ÐÅÏ¢Äþ¾²Öܱ¨-2021ÄêµÚ46ÖÜ

Ðû²¼Ê±¼ä 2021-11-15
>±¾ÖÜÄþ¾²Ì¬ÊÆ×ÛÊö


±¾Öܹ²ÊÕ¼Äþ¾²Â©¶´58¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇAdobe RoboHelp ServerĿ¼±éÀú´úÂëÖ´ÐЩ¶´£»ServiceTonic Helpdesk softwareδÊÚȨ·ÃÎÊ©¶´£»Microsoft Windows Active Directory CVE-2021-42278ȨÏÞÌáÉý©¶´£»Microsoft Windows Remote Desktop Client´úÂëÖ´ÐЩ¶´£»Siemens SIMATIC PCS 7Ŀ¼±éÀú©¶´¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÄþ¾²Ê¼þÊÇÑо¿ÈËÔ±·¢ÏÖð³äÄþ¾²¹«Ë¾ProofpointµÄµöÓã»î¶¯£»Í³³ÆΪNUCLEUS:13µÄ¶à¸ö©¶´Ó°ÏìÎ÷ÃÅ×ÓRTOS£»BusyBoxÖÐ14¸öЩ¶´Ó°ÏìÊý°ÙÍò»ùÓÚUnixµÄÉ豸£»Î¢ÈíÐû²¼11Ô¸üУ¬ÐÞ¸´6¸ö0dayÔÚÄÚµÄ55¸ö©¶´£»ESET·¢ÏÖLazarusÀûÓõÁ°æµÄIDA Pro·Ö·¢¶ñÒâÈí¼þ¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾ÖÜÄþ¾²ÍþвΪÖС£


>ÖØÒªÄþ¾²Â©¶´Áбí


1. Adobe RoboHelp ServerĿ¼±éÀú´úÂëÖ´ÐЩ¶´


Adobe RoboHelp Server´æÔÚĿ¼±éÀú©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£


https://www.zerodayinitiative.com/advisories/ZDI-21-1305/


2. ServiceTonic Helpdesk softwareδÊÚȨ·ÃÎÊ©¶´


ServiceTonic Helpdesk software´æÔÚÊÚȨ»úÖÆ©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ɲ»Ê¹ÓÃÃÜÂëδÊÚȨ·ÃÎÊϵͳ¡£


https://www.srlabs.de/bites/chaining-three-zero-day-exploits-in-itsm-software-servicetonic-for-remote-code-execution


3. Microsoft Windows Active Directory CVE-2021-42278ȨÏÞÌáÉý©¶´


Microsoft Windows Active Directory´æÔÚÄþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔÌáÉýÌØȨ¡£


https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-42278


4. Microsoft Windows Remote Desktop Client´úÂëÖ´ÐЩ¶´


Microsoft Windows Remote Desktop Client´æÔÚδÃ÷Äþ¾²Â©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔϵͳÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£


https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-38666


5. Siemens SIMATIC PCS 7Ŀ¼±éÀú©¶´


Siemens SIMATIC PCS 7´æÔÚĿ¼±éÀú©¶´£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔÀûÓ鶴Ìá½»ÌØÊâµÄÇëÇ󣬿ÉÒÔÓ¦Ó÷¨Ê½ÉÏÏÂÎÄÖ´ÐÐÈÎÒâ´úÂë¡£


https://cert-portal.siemens.com/productcert/pdf/ssa-840188.pdf


>ÖØÒªÄþ¾²Ê¼þ×ÛÊö


1¡¢Ñо¿ÈËÔ±·¢ÏÖð³äÄþ¾²¹«Ë¾ProofpointµÄµöÓã»î¶¯


ArmorbloxµÄÑо¿ÍŶÓÓÚ11ÔÂ4ÈÕÅû¶ÁËð³äÍøÂçÄþ¾²¹«Ë¾ProofpointµÄµöÓã»î¶¯¡£ÕâЩµöÓãÓʼþµÄÖ÷ÌâΪ¡°Re£ºPayoff Request¡±£¬Éù³Æ°üÂÞÒ»·Ýͨ¹ýProofpoint·¢Ë͵ĵÖѺ´û¿îÏà¹ØÎļþ£¬Ö¼ÔÚÇÔÈ¡Ä¿±êµÄMicrosoft Office 365ºÍGoogle Gmailƾ¾Ý¡£¸ÃÓʼþÊÇ´Ó±»µÁµÄ¸öÈËÕÊ»§·¢Ë͵Ä£¬·¢¼þÈ˵ÄÓòÃûÓòΪ¡°sdis34[.]fr¡±£¬ÕâÊÇ·¨¹úÄϲ¿µÄÒ»¸öÏû·À¾ÈÔ®²¿ÃÅ£¬¶øµöÓãÒ³ÃæÍйÜÔÚgreenleafproperties[.]co[.]ukÓò¡£


