網路安全廠商FireEye於12月8日公布近日該公司紅隊所使用之安全測試工具遭外流,這套工具無零時差漏洞攻擊程式,皆為已存在修補方式之CVE安全漏洞。
FireEye已在GitHub上公開利用該套工具偵測規則(包含Snort、Yara、ClamAV及HXIOC)供大眾參考使用或部署。
以下為測試工具所利用之16個CVE安全漏洞與對應之設備或產品:
1. CVE-2014-1812 – Windows Local Privilege Escalation
2. CVE-2016-0167 – local privilege escalation on older versions of Microsoft Windows
3. CVE-2017-11774 – RCE in Microsoft Outlook via crafted document execution (phishing)
4. CVE-2018-8581 – Microsoft Exchange Server escalation of privileges
5. CVE-2019-0604 – RCE for Microsoft Sharepoint
6. CVE-2019-0708 – RCE of Windows Remote Desktop Services (RDS)
7. CVE-2020-0688 – Remote Command Execution in Microsoft Exchange
8. CVE-2020-1472 – Microsoft Active Directory escalation of privileges
9. CVE-2019-8394 – arbitrary pre-auth file upload to ZoHo ManageEngine ServiceDesk Plus
10. CVE-2020-10189 – RCE for ZoHo ManageEngine Desktop Central
11. CVE-2018-13379 – pre-auth arbitrary file reading from Fortinet Fortigate SSL VPN
12. CVE-2018-15961 – RCE via Adobe ColdFusion (arbitrary file upload that can be used to upload a JSP web shell)
13. CVE-2019-3398 – Confluence Authenticated Remote Code Execution
14. CVE-2019-11510 – pre-auth arbitrary file reading from Pulse Secure SSL VPNs
15. CVE-2019-11580 – Atlassian Crowd Remote Code Execution
16. CVE-2019-19781 – RCE of Citrix Application Delivery Controller and Citrix Gateway |