ÐÅÏ¢Çå¾²Öܱ¨-2021ÄêµÚ30ÖÜ
Ðû²¼Ê±¼ä 2021-07-26> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
2021Äê07ÔÂ19ÈÕÖÁ07ÔÂ25ÈÕ¹²ÊÕ¼Çå¾²Îó²î66¸ö£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇMotorola CX2 HNAP1/GetNetworkTomographySettingsÏÂÁîÖ´ÐÐÎó²î£»£»£»Oracle E-Business Suite Oracle Marketing CVE-2021-2355´úÂëÖ´ÐÐÎó²î£»£»£»Schneider Electric EVlink CityÓ²±àÂëÎó²î£»£»£»Teradici PCOIP Software Agent vHubÇý¶¯³ÌÐòÌØÈ¨ÌáÉýÎó²î£»£»£»Apple macOS Big Sur Model I/OͼÏñÔ½½çд´úÂëÖ´ÐÐÎó²î¡£¡£¡£¡£¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÑо¿ÍŶÓÅû¶WindowsÔ¶³Ì´òӡЧÀÍÖеÄÐÂ0day£»£»£»Check PointÐû²¼2021ÄêQ2Æ·ÅÆÍøÂç´¹ÂÚÆÊÎö±¨¸æ£»£»£»ZeroXÍÅ»ïÔÚ°µÍø³öÊÛʯÓ͹«Ë¾É³Ìذ¢ÃÀ1TBµÄÊý¾Ý£»£»£»ÐµÄMosaicLoader¿ÉʹÓÃWindows DefenderÈÆ¹ý¼ì²â£»£»£»QualysÅû¶LinuxÄÚºËÖеÄÍâµØÌáȨÎó²îSequoia¡£¡£¡£¡£¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£¡£
> Ö÷ÒªÇå¾²Îó²îÁбí
1.Motorola CX2 HNAP1/GetNetworkTomographySettingsÏÂÁîÖ´ÐÐÎó²î
Motorola CX2 router CX HNAP1/GetNetworkTomographySettings±£´æÊäÈëÑéÖ¤Îó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£¡£
https://github.com/cc-crack/router/blob/master/motocx2.md
2.Oracle E-Business Suite Oracle Marketing CVE-2021-2355´úÂëÖ´ÐÐÎó²î
Oracle E-Business Suite Oracle Marketing±£´æÇå¾²Îó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£
https://www.oracle.com/security-alerts/cpujul2021.html
3.Schneider Electric EVlink CityÓ²±àÂëÎó²î
Schneider Electric EVlink City±£´æÓ²±àÂëÎó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉÒÔÖÎÀíÔ±ÉÏÏÂÎÄδÊÚȨ»á¼ûϵͳ¡£¡£¡£¡£¡£¡£
http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-194-06
4.Teradici PCOIP Software Agent vHubÇý¶¯³ÌÐòÌØÈ¨ÌáÉýÎó²î
Teradici PCOIP Software Agent vHubÇý¶¯³ÌÐò¿É½ÓÊÜÀ´×Ôí§Òâ³ÌÐòµÄÏÂÁ£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉÌáÉýÌØÈ¨¡£¡£¡£¡£¡£¡£
https://advisory.teradici.com/security-advisories/100/
5.Apple macOS Big Sur Model I/OͼÏñÔ½½çд´úÂëÖ´ÐÐÎó²î
Apple macOS Big Sur Model I/OͼÏñ´¦Öóͷ£±£´æÔ½½çдÎó²î£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬¿ÉÒÔÄÚºËÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£
https://support.apple.com/en-us/HT212602l
> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢Ñо¿ÍŶÓÅû¶WindowsÔ¶³Ì´òӡЧÀÍÖеÄÐÂ0day

