GRIMMÅû¶iSCSIÖÐÒѱ£´æ15ÄêµÄ3¸ö¸ßΣÎó²î£»GoogleÐû²¼Õë¶ÔChromeä¯ÀÀÆ÷µÄSpectre¹¥»÷µÄPoC
Ðû²¼Ê±¼ä 2021-03-151.GRIMMÅû¶iSCSIÖÐÒѱ£´æ15ÄêµÄ3¸ö¸ßΣÎó²î

GRIMMµÄÑо¿Ö°Ô±ÔÚLinuxÄÚºË×ÓϵͳiSCSIÖз¢Ã÷ÁË3¸ö¸ßΣÎó²î£¬ÕâЩÎó²î×Ô2006ÄêÒѾ±£´æ¡£Õâ3¸öÎó²î»®·ÖΪ¶Ñ»º³åÇøÒç³öÎó²î£¨CVE-2021-27365£©£¬¿Éµ¼ÖÂÍâµØÌáȨ¡¢ÐÅϢй¶ºÍ¾Ü¾ø·þÎñ£»ÄÚºËÖ¸Õëй¶Îó²î£¨CVE-2021-27363£©£¬¿Éµ¼ÖÂÐÅϢй¶£»ÒÔ¼°Ô½½ç¶ÁÈ¡Îó²î£¨CVE-2021-27364£©£¬¿Éµ¼ÖÂÐÅϢй¶ºÍ¾Ü¾ø·þÎñ¡£¹¥»÷Õß¿ÉÒÔʹÓÃÕâЩÎó²îÀ´ÈƹýKASLR¡¢SMEP¡¢SMAPºÍKPTIµÈÇå¾²¹¦Ð§¡£ÏÖÔÚ£¬ÕâЩÎó²îÒÑÓÚ3ÔÂ7ÈÕ±»ÐÞ¸´¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/15-year-old-linux-kernel-bugs-let-attackers-gain-root-privileges/
2.NCC GroupÅû¶Netgear½»Á÷»úÖеÄ15¸öÎó²î

NCC GroupÑо¿Ö°Ô±·¢Ã÷NetgearµÄJGS516PEÒÔÌ«Íø½»Á÷»úÖб£´æ15¸öÎó²î¡£ÕâЩÎó²îÖнÏΪÑÏÖØµÄÊÇ´úÂëÖ´ÐÐÎó²î£¨CVE-2020-26919£©£¬CVSS v3ÆÀ·ÖΪ9.8£¬¹¥»÷Õß¿ÉÒÔʹÓÃËüÀ´ÈƹýÉí·ÝÑéÖ¤²¢ÒÔÖÎÀíԱȨÏÞÖ´ÐдúÂë¡£±ðµÄ£¬ÉÐÓÐCVSS v3ÆÀ·ÖΪ8.8µÄNSDPÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2020-35231£©ºÍ¿ÉÉÏ´«¶ñÒâ´úÂëµÄ£¨CVE-2020-35220£©µÈÎó²î¡£ÏÖÔÚ£¬NetgearÒÑÐû²¼Çå¾²¸üУ¬À´ÐÞ¸´ÉÏÊöÎó²î¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/115586/hacking/netgear-soho-flaws.html
3.GoogleÐû²¼Õë¶ÔChromeä¯ÀÀÆ÷µÄSpectre¹¥»÷µÄPoC

GoogleÐû²¼ÁËÕë¶ÔChromeä¯ÀÀÆ÷JavaScriptÒýÇæµÄSpectre¹¥»÷PoC¡£Google³Æ£¬¸ÃPoC´úÂë¿ÉÔÚIntel Skylake CPUµÄChrome 88ÉÏÔËÐУ¬ÒÔ1kB/ sµÄËÙÂÊ´Ó×°±¸ÄÚ´æÖÐÏÂÔØÊý¾Ý¡£±ðµÄ£¬GoogleÑо¿Ö°Ô±ÍƲâPoC´úÂë¿ÉÔÚÆäËûCPU£¨²î±ðµÄ¹©Ó¦É̺ÍÐͺţ©¡¢²Ù×÷ϵͳºÍChromium°æ±¾ÉÏʹÓá£Google½¨ÒéWeb¿ª·¢Ö°Ô±Ê¹Óà еÄÇå¾²»úÖÆÀ´»º½âSpectreÓ²¼þ¹¥»÷ºÍ³£¼ûµÄWeb¿çվй¶£¬²¢ÌṩÁËPost-Spectre Web¿ª·¢»ººÍ½âSide-Channel¹¥»÷µÄÖ¸ÄÏ¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/115573/hacking/google-chrome-spectre-poc.html
4.ÄϷǰü¹Ü¹«Ë¾PPSÔâµ½¹¥»÷£¬¿Í»§Ð¡ÎÒ˽¼ÒÐÅϢй¶

