ÐÅÏ¢Çå¾²Öܱ¨-2021ÄêµÚ24ÖÜ
Ðû²¼Ê±¼ä 2021-06-15> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
2021Äê06ÔÂ07ÈÕÖÁ06ÔÂ13ÈÕ¹²ÊÕ¼Çå¾²Îó²î73¸ö£¬£¬ÖµµÃ¹Ø×¢µÄÊÇMicrosoft Windows Defender CVE-2021-31985´úÂëÖ´ÐÐÎó²î£»£»£»£»£»£»Rockwell Automation ISaGRAF CVE-2020-25176 IXLÐÒé´úÂëÖ´ÐÐÎó²î£»£»£»£»£»£»SAP NetWeaver ABAP Server CVE-2021-27632ÄÚ´æÆÆËðÎó²î£»£»£»£»£»£»Schneider Electric IGSS CGFÔ½½çдÎó²î£»£»£»£»£»£»Microsoft Windows TCP/IPÇå¾²ÈÆ¹ýÎó²î¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÃÀ¹úCox MediaÔâµ½ÀÕË÷¹¥»÷£¬£¬µçÊӺ͵çֱ̨²¥ÖÐÖ¹£»£»£»£»£»£»INKYÅû¶ÒÔÌá·ÀÀÕË÷Èí¼þΪÖ÷ÌâµÄÐÂÒ»ÂÖ´¹Âڻ£»£»£»£»£»£»ºÚ¿ÍÔÚ°µÍø¹ûÕæ°üÀ¨84ÒÚÃÜÂëµÄÜöÝÍRockYou2021£»£»£»£»£»£»FBI×·»ØColonial PipelineÖ§¸¶µÄ230ÍòÃÀÔªÊê½ð£»£»£»£»£»£»MicrosoftÇå¾²¸üУ¬£¬ÐÞ¸´7¸ö0dayÔÚÄÚµÄ50¸öÎó²î¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£
> Ö÷ÒªÇå¾²Îó²îÁбí
1.Microsoft Windows Defender CVE-2021-31985´úÂëÖ´ÐÐÎó²î
Microsoft Windows Defender±£´æÇå¾²Îó²î£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31985
2.Rockwell Automation ISaGRAF CVE-2020-25176 IXLÐÒé´úÂëÖ´ÐÐÎó²î
Rockwell Automation ISaGRAF IXLÐÒé´¦Öóͷ£ÎļþÃû±£´æÇå¾²Îó²î£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£
https://us-cert.cisa.gov/ics/advisories/icsa-20-280-01
3.SAP NetWeaver ABAP Server CVE-2021-27632ÄÚ´æÆÆËðÎó²î
SAP NetWeaver ABAP Server±£´æÄÚ´æÆÆËðÎó²î£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»£»£»£»òÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=578125999
4.Schneider Electric IGSS CGFÔ½½çдÎó²î
Schneider Electric IGSS CGFÎļþ´¦Öóͷ£±£´æÔ½½çдÎó²î£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÎļþÇëÇ󣬣¬ÓÕʹÓû§ÆÊÎö£¬£¬¿ÉʹӦÓóÌÐò±ÀÀ£»£»£»£»£»£»òÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£
https://us-cert.cisa.gov/ics/advisories/icsa-21-159-04
5.Microsoft Windows TCP/IPÇå¾²ÈÆ¹ýÎó²î
Microsoft Windows Windows TCP/IP±£´æÇå¾²Îó²î£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬¿ÉÈÆ¹ýÇå¾²ÏÞÖÆÎ´ÊÚȨ»á¼û¡£¡£
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31970
> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢ÃÀ¹úCox MediaÔâµ½ÀÕË÷¹¥»÷£¬£¬µçÊӺ͵çֱ̨²¥ÖÐÖ¹

