CiscoÅû¶ÆäSPA112 2-Portµç»°ÊÊÅäÆ÷ÖеÄRCEÎó²î

Ðû²¼Ê±¼ä 2023-05-06

1¡¢CiscoÅû¶ÆäSPA112 2-Portµç»°ÊÊÅäÆ÷ÖеÄRCEÎó²î

 

¾ÝýÌå5ÔÂ4ÈÕ±¨µÀ£¬ £¬£¬ £¬£¬CiscoÅû¶ÁËÆäSPA112 2-Portµç»°ÊÊÅäÆ÷ÖлùÓÚWebµÄÖÎÀí½çÃæÖеÄÎó²î£¬ £¬£¬ £¬£¬¿É±»Î´¾­Éí·ÝÑéÖ¤µÄÔ¶³Ì¹¥»÷ÕßÓÃÓÚÖ´ÐÐí§Òâ´úÂë¡£¡£¡£¡£¸ÃÎó²î×·×ÙΪCVE-2023-20126£¨CVSSÆÀ·Ö9.8£©£¬ £¬£¬ £¬£¬ÊÇÓÉÓڹ̼þÉý¼¶¹¦Ð§ÖÐȱÉÙÉí·ÝÑéÖ¤Àú³ÌÔì³ÉµÄ£¬ £¬£¬ £¬£¬¹¥»÷Õß¿ÉÒÔͨ¹ý½«Ä¿µÄ×°±¸Éý¼¶µ½¶ñÒ⿪·¢µÄ¹Ì¼þ°æÔ­À´Ê¹ÓôËÎó²î¡£¡£¡£¡£ÓÉÓÚCisco SPA112ÓÚ2020Äê6ÔÂ1ÈÕÍ£²ú£¬ £¬£¬ £¬£¬¹©Ó¦É̲»ÔÙ¶ÔËüÌṩ֧³Ö£¬ £¬£¬ £¬£¬Ò²²»»áÐû²¼Çå¾²¸üС£¡£¡£¡£±ðµÄ£¬ £¬£¬ £¬£¬CiscoδÌṩÕë¶Ô¸ÃÎó²îµÄ»º½â²½·¥¡£¡£¡£¡£


https://securityaffairs.com/145763/security/cisco-spa112-2-port-phone-adapters-rce.html


2¡¢¼ÓÄôóConstellation SoftwareÔâµ½ALPHVµÄ¹¥»÷


¾Ý5ÔÂ5ÈÕ±¨µÀ£¬ £¬£¬ £¬£¬¼ÓÄôó¶àÔª»¯Èí¼þ¹«Ë¾Constellation Software³ÆÆä²¿·ÖϵͳÔâµ½¹¥»÷£¬ £¬£¬ £¬£¬²¿·ÖСÎÒ˽¼ÒÐÅÏ¢ºÍÉÌÒµÊý¾Ýй¶¡£¡£¡£¡£Constellation͸¶£¬ £¬£¬ £¬£¬ËüÒѾ­×èÖ¹Á˴˴ι¥»÷£¬ £¬£¬ £¬£¬ÏÖÔÚÒ²»Ö¸´ÁËËùÓÐÊÜÓ°ÏìµÄIT»ù´¡ÉèÊ©¡£¡£¡£¡£ËäÈ»¸Ã¹«Ë¾ÉÐδÌṩ¹ØÓÚ¹¥»÷Õß¼°ÆäÔõÑù»á¼ûϵͳµÄÏêϸÐÅÏ¢£¬ £¬£¬ £¬£¬µ«ALPHVÔÚÆäÍøÕ¾Ìí¼ÓÁËÒ»¸öÐÂÌõÄ¿£¬ £¬£¬ £¬£¬³ÆËûÃÇÈëÇÖÁËConstellationµÄϵͳ²¢ÇÔÈ¡ÁËÁè¼Ý1 TBµÄÎļþ¡£¡£¡£¡£ALPHV»¹¹ûÕæÁ˲¿·Ö°üÀ¨ÉÌÒµÐÅÏ¢µÄÎļþ×÷Ϊ¹¥»÷Ö¤¾Ý¡£¡£¡£¡£


https://www.bleepingcomputer.com/news/security/alphv-gang-claims-ransomware-attack-on-constellation-software/


