ÐÅÏ¢Çå¾²Öܱ¨-2021ÄêµÚ2ÖÜ

Ðû²¼Ê±¼ä 2021-01-11

> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö


2021Äê01ÔÂ04ÈÕÖÁ01ÔÂ10ÈÕ¹²ÊÕ¼Çå¾²Îó²î68¸ö£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇDell Wyse ThinOSĬÈÏÉèÖÃÎļþ²Ù×÷Îó²î£»£»£»£»£»Panasonic FPWIN Pro»º³åÇøÒç³öÎó²î£»£»£»£»£»Qualcomm Video NALÆÊÎöÔ½½çдÎó²î£»£»£»£»£»Google Android¼Ü¹¹CVE-2021-0313¾Ü¾øÐ§ÀÍÎó²î£»£»£»£»£»Delta Electronics Industrial Automation DOPSoft CVE-2020-27277»º³åÇøÒç³öÎó²î¡£¡£¡£¡£¡£¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÄÉʲά¶û±¬Õ¨µ¼ÖÂÃÀ¹úÊý°ÙÓ¢ÀïͨѶЧÀÍÖÐÖ¹£»£»£»£»£»Cyble·¢Ã÷ºÚ¿ÍÔÚ°µÍø³öÊÛÁ½ÒÚ¶àÖйú¹«ÃñµÄÐÅÏ¢£»£»£»£»£»Ì¸ÌìȺ×éSlackЧÀÍÖÐÖ¹£¬£¬£¬£¬£¬²¨¼°È«ÇòÓû§£»£»£»£»£»ESTsecurityÅû¶ThalliumÕë¶Ô½ðÈÚÐÐÒµµÄ¹©Ó¦Á´¹¥»÷£»£»£»£»£»GreyNoiseÔÚÒ°·¢Ã÷ʹÓÃZyxelÖÐÎó²îµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£


ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£¡£


Ö÷ÒªÇå¾²Îó²îÁбí


1.Dell Wyse ThinOSĬÈÏÉèÖÃÎļþ²Ù×÷Îó²î


Dell Wyse ThinOSĬÈÏÉèÖñ£´æÇå¾²Îó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¿ÉдÎļþµ½ÏµÍ³»òÕß²Ù×÷Ä¿µÄÉèÖᣡ£¡£¡£¡£¡£

https://www.dell.com/support/kbdoc/zh-hk/000180768/dsa-2020-281


2.Panasonic FPWIN Pro»º³åÇøÒç³öÎó²î


Panasonic FPWIN Pro´¦Öóͷ£ÏîÄ¿Îļþ±£´æ»º³åÇøÒç³öÎó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¿É¾ÙÐоܾøÐ§À͹¥»÷»òÕßÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£

https://us-cert.cisa.gov/ics/advisories/icsa-21-005-02


3.Qualcomm Video NALÆÊÎöÔ½½çдÎó²î


Qualcomm Video NALÆÊÎö±£´æÔ½½çдÎó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£

https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin



4.Google Android¼Ü¹¹CVE-2021-0313¾Ü¾øÐ§ÀÍÎó²î


Google Android¼Ü¹¹±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¿É¾ÙÐоܾøÐ§À͹¥»÷¡£¡£¡£¡£¡£¡£

https://source.android.com/security/bulletin/2021-01-01


5.Delta Electronics Industrial Automation DOPSoft CVE-2020-27277»º³åÇøÒç³öÎó²î


Delta Electronics Industrial Automation DOPSoft´¦Öóͷ£ÏîÄ¿Îļþ±£´æ»º³åÇøÒç³öÎó²î£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬¿É¾ÙÐоܾøÐ§À͹¥»÷»òÕßÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£¡£