Ñо¿ÍŶӹûÕæÅû¶ÁËÒ»¸öеÄ0day£¬£¬£¬¹¥»÷ÕßʹÓøÃÎó²î¿ÉÒÔͨ¹ýÔ¶³Ì´òӡЧÀÍ»ñµÃWindowsÉϵÄSYSTEMȨÏÞ¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±Benjamin Delpy³Æ£¬£¬£¬¸ÃÎó²îʹÓÃÁËWindows Point and Print¹¦Ð§Öеġ°Queue-Specific Files¡±ÌØÕ÷¡£¡£¡£¡£¡£¡£ÔÚ×°ÖôòÓ¡»úʱ£¬£¬£¬¹©Ó¦ÉÌÌṩµÄ×°ÖóÌÐò¿ÉÒÔÖ¸¶¨Ò»×éÓëÌØ¶¨´òÓ¡ÐÐÁÐÏà¹ØÁªµÄÈκÎÀàÐ͵ÄÎļþ£¬£¬£¬¸ÃÎļþ½«±»ÏÂÔØµ½Ã¿Ò»¸öÅþÁ¬µ½´Ë´òӡЧÀÍÆ÷µÄ¿Í»§¶Ë¡£¡£¡£¡£¡£¡£Òò´Ë£¬£¬£¬µ±¿Í»§¶ËÅþÁ¬µ½¹¥»÷ÕßËù¿ØÖƵĴòӡЧÀÍÆ÷ʱ£¬£¬£¬½«×Ô¶¯ÏÂÔØ²¢ÒÔSYSTEMȨÏÞÖ´ÐжñÒâDLL¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/microsoft/new-windows-print-spooler-zero-day-exploitable-via-remote-print-servers/
2¡¢Check PointÐû²¼2021ÄêQ2Æ·ÅÆÍøÂç´¹ÂÚÆÊÎö±¨¸æ

Check PointÐû²¼ÁË2021ÄêQ2Æ·ÅÆÍøÂç´¹ÂÚÆÊÎö±¨¸æ¡£¡£¡£¡£¡£¡£±¨¸æÖ¸³ö£¬£¬£¬Óë2020ÄêQ4ºÍ2021ÄêQ1Ò»Ñù£¬£¬£¬MicrosoftÔٴγÉÎªÍøÂç·¸·¨·Ö×Ó×î³£Õë¶ÔµÄÆ·ÅÆ£¬£¬£¬45%µÄÆ·ÅÆÍøÂç´¹ÂÚʵÑé¶¼ÓëMicrosoftÓйأ¬£¬£¬±ÈQ1ÔöÌíÁË6%¡£¡£¡£¡£¡£¡£º½Ô˹«Ë¾DHLΪµÚ¶þ´óÄ¿µÄ£¬£¬£¬Õ¼±ÈΪ26%¡£¡£¡£¡£¡£¡£Æä´ÎΪÑÇÂíÑ·(11%)¡¢Bestbuy(4%)¡¢¹È¸è(3%)¡¢ÁìÓ¢(3%)¡¢Dropbox(1%)¡¢Chase(1%)¡¢Æ»¹û(%)ºÍPaypal(0.5%)¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬¿Æ¼¼ÈÔÈ»ÊÇÆ·ÅÆÍøÂç´¹ÂÚ¹¥»÷×îÖ÷ÒªµÄÄ¿µÄÐÐÒµ£¬£¬£¬Æä´ÎÊÇÔËÊäºÍÁãÊÛÐÐÒµ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://blog.checkpoint.com/2021/07/15/brand-phishing-report-q2-2021-microsoft-continues-reign/
3¡¢ZeroXÍÅ»ïÔÚ°µÍø³öÊÛʯÓ͹«Ë¾É³Ìذ¢ÃÀ1TBµÄÊý¾Ý

±¾Ô£¬£¬£¬Ò»¸öÃûΪZeroXµÄºÚ¿ÍÍÅ»ïÔÚ°µÍøÒÔ500ÍòÃÀÔªµÄ¼ÛÇ®³öÊÛÉ³ÌØ°¢ÃÀ¹«Ë¾1TBµÄÊý¾Ý¡£¡£¡£¡£¡£¡£É³Ìذ¢À²®Ê¯Ó͹«Ë¾¼ò³ÆÉ³Ìذ¢ÃÀ£¨Saudi Aramco£©£¬£¬£¬ÊÇÌìÏÂÉÏ×î´óµÄ¹«¹²Ê¯ÓͺÍ×ÔÈ»Æø¹«Ë¾Ö®Ò»£¬£¬£¬ÓµÓÐÁè¼Ý66000ÃûÔ±¹¤£¬£¬£¬ÄêÊÕÈë½ü2300ÒÚÃÀÔª¡£¡£¡£¡£¡£¡£ZeroX³ÆÕâЩÊý¾ÝÊÇÔÚ2020Äêͨ¹ýÈëÇÖÉ³ÌØ°¢ÃÀµÄÍøÂ缰ЧÀÍÆ÷»ñµÃµÄ£¬£¬£¬ÆäÖÐ×îÔçµÄ¿É×·Ëݵ½1993Äê¡£¡£¡£¡£¡£¡£´Ë´Îй¶µÄÊý¾Ý°üÀ¨14254ÃûÔ±¹¤µÄÍêÕûÐÅÏ¢¡¢ÖÖÖÖϵͳµÄÏîÄ¿¹æ·¶£»£»£»ÄÚ²¿·ÖÎö±¨¸æ¡¢ÐÒé¡¢Ðź¯¡¢¶¨¼Û±í£»£»£»Scadaµã¡¢Wi-Fi¡¢IPÉãÏñ»úºÍIoT×°±¸µÄÍøÂç½á¹¹£»£»£»Aramco¿Í»§Ãûµ¥¡¢·¢Æ±ºÍÌõÔ¼µÈ¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/saudi-aramco-data-breach-sees-1-tb-stolen-data-for-sale/
4¡¢ÐµÄMosaicLoader¿ÉʹÓÃWindows DefenderÈÆ¹ý¼ì²â

