Facebook Google Plus Twitter LinkedIn YouTube RSS ๋ฉ”๋‰ด ๊ฒ€์ƒ‰ ๋ฆฌ์†Œ์Šค - ๋ธ”๋กœ๊ทธ๋ฆฌ์†Œ์Šค - ์›จ๋น„๋‚˜๋ฆฌ์†Œ์Šค - ๋ณด๊ณ ์„œ๋ฆฌ์†Œ์Šค - ์ด๋ฒคํŠธicons_066 icons_067icons_068icons_069icons_070

Tenable ๋ธ”๋กœ๊ทธ

๊ตฌ๋…

CVE-2020-10189: Deserialization Vulnerability in Zoho ManageEngine Desktop Central 10 Patched (SRC-2020-0011)

Zoho releases a patch for a critical remote code execution flaw in ManageEngine one day after the vulnerability was publicly disclosed.

Update 03/09/2020: Updated the Analysis section to include information on reports of active exploitation of this vulnerability.

Background

On March 5, Steven Seeley, an information security specialist at Source Incite, published an advisory for a vulnerability in Zoho ManageEngine Desktop Central. Desktop Central is a centralized management solution for a variety of devices โ€“ from personal computers (e.g., desktops, laptops) to mobile devices (e.g., smartphones, tablets). The vulnerability affects Desktop Central build 10.0.473 and below.

๋ถ„์„

CVE-2020-10189 is an untrusted deserialization vulnerability in Zoho ManageEngine Desktop Central. The vulnerability stems from an improper input validation in the FileStorage class. According to Seeley, an unauthenticated, remote attacker can abuse the lack of validation in the FileStorage class to upload a malicious file containing a serialized payload onto the vulnerable Desktop Central host. To trigger the untrusted deserialization, an attacker would then need to make a subsequent request for the file uploaded onto the vulnerable host. This would then grant the attacker arbitrary code execution with SYSTEM/root privileges. For more detail, please refer to the proof-of-concept section, which contains Seeleyโ€™s detailed breakdown of the vulnerability.

According to a Shodan search by Nate Warfield, senior security program manager at Microsoft, there are over 2,300 publicly accessible Desktop Central instances.

On March 9, we became aware of reports this vulnerability is now being actively exploited in the wild, including a list of indicators of compromise.

Proof of concept

Along with his advisory, Seeley published a proof-of-concept (PoC) for the vulnerability, which he shared in a tweet.

Solution

Zoho released a patch on March 6 to address this vulnerability in Desktop Central build 10.0.479. Users are strongly encouraged to patch as soon as possible by visiting ManageEngineโ€™s service pack release page. The page also includes a link to download build 10.0.479.

Identifying affected systems

A list of Tenable plugins to identify this vulnerability will appear here as theyโ€™re released.

Get more information

Join Tenable's Security Response Team on the Tenable Community.

Learn more about Tenable, the first Cyber Exposure platform for holistic management of your modern attack surface.

Get a free 30-day trial of Tenable.io Vulnerability Management.

๊ด€๋ จ ๊ธฐ์‚ฌ

๋„์›€์ด ๋˜๋Š” ์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ๋‰ด์Šค

์ด๋ฉ”์ผ์„ ์ž…๋ ฅํ•˜์—ฌ Tenable ์ „๋ฌธ๊ฐ€์—๊ฒŒ์„œ ์ ์‹œ์— ์•Œ๋ฆผ์„ ๋ฐ›๊ณ  ๋ณด์•ˆ ์ฐธ๊ณ  ์ž๋ฃŒ๋ฅผ ๋†“์น˜์ง€ ๋งˆ์‹ญ์‹œ์˜ค.

Tenable Vulnerability Management

๋น„๊ตํ•  ์ˆ˜ ์—†๋Š” ์ •ํ™•๋„๋กœ ๋ชจ๋“  ์ž์‚ฐ์„ ํ™•์ธํ•˜๊ณ  ์ถ”์ ํ•  ์ˆ˜ ์žˆ๋Š” ์ตœ์‹  ํด๋ผ์šฐ๋“œ ๊ธฐ๋ฐ˜ ์ทจ์•ฝ์„ฑ ๊ด€๋ฆฌ ํ”Œ๋žซํผ ์ „์ฒด์— ์•ก์„ธ์Šคํ•˜์‹ญ์‹œ์˜ค.

