¡¾·ì϶¹«¸æ¡¿CleoÔ¶³Ì´úÂëÖ´Ðзì϶ ( CVE-2024-50623 )
°ä²¼¹¦·ò 2024-12-13Ò»¡¢·ì϶¸ÅÊö
·ìϼûû³Æ | CleoÔ¶³Ì´úÂëÖ´Ðзì϶ | ||
CVE ID | CVE-2024-50623 | ||
·ì϶ÀàÐÍ | ÎļþÉÏ´«ºÍÏÂÔØ | ·¢ÏÖ¹¦·ò | 2024-12-13 |
·ì϶ÆÀ·Ö | 8.8 | ·ì϶µÈ¼¶ | ¸ßΣ |
¹¥»÷ÏòÁ¿ | ÍøÂç | ËùÐèȨÏÞ | ÎÞ |
ÀûÓÃÄÑ¶È | µÍ | Óû§½»»¥ | ÊÇ |
PoC/EXP | Òѹ«¿ª | ÔÚÒ°ÀûÓà | ÒÑ·¢ÏÖ |
Cleo LexiCom¡¢VLTransfer ºÍ Harmony ¶¼ÊÇÓÃÓÚÊý¾Ý´«Êä¡¢ÆóÒµ¼¯³ÉºÍµç×ÓÊý¾Ý»¥»»£¨EDI£©µÈ¹¤×÷µÄÈí¼þ¹¤¾ß£¬ÖØÒªÀûÓÃÓÚÆóÒµ¼äµÄÎļþ»¥»»¡¢¹©¸øÁ´ÖÎÀíµÈÁìÓò¡£
2024Äê12ÔÂ13ÈÕ£¬GA»Æ½ð¼×¼¯ÍÅVSRC¼à²âµ½Cleo LexiCom¡¢VLTransfer ºÍ Harmony²úÆ·ÖдæÔÚÒ»¸öÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2024-50623£©£¬ÆäCVSSÆÀ·ÖΪ8.8£¬Ä¿Ç°¸Ã·ì϶µÄÀûÓÃϸ½Ú¼°PoCÒѹ«¿ª£¬ÇÒÒÑ·¢ÏÖ±»ÀûÓá£
Cleo LexiCom¡¢VLTransfer ºÍ HarmonyÈí¼þÖдæÔÚ²»ÊÜÏ޶ȵÄÎļþÉÏ´«ºÍÏÂÔØ·ì϶£¬ÓÉÓÚ²»×ã¶ÔÉÏ´«ÎļþºÍÏÂÔØÖ°ÄܵÄÊʵ±ÑéÖ¤ºÍÏÞ¶È£¬¹¥»÷Õß¿ÉÄÜÀûÓø÷ì϶ÉÏ´«¶ñÒâÎļþ²¢¿ÉÄÜÀûÓÃϵͳµÄ½Ó¼û/ÏÂÔØÖ°ÄÜ»òÆäËû»úÔì´¥·¢¶ñÒâÎļþÖ´ÐУ¬³É¹¦ÀûÓø÷ì϶¿ÉÄܵ¼ÖÂÔ¶³Ì´úÂëÖ´ÐУ¬´Ó¶øÔì³ÉÊý¾Ýй¶¡¢´Û¸Ä£¬ÉõÖÁ½øÒ»²½µÄÍøÂç¹¥»÷¡£
´Ë±í£¬Cleo LexiCom¡¢VLTransfer ºÍ HarmonyÈí¼þ5.8.0.24֮ǰ°æ±¾Öл¹´æÔÚÁíÒ»¸öÔ¶³Ì´úÂëÖ´ÐÐ0 day·ì϶£¨ÔÝÎÞCVE-ID£©£¬¸Ã·ì϶ΪCVE-2024-50623ÈÆ¹ý£¬¹¥»÷Õß¿ÉÄÜͨ¹ýÀûÓÃĬÈϵÄAutorunÎļþ¼ÐÉèÖõ¼ÈëºÍÖ´ÐÐËÁÒâbash»òPowerShellºÅÁĿǰ¸Ã·ì϶µÄÀûÓÃϸ½Ú¼°PoCÒѹ«¿ª£¬ÇÒÒѼì²âµ½·ì϶ÀûÓá£
¶þ¡¢Ó°ÏìÁìÓò
Cleo Harmony < 5.8.0.24
Cleo VLTrader < 5.8.0.24
Cleo LexiCom < 5.8.0.24
Èý¡¢°²È«´ëÊ©
3.1 Éý¼¶°æ±¾
ĿǰÕâЩ·ì϶ÒѾ½¨¸´£¬ÊÜÓ°ÏìÓû§¿ÉÉý¼¶µ½ÒÔϰ汾£º
Cleo Harmony >= 5.8.0.24
Cleo VLTrader >= 5.8.0.24
Cleo LexiCom >= 5.8.0.24
3.2 һʱ´ëÊ©
ÔÝÎÞ¡£
3.3 ͨÓý¨Òé
? ¶¨ÆÚ¸üÐÂϵͳ²¹¶¡£¬Ï÷¼õϵͳ·ì϶£¬ÌáÉý·þÎñÆ÷µÄ°²È«ÐÔ¡£
? ¼ÓǿϵͳºÍÍøÂçµÄ½Ó¼û½ÚÔ죬Åú¸Ä·À»ðǽսÊõ£¬¹Ø¹Ø·Ç±ØÒªµÄÀûÓö˿ڻò·þÎñ£¬Ï÷¼õ½«Î£ÏÕ·þÎñ£¨ÈçSSH¡¢RDPµÈ£©Â¶³öµ½¹«Íø£¬Ï÷¼õ¹¥»÷Ãæ¡£
? ʹÓÃÆóÒµ¼¶°²È«²úÆ·£¬ÌáÉýÆóÒµµÄÍøÂ簲ȫ»úÄÜ¡£