Ô­ÎÄÁ´½Ó£º

https://www.armorblox.com/blog/proofpoint-credential-phishing/


2¡¢Í³³ÆΪNUCLEUS:13µÄ¶à¸ö©¶´Ó°ÏìÎ÷ÃÅ×ÓRTOS


ForescoutºÍMedigateµÄÑо¿ÈËÔ±ÔÚ11ÔÂ9ÈÕÅû¶ÁËNucleusÖÐ13¸ö©¶´µÄϸ½Ú¡£NucleusÊÇÎ÷ÃÅ×ÓµÄʵʱ²Ù×÷ϵͳ(RTOS)£¬Í¨³£ÔËÐÐÔÚÒ½ÁÆÉ豸¡¢Æû³µ¡¢ÖÇÄÜÊÖ»ú¡¢ÎïÁªÍøÉ豸¡¢¹¤ÒµplcµÈÉ豸µÄƬÉÏϵͳ(SoC)¡£ÕâЩ©¶´Í³³ÆΪNUCLEUS:13£¬Ó°ÏìÁËNucleus TCP/IP¶ÑÕ»¡£ÆäÖУ¬×îÑÏÖصÄÊÇÓ°ÏìÁËFTP·þÎñÆ÷×é¼þµÄÔ¶³Ì´úÂëÖ´ÐЩ¶´£¨CVE-2021-31886£©£¬CVSSÆÀ·ÖΪ9.8£¬ÊÇÓÉÓÚ¶ÔUSERÃüÁ¶ÈµÄÑéÖ¤²»ÕýÈ·µ¼ÖµÄ¡£


Ô­ÎÄÁ´½Ó£º

https://therecord.media/nucleus13-vulnerabilities-impact-siemens-medical-industrial-equipment/


3¡¢BusyBoxÖÐ14¸öЩ¶´Ó°ÏìÊý°ÙÍò»ùÓÚUnixµÄÉ豸


Èí¼þ¿ª·¢¹«Ë¾JFrogºÍÄþ¾²¹«Ë¾ClarotyÔÚ11ÔÂ9ÈÕÁªºÏÅû¶ÁËBusyBoxÖÐ14¸ö©¶´µÄϸ½Ú¡£BusyBox±»³ÆΪǶÈëʽLinuxµÄ¡°ÈðÊ¿¾üµ¶¡±£¬¿É½«ÖÖÖÖ³£¼ûµÄUnixÓ¦ÓûòС·¨Ê½£¨ÀýÈçcp¡¢ls¡¢grep£©×éºÏ³ÉÒ»¸ö¿ÉÖ´ÐÐÎļþ¡£ÕâЩ©¶´´æÔÚÓÚBusyBox 1.16µ½1.33.1µÄ¶à¸ö°æ±¾£¬Ó°ÏìÁËÊý°ÙÍò»ùÓÚUnixµÄÉ豸¡£ÆäÖнÏΪÑÏÖصÄÊÇawkÖеÄDoS©¶´CVE-2021-42383¡¢CVE-2021-42384ºÍCVE-2021-42385µÈ¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/124429/hacking/busybox-vulnerabilities.html


4¡¢Î¢ÈíÐû²¼11Ô¸üУ¬ÐÞ¸´6¸ö0dayÔÚÄÚµÄ55¸ö©¶´


΢ÈíÔÚ11ÔÂ9ÈÕÐû²¼Á˱¾ÔµÄÖܶþ²¹¶¡£¬×ܼÆÐÞ¸´ÁË55¸ö©¶´¡£´Ë´ÎÐÞ¸´ÁË6¸ö0 day£¬°üÂÞExcelÖÐÄþ¾²¹¦Ð§Èƹý©¶´£¨CVE-2021-42292£©¡¢Exchange ServerÖÐRCE£¨CVE-2021-42321£©£¬RDPÖÐÐÅϢ鶩¶´£¨CVE-2021-38631ºÍCVE-2021-41371£©£¬ÒÔ¼°3DÖмì²ìÆ÷RCE£¨CVE-2021-43208ºÍCVE-2021-43209£©¡£ÆäÖУ¬CVE-2021-42292ºÍCVE-2021-42321Òѱ»ÓÃÓÚ¶ñÒâ¹¥»÷»î¶¯¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/microsoft/microsoft-november-2021-patch-tuesday-fixes-6-zero-days-55-flaws/


5¡¢ESET·¢ÏÖLazarusÀûÓõÁ°æµÄIDA Pro·Ö·¢¶ñÒâÈí¼þ


ESETÍŶÓÓÚ11ÔÂ10ÈÕ·¢ÏÖ³¯ÏʺڿÍÍÅ»ïLazarusÀûÓõÁ°æIDA Pro¹¥»÷Äþ¾²Ñо¿ÈËÔ±µÄ»î¶¯¡£Ñо¿ÈËԱͨ³£Ê¹ÓÃÄæÏò¹¤³ÌÓ¦ÓÃIDA ProÀ´·ÖÎö©¶´ºÍ¶ñÒâÈí¼þ£¬¶ø´Ë´Î·¢ÏÖµÄIDA Pro 7.5°æ±¾°üÂÞÁËÁ½¸öÃûΪidahelp.dllºÍwin_fw.dllµÄ¶ñÒâDLL¡£ÆäÖУ¬win_fw.dll½«ÔÚWindowsÈÎÎñµ÷Öη¨Ê½Öд´½¨Ò»¸öÐÂÈÎÎñ£¬¸ÃÈÎÎñ½«Æô¶¯idahelper.dll£¬È»ºóidahelper.dll½«Á¬½Óµ½devguardmap[.]orgÍøÕ¾²¢ÏÂÔØÔ¶³Ì·ÃÎÊľÂíNukeSpedµÄpayload¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/lazarus-hackers-target-researchers-with-trojanized-ida-pro/