ÐÅÏ¢°²È«Öܱ¨-2021ÄêµÚ46ÖÜ

°ä²¼¹¦·ò 2021-11-15
>±¾Öܰ²È«Ì¬ÊÆ×ÛÊö


±¾Öܹ²ÊÕ¼°²È«·ì϶58¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇAdobe RoboHelp ServerĿ¼±éÀú´úÂëÖ´Ðзì϶£»ServiceTonic Helpdesk softwareδÊÚȨ½Ó¼û·ì϶£»Microsoft Windows Active Directory CVE-2021-42278ȨÏÞÌáÉý·ì϶£»Microsoft Windows Remote Desktop Client´úÂëÖ´Ðзì϶£»Siemens SIMATIC PCS 7Ŀ¼±éÀú·ì϶ ¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇ×êÑÐÈËÔ±·¢ÏÖ¼ÙÒⰲȫ¹«Ë¾ProofpointµÄ´¹µö»î¶¯£»Í³³ÆÎªNUCLEUS:13µÄ¶à¸ö·ì϶ӰÏìÎ÷ÃÅ×ÓRTOS£»BusyBoxÖÐ14¸öзì϶ӰÏìÊý°ÙÍò»ùÓÚUnixµÄÉ豸£»Î¢Èí°ä²¼11Ô¸üУ¬½¨¸´6¸ö0dayÔÚÄÚµÄ55¸ö·ì϶£»ESET·¢ÏÖLazarusÀûÓõÁ°æµÄIDA Pro·Ö·¢¶ñÒâÈí¼þ ¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖÐ ¡£


>³ÁÒª°²È«·ì϶Áбí


1. Adobe RoboHelp ServerĿ¼±éÀú´úÂëÖ´Ðзì϶


Adobe RoboHelp Server´æÔÚĿ¼±éÀú·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë ¡£


https://www.zerodayinitiative.com/advisories/ZDI-21-1305/


2. ServiceTonic Helpdesk softwareδÊÚȨ½Ó¼û·ì϶


ServiceTonic Helpdesk software´æÔÚÊÚȨ»úÔì·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ɲ»Ê¹ÓÃÃÜÂëδÊÚȨ½Ó¼ûϵͳ ¡£


https://www.srlabs.de/bites/chaining-three-zero-day-exploits-in-itsm-software-servicetonic-for-remote-code-execution


3. Microsoft Windows Active Directory CVE-2021-42278ȨÏÞÌáÉý·ì϶


Microsoft Windows Active Directory´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Äܹ»ÌáÉýÌØÈ¨ ¡£


https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-42278


4. Microsoft Windows Remote Desktop Client´úÂëÖ´Ðзì϶


Microsoft Windows Remote Desktop Client´æÔÚδÃ÷°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Äܹ»ÏµÍ³¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë ¡£


https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-38666


5. Siemens SIMATIC PCS 7Ŀ¼±éÀú·ì϶


Siemens SIMATIC PCS 7´æÔÚĿ¼±éÀú·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬Äܹ»ÀûÓ÷¨Ê½¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë ¡£


https://cert-portal.siemens.com/productcert/pdf/ssa-840188.pdf


>³ÁÒª°²È«ÊÂÎñ×ÛÊö


1¡¢×êÑÐÈËÔ±·¢ÏÖ¼ÙÒⰲȫ¹«Ë¾ProofpointµÄ´¹µö»î¶¯


ArmorbloxµÄ×êÑÐÍŶÓÓÚ11ÔÂ4ÈÕÅû¶Á˼ÙÒâÍøÂ簲ȫ¹«Ë¾ProofpointµÄ´¹µö»î¶¯ ¡£ÕâЩ´¹µöÓʼþµÄÖ÷ÌâΪ¡°Re£ºPayoff Request¡±£¬Ðû³ÆÔ̺¬Ò»·Ýͨ¹ýProofpoint·¢Ë͵ĵÖѺ´û¿îÓйØÎļþ£¬Ö¼ÔÚÇÔȡָ±êµÄMicrosoft Office 365ºÍGoogle GmailÍ´´¦ ¡£¸ÃÓʼþÊÇ´Ó±»µÁµÄÓ×ÎÒÕÊ»§·¢Ë͵Ä£¬·¢¼þÈ˵ÄÓòÃûÓòΪ¡°sdis34[.]fr¡±£¬ÕâÊÇ·¨¹úÄϲ¿µÄÒ»¸öÏû·À½Ó¼Ã²¿ÃÅ£¬¶ø´¹µöÒ³ÃæÍйÜÔÚgreenleafproperties[.]co[.]ukÓò ¡£


