ÐÅÏ¢Çå¾²Öܱ¨-2021ÄêµÚ2ÖÜ

Ðû²¼Ê±¼ä 2021-01-11

> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2021Äê01ÔÂ04ÈÕÖÁ01ÔÂ10ÈÕ¹²ÊÕ¼Çå¾²Îó²î68¸ö£¬£¬£¬ £¬ÖµµÃ¹Ø×¢µÄÊÇDell Wyse ThinOSĬÈÏÉèÖÃÎļþ²Ù×÷Îó²î£»£»£»£»£»£»Panasonic FPWIN Pro»º³åÇøÒç³öÎó²î£»£»£»£»£»£»Qualcomm Video NALÆÊÎöÔ½½çдÎó²î£»£»£»£»£»£»Google Android¼Ü¹¹CVE-2021-0313¾Ü¾øÐ§ÀÍÎó²î£»£»£»£»£»£»Delta Electronics Industrial Automation DOPSoft CVE-2020-27277»º³åÇøÒç³öÎó²î¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÄÉʲά¶û±¬Õ¨µ¼ÖÂÃÀ¹úÊý°ÙÓ¢ÀïͨѶЧÀÍÖÐÖ¹£»£»£»£»£»£»Cyble·¢Ã÷ºÚ¿ÍÔÚ°µÍø³öÊÛÁ½ÒÚ¶àÖйú¹«ÃñµÄÐÅÏ¢£»£»£»£»£»£»Ì¸ÌìȺ×éSlackЧÀÍÖÐÖ¹£¬£¬£¬ £¬²¨¼°È«ÇòÓû§£»£»£»£»£»£»ESTsecurityÅû¶ThalliumÕë¶Ô½ðÈÚÐÐÒµµÄ¹©Ó¦Á´¹¥»÷£»£»£»£»£»£»GreyNoiseÔÚÒ°·¢Ã÷ʹÓÃZyxelÖÐÎó²îµÄ¹¥»÷»î¶¯¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬ £¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£


Ö÷ÒªÇå¾²Îó²îÁбí


1.Dell Wyse ThinOSĬÈÏÉèÖÃÎļþ²Ù×÷Îó²î


Dell Wyse ThinOSĬÈÏÉèÖñ£´æÇå¾²Îó²î£¬£¬£¬ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬ £¬¿ÉдÎļþµ½ÏµÍ³»òÕß²Ù×÷Ä¿µÄÉèÖᣡ£

https://www.dell.com/support/kbdoc/zh-hk/000180768/dsa-2020-281


2.Panasonic FPWIN Pro»º³åÇøÒç³öÎó²î


Panasonic FPWIN Pro´¦Öóͷ£ÏîÄ¿Îļþ±£´æ»º³åÇøÒç³öÎó²î£¬£¬£¬ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬ £¬¿É¾ÙÐоܾøÐ§À͹¥»÷»òÕßÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£

https://us-cert.cisa.gov/ics/advisories/icsa-21-005-02


3.Qualcomm Video NALÆÊÎöÔ½½çдÎó²î


Qualcomm Video NALÆÊÎö±£´æÔ½½çдÎó²î£¬£¬£¬ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬ £¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£

https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin



4.Google Android¼Ü¹¹CVE-2021-0313¾Ü¾øÐ§ÀÍÎó²î


Google Android¼Ü¹¹±£´æÇå¾²Îó²î£¬£¬£¬ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬ £¬¿É¾ÙÐоܾøÐ§À͹¥»÷¡£¡£

https://source.android.com/security/bulletin/2021-01-01


5.Delta Electronics Industrial Automation DOPSoft CVE-2020-27277»º³åÇøÒç³öÎó²î


Delta Electronics Industrial Automation DOPSoft´¦Öóͷ£ÏîÄ¿Îļþ±£´æ»º³åÇøÒç³öÎó²î£¬£¬£¬ £¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬ £¬¿É¾ÙÐоܾøÐ§À͹¥»÷»òÕßÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£

https://us-cert.cisa.gov/ics/advisories/icsa-21-005-05


> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢ÄÉʲά¶û±¬Õ¨µ¼ÖÂÃÀ¹úÊý°ÙÓ¢ÀïͨѶЧÀÍÖÐÖ¹