Tenable Vulnerability Management ํ‰๊ฐ€ํŒ์€ Tenable Lumin ๋ฐ Tenable Web App Scanning์„ ํฌํ•จํ•ฉ๋‹ˆ๋‹ค.

Tenable Vulnerability Management

๋น„๊ตํ•  ์ˆ˜ ์—†๋Š” ์ •ํ™•๋„๋กœ ๋ชจ๋“  ์ž์‚ฐ์„ ํ™•์ธํ•˜๊ณ  ์ถ”์ ํ•  ์ˆ˜ ์žˆ๋Š” ์ตœ์‹  ํด๋ผ์šฐ๋“œ ๊ธฐ๋ฐ˜ ์ทจ์•ฝ์„ฑ ๊ด€๋ฆฌ ํ”Œ๋žซํผ ์ „์ฒด์— ์•ก์„ธ์Šคํ•˜์‹ญ์‹œ์˜ค. ์ง€๊ธˆ ์—ฐ๊ฐ„ ๊ตฌ๋…์„ ๊ตฌ๋งคํ•˜์‹ญ์‹œ์˜ค.

100 ์ž์‚ฐ

๊ตฌ๋… ์˜ต์…˜ ์„ ํƒ:

์ง€๊ธˆ ๊ตฌ๋งค

Tenable Vulnerability Management

๋น„๊ตํ•  ์ˆ˜ ์—†๋Š” ์ •ํ™•๋„๋กœ ๋ชจ๋“  ์ž์‚ฐ์„ ํ™•์ธํ•˜๊ณ  ์ถ”์ ํ•  ์ˆ˜ ์žˆ๋Š” ์ตœ์‹  ํด๋ผ์šฐ๋“œ ๊ธฐ๋ฐ˜ ์ทจ์•ฝ์„ฑ ๊ด€๋ฆฌ ํ”Œ๋žซํผ ์ „์ฒด์— ์•ก์„ธ์Šคํ•˜์‹ญ์‹œ์˜ค.

Tenable Vulnerability Management ํ‰๊ฐ€ํŒ์€ Tenable Lumin ๋ฐ Tenable Web App Scanning์„ ํฌํ•จํ•ฉ๋‹ˆ๋‹ค.

Tenable Vulnerability Management

๋น„๊ตํ•  ์ˆ˜ ์—†๋Š” ์ •ํ™•๋„๋กœ ๋ชจ๋“  ์ž์‚ฐ์„ ํ™•์ธํ•˜๊ณ  ์ถ”์ ํ•  ์ˆ˜ ์žˆ๋Š” ์ตœ์‹  ํด๋ผ์šฐ๋“œ ๊ธฐ๋ฐ˜ ์ทจ์•ฝ์„ฑ ๊ด€๋ฆฌ ํ”Œ๋žซํผ ์ „์ฒด์— ์•ก์„ธ์Šคํ•˜์‹ญ์‹œ์˜ค. ์ง€๊ธˆ ์—ฐ๊ฐ„ ๊ตฌ๋…์„ ๊ตฌ๋งคํ•˜์‹ญ์‹œ์˜ค.

100 ์ž์‚ฐ

๊ตฌ๋… ์˜ต์…˜ ์„ ํƒ:

์ง€๊ธˆ ๊ตฌ๋งค

Tenable Vulnerability Management

๋น„๊ตํ•  ์ˆ˜ ์—†๋Š” ์ •ํ™•๋„๋กœ ๋ชจ๋“  ์ž์‚ฐ์„ ํ™•์ธํ•˜๊ณ  ์ถ”์ ํ•  ์ˆ˜ ์žˆ๋Š” ์ตœ์‹  ํด๋ผ์šฐ๋“œ ๊ธฐ๋ฐ˜ ์ทจ์•ฝ์„ฑ ๊ด€๋ฆฌ ํ”Œ๋žซํผ ์ „์ฒด์— ์•ก์„ธ์Šคํ•˜์‹ญ์‹œ์˜ค.