BitdefenderÑо¿Ö°Ô±·¢Ã÷жñÒâÈí¼þMosaicLoader¿ÉʹÓÃWindows DefenderÈÆ¹ý¼ì²â¡£¡£¡£¡£¡£¡£¸Ã¶ñÒâÈí¼þͨ¹ýËÑË÷ÒýÇæÐ§¹ûαװ³ÉÆÆ½âÈí¼þ£¬£¬£¬¾ßÓÐÖØ´óµÄÄÚ²¿½á¹¹£¬£¬£¬Ö¼ÔÚÈÆ¹ý¶ñÒâÈí¼þÆÊÎö¡£¡£¡£¡£¡£¡£ÆäÄ£ÄâÀàËÆÓÚÕýµ±Èí¼þµÄÎļþÐÅÏ¢²¢Ê¹ÓÃС¿éºÍÎÞÐòÖ´ÐÐ˳Ðò¾ÙÐдúÂë»ìÏý¡£¡£¡£¡£¡£¡£ÔÚÀÖ³ÉѬȾĿµÄºó£¬£¬£¬×î³õµÄ»ùÓÚDelphiµÄdropper»á´ÓÔ¶³ÌЧÀÍÆ÷»ñÈ¡ÏÂÒ»½×¶ÎµÄpayload£¬£¬£¬²¢ÔÚWindows DefenderÖÐΪÏÂÔØµÄ¿ÉÖ´ÐÐÎļþÌí¼ÓÍâµØÉ¨³ýÏîÒÔÈÆ¹ýɱ¶¾Èí¼þµÄɨÃè¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://thehackernews.com/2021/07/this-new-malware-hides-itself-among.html
5¡¢QualysÅû¶LinuxÄÚºËÖеÄÍâµØÌáȨÎó²îSequoia

QualysÑо¿Ö°Ô±Åû¶ÁËLinuxÄÚºËÖеÄÍâµØÌáȨÎó²îSequoia¡£¡£¡£¡£¡£¡£¸ÃÎó²î×·×ÙΪCVE-2021-33909£¬£¬£¬±£´æÓÚÓÃÀ´ÖÎÀíÓû§Êý¾ÝµÄÎļþϵͳ²ã£¬£¬£¬ÊÇÓÉÓÚfs/seq_file.cûÓÐ׼ȷÏÞÖÆseq»º³åÇø·ÖÅɶøµ¼Öµġ£¡£¡£¡£¡£¡£Qualys³Æ£¬£¬£¬¸ÃÎó²îÓ°ÏìÁË×Ô2014ÄêÒÔÀ´Ðû²¼µÄËùÓÐLinuxÄں˰汾¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬Ñо¿Ö°Ô±»¹·¢Ã÷ÁËsystemdÖеÄÒ»¸ö¿ÍÕ»ºÄ¾¡µ¼ÖµľܾøÐ§ÀÍÎó²î£¨CVE-2021-33910£©£¬£¬£¬±£´æÓÚ2015Äê4ÔÂÖ®ºóÐû²¼µÄËùÓÐsystemd°æ±¾ÖС£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/new-linux-kernel-bug-lets-you-get-root-on-most-modern-distros/


¾©¹«Íø°²±¸11010802024551ºÅ