1.png


ÄÉʲά¶ûÊÐÖÐÐı¬·¢µÄÊ¥µ®½Ú±¬Õ¨ÊÂÎñµ¼ÖÂÃÀ¹úÊý°ÙÓ¢ÀïͨѶЧÀÍÖÐÖ¹¡£¡£´Ë´Î±¬Õ¨Ëð»µÁËÃÀ¹úµç»°µç±¨¹«Ë¾(AT£¦T)Òªº¦µÄÍøÂçÉèÊ©£¬£¬£¬ £¬ÆäÔÚÌïÄÉÎ÷ÖÝ¡¢¿ÏËþ»ùÖݺͰ¢À­°ÍÂíÖݵĴ󲿷ֵØÇøµÄ¿Í»§¾ùÊܵ½Ó°Ï죬£¬£¬ £¬ÎÞ·¨Í¨Ñ¶ºÍÉÏÍø¡£¡£±ðµÄ£¬£¬£¬ £¬´Ë´Î±¬Õ¨»¹Ôì³ÉÁËÊýÊ®ÈËéæÃüºÍÊýÊ®ÈËÊÜÉË£¬£¬£¬ £¬Ô¼ÓÐ100¸ö911ºô½ÐÖÐÐÄ·ºÆðÎÊÌâ¡£¡£AT£¦TÌåÏÖ×èÖ¹ÉÏÖÜÈý£¬£¬£¬ £¬ËùÓÐЧÀÍ»ù±¾ÒѾ­»Ö¸´¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/nashville-bombing-spotlights-vulnerable-voice-data-networks


2¡¢Cyble·¢Ã÷ºÚ¿ÍÔÚ°µÍø³öÊÛÁ½ÒÚ¶àÖйú¹«ÃñµÄÐÅÏ¢


2.png


CybleµÄÑо¿ÍŶӷ¢Ã÷ºÚ¿ÍÔÚ°µÍø³öÊÛÁ½ÒÚ¶àÖйú¹«ÃñµÄÐÅÏ¢¡£¡£´Ë´Îй¶µÄÊý¾ÝÀ´×Ô¶à¸öƽ̨ºÍÈí¼þ£¬£¬£¬ £¬ÆäÖаüÀ¨730Íòºþ±±Ê¡¾£ÖÝÊй«°²ÏØ×¡ÃñµÄÉí·ÝÖ¤ºÅ¡¢ÐÔ±ð¡¢ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢ÊÖ»ú¡¢µØµãºÍ´úÂëµÈÐÅÏ¢£¬£¬£¬ £¬4180Íò¸ö΢²©Óû§µÄÕ˺źÍÏìÓ¦µÄÊÖ»úºÅÂ룬£¬£¬ £¬ÒÔ¼°1.92ÒÚQQÓû§µÄÕ˺źÍÏìÓ¦µÄÊÖ»úºÅÂë¡£¡£´Ë´Îй¶µÄÓëÖйú¹«ÃñÓйصļͼ×ÜÊýÁè¼Ý2ÒÚ¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/112966/deep-web/chinese-citizens-data-darkweb.html


3¡¢Ì¸ÌìȺ×éSlackЧÀÍÖÐÖ¹£¬£¬£¬ £¬²¨¼°È«ÇòÓû§


3.png


̸ÌìȺ×éSlackЧÀͱ¬·¢ÁË2021ÄêµÄÊ×´ÎÖÐÖ¹£¬£¬£¬ £¬²¨¼°È«ÇòÓû§¡£¡£ÐÂÄêºóµÄµÚÒ»¸öÊÂÇéÈÕ£¬£¬£¬ £¬ÃÀ¹ú¶«²¿Ê±¼ä1ÔÂ4ÈÕÉÏÎç10µãSlack·ºÆðÁËÖÐÖ¹£¬£¬£¬ £¬Ó°ÏìÁË×ÀÃæ¿Í»§¶ËºÍWeb½çÃæ£¬£¬£¬ £¬Óû§ÎÞ·¨ÅþÁ¬Ð§ÀÍÆ÷¡¢ÎÞ·¨·¢ËͺÍÎüÊÕÐÂÎŲ¢ÇÒÎÞ·¨¼ìË÷ƵµÀÀúÊ·¼Í¼¡£¡£×î³õ±¬·¢ÖÐֹʱSlack³ÆÕâÖ»Ó°ÏìÁËÐÂÎÅת´ï£¬£¬£¬ £¬µ«ËæºóSlackµÄËùÓÐЧÀ͵ͼ·ºÆðÁËÖÐÖ¹¡£¡£ÏÖÔÚSlack»Ö¸´Á˿ͻ§¶ËµÄ²¿·Ö¹¦Ð§£¬£¬£¬ £¬ÈçÎüÊպͷ¢ËÍÐÂÎÅ£¬£¬£¬ £¬µ«GoogleÈÕÀúºÍOutlookÈÕÀúµÈЧÀÍÈÔÎÞ·¨Õý³£ÊÂÇé¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/technology/slack-suffers-its-first-massive-outage-of-2021/


