BANNER
最新消息
【漏洞預警】微軟Windows TCP/IP堆疊存在安全漏洞(CVE-2020-16898),允許攻擊者遠端執行任意程式碼,請儘速確認並進行更新!
公告日期:2020-11-03
公告單位:雲嘉區域網路中心

[內容說明:]

轉發 行政院國家資通安全會報技術服務中心 資安訊息警訊 NISAC-ANA-202010-0502
​​​​​​​研究人員發現微軟Windows TCP/IP堆疊(TCP/IP stack)未能正確處理ICMPv6之路由器公告(Router Advertisement)封包,
導致存在安全漏洞(CVE-2020-16898),遠端攻擊者可藉由發送特製的ICMPv6路由器公告封包,利用此漏洞進而執行任意程式碼。
情資分享等級: WHITE(情資內容為可公開揭露之資訊)

[影響平台:]

受影響Windows版本如下:
Windows 10 Version 1709 for 32-bit Systems;
Windows 10 Version 1709 for ARM64-based Systems;
Windows 10 Version 1709 for x64-based Systems;
Windows 10 Version 1803 for 32-bit Systems;
Windows 10 Version 1803 for ARM64-based Systems;
Windows 10 Version 1803 for x64-based Systems;
Windows 10 Version 1809 for 32-bit Systems;
Windows 10 Version 1809 for ARM64-based Systems;
Windows 10 Version 1809 for x64-based Systems;
Windows 10 Version 1903 for 32-bit Systems;
Windows 10 Version 1903 for ARM64-based Systems;
Windows 10 Version 1903 for x64-based Systems;
Windows 10 Version 1909 for 32-bit Systems;
Windows 10 Version 1909 for ARM64-based Systems;
Windows 10 Version 1909 for x64-based Systems;
Windows 10 Version 2004 for 32-bit Systems;
Windows 10 Version 2004 for ARM64-based Systems;
Windows 10 Version 2004 for x64-based Systems;
Windows Server 2019;
Windows Server 2019 (Server Core installation);
Windows Server, version 1903 (Server Core installation);
Windows Server, version 1909 (Server Core installation);
Windows Server, version 2004 (Server Core installation);

[建議措施:]

1.目前微軟官方已針對此漏洞釋出更新程式,請各機關聯絡設備維護廠商或參考以下建議進行更新:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16898
2.如無法更新,亦可於Windows 1709以上版本環境中,執行「netsh int ipv6 set int *INTERFACENUMBER* rabaseddnsconfig=disable」
之PowerShell指令,藉由停用ICMPv6 RDNSS功能,防止攻擊者進行弱點利用。

[參考資料:]

1. https://portalmsrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16898
2. https://vuldb.com/?id.162598