D-Link NASµÄËÁÒâºÅÁî×¢ÈëºÍÓ²±àÂëºóÃÅ

°ä²¼¹¦·ò 2024-04-08
1. D-Link NASµÄËÁÒâºÅÁî×¢ÈëºÍÓ²±àÂëºóÃÅ


4ÔÂ6ÈÕ £¬Íþв×êÑÐÈËÔ±Åû¶Á˶à¸ö²»ÔÚÖ§³ÖµÄ D-Link ÍøÂ總¼Ó´æ´¢ (NAS) É豸ÐͺÅÖдæÔÚеÄËÁÒâºÅÁî×¢ÈëºÍÓ²±àÂëºóÃÅȱµã¡£¸ÃÎÊÌâ´æÔÚÓÚ¡°/cgi-bin/nas_sharing.cgi¡±¾ç±¾ÖÐ £¬Ó°ÏìÆä HTTP GET ÒªÇó´¦Ö÷¨Ê½×é¼þ¡£µ¼Ö¸Ãȱµã£¨±àºÅΪ CVE-2024-3273£©µÄÁ½¸öÖØÒªÎÊÌâÊÇͨ¹ýÓ²±àÂëÕÊ»§£¨Óû§Ãû£º¡°messagebus¡±ºÍ¿ÕÃÜÂ룩´Ù³ÉµÄºóÃÅÒÔ¼°Í¨¹ý¡°system¡±²ÎÊýµÄºÅÁî×¢ÈëÎÊÌâ¡£ºÅÁî×¢ÈëȱµãÊÇÓÉÓÚͨ¹ý HTTP GET ÒªÇó½« Base64 ±àÂëµÄºÅÁîÔö³¤µ½¡°system¡±²ÎÊý £¬¶øºóÖ´ÐиúÅÁî¶øÒýÆðµÄ¡£D-LinkΪ¾ÉÉ豸³ÉÁ¢ÁË ×¨ÃŵÄÖ§³ÖÒ³Ãæ £¬Óû§Äܹ»ÔÚÆäÖÐä¯ÀÀµµ°¸ÒÔ²éÕÒ×îÐµİ²È«ºÍ¹Ì¼þ¸üС£


https://www.bleepingcomputer.com/news/security/over-92-000-exposed-d-link-nas-devices-have-a-backdoor-account/


2. ³¬¹ý1.6Íò¸öIVANTI VPNÒÀÈ»Ò×Êܵ½CVE-2024-21894µÄ¹¥»÷


4ÔÂ6ÈÕ £¬Shadowserver ×êÑÐÈËÔ±»ã±¨³Æ £¬Ô¼Äª 16500 ¸ö Ivanti Connect Secure ºÍ Poly Secure Íø¹ØÈÝÒ×Êܵ½×î½ü»ã±¨µÄ RCE CVE-2024-21894µÄÓ°Ïì¡£¸Ã¹«Ë¾ÒѰ䲼Á˰²È«¸üР£¬ÒÔ½â¾öÓ°Ïì Connect Secure ºÍÕ½Êõ°²È«Íø¹ØµÄËĸö°²È«·ì϶ £¬ÕâЩ·ì϶¿ÉÄܵ¼Ö´úÂëÖ´Ðкͻؾø·þÎñ (DoS) £¬Ô̺¬CVE-2024-21894¡£CVE-2024-21894£¨CVSS ÆÀ·Ö 8.2£©ÊÇ Ivanti Connect Secure£¨9.x¡¢22.x£©ºÍ Ivanti Policy Secure µÄ IPSec ×é¼þÖеĶÑÒç¶Âí½Å £¬ÔÊÐíδ¾­Éí·ÝÑéÖ¤µÄ¶ñÒâÓû§ÔÚÒÔϵØÎ»·¢ËÍÌØÔìÒªÇ󣺺ÅÁî - ʹ·þÎñ±ÀÀ£´Ó¶øµ¼Ö DoS ¹¥»÷¡£ÔÚijЩÇé¿öÏ £¬Õâ¿ÉÄܻᵼÖÂÖ´ÐÐËÁÒâ´úÂë¡£Shadowserver ×êÑÐÈËԱɨÃèÁË»¥ÁªÍøÉÏÊÇ·ñ´æÔÚÒ×ÊÜ CVE-2024-21894 Ó°ÏìµÄÊ·ý £¬²¢»ã±¨³ÆÔ¼ÓÐ 16,500 ¸öÊ·ýÒÀÈ»ÈÝÒ×Êܵ½¹¥»÷¡£´óÎÞÊýÒ×Êܹ¥»÷µÄϵͳλÓÚÃÀ¹ú£¨½ØÖÁ׫д±¾ÎÄʱÓÐ 4686 ¸ö£© £¬Æä´ÎÊÇÈÕ±¾£¨2009 Ä꣩ºÍÓ¢¹ú£¨1032 ¸ö£©¡£


https://securityaffairs.com/161544/security/ivanti-16500-vulnerable-istances.html