Tenable Vulnerability Management ํ‰๊ฐ€ํŒ์€ Tenable Lumin ๋ฐ Tenable Web App Scanning์„ ํฌํ•จํ•ฉ๋‹ˆ๋‹ค.

Tenable Vulnerability Management

๋น„๊ตํ•  ์ˆ˜ ์—†๋Š” ์ •ํ™•๋„๋กœ ๋ชจ๋“  ์ž์‚ฐ์„ ํ™•์ธํ•˜๊ณ  ์ถ”์ ํ•  ์ˆ˜ ์žˆ๋Š” ์ตœ์‹  ํด๋ผ์šฐ๋“œ ๊ธฐ๋ฐ˜ ์ทจ์•ฝ์„ฑ ๊ด€๋ฆฌ ํ”Œ๋žซํผ ์ „์ฒด์— ์•ก์„ธ์Šคํ•˜์‹ญ์‹œ์˜ค. ์ง€๊ธˆ ์—ฐ๊ฐ„ ๊ตฌ๋…์„ ๊ตฌ๋งคํ•˜์‹ญ์‹œ์˜ค.

100 ์ž์‚ฐ

๊ตฌ๋… ์˜ต์…˜ ์„ ํƒ:

์ง€๊ธˆ ๊ตฌ๋งค

Tenable Web App Scanning ์‚ฌ์šฉํ•ด๋ณด๊ธฐ

Tenable One - ์œ„ํ—˜ ๋…ธ์ถœ ๊ด€๋ฆฌ ํ”Œ๋žซํผ์˜ ์ผ๋ถ€๋ถ„์œผ๋กœ ์ตœ๊ทผ์˜ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์„ ์œ„ํ•ด ์„ค๊ณ„ํ•œ ์ตœ์‹  ์›น ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ์ œ๊ณต ์ „์ฒด ๊ธฐ๋Šฅ์— ์•ก์„ธ์Šคํ•˜์‹ญ์‹œ์˜ค. ๋งŽ์€ ์ˆ˜์ž‘์—…์ด๋‚˜ ์ค‘์š”ํ•œ ์›น ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ์ค‘๋‹จ ์—†์ด, ๋†’์€ ์ •ํ™•๋„๋กœ ์ „์ฒด ์˜จ๋ผ์ธ ํฌํŠธํด๋ฆฌ์˜ค์˜ ์ทจ์•ฝ์„ฑ์„ ์•ˆ์ „ํ•˜๊ฒŒ ์Šค์บ”ํ•ฉ๋‹ˆ๋‹ค. ์ง€๊ธˆ ๋“ฑ๋กํ•˜์‹ญ์‹œ์˜ค.

Tenable Tenable Web App Scanning ํ‰๊ฐ€ํŒ์€ Tenable Lumin ๋ฐ Tenable Web App Scanning์„ ํฌํ•จํ•ฉ๋‹ˆ๋‹ค.

Tenable Web App Scanning ๊ตฌ์ž…

๋น„๊ตํ•  ์ˆ˜ ์—†๋Š” ์ •ํ™•๋„๋กœ ๋ชจ๋“  ์ž์‚ฐ์„ ํ™•์ธํ•˜๊ณ  ์ถ”์ ํ•  ์ˆ˜ ์žˆ๋Š” ์ตœ์‹  ํด๋ผ์šฐ๋“œ ๊ธฐ๋ฐ˜ ์ทจ์•ฝ์„ฑ ๊ด€๋ฆฌ ํ”Œ๋žซํผ ์ „์ฒด์— ์•ก์„ธ์Šคํ•˜์‹ญ์‹œ์˜ค. ์ง€๊ธˆ ์—ฐ๊ฐ„ ๊ตฌ๋…์„ ๊ตฌ๋งคํ•˜์‹ญ์‹œ์˜ค.