4¡¢ESTsecurityÅû¶ThalliumÕë¶Ô½ðÈÚÐÐÒµµÄ¹©Ó¦Á´¹¥»÷


4.png


ESTsecurityÅû¶APT×éÖ¯Thallium£¨ÓÖÃûAPT37£©Õë¶Ô½ðÈÚÐÐÒµµÄ¹©Ó¦Á´¹¥»÷¡£¡£Ôڴ˴ι¥»÷»î¶¯ÖУ¬£¬£¬ £¬ºÚ¿Í¸Ä¶¯ÁËÒ»¿î˽ÈË¹ÉÆ±Í¶×ÊÐÅϢת´ïµÄÓ¦Ó㬣¬£¬ £¬ÒÔ·Ö·¢¶ñÒâ´úÂë¡£¡£ThalliumÊ×ÏÈʹÓÃNullsoft¾ç±¾×°ÖÃϵͳ£¨NSIS£©ÌìÉúWindows¿ÉÖ´ÐÐÎļþ£¬£¬£¬ £¬¸ÃÎļþ°üÀ¨ÁËÀ´×ÔÕýµ±¹ÉƱͶ×ÊÓ¦ÓóÌÐòµÄÕýµ±ÎļþºÍ¶ñÒâ´úÂë¡£¡£µ±Óû§ÔÚ×°ÖÃÕæÕýµÄ¹ÉƱͶ×ÊÓ¦ÓóÌÐòʱ£¬£¬£¬ £¬ºǫ́ͬʱÔËÐжñÒâ¾ç±¾¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/north-korean-software-supply-chain-attack-targets-stock-investors/


5¡¢GreyNoiseÔÚÒ°·¢Ã÷ʹÓÃZyxelÖÐÎó²îµÄ¹¥»÷»î¶¯


5.png


ÍøÂçÇå¾²¹«Ë¾GreyNoiseÔÚÒ°·¢Ã÷ʹÓÃZyxelÖÐÎó²î£¨CVE-2020-29583£©µÄ¹¥»÷»î¶¯¡£¡£¸ÃÎó²îÓëZyxelÖÐÓ²±àÂëµÄºóÃÅÕÊ»§zyfwpÓйØ£¬£¬£¬ £¬¹¥»÷Õß¿ÉÒÔʹÓÃÀ´½ÓÊÜÍøÂç×°±¸¡£¡£GreyNoise¼ì²âµ½Èý¸ö²î±ðµÄIPµØµãÕýÔÚɨÃèSSH×°±¸£¬£¬£¬ £¬²¢ÊµÑéʹÓÃZyxelºóÃŵǼ¡£¡£¿ÉÊÇÕâЩ¹¥»÷Õß²¢Ã»ÓÐרÃÅÕë¶ÔZyxel×°±¸£¬£¬£¬ £¬¶øÊÇɨÃèInternetÉÏËùÓÐÕýÔÚÔËÐеÄSSH¡£¡£ÆäÖÐÒ»¸ö¹¥»÷ÕßʹÓÃÁËCobalt StrikeµÄÄÚÖÃSSH¿Í»§¶ËÀ´Ö´ÐÐɨÃ裬£¬£¬ £¬Ö¼ÔÚÈÆ¹ý¼ì²â¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hackers-start-exploiting-the-new-backdoor-in-zyxel-devices/