ÐÅÏ¢Çå¾²Öܱ¨-2021ÄêµÚ2ÖÜ
Ðû²¼Ê±¼ä 2021-01-11> ±¾ÖÜÇå¾²Ì¬ÊÆ×ÛÊö
2021Äê01ÔÂ04ÈÕÖÁ01ÔÂ10ÈÕ¹²ÊÕ¼Çå¾²Îó²î68¸ö£¬£¬£¬£¬£¬£¬ÖµµÃ¹Ø×¢µÄÊÇDell Wyse ThinOSĬÈÏÉèÖÃÎļþ²Ù×÷Îó²î£»£»£»£»Panasonic FPWIN Pro»º³åÇøÒç³öÎó²î£»£»£»£»Qualcomm Video NALÆÊÎöÔ½½çдÎó²î£»£»£»£»Google Android¼Ü¹¹CVE-2021-0313¾Ü¾øÐ§ÀÍÎó²î£»£»£»£»Delta Electronics Industrial Automation DOPSoft CVE-2020-27277»º³åÇøÒç³öÎó²î¡£¡£¡£¡£¡£
±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂçÇå¾²ÊÂÎñÊÇÄÉʲά¶û±¬Õ¨µ¼ÖÂÃÀ¹úÊý°ÙÓ¢ÀïͨѶЧÀÍÖÐÖ¹£»£»£»£»Cyble·¢Ã÷ºÚ¿ÍÔÚ°µÍø³öÊÛÁ½ÒÚ¶àÖйú¹«ÃñµÄÐÅÏ¢£»£»£»£»Ì¸ÌìȺ×éSlackЧÀÍÖÐÖ¹£¬£¬£¬£¬£¬£¬²¨¼°È«ÇòÓû§£»£»£»£»ESTsecurityÅû¶ThalliumÕë¶Ô½ðÈÚÐÐÒµµÄ¹©Ó¦Á´¹¥»÷£»£»£»£»GreyNoiseÔÚÒ°·¢Ã÷ʹÓÃZyxelÖÐÎó²îµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£
ƾ֤ÒÔÉÏ×ÛÊö£¬£¬£¬£¬£¬£¬±¾ÖÜÇå¾²ÍþвΪÖС£¡£¡£¡£¡£
> Ö÷ÒªÇå¾²Îó²îÁбí
1.Dell Wyse ThinOSĬÈÏÉèÖÃÎļþ²Ù×÷Îó²î
Dell Wyse ThinOSĬÈÏÉèÖñ£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉдÎļþµ½ÏµÍ³»òÕß²Ù×÷Ä¿µÄÉèÖᣡ£¡£¡£¡£
https://www.dell.com/support/kbdoc/zh-hk/000180768/dsa-2020-281
2.Panasonic FPWIN Pro»º³åÇøÒç³öÎó²î
Panasonic FPWIN Pro´¦Öóͷ£ÏîÄ¿Îļþ±£´æ»º³åÇøÒç³öÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿É¾ÙÐоܾøÐ§À͹¥»÷»òÕßÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£
https://us-cert.cisa.gov/ics/advisories/icsa-21-005-02
3.Qualcomm Video NALÆÊÎöÔ½½çдÎó²î
Qualcomm Video NALÆÊÎö±£´æÔ½½çдÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿ÉÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£
https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin
4.Google Android¼Ü¹¹CVE-2021-0313¾Ü¾øÐ§ÀÍÎó²î
Google Android¼Ü¹¹±£´æÇå¾²Îó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿É¾ÙÐоܾøÐ§À͹¥»÷¡£¡£¡£¡£¡£
https://source.android.com/security/bulletin/2021-01-01
5.Delta Electronics Industrial Automation DOPSoft CVE-2020-27277»º³åÇøÒç³öÎó²î
Delta Electronics Industrial Automation DOPSoft´¦Öóͷ£ÏîÄ¿Îļþ±£´æ»º³åÇøÒç³öÎó²î£¬£¬£¬£¬£¬£¬ÔÊÐíÔ¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÎó²îÌá½»ÌØÊâµÄÇëÇ󣬣¬£¬£¬£¬£¬¿É¾ÙÐоܾøÐ§À͹¥»÷»òÕßÒÔÓ¦ÓóÌÐòÉÏÏÂÎÄÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¡£
https://us-cert.cisa.gov/ics/advisories/icsa-21-005-05
> Ö÷ÒªÇå¾²ÊÂÎñ×ÛÊö
1¡¢ÄÉʲά¶û±¬Õ¨µ¼ÖÂÃÀ¹úÊý°ÙÓ¢ÀïͨѶЧÀÍÖÐÖ¹

