2 £¬£¬£¬£¬£¬£¬£¬£¬ÆóÒµÕË»§ÈÔÈ»Êǹ¥»÷ÕßµÄÖ÷ҪĿµÄÖ®Ò»¡£¡£¡£ÎªÁËÔöÌí´¹ÂÚÓʼþÖÐÁ´½ÓµÄ¿ÉÐÅ¶È £¬£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õßαװ³ÆÀ´×ÔÔÆÐ§À͵ÄÓʼþ £¬£¬£¬£¬£¬£¬£¬£¬ÀýÈçMicrosoft Teams¾Û»áµÄ֪ͨµÈ¡£¡£¡£À¬»øÓʼþÊýÄ¿µÄÕ¼±ÈÔÚ3Ô·ݴ¥µ×£¨45.10%£©ºó £¬£¬£¬£¬£¬£¬£¬£¬ÔÚ4Ô·ÝС·ùÉÏÉý£¨45.29%£© £¬£¬£¬£¬£¬£¬£¬£¬µ½6Ô£¨48.03%£©Óë2020ÄêQ4Ï൱¡£¡£¡£À¬»øÓʼþȪԴ×î¶àµÄ¹ú¼ÒΪ¶íÂÞ˹£¨26.07%£© £¬£¬£¬£¬£¬£¬£¬£¬Æä´ÎÊǵ¹ú£¨13.97%£©ºÍÃÀ¹ú£¨11.24%£©¡£¡£¡£×î³£¼ûµÄ¶ñÒ⸽¼þÊÇBadun¼Ò×壨7.09%£©¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securelist.com/spam-and-phishing-in-q2-2021/103548/