發佈編號:TACERT-ANA-2021081003084040
發佈時間:2021-08-11 09:39:41
事故類型:ANA-漏洞預警
發現時間:2021-08-10 15:32:41
影響等級:中
[主旨說明:]
【漏洞預警】近兩年駭客最常利用之29個漏洞資訊與修補方式
[內容說明:]
轉發 國家資安資訊分享與分析中心 資安訊息警訊 NISAC-ANA-202108-0595
美國網路安全暨基礎架構管理署(Cybersecurity and Infrastructure Security Agency , CISA)、美國聯邦調查局(Federal Bureau of Investigation, FBI)、澳州網路安全中心(Australian Cyber Security Centre, ACSC)及英國國家網路安全中心(National Cyber Security Centre, NCSC)於7月28日共同發布資安公告,彙整2020年迄今駭客最常利用之29個漏洞資訊與修補方式,呼籲各政府機關(構)與企業儘速修補這些漏洞。相關技術細節與防護建議請參考附件。
情資分享等級: WHITE(情資內容為可公開揭露之資訊)
[影響平台:]
相關影響平台請參考此公告最下方附件「近兩年駭客最常利用之29個漏洞資訊與修補方式之資安通告單」。
[建議措施:]
1.相關技術細節與防護建議請參考附件。
2.此則警訊僅作通知用途,無需進行任何通報作業。
[參考資料:]
[1] https://us-cert.cisa.gov/ncas/alerts/aa21-209a
[2] https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2017-11882
[4] https://www.drupal.org/sa-core-2018-002
[5] https://www.fortiguard.com/psirt/FG-IR-18-384
[6] https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2019-0604
[7] https://confluence.atlassian.com/doc/confluence-security-advisory-2019-03-20-966660264.html
[8] https://www.fortiguard.com/psirt/FG-IR-19-037
[9] https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101
[10] https://jira.atlassian.com/browse/CWD-5388
[11] https://www.telerik.com/support/kb/aspnet-ajax/details/allows-javascriptserializer-deserialization
[12] https://support.citrix.com/article/CTX267679
[13] https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-0688
[14] https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-0787
[15] https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1472
[16] https://support.f5.com/csp/article/K52145254
[17] https://www.fortiguard.com/psirt/FG-IR-19-283
[18] https://www.ivanti.com/blog/mobileiron-security-updates-available?miredirect
[19] https://www.vmware.com/security/advisories/VMSA-2021-0010.html
[20] https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784
[21] https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26855
[22] https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26857
[23] https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-26858
[24] https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-27065
[25] https://www.accellion.com/company/press-releases/accellion-responds-to-recent-fta-security-incident/
(此通報僅在於告知相關資訊,並非為資安事件),如果您對此通報的內容有疑問或有關於此事件的建議,歡迎與我們連絡。
教育機構資安通報應變小組
網址:https://info.cert.tanet.edu.tw/
專線電話:07-5250211
網路電話:98400000
E-Mail:service@cert.tanet.edu.tw