TrustwaveÅû¶»ªÎªUSB LTE donglesÖÐÌáȨÎó²î£»£»£»£»£»£»£»ExaGridÔâµ½ContiÀÕË÷¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÒÑÖ§¸¶260ÍòÃÀÔªÊê½ð
Ðû²¼Ê±¼ä 2021-06-041.TrustwaveÅû¶»ªÎªUSB LTE donglesÖеÄÌáȨÎó²î

TrustwaveµÄÑо¿Ö°Ô±Åû¶ÁË»ªÎªE3372ÐÍUSB LTE donglesÖеÄÌáȨÎó²î¡£¡£¡£USB donglesÊÇÒ»ÖÖ¿ÉÒÔ²åÈëÌõ¼Ç±¾µçÄÔºĮ́ʽµçÄÔµÄÓ²¼þ£¬£¬£¬£¬£¬£¬£¬Íâ¹ÛÏñuÅÌ£¬£¬£¬£¬£¬£¬£¬¿ÉÒÔ»á¼û»¥ÁªÍø¡£¡£¡£Ñо¿Ö°Ô±³ÆÆäÔÚä¯ÀÀdongles×°ÖõÄÇý¶¯³ÌÐòÎļþʱ·¢Ã÷£¬£¬£¬£¬£¬£¬£¬Ã¿´Î²åÈë¸Ã×°±¸¶¼»á×Ô¶¯ÔËÐÐmbbserviceopen£¬£¬£¬£¬£¬£¬£¬ÔÚWebä¯ÀÀÆ÷·¿ª»ªÎª×°±¸ÖÎÀí½çÃæ£¬£¬£¬£¬£¬£¬£¬¶øÕâ¸öÎļþÊÇÒÔÍêȫȨÏÞ£¨777£©ÔËÐеġ£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬»ªÎªÒÑÐû²¼ÓйظÃÎó²îµÄÇå¾²×Éѯ»ººÍ½â²½·¥¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.bleepingcomputer.com/news/security/huawei-usb-lte-dongles-are-vulnerable-to-privilege-escalation-attacks/
2.CiscoÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´Æä¶à¿î²úÆ·ÖÐÑÏÖØµÄÎó²î

CiscoÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´ÁËWebex Player¡¢SD-WANºÍASR 5000 ϵÁÐÖеĶà¸öÎó²î¡£¡£¡£´Ë´ÎÐÞ¸´µÄ½ÏΪÑÏÖØµÄÎó²îÊÇWebex PlayerÖеĿɵ¼ÖÂí§Òâ´úÂëÖ´ÐеÄÄÚ´æËð»µÎó²î£¨CVE-2021-1526¡¢CVE-2021-1502ºÍCVE-2021-1503£©ÒÔ¼°SD-WANÈí¼þÖеÄÌáȨÎó²î£¨CVE-2021-1528£©¡£¡£¡£»£»£»£»£»£»£»¹ÐÞ¸´ÁËASR 5000ϵÁÐÈí¼þ(StarOS) ÖеÄÁ½¸öÊÚÈ¨ÈÆ¹ýÎó²î£¨CVE-2021-1539ºÍCVE-2021-1540£©µÈÎó²î¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/118564/security/cisco-webex-player-sd-wan-asr-5000-flaws.html
3.AMT GamesÔÆ´æ´¢ÉèÖùýʧй¶½ü600ÍòÓû§µÄÐÅÏ¢

WizCaseÑо¿Ö°Ô±·¢Ã÷AMT GamesµÄElasticSearchЧÀÍÆ÷ÉèÖùýʧй¶590ÍòÓû§µÄÐÅÏ¢¡£¡£¡£AMT GamesÊÇ×ܲ¿Î»ÓÚÖйúµÄÒ»¼ÒÓÎÏ·¿ª·¢ÉÌ£¬£¬£¬£¬£¬£¬£¬ËüµÄÃâ·ÑÊÖ»úÓÎÏ·Battle for the Galaxy£¨ÒøºÓÖ®Õ½£©ÔÚ103¸ö¹ú¼Ò/µØÇøÓµÓÐÊý°ÙÍòÓû§¡£¡£¡£´Ë´Î×ܹ²Ð¹Â¶ÁË1.47TBÊý¾Ý£¬£¬£¬£¬£¬£¬£¬°üÀ¨590Íò¸öÍæ¼Ò×ÊÁÏ¡¢200Íò±ÊÉúÒâºÍ587000 Ìõ·´ÏìÐÂÎÅ£¬£¬£¬£¬£¬£¬£¬Éæ¼°ÕÊ»§ID¡¢µç×ÓÓʼþµØµã¡¢ÓÎÏ·ÄÚ¹ºÖüÛÇ®ºÍÖ§¸¶ÌṩÉ̵ÈÐÅÏ¢¡£¡£¡£ÏÖÔÚ£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾Î´¶Ô´ËʾÙÐÐ˵Ã÷£¬£¬£¬£¬£¬£¬£¬µ«½ûÓÃÁ˶ÔЧÀÍÆ÷µÄ»á¼û¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://securityaffairs.co/wordpress/118529/data-breach/amt-games-data-leak.html
4.±©Ñ©³ÆÆäÔâµ½´ó¹æÄ£DDoS¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÆäЧÀÍÒÑÑÓ³Ù»òÖÐÖ¹

