VMware vCenter Server¼°Cloud FoundationÆØÒªº¦Çå¾²Îó²î
Ðû²¼Ê±¼ä 2024-09-199ÔÂ18ÈÕ£¬£¬£¬£¬VMware¹«Ë¾½üÆÚ½ÒÆÆÁËÁ½¸öÕë¶ÔÆävCenter ServerºÍCloud Foundation²úÆ·µÄÖØ´óÇå¾²Îó²î£¬£¬£¬£¬CVE-2024-38812ºÍCVE-2024-38813£¬£¬£¬£¬»®·ÖÉæ¼°¶ÑÒç³öºÍȨÏÞÌáÉýÎÊÌ⣬£¬£¬£¬¶ÔvCenter Server 7.0ºÍ8.0¼°Cloud Foundation 4.xºÍ5.x°æ±¾×é³ÉÍþв¡£¡£¡£CVE-2024-38812ÓÈΪÑÏÖØ£¬£¬£¬£¬CVSSÆÀ·Ö¸ß´ï9.8£¬£¬£¬£¬ÔÊÐíÓµÓÐÍøÂç»á¼ûȨÏ޵Ĺ¥»÷Õßͨ¹ý·¢ËͶ¨ÖÆÊý¾Ý°üÖ´ÐÐÔ¶³Ì´úÂë¡£¡£¡£¶øCVE-2024-38813ÔòÄÜÈù¥»÷Õß½«È¨ÏÞÌáÉýÖÁroot¼¶±ð£¬£¬£¬£¬CVSSÆÀ·ÖΪ7.5¡£¡£¡£VMwareÒÑѸËÙÏìÓ¦£¬£¬£¬£¬Ðû²¼ÁËÐÞ²¹³ÌÐò£¬£¬£¬£¬²¢Ç¿ÁÒ±Þ²ßÓû§Á¬Ã¦Éý¼¶ÖÁ×îа汾£¨vCenter Server 8.0 U3b»ò7.0 U3s£¬£¬£¬£¬Cloud FoundationÔòÓ¦ÓÃKB88287ÖеÄÒì²½²¹¶¡£¡£¡£©¡£¡£¡£Ö»¹ÜÏÖÔÚδ·¢Ã÷ÕâЩÎó²îµÄÒ°ÍâʹÓð¸Àý£¬£¬£¬£¬µ«¼øÓÚvCenter ServerÔÚÐéÄ⻯ÇéÐÎÖÎÀíÖеĽ¹µãְ룬£¬£¬£¬ÆäDZÔÚΣº¦½ûÖ¹ºöÊÓ¡£¡£¡£
https://cybersecuritynews.com/vmware-vcenter-server-remote-code/#google_vignette
2. CISA ÖÒÑÔ Adobe Flash Player Îó²îÕý±»Æð¾¢Ê¹ÓÃ
9ÔÂ17ÈÕ£¬£¬£¬£¬ÃÀ¹úÍøÂçÇå¾²ºÍ»ù´¡ÉèÊ©Çå¾²¾Ö£¨CISA£©½üÆÚ½«ËĸöÑÏÖØµÄAdobe Flash PlayerÎó²îÁÐÈëÆäÒÑÖª¿ÉʹÓÃÎó²î£¨KEV£©Ä¿Â¼ÖУ¬£¬£¬£¬ÕâЩÎó²îµÄÆØ¹âÔÙ´Î͹ÏÔÁ˼´±ãÔÚFlash