ÐÅÏ¢Çå¾²Öܱ¨-2021ÄêµÚ12ÖÜ

Ðû²¼Ê±¼ä 2021-03-22

> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2021Äê03ÔÂ15ÈÕÖÁ03ÔÂ21ÈÕ¹²ÊÕ¼Çå¾²Îó²î54¸ö £¬ÖµµÃ¹Ø×¢µÄÊÇGoogle Chrome WebRTCÄÚ´æ¹ýʧÒýÓôúÂëÖ´ÐÐÎó²î£»Synology DiskStation Manager iscsi_snapshot_comm_core»º³åÇøÒç³öÎó²î£»Vmware vCenter Server Element Plug-in´úÂëÖ´ÐÐÎó²î£»Cisco RV134W VDSL2 Wireless-AC VPN Routers WEB½Ó¿ÚÏÂÁîÖ´ÐÐÎó²î£»Apache OpenMeetings NetTest web·þÎñ¾Ü¾ø·þÎñÎó²î¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇGRIMMÅû¶iSCSIÖÐÒѱ£´æ15ÄêµÄ3¸ö¸ßΣÎó²î£»Azure Active DirectoryÉèÖÃÎÊÌâµ¼ÖÂoffice 365·þÎñÖÐÖ¹£»Êý¾ÝÉúÒâÍøÕ¾weleakinfoµÄ1Íò¶à¸öÓû§ÐÅÏ¢±»¹ûÕæ£»HackerOneÐû²¼2021ÄêÓÐ¹ØºÚ¿ÍµÄÆÊÎö±¨¸æ£»CISAºÍFBIÍŽáÐû²¼¹ØÓÚTrickBot¶ñÒâÈí¼þµÄÇå¾²×Éѯ¡£


ƾ֤ÒÔÉÏ×ÛÊö £¬±¾ÖÜÇå¾²ÍþвΪÖС£


> Ö÷ÒªÇå¾²Îó²îÁбí


1.Google Chrome WebRTCÄÚ´æ¹ýʧÒýÓôúÂëÖ´ÐÐÎó²î


Google Chrome WebRTC±£´æÊͷźóʹÓÃÎó²î £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄWEBÇëÇó £¬ÓÕʹÓû§ÆÊÎö £¬¿ÉʹӦÓóÌÐò±ÀÀ£»ò¿ÉÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£

https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop_12.html


2.Synology DiskStation Manager iscsi_snapshot_comm_core»º³åÇøÒç³öÎó²î


Synology DiskStation Manager iscsi_snapshot_comm_core±£´æÔ½½ç¶ÁÎó²î £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬¿ÉʹӦÓóÌÐò±ÀÀ£»ò¿ÉÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£

https://www.synology.com/en-global/security/advisory/Synology_SA_20_26


3.Vmware vCenter Server Element Plug-in´úÂëÖ´ÐÐÎó²î


Vmware vCenter Server Element Plug-in±£´æÇå¾²Îó²î £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬ÔÚÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£

https://security.netapp.com/advisory/ntap-20210315-0001/


4.Cisco RV134W VDSL2 Wireless-AC VPN Routers WEB½Ó¿ÚÏÂÁîÖ´ÐÐÎó²î


Cisco RV134W VDSL2 Wireless-AC VPN Routers WEB½Ó¿Ú±£´æÊäÈëÑéÖ¤Îó²î £¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬ÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§ÒâÏÂÁî¡£

https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-rv-132w134w-overflow-Pptt4H2p.html


5.Apache OpenMeetings NetTest web·þÎñ¾Ü¾ø·þÎñÎó²î


Apache OpenMeetings NetTest web·þÎñ±£´æÇå¾²Îó²î £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇó £¬¿É¶ÔÓ¦ÓóÌÐò¾ÙÐоܾø·þÎñ¹¥»÷¡£

https://lists.apache.org/thread.html/r9bb615bd70a0197368f5f3ffc887162686caeb0b5fc30592a7a871e9%40%3Cuser.openmeetings.apache.org%3E


> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢GRIMMÅû¶iSCSIÖÐÒѱ£´æ15ÄêµÄ3¸ö¸ßΣÎó²î


1.jpg


GRIMMµÄÑо¿Ö°Ô±ÔÚLinuxÄÚºË×ÓϵͳiSCSIÖз¢Ã÷ÁË3¸ö¸ßΣÎó²î £¬ÕâЩÎó²î×Ô2006ÄêÒѾ­±£´æ¡£Õâ3¸öÎó²î»®·ÖΪ¶Ñ»º³åÇøÒç³öÎó²î£¨CVE-2021-27365£© £¬¿Éµ¼ÖÂÍâµØÌáȨ¡¢ÐÅϢй¶ºÍ¾Ü¾ø·þÎñ£»ÄÚºËÖ¸Õëй¶Îó²î£¨CVE-2021-27363£© £¬¿Éµ¼ÖÂÐÅϢй¶£»ÒÔ¼°Ô½½ç¶ÁÈ¡Îó²î£¨CVE-2021-27364£© £¬¿Éµ¼ÖÂÐÅϢй¶ºÍ¾Ü¾ø·þÎñ¡£¹¥»÷Õß¿ÉÒÔʹÓÃÕâЩÎó²îÀ´ÈƹýKASLR¡¢SMEP¡¢SMAPºÍKPTIµÈÇå¾²¹¦Ð§¡£ÏÖÔÚ £¬ÕâЩÎó²îÒÑÓÚ3ÔÂ7ÈÕ±»ÐÞ¸´¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/15-year-old-linux-kernel-bugs-let-attackers-gain-root-privileges/


2¡¢Azure Active DirectoryÉèÖÃÎÊÌâµ¼ÖÂoffice 365·þÎñÖÐÖ¹


2.jpg


ÃÀ¹ú¶«²¿Ê±¼äÏÂÖç3:34×îÏÈ £¬Óû§·¢Ã÷Microsoft 365·þÎñÖÐÖ¹ £¬µ¼ÖÂÎÞ·¨»á¼ûMicrosoft Teams¡¢Exchange Online¡¢Forms¡¢Xbox LiveºÍYammerµÈÓ¦ÓóÌÐò £¬ÒÔ¼°MicrosoftÍøÕ¾¡£Î¢ÈíÌåÏÖ £¬´Ë´ÎÖÐÖ¹ÊÇÓÉÓÚAzure Active Directory£¨AAD£©ÉèÖÃÎÊÌâµ¼ÖµÄ £¬Óû§ÎÞ·¨»á¼ûÒÀÀµAAD·þÎñ¾ÙÐÐÉí·ÝÑéÖ¤µÄÓ¦Óá£×èÖ¹ÃÀ¹ú¶«²¿Ê±¼ä3ÔÂ15ÈÕÏÂÖç5:17 £¬Î¢ÈíÔÚÔÚÈ«Çò¹æÄ£ÄÚ¿ªÕ¹»º½â²½·¥ £¬²¢Ô¤¼ÆºÜ¿ì¿ÉÒÔÖÜÈ«ÐÞ¸´¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/microsoft/microsoft-365-outage-knocks-down-teams-exchange-online/


