ÐÅÏ¢Çå¾²Öܱ¨-2021ÄêµÚ4ÖÜ

Ðû²¼Ê±¼ä 2021-01-25

> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2021Äê01ÔÂ18ÈÕÖÁ01ÔÂ24ÈÕ¹²ÊÕ¼Çå¾²Îó²î57¸ö£¬£¬ £¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇOracle E-Business Suite One-to-One Fulfillment CVE-2021-2101δÃ÷í§Òâ´úÂëÖ´ÐÐÎó²î£»£»£» £»Netapp Clustered Data ONTAPí§ÒâÊý¾ÝÁýÕÖÎó²î£»£»£» £»Delta Electronics ISPSoftÏîÄ¿Îļþ´¦Öóͷ£ÄÚ´æ¹ýʧÒýÓôúÂëÖ´ÐÐÎó²î£»£»£» £»Cisco SD-WAN vManage Software ÏÂÁî×¢ÈëÎó²î£»£»£» £»Google Chrome Cryptohome²»³ä·ÖÕ½ÂÔÖ´ÐÐÎó²î¡£ ¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊǶíÂÞ˹Ìú·±£´æ¿É»á¼ûÆä¼à¿ØÏµÍ³µÄÎó²î£»£»£» £»FiberHome FTTH ONT·ÓÉÆ÷Öб£´æ28¸öºóÃÅÕÊ»§£»£»£» £»JSOFÅû¶DnsmasqÖÐ7¸öͳ³ÆÎªDNSpooqµÄÎó²î£»£»£» £»Malwarebytes³ÆSolarWindsºÚ¿ÍÒÑÈëÇÖÆäÓʼþϵͳ£»£»£» £»Ñо¿ÍŶӷ¢Ã÷FreakOutʹÓöà¸öÐÂÎó²îµÄ¹¥»÷»î¶¯¡£ ¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬ £¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£ ¡£¡£¡£


> Ö÷ÒªÇå¾²Îó²îÁбí


1.Oracle E-Business Suite One-to-One Fulfillment CVE-2021-2101δÃ÷í§Òâ´úÂëÖ´ÐÐÎó²î


Oracle E-Business Suite One-to-One Fulfillment±£´æÎ´Ã÷Çå¾²Îó²î£¬£¬ £¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ £¬£¬£¬£¬£¬¿ÉʹӦÓóÌÐòÍ߽⻣»£» £»òÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£ ¡£¡£¡£

https://www.oracle.com/security-alerts/cpujan2021.html


2.Netapp Clustered Data ONTAPí§ÒâÊý¾ÝÁýÕÖÎó²î


Netapp Clustered Data ONTAP±£´æÎ´Ã÷Çå¾²Îó²î£¬£¬ £¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ £¬£¬£¬£¬£¬¿ÉÁýÕÖϵͳÊý¾Ý¡£ ¡£¡£¡£

https://security.netapp.com/advisory/ntap-20210119-0001/


3.Delta Electronics ISPSoftÏîÄ¿Îļþ´¦Öóͷ£ÄÚ´æ¹ýʧÒýÓôúÂëÖ´ÐÐÎó²î


Delta Electronics ISPSoftÏîÄ¿Îļþ´¦Öóͷ£±£´æÊͷźóʹÓÃÎó²î£¬£¬ £¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇ󣬣¬ £¬£¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬ £¬£¬£¬£¬£¬¿ÉʹӦÓóÌÐòÍ߽⻣»£» £»òÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£ ¡£¡£¡£

https://us-cert.cisa.gov/ics/advisories/icsa-21-021-01


4.Cisco SD-WAN vManage Software ÏÂÁî×¢ÈëÎó²î


Cisco SD-WAN vManage Software WEB½Ó¿Ú±£´æÇå¾²Îó²î£¬£¬ £¬£¬£¬£¬£¬ÔÊÐíͨ¹ýÑéÖ¤µÄÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬ £¬£¬£¬£¬£¬¿ÉÒÔROOTÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£ ¡£¡£¡£

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-cmdinjm-9QMSmgcn


5.Google Chrome Cryptohome²»³ä·ÖÕ½ÂÔÖ´ÐÐÎó²î


Google Chrome Cryptohome±£´æ²»³ä·ÖÕ½ÂÔÖ´ÐÐÎó²î£¬£¬ £¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄWEBÒ³ÇëÇ󣬣¬ £¬£¬£¬£¬£¬ÓÕʹÓû§ÆÊÎö£¬£¬ £¬£¬£¬£¬£¬¿ÉʹӦÓóÌÐòÍ߽⻣»£» £»ò¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£ ¡£¡£¡£

https://chromereleases.googleblog.com/2021/01/stable-channel-update-for-desktop_19.html


> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢¶íÂÞ˹Ìú·±£´æ¿É»á¼ûÆä¼à¿ØÏµÍ³µÄÎó²î


1.jpg


¶íÂÞ˹Ìú·¹«Ë¾±£´æÎó²î£¬£¬ £¬£¬£¬£¬£¬¿ÉÓÃÀ´»á¼ûÆä¼à¿ØÏµÍ³ºÍÄÚ²¿Ð§ÀÍ¡£ ¡£¡£¡£¸ÃÎó²îÊÇÓÉÓÚĬÈÏÇéÐÎÏÂMikroTik·ÓÉÆ÷ÉϵÄÃÜÂëδ¸ü¸ÄËùµ¼ÖµÄ£¬£¬ £¬£¬£¬£¬£¬ºÚ¿Í¿ÉʹÓøÃÎó²îÔÚÒ»ÖÜÄڹرÕÌú·ÉϵÄËùÓÐ¼à¿Ø£¬£¬ £¬£¬£¬£¬£¬¶ø»Ö¸´ÏµÍ³ÐèÒªÖÁÉÙÒ»¸öÔµÄʱ¼ä£¬£¬ £¬£¬£¬£¬£¬ÆÆ·Ñ1.3ÒÚ¬²¼£¨180ÍòÃÀÔª£©¡£ ¡£¡£¡£ÏÖÔÚ£¬£¬ £¬£¬£¬£¬£¬¸ÃÎó²îÒѱ»ÐÞ¸´£¬£¬ £¬£¬£¬£¬£¬µ«²»¿ÉÈ·¶¨ÊÇ·ñÓй¥»÷ÕßʹÓÃÆä²»·¨»á¼û¹ý¹«Ë¾µÄϵͳ¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2021/01/hackers-accessed-thousands-of.html


2¡¢FiberHome FTTH ONT·ÓÉÆ÷Öб£´æ28¸öºóÃÅÕÊ»§


2.png


Ñо¿Ö°Ô±Pierre Kim·¢Ã÷FiberHome FTTH ONT·ÓÉÆ÷Öб£´æ28¸öºóÃÅÕÊ»§ºÍ¶à¸öÆäËûÎó²î¡£ ¡£¡£¡£¸Ã·ÓÉÆ÷Ö÷Òª°²ÅÅÓÚÄÏÃÀºÍ¶«ÄÏÑÇ£¬£¬ £¬£¬£¬£¬£¬Í¨³£×°ÖÃÔÚÑ¡ÔñǧÕ×λµÄ¹«Ô¢Â¥ÄÚ¡¢¼ÒÍ¥»òÆóÒµÄÚ²¿¡£ ¡£¡£¡£Kim³ÆÆä·¢Ã÷´ó×ڿɱ»ÀÄÓÃÀ´½ÓÊÜISPµÄºóÃźÍÎó²î£¬£¬ £¬£¬£¬£¬£¬ÀýÈçºóÃÅÔÊÐí¹¥»÷Õßͨ¹ý·¢ËÍÌØÖÆµÄHTTPSÇëÇó[https£º// [ip]/telnet£¿£¿£¿enable=0£¦key=calculated£¨BR0_MAC£©]Óë·ÓÉÆ÷µÄTelnetÅþÁ¬£¬£¬ £¬£¬£¬£¬£¬WebЧÀÍÆ÷°üÀ¨22¸öÓɲî±ðµÄInternetЧÀÍÌṩÉÌʹÓõÄÓ²±àÂëÆ¾Ö¤µÈ¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/multiple-backdoors-and-vulnerabilities-discovered-in-fiberhome-routers/