PlayerÒÑÐû²¼ÓÚ2020ÄêÖÕֹʹÓú󣬣¬£¬£¬ÒÅÁôÈí¼þÎó²îµÄÒ»Á¬Çå¾²Íþв¡£¡£¡£ÕâЩÎó²î£¬£¬£¬£¬°üÀ¨¿É×·ËÝÖÁ2013ÄêµÄCVE-2013-0643ºÍCVE-2013-0648´úÂëÖ´ÐÐÎó²î£¬£¬£¬£¬ÒÔ¼°2014ÄêµÄCVE-2014-0497ÕûÊýÏÂÒçºÍCVE-2014-0502Ë«ÖØÊÍ·ÅÎó²î£¬£¬£¬£¬¶¼ÔøÊÇÁãÈÕ¹¥»÷µÄÄ¿µÄ£¬£¬£¬£¬¶ÔFirefoxÓû§µÈ×é³ÉÍþв¡£¡£¡£Ö»¹ÜFlash PlayerÔøÊÇÍøÂ绥¶¯ÄÚÈݵĻùʯ£¬£¬£¬£¬µ«Ëæ×Åʱ¼äµÄÍÆÒÆ£¬£¬£¬£¬ËüÒѳÉΪÖ÷ÒªµÄÇå¾²Òþ»¼£¬£¬£¬£¬ÆµÈÔÊܵ½¹¥»÷ÕßʹÓᣡ£¡£CISAÒò´Ë½ôÆÈºôÓõËùÓÐÁª°î»ú¹¹ÔÚ2024Äê10ÔÂ8ÈÕǰ³¹µ×ÒÆ³ýFlash Player£¬£¬£¬£¬ÒÔ½µµÍDZÔÚµÄÇ徲Σº¦£¬£¬£¬£¬±£»£»£»¤Ãô¸ÐÕþ¸®Êý¾ÝºÍÒªº¦»ù´¡ÉèÊ©ÃâÊÜË𺦡£¡£¡£Adobe×Ô2020ÄêÆðÒÑ×èÖ¹Flash PlayerµÄ¿ª·¢£¬£¬£¬£¬Ö÷Á÷ä¯ÀÀÆ÷Ò²²»ÔÙ¼æÈÝ£¬£¬£¬£¬ËäÈ» Flash Ò»¾ÔÚ»¥ÁªÍøµÄÉú³¤ÖÐʩչ¹ýÖ÷Òª×÷Ó㬣¬£¬£¬µ«ÆäÇ徲Σº¦ÒÑʹÆä¹ýʱ¡£¡£¡£
https://securityonline.info/cisa-warns-of-actively-exploited-adobe-flash-player-vulnerabilities/
3. UNC2970×é֯ʹÓÃľÂí»¯PDFÔĶÁÆ÷¹¥»÷Òªº¦»ù´¡ÉèÊ©
9ÔÂ17ÈÕ£¬£¬£¬£¬MandiantÕ¹ÏÖÁËÓ볯ÏʹØÁªµÄUNC2970×éÖ¯ÌᳫµÄÖØ´óÍøÂçÌØ¹¤»î¶¯£¬£¬£¬£¬¸Ã×é֯ʹÓø߶ȶ¨ÖƵÄÍøÂç´¹ÂÚÊֶΣ¬£¬£¬£¬Õë¶ÔÄÜÔ´ºÍº½¿Õº½ÌìµÈÒªº¦ÐÐÒµµÄ¸ß¼¶Ô±¹¤¡£¡£¡£UNC2970ͨ¹ýαװ³É×ÅÃûÆóÒµµÄÊÂÇéʱ»úÓÕ¶ü£¬£¬£¬£¬ÏòÄ¿µÄ·¢ËͰüÀ¨Ä¾Âí»¯SumatraPDFÔĶÁÆ÷µÄZIPÎļþ£¬£¬£¬£¬¸ÃÔĶÁÆ÷ÄÚǶMISTPENºóÃÅ£¬£¬£¬£¬Ò»µ©Êܺ¦ÕßʹÓÃÆä·¿ªÎ±×°³ÉְλÐÎòµÄPDFÎļþ£¬£¬£¬£¬¼´´¥·¢Ñ¬È¾Á´¡£¡£¡£MISTPEN×÷ΪһÖÖÒþÃØ¹¤¾ß£¬£¬£¬£¬Ö§³Ö¶àÖÖ¶ñÒâ²Ù×÷£¬£¬£¬£¬Ê¹ÓÃÕýµ±Ð§ÀÍÈÚÈëÍøÂçÁ÷Á¿£¬£¬£¬£¬ÒÔʵÏÖºã¾Ã¿ØÖƺÍÊý¾ÝÇÔÈ¡¡£¡£¡£UNC2970ͨ¹ýÐ޸ĿªÔ´Èí¼þ´úÂëºÍÈ«ÐÄÉè¼ÆµÄְλÐÎò£¬£¬£¬£¬Ìá¸ßÁ˹¥»÷µÄÒþ²ØÐÔºÍÀÖ³ÉÂÊ£¬£¬£¬£¬¶Ô¶à¸ö¹ú¼ÒµÄ»ù´¡ÉèÊ©Çå¾²×é³ÉÖØ´óÍþв¡£¡£¡£¼øÓÚÆäÕë¶ÔÒªº¦ÁìÓòµÄ»î¶¯£¬£¬£¬£¬Ïà¹Ø×éÖ¯Ðè½ôÆÈÔöÇ¿·ÀÓù²½·¥£¬£¬£¬£¬ÒÔµÖÓù´ËÀà¸ß¼¶ÍøÂç´¹ÂÚ¹¥»÷¡£¡£¡£
https://securityonline.info/unc2970s-backdoor-deployed-via-trojanized-pdf-reader-targets-critical-infrastructure/
4. ¶íÂÞ˹Çå¾²¹«Ë¾Dr.WebÔâºÚ¿Í¹¥»÷
9ÔÂ18ÈÕ£¬£¬£¬£¬¶íÂÞ˹×ÅÃûµÄ·´¶ñÒâÈí¼þ¹«Ë¾Doctor Web£¨Dr.Web£©¹ûÕæÐû²¼£¬£¬£¬£¬ÆäIT»ù´¡ÉèÊ©ÔâÓöÁËÍøÂç¹¥»÷£¬£¬£¬£¬²¢Òò´Ë·¢Ã÷ÁËÇå¾²Îó²î¡£¡£¡£ÃæÁÙÕâÒ»½ôÆÈÇéÐΣ¬£¬£¬£¬Dr.WebѸËÙ½ÓÄÉÐж¯£¬£¬£¬£¬ÇжÏÁËËùÓÐЧÀÍÆ÷ÓëÄÚ²¿ÍøÂçµÄÅþÁ¬£¬£¬£¬£¬ÒÔ±ÜÃâ¹¥»÷½øÒ»²½À©É¢¡£¡£¡£´Ë´Î¹¥»÷ʼÓÚ9ÔÂ14ÈÕ£¬£¬£¬£¬Dr.WebËæ¼´Õö¿ªÁËÏ꾡µÄÊӲ첢ÑÏÃÜ¼à¿ØÊÂ̬Éú³¤¡£¡£¡£ÔÚÊÓ²ìʱ´ú£¬£¬£¬£¬ÎªÁ˰ü¹Ü¿Í»§Çå¾²£¬£¬£¬£¬Dr.Web²»µÃ²»ÔÚÖÜÒ»ÔÝÍ£Á˲¡¶¾Êý¾Ý¿âµÄ¸üÐÂЧÀÍ¡£¡£¡£È»¶ø£¬£¬£¬£¬¹«Ë¾Ç¿µ÷£¬£¬£¬£¬¶Ô»ù´¡ÉèÊ©µÄÆÆËðÍýÏëÒѱ»ÊµÊ±×èÖ¹£¬£¬£¬£¬ËùÓÐÊÜDr.Web±£»£»£»¤µÄÓû§ÏµÍ³¾ùδÊܵ½Ó°Ïì¡£¡£¡£ÖÜÈý£¬£¬£¬£¬Dr.WebÐû²¼Òѻָ´²¡¶¾Êý¾Ý¿âµÄ¸üÐÂЧÀÍ£¬£¬£¬£¬²¢È·ÈÏ´Ë´ÎÇå¾²ÊÂÎñ²¢Î´¸øÆä¿Í»§´øÀ´ÈκθºÃæÓ°Ïì¡£¡£¡£Îª³¹µ×Ïû³ýÇå¾²Íþв£¬£¬£¬£¬Dr.Web½ÓÄÉÁ˰üÀ¨Ê¹ÓÃÊÊÓÃÓÚLinuxµÄDr.Web FixIt!