ÐÅÏ¢Çå¾²Öܱ¨-2021ÄêµÚ33ÖÜ

Ðû²¼Ê±¼ä 2021-08-23

>±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2021Äê08ÔÂ09ÈÕÖÁ08ÔÂ15ÈÕ¹²ÊÕ¼Çå¾²Îó²î58¸ö£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇMicrosoft Dynamics CVE-2021-36946¿çÕ¾¾ç±¾Îó²î£» £»£»£»£»SAP Business Oneí§ÒâÎļþÉÏ´«´úÂëÖ´ÐÐÎó²î£» £»£»£»£»SapphireIMSÏÂÁî×¢ÈëÎó²î£» £»£»£»£»Adobe Connect CVE-2021-36061Çå¾²ÈÆ¹ýÎó²î£» £»£»£»£»Apache ServiceComb Service-Center CVE-2021-21501·¾¶±éÀúÎó²î¡£¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÑо¿Ö°Ô±·¢Ã÷ʹÓÃExchangeÖÐÎó²îProxyShellµÄ¹¥»÷»î¶¯£» £»£»£»£»Ñо¿ÍŶӷ¢Ã÷ʹÓÃArcadyan¹Ì¼þÖÐÎó²î×°ÖÃMiraiµÄ»î¶¯£» £»£»£»£»RansomEXXÍÅ»ïÉù³ÆÒÑÇÔÈ¡ÉÝ³ÞÆ·ÅÆZegnaÁè¼Ý20GBÊý¾Ý£» £»£»£»£»Î¢ÈíÖܶþÇå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´°üÀ¨3¸ö0dayÔÚÄÚµÄ44¸öÎó²î£» £»£»£»£»KasperskyÐû²¼2021ÄêQ2À¬»øÓʼþºÍ´¹ÂڻµÄ±¨¸æ¡£¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£



>Ö÷ÒªÇå¾²Îó²îÁбí


1.Microsoft Dynamics CVE-2021-36946¿çÕ¾¾ç±¾Îó²î


Microsoft Dynamics±£´æ¿çÕ¾¾ç±¾Îó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²î×¢Èë¶ñÒâ¾ç±¾»òHTML´úÂ룬£¬£¬£¬£¬µ±¶ñÒâÊý¾Ý±»Éó²éʱ£¬£¬£¬£¬£¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»òÐ®ÖÆÓû§»á»°¡£¡£¡£¡£


https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36946



2.SAP Business Oneí§ÒâÎļþÉÏ´«´úÂëÖ´ÐÐÎó²î


SAP Business One±£´æí§ÒâÎļþÉÏ´«Îó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£


https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=582222806


3.SapphireIMSÏÂÁî×¢ÈëÎó²î


SapphireIMS±£´æÓ²±àÂëºÍÊäÈëÑéÖ¤Îó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¿ÉÈÆ¹ýÇå¾²ÏÞÖÆ£¬£¬£¬£¬£¬Ö´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£


https://www.sapphireims.com/patches/


4.Adobe Connect CVE-2021-36061Çå¾²ÈÆ¹ýÎó²î


Adobe Connect±£´æÇå¾²ÈÆ¹ýÎó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¿ÉδÊÚȨ»á¼ûÓ¦Óᣡ£¡£¡£


https://helpx.adobe.com/security/products/connect/apsb21-66.html


5.Apache ServiceComb Service-Center CVE-2021-21501·¾¶±éÀúÎó²î


Apache ServiceComb Service-Center±£´æÉèÖùýʧÎó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¿É¾ÙÐÐĿ¼±éÀú¹¥»÷£¬£¬£¬£¬£¬»ñÈ¡Ãô¸ÐÐÅÏ¢¡£¡£¡£¡£


https://lists.apache.org/thread.html/r337be65e504eac52a12e89d7de40345e5d335deee9dd7288f7f59b81%40%3Cdev.servicecomb.apache.org%3E


 >Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢Ñо¿Ö°Ô±·¢Ã÷ʹÓÃExchangeÖÐÎó²îProxyShellµÄ¹¥»÷»î¶¯


