ÐÅÏ¢°²È«Öܱ¨-2021ÄêµÚ2ÖÜ

°ä²¼¹¦·ò 2021-01-11

> ±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


2021Äê01ÔÂ04ÈÕÖÁ01ÔÂ10ÈÕ¹²ÊÕ¼°²È«·ì϶68¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇDell Wyse ThinOSĬÈÏÅäÖÃÎļþ²Ù×÷·ì϶£»Panasonic FPWIN Pro»º³åÇøÒç¶Âí½Å£»Qualcomm Video NAL½âÎöÔ½½çд·ì϶£»Google Android¼Ü¹¹CVE-2021-0313»Ø¾ø·þÎñ·ì϶£»Delta Electronics Industrial Automation DOPSoft CVE-2020-27277»º³åÇøÒç¶Âí½Å¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇÄÉʲά¶û±¬Õ¨µ¼ÖÂÃÀ¹úÊý°ÙÓ¢ÀïͨÕÛ·þÎñÖжÏ£»Cyble·¢ÏÖºÚ¿ÍÔÚ°µÍøÏúÊÛÁ½ÒÚ¶àÖйú¹«ÃñµÄÐÅÏ¢£»Ì¸ÌìȺ×éSlack·þÎñÖжÏ£¬²¨¼°È«ÇòÓû§£»ESTsecurityÅû¶ThalliumÕë¶Ô½ðÈÚÐÐÒµµÄ¹©¸øÁ´¹¥»÷£»GreyNoiseÔÚÒ°·¢ÏÖÀûÓÃZyxelÖзì϶µÄ¹¥»÷»î¶¯¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£


³ÁÒª°²È«·ì϶Áбí


1.Dell Wyse ThinOSĬÈÏÅäÖÃÎļþ²Ù×÷·ì϶


Dell Wyse ThinOSĬÈÏÅäÖôæÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉдÎļþµ½ÏµÍ³»òÕß²Ù×÷Ö¸±êÅäÖá£

https://www.dell.com/support/kbdoc/zh-hk/000180768/dsa-2020-281


2.Panasonic FPWIN Pro»º³åÇøÒç¶Âí½Å


Panasonic FPWIN Pro´¦ÖÃÏîÄ¿Îļþ´æÔÚ»º³åÇøÒç¶Âí½Å£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ɽøÐлؾø·þÎñ¹¥»÷»òÕßÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£

https://us-cert.cisa.gov/ics/advisories/icsa-21-005-02


3.Qualcomm Video NAL½âÎöÔ½½çд·ì϶


Qualcomm Video NAL½âÎö´æÔÚÔ½½çд·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£

https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin



4.Google Android¼Ü¹¹CVE-2021-0313»Ø¾ø·þÎñ·ì϶


Google Android¼Ü¹¹´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ɽøÐлؾø·þÎñ¹¥»÷¡£

https://source.android.com/security/bulletin/2021-01-01


5.Delta Electronics Industrial Automation DOPSoft CVE-2020-27277»º³åÇøÒç¶Âí½Å


Delta Electronics Industrial Automation DOPSoft´¦ÖÃÏîÄ¿Îļþ´æÔÚ»º³åÇøÒç¶Âí½Å£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ɽøÐлؾø·þÎñ¹¥»÷»òÕßÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£

https://us-cert.cisa.gov/ics/advisories/icsa-21-005-05


> ³ÁÒª°²È«ÊÂÎñ×ÛÊö


1¡¢ÄÉʲά¶û±¬Õ¨µ¼ÖÂÃÀ¹úÊý°ÙÓ¢ÀïͨÕÛ·þÎñÖжÏ


1.png


ÄÉʲά¶ûÊÐÖÐÐIJúÉúµÄÊ¥µ®½Ú±¬Õ¨ÊÂÎñµ¼ÖÂÃÀ¹úÊý°ÙÓ¢ÀïͨÕÛ·þÎñÖжÏ¡£Õâ´Î±¬Õ¨°Ü»µÁËÃÀ¹úµç»°µç±¨¹«Ë¾(AT£¦T)¹Ø¼üµÄÍøÂçÉèÊ©£¬ÆäÔÚÌïÄÉÎ÷ÖÝ¡¢¿ÏËþ»ùÖݺͰ¢À­°ÍÂíÖݵĴó²¿ÃŵØÓòµÄ¿Í»§¾ùÊܵ½Ó°Ï죬ÎÞ·¨Í¨Ñ¶ºÍÉÏÍø¡£´Ë±í£¬Õâ´Î±¬Õ¨»¹Ôì³ÉÁËÊýÊ®ÈËéæÃüºÍÊýÊ®ÈËÊÜÉË£¬Ô¼ÓÐ100¸ö911ºô½ÐÖÐÐijöÏÖÎÊÌâ¡£AT£¦T°µÊ¾½ØÖÁÉÏÖÜÈý£¬ËùÓзþÎñ¸ù»ùÒѾ­¸´Ô­¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/nashville-bombing-spotlights-vulnerable-voice-data-networks