ÔÚÄÚµÄһϵÁÐÓ¦¼±²½·¥£¬£¬£¬£¬²¢ÀֳɸôÀëÁËDZÔÚΣº¦¡£¡£¡£¹«Ë¾ÍøÂçµÄÊý¾ÝΪÇ徲ר¼ÒÌṩÁËÒªº¦ÐÅÏ¢£¬£¬£¬£¬×ÊÖúËûÃÇÈ·±£ÏµÍ³Çå¾²ÎÞÓÝ¡£¡£¡£
https://www.bleepingcomputer.com/news/security/russian-security-firm-drweb-disconnects-all-servers-after-breach/
5. FleetPandaЧÀÍÆ÷ÉèÖùýʧ̻¶°ÙÍò·ÝÃô¸ÐÎļþ
9ÔÂ18ÈÕ£¬£¬£¬£¬Ê¯ÓÍÓëȼÁÏÐÐÒµµÄÁìÏÈÈí¼þ¹©Ó¦ÉÌFleetPandaÒòЧÀÍÆ÷ÉèÖùýʧ¶øÔâÓöÁËÑÏÖØµÄÊý¾Ýй¶ÊÂÎñ£¬£¬£¬£¬½ü°ÙÍò·ÝÃô¸ÐÎļþ±»²»·¨Ì»Â¶¡£¡£¡£ÕâЩÎļþº¸ÇÁË´Ó2019ÄêÖÁ2024Äê8Ôµķ¢Æ±¡¢ÔËÊä¼Í¼¡¢¼ÝÕÕÐÅÏ¢¼°Åä¾°ÊÓ²ìµÈ£¬£¬£¬£¬Éæ¼°¼ÓÖÝ¡¢¶íÀÕ¸Ô¡¢µÂ¿ËÈøË¹µÈ¶à¸öÖÝ£¬£¬£¬£¬×ÜÁ¿¸ß´ï193GB¡£¡£¡£ÍøÂçÇ徲ר¼ÒJeremiah Fowler·¢Ã÷ÁËÕâһδÊܱ£»£»£»¤µÄÊý¾Ý¿â£¬£¬£¬£¬ÆäÄÚÈÝÏ꾡µØÕ¹ÏÖÁËÐÐÒµÄÚµÄȼÁÏÔËÊäÓëÓªÒµÍùÀ´£¬£¬£¬£¬ÉõÖÁ°üÀ¨ÁËÉç»áÇå¾²ºÅÂëµÈ¸ß¶ÈÃô¸ÐµÄСÎÒ˽¼ÒÐÅÏ¢¡£¡£¡£´Ë´Îй¶²»µ«Íþвµ½Ð¡ÎÒ˽¼ÒÒþ˽Çå¾²£¬£¬£¬£¬»¹¿ÉÄÜÒý·¢Éí·Ý͵ÇԺ;¼ÃËðʧ£¬£¬£¬£¬Í¬Ê±£¬£¬£¬£¬·¸·¨·Ö×Ó¿ÉÄÜʹÓ÷¢Æ±ÐÅϢʵÑéÚ²ÆÐÐΪ¡£¡£¡£¶ÔʯÓͺÍȼÁÏÐÐÒµ¶øÑÔ£¬£¬£¬£¬¹©Ó¦Á´µÄÎȹÌÐÔºÍÐÅÏ¢Çå¾²ÒàÊܵ½¹¥»÷£¬£¬£¬£¬¿ÉÄÜÒý·¢Êг¡²¨¶¯ºÍ¼ÛÇ®ÉÏÕÇ¡£¡£¡£Fowler½¨ÒéÆóÒµÓ¦½«Ãô¸ÐÊý¾ÝÓëÒ»Ñùƽ³£ÓªÒµÎļþÊèÉ¢´æ´¢£¬£¬£¬£¬Ç¿»¯»á¼û¿ØÖÆ£¬£¬£¬£¬°´ÆÚ¸üÐÂϵͳ²¢ÔöǿԱ¹¤Åàѵ£¬£¬£¬£¬ÒÔ¹¹½¨Ô½·¢Îȹ̵ÄÍøÂçÇå¾²·ÀµØ¡£¡£¡£