https://us-cert.cisa.gov/ics/advisories/icsa-21-005-05


> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö


1¡¢ÄÉʲά¶û±¬Õ¨µ¼ÖÂÃÀ¹úÊý°ÙÓ¢ÀïͨѶЧÀÍÖÐÖ¹


1.png


ÄÉʲά¶ûÊÐÖÐÐı¬·¢µÄÊ¥µ®½Ú±¬Õ¨ÊÂÎñµ¼ÖÂÃÀ¹úÊý°ÙÓ¢ÀïͨѶЧÀÍÖÐÖ¹¡£¡£¡£¡£¡£¡£´Ë´Î±¬Õ¨Ëð»µÁËÃÀ¹úµç»°µç±¨¹«Ë¾(AT£¦T)Òªº¦µÄÍøÂçÉèÊ©£¬£¬£¬£¬£¬ÆäÔÚÌïÄÉÎ÷ÖÝ¡¢¿ÏËþ»ùÖݺͰ¢À­°ÍÂíÖݵĴ󲿷ֵØÇøµÄ¿Í»§¾ùÊܵ½Ó°Ï죬£¬£¬£¬£¬ÎÞ·¨Í¨Ñ¶ºÍÉÏÍø¡£¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬´Ë´Î±¬Õ¨»¹Ôì³ÉÁËÊýÊ®ÈËéæÃüºÍÊýÊ®ÈËÊÜÉË£¬£¬£¬£¬£¬Ô¼ÓÐ100¸ö911ºô½ÐÖÐÐÄ·ºÆðÎÊÌâ¡£¡£¡£¡£¡£¡£AT£¦TÌåÏÖ×èÖ¹ÉÏÖÜÈý£¬£¬£¬£¬£¬ËùÓÐЧÀÍ»ù±¾ÒѾ­»Ö¸´¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.securityweek.com/nashville-bombing-spotlights-vulnerable-voice-data-networks


2¡¢Cyble·¢Ã÷ºÚ¿ÍÔÚ°µÍø³öÊÛÁ½ÒÚ¶àÖйú¹«ÃñµÄÐÅÏ¢


2.png


CybleµÄÑо¿ÍŶӷ¢Ã÷ºÚ¿ÍÔÚ°µÍø³öÊÛÁ½ÒÚ¶àÖйú¹«ÃñµÄÐÅÏ¢¡£¡£¡£¡£¡£¡£´Ë´Îй¶µÄÊý¾ÝÀ´×Ô¶à¸öƽ̨ºÍÈí¼þ£¬£¬£¬£¬£¬ÆäÖаüÀ¨730Íòºþ±±Ê¡¾£ÖÝÊй«°²ÏØ×¡ÃñµÄÉí·ÝÖ¤ºÅ¡¢ÐÔ±ð¡¢ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢ÊÖ»ú¡¢µØµãºÍ´úÂëµÈÐÅÏ¢£¬£¬£¬£¬£¬4180Íò¸ö΢²©Óû§µÄÕ˺źÍÏìÓ¦µÄÊÖ»úºÅÂ룬£¬£¬£¬£¬ÒÔ¼°1.92ÒÚQQÓû§µÄÕ˺źÍÏìÓ¦µÄÊÖ»úºÅÂë¡£¡£¡£¡£¡£¡£´Ë´Îй¶µÄÓëÖйú¹«ÃñÓйصļͼ×ÜÊýÁè¼Ý2ÒÚ¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/112966/deep-web/chinese-citizens-data-darkweb.html


3¡¢Ì¸ÌìȺ×éSlackЧÀÍÖÐÖ¹£¬£¬£¬£¬£¬²¨¼°È«ÇòÓû§


3.png


̸ÌìȺ×éSlackЧÀͱ¬·¢ÁË2021ÄêµÄÊ×´ÎÖÐÖ¹£¬£¬£¬£¬£¬²¨¼°È«ÇòÓû§¡£¡£¡£¡£¡£¡£ÐÂÄêºóµÄµÚÒ»¸öÊÂÇéÈÕ£¬£¬£¬£¬£¬ÃÀ¹ú¶«²¿Ê±¼ä1ÔÂ4ÈÕÉÏÎç10µãSlack·ºÆðÁËÖÐÖ¹£¬£¬£¬£¬£¬Ó°ÏìÁË×ÀÃæ¿Í»§¶ËºÍWeb½çÃæ£¬£¬£¬£¬£¬Óû§ÎÞ·¨ÅþÁ¬Ð§ÀÍÆ÷¡¢ÎÞ·¨·¢ËͺÍÎüÊÕÐÂÎŲ¢ÇÒÎÞ·¨¼ìË÷ƵµÀÀúÊ·¼Í¼¡£¡£¡£¡£¡£¡£×î³õ±¬·¢ÖÐֹʱSlack³ÆÕâÖ»Ó°ÏìÁËÐÂÎÅת´ï£¬£¬£¬£¬£¬µ«ËæºóSlackµÄËùÓÐЧÀ͵ͼ·ºÆðÁËÖÐÖ¹¡£¡£¡£¡£¡£¡£ÏÖÔÚSlack»Ö¸´Á˿ͻ§¶ËµÄ²¿·Ö¹¦Ð§£¬£¬£¬£¬£¬ÈçÎüÊպͷ¢ËÍÐÂÎÅ£¬£¬£¬£¬£¬µ«GoogleÈÕÀúºÍOutlookÈÕÀúµÈЧÀÍÈÔÎÞ·¨Õý³£ÊÂÇé¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/technology/slack-suffers-its-first-massive-outage-of-2021/