3¡¢Sentinel LabsÏêÊöKimsukyµÄÐÂÕì̽¹¤¾ßReconShark


5ÔÂ4ÈÕ£¬ £¬£¬ £¬£¬Sentinel Labs·¢Ã÷ÁËÀ´×ÔKimsukyµÄ¹¥»÷»î¶¯¡£¡£¡£¡£¹¥»÷ÕßʹÓÃÁËеĶñÒâÈí¼þ×é¼þReconShark£¬ £¬£¬ £¬£¬Ëüͨ¹ýÓã²æÊ½´¹ÂÚÓʼþ¡¢OneDriveÁ´½ÓÒÔ¼°¶ñÒâºê¾ÙÐзַ¢¡£¡£¡£¡£ReconShark±»ÒÔΪÊÇBabySharkµÄбäÌ壬 £¬£¬ £¬£¬¿ÉʹÓÃWMIÍøÂçÓйØÄ¿µÄϵͳµÄÐÅÏ¢£¬ £¬£¬ £¬£¬»¹¼ì²é»úеÉÏÊÇ·ñÔËÐÐÇå¾²Èí¼þ£¬ £¬£¬ £¬£¬²¢Í¨¹ýHTTP POSTÇëÇó½«Êý¾Ý·¢Ë͵½C2ЧÀÍÆ÷¡£¡£¡£¡£³ýÁËÇÔÊØÐÅÏ¢Í⣬ £¬£¬ £¬£¬ReconShark»¹ÒÔ¶à½×¶Î·½·¨°²ÅŸü¶àpayload¡£¡£¡£¡£´Ë´Î»î¶¯Õë¶ÔÃÀ¹ú¡¢Å·ÖÞºÍÑÇÖÞµÄ×éÖ¯ºÍСÎÒ˽¼Ò£¬ £¬£¬ £¬£¬°üÀ¨Öǿ⡢Ñо¿ÐÍ´óѧºÍÕþ¸®»ú¹¹¡£¡£¡£¡£


https://www.sentinelone.com/labs/kimsuky-evolves-reconnaissance-capabilities-in-new-global-campaign/


4¡¢KasperskyÔÚGoogle Play¼ì²âµ½¶à¸öѬȾFleckpeµÄÓ¦ÓÃ


KasperskyÓÚ5ÔÂ4ÈÕ³ÆÆä·¢Ã÷ÁËÐÂAndroid¶ñÒâÈí¼þFleckpe£¬ £¬£¬ £¬£¬Ö÷ÒªÕë¶ÔÌ©¹ú¡¢ÂíÀ´Î÷ÑÇ¡¢Ó¡¶ÈÄáÎ÷ÑÇ¡¢ÐÂ¼ÓÆÂºÍ²¨À¼¡£¡£¡£¡£Ñо¿Ö°Ô±ÔÚGoogle Play¼ì²âµ½11¸öѬȾFleckpeµÄÓ¦Ó㬠£¬£¬ £¬£¬ÕâЩӦÓÃð³äͼÏñ±à¼­Æ÷¡¢ÕÕÆ¬¿â¡¢¸ß¼¶±ÚÖ½µÈ£¬ £¬£¬ £¬£¬Òѱ»×°ÖÃÁè¼Ý620000´Î¡£¡£¡£¡£¸ÃľÂí×Ô2022ÄêÒÔÀ´Ò»Ö±»îÔ¾£¬ £¬£¬ £¬£¬Ëüͨ¹ýΪÓû§¶©Ôĸ߼¶Ð§ÀͶø±¬·¢Î´¾­ÊÚȨµÄÓöÈ£¬ £¬£¬ £¬£¬²¢´ÓÖÐ׬Ǯ¡£¡£¡£¡£ÎªÌá·À´ËÀàÍþв£¬ £¬£¬ £¬£¬Ñо¿Ö°Ô±½¨ÒéAndroidÓû§½ö´Ó¿ÉÐÅȪԴºÍ¿ª·¢ÉÌÏÂÔØÓ¦Ó㬠£¬£¬ £¬£¬²¢ÔÚ×°ÖÃÀú³ÌÖÐ×¢ÖØÇëÇóµÄȨÏÞ¡£¡£¡£¡£


http://securelist.com/fleckpe-a-new-family-of-trojan-subscribers-on-google-play/109643/


