ÐÅÏ¢°²È«Öܱ¨-2021ÄêµÚ30ÖÜ
°ä²¼¹¦·ò 2021-07-26> ±¾Öܰ²È«Ì¬ÊÆ×ÛÊö
2021Äê07ÔÂ19ÈÕÖÁ07ÔÂ25ÈÕ¹²ÊÕ¼°²È«·ì϶66¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇMotorola CX2 HNAP1/GetNetworkTomographySettingsºÅÁîÖ´Ðзì϶£»Oracle E-Business Suite Oracle Marketing CVE-2021-2355´úÂëÖ´Ðзì϶£»Schneider Electric EVlink CityÓ²±àÂë·ì϶£»Teradici PCOIP Software Agent vHubÇý¶¯·¨Ê½ÌØÈ¨ÌáÉý·ì϶£»Apple macOS Big Sur Model I/OͼÏñÔ½½çд´úÂëÖ´Ðзì϶¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇ×êÑÐÍŶÓÅû¶WindowsÔ¶³Ì´òÓ¡·þÎñÖеÄÐÂ0day£»Check Point°ä²¼2021ÄêQ2Æ·ÅÆÍøÂç´¹µö·ÖÎö»ã±¨£»ZeroXÍÅ»ïÔÚ°µÍøÏúÊÛʯÓ͹«Ë¾É³Ìذ¢ÃÀ1TBµÄÊý¾Ý£»ÐµÄMosaicLoader¿ÉÀûÓÃWindows DefenderÈÆ¹ý¼ì²â£»QualysÅû¶LinuxÄÚºËÖеı¾µØÌáȨ·ì϶Sequoia¡£
ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£
> ³ÁÒª°²È«·ì϶Áбí
1.Motorola CX2 HNAP1/GetNetworkTomographySettingsºÅÁîÖ´Ðзì϶
Motorola CX2 router CX HNAP1/GetNetworkTomographySettings´æÔÚÊäÈëÑéÖ¤·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâºÅÁî¡£
https://github.com/cc-crack/router/blob/master/motocx2.md
2.Oracle E-Business Suite Oracle Marketing CVE-2021-2355´úÂëÖ´Ðзì϶
Oracle E-Business Suite Oracle Marketing´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£
https://www.oracle.com/security-alerts/cpujul2021.html
3.Schneider Electric EVlink CityÓ²±àÂë·ì϶
Schneider Electric EVlink City´æÔÚÓ²±àÂë·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Äܹ»ÖÎÀíÔ±¸ßµÍÎÄδÊÚȨ½Ó¼ûϵͳ¡£
http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-194-06
4.Teradici PCOIP Software Agent vHubÇý¶¯·¨Ê½ÌØÈ¨ÌáÉý·ì϶
Teradici PCOIP Software Agent vHubÇý¶¯·¨Ê½¿É½ÓÊÜÀ´×ÔËÁÒⷨʽµÄºÅÁÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉÌáÉýÌØÈ¨¡£
https://advisory.teradici.com/security-advisories/100/
5.Apple macOS Big Sur Model I/OͼÏñÔ½½çд´úÂëÖ´Ðзì϶
Apple macOS Big Sur Model I/OͼÏñ´¦ÖôæÔÚÔ½½çд·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Äܹ»Äں˸ߵÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£
https://support.apple.com/en-us/HT212602l
> ³ÁÒª°²È«ÊÂÎñ×ÛÊö
1¡¢×êÑÐÍŶÓÅû¶WindowsÔ¶³Ì´òÓ¡·þÎñÖеÄÐÂ0day