3¡¢Êý¾ÝÉúÒâÍøÕ¾weleakinfoµÄ1Íò¶à¸öÓû§ÐÅÏ¢±»¹ûÕæ


3.jpg


Êý¾ÝÉúÒâÍøÕ¾weleakinfoÁè¼Ý1Íò¸ö¹ºÖÃÕßµÄСÎÒ˽¼ÒÐÅÏ¢±»¹ûÕæ¡£¸ÃÍøÕ¾³ÆÓµÓÐÀ´×Ô10000¶à¸öй¶µÄÊý¾Ý¿âµÄ120ÒÚÌõ¼Í¼ £¬ÒÑÓÚ2020ÄêÍ·±»ÃÀ¹ú¡¢Ó¢¹ú¡¢ºÉÀ¼¡¢µÂ¹úºÍ±±°®¶ûÀ¼Õþ¸®ÍŽᵷ»Ù¡£Cyble·¢Ã÷ºÚ¿ÍÓÚ2021Äê3ÔÂ11ÈÕ×¢²áÁËеÄÓòÃûwli.design £¬ÇÔÈ¡²¢¹ûÕæÁËÉÏÍò¸öʹÓÃÖ§¸¶·þÎñStripe¹ºÖÃÊý¾ÝµÄ¿Í»§µÄÐÅÏ¢ £¬°üÀ¨ÓʼþµØµã¡¢ÐÕÃû¡¢IPµØµã¡¢ä¯ÀÀÆ÷Óû§ÊðÀí¡¢ÎïÀíµØµã¡¢µç»°ºÅÂëºÍÖ§¸¶½ð¶î £¬ÒÔ¼°²¿·ÖÐÅÓÿ¨Êý¾Ý¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/115544/data-breach/weleakinfo-leaked-data.html


4¡¢HackerOneÐû²¼2021ÄêÓÐ¹ØºÚ¿ÍµÄÆÊÎö±¨¸æ


4.jpg


HackerOneÐû²¼ÁË2021ÄêÓÐ¹ØºÚ¿ÍµÄÆÊÎö±¨¸æ¡£±¨¸æ·¢Ã÷ £¬2020ÄêÌá½»Îó²îµÄºÚ¿ÍÊýÄ¿ÔöÌíÁË63£¥¡£±ðµÄ £¬×Ô´ÓCOVID-19ÒÔÀ´ £¬ÓÐ38£¥µÄºÚ¿ÍÆÆ·Ñ¸ü¶àʱ¼ä¾ÙÐй¥»÷£»±¨¸æµÄÎó²îÉæ¼°20¸öÖֱ𠣬¶øÕë¶Ô»á¼û¿ØÖƲ»µ±ºÍÌáȨÎó²îµÄÊýÄ¿ÔöÌíÁË53£¥£»ºÚ¿Í²»µ«½öÊÇΪÁËÇ® £¬85%µÄºÚ¿ÍÊÇΪÁËѧϰ £¬62%µÄºÚ¿ÍÊÇΪÁËÖ°ÒµÉú³¤£»ºÚ¿Í¸üרעÓÚÎïÁªÍø¡¢APIºÍAndroidÓ¦ÓóÌÐò¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackerone.com/resources/reporting/the-2021-hacker-report


5¡¢CISAºÍFBIÍŽáÐû²¼¹ØÓÚTrickBot¶ñÒâÈí¼þµÄÇå¾²×Éѯ


5.jpg


CISAºÍÁª°îÊÓ²ì¾Ö£¨FBI£©Ðû²¼ÁËÓйØTrickBot¶ñÒâÈí¼þµÄÍŽáÍøÂçÇå¾²×Éѯ£¨CSA£©¡£¸Ã×ÉѯÏÈÈÝÁËTrickBotµÄÊÖÒÕϸ½Ú¡¢MITRE ATT&CK Techniques¡¢Õì̽Êý¾ÝÒÔ¼°»º½â²½·¥¡£TrickBotÊÇÒ»Öָ߼¶Ä¾Âí £¬Í¨¹ýÓã²æÊ½´¹ÂÚÔ˶¯ £¬Ê¹ÓðüÀ¨¶ñÒ⸽¼þ»òÁ´½ÓµÄÌØÖÆµç×ÓÓʼþÀ´Èö²¥¡£¸ÃÇå¾²×Éѯ½¨Òé×éÖ¯×èÖ¹¿ÉÒɵÄInternetЭÒ鵨µã¡¢Ê¹ÓÃɱ¶¾Èí¼þÒÔ¼°ÎªÔ±¹¤ÌṩÉç»á¹¤³ÌºÍÍøÂç´¹ÂÚÅàѵµÈ·½·¨À´Ìá·À´ËÀ๥»÷¡£


Ô­ÎÄÁ´½Ó£º

https://us-cert.cisa.gov/ncas/current-activity/2021/03/17/cisa-fbi-joint-advisory-trickbot-malware-0