ÄÉʲά¶ûÊÐÖÐÐı¬·¢µÄÊ¥µ®½Ú±¬Õ¨ÊÂÎñµ¼ÖÂÃÀ¹úÊý°ÙÓ¢ÀïͨѶЧÀÍÖÐÖ¹¡£¡£¡£¡£¡£´Ë´Î±¬Õ¨Ëð»µÁËÃÀ¹úµç»°µç±¨¹«Ë¾(AT£¦T)Òªº¦µÄÍøÂçÉèÊ©£¬£¬£¬£¬£¬£¬ÆäÔÚÌïÄÉÎ÷ÖÝ¡¢¿ÏËþ»ùÖݺͰ¢À°ÍÂíÖݵĴ󲿷ֵØÇøµÄ¿Í»§¾ùÊܵ½Ó°Ï죬£¬£¬£¬£¬£¬ÎÞ·¨Í¨Ñ¶ºÍÉÏÍø¡£¡£¡£¡£¡£±ðµÄ£¬£¬£¬£¬£¬£¬´Ë´Î±¬Õ¨»¹Ôì³ÉÁËÊýÊ®ÈËéæÃüºÍÊýÊ®ÈËÊÜÉË£¬£¬£¬£¬£¬£¬Ô¼ÓÐ100¸ö911ºô½ÐÖÐÐÄ·ºÆðÎÊÌâ¡£¡£¡£¡£¡£AT£¦TÌåÏÖ×èÖ¹ÉÏÖÜÈý£¬£¬£¬£¬£¬£¬ËùÓÐЧÀÍ»ù±¾ÒѾ»Ö¸´¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.securityweek.com/nashville-bombing-spotlights-vulnerable-voice-data-networks
2¡¢Cyble·¢Ã÷ºÚ¿ÍÔÚ°µÍø³öÊÛÁ½ÒÚ¶àÖйú¹«ÃñµÄÐÅÏ¢

CybleµÄÑо¿ÍŶӷ¢Ã÷ºÚ¿ÍÔÚ°µÍø³öÊÛÁ½ÒÚ¶àÖйú¹«ÃñµÄÐÅÏ¢¡£¡£¡£¡£¡£´Ë´Îй¶µÄÊý¾ÝÀ´×Ô¶à¸öƽ̨ºÍÈí¼þ£¬£¬£¬£¬£¬£¬ÆäÖаüÀ¨730Íòºþ±±Ê¡¾£ÖÝÊй«°²ÏØ×¡ÃñµÄÉí·ÝÖ¤ºÅ¡¢ÐÔ±ð¡¢ÐÕÃû¡¢³öÉúÈÕÆÚ¡¢ÊÖ»ú¡¢µØµãºÍ´úÂëµÈÐÅÏ¢£¬£¬£¬£¬£¬£¬4180Íò¸ö΢²©Óû§µÄÕ˺źÍÏìÓ¦µÄÊÖ»úºÅÂ룬£¬£¬£¬£¬£¬ÒÔ¼°1.92ÒÚQQÓû§µÄÕ˺źÍÏìÓ¦µÄÊÖ»úºÅÂë¡£¡£¡£¡£¡£´Ë´Îй¶µÄÓëÖйú¹«ÃñÓйصļͼ×ÜÊýÁè¼Ý2ÒÚ¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/112966/deep-web/chinese-citizens-data-darkweb.html
3¡¢Ì¸ÌìȺ×éSlackЧÀÍÖÐÖ¹£¬£¬£¬£¬£¬£¬²¨¼°È«ÇòÓû§

