-Unsupported JavaScript- 【漏洞預警】微軟Windows TCP/IP堆疊存在安全漏洞(CVE-2020-16898),允許攻擊者遠端執行任意程式碼,請儘速確認並進行更新! - TANet花蓮區域網路中心
【漏洞預警】微軟Windows TCP/IP堆疊存在安全漏洞(CVE-2020-16898),允許攻擊者遠端執行任意程式碼,請儘速確認並進行更新!
影響等級:低
發現時間:2020-10-16
原標題名稱:【攻擊預警】國家級駭客組織所利用之遠端存取設備與微軟Exchange漏洞,請各會員注意防範!

內容說明 -
轉發 行政院國家資通安全會報技術服務中心 資安訊息警訊 NISAC-ANA-202010-0502

研究人員發現微軟Windows TCP/IP堆疊(TCP/IP stack)未能正確處理ICMPv6之路由器公告(Router Advertisement)封包,導致存在安全漏洞(CVE-2020-16898),遠端攻擊者可藉由發送特製的ICMPv6路由器公告封包,利用此漏洞進而執行任意程式碼。

影響平台-
受影響Windows版本如下:
Windows 10 Version 1709 for 32-bit Systems;
Windows 10 Version 1709 for ARM64-based Systems;
Windows 10 Version 1709 for x64-based Systems;
Windows 10 Version 1803 for 32-bit Systems;
Windows 10 Version 1803 for ARM64-based Systems;
Windows 10 Version 1803 for x64-based Systems;
Windows 10 Version 1809 for 32-bit Systems;
Windows 10 Version 1809 for ARM64-based Systems;
Windows 10 Version 1809 for x64-based Systems;
Windows 10 Version 1903 for 32-bit Systems;
Windows 10 Version 1903 for ARM64-based Systems;
Windows 10 Version 1903 for x64-based Systems;
Windows 10 Version 1909 for 32-bit Systems;
Windows 10 Version 1909 for ARM64-based Systems;
Windows 10 Version 1909 for x64-based Systems;
Windows 10 Version 2004 for 32-bit Systems;
Windows 10 Version 2004 for ARM64-based Systems;
Windows 10 Version 2004 for x64-based Systems;
Windows Server 2019;
Windows Server 2019 (Server Core installation);
Windows Server, version 1903 (Server Core installation);
Windows Server, version 1909 (Server Core installation);
Windows Server, version 2004 (Server Core installation);


建議措施-
1.目前微軟官方已針對此漏洞釋出更新程式,請各機關聯絡設備維護廠商或參考以下建議進行更新:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16898

2.如無法更新,亦可於Windows 1709以上版本環境中,執行「netsh int ipv6 set int *INTERFACENUMBER* rabaseddnsconfig=disable」之PowerShell指令,藉由停用ICMPv6 RDNSS功能,防止攻擊者進行弱點利用。

參考資料-
1. https://portalmsrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16898
2. https://vuldb.com/?id.162598
內容更新 : 2020-11-06
瀏覽數