5 FQDN

Tenable Lumin ์‚ฌ์šฉํ•ด ๋ณด๊ธฐ

Tenable Lumin์œผ๋กœ ์œ„ํ—˜ ๋…ธ์ถœ ๊ด€๋ฆฌ๋ฅผ ์‹œ๊ฐํ™”ํ•˜์—ฌ ํŒŒ์•…ํ•˜๊ณ  ์‹œ๊ฐ„์— ๊ฑธ์ณ ์œ„ํ—˜ ๊ฐ์†Œ๋ฅผ ์ถ”์ ํ•˜๊ณ  ์œ ์‚ฌํ•œ ์กฐ์ง๊ณผ ๋Œ€๋น„ํ•˜์—ฌ ๋ฒค์น˜๋งˆํ‚นํ•˜์‹ญ์‹œ์˜ค.

Tenable Lumin ํ‰๊ฐ€ํŒ์€ Tenable Lumin ๋ฐ Tenable Web App Scanning์„ ํฌํ•จํ•ฉ๋‹ˆ๋‹ค.

Tenable Lumin ๊ตฌ๋งค

์˜์—… ๋‹ด๋‹น์ž์—๊ฒŒ ๋ฌธ์˜ํ•˜์—ฌ ์–ด๋–ป๊ฒŒ Tenable Lumin์ด ์ „์ฒด ์กฐ์ง์— ๋Œ€ํ•œ ํ†ต์ฐฐ์„ ์–ป๊ณ  ์‚ฌ์ด๋ฒ„ ์œ„ํ—˜์„ ๊ด€๋ฆฌํ•˜๋Š” ๋„์›€์ด ๋˜๋Š”์ง€ ์•Œ์•„๋ณด์‹ญ์‹œ์˜ค.

๋ฌด๋ฃŒ๋กœ Tenable Nessus Professional ์‚ฌ์šฉํ•ด๋ณด๊ธฐ

7์ผ ๋™์•ˆ ๋ฌด๋ฃŒ

Tenable Nessus๋Š” ํ˜„์žฌ ๊ตฌ์ž… ๊ฐ€๋Šฅํ•œ ๊ฐ€์žฅ ์ข…ํ•ฉ์ ์ธ ์ทจ์•ฝ์„ฑ ์Šค์บ๋„ˆ์ž…๋‹ˆ๋‹ค.

์‹ ๊ทœ - Tenable Nessus Expert
์ง€๊ธˆ ์‚ฌ์šฉ ๊ฐ€๋Šฅ

Nessus Expert๋Š” ์™ธ๋ถ€ ๊ณต๊ฒฉ ํ‘œ๋ฉด ์Šค์บ”๋‹๊ณผ ๊ฐ™์€ ๋” ๋งŽ์€ ๊ธฐ๋Šฅ ๋ฐ ๋„๋ฉ”์ธ์„ ์ถ”๊ฐ€ํ•˜๊ณ  ํด๋ผ์šฐ๋“œ ์ธํ”„๋ผ๋ฅผ ์Šค์บ”ํ•˜๋Š” ๊ธฐ๋Šฅ์„ ์ถ”๊ฐ€ํ•ฉ๋‹ˆ๋‹ค. ์—ฌ๊ธฐ๋ฅผ ํด๋ฆญํ•˜์—ฌ Nessus Expert๋ฅผ ์‚ฌ์šฉํ•ด๋ณด์‹ญ์‹œ์˜ค.

์•„๋ž˜ ์–‘์‹์„ ์ž‘์„ฑํ•˜์—ฌ Nessus Pro ํ‰๊ฐ€ํŒ์„ ์‚ฌ์šฉํ•ด๋ณด์‹ญ์‹œ์˜ค.

Tenable Nessus Professional ๊ตฌ์ž…

Tenable Nessus๋Š” ํ˜„์žฌ ๊ตฌ์ž… ๊ฐ€๋Šฅํ•œ ๊ฐ€์žฅ ์ข…ํ•ฉ์ ์ธ ์ทจ์•ฝ์„ฑ ์Šค์บ๋„ˆ์ž…๋‹ˆ๋‹ค. Tenable Nessus Professional์€ ์ทจ์•ฝ์„ฑ ์Šค์บ” ์ ˆ์ฐจ๋ฅผ ์ž๋™ํ™”ํ•˜๊ณ  ์ปดํ”Œ๋ผ์ด์–ธ์Šค ์ฃผ๊ธฐ์˜ ์‹œ๊ฐ„์„ ์ ˆ๊ฐํ•˜๊ณ  IT ํŒ€๊ณผ ์ฐธ์—ฌํ•  ์ˆ˜ ์žˆ๋„๋ก ํ•ฉ๋‹ˆ๋‹ค.

