TrustwaveÅû¶»ªÎªUSB LTE donglesÖÐÌáȨÎó²î£»£»£»£»£»£»ExaGridÔâµ½ContiÀÕË÷¹¥»÷£¬£¬£¬£¬£¬£¬ÒÑÖ§¸¶260ÍòÃÀÔªÊê½ð
Ðû²¼Ê±¼ä 2021-06-041.TrustwaveÅû¶»ªÎªUSB LTE donglesÖеÄÌáȨÎó²î

TrustwaveµÄÑо¿Ö°Ô±Åû¶ÁË»ªÎªE3372ÐÍUSB LTE donglesÖеÄÌáȨÎó²î¡£¡£¡£¡£¡£¡£¡£USB donglesÊÇÒ»ÖÖ¿ÉÒÔ²åÈëÌõ¼Ç±¾µçÄÔºĮ́ʽµçÄÔµÄÓ²¼þ£¬£¬£¬£¬£¬£¬Íâ¹ÛÏñuÅÌ£¬£¬£¬£¬£¬£¬¿ÉÒÔ»á¼û»¥ÁªÍø¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³ÆÆäÔÚä¯ÀÀdongles×°ÖõÄÇý¶¯³ÌÐòÎļþʱ·¢Ã÷£¬£¬£¬£¬£¬£¬Ã¿´Î²åÈë¸Ã×°±¸¶¼»á×Ô¶¯ÔËÐÐmbbserviceopen£¬£¬£¬£¬£¬£¬ÔÚWebä¯ÀÀÆ÷·¿ª»ªÎª×°±¸ÖÎÀí½çÃæ£¬£¬£¬£¬£¬£¬¶øÕâ¸öÎļþÊÇÒÔÍêȫȨÏÞ£¨777£©ÔËÐеġ£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬»ªÎªÒÑÐû²¼ÓйظÃÎó²îµÄÇå¾²×Éѯ»ººÍ½â²½·¥¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/huawei-usb-lte-dongles-are-vulnerable-to-privilege-escalation-attacks/
2.CiscoÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´Æä¶à¿î²úÆ·ÖÐÑÏÖØµÄÎó²î

CiscoÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬ÐÞ¸´ÁËWebex Player¡¢SD-WANºÍASR 5000 ϵÁÐÖеĶà¸öÎó²î¡£¡£¡£¡£¡£¡£¡£´Ë´ÎÐÞ¸´µÄ½ÏΪÑÏÖØµÄÎó²îÊÇWebex PlayerÖеĿɵ¼ÖÂí§Òâ´úÂëÖ´ÐеÄÄÚ´æËð»µÎó²î£¨CVE-2021-1526¡¢CVE-2021-1502ºÍCVE-2021-1503£©ÒÔ¼°SD-WANÈí¼þÖеÄÌáȨÎó²î£¨CVE-2021-1528£©¡£¡£¡£¡£¡£¡£¡£»£»£»£»£»£»¹ÐÞ¸´ÁËASR 5000ϵÁÐÈí¼þ(StarOS) ÖеÄÁ½¸öÊÚÈ¨ÈÆ¹ýÎó²î£¨CVE-2021-1539ºÍCVE-2021-1540£©µÈÎó²î¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/118564/security/cisco-webex-player-sd-wan-asr-5000-flaws.html
3.AMT GamesÔÆ´æ´¢ÉèÖùýʧй¶½ü600ÍòÓû§µÄÐÅÏ¢

WizCaseÑо¿Ö°Ô±·¢Ã÷AMT GamesµÄElasticSearchЧÀÍÆ÷ÉèÖùýʧй¶590ÍòÓû§µÄÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£AMT GamesÊÇ×ܲ¿Î»ÓÚÖйúµÄÒ»¼ÒÓÎÏ·¿ª·¢ÉÌ£¬£¬£¬£¬£¬£¬ËüµÄÃâ·ÑÊÖ»úÓÎÏ·Battle for the Galaxy£¨ÒøºÓÖ®Õ½£©ÔÚ103¸ö¹ú¼Ò/µØÇøÓµÓÐÊý°ÙÍòÓû§¡£¡£¡£¡£¡£¡£¡£´Ë´Î×ܹ²Ð¹Â¶ÁË1.47TBÊý¾Ý£¬£¬£¬£¬£¬£¬°üÀ¨590Íò¸öÍæ¼Ò×ÊÁÏ¡¢200Íò±ÊÉúÒâºÍ587000 Ìõ·´ÏìÐÂÎÅ£¬£¬£¬£¬£¬£¬Éæ¼°ÕÊ»§ID¡¢µç×ÓÓʼþµØµã¡¢ÓÎÏ·ÄÚ¹ºÖüÛÇ®ºÍÖ§¸¶ÌṩÉ̵ÈÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾Î´¶Ô´ËʾÙÐÐ˵Ã÷£¬£¬£¬£¬£¬£¬µ«½ûÓÃÁ˶ÔЧÀÍÆ÷µÄ»á¼û¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/118529/data-breach/amt-games-data-leak.html
4.±©Ñ©³ÆÆäÔâµ½´ó¹æÄ£DDoS¹¥»÷£¬£¬£¬£¬£¬£¬ÆäЧÀÍÒÑÑÓ³Ù»òÖÐÖ¹