×êÑÐÍŶӹ«¿ªÅû¶ÁËÒ»¸öеÄ0day£¬¹¥»÷ÕßÀûÓø÷ì϶Äܹ»Í¨¹ýÔ¶³Ì´òÓ¡·þÎñ»ñµÃWindowsÉϵÄSYSTEMȨÏÞ¡£×êÑÐÈËÔ±Benjamin Delpy³Æ£¬¸Ã·ì϶ÀûÓÃÁËWindows Point and PrintÖ°ÄÜÖеġ°Queue-Specific Files¡±¸öÐÔ¡£ÔÚ×°ÖôòÓ¡»úʱ£¬¹©¸øÉÌÌṩµÄ×°Ö÷¨Ê½Äܹ»Ö¸¶¨Ò»×éÓëÌØ¶¨´òÓ¡¶ÓÁÐÓйØÁªµÄÈκÎÀàÐ͵ÄÎļþ£¬¸ÃÎļþ½«±»ÏÂÔØµ½Ã¿Ò»¸öÏνӵ½´Ë´òÓ¡·þÎñÆ÷µÄ¿Í»§¶Ë¡£Òò¶ø£¬µ±¿Í»§¶ËÏνӵ½¹¥»÷ÕßËù½ÚÔìµÄ´òÓ¡·þÎñÆ÷ʱ£¬½«×Ô¶¯ÏÂÔØ²¢ÒÔSYSTEMȨÏÞÖ´ÐжñÒâDLL¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/microsoft/new-windows-print-spooler-zero-day-exploitable-via-remote-print-servers/
2¡¢Check Point°ä²¼2021ÄêQ2Æ·ÅÆÍøÂç´¹µö·ÖÎö»ã±¨

Check Point°ä²¼ÁË2021ÄêQ2Æ·ÅÆÍøÂç´¹µö·ÖÎö»ã±¨¡£»ã±¨Ö¸³ö£¬Óë2020ÄêQ4ºÍ2021ÄêQ1Ò»Ñù£¬MicrosoftÔٴγÉÎªÍøÂç·¸×ï·Ö×Ó×î³£Õë¶ÔµÄÆ·ÅÆ£¬45%µÄÆ·ÅÆÍøÂç´¹µö³¢ÊÔ¶¼ÓëMicrosoftÓйأ¬±ÈQ1Ôö³¤ÁË6%¡£º½Ô˹«Ë¾DHLΪµÚ¶þ´óÖ¸±ê£¬Õ¼±ÈΪ26%¡£Æä´ÎΪÑÇÂíÑ·(11%)¡¢Bestbuy(4%)¡¢¹È¸è(3%)¡¢ÁìÓ¢(3%)¡¢Dropbox(1%)¡¢Chase(1%)¡¢Æ»¹û(%)ºÍPaypal(0.5%)¡£´Ë±í£¬¿Æ¼¼ÒÀÈ»ÊÇÆ·ÅÆÍøÂç´¹µö¹¥»÷×îÖØÒªµÄÖ¸±êÐÐÒµ£¬Æä´ÎÊÇÔËÊäºÍÁãÊÛÐÐÒµ¡£
ÔÎÄÁ´½Ó£º
https://blog.checkpoint.com/2021/07/15/brand-phishing-report-q2-2021-microsoft-continues-reign/
3¡¢ZeroXÍÅ»ïÔÚ°µÍøÏúÊÛʯÓ͹«Ë¾É³Ìذ¢ÃÀ1TBµÄÊý¾Ý