์—ฌ๋Ÿฌ ํ•ด ๋ผ์ด์„ ์Šค๋ฅผ ๊ตฌ๋งคํ•˜์—ฌ ์ ˆ๊ฐํ•˜์‹ญ์‹œ์˜ค. ์—ฐ์ค‘๋ฌดํœด ์ „ํ™”, ์ปค๋ฎค๋‹ˆํ‹ฐ ๋ฐ ์ฑ„ํŒ… ์ง€์›์— ์•ก์„ธ์Šคํ•˜๋ ค๋ฉด Advanced ์ง€์›์„ ์ถ”๊ฐ€ํ•˜์‹ญ์‹œ์˜ค.

๋ผ์ด์„ ์Šค ์„ ํƒ

์—ฌ๋Ÿฌ ํ•ด ๋ผ์ด์„ ์Šค๋ฅผ ๊ตฌ๋งคํ•˜์—ฌ ์ ˆ๊ฐํ•˜์‹ญ์‹œ์˜ค.

์ง€์› ๋ฐ ๊ต์œก ์ถ”๊ฐ€

๋ฌด๋ฃŒ๋กœ Tenable Nessus Expert ์‚ฌ์šฉํ•ด๋ณด๊ธฐ

7์ผ๊ฐ„ ๋ฌด๋ฃŒ

์ตœ์‹  ๊ณต๊ฒฉ ํ‘œ๋ฉด์„ ๋ฐฉ์–ดํ•˜๊ธฐ ์œ„ํ•ด ๊ตฌ์ถ•๋œ Nessus Expert๋ฅผ ์‚ฌ์šฉํ•˜๋ฉด IT๋ถ€ํ„ฐ ํด๋ผ์šฐ๋“œ๊นŒ์ง€, ๋” ๋งŽ์€ ๊ฒƒ์„ ๋ชจ๋‹ˆํ„ฐ๋งํ•˜๊ณ  ์กฐ์ง์„ ์ทจ์•ฝ์„ฑ์œผ๋กœ๋ถ€ํ„ฐ ๋ณดํ˜ธํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

์ด๋ฏธ Tenable Nessus Professional์„ ๋ณด์œ ํ•˜๊ณ  ๊ณ„์‹ญ๋‹ˆ๊นŒ?
7์ผ๊ฐ„ Nessus Expert๋กœ ๋ฌด๋ฃŒ ์—…๊ทธ๋ ˆ์ด๋“œํ•˜์‹ญ์‹œ์˜ค.

Tenable Nessus Expert ๊ตฌ์ž…

์ตœ์‹  ๊ณต๊ฒฉ ํ‘œ๋ฉด์„ ๋ฐฉ์–ดํ•˜๊ธฐ ์œ„ํ•ด ๊ตฌ์ถ•๋œ Nessus Expert๋ฅผ ์‚ฌ์šฉํ•˜๋ฉด IT๋ถ€ํ„ฐ ํด๋ผ์šฐ๋“œ๊นŒ์ง€, ๋” ๋งŽ์€ ๊ฒƒ์„ ๋ชจ๋‹ˆํ„ฐ๋งํ•˜๊ณ  ์กฐ์ง์„ ์ทจ์•ฝ์„ฑ์œผ๋กœ๋ถ€ํ„ฐ ๋ณดํ˜ธํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

๋ผ์ด์„ ์Šค ์„ ํƒ

์—ฌ๋Ÿฌ ํ•ด ๋ผ์ด์„ ์Šค๋ฅผ ๊ตฌ๋งคํ•˜์—ฌ ๋น„์šฉ์„ ๋” ์ ˆ๊ฐํ•˜์‹ญ์‹œ์˜ค.

์ง€์› ๋ฐ ๊ต์œก ์ถ”๊ฐ€