TrustwaveÅû¶»ªÎªUSB LTE donglesÖÐÌáȨÎó²î£»£»£»£»ExaGridÔâµ½ContiÀÕË÷¹¥»÷£¬£¬£¬£¬£¬ÒÑÖ§¸¶260ÍòÃÀÔªÊê½ð
Ðû²¼Ê±¼ä 2021-06-041.TrustwaveÅû¶»ªÎªUSB LTE donglesÖеÄÌáȨÎó²î

TrustwaveµÄÑо¿Ö°Ô±Åû¶ÁË»ªÎªE3372ÐÍUSB LTE donglesÖеÄÌáȨÎó²î¡£¡£¡£¡£¡£¡£USB donglesÊÇÒ»ÖÖ¿ÉÒÔ²åÈëÌõ¼Ç±¾µçÄÔºĮ́ʽµçÄÔµÄÓ²¼þ£¬£¬£¬£¬£¬Íâ¹ÛÏñuÅÌ£¬£¬£¬£¬£¬¿ÉÒÔ»á¼û»¥ÁªÍø¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³ÆÆäÔÚä¯ÀÀdongles×°ÖõÄÇý¶¯³ÌÐòÎļþʱ·¢Ã÷£¬£¬£¬£¬£¬Ã¿´Î²åÈë¸Ã×°±¸¶¼»á×Ô¶¯ÔËÐÐmbbserviceopen£¬£¬£¬£¬£¬ÔÚWebä¯ÀÀÆ÷·¿ª»ªÎª×°±¸ÖÎÀí½çÃæ£¬£¬£¬£¬£¬¶øÕâ¸öÎļþÊÇÒÔÍêȫȨÏÞ£¨777£©ÔËÐеġ£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬»ªÎªÒÑÐû²¼ÓйظÃÎó²îµÄÇå¾²×Éѯ»ººÍ½â²½·¥¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/huawei-usb-lte-dongles-are-vulnerable-to-privilege-escalation-attacks/
2.CiscoÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´Æä¶à¿î²úÆ·ÖÐÑÏÖØµÄÎó²î

CiscoÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬ÐÞ¸´ÁËWebex Player¡¢SD-WANºÍASR 5000 ϵÁÐÖеĶà¸öÎó²î¡£¡£¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄ½ÏΪÑÏÖØµÄÎó²îÊÇWebex PlayerÖеĿɵ¼ÖÂí§Òâ´úÂëÖ´ÐеÄÄÚ´æËð»µÎó²î£¨CVE-2021-1526¡¢CVE-2021-1502ºÍCVE-2021-1503£©ÒÔ¼°SD-WANÈí¼þÖеÄÌáȨÎó²î£¨CVE-2021-1528£©¡£¡£¡£¡£¡£¡£»£»£»£»¹ÐÞ¸´ÁËASR 5000ϵÁÐÈí¼þ(StarOS) ÖеÄÁ½¸öÊÚÈ¨ÈÆ¹ýÎó²î£¨CVE-2021-1539ºÍCVE-2021-1540£©µÈÎó²î¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/118564/security/cisco-webex-player-sd-wan-asr-5000-flaws.html
3.AMT GamesÔÆ´æ´¢ÉèÖùýʧй¶½ü600ÍòÓû§µÄÐÅÏ¢

WizCaseÑо¿Ö°Ô±·¢Ã÷AMT GamesµÄElasticSearchЧÀÍÆ÷ÉèÖùýʧй¶590ÍòÓû§µÄÐÅÏ¢¡£¡£¡£¡£¡£¡£AMT GamesÊÇ×ܲ¿Î»ÓÚÖйúµÄÒ»¼ÒÓÎÏ·¿ª·¢ÉÌ£¬£¬£¬£¬£¬ËüµÄÃâ·ÑÊÖ»úÓÎÏ·Battle for the Galaxy£¨ÒøºÓÖ®Õ½£©ÔÚ103¸ö¹ú¼Ò/µØÇøÓµÓÐÊý°ÙÍòÓû§¡£¡£¡£¡£¡£¡£´Ë´Î×ܹ²Ð¹Â¶ÁË1.47TBÊý¾Ý£¬£¬£¬£¬£¬°üÀ¨590Íò¸öÍæ¼Ò×ÊÁÏ¡¢200Íò±ÊÉúÒâºÍ587000 Ìõ·´ÏìÐÂÎÅ£¬£¬£¬£¬£¬Éæ¼°ÕÊ»§ID¡¢µç×ÓÓʼþµØµã¡¢ÓÎÏ·ÄÚ¹ºÖüÛÇ®ºÍÖ§¸¶ÌṩÉ̵ÈÐÅÏ¢¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬¸Ã¹«Ë¾Î´¶Ô´ËʾÙÐÐ˵Ã÷£¬£¬£¬£¬£¬µ«½ûÓÃÁ˶ÔЧÀÍÆ÷µÄ»á¼û¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/118529/data-breach/amt-games-data-leak.html
4.±©Ñ©³ÆÆäÔâµ½´ó¹æÄ£DDoS¹¥»÷£¬£¬£¬£¬£¬ÆäЧÀÍÒÑÑÓ³Ù»òÖÐÖ¹