±©Ñ©³ÆÆäÔâµ½´ó¹æÄ£DDoS¹¥»÷£¬£¬£¬£¬£¬£¬Õâ¿Éµ¼ÖÂÒ»Ð©Íæ¼ÒµÄЧÀÍ·ºÆðÑÏÖØµÄÑÓ³ÙºÍÅþÁ¬ÖÐÖ¹¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÓÚ6ÔÂ1ÈÕÐû²¼ÍÆÎĹûÕæ´Ë´Î¹¥»÷£¬£¬£¬£¬£¬£¬²¢ÌåÏÖÆäÕýÔÚÆð¾¢»º½âÕâ¸öÎÊÌâ¡£¡£¡£¡£¡£¡£¡£µ«ÓÐTwitterÓû§¶Ô´ËÉùÃ÷×ö³ö̸ÂÛ£¬£¬£¬£¬£¬£¬³ÆÕâ¿ÉÄÜÊÇÓÉÓÚËûÃÇϵͳµÄ¸ºÔØÆ½ºâ²»¼Ñµ¼Öµģ¬£¬£¬£¬£¬£¬¶ø²»ÊÇDDoS¹¥»÷¡£¡£¡£¡£¡£¡£¡£Õâ¿ÉÄÜÓëÔçЩʱ¼äÐû²¼µÄȼÉÕµÄÔ¶Õ÷£¨The Burning Crusade£©Óйأ¬£¬£¬£¬£¬£¬ÔçÔÚ½ñÄê1Ô£¬£¬£¬£¬£¬£¬Íæ¼ÒÔÚÍæÄ§ÊÞÌìÏÂʱҲÓöµ½ÁËͬÑùµÄÎÊÌâ¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://news.softpedia.com/news/blizzard-experiencing-ddos-attack-possible-high-latency-and-disconnections-533100.shtml
5.ExaGridÔâµ½ContiÀÕË÷¹¥»÷£¬£¬£¬£¬£¬£¬ÒÑÖ§¸¶260ÍòÃÀÔªÊê½ð

±¸·Ý×°±¸¹©Ó¦ÉÌExaGridÔâµ½ContiÀÕË÷¹¥»÷£¬£¬£¬£¬£¬£¬ÔÚ5ÔÂ13ÈÕÖ§¸¶ÁË260ÍòÃÀÔªÊê½ð¡£¡£¡£¡£¡£¡£¡£ºÚ¿ÍÔÚ̸ÅÐÖÐÉù³ÆÆäÒÑÔڸù«Ë¾µÄµÄÍøÂçÖÐÍ£ÁôÒ»¸ö¶àÔ£¬£¬£¬£¬£¬£¬¼ÓÃÜÁËËùÓÐÎļþЧÀÍÆ÷ºÍSQL ЧÀÍÆ÷£¬£¬£¬£¬£¬£¬²¢ÏÂÔØÁËÁè¼Ý800GBµÄÐÅÏ¢¡£¡£¡£¡£¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨¿Í»§ºÍÔ±¹¤µÄСÎÒ˽¼ÒÊý¾Ý¡¢ÉÌÒµÌõÔ¼¡¢±£ÃÜÐÒé±í¸ñ¡¢²ÆÎñÊý¾Ý¡¢ÄÉ˰É걨±íºÍÔ´´úÂë¡£¡£¡£¡£¡£¡£¡£ºÚ¿Í×î³õÒªÇóµÄÊê½ð½ð¶îΪ7480000ÃÀÔª£¬£¬£¬£¬£¬£¬¾¶à´Î̸ÅкóΪ260ÍòÃÀÔª¡£¡£¡£¡£¡£¡£¡£ExaGridÔÚÊÕµ½½âÃܹ¤¾ßÁ½Ììºó³Æ²»Ð¡ÐÄɾ³ýÁËËü£¬£¬£¬£¬£¬£¬²¢ÒªÇóºÚ¿ÍÓÖ·¢ÁËÒ»±é¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.computerweekly.com/news/252501665/Exagrid-pays-26m-to-Conti-ransomware-attackers
6.Ñо¿Ö°Ô±ÑÝʾÔõÑùÈÆ¹ý΢ÈíAMSIµÄͨÀýÇå¾²Õ½ÂÔ

SophosµÄÑо¿Ö°Ô±ÑÝʾÁËÔõÑùÈÆ¹ý΢Èí·´¶ñÒâÈí¼þɨÃè½Ó¿Ú (AMSI) µÄͨÀýÇå¾²Õ½ÂÔ¡£¡£¡£¡£¡£¡£¡£Ñо¿Ö°Ô±³ÆÒ»ÖÖÒªÁìÊÇÈÆ¹ýɨÃè³ÌÐò£¬£¬£¬£¬£¬£¬Ê¹ÓûìÏý¡¢¼ÓÃÜ¡¢ÒþдÊõºÍÆäËûÊÖÒÕ£¬£¬£¬£¬£¬£¬Ê¹É±¶¾Èí¼þ¸üÄÑ·¢Ã÷payloadµÄ¹¥»÷Òâͼ£»£»£»£»£»£»ÁíÒ»ÖÖÊÇÒ»×îÏȾÍÍêÈ«×èÖ¹¶ñÒâÈí¼þ±»É¨Ãè¡£¡£¡£¡£¡£¡£¡£SophosÌåÏÖ£¬£¬£¬£¬£¬£¬Áè¼Ý98%µÄAMSIʵÑé¶¼ÊÇͨ¹ý¸Ä¶¯AMSI¿âÀ´ÊµÏֵ쬣¬£¬£¬£¬£¬ÓжàÖÖ¶ñÒâÈí¼þ»áÊÔͼÕÒµ½ÒѼÓÔØµ½ÄÚ´æÖеÄAmsiScanBuffer£¬£¬£¬£¬£¬£¬È»ºóÁýÕÖÆäÖ¸ÁîÒÔÈ·±£É¨ÃèÇëÇóʧ°Ü¡£¡£¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/this-is-how-attackers-bypass-microsoft-antimalware-scan-software-amsi/


¾©¹«Íø°²±¸11010802024551ºÅ