ÐÅÏ¢°²È«Öܱ¨-2021ÄêµÚ32ÖÜ

°ä²¼¹¦·ò 2021-08-09

> ±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


2021Äê08ÔÂ02ÈÕÖÁ08ÔÂ08ÈÕ¹²ÊÕ¼°²È«·ì϶63¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇGoogle Android¸ßͨ×é¼þCVE-2021-1972´úÂëÖ´Ðзì϶£»Cisco Connected Mobile Experiences¸ü¸ÄÃÜÂëÑéÖ¤ÈÆ¹ý·ì϶£»Claroty Secure Remote Access SQL×¢Èë·ì϶£»Advantech WebAccess/SCADA CVE-2021-32943Õ»Òç¶Âí½Å£»Pulse Connect Secure CVE-2021-22933õè¾¶±éÀú·ì϶¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊǺڿ͹«¿ªµç×ÓÒÕ½çEAµÄÊý¾Ý£¬Ô̺¬FIFA 21ÓÎÏ·Ô´Â룻×êÑÐÍŶӳÆDarkSide»òÒÔBlackMatterÖ®Ãû³Áлع飻Python°ä²¼°²È«¸üУ¬½¨¸´PyPI´æ´¢¿âÖжà¸ö·ì϶£»KasperskyÅû¶ÐµÄGhostEmperorÍÅ»ïÕë¶Ô¶«ÄÏÑÇ£»×êÑÐÈËÔ±Åû¶TCP/IPÖÐͳ³ÆÎªINFRA:HALTµÄ14¸ö·ì϶¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£


> ³ÁÒª°²È«·ì϶Áбí


1.Google Android¸ßͨ×é¼þCVE-2021-1972´úÂëÖ´Ðзì϶


Google Android¸ßͨ×é¼þ´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿Éʹϵͳ±ÀÀ£»òÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£

https://source.android.com/security/bulletin/2021-08-01


2.Cisco Connected Mobile Experiences¸ü¸ÄÃÜÂëÑéÖ¤ÈÆ¹ý·ì϶


Cisco Connected Mobile Experiences¸ü¸ÄÃÜÂëʵÏÖ´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉÈÆ¹ýÑé֤δÊÚȨ½Ó¼û¡£

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cmx-GkCvfd4


3.Claroty Secure Remote Access SQL×¢Èë·ì϶


Claroty Secure Remote Access´æÔÚSQL×¢Èë·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄSQLÒªÇ󣬲Ù×÷Êý¾Ý¿â£¬¿É»ñÈ¡Ãô¸ÐÐÅÏ¢»òÖ´ÐÐËÁÒâ´úÂë¡£

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0017


4.Advantech WebAccess/SCADA CVE-2021-32943Õ»Òç¶Âí½Å


Advantech WebAccess/SCADA´æÔÚÕ»Òç¶Âí½Å£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÒÔÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£

https://us-cert.cisa.gov/ics/advisories/icsa-21-217-04


5.Pulse Connect Secure CVE-2021-22933õè¾¶±éÀú·ì϶


Pulse Connect Secure´æÔÚĿ¼±éÀú·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄɾ³ýϵͳËÁÒâÎļþ¡£

https://www.pulsesecure.net/products/remote-access-overview/


 > ³ÁÒª°²È«ÊÂÎñ×ÛÊö


1¡¢ºÚ¿Í¹«¿ªµç×ÓÒÕ½çEAµÄÊý¾Ý£¬Ô̺¬FIFA 21ÓÎÏ·Ô´Âë


1


7ÔÂ26ÈÕÐÇÆÚÒ»£¬ºÚ¿ÍÔÚ°µÍø¹«¿ªµç×ÓÒÕ½çEAµÄÊý¾Ý£¬Ô̺¬FIFA 21ÓÎÏ·Ô´Âë¡¢FrostBiteÓÎÏ·ÒýÇæºÍµ÷ÊÔ¹¤¾ßÔ´´úÂëµÈÐÅÏ¢¡£¸ÃÊÂÎñ×î³õÓÚ6ÔÂ10ÈÕÅû¶£¬ÆäʱºÚ¿ÍÐû³ÆÇÔÈ¡Á˸ù«Ë¾780GBµÄÊý¾Ý£¬²¢Ô¸ÒâÒÔ2800ÍòÃÀÔªµÄ¼ÛÖµÏúÊÛ¡£µ«ÓÉÓÚ±»µÁÊý¾Ý´ó¶àÊÇÔ´´úÂë¶ÔÍøÂç·¸×ïÍÅ»ïÀ´ËµÃ»ÓÐÈκμÛÖµ£¬Òò¶ø²¢Î´ÕÒµ½Âò¼Ò¡£Ö®ºóºÚ¿ÍÊÔͼÀÕË÷EA£¬ÔÚ7ÔÂ14ÈÕ°ä²¼ÁË1.3GBµÄFIFAÔ´´úÂë×÷ΪÑù±¾£¬²¢ÔÚ2Öܺ󹫿ªÁËÈ«ÊýÊý¾Ý¡£


Ô­ÎÄÁ´½Ó£º

https://therecord.media/hackers-leak-full-ea-data-after-failed-extortion-attempt/