±¾Ô£¬Ò»¸öÃûΪZeroXµÄºÚ¿ÍÍÅ»ïÔÚ°µÍøÒÔ500ÍòÃÀÔªµÄ¼ÛÖµÏúÊÛÉ³ÌØ°¢ÃÀ¹«Ë¾1TBµÄÊý¾Ý¡£É³Ìذ¢À²®Ê¯Ó͹«Ë¾¼ò³ÆÉ³Ìذ¢ÃÀ£¨Saudi Aramco£©£¬ÊÇÊÀ½çÉÏ×î´óµÄ¹«¹²Ê¯ÓͺÍÌìÈ»Æø¹«Ë¾Ö®Ò»£¬Õ¼Óг¬¹ý66000ÃûÔ±¹¤£¬ÄêÊÕÈë½ü2300ÒÚÃÀÔª¡£ZeroX³ÆÕâЩÊý¾ÝÊÇÔÚ2020Äêͨ¹ýÈëÇÖÉ³ÌØ°¢ÃÀµÄÍøÂç¼°·þÎñÆ÷»ñµÃµÄ£¬ÆäÖÐ×îÔçµÄ¿É×·Òäµ½1993Äê¡£Õâ´Îй¶µÄÊý¾ÝÔ̺¬14254ÃûÔ±¹¤µÄÆëÈ«ÐÅÏ¢¡¢¸÷ÀàϵͳµÄÏî²ã´Î×¼£»ÄÚ²¿ÃÅÎö»ã±¨¡¢ºÍ̸¡¢Ðꝡ¢¶¨¼Û±í£»Scadaµã¡¢Wi-Fi¡¢IPÉãÏñ»úºÍIoTÉ豸µÄÍøÂç²¼¾Ö£»Aramco¿Í»§Ãûµ¥¡¢·¢Æ±ºÍºÏÒ»Ö¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/saudi-aramco-data-breach-sees-1-tb-stolen-data-for-sale/
4¡¢ÐµÄMosaicLoader¿ÉÀûÓÃWindows DefenderÈÆ¹ý¼ì²â

Bitdefender×êÑÐÈËÔ±·¢ÏÖжñÒâÈí¼þMosaicLoader¿ÉÀûÓÃWindows DefenderÈÆ¹ý¼ì²â¡£¸Ã¶ñÒâÈí¼þͨ¹ýËÑË÷ÒýÇæÁ˾ּÙ×°³ÉÆÆ½âÈí¼þ£¬ÓµÓи´ÔÓµÄÄÚ²¿½á¹¹£¬Ö¼ÔÚÈÆ¹ý¶ñÒâÈí¼þ·ÖÎö¡£Æä·ÂÕÕÀàËÆÓںϷ¨Èí¼þµÄÎļþÐÅÏ¢²¢Ê¹ÓÃÓ׿éºÍÎÞÐòÖ´Ðа¤´Î½øÐдúÂë»ìºÏ¡£Ôڳɹ¦Ï°È¾Ö¸±êºó£¬×î³õµÄ»ùÓÚDelphiµÄdropper»á´ÓÔ¶³Ì·þÎñÆ÷»ñÈ¡ÏÂÒ»½×¶ÎµÄpayload£¬²¢ÔÚWindows DefenderÖÐΪÏÂÔØµÄ¿ÉÖ´ÐÐÎļþÔö³¤±¾µØÅųýÏîÒÔÈÆ¹ýɱ¶¾Èí¼þµÄɨÃè¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2021/07/this-new-malware-hides-itself-among.html
5¡¢QualysÅû¶LinuxÄÚºËÖеı¾µØÌáȨ·ì϶Sequoia

Qualys×êÑÐÈËÔ±Åû¶ÁËLinuxÄÚºËÖеı¾µØÌáȨ·ì϶Sequoia¡£¸Ã·ì϶׷×ÙΪCVE-2021-33909£¬´æÔÚÓÚÓÃÀ´ÖÎÀíÓû§Êý¾ÝµÄÎļþϵͳ²ã£¬ÊÇÓÉÓÚfs/seq_file.cûÓÐÕýÈ·ÏÞ¶Èseq»º³å·Ö±æÅä¶øµ¼Öµġ£Qualys³Æ£¬¸Ã·ì϶ӰÏìÁË×Ô2014ÄêÒÔÀ´°ä²¼µÄËùÓÐLinuxÄں˰汾¡£´Ë±í£¬×êÑÐÈËÔ±»¹·¢ÏÖÁËsystemdÖеÄÒ»¸ö²Ö¿âºÄ¾¡µ¼ÖµĻؾø·þÎñ·ì϶£¨CVE-2021-33910£©£¬´æÔÚÓÚ2015Äê4ÔÂÖ®ºó°ä²¼µÄËùÓÐsystemd°æ±¾ÖС£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/new-linux-kernel-bug-lets-you-get-root-on-most-modern-distros/


¾©¹«Íø°²±¸11010802024551ºÅ