ÃÀ¹ú×î´óµÄýÌ弯ÍÅÖ®Ò»Cox Media Group£¨CMG£©Ôâµ½ÀÕË÷¹¥»÷£¬£¬²¿·ÖµçÊӺ͵çֱ̨²¥ÖÐÖ¹¡£¡£¸Ã¹«Ë¾ÓµÓÐ33¼ÒµçÊǪ́¡¢54¸ö¹ã²¥µç̨¡¢¶à¸ö¿çƽ̨Á÷ýÌåÊÓÆµÆ½Ì¨ºÍÊý×ÖÆ½Ì¨¡£¡£Inside Radio³Æ¹¥»÷±¬·¢ÔÚ6ÔÂ3ÈÕÉÏÎ磬£¬Æä¶ÔCMGµÄ¶à¸öµç̨¾ÙÐÐÁËËæ»ú¼ì²é£¬£¬·¢Ã÷µçÌ¨ÍøÕ¾ÈÔ¿É»á¼û£¬£¬µ«ÔÚÏßÁ÷ýÌåÒÑÀëÏߣ¬£¬²¢ÌáÐÑ¡°ÒôƵÔÝʱ²»¿ÉÓᱡ£¡£ÕâÊÇÀÕË÷Èí¼þÍÅ»ïµÚ¶þ´Î¹¥»÷ÃÀ¹úÖ÷ÒªµÄýÌ幫˾£¬£¬2019Äê9Ô£¬£¬CBSÆìÏÂµÄ¹ã²¥ÍøÂçEntercomÔâµ½¹¥»÷£¬£¬µ¼Ö²¿·Ö¹ã²¥µç̨ÖÐÖ¹¡£¡£
ÔÎÄÁ´½Ó£º
http://www.insideradio.com/free/cox-media-group-stations-still-offline-a-day-after-apparent-malware-attack/article_7c619380-c506-11eb-9b7b-4f6576d00aa0.html
2¡¢INKYÅû¶ÒÔÌá·ÀÀÕË÷Èí¼þΪÖ÷ÌâµÄÐÂÒ»ÂÖ´¹Âڻ

ÓʼþÇ徲ƽ̨INKYÅû¶ÒÔÌá·ÀÀÕË÷Èí¼þΪÖ÷ÌâµÄÐÂÒ»ÂÖ´¹Âڻ¡£¡£½üÆÚ¶ÔColonial PipelineµÄÀÕË÷Èí¼þ¹¥»÷Òý·¢ÁËеĴ¹Âڻ£¬£¬¸Ã»î¶¯µÄÓʼþ¾ùΪÓÐÕë¶ÔÐԵĽôÆÈ֪ͨ£¬£¬½¨ÒéÊÕ¼þÈ˵ã»÷Á´½ÓÒÔ×°ÖÃϵͳ¸üУ¬£¬À´¼ì²â²¢Ìá·À×îеÄÀÕË÷Èí¼þ¡£¡£¹¥»÷ÕßʹÓõÄÓòÃûΪms-sysupdate[.]comºÍselectionpatch [.]com£¬£¬ÕâºÜÈÝÒ×±»ÎóÒÔΪÊÇÕýµ±ÓòÃû£¬£¬Æä»¹Ê¹ÓÃÁËCobalt Strike¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/phishing-uses-colonial-pipeline-ransomware-lures-to-infect-victims/
3¡¢ºÚ¿ÍÔÚ°µÍø¹ûÕæ°üÀ¨84ÒÚÃÜÂëµÄÜöÝÍRockYou2021