Ñо¿Ö°Ô±·¢Ã÷ʹÓÃExchangeÖÐÎó²îProxyShellµÄ¹¥»÷»î¶¯.jpg


2021 Black Hat´ó»áÉÏͳ³ÆÎªProxyShellµÄ3¸öÎó²îµÄϸ½Ú¹ûÕæºó£¬£¬£¬£¬£¬Ñо¿Ö°Ô±·¢Ã÷ÁËÆð¾¢Ê¹ÓøÃÎó²îµÄ»î¶¯¡£¡£¡£¡£ProxyShell°üÀ¨ACLÈÆ¹ýÎó²î£¨CVE-2021-34473£©¡¢ Exchange PowerShellºó¶ËµÄÌáȨÎó²î£¨CVE-2021-34523£©ºÍí§ÒâÎļþдÈëµ¼ÖµÄRCEÎó²î£¨CVE-2021-31207£©¡£¡£¡£¡£ÕâЩÎó²î¿ÉÒÔͨ¹ýIISÖеĶ˿Ú443ÉÏÔËÐеÄMicrosoft Exchange¿Í»§¶Ë»á¼ûЧÀÍ(CAS)Ô¶³ÌʹÓ㬣¬£¬£¬£¬Á¬ÏµÊ¹ÓÿɾÙÐÐδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì´úÂëÖ´ÐС£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/microsoft/microsoft-exchange-servers-scanned-for-proxyshell-vulnerability-patch-now/


2¡¢Ñо¿ÍŶӷ¢Ã÷ʹÓÃArcadyan¹Ì¼þÖÐÎó²î×°ÖÃMiraiµÄ»î¶¯


Ñо¿ÍŶӷ¢Ã÷ʹÓÃArcadyan¹Ì¼þÖÐÎó²î×°ÖÃMiraiµÄ»î¶¯.jpg


Õ°²©ÍøÂçµÄÑо¿ÍŶÓÔÚ½üÆÚ·¢Ã÷ÁËʹÓÃArcadyan¹Ì¼þÖÐÎó²îµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¸ÃÎó²îÊÇ·¾¶±éÀúÎó²î£¬£¬£¬£¬£¬×·×ÙΪCVE-2021-20090£¬£¬£¬£¬£¬ÆÀ·ÖΪ9.9¡£¡£¡£¡£±£´æÓÚʹÓÃArcadyan¹Ì¼þµÄ·ÓÉÆ÷µÄweb½çÃæÉÏ£¬£¬£¬£¬£¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÈÆ¹ýÉí·ÝÑéÖ¤£¬£¬£¬£¬£¬Ó°ÏìÁËÊýÊ®ÖÖÐͺŵÄÊý°ÙÍǫ̀·ÓÉÆ÷¡£¡£¡£¡£×ÔÉÏÖÜËÄÒÔÀ´£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÔÚÒ°·¢Ã÷ÁËʹÓôËÎó²îµÄ¹¥»÷»î¶¯,Ö¼ÔÚ½ÓÊÜÄ¿µÄ×°±¸²¢×°Öý©Ê¬ÍøÂçMiraiµÄpayload¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/actively-exploited-bug-bypasses-authentication-on-millions-of-routers/


3¡¢RansomEXXÍÅ»ïÉù³ÆÒÑÇÔÈ¡ÉÝ³ÞÆ·ÅÆZegnaÁè¼Ý20GBÊý¾Ý


RansomEXXÍÅ»ïÉù³ÆÒÑÇÔÈ¡ÉÝ³ÞÆ·ÅÆZegnaÁè¼Ý20GBÊý¾Ý.jpg


ÀÕË÷ÍÅ»ïRansomEXX½üÆÚÉù³ÆÒÑÇÔÈ¡ÉÝ³ÞÆ·ÅÆZegnaÁè¼Ý20GBÊý¾Ý¡£¡£¡£¡£ZegnaÊÇÒâ´óÀû×îÖøÃûµÄÉݳÞÊ±×°Æ·ÅÆÖ®Ò»£¬£¬£¬£¬£¬ÊÇÈ«ÇòÊÕÈë×î¸ßµÄÄÐ×°Æ·ÅÆ¡£¡£¡£¡£RansomEXX³ÆÒѴӸù«Ë¾ÇÔÈ¡ÁË20.74GBµÄÊý¾Ý£¬£¬£¬£¬£¬²¢Ðû²¼ÁË43¸öÎļþ£¨42¸ö500MBµÄÎļþºÍ1¸ö239.54MBµÄÎļþ£©×÷ΪÑù±¾¡£¡£¡£¡£½üÆÚ£¬£¬£¬£¬£¬RansomEXXÍÅ»ïÔøÑ¬È¾ÁËÒâ´óÀûÀ­Æë°Â´óÇøµÄϵͳ£¬£¬£¬£¬£¬²¢¹¥»÷ÁËÖйų́ÍåµÄÅÌËã»úÓ²¼þÖÆÔìÉ̼¼¼Î£¨GIGABYTE£©¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/120898/data-breach/ransomexx-ransomware-zegna.html