ÄϷǰü¹ÜºÍͶ×Ê×Éѯ¹«Ë¾PPSÔâµ½¹¥»÷£¬¿Í»§Ð¡ÎÒ˽¼ÒÐÅÏ¢¿ÉÄÜÒѾй¶¡£¸Ã¹«Ë¾ÔÚÒ»·ÝÉùÃ÷ÖÐÌåÏÖ£¬ÆäÔ⵽δ֪ºÚ¿ÍµÄÍøÂç¹¥»÷£¬·þÎñ¿ÉÄÜ»áÖÐÖ¹¡£ÏÖÔÚ£¬ËûÃÇÕýÔÚ¶Ô´ËʾÙÐÐÊӲ죬²¢ÊÔͼ»Ö¸´ÆäIT»ù´¡¼Ü¹¹µÄ¹¦Ð§Ê±¡£Ôڴ˹ý¶Éʱ´ú£¬¸Ã¹«Ë¾»¹ÌṩÁËÐí¶àÌæ»»Á÷³Ì£¬ÒÔ×îºéÁ÷ƽµØïÔ̹¥»÷¶Ô¿Í»§µÄÓ°Ïì¡£ÏÖÔÚ£¬Éв»ÖªµÀPPSÔâµ½µÄ¹¥»÷ÀàÐÍ£¬ÒÔ¼°¿ÉÄÜй¶ÐÅÏ¢µÄ¹æÄ£¡£
ÔÎÄÁ´½Ó£º
https://mybroadband.co.za/news/security/389402-pps-hit-by-cyber-attack.html
5.Unit42Ðû²¼ÓйØDearCryÀÕË÷Èí¼þµÄÆÊÎö±¨¸æ

Unit42Ðû²¼ÁËÓйØDearCryÀÕË÷Èí¼þµÄÆÊÎö±¨¸æ¡£DearCryÊÇÒ»¸öеÄÀÕË÷Èí¼þ±äÖÖ£¬¹ØÓÚËüµÄ±¨µÀ×îÔç·ºÆðÔÚ2021Äê3ÔÂ9ÈÕ£¬¿ÉÒÔʹÓÃMicrosoft Exchange·þÎñÆ÷µÄProxyLogonÎó²î¾ÙÐй¥»÷¡£¹¥»÷Ä¿µÄ°üÀ¨ÃÀ¹ú¡¢¼ÓÄôóºÍ°Ä´óÀûÑǵȹú¼Ò¡£±ðµÄ£¬¸Ã±¨¸æ»¹¼Í¼ÁËDearCryʹÓõÄÏà¹ØÕ½ÂÔÒÔ¼°ÊÖÒÕºÍÀú³Ì£¨TTP£©£¬²¢Îª¿Í»§ÔõÑù׼ȷÉèÖÃËûÃǵÄ×°±¸ÌṩÁ˽¨Òé¡£
ÔÎÄÁ´½Ó£º
https://unit42.paloaltonetworks.com/dearcry-ransomware/
6.Check PointÐû²¼ÓйØExchange¹¥»÷ÊÂÎñµÄÆÊÎö±¨¸æ

Check PointÐû²¼ÁËÓйØExchange¹¥»÷ÊÂÎñµÄÆÊÎö±¨¸æ¡£Ôڸñ¨¸æÖУ¬Check Point Research£¨CPR£©Åû¶ÁËÆäÔÚÈ«Çò¹æÄ£ÄÚ×·×ÙµÄʵÑéʹÓôËÎó²îµÄ×éÖ¯µÄ×îÐÂЧ¹û¡£CPR·¢Ã÷È«ÇòÒÑÓÐÊý°Ù´ÎµÄʹÓÃʵÑ飻½öÔÚÒÑÍùµÄ72¸öСʱÖУ¬ÊµÑéʹÓõĴÎÊý¾Í·ÁË6±¶ÒÔÉÏ£»¹¥»÷µÄ´ÎÊýÀÛ¼ÆÁè¼Ý4800´Î£¬Éæ¼°ÌìÏÂÊý°Ù¸ö×éÖ¯£»ÔâÊܹ¥»÷×î¶àµÄ¹ú¼ÒÊÇÃÀ¹ú£¨Õ¼±È21£¥£©£¬Æä´ÎÊǺÉÀ¼£¨12£¥£©ºÍÍÁ¶úÆä£¨12£¥£©£»ÊÜÓ°Ïì×î´óµÄ²¿·ÖÊÇÕþ¸®ºÍ¾ü·½£¨Õ¼±È27£¥£©£¬Æä´ÎÊÇÖÆÔìÒµ£¨22£¥£©ºÍÈí¼þ¹©Ó¦ÉÌ£¨9£¥£©¡£
ÔÎÄÁ´½Ó£º
https://blog.checkpoint.com/2021/03/11/exploits-on-organizations-worldwide/


¾©¹«Íø°²±¸11010802024551ºÅ