2¡¢×êÑÐÍŶӳÆDarkSide»òÒÔBlackMatterÖ®Ãû³Áлعé


2.jpg


×êÑÐÍŶӳÆÀÕË÷ÍÅ»ïDarkSide¿ÉÄÜÒѳÁж¨ÃûΪеÄBlackMatter³Áлعé¡£DarkSideÔÚ¹¥»÷ÃÀ¹ú×î´óµÄȼÁϹÜ·Colonial Pipelineºó£¬ÓÚ½ñÄê5ÔºöÈ»¹Ø¹Ø¡£ÉÏÖÜ£¬×êÑÐÈËÔ±·¢ÏÖеÄÀÕË÷Èí¼þBlackMatter¡£·ÖÎö·¢ÏÖ£¬¶þÕßʹÓõļÓÃÜ·¨Ê½ÏÕЩһÑù£¬Ô̺¬DarkSideËùÌØÓеÄ×Ô½ç˵Salsa20¾ØÕó¡£´Ë±í£¬¶þÕß¶¼Ê¹ÓÃÁËDarkSide¶ÀÓеÄRSA-1024ʵÏÖ¡¢Ñ¡È¡ÁËÒ»ÑùµÄ¼ÓÃÜËã·¨²¢ÇÒÊý¾ÝÐ¹Â¶ÍøÕ¾¶¼Ê¹ÓÃÁËÀàËÆµÄ˵»°¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/darkside-ransomware-gang-returns-as-new-blackmatter-operation/


3¡¢Python°ä²¼°²È«¸üУ¬½¨¸´PyPI´æ´¢¿âÖжà¸ö·ì϶


3.jpg


PythonÍŶӰ䲼°²È«¸üУ¬½¨¸´ÁËPython Package Index (PyPI)´æ´¢¿âÖеÄ3¸ö·ì϶¡£Õâ´Î½¨¸´µÄ·ì϶ÖУ¬×îÑϳÁµÄÒ»¸öÔÊÐí¹¥»÷ÕßÔÚPyPIµÄ»ù´¡ÉèÊ©ÉÏÔËÐкÅÁÀ´ÇÔÈ¡´úÂë¿âÖеÄÁîÅÆ»òÆäËüÃÜÂ룬²¢ÇÒÕâЩÁîÅÆ»òÃÜÂ뻹¿É±»ÓÃÀ´½Ó¼ûºÍ´Û¸ÄPyPI´úÂë¡£Áí±íÁ½¸ö·ì϶ÖУ¬Ò»¸öÔÊÐí¹¥»÷Õßɾ³ý²»ÔÚÆä½ÚÔìϵÄÏîÖ÷ÕÅÎĵµ£¬¶øÁíÒ»¸öÔÊÐí¹¥»÷Õßɾ³ý²»ÔÚÆä½ÚÔìϵÄÏîÄ¿ÖеĽÇÉ«¡£


Ô­ÎÄÁ´½Ó£º

https://therecord.media/python-team-fixes-bug-that-allowed-takeover-of-pypi-repository/


4¡¢KasperskyÅû¶ÐµÄGhostEmperorÍÅ»ïÕë¶Ô¶«ÄÏÑÇ


4.jpg


KasperskyÅû¶ÁËÒ»¸öеĺڿÍÍÅ»ïGhostEmperor£¬ÖØÒªÕë¶Ô¶«ÄÏÑǵØÓòµÄÖ¸±ê£¬Ô̺¬µ±¾Ö»ú¹¹ºÍ¼¸¼ÒµçÐŹ«Ë¾¡£¸ÃÍÅ»ïµÄÈëÇֻÒÀÀµÓÚCheat Engine¿ªÔ´ÏîÖ÷ÕÅÒ»¸ö×é¼þ£¬Ëü¿ÉÄÜÈÆ¹ýWindowsÇý¶¯·¨Ê½Ç¿ÔìÊðÃû»úÔì¡£¸ÃÍÅ»ïÖ®ËùÒÔÒìºõѰ³££¬ÊÇÓÉÓÚËüʹÓÃÁËÒ»¸öÒÔǰ²»ÎªÈËÖªµÄWindowsÄÚºËģʽµÄrootkit£¬²¢ÇÒѡȡÁ˸´ÔӵĶà½×¶Î¶ñÒâÈí¼þ¿ò¼Ü£¬Ö¼ÔÚ¶ÔÖ¸±ê·þÎñÆ÷½øÐÐÔ¶³Ì½ÚÔì¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/120721/apt/ghostemperor-chinese-speaking-threat-actor.html


5¡¢×êÑÐÈËÔ±Åû¶TCP/IPÖÐͳ³ÆÎªINFRA:HALTµÄ14¸ö·ì϶


5.jpg


×êÑÐÈËÔ±Åû¶ÁËÔÚNicheStack TCP/IP²Ö¿âÖз¢ÏÖµÄͳ³ÆÎªINFRA:HALTµÄ14¸ö°²È«·ì϶£¬Ó°ÏìÁ˳¬¹ý200¼Ò¹©¸øÉÌÔì×÷µÄOTÉ豸¡£ÕâЩ·ì϶Äܹ»µ¼ÖÂÔ¶³Ì´úÂëÖ´ÐÓ×¢»Ø¾ø·þÎñ (DoS)ºÍÐÅϢй¶¡¢TCPºýŪºÍDNS»º´æÖж¾¡£ÆäÖÐ×îÑϳÁµÄ·ì϶ΪCVE-2020-25928ºÍCVE-2020-31226£¬ÆÀ·Ö±ðÀëΪ9.8ºÍ9.1£¬Ó°ÏìÁ˲ֿâµÄDNS¿Í»§¶ËºÍHTTP·þÎñÆ÷×é¼þ£¬¿ÉÓÃÀ´ÔÚÖ¸±êÉ豸ÉÏÖ´ÐдúÂë²¢ÆëÈ«½ÚÔìËü¡£


Ô­ÎÄÁ´½Ó£º

https://thehackernews.com/2021/08/critical-flaws-affect-embedded-tcpip.html