https://hackread.com/server-misconfiguration-fuel-software-exposed-pii-data/
6. Delta Primeƽ̨ÔâÊÜÍøÂç¹¥»÷£¬£¬£¬£¬¼ÓÃÜÇ®±ÒʧÔô½üÁù°ÙÍòÃÀÔª
9ÔÂ18ÈÕ£¬£¬£¬£¬Delta Primeƽ̨½üÆÚÔâÓöÑÏÖØÍøÂç¹¥»÷£¬£¬£¬£¬µ¼Ö¼ÛÖµ¸ß´ïÔ¼600ÍòÃÀÔªµÄ¼ÓÃÜÇ®±Ò±»µÁ£¬£¬£¬£¬Ô¶³¬×î³õ±¨¸æµÄ450ÍòÃÀÔªËðʧ¡£¡£¡£Çø¿éÁ´Çå¾²¹«Ë¾CyversÓÚ9ÔÂ16ÈÕÂÊÏÈ½ÒÆÆ´ËÊ£¬£¬£¬£¬Ö¸³öºÚ¿ÍÒÑ×îÏȽ«ÍµÈ¡µÄUSDCת»»ÎªETH£¬£¬£¬£¬²¢ÖÒÑÔÔÚ¼ì²â³õÆÚ£¬£¬£¬£¬ºÚ¿ÍÇ®°üÈÔÒ»Á¬´Óƽ̨³é×Ê£¬£¬£¬£¬Íþв½øÒ»²½Ëðʧ¡£¡£¡£Ëæºó£¬£¬£¬£¬Fuzzland´ú±íÈ·ÈÏÁËËðʧ×ܶîÒÑÅÊÉýÖÁ½ü600ÍòÃÀÔª£¬£¬£¬£¬²¢Õ¹ÏÖ±£´æ¸ü¶à¶ñÒâÉúÒâ»î¶¯¡£¡£¡£´Ë´ÎÈëÇÖ±»¹éÒòÓÚDelta Primeƽ̨Ǯ°ü¹ÜÀíÔ±ÃÜԿʧÔô£¬£¬£¬£¬ºÚ¿Íµ½ÊÖºó¿ØÖÆÁËÍйÜÊðÀíºÏÔ¼µÄÇ®°ü£¬£¬£¬£¬½ø¶øÐ޸ĺÏÔ¼ÉèÖ㬣¬£¬£¬½«ÆäÖØ¶¨ÏòÖÁ¶ñÒâºÏÔ¼£¬£¬£¬£¬´Ó¶øÔÚArbitrumÍøÂçÉÏ·Å×ÝÇÔÈ¡×ʽ𣬣¬£¬£¬×ÜËðʧ¹ÀËãµÖ´ï590ÍòÃÀÔª¡£¡£¡£ÕâÒ»ÊÂÎñÒýÆðÁËÍøÂçÇå¾²ÁìÓòµÄ¸ß¶È¹Ø×¢£¬£¬£¬£¬×¨¼ÒÖÒÑÔºÚ¿ÍδÀ´¿ÉÄÜÃé×¼¸ü´ó¹æÄ£µÄÄ¿µÄ£¬£¬£¬£¬ÌØÊâÊÇÃÀ¹ú¼ÓÃÜÇ®±ÒETF»ù½ð£¬£¬£¬£¬ÆäÖØ´óµÄ±ÈÌØ±Ò´¢±¸¶ÔºÚ¿Í¼«¾ßÓÕ»óÁ¦£¬£¬£¬£¬°üÀ¨³¯ÏÊLazarus¼¯ÍŵÈDZÔÚÍþв¡£¡£¡£¾ÝDuneÆÊÎöƽ̨Êý¾ÝÏÔʾ£¬£¬£¬£¬±ÈÌØ±ÒÖ§³ÖµÄETF×Ü×ʲúÒѸߴï534ÒÚÃÀÔª£¬£¬£¬£¬½øÒ»²½Í¹ÏÔÁË´ËÀà×ʲúµÄÇ徲Σº¦¡£¡£¡£
https://securityonline.info/cyberattack-on-delta-prime-losses-soar-to-6m/


¾©¹«Íø°²±¸11010802024551ºÅ