3¡¢JSOFÅû¶DnsmasqÖÐ7¸öͳ³ÆÎªDNSpooqµÄÎó²î


3.png


JSOFµÄÑо¿Ö°Ô±Åû¶ÁËDnsmasqÖеÄ7¸öDNSpooqÎó²î¡£ ¡£¡£¡£DnsmasqÊÇ»ùÓÚ*NIX²Ù×÷ϵͳµÄDNSת·¢¿Í»§¶Ë£¬£¬ £¬£¬£¬£¬£¬Í¨³£ÔÚÖÖÖÖÍøÂç×°±¸µÄ¹Ì¼þÖС£ ¡£¡£¡£´Ë´Î×ܹ²Åû¶ÁË7¸öÎó²î£¬£¬ £¬£¬£¬£¬£¬ËûÃDZ»Í³³ÆÎªDNSpooq£¬£¬ £¬£¬£¬£¬£¬ÆäÖÐ4¸öÊÇ»º³åÇøÒç³öÎó²î£¬£¬ £¬£¬£¬£¬£¬¿ÉÄܵ¼ÖÂÔ¶³ÌÖ´ÐдúÂ룬£¬ £¬£¬£¬£¬£¬¶øÆäËû3¸öÎó²îÔò¿Éµ¼ÖÂDNS»º´æÖж¾¡£ ¡£¡£¡£JSOF³Æ¹¥»÷Õß¿ÉÁ¬ÏµÊ¹ÓÃDNSpooqºÍ¾É°æDnsmasqÈí¼þ£¬£¬ £¬£¬£¬£¬£¬¶ÔÖ±½Ó̻¶ÔÚInternetÉϵÄDnsmasq¾ÙÐй¥»÷£¬£¬ £¬£¬£¬£¬£¬²¢ÇÒÊÜÓ°Ïì×°±¸Ëù´¦µÄÄÚÍøÉÏµÄÆäËü×°±¸Ò²½«´¦ÓÚΣÏÕÖ®ÖС£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/dnspooq-lets-attackers-poison-dns-cache-records/


4¡¢Malwarebytes³ÆSolarWindsºÚ¿ÍÒÑÈëÇÖÆäÓʼþϵͳ


4.png


Çå¾²¹«Ë¾Malwarebytes³ÆSolarWinds±³ºóµÄºÚ¿ÍÒÑÈëÇÖÆäÓʼþϵͳ¡£ ¡£¡£¡£¸Ã¹«Ë¾Ö¸³ö£¬£¬ £¬£¬£¬£¬£¬ËäÈ»ÆäûÓÐʹÓÃSolarWinds£¬£¬ £¬£¬£¬£¬£¬µ«ÓëÆäËû¹«Ë¾Ò»ÑùÔâµ½ÁËSolarWinds¹©Ó¦Á´¹¥»÷¡£ ¡£¡£¡£¹¥»÷±¬·¢ÔÚÈ¥Ä꣬£¬ £¬£¬£¬£¬£¬ºÚ¿ÍʹÓÃAzure Active DirectoryÖеÄÎó²îºÍ¶ñÒâOffice 365Ó¦ÓóÌÐò£¬£¬ £¬£¬£¬£¬£¬¶Ô¹«Ë¾²¿·ÖϵͳÌᳫÁ˹¥»÷¡£ ¡£¡£¡£¾­ÓÉÊӲ죬£¬ £¬£¬£¬£¬£¬¸Ã¹«Ë¾È·¶¨¹¥»÷Õß½ö»ñµÃÁ˲¿·ÖÄÚ²¿ÓʼþµÄ»á¼ûȨ£¬£¬ £¬£¬£¬£¬£¬ÆäÄÚ²¿Éú²úÇéÐβ¢Î´Êܵ½Ó°Ï죬£¬ £¬£¬£¬£¬£¬ÏÖÔÚÈÔ¿ÉÇ徲ʹÓÃMalwarebytesÈí¼þ¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/113628/hacking/malwarebytes-solarwinds-attack.html


5¡¢Ñо¿ÍŶӷ¢Ã÷FreakOutʹÓöà¸öÐÂÎó²îµÄ¹¥»÷»î¶¯


5.png


Ñо¿ÍŶӷ¢Ã÷½©Ê¬ÍøÂçFreakOutʹÓöà¸öÐÂÎó²îµÄ¹¥»÷»î¶¯¡£ ¡£¡£¡£´Ë´Î¹¥»÷Ö÷ÒªÕë¶ÔTerraMaster²Ù×÷ϵͳ¡¢Zend FrameworkºÍLiferay Portal£¬£¬ £¬£¬£¬£¬£¬Ê¹ÓÃÁËCVE-2020-28188¡¢ CVE-2021-3007ºÍCVE-2020-7961Îó²î¡£ ¡£¡£¡£FreakOut¾ßÓÐЧÀͶ˿ÚɨÃè¡¢ÍøÂçÐÅÏ¢¡¢ÍøÂçÐá̽»ò·¢¶¯ÂþÑÜʽ¾Ü¾øÐ§ÀÍ(DDoS)¹¥»÷µÈ¹¦Ð§£¬£¬ £¬£¬£¬£¬£¬¿ÉѬȾLinux×°±¸£¬£¬ £¬£¬£¬£¬£¬²¢Ê¹ÓÃÆäÍÚ¼ÓÃÜÇ®±Ò¡¢ÔÚ¹«Ë¾ÍøÂçÉϺáÏòÈö²¥»òαװ³ÉÊÜÓ°ÏìµÄ¹«Ë¾¹¥»÷ÆäËûÄ¿µÄ¡£ ¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://research.checkpoint.com/2021/freakout-leveraging-newest-vulnerabilities-for-creating-a-botnet/