4¡¢ESTsecurityÅû¶ThalliumÕë¶Ô½ðÈÚÐÐÒµµÄ¹©Ó¦Á´¹¥»÷


4.png


ESTsecurityÅû¶APT×éÖ¯Thallium£¨ÓÖÃûAPT37£©Õë¶Ô½ðÈÚÐÐÒµµÄ¹©Ó¦Á´¹¥»÷¡£¡£¡£¡£¡£¡£Ôڴ˴ι¥»÷»î¶¯ÖУ¬£¬£¬£¬£¬ºÚ¿Í¸Ä¶¯ÁËÒ»¿î˽ÈË¹ÉÆ±Í¶×ÊÐÅϢת´ïµÄÓ¦Ó㬣¬£¬£¬£¬ÒÔ·Ö·¢¶ñÒâ´úÂë¡£¡£¡£¡£¡£¡£ThalliumÊ×ÏÈʹÓÃNullsoft¾ç±¾×°ÖÃϵͳ£¨NSIS£©ÌìÉúWindows¿ÉÖ´ÐÐÎļþ£¬£¬£¬£¬£¬¸ÃÎļþ°üÀ¨ÁËÀ´×ÔÕýµ±¹ÉƱͶ×ÊÓ¦ÓóÌÐòµÄÕýµ±ÎļþºÍ¶ñÒâ´úÂë¡£¡£¡£¡£¡£¡£µ±Óû§ÔÚ×°ÖÃÕæÕýµÄ¹ÉƱͶ×ÊÓ¦ÓóÌÐòʱ£¬£¬£¬£¬£¬ºǫ́ͬʱÔËÐжñÒâ¾ç±¾¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/north-korean-software-supply-chain-attack-targets-stock-investors/


5¡¢GreyNoiseÔÚÒ°·¢Ã÷ʹÓÃZyxelÖÐÎó²îµÄ¹¥»÷»î¶¯


5.png


ÍøÂçÇå¾²¹«Ë¾GreyNoiseÔÚÒ°·¢Ã÷ʹÓÃZyxelÖÐÎó²î£¨CVE-2020-29583£©µÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¡£¸ÃÎó²îÓëZyxelÖÐÓ²±àÂëµÄºóÃÅÕÊ»§zyfwpÓйØ£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓÃÀ´½ÓÊÜÍøÂç×°±¸¡£¡£¡£¡£¡£¡£GreyNoise¼ì²âµ½Èý¸ö²î±ðµÄIPµØµãÕýÔÚɨÃèSSH×°±¸£¬£¬£¬£¬£¬²¢ÊµÑéʹÓÃZyxelºóÃŵǼ¡£¡£¡£¡£¡£¡£¿ÉÊÇÕâЩ¹¥»÷Õß²¢Ã»ÓÐרÃÅÕë¶ÔZyxel×°±¸£¬£¬£¬£¬£¬¶øÊÇɨÃèInternetÉÏËùÓÐÕýÔÚÔËÐеÄSSH¡£¡£¡£¡£¡£¡£ÆäÖÐÒ»¸ö¹¥»÷ÕßʹÓÃÁËCobalt StrikeµÄÄÚÖÃSSH¿Í»§¶ËÀ´Ö´ÐÐɨÃ裬£¬£¬£¬£¬Ö¼ÔÚÈÆ¹ý¼ì²â¡£¡£¡£¡£¡£¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/hackers-start-exploiting-the-new-backdoor-in-zyxel-devices/