? ¼ÓǿϵͳÓû§ºÍȨÏÞÖÎÀí£¬ÆôÓöà³É·ÖÈÏÖ¤»úÔìºÍ×îÓ×ȨÏÞ×¼Ôò£¬Óû§ºÍÈí¼þȨÏÞӦά³ÖÔÚ×îµÍÏÞ¶È¡£
? ÆôÓÃÇ¿ÃÜÂëÕ½Êõ²¢ÉèÖÃΪ¶¨ÆÚÅú¸Ä¡£
3.4 ²Î¿¼Á´½Ó
https://support.cleo.com/hc/en-us/articles/27140294267799-Cleo-Product-Security-Advisory-CVE-2024-50623
https://support.cleo.com/hc/en-us/articles/28408134019735-Cleo-Product-Security-Update
https://www.huntress.com/blog/threat-advisory-oh-no-cleo-cleo-software-actively-being-exploited-in-the-wild
https://www.rapid7.com/blog/post/2024/12/11/etr-modular-java-backdoor-dropped-in-cleo-exploitation-campaign/
ËÄ¡¢°æ±¾ÐÅÏ¢
°æ±¾ | ÈÕÆÚ | ±¸×¢ |
V1.0 | 2024-12-13 | ³õ´Î°ä²¼ |
Îå¡¢¸½Â¼
5.1 GA»Æ½ð¼×¼ò½é
GA»Æ½ð¼×³ÉÁ¢ÓÚ1996Ä꣬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ´´½¨µÄ¡¢Õ¼ÓÐÆëÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢°²È«¸ß¿Æ¼¼ÆóÒµ¡£ÊǹúÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢°²È«²úÆ·¡¢°²È«·þÎñ½â¾ö¹æ»®µÄÁ캽ÆóÒµÖ®Ò»¡£
¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°GA»Æ½ð¼×´óÏ㬹«Ë¾Ô±¹¤6000ÓàÈË£¬Ñз¢ÍŶÓ1200ÓàÈË, ¼¼Êõ·þÎñÍŶÓ1300ÓàÈË¡£ÔÚÈ«¹ú¸÷Ê¡¡¢ÊÓ×¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö£¬Õ¼Óи²¸ÇÈ«¹úµÄÏúÊÛϵͳ¡¢Çþ·ϵͳºÍ¼¼ÊõÖ§³Öϵͳ¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐÓ×°å¹ÒÅÆÉÏÊС££¨¹ÉƱ´úÂ룺002439£©
¶àÄêÀ´£¬GA»Æ½ð¼×ÖÂÁ¦ÓÚÌṩӵÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷´´Ðµİ²È«²úÆ·ºÍ×î¼Ñʵ¼Ê·þÎñ£¬Ô®ÊÖ¿Í»§È«ÃæÌáÉýÆäIT»ù´¡ÉèÊ©µÄ°²È«ÐԺͳö²úЧÁ¦£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢°²È«²úÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸ÖÂÁ¦¡£
5.2 ¹ØÓÚGA»Æ½ð¼×
GA»Æ½ð¼×°²È«Ó¦¼±ÏìÓ¦ÖÐÐÄÒѰ䲼1000¶à¸ö·ì϶¹«¸æÎ¢·çÏÕÔ¤¾¯£¬ÎÒÃǽ«³ÖÐø¸ú×ÙÈ«Çò×îеÄÍøÂ簲ȫÊÂÎñºÍ·ì϶£¬ÎªÆóÒµµÄÐÅÏ¢°²È«±£¼Ý»¤º½¡£
¹Ø×¢ÎÒÃÇ£º



¾©¹«Íø°²±¸11010802024551ºÅ