̸ÌìȺ×éSlackЧÀͱ¬·¢ÁË2021ÄêµÄÊ×´ÎÖÐÖ¹£¬£¬£¬£¬£¬£¬²¨¼°È«ÇòÓû§¡£¡£¡£¡£¡£ÐÂÄêºóµÄµÚÒ»¸öÊÂÇéÈÕ£¬£¬£¬£¬£¬£¬ÃÀ¹ú¶«²¿Ê±¼ä1ÔÂ4ÈÕÉÏÎç10µãSlack·ºÆðÁËÖÐÖ¹£¬£¬£¬£¬£¬£¬Ó°ÏìÁË×ÀÃæ¿Í»§¶ËºÍWeb½çÃæ£¬£¬£¬£¬£¬£¬Óû§ÎÞ·¨ÅþÁ¬Ð§ÀÍÆ÷¡¢ÎÞ·¨·¢ËͺÍÎüÊÕÐÂÎŲ¢ÇÒÎÞ·¨¼ìË÷ƵµÀÀúÊ·¼Í¼¡£¡£¡£¡£¡£×î³õ±¬·¢ÖÐֹʱSlack³ÆÕâÖ»Ó°ÏìÁËÐÂÎÅת´ï£¬£¬£¬£¬£¬£¬µ«ËæºóSlackµÄËùÓÐЧÀ͵ͼ·ºÆðÁËÖÐÖ¹¡£¡£¡£¡£¡£ÏÖÔÚSlack»Ö¸´Á˿ͻ§¶ËµÄ²¿·Ö¹¦Ð§£¬£¬£¬£¬£¬£¬ÈçÎüÊպͷ¢ËÍÐÂÎÅ£¬£¬£¬£¬£¬£¬µ«GoogleÈÕÀúºÍOutlookÈÕÀúµÈЧÀÍÈÔÎÞ·¨Õý³£ÊÂÇé¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/technology/slack-suffers-its-first-massive-outage-of-2021/
4¡¢ESTsecurityÅû¶ThalliumÕë¶Ô½ðÈÚÐÐÒµµÄ¹©Ó¦Á´¹¥»÷

ESTsecurityÅû¶APT×éÖ¯Thallium£¨ÓÖÃûAPT37£©Õë¶Ô½ðÈÚÐÐÒµµÄ¹©Ó¦Á´¹¥»÷¡£¡£¡£¡£¡£Ôڴ˴ι¥»÷»î¶¯ÖУ¬£¬£¬£¬£¬£¬ºÚ¿Í¸Ä¶¯ÁËÒ»¿î˽ÈË¹ÉÆ±Í¶×ÊÐÅϢת´ïµÄÓ¦Ó㬣¬£¬£¬£¬£¬ÒÔ·Ö·¢¶ñÒâ´úÂë¡£¡£¡£¡£¡£ThalliumÊ×ÏÈʹÓÃNullsoft¾ç±¾×°ÖÃϵͳ£¨NSIS£©ÌìÉúWindows¿ÉÖ´ÐÐÎļþ£¬£¬£¬£¬£¬£¬¸ÃÎļþ°üÀ¨ÁËÀ´×ÔÕýµ±¹ÉƱͶ×ÊÓ¦ÓóÌÐòµÄÕýµ±ÎļþºÍ¶ñÒâ´úÂë¡£¡£¡£¡£¡£µ±Óû§ÔÚ×°ÖÃÕæÕýµÄ¹ÉƱͶ×ÊÓ¦ÓóÌÐòʱ£¬£¬£¬£¬£¬£¬ºǫ́ͬʱÔËÐжñÒâ¾ç±¾¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/north-korean-software-supply-chain-attack-targets-stock-investors/
5¡¢GreyNoiseÔÚÒ°·¢Ã÷ʹÓÃZyxelÖÐÎó²îµÄ¹¥»÷»î¶¯

ÍøÂçÇå¾²¹«Ë¾GreyNoiseÔÚÒ°·¢Ã÷ʹÓÃZyxelÖÐÎó²î£¨CVE-2020-29583£©µÄ¹¥»÷»î¶¯¡£¡£¡£¡£¡£¸ÃÎó²îÓëZyxelÖÐÓ²±àÂëµÄºóÃÅÕÊ»§zyfwpÓйأ¬£¬£¬£¬£¬£¬¹¥»÷Õß¿ÉÒÔʹÓÃÀ´½ÓÊÜÍøÂç×°±¸¡£¡£¡£¡£¡£GreyNoise¼ì²âµ½Èý¸ö²î±ðµÄIPµØµãÕýÔÚɨÃèSSH×°±¸£¬£¬£¬£¬£¬£¬²¢ÊµÑéʹÓÃZyxelºóÃŵǼ¡£¡£¡£¡£¡£¿ÉÊÇÕâЩ¹¥»÷Õß²¢Ã»ÓÐרÃÅÕë¶ÔZyxel×°±¸£¬£¬£¬£¬£¬£¬¶øÊÇɨÃèInternetÉÏËùÓÐÕýÔÚÔËÐеÄSSH¡£¡£¡£¡£¡£ÆäÖÐÒ»¸ö¹¥»÷ÕßʹÓÃÁËCobalt StrikeµÄÄÚÖÃSSH¿Í»§¶ËÀ´Ö´ÐÐɨÃ裬£¬£¬£¬£¬£¬Ö¼ÔÚÈÆ¹ý¼ì²â¡£¡£¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/hackers-start-exploiting-the-new-backdoor-in-zyxel-devices/


¾©¹«Íø°²±¸11010802024551ºÅ