4¡¢Î¢ÈíÖܶþÇå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´°üÀ¨3¸ö0dayÔÚÄÚµÄ44¸öÎó²î


΢ÈíÖܶþÇå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´°üÀ¨3¸ö0dayÔÚÄÚµÄ44¸öÎó²î.jpg


΢ÈíÐû²¼2021Äê8ÔµÄÖܶþÇå¾²¸üУ¬£¬£¬£¬£¬×ܼÆÐÞ¸´ÁË44¸öÎó²î¡£¡£¡£¡£ÆäÖаüÀ¨13¸öÔ¶³Ì´úÂëÖ´ÐÐÎó²î¡¢8¸öÐÅϢй¶Îó²î¡¢2¸ö¾Ü¾øÐ§ÀÍÎó²îºÍ4¸öÓÕÆ­Îó²î¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄ3¸ö0dayΪWindows Print SpoolerÖеÄÔ¶³Ì´úÂëÖ´ÐÐÎó²î£¨CVE-2021-36936£©¡¢ Windows LSAÖеÄÓÕÆ­Îó²î£¨CVE-2021-36942£©ÒÔ¼°Windows Update MedicЧÀÍÖеÄÌáȨÎó²î£¨CVE-2021-36948£©¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬Ñо¿Ö°Ô±ÒѾ­·¢Ã÷×Ô¶¯Ê¹ÓÃCVE-2021-36948µÄ¹¥»÷»î¶¯¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/microsoft/microsoft-august-2021-patch-tuesday-fixes-3-zero-days-44-flaws/


5¡¢KasperskyÐû²¼2021ÄêQ2À¬»øÓʼþºÍ´¹ÂڻµÄ±¨¸æ


KasperskyÐû²¼2021ÄêQ2À¬»øÓʼþºÍ´¹ÂڻµÄ±¨¸æ.jpg


KasperskyÐû²¼ÁËÓйØ2021ÄêQ2À¬»øÓʼþºÍ´¹ÂڻµÄÆÊÎö±¨¸æ¡£¡£¡£¡£2021ÄêQ2£¬£¬£¬£¬£¬ÆóÒµÕË»§ÈÔÈ»Êǹ¥»÷ÕßµÄÖ÷ҪĿµÄÖ®Ò»¡£¡£¡£¡£ÎªÁËÔöÌí´¹ÂÚÓʼþÖÐÁ´½ÓµÄ¿ÉÐŶȣ¬£¬£¬£¬£¬¹¥»÷Õßαװ³ÆÀ´×ÔÔÆÐ§À͵ÄÓʼþ£¬£¬£¬£¬£¬ÀýÈçMicrosoft Teams¾Û»áµÄ֪ͨµÈ¡£¡£¡£¡£À¬»øÓʼþÊýÄ¿µÄÕ¼±ÈÔÚ3Ô·ݴ¥µ×£¨45.10%£©ºó£¬£¬£¬£¬£¬ÔÚ4Ô·ÝС·ùÉÏÉý£¨45.29%£©£¬£¬£¬£¬£¬µ½6Ô£¨48.03%£©Óë2020ÄêQ4Ï൱¡£¡£¡£¡£À¬»øÓʼþȪԴ×î¶àµÄ¹ú¼ÒΪ¶íÂÞ˹£¨26.07%£©£¬£¬£¬£¬£¬Æä´ÎÊǵ¹ú£¨13.97%£©ºÍÃÀ¹ú£¨11.24%£©¡£¡£¡£¡£×î³£¼ûµÄ¶ñÒ⸽¼þÊÇBadun¼Ò×壨7.09%£©¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securelist.com/spam-and-phishing-in-q2-2021/103548/