Ô­ÎÄÁ´½Ó£º

https://www.armorblox.com/blog/proofpoint-credential-phishing/


2¡¢Í³³ÆÎªNUCLEUS:13µÄ¶à¸ö·ì϶ӰÏìÎ÷ÃÅ×ÓRTOS


ForescoutºÍMedigateµÄ×êÑÐÈËÔ±ÔÚ11ÔÂ9ÈÕÅû¶ÁËNucleusÖÐ13¸ö·ì϶µÄϸ½Ú ¡£NucleusÊÇÎ÷ÃÅ×ÓµÄʵʱ²Ù×÷ϵͳ(RTOS)£¬Í¨³£ÔËÐÐÔÚÒ½ÁÆÉ豸¡¢Æû³µ¡¢ÖÇÄÜÊÖ»ú¡¢ÎïÁªÍøÉ豸¡¢¹¤ÒµplcµÈÉ豸µÄƬÉÏϵͳ(SoC) ¡£ÕâЩ·ì϶ͳ³ÆÎªNUCLEUS:13£¬Ó°ÏìÁËNucleus TCP/IP²Ö¿â ¡£ÆäÖУ¬×îÑϳÁµÄÊÇÓ°ÏìÁËFTP·þÎñÆ÷×é¼þµÄÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2021-31886£©£¬CVSSÆÀ·ÖΪ9.8£¬ÊÇÓÉÓÚ¶ÔUSERºÅÁ¶ÈµÄÑéÖ¤²»ÕýÈ·µ¼ÖµÄ ¡£


Ô­ÎÄÁ´½Ó£º

https://therecord.media/nucleus13-vulnerabilities-impact-siemens-medical-industrial-equipment/


3¡¢BusyBoxÖÐ14¸öзì϶ӰÏìÊý°ÙÍò»ùÓÚUnixµÄÉ豸


Èí¼þ¿ª·¢¹«Ë¾JFrogºÍ°²È«¹«Ë¾ClarotyÔÚ11ÔÂ9ÈÕ½áºÏÅû¶ÁËBusyBoxÖÐ14¸ö·ì϶µÄϸ½Ú ¡£BusyBox±»³ÆÎªÇ¶ÈëʽLinuxµÄ¡°ÈðÊ¿¾üµ¶¡±£¬¿É½«¸÷Àà³£¼ûµÄUnixÀûÓûòÓ×·¨Ê½£¨ÀýÈçcp¡¢ls¡¢grep£©×éºÏ³ÉÒ»¸ö¿ÉÖ´ÐÐÎļþ ¡£ÕâЩ·ì϶´æÔÚÓÚBusyBox 1.16µ½1.33.1µÄ¶à¸ö°æ±¾£¬Ó°ÏìÁËÊý°ÙÍò»ùÓÚUnixµÄÉ豸 ¡£ÆäÖнÏΪÑϳÁµÄÊÇawkÖеÄDoS·ì϶CVE-2021-42383¡¢CVE-2021-42384ºÍCVE-2021-42385µÈ ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/124429/hacking/busybox-vulnerabilities.html


4¡¢Î¢Èí°ä²¼11Ô¸üУ¬½¨¸´6¸ö0dayÔÚÄÚµÄ55¸ö·ì϶


΢ÈíÔÚ11ÔÂ9ÈÕ°ä²¼Á˱¾ÔµÄÖܶþ²¹¶¡£¬×ܼƽ¨¸´ÁË55¸ö·ì϶ ¡£Õâ´Î½¨¸´ÁË6¸ö0 day£¬Ô̺¬ExcelÖа²È«Ö°ÄÜÈÆ¹ý·ì϶£¨CVE-2021-42292£©¡¢Exchange ServerÖÐRCE£¨CVE-2021-42321£©£¬RDPÖÐÐÅϢй¶·ì϶£¨CVE-2021-38631ºÍCVE-2021-41371£©£¬ÒÔ¼°3DÖв鿴Æ÷RCE£¨CVE-2021-43208ºÍCVE-2021-43209£© ¡£ÆäÖУ¬CVE-2021-42292ºÍCVE-2021-42321Òѱ»ÓÃÓÚ¶ñÒâ¹¥»÷»î¶¯ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/microsoft/microsoft-november-2021-patch-tuesday-fixes-6-zero-days-55-flaws/


5¡¢ESET·¢ÏÖLazarusÀûÓõÁ°æµÄIDA Pro·Ö·¢¶ñÒâÈí¼þ


ESETÍŶÓÓÚ11ÔÂ10ÈÕ·¢ÏÖ³¯ÏʺڿÍÍÅ»ïLazarusÀûÓõÁ°æIDA Pro¹¥»÷°²È«×êÑÐÈËÔ±µÄ»î¶¯ ¡£×êÑÐÈËԱͨ³£Ê¹ÓÃÄæÏò¹¤³ÌÀûÓÃIDA ProÀ´·ÖÎö·ì϶ºÍ¶ñÒâÈí¼þ£¬¶øÕâ´Î·¢ÏÖµÄIDA Pro 7.5°æ±¾Ô̺¬ÁËÁ½¸öÃûΪidahelp.dllºÍwin_fw.dllµÄ¶ñÒâDLL ¡£ÆäÖУ¬win_fw.dll½«ÔÚWindows¹¤×÷µ÷¶È·¨Ê½Öд´½¨Ò»¸öй¤×÷£¬¸Ã¹¤×÷½«Æô¶¯idahelper.dll£¬¶øºóidahelper.dll½«Ïνӵ½devguardmap[.]orgÍøÕ¾²¢ÏÂÔØÔ¶³Ì½Ó¼ûľÂíNukeSpedµÄpayload ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/lazarus-hackers-target-researchers-with-trojanized-ida-pro/