±©Ñ©³ÆÆäÔâµ½´ó¹æÄ£DDoS¹¥»÷£¬£¬£¬£¬£¬Õâ¿Éµ¼ÖÂÒ»Ð©Íæ¼ÒµÄЧÀÍ·ºÆðÑÏÖØµÄÑÓ³ÙºÍÅþÁ¬ÖÐÖ¹¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÓÚ6ÔÂ1ÈÕÐû²¼ÍÆÎĹûÕæ´Ë´Î¹¥»÷£¬£¬£¬£¬£¬²¢ÌåÏÖÆäÕýÔÚÆð¾¢»º½âÕâ¸öÎÊÌâ¡£¡£¡£¡£¡£¡£µ«ÓÐTwitterÓû§¶Ô´ËÉùÃ÷×ö³ö̸ÂÛ£¬£¬£¬£¬£¬³ÆÕâ¿ÉÄÜÊÇÓÉÓÚËûÃÇϵͳµÄ¸ºÔØÆ½ºâ²»¼Ñµ¼Öµģ¬£¬£¬£¬£¬¶ø²»ÊÇDDoS¹¥»÷¡£¡£¡£¡£¡£¡£Õâ¿ÉÄÜÓëÔçЩʱ¼äÐû²¼µÄȼÉÕµÄÔ¶Õ÷£¨The Burning Crusade£©Óйأ¬£¬£¬£¬£¬ÔçÔÚ½ñÄê1Ô£¬£¬£¬£¬£¬Íæ¼ÒÔÚÍæÄ§ÊÞÌìÏÂʱҲÓöµ½ÁËͬÑùµÄÎÊÌâ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://news.softpedia.com/news/blizzard-experiencing-ddos-attack-possible-high-latency-and-disconnections-533100.shtml
5.ExaGridÔâµ½ContiÀÕË÷¹¥»÷£¬£¬£¬£¬£¬ÒÑÖ§¸¶260ÍòÃÀÔªÊê½ð

±¸·Ý×°±¸¹©Ó¦ÉÌExaGridÔâµ½ContiÀÕË÷¹¥»÷£¬£¬£¬£¬£¬ÔÚ5ÔÂ13ÈÕÖ§¸¶ÁË260ÍòÃÀÔªÊê½ð¡£¡£¡£¡£¡£¡£ºÚ¿ÍÔÚ̸ÅÐÖÐÉù³ÆÆäÒÑÔڸù«Ë¾µÄµÄÍøÂçÖÐÍ£ÁôÒ»¸ö¶àÔ£¬£¬£¬£¬£¬¼ÓÃÜÁËËùÓÐÎļþЧÀÍÆ÷ºÍSQL ЧÀÍÆ÷£¬£¬£¬£¬£¬²¢ÏÂÔØÁËÁè¼Ý800GBµÄÐÅÏ¢¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨¿Í»§ºÍÔ±¹¤µÄСÎÒ˽¼ÒÊý¾Ý¡¢ÉÌÒµÌõÔ¼¡¢±£ÃÜÐÒé±í¸ñ¡¢²ÆÎñÊý¾Ý¡¢ÄÉ˰É걨±íºÍÔ´´úÂë¡£¡£¡£¡£¡£¡£ºÚ¿Í×î³õÒªÇóµÄÊê½ð½ð¶îΪ7480000ÃÀÔª£¬£¬£¬£¬£¬¾¶à´Î̸ÅкóΪ260ÍòÃÀÔª¡£¡£¡£¡£¡£¡£ExaGridÔÚÊÕµ½½âÃܹ¤¾ßÁ½Ììºó³Æ²»Ð¡ÐÄɾ³ýÁËËü£¬£¬£¬£¬£¬²¢ÒªÇóºÚ¿ÍÓÖ·¢ÁËÒ»±é¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.computerweekly.com/news/252501665/Exagrid-pays-26m-to-Conti-ransomware-attackers
6.Ñо¿Ö°Ô±ÑÝʾÔõÑùÈÆ¹ý΢ÈíAMSIµÄͨÀýÇå¾²Õ½ÂÔ

SophosµÄÑо¿Ö°Ô±ÑÝʾÁËÔõÑùÈÆ¹ý΢Èí·´¶ñÒâÈí¼þɨÃè½Ó¿Ú (AMSI) µÄͨÀýÇå¾²Õ½ÂÔ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³ÆÒ»ÖÖÒªÁìÊÇÈÆ¹ýɨÃè³ÌÐò£¬£¬£¬£¬£¬Ê¹ÓûìÏý¡¢¼ÓÃÜ¡¢ÒþдÊõºÍÆäËûÊÖÒÕ£¬£¬£¬£¬£¬Ê¹É±¶¾Èí¼þ¸üÄÑ·¢Ã÷payloadµÄ¹¥»÷Òâͼ£»£»£»£»ÁíÒ»ÖÖÊÇÒ»×îÏȾÍÍêÈ«×èÖ¹¶ñÒâÈí¼þ±»É¨Ãè¡£¡£¡£¡£¡£¡£SophosÌåÏÖ£¬£¬£¬£¬£¬Áè¼Ý98%µÄAMSIʵÑé¶¼ÊÇͨ¹ý¸Ä¶¯AMSI¿âÀ´ÊµÏֵ쬣¬£¬£¬£¬ÓжàÖÖ¶ñÒâÈí¼þ»áÊÔͼÕÒµ½ÒѼÓÔØµ½ÄÚ´æÖеÄAmsiScanBuffer£¬£¬£¬£¬£¬È»ºóÁýÕÖÆäÖ¸ÁîÒÔÈ·±£É¨ÃèÇëÇóʧ°Ü¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/this-is-how-attackers-bypass-microsoft-antimalware-scan-software-amsi/


¾©¹«Íø°²±¸11010802024551ºÅ