3. ÃÀ¹úÎÀÉú²¿ÖÒ¸æÒ½Ôº IT ·þÎñ̨Ò×Ôâµ½ºÚ¿Í¹¥»÷


4ÔÂ6ÈÕ £¬ÃÀ¹úÎÀÉúÓ빫¼Ò·þÎñ²¿ (HHS) ÖÒ¸æ³Æ £¬ºÚ¿Í´Ë¿ÌÔÚʹÓÃÉç»á¹¤³ÌÕ½ÊõÀ´¹¥»÷Ò½ÁƱ£½¡ºÍ¹«¹²ÎÀÉú (HPH) ÁìÓòµÄ IT ·þÎñ̨¡£ÎÀÉú²¿ÃÅÍøÂ簲ȫЭµ÷ÖÐÐÄ (HC3) ±¾Öܰ䲼µÄ²¿Ãž¯±¨³Æ £¬ÕâЩսÊõÔÊÐí¹¥»÷Õßͨ¹ý×¢²á×Ô¼ºµÄ¶à³ÁÉí·ÝÑéÖ¤ (MFA) É豸À´½Ó¼ûÖ¸±ê×éÖ¯µÄϵͳ¡£ÔÚÕâЩ¹¥»÷ÖÐ £¬ÍþвÐÐΪÕßʹÓñ¾µØÓòÓò´úÂëÖµç¼ÙÒâ²ÆÕþ²¿ÃÅÔ±¹¤µÄ×éÖ¯ £¬²¢ÌṩÇÔÈ¡µÄÉí·ÝÑéÖ¤¾ßÌåÐÅÏ¢ £¬Ô̺¬¹«Ë¾ ID ºÍÉç»á°²È«ºÅÂë¡£ËûÃÇÀûÓÃÕâЩÃô¸ÐÐÅÏ¢²¢Ðû³Æ×Ô¼ºµÄÖÇÄÜÊÖ»úÒѰܻµ £¬Ëµ·þ IT Ô®ÊǪ̈ÔÚ¹¥»÷ÕߵĽÚÔìÏÂÔÚ MFA ÖÐ×¢²áÐÂÉ豸¡£ÕâʹËûÃÇ¿ÉÄܽӼû¹«Ë¾×ÊÔ´ £¬²¢ÔÊÐíËûÃÇÔÚóÒ×µç×ÓÓʼþй¶¹¥»÷ÖгÁ¶¨ÏòÒøÐÐÂòÂô¡£


https://www.bleepingcomputer.com/news/security/us-health-dept-warns-hospitals-of-hackers-targeting-it-help-desks/


4. ÒÔÉ«ÁÐ˾·¨²¿Ôںڿͻ·Ö×ÓÐû³ÆÈëÇÖºóÉó²éÍøÂçÊÂÎñ


4ÔÂ6ÈÕ £¬ ÒÔÉ«ÁÐ˾·¨²¿°µÊ¾ £¬ÔÚµ÷²éÒ»Â·ÍøÂçÊÂÎñ £¬ÁìÓòÈÔÔÚÉó²éÖÐ £¬±ØÒª¹¦·òÀ´²é³­Ð¹Â¶ÎļþµÄÄÚÈݺÍÁìÓò¼°ÆäÆðÔ´¡£Ò»¸öÃûΪ Anonymous for Justice µÄ×éÖ¯Ðû³Æ¶ÔÕâ´ÎÐ¹Â¶ÕÆ¹Ü £¬²¢³ÆÕâ´Îй¶Ô̺¬¼ìË÷½ü 300 GB µÄÊý¾Ý¡£¸Ã×éÖ¯ÔÚÆäÍøÕ¾ÉϰµÊ¾ £¬½«³ÖÐø¹¥»÷ÒÔÉ«ÁÐ £¬¡°Ö±µ½¼ÓɳսÕùÖÕ³¡¡±¡£¸Ã×éÖ¯°ä²¼Á˾ݳÆÔÚ¹¥»÷»î¶¯ÖлñµÃµÄÎļþ £¬ÀýÈç˾·¨Îļþ £¬Ô̺¬ÏóÕ÷Ϊ»úÃܵÄË«±ßºÍ̸ºÍºÏͬ²Ý°¸¡£Â·Í¸ÉçÎÞ·¨¶ÀÁ¢ºËʵй¶ÎļþµÄÕæÊµÐÔ¡£Ë¾·¨²¿ÔÚÌû×ÓÖаµÊ¾ £¬ÒÑÕë¶ÔÕâÖÖÇé¿öÌáǰ×öºÃ³ï±¸ £¬²¢ÇÒÆäÐж¯²»»áÖжÏ¡£¹ú¶ÈÍøÂç¾Ö±¾ÖÜÔçЩʱ³½°µÊ¾ £¬Ô¤¼ÆÒÁÀÊÄê¶ÈÊ¥³ÇÈÕÖÜÄ©µÄÍøÂç¹¥»÷³¢ÊÔ½«»áÔö³¤¡£


https://www.reuters.com/world/middle-east/israels-justice-ministry-reviewing-cyber-incident-after-hacktivists-claim-breach-2024-04-05/