±©Ñ©³ÆÆäÔâµ½´ó¹æÄ£DDoS¹¥»÷£¬£¬£¬£¬£¬£¬£¬Õâ¿Éµ¼ÖÂÒ»Ð©Íæ¼ÒµÄЧÀÍ·ºÆðÑÏÖØµÄÑÓ³ÙºÍÅþÁ¬ÖÐÖ¹¡£¡£¡£¸Ã¹«Ë¾ÓÚ6ÔÂ1ÈÕÐû²¼ÍÆÎĹûÕæ´Ë´Î¹¥»÷£¬£¬£¬£¬£¬£¬£¬²¢ÌåÏÖÆäÕýÔÚÆð¾¢»º½âÕâ¸öÎÊÌâ¡£¡£¡£µ«ÓÐTwitterÓû§¶Ô´ËÉùÃ÷×ö³ö̸ÂÛ£¬£¬£¬£¬£¬£¬£¬³ÆÕâ¿ÉÄÜÊÇÓÉÓÚËûÃÇϵͳµÄ¸ºÔØÆ½ºâ²»¼Ñµ¼Öµģ¬£¬£¬£¬£¬£¬£¬¶ø²»ÊÇDDoS¹¥»÷¡£¡£¡£Õâ¿ÉÄÜÓëÔçЩʱ¼äÐû²¼µÄȼÉÕµÄÔ¶Õ÷£¨The Burning Crusade£©Óйأ¬£¬£¬£¬£¬£¬£¬ÔçÔÚ½ñÄê1Ô£¬£¬£¬£¬£¬£¬£¬Íæ¼ÒÔÚÍæÄ§ÊÞÌìÏÂʱҲÓöµ½ÁËͬÑùµÄÎÊÌâ¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://news.softpedia.com/news/blizzard-experiencing-ddos-attack-possible-high-latency-and-disconnections-533100.shtml
5.ExaGridÔâµ½ContiÀÕË÷¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÒÑÖ§¸¶260ÍòÃÀÔªÊê½ð

±¸·Ý×°±¸¹©Ó¦ÉÌExaGridÔâµ½ContiÀÕË÷¹¥»÷£¬£¬£¬£¬£¬£¬£¬ÔÚ5ÔÂ13ÈÕÖ§¸¶ÁË260ÍòÃÀÔªÊê½ð¡£¡£¡£ºÚ¿ÍÔÚ̸ÅÐÖÐÉù³ÆÆäÒÑÔڸù«Ë¾µÄµÄÍøÂçÖÐÍ£ÁôÒ»¸ö¶àÔ£¬£¬£¬£¬£¬£¬£¬¼ÓÃÜÁËËùÓÐÎļþЧÀÍÆ÷ºÍSQL ЧÀÍÆ÷£¬£¬£¬£¬£¬£¬£¬²¢ÏÂÔØÁËÁè¼Ý800GBµÄÐÅÏ¢¡£¡£¡£Ð¹Â¶µÄÐÅÏ¢°üÀ¨¿Í»§ºÍÔ±¹¤µÄСÎÒ˽¼ÒÊý¾Ý¡¢ÉÌÒµÌõÔ¼¡¢±£ÃÜÐÒé±í¸ñ¡¢²ÆÎñÊý¾Ý¡¢ÄÉ˰É걨±íºÍÔ´´úÂë¡£¡£¡£ºÚ¿Í×î³õÒªÇóµÄÊê½ð½ð¶îΪ7480000ÃÀÔª£¬£¬£¬£¬£¬£¬£¬¾¶à´Î̸ÅкóΪ260ÍòÃÀÔª¡£¡£¡£ExaGridÔÚÊÕµ½½âÃܹ¤¾ßÁ½Ììºó³Æ²»Ð¡ÐÄɾ³ýÁËËü£¬£¬£¬£¬£¬£¬£¬²¢ÒªÇóºÚ¿ÍÓÖ·¢ÁËÒ»±é¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.computerweekly.com/news/252501665/Exagrid-pays-26m-to-Conti-ransomware-attackers
6.Ñо¿Ö°Ô±ÑÝʾÔõÑùÈÆ¹ý΢ÈíAMSIµÄͨÀýÇå¾²Õ½ÂÔ

SophosµÄÑо¿Ö°Ô±ÑÝʾÁËÔõÑùÈÆ¹ý΢Èí·´¶ñÒâÈí¼þɨÃè½Ó¿Ú (AMSI) µÄͨÀýÇå¾²Õ½ÂÔ¡£¡£¡£Ñо¿Ö°Ô±³ÆÒ»ÖÖÒªÁìÊÇÈÆ¹ýɨÃè³ÌÐò£¬£¬£¬£¬£¬£¬£¬Ê¹ÓûìÏý¡¢¼ÓÃÜ¡¢ÒþдÊõºÍÆäËûÊÖÒÕ£¬£¬£¬£¬£¬£¬£¬Ê¹É±¶¾Èí¼þ¸üÄÑ·¢Ã÷payloadµÄ¹¥»÷Òâͼ£»£»£»£»£»£»£»ÁíÒ»ÖÖÊÇÒ»×îÏȾÍÍêÈ«×èÖ¹¶ñÒâÈí¼þ±»É¨Ãè¡£¡£¡£SophosÌåÏÖ£¬£¬£¬£¬£¬£¬£¬Áè¼Ý98%µÄAMSIʵÑé¶¼ÊÇͨ¹ý¸Ä¶¯AMSI¿âÀ´ÊµÏֵ쬣¬£¬£¬£¬£¬£¬ÓжàÖÖ¶ñÒâÈí¼þ»áÊÔͼÕÒµ½ÒѼÓÔØµ½ÄÚ´æÖеÄAmsiScanBuffer£¬£¬£¬£¬£¬£¬£¬È»ºóÁýÕÖÆäÖ¸ÁîÒÔÈ·±£É¨ÃèÇëÇóʧ°Ü¡£¡£¡£
ÔÎÄÁ´½Ó£º
https://www.zdnet.com/article/this-is-how-attackers-bypass-microsoft-antimalware-scan-software-amsi/


¾©¹«Íø°²±¸11010802024551ºÅ