2¡¢Cyble·¢ÏÖºÚ¿ÍÔÚ°µÍøÏúÊÛÁ½ÒÚ¶àÖйú¹«ÃñµÄÐÅÏ¢


2.png


CybleµÄ×êÑÐÍŶӷ¢ÏÖºÚ¿ÍÔÚ°µÍøÏúÊÛÁ½ÒÚ¶àÖйú¹«ÃñµÄÐÅÏ¢¡£Õâ´Îй¶µÄÊý¾ÝÀ´×Ô¶à¸öƽ̨ºÍÈí¼þ£¬ÆäÖÐÔ̺¬730Íòºþ±±Ê¡¾£ÖÝÊй«°²ÏؾÓÃñµÄÉí·ÝÖ¤ºÅ¡¢ÐÔ±ð¡¢ÐÕÃû¡¢µ®ÉúÈÕÆÚ¡¢ÊÖ»ú¡¢µØÖ·ºÍ´úÂëµÈÐÅÏ¢£¬4180Íò¸ö΢²©Óû§µÄÕ˺źÍÏàÓ¦µÄÊÖ»úºÅÂ룬ÒÔ¼°1.92ÒÚQQÓû§µÄÕ˺źÍÏàÓ¦µÄÊÖ»úºÅÂë¡£Õâ´Îй¶µÄÓëÖйú¹«ÃñÓйصļͼ×ÜÊý³¬¹ý2ÒÚ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/112966/deep-web/chinese-citizens-data-darkweb.html


3¡¢Ì¸ÌìȺ×éSlack·þÎñÖжÏ£¬²¨¼°È«ÇòÓû§


3.png


̸ÌìȺ×éSlack·þÎñ²úÉúÁË2021ÄêµÄ³õ´ÎÖжÏ£¬²¨¼°È«ÇòÓû§¡£ÐÂÄêºóµÄµÚÒ»¸ö¹¤×÷ÈÕ£¬ÃÀ¹ú¶«²¿¹¦·ò1ÔÂ4ÈÕÉÏÎç10µãSlack³öÏÖÁËÖжÏ£¬Ó°ÏìÁË×ÀÃæ¿Í»§¶ËºÍWeb½çÃæ£¬Óû§ÎÞ·¨ÏνӷþÎñÆ÷¡¢ÎÞ·¨·¢ËͺͽӹÜÐÂÎŲ¢ÇÒÎÞ·¨¼ìË÷Ƶ·º¹Çà¼Í¼¡£×î³õ²úÉúÖжÏʱSlack³ÆÕâÖ»Ó°ÏìÁËÐÂÎÅ´«µÝ£¬µ«ËæºóSlackµÄËùÓзþÎñµÄ¶¼³öÏÖÁËÖжÏ¡£Ä¿Ç°Slack¸´Ô­Á˿ͻ§¶ËµÄ²¿ÃÅÖ°ÄÜ£¬Èç½Ó¹ÜºÍ·¢ËÍÐÂÎÅ£¬µ«GoogleÈÕÀúºÍOutlookÈÕÀúµÈ·þÎñÈÔÎÞ·¨Õý³£¹¤×÷¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/technology/slack-suffers-its-first-massive-outage-of-2021/


4¡¢ESTsecurityÅû¶ThalliumÕë¶Ô½ðÈÚÐÐÒµµÄ¹©¸øÁ´¹¥»÷


4.png


ESTsecurityÅû¶APT×éÖ¯Thallium£¨±ðÃûAPT37£©Õë¶Ô½ðÈÚÐÐÒµµÄ¹©¸øÁ´¹¥»÷¡£ÔÚÕâ´Î¹¥»÷»î¶¯ÖУ¬ºÚ¿Í´Û¸ÄÁËÒ»¿î¸öÈË¹ÉÆ±Í¶×ÊÐÅÏ¢´«µÝµÄÀûÓã¬ÒÔ·Ö·¢¶ñÒâ´úÂë¡£ThalliumÊ×ÏÈʹÓÃNullsoft¾ç±¾×°ÖÃϵͳ£¨NSIS£©ÌìÉúWindows¿ÉÖ´ÐÐÎļþ£¬¸ÃÎļþÔ̺¬ÁËÀ´×ԺϷ¨¹ÉƱͶ×ÊÀûÓ÷¨Ê½µÄºÏ·¨ÎļþºÍ¶ñÒâ´úÂë¡£µ±Óû§ÔÚ×°ÖÃÕæÕýµÄ¹ÉƱͶ×ÊÀûÓ÷¨Ê½Ê±£¬ºó¶ÜͬʱÔËÐжñÒâ¾ç±¾¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/north-korean-software-supply-chain-attack-targets-stock-investors/


5¡¢GreyNoiseÔÚÒ°·¢ÏÖÀûÓÃZyxelÖзì϶µÄ¹¥»÷»î¶¯


5.png


ÍøÂ簲ȫ¹«Ë¾GreyNoiseÔÚÒ°·¢ÏÖÀûÓÃZyxelÖзì϶£¨CVE-2020-29583£©µÄ¹¥»÷»î¶¯¡£¸Ã·ì϶ÓëZyxelÖÐÓ²±àÂëµÄºóÃÅÕÊ»§zyfwpÓйØ£¬¹¥»÷ÕßÄܹ»ÀûÓÃÀ´ÊÕÊÜÍøÂçÉ豸¡£GreyNoise¼ì²âµ½Èý¸ö·ÖÆçµÄIPµØÖ·ÔÚɨÃèSSHÉ豸£¬²¢³¢ÊÔʹÓÃZyxelºóÃŵǼ¡£µ«ÊÇÕâЩ¹¥»÷Õß²¢Ã»ÓÐרÃÅÕë¶ÔZyxelÉ豸£¬¶øÊÇɨÃèInternetÉÏËùÓÐÔÚÔËÐеÄSSH¡£ÆäÖÐÒ»¸ö¹¥»÷ÕßʹÓÃÁËCobalt StrikeµÄÄÚÖÃSSH¿Í»§¶ËÀ´Ö´ÐÐɨÃ裬ּÔÚÈÆ¹ý¼ì²â¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hackers-start-exploiting-the-new-backdoor-in-zyxel-devices/