5. ÈÕ±¾ Hoya µÄ IT ϵͳÔâ·ê¹¥»÷ºóÔÝÍ£³ö²ú


4ÔÂ5ÈÕ £¬ÈÕ±¾µÄ Hoya¡ª¡ªÒ»¼ÒÑÛ¾µºÍÒþÐÎÑÛ¾µÔì×÷ÉÌ £¬ÒÔ¼°ÓÃÓÚÔì×÷°ëµ¼ÌåÔì×÷¡¢Æ½°åÏÔʾÆ÷ºÍÓ²ÅÌÇý¶¯Æ÷µÄÌ×¼þ¡ª¡ª IT ϵͳÔâ·ê¹¥»÷ºó £¬¸Ã¹«Ë¾ÒÑÖÕ³¡²¿Ãųö²úºÍÏúÊۻ¡£¹Ù·½¶ÔËù·¢×ÌÊÂÎñµÄ¼û½âÊÇÍÌ͵Ä¡£¸Ã¹«Ë¾³Ðŵ¡°½«²ÉÈ¡´ëÊ©¸´Ô­³ö²úºÍÏúÊۻËùÐèµÄϵͳ £¬²¢¾¡¿ì¸´Ô­Ïò¿Í»§Ìṩ²úÆ·µÄ¹©¸øÏµÍ³¡±¡£Hoya ĿǰÉв»Ã÷ÏÔ¡°¹«Ë¾³ÖÓеĻúÃÜ»òÓ×ÎÒÐÅÏ¢ÊÇ·ñÒѱ»Ð¹Â¶»ò±»µÚÈý·½½Ó¼û¡± £¬²¢ÖÒ¸æ³Æ¡°È«Ãæ·ÖÎöÔ¤¼Æ±ØÒªÏ൱³¤µÄ¹¦·ò¡±¡£


https://www.theregister.com/2024/04/05/hoya_infosec_incident/


6. ºÚ¿ÍÀûÓà Magento ·ì϶ÇÔÈ¡µç×ÓÉÌÎñÍøÕ¾Ö§¸¶Êý¾Ý


4ÔÂ6ÈÕ £¬¸Ã¹¥»÷ÀûÓÃÁËCVE-2024-20720£¨CVSS ÆÀ·Ö£º9.1£© £¬Adobe ½«ÆäÃèÊöΪ¡°ÌØÊâÔªËØµÄ²»°ø±ßºÍ¡±°¸Àý £¬¿ÉÄÜΪËÁÒâ´úÂëÖ´ÐÐ̯ƽ··¡£¹«Ë¾ÔÚ 2024 Äê 2 Ô 13 ÈÕ°ä²¼µÄ°²È«¸üÐÂÖнâ¾öÁËÕâ¸öÎÊÌâ¡£Sansec °µÊ¾ £¬ËüÔÚÊý¾Ý¿âÖз¢ÏÖÁËÒ»¸ö¡°¾«ÐÄÉè¼ÆµÄ²¼¾ÖÄ£°å¡± £¬¸ÃÄ£°å±»ÓÃÀ´×Ô¶¯×¢Èë¶ñÒâ´úÂëÒÔÖ´ÐÐËÁÒâºÅÁî¡£¹¥»÷Õß½« Magento ²¼¾Ö½âÎöÆ÷Óë beberlei/assert °ü£¨Ä¬ÈÏ×°Ö㩽áºÏÆðÀ´Ö´ÐÐϵͳºÅÁî¡£ÓÉÓÚ²¼¾Ö¿éÓë½áÕʳµÓйØÁª £¬Òò¶øÃ¿µ±ÒªÇó <store>/checkout/cart ʱ³ÇÊÐÖ´Ðд˺ÅÁî¡£ÓÐÎÊÌâµÄºÅÁîÊÇsed £¬ËüÓÃÓÚ²åÈëÒ»¸ö´úÂëÖ´ÐкóÃÅ £¬¶øºóÕÆ¹ÜÌṩ StripeÖ§¸¶ä¯ÀÀÆ÷ÒÔ²¶»ñ²ÆÕþÐÅÏ¢²¢½«Æäй¶µ½ÁíÒ»¸öÊÜϰȾµÄ Magento É̵ê¡£


https://thehackernews.com/2024/04/hackers-exploit-magento-bug-to-steal.html