5¡¢Ermetic½üÆÚÔÚAzure APIÖÎÀíЧÀÍÖз¢Ã÷3¸öÎó²î


ýÌå5ÔÂ4Èճƣ¬ £¬£¬ £¬£¬Ermetic½üÆÚÔÚAzure APIÖÎÀíЧÀÍÖз¢Ã÷3¸öÎó²î¡£¡£¡£¡£ÆäÖаüÀ¨Á½¸öSSRFÎó²îºÍÒ»¸öÎļþÉÏ´«Â·¾¶±éÀúÎó²î¡£¡£¡£¡£ÕâЩÎó²îÊÇͨ¹ýurlÃûÌÃÈÆ¹ýºÍAPIÖÎÀí¿ª·¢Ö°Ô±ÃÅ»§ÖеÄÎÞÏÞÖÆÎļþÉÏ´«¹¦Ð§ÊµÏֵġ£¡£¡£¡£Ê¹ÓÃSSRFÎó²î£¬ £¬£¬ £¬£¬¹¥»÷Õ߿ɴÓЧÀ͵ÄCORSÊðÀíºÍÍйÜÊðÀí×Ô¼º·¢ËÍÇëÇó£¬ £¬£¬ £¬£¬»á¼ûÄÚ²¿Azure×ʲú£¬ £¬£¬ £¬£¬¾Ü¾øÐ§ÀͲ¢ÈƹýWebÓ¦Ó÷À»ðǽ¡£¡£¡£¡£Ê¹ÓÃÎļþÉÏ´«Â·¾¶±éÀúÎó²î£¬ £¬£¬ £¬£¬¹¥»÷Õ߿ɽ«¶ñÒâÎļþÉÏ´«µ½AzureÍйܵÄÄÚ²¿workload¡£¡£¡£¡£ÏÖÔÚ£¬ £¬£¬ £¬£¬MSRCÒѾ­ÐÞ¸´ÁËÕâ3¸öÎó²î¡£¡£¡£¡£


https://ermetic.com/blog/azure/when-good-apis-go-bad-uncovering-3-azure-api-management-vulnerabilities/


6¡¢AvastÐû²¼¹ØÓÚ2023ÄêµÚÒ»¼¾¶ÈÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ


5ÔÂ4ÈÕ£¬ £¬£¬ £¬£¬AvastÐû²¼Á˹ØÓÚ2023ÄêµÚÒ»¼¾¶ÈÍþÐ²Ì¬ÊÆµÄÆÊÎö±¨¸æ¡£¡£¡£¡£±¨¸æÖ¸³ö£¬ £¬£¬ £¬£¬¹¥»÷ÕßһֱѰÕÒеÄÒªÁìÀ´·Ö·¢¶ñÒâÈí¼þ£¬ £¬£¬ £¬£¬°üÀ¨Ê¹ÓÃMicrosoft OneNoteºÍAdobe Acrobat Sign¡£¡£¡£¡£±¾¼¾¶È£¬ £¬£¬ £¬£¬Õë¶Ô¶«ÑǵØÇøµÄ¶ñÒâ¹ã¸æÈí¼þ»î¶¯ÏÔÖøÔöÌí¡£¡£¡£¡£ÐÅÏ¢ÇÔÈ¡³ÌÐòÈÔÊÇ×î´óµÄÍþв֮һ£¬ £¬£¬ £¬£¬ÆäÖÐ×î³£¼ûµÄÊÇAgentTesla¡¢FormBook¡¢RaccoonºÍRedLineµÈ¡£¡£¡£¡£¹ØÓÚÀÕË÷Èí¼þ£¬ £¬£¬ £¬£¬WannaCryÈÔ´¦ÓÚÁìÏÈְλ£¨Õ¼±È18%£©£¬ £¬£¬ £¬£¬Æä´ÎÊÇSTOP ransomware(15%)ºÍThanatos(3%)¡£¡£¡£¡£×î³£¼ûµÄRAT°üÀ¨HWorm¡¢Remcos¡¢njRATºÍAsyncRatµÈ¡£¡£¡£¡£ 


https://decoded.avast.io/threatresearch/avast-q1-2023-threat-report/