[內容說明:] 轉發國家資安資訊分享與分析中心 資安訊息警訊 NCCST-ANA-G2020-0023 1. 研究人員發現CryptoAPI(Crypt32.dll)存在安全漏洞(CVE-2020-0601),遠端攻擊者可利用CryptoAPI |
[影響平台:] CVE-2020-0601: •Microsoft Windows 10 (32、64位元) •Microsoft Windows Server 2016 •Microsoft Windows Server 2019 CVE-2020-0609、CVE-2020-0610: •Microsoft Windows Server 2012 •Microsoft Windows Server 2016 •Microsoft Windows Server 2019 CVE-2020-0611: •Microsoft Windows 7 (32、64位元) •Microsoft Windows 8.1 (32、64位元) •Microsoft Windows 10 (32、64位元) •Microsoft Windows Server 2008 •Microsoft Windows Server 2012 •Microsoft Windows Server 2016 •Microsoft Windows Server 2019 |
[建議措施:] 目前微軟官方已針對此弱點釋出更新程式,請儘速進行更新: 1. CVE-2020-0601之更新已包含在微軟一月份例行性更新中,請至下列連結進行更新: •https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/2020-Jan |
[參考資料:] 1、https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/2020-Jan 2、https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0609 3、https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0610 4、https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0611 5、https://www.csa.gov.sg/singcert/advisories/advisory-on-critical-vulnerabilities-in-microsoft-windows-operating-system 6、https://thehackernews.com/2020/01/warning-quickly-patch-new-critical.html 7、https://www.ithome.com.tw/news/135366 |