ijºÚ¿ÍÔÚ°µÍøÐû²¼ÁË100GBµÄTXTÎļþ£¬£¬ÆäÖаüÀ¨84ÒÚ¸öÃÜÂ룬£¬ÕâЩÃÜÂë¿ÉÄÜÊÇ´Ó֮ǰµÄй¶ÊÂÎñÖкϲ¢¶øÀ´µÄ¡£¡£ºÚ¿Í³ÆÆäÖаüÀ¨µÄËùÓÐÃÜÂ볤¶È¾ùΪ6-20¸ö×Ö·û£¬£¬É¾³ýÁË·ÇASCII×Ö·ûºÍ¿Õ¸ñ¡£¡£Æä»¹ÌåÏÖ¸ÃÜöÝͰüÀ¨820ÒÚ¸öÃÜÂ룬£¬µ«¾ÓÉÑо¿Ö°Ô±²âÊÔ£¬£¬ÆäÖÐÖ»ÓÐ8459060239¸öÊÇΨһµÄ£¬£¬ÕâËÆºõÊÇÓÐÊ·ÒÔÀ´×î´óµÄÃÜÂëÜöÝÍ¡£¡£¸ÃÜöÝͱ»³ÆÎªRockYou2021£¬£¬»òÐíÊDzο¼ÁË2009Ä걬·¢µÄRockYouÊý¾Ýй¶ÊÂÎñ£¬£¬ºÚ¿ÍÇÔÈ¡ÁËÁè¼Ý3200ÍòÓû§µÄÃÜÂë¡£¡£
ÔÎÄÁ´½Ó£º
https://cybernews.com/security/rockyou2021-alltime-largest-password-compilation-leaked/
4¡¢FBI×·»ØColonial PipelineÖ§¸¶µÄ230ÍòÃÀÔªÊê½ð

ÃÀ¹úFBIºÍDOJÁªºÏ×·»ØÁËColonial PipelineÖ§¸¶µÄÌ©°ëÊê½ð¡£¡£5ÔÂ7ÈÕ£¬£¬¸Ã¹«Ë¾Ôâµ½ÁËDarkSideÀÕË÷Èí¼þ¹¥»÷ȼÁϹܵÀ¹Ø±Õ£¬£¬Îª´ËÆäÖ§¸¶ÁË×ܼÆ440ÍòÃÀÔªµÄÊê½ð£¬£¬´Ë´Î×·»ØÁËÆäÖеÄ230ÍòÃÀÔª¡£¡£DOJÌåÏÖ£¬£¬ËûÃÇͨ¹ýÉó²é±ÈÌØ±Ò¹«¹²·ÖÀàÕË£¬£¬¸ú×ÙÁ˶à´Î±ÈÌØ±ÒתÕË£¬£¬²¢È·¶¨Ô¼Äª63.7±ÈÌØ±ÒÒÑ×ªÒÆµ½Ìض¨µØµã£¬£¬¶øFBIÓµÓиõصãµÄ˽Կ»ò´óÖµÈЧµÄµØµã¡£¡£ÃÀ¹ú˾·¨²¿»¹³Æ£¬£¬ÊÂʵÉÏÁª°îÊÓ²ì¾Ö´ÓÒ»×îÏȾÍÉèÁËȦÌס£¡£
ÔÎÄÁ´½Ó£º
https://threatpost.com/fbi-claws-back-millions-darksides-ransom/166705/
5¡¢MicrosoftÇå¾²¸üУ¬£¬ÐÞ¸´7¸ö0dayÔÚÄÚµÄ50¸öÎó²î

MicrosoftÐû²¼ÁË6Ô·ݵÄÖܶþÇå¾²¸üУ¬£¬ÐÞ¸´Á˰üÀ¨7¸ö0dayÔÚÄÚµÄ50¸öÎó²î¡£¡£´Ë´ÎÐÞ¸´µÄ0day°üÀ¨WindowsÄÚºËÐÅϢй¶Îó²î£¨CVE-2021-31955£©¡¢Windows NTFSÌáȨÎó²î£¨CVE-2021-31956£©¡¢Microsoft DWMÌáȨÎó²î£¨CVE-2021-33739£©¡¢Windows MSHTMLƽ̨RCEÎó²î£¨CVE-2021-33742£©¡¢MicrosoftÔöÇ¿ÐͼÓÃÜÌṩ³ÌÐòÌáȨÎó²î£¨CVE-2021-31199ºÍCVE-2021-31201£©ºÍWindowsÔ¶³Ì×ÀÃæÐ§À;ܾøÐ§ÀÍÎó²î£¨CVE-2021-31968£©¡£¡£ÆäÖУ¬£¬Ç°6¸ö0dayÒÑÔÚÒÑÍù±»Ê¹Óùý¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/microsoft/microsoft-june-2021-patch-tuesday-fixes-6-exploited-zero-days-50-flaws/


¾©¹«Íø°²±¸11010802024551ºÅ